Title: Communications Infrastructure for ECommerce
1Communications Infrastructure for E-Commerce
- Introductory computer concepts
- The importance of a communications infrastructure
for EC systems - The technological principles behind a
communications infrastructure - The technologies of communications the issues
to consider - The available technologies
2Introductory computer concepts
- What is a computer system?
- The evolution in the last four decades
- in hardware
- in software
- in inter-computer communication
3Some technologies behind networking
- Communication channels
- Networking devices
- Protocols
- Protocols establish rules of communication to
enable the data transmission to occur securely
and speedily. The rules are divided into layers,
each serving a stage of communication.
4(No Transcript)
5(No Transcript)
6Relationship between computers in a network
- Topologies
- Client server network
- Servers in Internet-based communication
7(No Transcript)
8Communications infrastructure for EC systems
- What is a communications infrastructure?
- a technical infrastructure capable of supporting
a complicated array of technical and business
systems - Building an infrastructure involves making
decisions on how EC affects existing information
systems, networked applications, and internal and
external communications.
9The principles behind a communications
infrastructure
- The integration with legacy systems
- The incorporation of distributed information
systems - The Integration with current hardware systems
- The accessibility between systems the networks
10- The provision of user-friendly and innovative
on-line services - The provision of flexibility and scalability
- The maintenance of security and speed of service
11The technologies of communications
- Issues to consider
- network connections
- methods of access to the Internet
- visibility in cyberspace
- user interface
- security measures
- information systems
- operational procedures
12The available technologies
- Networking options
- Wired connection
- Wireless communication
13(No Transcript)
14Wireless communication
- Involves microwave towers transmitting and
receiving em waves. Satellites receive them from
the transmitters, amplify them, relay them to
other satellites, and transmit them to the
receiving towers. - A geographical area is divide into cells, each
cell being allocated a number of frequencies for
transmission. The same frequencies are allocated
to other non-adjacent cells, thus increasing
usage.
15(No Transcript)
16Technologies used to improve mobile communication
- Global system for mobile (GSM) communications
- Cellular digital packet data (CDPD)
- Time division multiple access (TDMA)
- Code division multiple access (CDMA)
- Wireless Applications Protocol(WAP) - the 3G
technology
17WAP
- A protocol that enables mobile phone users to
access Internet services. A small screen displays
webpages and facilitates the use of
Internet-based applications. - M-commerce is viewed as the future in EC-related
communication - However, some problems still exist in making this
a reality
18Alternative technologies for mobile communication
- General packet radio service (GPRS)
- iMode (sometimes referred to as generation 2.5)
in Japan - Personal communication services (PCS)
- Pagers
19Access to the Internet
- Internet Service Providers (ISP)
- Network Access Points (NAP)
- Domain Name Service (DNS) - the organisations
involved - IANA
- ICANN
- UCAID - Internet 2
20(No Transcript)
21Security in E-commerce
- Criteria for security
- confidentiality
- authentication
- authorisation
- integrity
- availability
- non-repudiation
22Technologies of security
- Encryption - Private and Public key
- Private keys are symmetric, both sender and
receiver hold a secret key. - Public keys comprise an asymmetric pair, with one
public key given to intended receivers by the
sender who holds the pairing private key.
23(No Transcript)
24Public key for digital signature
- Using encryption to authenticate a message
- A sends a message to B using As private key if
B is successful in decrypting it using As public
key, then it confirms A as the sender of the
message.
25Secure Sockets Layer (SSL)
-
- SSL is a protocol that uses the concept of
digital signature by public key encryption to
send data between applications securely.
26Public key for implementing SSL
27Other methods used for security
- Password control
- Firewall
- Virtual private networks
28(No Transcript)
29(No Transcript)
30Questions
- Some people have suggested that the future of
e-commerce is in the WAP technology others are
more sceptical about its potential. -
- What do you think and why?
31Case studies
- Lucenet
- Sabre
- Anderson-Charnley
- Friends Provident