Your SlideShare is downloading. ×
0
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Module9
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Module9

304

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
304
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Company Centric B2B The B2B FieldModule 9-Ghana 2002 Kizuki-AMSCO
  • 2. The Major B2B Models Types of B-Webs Agora Aggregation Value Chain Alliance Distributive NetworksModule 9-Ghana 2002 Kizuki-AMSCO
  • 3. What is a Business Model? A system which defines how a firm will build and use its resources to offer its customers superior value profitably. Business model Customer Value Scope Revenue sources Connected Activities Implementation Capabilities Performance Environment Five Forces Industry Drivers Industry Dynamics MacroModule 9-Ghana 2002 Kizuki-AMSCO
  • 4. How do computers talk? Accomplished through Protocol Stack Protocol-a set of rules of standards that define certain relationships or behaviour. A stack-a layer of layers Internet uses the TCP/IP protocol stack. TCP-Transmission control Protocol IP-Internet ProtocolModule 9-Ghana 2002 Kizuki-AMSCO
  • 5. What are the Protocol Layers?Protocol Layer CommentsApplication protocol Layer Specific to the application such as www and E- mailTransmission Contol Protocol Layer TCP directs packets to a specific location on a computer portInternet Protocol Layer IP directs packet to a specific computer using the IP addressHardware Layer Converts binary packet data to network signals and back. This is done using network cards, modems etc.Module 9-Ghana 2002 Kizuki-AMSCO
  • 6. The Message PathApplication ApplicationTCP TCPIP IPHardware Hardware InternetYour Computer Kizuki-AMSCO Another ComputerModule 9-Ghana 2002
  • 7. The Details The message starts at the top of the protocol stack on your computer and work downwards The message is broken into chucks known as packets. The packets would go through the Application Layer and continue to the TCP layer. Each layer is assigned a port number. We need to know which program needs to recive the message. So the computer listens through the ports to know which program to assigned the message to. After going throuh the TCP layer, the packets proceed to the IP layer. This is where the packets reveived their IP destination address. Now the message has a port number and an IP address. Ready to be sent over the internet. The hardware layer converts the packets into electronic signals and transmitting them over the phone line. On the other end of the phone line, your ISP has direct connection to the internet. The ISP receives the message and routes it to the IP address on you have given. The packets reach the other computer. Here it starts at the bottom and work upwards.Module 9-Ghana 2002 Kizuki-AMSCO
  • 8. Understanding E- Business Technology Networking Infrastructure- What actually makes up the internetModule 9-Ghana 2002 Kizuki-AMSCO
  • 9. The Layout Public Telephone Modem NetworkYour computer Router1.2.3.4 Modem Pool ISP Port Server  ISP-Internet Services Provider  ISP provides services that connects you to the internet.  ISP maintains a pool of modems for their dial in customers  Modem pool managed by a port server which controls the flow of data from the modem pool to the routers  After your packets go through the public phone and through your ISP equipment, they are routed to the ISP backbone OR a backbone that the ISP buys bandwidth from. Module 9-Ghana 2002 Kizuki-AMSCO
  • 10. Internet Infrastructure The Internet backbone is made up of many large networks which interconnet with each other. This larger network is known as Network Services Providers or NSPs Cerfnet, IBM, BBN Planet, SprintNet and PSINet are the well known Each of these is required to connect to three Network Access Points.Module 9-Ghana 2002 Kizuki-AMSCO
  • 11. Internet RoutingHow does the packets find their way across the internet Through a router. A router is usually connected between networks to route packets between then. Each router knows about its subnetwork and which IP addresses they use. When a packet arrives at a router, the router examines the IP address put thier by the originating computer. The router checks its routing table. If the network containing the IP address is found, the packet is sent to that network. If not found, the router sends the packet to a default route.Module 9-Ghana 2002 Kizuki-AMSCO
  • 12. Understanding E- Business Technology Domain Names and Address ResolutionsModule 9-Ghana 2002 Kizuki-AMSCO
  • 13. The Structure Root org net com gov edu NASA NOAA NSF IBM HPModule 9-Ghana 2002 Kizuki-AMSCO
  • 14. The Important Point Domain names reside in a Domain Name Server-DNS DNS assigns an IP address to your domain name.Module 9-Ghana 2002 Kizuki-AMSCO
  • 15. Application ProtocolsHTTP and WWW HTTP-Hyper Text Transfer Protocol. This is the protocol that web browsers and web servers use to comunicate with each other over the internet. Basically its the protocol used to send requests to web elements such as pages and images. When you type url into a web browser, the browser firsts connects to a domain name server and retrieves the corresponding IP address for the web server The web browser connects to the web server and sends an http requests to the desired web page. The web server receives the request and checks for the desired page. If the page exists, the server sends it. If the server cannot find it, it will send an HTTP 404 error message. (404 means Page not found). The web browser recieves the page back and the connection is closed.Module 9-Ghana 2002 Kizuki-AMSCO
  • 16. Application ProtocolsSMTP and Electronic Mail SMTP-Simple Mail Transfer Protocol. This is a text mail protocol for e-mail applications.Module 9-Ghana 2002 Kizuki-AMSCO
  • 17. Wrap Up This is version 4 and it only allows 232 addresses. Eventually, we will run out of IP addresses. Version 6 is currently been testedModule 9-Ghana 2002 Kizuki-AMSCO
  • 18. Resources http://www.ietf.org is the home page of the Internet Engineering Task Force. It has responsibility for the development of internet protocols. http://www.internic.org is the organisation responsible for administering domain names http://www.internetweather.com shows animated maps of internet latencyModule 9-Ghana 2002 Kizuki-AMSCO
  • 19. Module 9-Ghana 2002 Kizuki-AMSCO

×