SlideShare a Scribd company logo
1 of 12
E-Business Infrastructure
SE-413
Week 2
Lecture Outcome
 Define the meaning and scope of e-business and e-commerce and their
different elements.
 Summarize the main reasons for adoption of e-commerce and e-business and
barriers that may restrict adoption
 Outline the ongoing business challenges of managing e-business and e-
commerce in an organization
E-Business Infrastructure
 Refers to the combination of hardware such as servers and client PCs in an
organization, the network used to link this hardware and the software
applications used to deliver services.
 Applications, Operating Systems, Servers and Networking equipment.
Intranet Vs Extranet
 Internal vs Externally Exposed Network
 Advantages:
 Reduced cost
 Safe Distribution of Information
 Better Customer Server
Middleware
 Used to enable two applications that do not support common protocols to
connect to each other.
 Transformation of different data types
 JSON vs XML
 Used in the integration of two or more smaller applications to form a larger
application.
Firewalls
 Used to protect networks from malicious attacks
 Usually deployed at the edge of a network
 Can be software or hardware
 IP Whitelisting
 Categorizing an IP to be trustable to access a resource.
De-Militarized Zone (DMZ)
 Network between Intranet and the Internet
 Hosts servers containing information available to public or Extranet users.
 Sensitive information is kept on Intranet which is separated by a Firewall.
Network Inteconnection
 OSI Layer
 Application
 Presentation
 Session
 Transport
 Network
 Data Link
 Physical
 TCP/IP is the main protocol used for transportation of data
 HTTP - Main application level protocol
Domain Names
 Used to name resources on the internet
 DNS - Domain Name Server
 Reverse-DNS - Resolves IP to Name
 TLD and Subdomain
HTML
 Hypertext Markup Language
 What is Hypertext?
 Text that has a link/reference to other pages or parts of text.
 Structured Language used to create Web pages
 Allows for definition of properties of elements (meta information).
 <bold></bold><italics></italics>
 Largely presentational
XML
 eXtensible Markup Language
 Allows us the ability to provide information about data (meta-data)
 Can be used to define resources
 Server information (url, port)
 Application configuration (database credentials, enable or disable components)
 Database row( <table><row><id>1</id><name>ABC</name></row></table>
 Documents
 contains doctype and xml-stylesheet definition to define document structure
JSON
 JavaScript Object Notation
 A Very popular alternative to XML for defining resources
 Supported by a large number of hardware and software
 Example:
{
"employees":[
{"firstName":"John", "lastName":"Doe"},
{"firstName":"Anna", "lastName":"Smith"},
{"firstName":"Peter", "lastName":"Jones"}
]
}

More Related Content

Similar to Network Fundamentals - Week 2.pptx

Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
ajaymane22
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
reddydivakara
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
webhostingguy
 
DEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this papDEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this pap
LinaCovington707
 
You Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docxYou Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docx
jeffevans62972
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
Vedpal Yadav
 

Similar to Network Fundamentals - Week 2.pptx (20)

Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Networks
Networks Networks
Networks
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Network Information Factories
Network Information FactoriesNetwork Information Factories
Network Information Factories
 
DEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this papDEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this pap
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentals
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
You Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docxYou Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docx
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
network fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxnetwork fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptx
 
Report on intranet
Report on intranetReport on intranet
Report on intranet
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 

Recently uploaded

%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 

Network Fundamentals - Week 2.pptx

  • 2. Lecture Outcome  Define the meaning and scope of e-business and e-commerce and their different elements.  Summarize the main reasons for adoption of e-commerce and e-business and barriers that may restrict adoption  Outline the ongoing business challenges of managing e-business and e- commerce in an organization
  • 3. E-Business Infrastructure  Refers to the combination of hardware such as servers and client PCs in an organization, the network used to link this hardware and the software applications used to deliver services.  Applications, Operating Systems, Servers and Networking equipment.
  • 4. Intranet Vs Extranet  Internal vs Externally Exposed Network  Advantages:  Reduced cost  Safe Distribution of Information  Better Customer Server
  • 5. Middleware  Used to enable two applications that do not support common protocols to connect to each other.  Transformation of different data types  JSON vs XML  Used in the integration of two or more smaller applications to form a larger application.
  • 6. Firewalls  Used to protect networks from malicious attacks  Usually deployed at the edge of a network  Can be software or hardware  IP Whitelisting  Categorizing an IP to be trustable to access a resource.
  • 7. De-Militarized Zone (DMZ)  Network between Intranet and the Internet  Hosts servers containing information available to public or Extranet users.  Sensitive information is kept on Intranet which is separated by a Firewall.
  • 8. Network Inteconnection  OSI Layer  Application  Presentation  Session  Transport  Network  Data Link  Physical  TCP/IP is the main protocol used for transportation of data  HTTP - Main application level protocol
  • 9. Domain Names  Used to name resources on the internet  DNS - Domain Name Server  Reverse-DNS - Resolves IP to Name  TLD and Subdomain
  • 10. HTML  Hypertext Markup Language  What is Hypertext?  Text that has a link/reference to other pages or parts of text.  Structured Language used to create Web pages  Allows for definition of properties of elements (meta information).  <bold></bold><italics></italics>  Largely presentational
  • 11. XML  eXtensible Markup Language  Allows us the ability to provide information about data (meta-data)  Can be used to define resources  Server information (url, port)  Application configuration (database credentials, enable or disable components)  Database row( <table><row><id>1</id><name>ABC</name></row></table>  Documents  contains doctype and xml-stylesheet definition to define document structure
  • 12. JSON  JavaScript Object Notation  A Very popular alternative to XML for defining resources  Supported by a large number of hardware and software  Example: { "employees":[ {"firstName":"John", "lastName":"Doe"}, {"firstName":"Anna", "lastName":"Smith"}, {"firstName":"Peter", "lastName":"Jones"} ] }