Top Banner
Chapter 8 Activities on Chapter 8 Activities on the Internet the Internet 8.1 Tools and Services on the 8.1 Tools and Services on the Internet Internet 8.2 8.2 Business on the Internet Business on the Internet
34

Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Jan 12, 2016

Download

Documents

Roger Glenn
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Chapter 8 Activities on the InternetInternet

8.1 Tools and Services on the Internet8.1 Tools and Services on the Internet

8.28.2 Business on the InternetBusiness on the Internet

Page 2: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1 Tools and Services on the Internet

WWW e-mail File Transfer Telnet Newsgroup IP Phone VideoConferencing

Page 3: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.1 WWW

Web browser major Internet application supports interactive, visual, animated interface.

Web pages documents written in HyperText Markup Language (HTML)

present text, images, sound, animation and videowith hyperlinks

Hypertext Transmission Protocol (HTTP) protocol for transferring documents on the Web

1. establishes a connection between client and server2. carries requests from the browser3. transports pages from Web server

Page 4: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.2 E-mail (1/4)

E-mail (electronic mail) exchange of messages with other users via a computer network using store-and-forward mode

E-mail user has an account from an organisation

e.g. ISP, school, Web mail company

login to send and receive mail, byuser name and password

E-mail message simple text, and attachment

a file travelled with the e-mail message

Page 5: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.2 E-mail (2/4)

E-mail servers SMTP server

kept by an ISP handles outgoing mailsSMTP (simple mail transfer protocol)

• protocol for routing e-mails POP (or IMAP) server

kept by an e-mail service provider (e.g. a school)stores the incoming mails (store-and-forward)POP3 (Post office protocol version 3)

• protocol for downloading e-mails from the serverIMAP (Internet message access protocol)

• mail left in the server after downloaded

Page 6: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.2 E-mail (3/4)

Page 7: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.2 E-mail (4/4)

Attachment and MIME SMTP

handles text-based messages only

MIME (Multi-purpose Internet mail extension) a protocol disguises other data as plain ASCII textfor transmitting photo, sound or word documentincludes information in the e-mail header

• for receiver’s e-mail software to reconstruct the original data

Page 8: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.3 File Transfer (1/2)

File Transfer Protocol (FTP) defines how to send and receive files between a client and

a server. FTP client program

allows user to access an FTP server functions :

uploading/downloading filesfile management tasks

• e.g. creating directory, deleting files, renaming files etc.

Page 9: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.3 File Transfer (2/2)

Private FTP site needs authentication

Anonymous FTP site publicly accessible

read only

user name : “anonymous”

Page 10: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.4 Telnet

Telnet a protocol enables users to log on and control another computer via

the Internet. simulates a text-based terminal screen users can perform tasks

managing filesrunning applicationsadminister the remote system

commands and passwords are sent in plain text without encryption

should be turned off, if not in use

Page 11: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.5 Newsgroup (1/2)

Newsgroup a forum on the Internet threaded discussion

on a specified range of subjects

Thread is a collection of related messages

the original article, and postings responding to the original article

Page 12: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.5 Newsgroup (2/2)

Usenet a worldwide forum with over 30,000 newsgroups many Usenet servers all over the world

with the same set of messages

Network News Transfer Protocol (NNTP) protocol for Usenet newsgroups

A moderated newsgroup managed by somebody who filters the messages but, contents can be inaccurate postings will be maintained for a week or less

Page 13: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.6 IP Phone (1/3)

Circuit-switching for Normal telephone a circuit is set up and maintained until the communication

is finished does not make full use of available bandwidth

conversations have a lot of silent space

IP Phone (also called voice over IP, VoIP) TCP/IP-based packet-switching technology converts analog voice data into digital data breaks into packets

Page 14: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.6 IP Phone (2/3)

A. Advantages Low cost Efficient user of connection

Packets can interleave along a communication line

Fault-tolerantvoice packets could bypass failed portion

Page 15: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.6 IP Phone (3/3)

B. Problems No guarantee of packet delivery

Packets may be damaged but, impossible to re-transmit real-time data

Packets arriving out of sequencePackets may use different routes and arrive out of sequencebut, impossible to re-assemble real-time data

C. Solutions Quality of Service (QoS) field

in each IP packet higher priority for time-sensitive data

Page 16: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.1.7 Videoconferencing8.1.7 Videoconferencing

Videoconferencing meeting of people at different locations using computer networks with visual image and sound

Hardware microphone, speakers and Web cam

Software features transmit video and sound users can write/ view whiteboard notes exchange files share an application

Page 17: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2 Business on the Internet

Electronic commerce (e-Commerce) doing business on the Internet

Three modes of e-commerce: business-to-customer (B2C) business-to-business (B2B) customer-to-customer (C2C).

Page 18: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2 Business on the Internet

8.2.1 Business-to-customer (B2C)

Business-to-customer (B2C) involves an online storefront

a Web site with the following: 1. electronic catalogue

showing the products and price 2. virtual shopping cart

for customers to collect purchasesa set of records storing the product ID, price and quantity

etc. 3. secure Web connection

for financial transaction encryption on customer’s personal and financial datacredit card is widely used in e-commerce for payment

Page 19: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2 Business on the Internet

8.2.2 Business-to-business (B2B)

Business-to-business (B2B) carried out in private networks authentication is required

business partners are given login username and password

transactions may be carried out without human intervention

Page 20: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet8.2 Business on the Internet

8.2.3 Customer-to-customer (C2C)

Customer-to-customer (C2C) involves an online agent Web site

e.g. eBay

customers post their products online for other customers to bid

Page 21: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2 Business on the Internet

8.2.4 Pros and Cons of e-Commerce (1/2)

A. Business

Advantages Disadvantages

• Save the cost in setting up physical stores. No need to pay for rents and sales staff.

• Explore new market worldwide• Can provide latest information on

products and services• Establish corporate image, product

and service brand names through the Internet

• Sales data can produce statistics quickly

• Client’s purchase behaviour can be collected for future promotion

• Web sites must be updated regularly

• Programming staff are needed to maintain the Web sites and meet changes

• Investment on expensive server and high bandwidth communication channels

• Weak customer relationship due to lack of personal contact

Page 22: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2 Business on the Internet

8.2.4 Pros and Cons of e-Commerce (2/2)

B. Customers

Advantages Disadvantages

• Convenient to shop: no need to travel

• Can shop any time: e-stores are open 24 hours a day

• Easy to carry out price comparison

• Cannot see, feel or try the product before purchase

• Cannot easily return items

• Lack of personal contact

• Need to wait for delivery

• May need to pay for delivery cost

Page 23: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2.5 Security of e-commerce

Security is important for e-commerce involves transmission of sensitive data over the Internet company must show its identity

for customers to have confidence

2 major secure transmission: SSL and SET both involve

encryption, and digital certificate

Page 24: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2.5 Security of e-commerce

A. Encryption (1/3)

Encryption converts text data into scrambled characters needs a key to read

Symmetric key encryption encryption and decryption use similar keys

e.g. Shifting letters in message by certain positions

can be cracked easily by analysing the frequency of each letter

The key must be sent in plain text to a new partnereasy for hackers to grab the key

Page 25: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2.5 Security of e-commerce

A. Encryption (2/3)

Public Key Infrastructure (PKI) most secure encryption method involves a pair of keys:

public key • can be known to everyone,

private key• must be kept secret

Data encrypted by one key can only be decrypted by the associated key:Data encrypted by a public key must be decrypted by the

private key, and vice versa

Page 26: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2.5 Security of e-commerce

A. Encryption (3/3)

Page 27: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2.5 Security of e-commerce

B. Integrity and Confidentiality

Integrity ensures that a message is not modified Using PKI, if an encrypted message is modified, it cannot

be decrypted Confidentiality

ensures that the message is protected To send confidential message, encrypt it using the public

key of the recipientonly the private key of the recipient can decrypt the message

Page 28: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2.5 Security of e-commerce

C. SSL (1/3)

Secure Sockets Layer (SSL) ensures secure transmission of data between

a Web site and its clients

using PKI identified by

lock icon in the status bar, or protocol prefix “https”

Page 29: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2.5 Security of e-commerce

C. SSL (2/3)

After connection, the Web site will send its public key to the client’s Web browser Data from the client will be encrypted by the public key

only the company can view the data using its private key Problems of PKI

PKI involves a lot of processing, and data transmitted from the Web site cannot use PKI

because users do not have digital certificate Solution:

After secure connection, the client’s computer will generate a new symmetric key send it to the Web site with encryption using the public key of the

Web site All the subsequent transmissions will use symmetric encryption until

the connection is over

Page 30: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2.5 Security of e-commerce

C. SSL (3/3)

Problem of credit card in e-commerce credit card information of customers are stored in the

company’s database privacy is not fully protected

This problem is solved by SET (see below)

Page 31: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2.5 Security of e-commerce

D. Digital Certificate

Digital certificate provides an identity of an individual/organisation issued by a Certificate Authority (CA)

together with a pair of keys to the applicantHK Post Office issues “e-Cert”

for everyone to query about the identity through the CAobtain the public key

can be viewed by clicking the “locked icon” in the status bar of a Web browser

Page 32: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2.5 Security of e-commerce

E. Digital Signature

Digital signature a portion of a message encrypted by the sender’s private key The receiver can decrypt the data by the sender’s public

key either obtained from CA or included along with the message

Digitally signed document represents non-repudiation e.g. the client cannot deny having confirmed a purchase

Page 33: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2.5 Security of e-commerce

F. SET (1/2)

Secure Electronic Transaction (SET) designed by credit-card firms provides higher security than SSL Both client and company must have their own

digital certificates

data sent is encrypted by both public key of the company , and private key of the client (digital signature)

Page 34: Chapter 8 Activities on the Internet 8.1 Tools and Services on the Internet Tools and Services on the InternetTools and Services on the Internet 8.2Business.

Chapter 8 Activities on the Internet

8.2.5 Security of e-commerce

F. SET (2/2)

Secure Electronic Transaction (SET) (cont’) credit card information are sent to a bank

to avoid abuse of credit card information by companies

Advantages of SET:company can verify customer’s identityfraudulent credit cards cannot be usedcustomers cannot deny having confirmed the purchase