SlideShare a Scribd company logo
1 of 58
NCCTCentre
for Advanced Technology
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SOFTWARE DEVELOPMENT * EMBEDDED SYSTEMS
#109, 2nd Floor, Bombay Flats, Nungambakkam High Road,
Nungambakkam, Chennai - 600 034.
Phone - 044 - 2823 5816, 98412 32310
E-Mail: ncct@eth.net, esskayn@eth.net, URL: ncctchennai.com
Dedicated to Commitments, Committed to
Technologies
WEB
TECHNOLOGIES
AND TRENDS
NCCT
Where Technology and Solutions Meet
INTRODUCTION
The purpose is to make a
technical presentation on
E-Commerce, Web
Technologies, Trends and
Applications
NCCT
About NCCT
 NCCT is a leading IT organization backed by a
strong R & D, concentrating on Software
Applications, Web related Products, Electronics
product development.
 The major activities of NCCT include Hardware
Design, Development, Implementation and related
activities
NCCT
INTRODUCTION
Three landmark events changed
the world of COMMERCE forever
In 1769…through Watts’ development of the
steam engine - COMMERCE GOT POWER!
In 1858…through the laying of the Transatlantic
cable - COMMERCE GOT CONNECTED!
In 1985…through the assignment of
the first .com name on the Internet
COMMERCE GOT SMART!
Over 100 years ago a
technology convergence
fueled a new economy
STEAM
POWER
MECHANICAL
ENGINEERING
MATERIAL
SCIENCES
The resulting Industrial Economy defined
the business landscape for the 20th
century
Today, another
technology
convergence is fueling
a new economy
Computing
Technologie
s
Communicati
on
Technologies
Content
Technologi
es
The resulting eEconomy is defining
the business landscape for the 21st
century
For Business: Greater competitive intensity,
new entrants and value propositions.
For Government: New demands, new
services, new partners, organizational
transformation and a revolutionary
decentralization of power and decision making
eEconomy … the broad business environment in
which global commerce is conducted.
eEconomy
eCommerce … the conduct of business among
eEnterprises and consumers with an alignment of
people, processes and technology with eCommerce
enlightened strategic intent.
eCommerce
eEnterprise … a business or
government enterprise with the capability to
exchange value (money, goods, services
and information) electronically.
eEnterpris
e
The eEconomy creates the
context for a dramatic
change in the way business
is conducted
In the 21st
century…
eEnterprises will conduct
eCommerce in the eEconomy
WHAT IS THE INTERNET?
• The internet is a collection of wires, protocols and hardware that
allows the electronic transmission of data over TCP/IP
• Any data can be transferred over the net, e.g., email, faxes, video,
voice & web pages
• Technically www (web) and the net are not the same. The web is
an application for the net
INTERNET ARCHITECTURE
• A collection of networks, 2 networks can only be connected by a
computer that is connected to both of them. This machine is a
router.
• Routers use the destination network address not the destination
host address when routing a packet.
• The amount of info a router needs to store is proportional to the #
of nets not hosts.
HOW THE INTERNET WORKS
CHARACTERISTICS THAT ALLOW SHARED
ACCESS OF DATA IN A NETWORK
• Unique identification of each computer on the network - Internet is a
network of millions of computers and thousands of networks intertwined
together. Thus it was important that each computer can be uniquely
identified by assigning a specific Internet Protocol(IP) address.
e.g.,198.108.95.145
• Human-friendly addressing - Domain Name System(DNS) gave each
computer on the network an address comprising an easily recognizable
letters and words instead of an IP address; e.g., www.yahoo.com
• Packet Switching - To remedy delays associated with unequally sized data
transfers, instead of transferring files in their entirety, whole files are
broken up into data packets before being transferred over the network.
• Routing - Routers are dedicated, special-purpose computers which serve
as an intermediary between networks. They route packets efficiently
through networks. Routers are building blocks of the internet.
NETWORKING SOFTWARE
• The two most well-known pieces of internetworking software are the TCP
and IP
• IP software set rules of data transfer over the network
• TCP software ensures the safe and reliable transfer of data
• With open system nature of TCP/IP development, software development
and computer companies could more easily build TCP/IP compliant
software and hardware
• TCP/IP standard network protocol laid the groundwork that enabled the
deep internetworking that made internet possible
• Reliability and Transmission control Protocol - IP software handles
packet deliveries and TCP handles safe delivery of packages.
• Standardization - Without the TCP/IP standardization, there would have
been many negative tradeoffs, such as inflexibility and increased functional
and switching costs.
HOW THE INTERNET WORKS
CHARACTERISTICS THAT ALLOW SHARED
ACCESS OF DATA IN A NETWORK
WEB SITE BASICS
•WEB SERVER
– Software, Hardware, Network
•CONTENT
– Keeping it current
•DESIGN
•IDENTITY NCCT
PIECING TOGETHER
A WEB SITE
ADVANTAGES OF USING WEB
• Automated content
– CGI, Servlets, etc., Persistent data interface, cookies
• Interactive components
– Allow the users to respond
• Push technology
– Mailing lists, Channels
INTERACTION & AUTOMATION
SEARCH & STRUCTURE
• Search facility for site
• Site maps - auto-generated
• Site templates/structure
– CGI, Imagemaps, Stylesheets
ADVANTAGES OF USING WEB
COMMERCE & ADVERTISING
• Commerce server
– Shopping carts, Stateful sessions
– Security/Encryption, Payment
• Ad Servers
• Marketing
– attract customer attention, build customer loyalty
• Direct Sales
– global, 7x24
• Advertising Revenue
• Reduced Support Costs
ELECTRONIC
COMMERCE
(E-COMMERCE)
• Commerce is fundamentally based on Trust
• Commerce refers to all the activities the purchase and
sales of goods or services.
– Marketing, sales, payment, fulfillment, customer
service
• Electronic commerce is doing commerce with the use
of computers, networks and commerce-enabled
software (more than just online shopping)
• E-Commerce involves the translation of protocols, that
have evolved over the millenia, into the Electronic
environment
E-COMMERCE BRIEF HISTORY
• 1970s: Electronic Funds Transfer (EFT)
– Used by the banking industry to exchange account
information over secured networks
• Late 1970s and early 1980s: Electronic Data
Interchange (EDI) for e-commerce within companies
– Used by businesses to transmit data from one business to
another
• 1990s: the World Wide Web on the Internet provides
easy-to-use technology for information publishing
and dissemination
– Cheaper to do business (economies of scale)
– Enable diverse business activities (economies of scope)
ECOMMERCE
INFRASTRUCTURE
• INFORMATION SUPERHIGHWAY INFRASTRUCTURE
– Internet, LAN, WAN, routers, etc.
– telecom, cable TV, wireless, etc.
• THE WORLD WIDE WEB - WWW, MESSAGING AND INFORMATION
DISTRIBUTION INFRASTRUCTURE
– Part of the Internet and allows users to share information with an
easy-to-use interface
– HTML, XML, e-mail, HTTP, Web browsers, etc.
• COMMON BUSINESS INFRASTRUCTURE
– Security, authentication, electronic payment, directories, catalogs, etc.
• WEB ARCHITECTURE
– Client/server model
– N-tier architecture; e.g., web servers, application servers, database
servers, scalability
THE MAIN ELEMENTS OF
E-COMMERCE
• Consumer shopping on the Web, called B2C
(business to consumer)
• Transactions conducted between businesses on
the Web, call B2B (business to business)
• Transactions and business processes that support
selling and purchasing activities on the Web
– Supplier, inventory, distribution, payment management
– Financial management, purchasing products and
information
WEB-BASED E-COMMERCE
ARCHITECTURE
CLIENT
Tier 1
WEB
SERVER
Tier 3Tier 2 Tier N
APPLICATION
SERVER
DATABASE
SERVER
DMS
NCCT
ADVANTAGES OF
ELECTRONIC COMMERCE
• Increased sales
– Reach narrow market segments in geographically
dispersed locations
– Create virtual communities
• Decreased costs
– Handling of sales inquiries
– Providing price quotes
– Determining product availability
• Being in the space
THE PROCESS OF
E-COMMERCE
• ATTRACT CUSTOMERS
– Advertising, marketing
• INTERACT WITH CUSTOMERS
– Catalog, negotiation
• HANDLE AND MANAGE ORDERS
– Order capture
– Payment
– Transaction
– Fulfillment (physical good, service good, digital good)
• REACT TO CUSTOMER INQUIRIES
– Customer service
– Order tracking
ELECTRONIC COMMERCE
• BUSINESS-TO-CONSUMER (B2C)
• BUSINESS-TO-BUSINESS (B2B)
• CONSUMER-TO-CONSUMER (C2C):
Individuals use Web for private sales or
exchange
*
NCCT
ELECTRONIC COMMERCE
BUSINESS - TO - CONSUMER
• WEB SITES: Provide information on
products, services, prices, orders
• CUSTOMER-CENTERED RETAILING:
Closer, yet more cost-effective
relationship with customers
• INFORMATION BROKERS:
Comparison shops to customer’s
requirements, reintermediation
ELECTRONIC COMMERCE
BUSINESS-TO-BUSINESS
• Automation of purchase, sale transactions from
business to business
• Provides alternative sources
• ELECTRONIC HUBS: online marketplaces, point-to-
point connections, integrated information
• EXCHANGES: commercial on-line market, many
buyers, sellers
• Potential for integrating product information
• Provides service, value
Consumer to Consumer
(C2C)
Customer(s)
Commercial
web site
(e.g.,
bazee.com)
gets small %
seller
Places items for
sale on web site
Pay electronically
or via plastic
Send item(s) to customer(s)
Via Courier
Business to Consumer
(B2C)
Electronic
catalog on
company web
site or host
Customer(s)
Credit card
Debit card
E-check
online
off line
company
Processes
payment
In-house
processing
3rd
party
processor
Ships goods
directly or via 3rd
party shipper
Order
Proc’g/
Whse.
Business to Business (B2B)
Manufacturer’s catalog
on company Web Site or
host / Auction (B2B) Web
site (buyer’s or 3rd
party)
buyer
seller (manufacturer)
E-check, Check, Credit card, P-card, EFT
Processes electronically
Schedules order/ships
Observes credit terms
Settles payment
-----------------------
Could be 3rd
party (OS) or
in-house system or both
goods
delivered
Orders and pays
electronically / Accepts bid
and pays electronically
Customer
Browser
Merchant
Website
Payment
Gateway
Bank Switch
Shop Pay Card
Details
Visa
Mastercard
American
Express
Bank HostATM POS
AuthAuth
End of business day settlement
Transaction Flow - Buying Scenario
• Customer shops
• Clicks on Pay
• Enters Card details
Shipm
ent
E-COMMERCE SERVICES
• Personalization and Membership
• Merchandising Database
• Merchandise Search
• Shopping Cart
• Shipping & Handling
• Tax Services
• Payment Solutions
• Site Security
• Order Processing
• Chat & Mail NCCT
E-COMMERCE APPLICATIONS
MODULAR SOLUTIONS
• Financial Accounting & Costing
(FI&CO)
• Supply / Vendor Chain
Management (SCM)
• Customer Relationship
Management (CRM)
• Chat & Mail
• Customer Care/Call Center
• Human Resource Management
& Payroll (HRM)
• Inventory & Logistics (I&L)
• Advertisement Management
(AM)
• Security & Protection Solutions
(S&P)
• Industry Vertical Solutions (IV)
• Connectivity Solutions (CS)
• Video on demand
• Remote banking
• Procurement and purchasing
• Online marketing and
advertisement
• Home shopping
• Auctions
FUNCTIONAL APPLICATIONS
• FINANCE & ACCOUNTING
– GENERAL LEDGER REPORTING
– PROJECT COSTING
– ANNUAL REPORTS
– BUDGETING
• HUMAN RESOURCES
– CORPORATE POLICIES
– EMPLOYEE SAVINGS PLANS
– BENEFITS ENROLLMENT
– ON-LINE TRAINING
– JOB POSTING
• SALES & MARKETING
– COMPETITOR ANALYSIS
– PRICE UPDATES
– PROMOTIONAL CAMPAIGNS
– SALES PRESENTATIONS
– SALES CONTRACTS
• MANUFACTURING &
PRODUCTION
– QUALITY MEASUREMENTS
– MAINTENANCE SCHEDULES
– DESIGN SPECIFICATIONS
– MACHINE OUTPUT
– ORDER TRACKING
E-COMMERCE
TECHNOLOGIES
• Internet
• Mobile technologies
• Web architecture
• Component
programming
• Data exchange
• Multimedia
• Search engines
• Data mining
• Intelligent agents
• Access security
• Cryptographic security
• SSL, SET
• Watermarking
• Payment systems
NCCT
SYSTEM DESIGN ISSUES
• GOOD ARCHITECTURAL PROPERTIES
– Functional separation
– Performance (load balancing, web caching)
– Secure
– Reliable
– Available
– Scalable
CREATING AND MANAGING CONTENT
• What the customer see
• Static vs. dynamic content
• Different faces for different users
• Tools for creating content
• Multimedia presentation
• Integration with other
media
• Data interchange
• HTML, XML (Extensible
Markup Language)
Projects @ NCCT
SAMPLE PROJECTS @ NCCT
E-SECURE TRANSACTIONS
WIRELSS HEART BEAT RATE MONITOR
WITH WAP MESSENGER
• What?: Provide security information and consultation to assess
corporate security risks and implementation.
• Why?: way to provide security assessment and project mgmt
between multiple corps and the customer and news links; Corp: save
in loss of data and provide security to customers to build customer
confidence
• How?: Security Engine: rank existing security; allows customers to
assess existing level of security with evaluation and Q&A
• Differentiators: (1) customized security needs programs via Internet;
(2) provides incentives: alternatives in security via cost reports
balance
E-SECURE - BUSINESS CONCEPT
The e-secure key to
securing
information
Matching security
needs to business
Server
Server’s public key
E-SECURE
BUSINESS MODEL–CONSULTING & PARTNERSHIPS
Banking &
Financial institutions
Security
Seekers
Security
Providers
Capital, Space, Admin. Support,
Sales, Marketing,
Corporations with
Security solutions
Service providers
&
manufacturers
Build a level of security management integration and confidence to the seekers
Security
companies
System
integrators
Profit 35%online pm, 10% on
site pm, 5% Streaming
presentations
Adds value
Builds security knowledge, management
And partnerships with security companies
Government &
educational
institutions
E-Secure
Security Need Engine,
Streaming video training
Project management
INTRODUCTION
 Security System
 Algorithms
NCCT
• SECURITY - The man who looks for security, even in the
mind, is like a man who would chop off his limbs in order to
have artificial ones which will give him no pain or trouble.
• Henry Miller (1891–1980), Sexus, ch. 14 (1949).
FUNDAMENTAL ISSUES
• Secure communication
over insecure channel
• Privacy
• Agreement/Commitment
• Right to access
• Security
• Protocols
• Encryption
• Zero Knowledge Proof
• Digital signature, digital
time stamp
• Identification/
authentication
• Firewall
• SSL, SET
Enabling Technologies
Protocols & Practices
• Protocols
– SET (Secure Electronic Transactions- S-HTTP)
– SSL (Secure Sockets Layer- HTTPS)
• Practices
– Dual Signatures
– Digital Signatures
– Certificate Trust Train
SSL
Secure Socket Layer
• SSL is a standard that encrypts data sent between you and a
web server
• When connecting, the client requests a certificate from the
server. This is sent, which confirms that you really are talking to
the server that you think you are
Web ServerYOU
Data contained in packets is encrypted; no one but you
and the web server can read the traffic
SET COMPONENTS
• Wallet - performs cardholders’ authentication
• Merchant Server - authenticates merchant
and its accepted payment brand
• Payment Gateway - processes payments and
authorizations
• Certificate Authority - manages certificates
for wallets and merchants; allows for branding
FEATURE
SET SSL
Secure Transmission of Data Yes Yes
Identify Authorized Purchasers Yes No
Verify Validity of Account Yes No
Identify Legitimate of Payment
Brand for Merchants Yes No
Track Sales Slips and Totals Yes No
Enabling Technologies
Set vs. SSL
CRYPTOGRAPHY
• Cryptographic software transforms plain text messages into
something no one without a key or secret knowledge can
easily read
• The most basic form of this is simple substitutions; one
letter is replaced by another letter wherever it appears
• But this is very easy to break, so more sophisticated
algorithms are used to encrypt messages
• Cryptography: Techniques, Protocols, and Applications
using the existence of difficult problems
• Cryptanalysis: How to compromise cryptographic protocols
and techniques
DIGITAL SIGNATURES
• This is used to confirm that data has not been changed by anyone other
than the person who created and signed it.
• Example: Suja sends a document to Prema. Kumar intercepts the
message during transmission and changes it. Prema receives a doctored
document. Or Kumar could send a message to Prema and claim it was
from Suja.
• To prevent this we can use digital signatures. Generally this is done by
using a hash function to generate a “fingerprint” of the data. Any change
to the data will change the fingerprint.
• The “fingerprint” is encrypted using the sender’s private key and attached
to the document
• The receiver can decrypt the “fingerprint” using the sender’s public key,
then see if it matches the fingerprint of the received document
• This ensures that the data has not changed since the sender signed it,
and confirms that the sender signed it (since only he has the private key.)
FIREWALLS
• What is a firewall?
– A firewall is any mechanism that acts to
restrict access to a network according to a
set of defined rules.
– Function as “front doors” to a network.
• There are 2 Basic approaches to
implementing rule sets on your firewall
– Block all and Allow
– Allow all and Block
PUBLIC KEY CRYPTOGRAPHY
• Most systems on the internet use public key
cryptography.
• This uses two keys: a public key, which is
available to anyone; and a private key, which
is secret and known only to the user
• The most popular variation on this concept is
RSA (Rivest-Shamir-Adleman), named for the
three who invented it
RSA
• RSA works by using a mathematical function that is (comparatively)
easy to compute while encrypting, but very difficult to reverse without
knowing the private key. See handout for gory details.
• RSA works by selecting two large prime numbers and doing some semi-
fancy math. One of the prime numbers and the product of the two prime
numbers is the public key; the other prime number and their product is
the private key
• The security of the system depends on it being difficult to efficiently
factor large numbers. There’s been a lot of research in the area by a lot
of smart people, and no one has come up with an algorithmically good
solution.
• The only engineering solution is to throw more resources at brute force
approaches, but this is not very practical for large key sizes, since the
computations required increase exponentially with key size.
EXAMPLES
MODERN APPLICATIONS
• Electronic Commerce
– Online Banking, Online Shopping
• Internet Security
– Secure emails, Remote access of applications
• The military
– secure communication
• The internet
– secure communication, authentication, on-line
shopping, emails
• Election
SECURE COMMUNICATION
Sender Receiver
Insecure Channel
Hacker
M M
Encryption
C = E(M)
Decryption
M = D(C)C
SENDING ENCRYPTED MESSAGES
• To send to someone, the message is
encrypted with the public key.
• It can only be decrypted by the private key.
Message
Public
Key
Encrypted
Text
Web
Site
Plain
Text
Private
Key
I
N
T
E
R
N
E
T
Projects @
NCCT
Redefining the
Learning
Specialization, Design,
Development and
Implementation with Projects
Experience the learning with the latest
new tools and technologies…
Projects @
NCCT
Project Specialization Concept
• NCCT, in consultation with Export-Software Division, offers Live
Software Applications, System, Electronics related Projects to
experience the learning with the latest new tools and
technologies
• NCCT believes in specialized Hardware Design, development training
and implementation with an emphasis on development principles and
standards
• NCCT plays a dual positive role by satisfying your academic
requirements as well as giving the necessary training in electronics
and embedded product development
Projects @ NCCT
WE ARE OFFERING PROJECTS FOR THE
FOLLOWING DISCIPLINES
• COMPUTER SCIENCE AND ENGINEERING
• INFORMATION TECHNOLOGY
• ELECTRONICS AND COMMUNICATION ENGINEERING
• ELECTRICAL AND ELECTRONICS ENGINEERING
• ELECTRONICS AND INSTRUMENTATION
• MECHANICAL AND MECHATRONICS
Projects @ NCCT
PROJECTS IN THE AREAS OF
• System Software Development
• Application Software Development, Porting
• Networking & Communication related
• Data Mining, Neural Networks, Fuzzy Logic, AI based
• Bio Medical related
• Web & Internet related
• Embedded Systems - Microcontrollers, VLSI, DSP, RTOS
• WAP, Web enabled Internet Applications
• UNIX  LINUX based Projects
Placements @ NCCT
NCCT has an enormous placement wing, which enrolls all candidates in its
placement bank, and will keep in constant touch with various IT related industries in
India / Abroad, who are in need of computer trained quality manpower
Each candidate goes through complete pre-placement session before placement
made by NCCT
The placement division also helps students in getting projects and organize guest
lectures, group discussions, soft learning skills, mock interviews, personality
development skills, easy learning skills, technical discussions, student meetings, etc.,
For every student we communicate the IT organizations, with the following
documents
* Curriculum highlighting the skills
* A brief write up of the software knowledge acquired at NCCT, syllabus
taught at NCCT
* Projects and Specialization work done at NCCT
* Additional skills learnt
NCCT
THE FOLLOWING SKILL SET IS
SECURE
Software
Applications
C, C++, Visual C++, ASP, XML, EJB
Embedded
Technologies
Embedded Systems, PLC
Other Areas VLSI, ULSI, DSP, Bio Informatics & Technology
Emerging
Technologies
WAP, Remote Computing, Wireless
Communications, VoIP, Bluetooth in Embedded,
LINUX based applications
Ever green
technologies
UNIX, C
NCCT
Quality is Our Responsibility
Dedicated to Commitments and
Committed to Technology

More Related Content

Viewers also liked

Trabajo redes edward
Trabajo redes edwardTrabajo redes edward
Trabajo redes edwardEd Alter
 
Avenova News Booklet
Avenova News BookletAvenova News Booklet
Avenova News BookletTim Ray
 
La familia-un-reto-de-champions
La familia-un-reto-de-championsLa familia-un-reto-de-champions
La familia-un-reto-de-championsOsvaldo Cortes
 
Tn20 30 Nav Ug Es
Tn20 30 Nav Ug EsTn20 30 Nav Ug Es
Tn20 30 Nav Ug EsTecnomania
 
Choosing a Cloud Provider: Public-Private-Hybrid
Choosing a Cloud Provider: Public-Private-HybridChoosing a Cloud Provider: Public-Private-Hybrid
Choosing a Cloud Provider: Public-Private-HybridRobert Starmer
 
Charla Web comic, cómo publicar en internet
Charla Web comic, cómo publicar en internetCharla Web comic, cómo publicar en internet
Charla Web comic, cómo publicar en internetIván Guevara Ortega
 
Pacto por la educación desde las bases: del restyling a la cultura 15-M en ed...
Pacto por la educación desde las bases: del restyling a la cultura 15-M en ed...Pacto por la educación desde las bases: del restyling a la cultura 15-M en ed...
Pacto por la educación desde las bases: del restyling a la cultura 15-M en ed...Fernando Trujillo Sáez
 
Nokia lumia-920-yellow-unlocked-quadband-windows-phone-8 brochure-33174
Nokia lumia-920-yellow-unlocked-quadband-windows-phone-8 brochure-33174Nokia lumia-920-yellow-unlocked-quadband-windows-phone-8 brochure-33174
Nokia lumia-920-yellow-unlocked-quadband-windows-phone-8 brochure-33174Simon Thomas
 
100 Jahre Allergen-Immuntherapie - Die Entdeckung der Allergie (Teil1)
100 Jahre Allergen-Immuntherapie - Die Entdeckung der Allergie (Teil1)100 Jahre Allergen-Immuntherapie - Die Entdeckung der Allergie (Teil1)
100 Jahre Allergen-Immuntherapie - Die Entdeckung der Allergie (Teil1)Allergie-frei-leben
 
T220 промывка радиатора radiator flush 400мл
T220 промывка радиатора radiator flush 400млT220 промывка радиатора radiator flush 400мл
T220 промывка радиатора radiator flush 400млK2Car Russian
 
Texto de introducción al cad cam
Texto de introducción al cad camTexto de introducción al cad cam
Texto de introducción al cad camepnmecanica
 
Presentacion de negocio
Presentacion de negocioPresentacion de negocio
Presentacion de negocioTeresa Gauto
 

Viewers also liked (17)

Trabajo redes edward
Trabajo redes edwardTrabajo redes edward
Trabajo redes edward
 
Avenova News Booklet
Avenova News BookletAvenova News Booklet
Avenova News Booklet
 
La familia-un-reto-de-champions
La familia-un-reto-de-championsLa familia-un-reto-de-champions
La familia-un-reto-de-champions
 
Tn20 30 Nav Ug Es
Tn20 30 Nav Ug EsTn20 30 Nav Ug Es
Tn20 30 Nav Ug Es
 
ITIL and Social Media
ITIL and Social MediaITIL and Social Media
ITIL and Social Media
 
Eagle Vision Kabul Afgh
Eagle Vision  Kabul AfghEagle Vision  Kabul Afgh
Eagle Vision Kabul Afgh
 
Choosing a Cloud Provider: Public-Private-Hybrid
Choosing a Cloud Provider: Public-Private-HybridChoosing a Cloud Provider: Public-Private-Hybrid
Choosing a Cloud Provider: Public-Private-Hybrid
 
Charla Web comic, cómo publicar en internet
Charla Web comic, cómo publicar en internetCharla Web comic, cómo publicar en internet
Charla Web comic, cómo publicar en internet
 
Pacto por la educación desde las bases: del restyling a la cultura 15-M en ed...
Pacto por la educación desde las bases: del restyling a la cultura 15-M en ed...Pacto por la educación desde las bases: del restyling a la cultura 15-M en ed...
Pacto por la educación desde las bases: del restyling a la cultura 15-M en ed...
 
Open Reiju
Open ReijuOpen Reiju
Open Reiju
 
Deep web
Deep webDeep web
Deep web
 
Nokia lumia-920-yellow-unlocked-quadband-windows-phone-8 brochure-33174
Nokia lumia-920-yellow-unlocked-quadband-windows-phone-8 brochure-33174Nokia lumia-920-yellow-unlocked-quadband-windows-phone-8 brochure-33174
Nokia lumia-920-yellow-unlocked-quadband-windows-phone-8 brochure-33174
 
100 Jahre Allergen-Immuntherapie - Die Entdeckung der Allergie (Teil1)
100 Jahre Allergen-Immuntherapie - Die Entdeckung der Allergie (Teil1)100 Jahre Allergen-Immuntherapie - Die Entdeckung der Allergie (Teil1)
100 Jahre Allergen-Immuntherapie - Die Entdeckung der Allergie (Teil1)
 
T220 промывка радиатора radiator flush 400мл
T220 промывка радиатора radiator flush 400млT220 промывка радиатора radiator flush 400мл
T220 промывка радиатора radiator flush 400мл
 
Texto de introducción al cad cam
Texto de introducción al cad camTexto de introducción al cad cam
Texto de introducción al cad cam
 
Presentacion de negocio
Presentacion de negocioPresentacion de negocio
Presentacion de negocio
 
Románico
RománicoRománico
Románico
 

Similar to E Commerce 1

Similar to E Commerce 1 (20)

E-business
E-businessE-business
E-business
 
Chapter 6 telecommunications and networks
Chapter 6  telecommunications and networksChapter 6  telecommunications and networks
Chapter 6 telecommunications and networks
 
E commerce
E commerceE commerce
E commerce
 
E manufacturing
E manufacturingE manufacturing
E manufacturing
 
Traditional vs e business
Traditional vs e businessTraditional vs e business
Traditional vs e business
 
The internet & the new information technology infrastructure
The internet & the new information technology infrastructureThe internet & the new information technology infrastructure
The internet & the new information technology infrastructure
 
E.commerce Basics
E.commerce BasicsE.commerce Basics
E.commerce Basics
 
E commerce
E commerce E commerce
E commerce
 
Data analysis telecommunications the int
Data analysis telecommunications the intData analysis telecommunications the int
Data analysis telecommunications the int
 
Introduction to e commerce
Introduction to e commerceIntroduction to e commerce
Introduction to e commerce
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructure
 
Unit Iv
Unit IvUnit Iv
Unit Iv
 
E commerce 5_units_notes
E commerce 5_units_notesE commerce 5_units_notes
E commerce 5_units_notes
 
Edi
EdiEdi
Edi
 
Modes of the business
Modes of the businessModes of the business
Modes of the business
 
CS7330 - Electronic Commerce - lecture (2)
CS7330 - Electronic Commerce - lecture (2)CS7330 - Electronic Commerce - lecture (2)
CS7330 - Electronic Commerce - lecture (2)
 
IT8005_EC_Unit_I.ppt
IT8005_EC_Unit_I.pptIT8005_EC_Unit_I.ppt
IT8005_EC_Unit_I.ppt
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online banking
 
What is e business
What is e businessWhat is e business
What is e business
 
IT_8005_Electronic Commerce_Unit_I
IT_8005_Electronic Commerce_Unit_IIT_8005_Electronic Commerce_Unit_I
IT_8005_Electronic Commerce_Unit_I
 

More from ncct

Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological SignalsBiomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological Signalsncct
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...ncct
 
Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Boxncct
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspectorncct
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...ncct
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detectorncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protectionncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammerncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projectsncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects Bncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S Pncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C Tncct
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projectsncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computingncct
 

More from ncct (20)

Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological SignalsBiomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
 
Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Box
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspector
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

E Commerce 1

  • 1. NCCTCentre for Advanced Technology ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ SOFTWARE DEVELOPMENT * EMBEDDED SYSTEMS #109, 2nd Floor, Bombay Flats, Nungambakkam High Road, Nungambakkam, Chennai - 600 034. Phone - 044 - 2823 5816, 98412 32310 E-Mail: ncct@eth.net, esskayn@eth.net, URL: ncctchennai.com Dedicated to Commitments, Committed to Technologies
  • 3. INTRODUCTION The purpose is to make a technical presentation on E-Commerce, Web Technologies, Trends and Applications NCCT
  • 4. About NCCT  NCCT is a leading IT organization backed by a strong R & D, concentrating on Software Applications, Web related Products, Electronics product development.  The major activities of NCCT include Hardware Design, Development, Implementation and related activities NCCT
  • 5. INTRODUCTION Three landmark events changed the world of COMMERCE forever In 1769…through Watts’ development of the steam engine - COMMERCE GOT POWER! In 1858…through the laying of the Transatlantic cable - COMMERCE GOT CONNECTED! In 1985…through the assignment of the first .com name on the Internet COMMERCE GOT SMART!
  • 6. Over 100 years ago a technology convergence fueled a new economy STEAM POWER MECHANICAL ENGINEERING MATERIAL SCIENCES The resulting Industrial Economy defined the business landscape for the 20th century
  • 7. Today, another technology convergence is fueling a new economy Computing Technologie s Communicati on Technologies Content Technologi es The resulting eEconomy is defining the business landscape for the 21st century For Business: Greater competitive intensity, new entrants and value propositions. For Government: New demands, new services, new partners, organizational transformation and a revolutionary decentralization of power and decision making
  • 8. eEconomy … the broad business environment in which global commerce is conducted. eEconomy eCommerce … the conduct of business among eEnterprises and consumers with an alignment of people, processes and technology with eCommerce enlightened strategic intent. eCommerce eEnterprise … a business or government enterprise with the capability to exchange value (money, goods, services and information) electronically. eEnterpris e The eEconomy creates the context for a dramatic change in the way business is conducted In the 21st century… eEnterprises will conduct eCommerce in the eEconomy
  • 9. WHAT IS THE INTERNET? • The internet is a collection of wires, protocols and hardware that allows the electronic transmission of data over TCP/IP • Any data can be transferred over the net, e.g., email, faxes, video, voice & web pages • Technically www (web) and the net are not the same. The web is an application for the net INTERNET ARCHITECTURE • A collection of networks, 2 networks can only be connected by a computer that is connected to both of them. This machine is a router. • Routers use the destination network address not the destination host address when routing a packet. • The amount of info a router needs to store is proportional to the # of nets not hosts.
  • 10. HOW THE INTERNET WORKS CHARACTERISTICS THAT ALLOW SHARED ACCESS OF DATA IN A NETWORK • Unique identification of each computer on the network - Internet is a network of millions of computers and thousands of networks intertwined together. Thus it was important that each computer can be uniquely identified by assigning a specific Internet Protocol(IP) address. e.g.,198.108.95.145 • Human-friendly addressing - Domain Name System(DNS) gave each computer on the network an address comprising an easily recognizable letters and words instead of an IP address; e.g., www.yahoo.com • Packet Switching - To remedy delays associated with unequally sized data transfers, instead of transferring files in their entirety, whole files are broken up into data packets before being transferred over the network. • Routing - Routers are dedicated, special-purpose computers which serve as an intermediary between networks. They route packets efficiently through networks. Routers are building blocks of the internet.
  • 11. NETWORKING SOFTWARE • The two most well-known pieces of internetworking software are the TCP and IP • IP software set rules of data transfer over the network • TCP software ensures the safe and reliable transfer of data • With open system nature of TCP/IP development, software development and computer companies could more easily build TCP/IP compliant software and hardware • TCP/IP standard network protocol laid the groundwork that enabled the deep internetworking that made internet possible • Reliability and Transmission control Protocol - IP software handles packet deliveries and TCP handles safe delivery of packages. • Standardization - Without the TCP/IP standardization, there would have been many negative tradeoffs, such as inflexibility and increased functional and switching costs. HOW THE INTERNET WORKS CHARACTERISTICS THAT ALLOW SHARED ACCESS OF DATA IN A NETWORK
  • 12. WEB SITE BASICS •WEB SERVER – Software, Hardware, Network •CONTENT – Keeping it current •DESIGN •IDENTITY NCCT
  • 14. ADVANTAGES OF USING WEB • Automated content – CGI, Servlets, etc., Persistent data interface, cookies • Interactive components – Allow the users to respond • Push technology – Mailing lists, Channels INTERACTION & AUTOMATION SEARCH & STRUCTURE • Search facility for site • Site maps - auto-generated • Site templates/structure – CGI, Imagemaps, Stylesheets
  • 15. ADVANTAGES OF USING WEB COMMERCE & ADVERTISING • Commerce server – Shopping carts, Stateful sessions – Security/Encryption, Payment • Ad Servers • Marketing – attract customer attention, build customer loyalty • Direct Sales – global, 7x24 • Advertising Revenue • Reduced Support Costs
  • 16. ELECTRONIC COMMERCE (E-COMMERCE) • Commerce is fundamentally based on Trust • Commerce refers to all the activities the purchase and sales of goods or services. – Marketing, sales, payment, fulfillment, customer service • Electronic commerce is doing commerce with the use of computers, networks and commerce-enabled software (more than just online shopping) • E-Commerce involves the translation of protocols, that have evolved over the millenia, into the Electronic environment
  • 17. E-COMMERCE BRIEF HISTORY • 1970s: Electronic Funds Transfer (EFT) – Used by the banking industry to exchange account information over secured networks • Late 1970s and early 1980s: Electronic Data Interchange (EDI) for e-commerce within companies – Used by businesses to transmit data from one business to another • 1990s: the World Wide Web on the Internet provides easy-to-use technology for information publishing and dissemination – Cheaper to do business (economies of scale) – Enable diverse business activities (economies of scope)
  • 18. ECOMMERCE INFRASTRUCTURE • INFORMATION SUPERHIGHWAY INFRASTRUCTURE – Internet, LAN, WAN, routers, etc. – telecom, cable TV, wireless, etc. • THE WORLD WIDE WEB - WWW, MESSAGING AND INFORMATION DISTRIBUTION INFRASTRUCTURE – Part of the Internet and allows users to share information with an easy-to-use interface – HTML, XML, e-mail, HTTP, Web browsers, etc. • COMMON BUSINESS INFRASTRUCTURE – Security, authentication, electronic payment, directories, catalogs, etc. • WEB ARCHITECTURE – Client/server model – N-tier architecture; e.g., web servers, application servers, database servers, scalability
  • 19. THE MAIN ELEMENTS OF E-COMMERCE • Consumer shopping on the Web, called B2C (business to consumer) • Transactions conducted between businesses on the Web, call B2B (business to business) • Transactions and business processes that support selling and purchasing activities on the Web – Supplier, inventory, distribution, payment management – Financial management, purchasing products and information
  • 20. WEB-BASED E-COMMERCE ARCHITECTURE CLIENT Tier 1 WEB SERVER Tier 3Tier 2 Tier N APPLICATION SERVER DATABASE SERVER DMS NCCT
  • 21. ADVANTAGES OF ELECTRONIC COMMERCE • Increased sales – Reach narrow market segments in geographically dispersed locations – Create virtual communities • Decreased costs – Handling of sales inquiries – Providing price quotes – Determining product availability • Being in the space
  • 22. THE PROCESS OF E-COMMERCE • ATTRACT CUSTOMERS – Advertising, marketing • INTERACT WITH CUSTOMERS – Catalog, negotiation • HANDLE AND MANAGE ORDERS – Order capture – Payment – Transaction – Fulfillment (physical good, service good, digital good) • REACT TO CUSTOMER INQUIRIES – Customer service – Order tracking
  • 23. ELECTRONIC COMMERCE • BUSINESS-TO-CONSUMER (B2C) • BUSINESS-TO-BUSINESS (B2B) • CONSUMER-TO-CONSUMER (C2C): Individuals use Web for private sales or exchange * NCCT
  • 24. ELECTRONIC COMMERCE BUSINESS - TO - CONSUMER • WEB SITES: Provide information on products, services, prices, orders • CUSTOMER-CENTERED RETAILING: Closer, yet more cost-effective relationship with customers • INFORMATION BROKERS: Comparison shops to customer’s requirements, reintermediation
  • 25. ELECTRONIC COMMERCE BUSINESS-TO-BUSINESS • Automation of purchase, sale transactions from business to business • Provides alternative sources • ELECTRONIC HUBS: online marketplaces, point-to- point connections, integrated information • EXCHANGES: commercial on-line market, many buyers, sellers • Potential for integrating product information • Provides service, value
  • 26. Consumer to Consumer (C2C) Customer(s) Commercial web site (e.g., bazee.com) gets small % seller Places items for sale on web site Pay electronically or via plastic Send item(s) to customer(s) Via Courier
  • 27. Business to Consumer (B2C) Electronic catalog on company web site or host Customer(s) Credit card Debit card E-check online off line company Processes payment In-house processing 3rd party processor Ships goods directly or via 3rd party shipper Order Proc’g/ Whse.
  • 28. Business to Business (B2B) Manufacturer’s catalog on company Web Site or host / Auction (B2B) Web site (buyer’s or 3rd party) buyer seller (manufacturer) E-check, Check, Credit card, P-card, EFT Processes electronically Schedules order/ships Observes credit terms Settles payment ----------------------- Could be 3rd party (OS) or in-house system or both goods delivered Orders and pays electronically / Accepts bid and pays electronically
  • 29. Customer Browser Merchant Website Payment Gateway Bank Switch Shop Pay Card Details Visa Mastercard American Express Bank HostATM POS AuthAuth End of business day settlement Transaction Flow - Buying Scenario • Customer shops • Clicks on Pay • Enters Card details Shipm ent
  • 30. E-COMMERCE SERVICES • Personalization and Membership • Merchandising Database • Merchandise Search • Shopping Cart • Shipping & Handling • Tax Services • Payment Solutions • Site Security • Order Processing • Chat & Mail NCCT
  • 31. E-COMMERCE APPLICATIONS MODULAR SOLUTIONS • Financial Accounting & Costing (FI&CO) • Supply / Vendor Chain Management (SCM) • Customer Relationship Management (CRM) • Chat & Mail • Customer Care/Call Center • Human Resource Management & Payroll (HRM) • Inventory & Logistics (I&L) • Advertisement Management (AM) • Security & Protection Solutions (S&P) • Industry Vertical Solutions (IV) • Connectivity Solutions (CS) • Video on demand • Remote banking • Procurement and purchasing • Online marketing and advertisement • Home shopping • Auctions
  • 32. FUNCTIONAL APPLICATIONS • FINANCE & ACCOUNTING – GENERAL LEDGER REPORTING – PROJECT COSTING – ANNUAL REPORTS – BUDGETING • HUMAN RESOURCES – CORPORATE POLICIES – EMPLOYEE SAVINGS PLANS – BENEFITS ENROLLMENT – ON-LINE TRAINING – JOB POSTING • SALES & MARKETING – COMPETITOR ANALYSIS – PRICE UPDATES – PROMOTIONAL CAMPAIGNS – SALES PRESENTATIONS – SALES CONTRACTS • MANUFACTURING & PRODUCTION – QUALITY MEASUREMENTS – MAINTENANCE SCHEDULES – DESIGN SPECIFICATIONS – MACHINE OUTPUT – ORDER TRACKING
  • 33. E-COMMERCE TECHNOLOGIES • Internet • Mobile technologies • Web architecture • Component programming • Data exchange • Multimedia • Search engines • Data mining • Intelligent agents • Access security • Cryptographic security • SSL, SET • Watermarking • Payment systems NCCT
  • 34. SYSTEM DESIGN ISSUES • GOOD ARCHITECTURAL PROPERTIES – Functional separation – Performance (load balancing, web caching) – Secure – Reliable – Available – Scalable CREATING AND MANAGING CONTENT • What the customer see • Static vs. dynamic content • Different faces for different users • Tools for creating content • Multimedia presentation • Integration with other media • Data interchange • HTML, XML (Extensible Markup Language)
  • 35. Projects @ NCCT SAMPLE PROJECTS @ NCCT E-SECURE TRANSACTIONS WIRELSS HEART BEAT RATE MONITOR WITH WAP MESSENGER
  • 36. • What?: Provide security information and consultation to assess corporate security risks and implementation. • Why?: way to provide security assessment and project mgmt between multiple corps and the customer and news links; Corp: save in loss of data and provide security to customers to build customer confidence • How?: Security Engine: rank existing security; allows customers to assess existing level of security with evaluation and Q&A • Differentiators: (1) customized security needs programs via Internet; (2) provides incentives: alternatives in security via cost reports balance E-SECURE - BUSINESS CONCEPT The e-secure key to securing information Matching security needs to business Server Server’s public key
  • 37. E-SECURE BUSINESS MODEL–CONSULTING & PARTNERSHIPS Banking & Financial institutions Security Seekers Security Providers Capital, Space, Admin. Support, Sales, Marketing, Corporations with Security solutions Service providers & manufacturers Build a level of security management integration and confidence to the seekers Security companies System integrators Profit 35%online pm, 10% on site pm, 5% Streaming presentations Adds value Builds security knowledge, management And partnerships with security companies Government & educational institutions E-Secure Security Need Engine, Streaming video training Project management
  • 38. INTRODUCTION  Security System  Algorithms NCCT • SECURITY - The man who looks for security, even in the mind, is like a man who would chop off his limbs in order to have artificial ones which will give him no pain or trouble. • Henry Miller (1891–1980), Sexus, ch. 14 (1949).
  • 39. FUNDAMENTAL ISSUES • Secure communication over insecure channel • Privacy • Agreement/Commitment • Right to access • Security • Protocols • Encryption • Zero Knowledge Proof • Digital signature, digital time stamp • Identification/ authentication • Firewall • SSL, SET
  • 40. Enabling Technologies Protocols & Practices • Protocols – SET (Secure Electronic Transactions- S-HTTP) – SSL (Secure Sockets Layer- HTTPS) • Practices – Dual Signatures – Digital Signatures – Certificate Trust Train
  • 41. SSL Secure Socket Layer • SSL is a standard that encrypts data sent between you and a web server • When connecting, the client requests a certificate from the server. This is sent, which confirms that you really are talking to the server that you think you are Web ServerYOU Data contained in packets is encrypted; no one but you and the web server can read the traffic
  • 42. SET COMPONENTS • Wallet - performs cardholders’ authentication • Merchant Server - authenticates merchant and its accepted payment brand • Payment Gateway - processes payments and authorizations • Certificate Authority - manages certificates for wallets and merchants; allows for branding
  • 43. FEATURE SET SSL Secure Transmission of Data Yes Yes Identify Authorized Purchasers Yes No Verify Validity of Account Yes No Identify Legitimate of Payment Brand for Merchants Yes No Track Sales Slips and Totals Yes No Enabling Technologies Set vs. SSL
  • 44. CRYPTOGRAPHY • Cryptographic software transforms plain text messages into something no one without a key or secret knowledge can easily read • The most basic form of this is simple substitutions; one letter is replaced by another letter wherever it appears • But this is very easy to break, so more sophisticated algorithms are used to encrypt messages • Cryptography: Techniques, Protocols, and Applications using the existence of difficult problems • Cryptanalysis: How to compromise cryptographic protocols and techniques
  • 45. DIGITAL SIGNATURES • This is used to confirm that data has not been changed by anyone other than the person who created and signed it. • Example: Suja sends a document to Prema. Kumar intercepts the message during transmission and changes it. Prema receives a doctored document. Or Kumar could send a message to Prema and claim it was from Suja. • To prevent this we can use digital signatures. Generally this is done by using a hash function to generate a “fingerprint” of the data. Any change to the data will change the fingerprint. • The “fingerprint” is encrypted using the sender’s private key and attached to the document • The receiver can decrypt the “fingerprint” using the sender’s public key, then see if it matches the fingerprint of the received document • This ensures that the data has not changed since the sender signed it, and confirms that the sender signed it (since only he has the private key.)
  • 46. FIREWALLS • What is a firewall? – A firewall is any mechanism that acts to restrict access to a network according to a set of defined rules. – Function as “front doors” to a network. • There are 2 Basic approaches to implementing rule sets on your firewall – Block all and Allow – Allow all and Block
  • 47. PUBLIC KEY CRYPTOGRAPHY • Most systems on the internet use public key cryptography. • This uses two keys: a public key, which is available to anyone; and a private key, which is secret and known only to the user • The most popular variation on this concept is RSA (Rivest-Shamir-Adleman), named for the three who invented it
  • 48. RSA • RSA works by using a mathematical function that is (comparatively) easy to compute while encrypting, but very difficult to reverse without knowing the private key. See handout for gory details. • RSA works by selecting two large prime numbers and doing some semi- fancy math. One of the prime numbers and the product of the two prime numbers is the public key; the other prime number and their product is the private key • The security of the system depends on it being difficult to efficiently factor large numbers. There’s been a lot of research in the area by a lot of smart people, and no one has come up with an algorithmically good solution. • The only engineering solution is to throw more resources at brute force approaches, but this is not very practical for large key sizes, since the computations required increase exponentially with key size.
  • 49. EXAMPLES MODERN APPLICATIONS • Electronic Commerce – Online Banking, Online Shopping • Internet Security – Secure emails, Remote access of applications • The military – secure communication • The internet – secure communication, authentication, on-line shopping, emails • Election
  • 50. SECURE COMMUNICATION Sender Receiver Insecure Channel Hacker M M Encryption C = E(M) Decryption M = D(C)C
  • 51. SENDING ENCRYPTED MESSAGES • To send to someone, the message is encrypted with the public key. • It can only be decrypted by the private key. Message Public Key Encrypted Text Web Site Plain Text Private Key I N T E R N E T
  • 52. Projects @ NCCT Redefining the Learning Specialization, Design, Development and Implementation with Projects Experience the learning with the latest new tools and technologies…
  • 53. Projects @ NCCT Project Specialization Concept • NCCT, in consultation with Export-Software Division, offers Live Software Applications, System, Electronics related Projects to experience the learning with the latest new tools and technologies • NCCT believes in specialized Hardware Design, development training and implementation with an emphasis on development principles and standards • NCCT plays a dual positive role by satisfying your academic requirements as well as giving the necessary training in electronics and embedded product development
  • 54. Projects @ NCCT WE ARE OFFERING PROJECTS FOR THE FOLLOWING DISCIPLINES • COMPUTER SCIENCE AND ENGINEERING • INFORMATION TECHNOLOGY • ELECTRONICS AND COMMUNICATION ENGINEERING • ELECTRICAL AND ELECTRONICS ENGINEERING • ELECTRONICS AND INSTRUMENTATION • MECHANICAL AND MECHATRONICS
  • 55. Projects @ NCCT PROJECTS IN THE AREAS OF • System Software Development • Application Software Development, Porting • Networking & Communication related • Data Mining, Neural Networks, Fuzzy Logic, AI based • Bio Medical related • Web & Internet related • Embedded Systems - Microcontrollers, VLSI, DSP, RTOS • WAP, Web enabled Internet Applications • UNIX LINUX based Projects
  • 56. Placements @ NCCT NCCT has an enormous placement wing, which enrolls all candidates in its placement bank, and will keep in constant touch with various IT related industries in India / Abroad, who are in need of computer trained quality manpower Each candidate goes through complete pre-placement session before placement made by NCCT The placement division also helps students in getting projects and organize guest lectures, group discussions, soft learning skills, mock interviews, personality development skills, easy learning skills, technical discussions, student meetings, etc., For every student we communicate the IT organizations, with the following documents * Curriculum highlighting the skills * A brief write up of the software knowledge acquired at NCCT, syllabus taught at NCCT * Projects and Specialization work done at NCCT * Additional skills learnt
  • 57. NCCT THE FOLLOWING SKILL SET IS SECURE Software Applications C, C++, Visual C++, ASP, XML, EJB Embedded Technologies Embedded Systems, PLC Other Areas VLSI, ULSI, DSP, Bio Informatics & Technology Emerging Technologies WAP, Remote Computing, Wireless Communications, VoIP, Bluetooth in Embedded, LINUX based applications Ever green technologies UNIX, C
  • 58. NCCT Quality is Our Responsibility Dedicated to Commitments and Committed to Technology

Editor's Notes

  1. So what is ecommerce?
  2. SLIDE 1 What is the E-secure business concept? E-secure is a business consulting service via the internet, providing adhoc or formal evaluation to assess the level of security your corporation requires with the balance of cost and risk . It assesses the corporations security minimal and maximum needs. For instance, in a corporate customer may want to secure information from an extranet, but is trying to weigh the costs of internal vs external implementation. With the e-Secure concept, we can then sell the e-secure consulting “security level” requirements based on risk and cost to with companies budgets in mind. The corp customer provides info online with a java based eval program upfront which provides generic information back based on input. This initial assessment is done for free, and preferably online. For more formal consultation they can hire consultants to come on site. We can also provide streaming video to explain the security level concept from A-Z…, I.e. what is pki, ssl, vpn etc. is name and password sufficient, why do we need to authenticate and authorize information… first level or introduction for free the rest for minimal pricing. What is e-secure’s Core Product? We design & sell security consulting/training, U.S.-based only. The “security Engine” : finds security information based on level of corporate requirements; allows informational free links to security information outside the website What are the key differentiators?: provides adhoc on spot security level info check via Q&A free online program via Internet; provides incentives: links to web sites with security info, research of companies levels of security today; it’s scalable, in order to balance your cost and needs of security today and scale it for tomorrow. develop relationships with companies as references to their products as well as ASP’s for exchange in reference or profit
  3. SLIDE 3 shows how E-secure collects money and resources required Security seekers include major banks such as BofA , or financial institutions such as title companies or Schwab or Fidelity Service providers include high tech ASP’s like loudcloud Government and educational institutions include Army, federal agencies, or university institutions Security providers include system integrators such as EDS , they actually implement the solution for the seeker Security companies include software apps or hardware chips to support the level of security needed, I.e. RSA, or Verisign, Entegrity solutions,that are known for only security solutions Corporations with security solutions include corporations that have a division to support security apps or hardware such as Novell, IBM, GTE, or Broadcom Esecure would work with companies up front to obtain the level of security they need. Often the need is driven by the security team from the seeker but needs more training or information on the level of security available and determined by the budget the company provides for the year. You typically might have a project manager handle the work internally for the company , but many times companies don’t have the luxury of maintaining a project manager especially with the knowledge to help implement this effort. Much of this effort has been done by the security providers in the past, however the challenge in that perspective is to only sell your own product. E-Secure would project manage the information and taylor the security needs to the level and integration expected of the security seeker , not only provide a one stop shop as providers tend to do. Resources: 1 person with security , computer and system networking background required for initial consulting Home office with DSL technology to provide own space, admin, support, sales, and marketing and web interface When building more than 5 customers, then add additional consulting people and delegate the work I will basically coordinate and consult the work between the IS folks in the “seekers” and the “providers” Financing only needed from consulting fees upfront.