Monday, 27 June 2016

E-Commerce: Requirements and Architecture

1. Introduction
2. Requirements of E-Commerce
3. Functions of E-Commerce
4. E-Commerce Framework Architecture
5. I-way or Information Highway

1 Introduction

e-commerce which began in the early 1970s,
grew rapidly alongside the advances in telecommunication and information
technology. Thus, today we find that there is hardly any form of business that
has not adopted e-commerce. Having made this statement, let us now look into
the various requirements that one should possess to venture into e-commerce.
This unit gives you the details of the essential components that are required
for setting up an e-commerce. The unit also highlights the various components
of the Information Highway or the I-Way that routes information and services
between the business and its clients.


2. Requirements of E-Commerce

 

The following are the requirements of e-commerce:

• Improved customer service

• Origin of new business opportunities

• Enhanced speed and accuracy of a product

• Product cost saving

• Improved customer services: These days, consumers want better
service. Therefore, e-commerce services offer a means of communication
between the consumer and the company. The consumer can even make
online complaints to a company. Most websites provide a different e-mail
id where complaints can be mailed. Customer-oriented organizations take
complaints very seriously. Not only are the grievances given a good
hearing. Action is taken almost immediately. It is possible for satisfied as
well as dissatisfied customers to express their opinions and also make
suggestions. The bonding between the company and the customer
strengthens.

• Origin of new business opportunity: Bigger network between
consumers and companies can lead to new business opportunities.
For example, a business may find infinite possibilities to develop and
increase its consumer base. A company offering gardening-related
products may also think of venturing into delivery of bouquets, cakes and
gifts on request, for a price. Companies offering toys for toddlers could
also come up with a forum where parents can interact with paediatricians
or child psychologists to clarify doubts.

• Enhanced speed and accuracy of a product: The usage of e-commerce
services reduces human errors and other problems like a duplication of
proceedings. This perfection in speed and accuracy, plus easy access to
documents and information affect the increase in production. A customer
care executive may often forget to enter necessary details of a transaction.
She may have to call up and bother the customer repeatedly to get some
information. In case of online interaction, the customer will fill in his own
details. Reconfirmation may not be necessary at all. Wastage of time and
money can be checked.

• Product cost saving: Despite the fact that you can reduce the cost of a
product by the use of e-commerce services, it also reduces the errors
and the cost of sending the information to partners.


 Prerequisites of E-Commerce Procedure

 

More and more people are getting into e-commerce. This is natural because
there are hardly any barriers to entry. Online businesses can be run from home.
You do not really need degrees and certificates to get started. However, you do
need to give the venture some serious thought. A lot of work would be required,
at least initially.

In order to conduct e-commerce, the main things you will require include
the following:

1. A commercial website like www.e-commerceguides.blogspot.in

2. A product or service you want to sell through the respective websites

3. Shopping carts or purchase order forms

4. Current credit card account that will be accepted on e-payment

5. An online payment gateway, if you plan to process credit cards in real
     time, over the Internet

6. A secure socket layer (SSL) to secure the gateway


3. Functions of E-Commerce

 

E-commerce applications enable various business functions and transactions
to be done electronically. Some of the functions are discussed as follows:

• E-Advertising: Advertising of information is currently the largest
commercial activity on the Web. For example:

(i) A company’s website contains its profile and all the information on
its products and services.

(ii) It displays banners that can be clicked.

(iii) E-commerce portals

(iv) Newsgroups also provide publicity.

• E-Catalogues: Web pages that offer information on products or services
that a company offers are available on an e-catalogue. An e-catalogue
provides information on:

(i) Packaging

(ii) Product attributes and characteristics

(iii) Availability

(iv) Payment modes

(v) Cost, etc.

• E-Publishing: This sector was among the first few to spend on this novel
technology especially on the Internet. E-publishing has led to several
successful e-commerce endeavours, such as an independent publication
through the Internet and electronic newspapers.

Online publications offer services, such as:

(i) Online reading/browsing

(ii) Online search

(iii) Customized information services 

• E-Banking: This facility offers remote banking electronically. Electronic
banking is also referred to as online banking, cyber banking, home banking
or virtual banking. It enables Web users to make online purchases and
pay for the same using an online-banking facility. It is cost-effective, simple
and available 24 hours. Customers have access to several services, such
as:

 (i) Bill payment

(ii) Electronic cheque writing

(iii) Record keeping

(iv) Tracking of bank account, credit cards


3.1 Shopping Services

 

Shopping services are of many types. A few of them are discussed as follows:

1. Services provided by independent businesses who send their
representatives to the stores to do comparison shopping for specific
products. A shopping service is hired on contract to compare competitive
prices or prices for the same item in competitive stores, depending on the
request, and the needs of the client.

2. Shopping services that are offered to cable television subscribers where
consumers can buy products (usually at a discount) that are displayed on
a special shopping services channel.

3. Shopping services are offered to subscribers of personal information
services for home computer use. For example, a company provides online
information to subscribers. Among the many services offered by this
company is one called products guides, from which consumers can shop
and select purchases right from their own computer terminals.

3.2 Information Services

 

Information service is also known as information systems. For several
organizations, information systems or information services are accountable for
IT and Management Information Systems. Different types of decisions are
supported by information systems at various levels of the organizational
hierarchy. Key information systems include information management software
and structural databases. They include the following:

• Enterprise Collaboration System (ECS)

• Transaction Process System (TPS)

• Decision Support System (DSS)

• Executive Support System (ESS)

• Management Information System (MIS)



4. E-Commerce Framework Architecture

 

E-commerce applications are built on the existing infrastructure for online
communication, network and connection software which frames the nascent
information superhighway.

E-Commerce Applications

E-commerce can be applied in:

1. Supply chain management

2. Online banking

3. Procurement and purchasing

4. Online marketing and advertisement

5. Home shopping

Figure (A)  shows several e-commerce applications, including interorganizational
and customer-oriented examples. Without each of the building blocks in the
infrastructure, none of these uses will be possible.



                                                  Figure (A) E-Commerce Applications


 4.1 Client–Server Architecture in E-Commerce

 

The client–server model is followed by the applications of e-commerce. The
model lets the client work together with the server with the help of a request–
reply sequence governed by message passing. The server handles application
tasks, storage and security and gives scalability to increase clients.

                                                      

                                                         Client–Server Architecture


4.2 Building Blocks of E-Commerce 

Enterprise applications, insights, functions and IT infrastructure form the building
blocks of e-commerce.

Enterprise application software refers to software that facilitates the
performance of business functions such as scheduling (of production/
manufacturing processes, etc.), accounting, management of customer
databases/information, management of bank account/dealings, etc. It is common
to see such software hosted on servers. It is capable of serving multiple
enterprises concurrently, over a computer network. This gives enterprise software
an edge over the commonly used single-user applications which can only perform
on a user’s PC. These single-user applications can only serve one user at a
time. Enterprise software provides solutions to problems that concern the
enterprise as a whole and not individual departments. Only large enterprises
can afford to build such enterprise software. This software becomes the pillar of
the IT systems on which the entire enterprise functions and communicates.
Among other things, there are enterprise applications for various functions such
as:

• Finance

• HRM

• Customer relationship management or CRM

• Supply chain management or SCM

• Product life cycle or PLC management

• Enterprise commerce management

• Enterprise resource planning or ERP

All these processes, such as SCM, CRM and ERP need to be integrated
properly for e-commerce to be successful. The IT infrastructure required for the
same may include the following:

• Application servers

• Web services

• Wireless technology

• Database software

• XML

• Storage systems

• Server platform

Business intelligence would also be required for Web analysis, for
managing knowledge and content and for mining data, if required, depending
on the nature of e-commerce.

For today’s growing e-commercees, it is very important to consider the
issues of security of information and the reliability and scalability of the systems
as well. This is taken care of by integration.

The two indispensable pillars that support all e-commerce applications
and infrastructure are as follows:

(i) Public policy to govern universal access to privacy and information
pricing.

(ii) User interface and transport in the interest of compatibilities across
the entire network to dictate the nature of information publishing.
Information should be accessible by any device, which the consumer
chooses, and should be supported by any type of operating system.


5. I-way or Information Highway

 

Any e-commerce application will need the I-Way infrastructure in the same
manner as any normal business would require the interstate highway network
to carry goods from one place to the other.

I-Way is a network of interconnected data highways of several types:
• Cable TV wires

• Telephone wires

• Cellular and satellite

• Radio-based wireless

I-Way is an interactive two-way high-capacity method of transporting
information and services. I-Way is applicable in large volume e-commerce
applications as it provides traffic-free telecommunication service. I-Way helps
organizations, firms and companies in upgrading their network infrastructure.
It also helps companies and organizations in recognizing the following:

1. Their infrastructure

2. Ways to change their business

3. Transaction strategies (marketing, advertising, etc.)

4. Ways to sell their products and services

5. Ways to change their relationship with the customer

5.1 Market Forces behind I-Way

 

The market forces behind I-way are divided into two categories:

1. Requirement of market participants

2. Strategic alliances and I-way infrastructure

1. Requirement of market participants

 

According to market-participant demands, I-Way is influenced by the user and
the organization. The I-way superhighway is based on the behaviour of the
consumer and the producer because they have multiple roles.

The following list plays an important role in the I-Way structure. The multiple
roles of the users that help in structuring the market are:

• Numbers of users who use online services

• Consumers who pay for information and products

• Persons who provide services

• Others include third-party brokers and intermediaries

Until recently, the marketplace was divided into the communication,
entertainment and information sectors. The boundaries between communication,
entertainment and information are not absolute. For example, video is a part of
information, entertainment and communication (via videoconferencing).
Television sets and PCs are now able to interact or exchange any sort of data.



2. Strategic Alliances and I-Way Infrastructure

 

The success of I-Way is based on market strategies. These strategies are built
according to needs that are based on market structure, i.e., communication,
entertainment and information.

The resources required for building these three segments (communication,
entertainment and information) of I-Way are driving companies to make
maximum use of existing facilities. This is done through alliances to control
costs and create test markets.

Two aspects of these alliances are as follows:

(i) They cut across the industry line, a diversity suggesting that a number
of companies will perform different roles within alliances, for example,
telephone or cable companies deliver information whereas computer
hardware and software firms provide access hardware and
applications to use the data information.

(ii) Many alliances are international, signalling that I-Way will be global
from the start.


5.2 Components of I-Way

 

There are three major components that make up the I-Way infrastructure:

(i) Network Access Equipment or Component

(ii) Local Access Equipment or Component

(iii) Global Information Distribution

(i) Network access equipment or component

To access any network, specific equipment is required at the customer’s end
and this enables the consumer to access the network. It consists of hardware,
such as routers, switches and access devices, such as computers and set-top
boxes. Software platforms are browsers and operating systems.


(ii) Local access component

Local access component is the link between businesses, homes, schools and
organizations to the main communication point also referred to as the ‘last mile’.
Last mile connection represents a tremendous investment that cannot be easily
replaced or overlooked in any network strategy.
It provides the following types of connections:
(a) Telephone-based last mile
(b) Cable-based last mile
(c) Electrical-based last mile
(d) Wireless-based last mile


(iii) Global access component

Nowadays, e-commerce activities are not limited to any country; and with the
world becoming a global village, a proper network infrastructure is required to
connect people and businesses across the world. These types of networks
include:
(a) Long distance networks (via coaxial cable or fibre optic cable)
(b) Satellite

                                                  Online Information Service


5.3 Public Policy Issues Shaping the I-Way

 

Governments are expected to play a crucial role in defining I-Way. However,
there are some major issues as follows:


(i) Cost

Who will pay for constructing the I-Way? Some favour the interstate-highway
model with government construction, ownership and maintenance. Others
support the current, regulated, telephone-system model.


(ii) Subsidies

Subsidies include tax breaks, government, business or other forms of
encouragement. These raise an open question. What will these tax subsidies
actually subsidize?
Who will pay to extend the networks to non-profit institutions such as
schools, hospitals and the police and fire departments?

(iii) Regulation

Some enterprises argue that if a highway is built with private funds, there should
be no government regulation. The only regulation that should exist should be to
provide public access, privacy and reasonable tools.
Yet, there are still many issues that remain undecided:

What are the rules?

Who writes them?

Who enforces them?


(iv) Universal Access

Some economists argue that the market should decide who gets access to the
I-Way. Others insist that the highway operations must provide universal access,
however, at a reasonable cost.

If the I-Way is built and run by private interests without significant
government investment, these institutions may not be able to afford connecting
to the network.

Issues that may arise are:

• How are firms ‘encouraged’ to provide universal access?

• How universal is universal? Is it just nationwide or international access?


Internet-Component of I-Way Network Infrastructure

The Internet is a well-known component of I-Way network infrastructure.

• Its general infrastructure targets not only one e-commerce application,
such as video-on-demand or home shopping, but a wide range of
computer-based services, such as e-mail, EDI, information retrieval
and videoconferencing, online banking, game, music, movie and
chatting.

• The Internet is a unique combination of postal services, telephone
systems, research libraries, super markets and talk show centres that
enable people to share and purchase information.

The concept of the Internet is based on networking. The basic principle is
to share information between or among computers.
‘The Internet is the network of various small networks.’
The Internet includes standalone computers, local area networks or LANs,
metropolitan area networks or MANs and wide area networks or WANs.
The Internet can be differentiated by the language spoken. It is divided
into two parts:

(a) Academic Internet

(b) Business Internet

(a) Academic Internet

 

The characteristics of academic Internet are:

(i) All the host computers speak the same language (TCP/IP).

(ii) It consists of various government networks, regional networks, campus
networks and some international networks.

(iii) It includes (a) NSFNET-US group of research IP network. (b) EBONEEuropean
group of IP network.

(b) Business Internet

 

(i) The computer can speak a variety of languages other than TCP/IP. These
include:

(a) ISO/OSI x.25- based packet switching networks

(b) SNA-based BITNET

(c) Other languages for networks run by commercials

(ii) The business Internet consists of online services, value-added networks
and other e-mail only services.

The academic and business networks can talk to each other through
language (protocols) transitions called gateways, stationed at the network border.
More recently, business Internet providers have begun to adopt TCP/IP
as the standard protocol on their own networks, thus allowing smooth linkage
with the academic Internet.

I-Way includes both the academic and business Internet categories and
extends the boundaries further to encapsulate non-IP based networks such as
telecom carriers network, cable TV, mobile and cellular networks.



                                                       Figure 4.4 Part of the Internet



 

Sunday, 26 June 2016

Network Infrastructure for E-Commerce 2

Network Infrastructure for  E-Commerce

 

1. Introduction
2. Common Gateway Interface
3. Multimedia Objects
4. Network Access Equipment
5. Network Cables
6. Broadband Telecommunication

 

 

1 Introduction

 

In here, you will learn about Common Gateway Interface (CGI), which
is a process used to share the data between the web server and the web browser.
CGI is a set of standards where a program can send data back to the web
server where it can be processed. Also discussed at length is broadband
telecommunication, which makes use of a digital or analogue signal to relay
voice and data. In most applications, the term is associated with systems offering
fast transmission of data, either using latest digital technology or an analogue
system with a wider bandwidth. There are numerous types of broadband
telecommunications in use today.

You will also be taught various other topics, including, but not limited to,
multimedia objects, network access equipment, and network cables.

2 Common Gateway Interface

 

As you traverse the vast frontier of the WWW, you could come across documents
that make you wonder, ‘How did they do this?’ These documents could consist
of, among other things, forms that put for advice or registration information,
image maps that allow you to click on different parts of the image, counters that
present the number of users that accessed the document, and utilities that
allow you to search databases for specific information. In most cases, you’ll find
that these properties were done using the Common Gateway Interface,
commonly known as CGI.

One of the Internet’s worst-kept secrets is that CGI is astoundingly simple.
That is, it’s trivial in design, and anyone with an iota of programming experience
can write rudimentary scripts that work. It’s only when your requirements are
more demanding that you have to master the more complex workings of the
Web.

CGI is the part of the Web server that can communicate with other different
programs running on the server. With CGI, the Web server can call up a program,
while passing user-specific data to the program (such as what host the user is
connecting from, or input the user has supplied using HTML form syntax). The
program then processes that data and the server passes the program’s response
back to the Web browser.

CGI is not an enchantment; it’s just programming with some particular
types of input and a few strict rules on program output. Everything in between is
just programming. Of course, there are special techniques that are particular to
CGI. But underlying it all is the simple model as shown in Figure (A)

                                                          Figure (A) CGI Model


Common uses of CGI include:

 

• Guest books
• Email forms
• Mailing list maintenance
• Blogs

3 Multimedia Objects

 

• Multimedia objects are files that hold images, audio recordings, video
clips and scanned documents, etc., which relate to some fact within our
genealogical data. A multimedia object can be linked with several entities
(animals, person, family, source …) and vice versa.

• In other words multimedia is media and content that uses a combination
of different content forms. The term can be used as a noun (a medium 
with multiple content forms) or as an adjective describing a medium as
having multiple content forms. The term is used in contrast to media which
only use traditional forms of printed or hand-produced material. Multimedia
includes a combination of text, audio, still images, animation, video, and
interactivity content forms.

• Multimedia is usually recorded and played, displayed or accessed by
information content processing devices, such as computerized and
electronic devices, but can also be part of a live performance. Multimedia
(as an adjective) also describes electronic media devices used to store
and experience multimedia content. Multimedia is distinguished from mixed
media in fine art; by including audio, for example, it has a broader scope.
The term ‘rich media’ is synonymous for interactive multimedia.
Hypermedia can be considered one particular multimedia application.

• Multimedia presentations may be viewed by person on stage, projected,
transmitted, or played locally with a media player. A broadcast may be a
live or recorded multimedia presentation. Broadcasts and recordings can
be either analogue or digital electronic media technology. Digital online
multimedia may be downloaded or streamed. Streaming multimedia may
be live or on-demand.

• Multimedia games and simulations may be used in a physical environment
with special effects, with multiple users in an online network, or locally
with an offline computer, game system, or simulator.

• The various formats of technological or digital multimedia may be intended
to enhance the users’ experience, for example to make it easier and faster
to convey information. Or in entertainment or art, to transcend everyday
experience. Enhanced levels of interactivity are made possible by
combining multiple forms of media content. Online multimedia is
increasingly becoming object-oriented and data-driven, enabling
applications with collaborative end-user innovation and personalyzation
on multiple forms of content over time. Examples of these range from
multiple forms of content on Web sites like photo galleries with both images
(pictures) and title (text) user-updated, to simulations whose co-efficient,
events, illustrations, animations or videos are modifiable, allowing the
multimedia ‘experience’ to be altered without reprogramming. In addition
to seeing and hearing, Haptic technology enables virtual objects to be
felt. Emerging technology involving illusions of taste and smell may also
enhance the multimedia experience.

4 Network Access Equipment

 

Hubs: All networks (except those using coaxial cable) require a central location
to bring media segments together. These central locations are called Hubs.
Hubs are special repeaters that overcome the electromechanical limitations of
a media signal path.

There are three types of Hubs:

               1. Passive Hub: A passive hub simply combines the signals of network
                                          segments. There is no signal regeneration.
               2. Active Hub: Active hub is that which regenerates of amplifies the
                                          signals.
              3. Intelligent Hub: Intelligent hub regenerates the signal and performs
                                          some network management and intelligent path selection.

Switches: It supports transmitting receiving and controlling traffic with other
computers on the network. MAC (Media Access Control) address is hard-coded
on the card by manufacture. This MAC address is globally unique.

Comparison of Hub and Switch

 

• Hub is broadcasting device while switch is point-to-point communication
device.

• Hub operates at physical layer while switch operates at data link layer.

• Switch can be used as a repeater but hub cannot be used as repeater.

• Switch uses switching table to find out the correct destination while hub
simply broadcasts the incoming packet.

Repeaters: Repeaters (refer to Figure (B)) are devices that operate at the
physical layer of the OSI model. The basic purpose of a repeater is to extend the
 distance of LAN. Their primary purpose is simply to regenerate a signal
received from input and correct the signal to its original state for output.
                                                  Figure (B) Repeater

Network Interface Card (NIC): The primary function of NIC is to allow the
computer to communicate on the network. It supports transmitting, receiving
and controlling traffic with other computer on the network. NIC operates at
physical layer of OSI model. MAC address is hard coded onto the card by
manufacturer. This MAC address is globally unique and is of 48 bits. The MAC
address provides a way to distinguish one NIC from other NIC. These MAC
addresses are also called physical address.

Bridge: A bridge (Figure (C)) is a device that is attached to two or more
LANs to create an extended LAN. The LANs to be interconnected may be similar
or dissimilar. As each type of LAN has different MAC frame structure, the bridge
takes care of these differences by reformatting the frames.
                                                           Figure (C) Bridge

Router: A router (Figure (D)) operates at the third network layer of ISOOSI
model. It connects more than two different types of network. Router
determines the short path between source and destination for data transmission.


                                                                Figure (D) Router

bellow table shows the similarities and differences between a router and a
bridge.



 

5 Network Cables

Network cables are the medium through which information generally travels
from one node/network device to another. There are many types of cables which
are used for computer network. In some cases, a network will utilize only one
type of cable, while other networks will use a variety of cable types. The type of
cable chosen for a network is related to the network’s topology, protocol, and
size. Understanding the characteristics of different types of cable and how they
relate to other aspects of a network is necessary for the development of a
successful network.

There are following types of cables used in networks and other related
topics.

• Fibre optic cable
• Cable installation guides
• Wireless LANs
• Unshielded Twisted Pair (UTP) cable
• Shielded Twisted Pair (STP) cable
• Coaxial cable

Fibre optic cable

 

 

Fibre optic cabling ( Figure (E)) consists of a centre glass core surrounded
by several layers of protective materials. It transmits light rather than electronic
signals eliminating the problem of electrical interference. This makes it ideal for
certain environments that contain a large amount of electrical interference. It is
also the standard for connecting networks between buildings, due to its immunity
to the effects of moisture and lighting.

Fibre optic cable has the capability to transmit signals over much longer
distances than coaxial and twisted pairs. It also has the capability to carry
information at superior speeds. This capacity broadens communication
possibilities to include services such as video conferencing and interactive
services. The cost of fibre optic cabling is comparable to copper cabling; however,
it is more difficult to install and modify.

The centre core of fibre cables is made from glass or plastic fibres. A
plastic coating then cushions the fibre centre, and kevlar fibres help to strengthen
the cables and prevent breakage. The outer insulating jacket is made of teflon
or PVC.

                                                       Figure (E) Fibre Optic Cable


There are two common types of fibre cables— single mode and multimode.
Multimode cable has a larger diameter; however, both cables provide high
bandwidth at high speeds. Single mode can provide more distance, but it is
more expensive.

Installing cable—some guidelines

 

When running cable, it is best to follow a few simple rules:

• If it is necessary to run cable across the floor, cover the cable with cable
protectors.

• Label both ends of each cable.

• Use cable ties (not tape) to keep cables in the same location together.

• Always use more cable than you need. Leave plenty of slack.

• Test every part of a network as you install it. Even if it is brand new, it may
have problems that will be difficult to isolate later.

• Stay at least 3 feet away from fluorescent light boxes and other sources
of electrical interference.

Wireless LANs 

 


                                                     Figure (F) Wireless LANs

Wireless LANs use high frequency radio signals, infrared light beams, or
lasers to communicate between the workstations, servers, or hubs. Each
workstation and file server on a wireless network has some sort of transceiver/
antenna to send and receive the data. Information is relayed between
transceivers as if they were physically connected. For longer distances, wireless
communications can also take place through microwave transmission, cellular
telephone technology or by satellite.

Wireless networks are great for allowing laptop, desktop, portable devices,
or remote computers to connect to the LAN. Wireless networks are also beneficial
in older buildings where it may be difficult or impossible to install cables.
The two most common types of infrared communications used in schools
are line-of-sight and scattered broadcast. Line-of-sight communication means
that there must be an unblocked direct line between the workstation and the
transceiver. If a person walks within the line-of-sight while there is a transmission,
the information would need to be sent again. This kind of obstruction can slow
down the wireless network. Scattered infrared communication is a broadcast of
infrared transmissions sent out in multiple directions that bounces off walls and
ceilings until it eventually hits the receiver. Networking communications with
laser are virtually the same as line-of-sight infrared networks.

Advantages of wireless networks: 

• Cost: Setting up a wireless network can be much more cost effective than
buying and installing cables.

• Expandability: Adding new computers to a wireless network is as easy as
turning the computer on (as long as you do not exceed the maximum
number of devices).

• Mobility: With a laptop computer or mobile device, access can be available
throughout a school, at the mall, on an airplane, etc. More and more
businesses are also offering free Wi-Fi access (‘Hot spots’).

• Fast setup: If your computer has a wireless adapter, locating a wireless
network can be as simple as clicking ‘Connect to a Network’—in some
cases, you will connect automatically to networks within range.

Disadvantages of wireless networks:

 

• Inconsistent connections: How many times have you said to yourself,
‘Wait a minute, I just lost my connection?’ Because of the interference
caused by electrical devices and/or items blocking the path of transmission,
wireless connections are not nearly as stable as those through a dedicated
cable.

• Speed: The transmission speed of wireless networks is improving;
however, faster options (such as gigabit Ethernet) are available via cables.
If you are only using wireless for Internet access, the actual Internet
connection for your home or school is generally slower than the wireless
network devices, so that connection is the bottleneck. If you are also
moving large amounts of data around a private network, a cabled
connection will enable that work to proceed much faster.

• Security: Protect sensitive data with backups, isolated private networks,
strong encryption and passwords, and check network access traffic to
and from the wireless network.

• Interference: Because wireless networks deploy radio signals and similar
techniques for transmission, they are vulnerable to intrusion from lights
and electronic devices.

Unshielded Twisted Pair

 

Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded
twisted pair (UTP) is the most popular and is generally the best option for school
networks.
                                               Figure (G) Unshielded Twisted Pair


The quality of UTP (refer to Figure(G)) may range from telephone-grade
wire to extremely high-speed cable. This cable has four pairs of wires inside the
jacket. Each pair is twisted with a different number of twists per inch that helps
to eliminate interference from adjoining pairs and other electrical devices. The
Electronic Industry Association/Telecommunication Industry Association
(EIA/TIA) has set standards of UTP and rated six categories of wire, which are
as follows. 

 

Unshielded Twisted Pair connector

 

The standard connector for unshielded twisted pair cabling is known as RJ-45
connector ( Figure (H)). This is a plastic connector that looks like a large
telephone-style connector. A slot allows the RJ-45 to be inserted only one way.
RJ stands for Registered Jack, implying that the connector follows a standard
borrowed from the telephone industry. This standard assigns which wire goes
with each pin inside the connector.

                                                      Figure (H) RJ-45 Connector

Shielded Twisted Pair (STP) cable

 

UTP cable is the least expensive cable; it may be disposed to radio and electrical
frequency interference (it should not be too close to electric motors, fluorescent
lights, etc.). If you must place cable in environments with lots of potential
interference, or if you must place cable in extremely sensitive environments
that may be susceptible to the electrical current in the UTP, shielded twisted
pair may be the solution. Shielded cables can also facilitate to extend the
maximum distance of the cables.

       Shielded twisted pair cable is available in three different configurations:

              1. Each pair of wires is individually shielded with foil.

              2. There is a foil or braid shield inside the jacket covering all wires.

              3. There is a shield around each individual pair, as well as around the
                   entire group of wires.

Coaxial cable

Coaxial cable ( Figure(I)) has a single copper conductor at its centre. A
plastic layer provides insulation between the centre conductor and a braided
metal shield. The metal shield facilitates to block any outside interference from
fluorescent lights, motors, as well as other computers.


                                               
                                                          Figure (I) Coaxial Cable

 
Coaxial cabling is not easy to install, but it comes with the advantage of
being highly resistant to signal interference. Also, it can support greater cable
lengths between network devices than twisted pair cable. The two types of
coaxial cabling are thick coaxial and thin coaxial.

Thin coaxial cable is known as thinnet. 10Base2 refers to the specifications
for thin coaxial cable moving Ethernet signals. The 2 refers to the approximate
maximum segment length being 200 metres. The maximum division length is
actually 185 metres. Thin coaxial cable has been popular in school networks,
particularly linear bus networks.

Thick coaxial cable is known as thicknet. 10Base5 refers to the
specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to
the maximum division length being 500 metres. Thick coaxial cable has an
extra protective plastic cover that helps keep moisture away from the centre
conductor. This creates thick coaxial a great choice when running longer lengths
in a linear bus network. One disadvantage of thick coaxial is that it is not easily
bendable and quite difficult to install.

Coaxial cable connectors

A most common type of connector used with coaxial cables is the Bayone-Neill-
Concelman (BNC) connector ( Figure (J)). There are different types of
adapters for BNC connectors, including a T-connector, barrel connector, and
terminator. Connectors are the most vulnerable points in any network. To help
avoid problems, always use the BNC connectors that ‘screw’ onto the cable.


                   
                                                             Figure (J) BNC Connector

6 Broadband Telecommunication 

In general, broadband refers to telecommunication where a wide band of
frequencies is available to transmit information. There is wide range of
frequencies available, and information can be multiplexed and sent on many
different frequencies or channels within the band simultaneously. This way, more
information can be transmitted in a shorter duration of time than what is
achievable with older methods of transmission.

One of the configurations that have been around for a number of years is
the integrated services digital network, or ISDN. This network design can be
used to relay voice and data over copper telephone lines. This may not be the
fastest option in fashion today; however, it does make it possible to access the
Internet without the requirement of a high-speed connection or a lot of resources.
Another common example is the asynchronous transfer mode, referred
to in the telecommunications world as ATM. This option is much quicker than
ISDN and has proven to be extremely handy for companies relying heavily on
the Internet and electronic communications.

Asynchronous Transfer Mode, (ATM), is a network technology based on
transferring data in cells or packets of a fixed size. The cell used with ATM is
smaller compared to units used with older technologies. This size of the cell
allows for an advantage—ATM equipment can transmit video, audio, and
computer data over the same network, and guarantee that no single type of
data clutters the line.

Some people opine that ATM is the definitive answer for the Internet
bandwidth problem; others and not so confident. ATM creates a fixed or route
between two points whenever data transfer begins. This differs from TCP/IP,
where messages are divided into packets and each packet can take a different
route from source to destination. This difference makes it easier to track and bill
data usage across an ATM network, but it renders it less adaptable to sudden
increases in network traffic.

Integrated Service Digital Network

Integrated Service Digital Network, (ISDN), is the original high-speed Internet
service. It sparked the high-speed Internet development between service
providers during the 1990s and, of course, revolutionized Internet use. Much
like its predecessor, the dial-up Internet service, ISDN utilizes a phone line. In
fact, it set the standard for telephone data service.

ISDN Internet service was the improvement upon dial-up, and it also paved
the way for DSL and cable-modem Internet service thereafter. It can be
considered the step of Internet evolution that lies between dial-up and DSL/
Cable. Modernizing Internet use and bringing high-speed access inside the
home, ISDN became the standard by which rival broadband Internet service
providers competed. Although ISDN Internet service still exists, like the dial-up
connection it is being replaced by faster and cheaper services that the broadband
companies are providing. Regardless, broadband high-speed Internet service
is still compared with ISDN today, since they both represent the benchmark of
their times.

ISDN Internet service is basically a telephone-based network system that
operates by a circuit switch, or dedicated line, and is capable of transmitting
data and phone conversations digitally over normal telephone wires. This makes
it both faster and of higher quality than dial-up Internet service. During the 1990s
this revolutionized the way people did business. No longer would you have to
miss a call in order to access your Internet, or shut down the Internet to make a
telephone call. As such, ISDN Internet service made video teleconferencing not
only possible, but very popular as well.

There are two different types, or lines, of ISDN Internet service.

• The first is a basic rate ISDN line. Called a Basic Rate Interface
(BRI), this line has two data, or bearer, channels that operate at 64
kbit/sec. Two or more ISDN-BRI lines can be combined as well,
yielding speeds of 256 kbit/sec. It is common to combine these lines
for video conferencing use or for transmitting data at higher speeds.

• The second type of ISDN line is called a primary rate line, or Primary
Rate Interface (PRI). This line had 23 bearer channels and has a
total speed of 1,544 kbit/sec. It is used mostly for telephone
communication rather than data transmission, particularly within
companies that have large, private telephone exchange systems
operating inside their business.

The advantages of having ISDN Internet service definitely lies in the data
lines themselves. Not only do you have constant data speed via these lines,
each bearer channel runs at 64 kbit/sec with the ability to be combined to reach
greater speeds. ISDN Internet serviced also facilitates multiple data transmission,
so telephone calls and data downloading are no longer mutually exclusive. The
disadvantages, however, is that the digital clarity of ISDN voice communication
and its speedy data transmission come at an extra cost. ISDN is billed like a
phone line, but with an extra cost for service. Although its operational distance
from the ISDN central office is greater than that for DSL, its terminal adaptor
(similar to a modem) costs more than DSL or cable modems. While this
equipment and service continue to remain exorbitant, it is leaving the way open
for other Internet services to share the marketplace.

Frame Relay

Frame Relay is a digital connection-oriented data service that sends packets of
data, called frames, over the network. This frame of data is transmitted through
the network and checked for errors. Frame Relay is designed for cost-efficient
data transmission for intermittent traffic between local area networks (LAN-to-
LAN) and between end-points in a wide area network (WAN). It is a data network
service bundled with leased line access for transmitting data between remote
networks. Frame Relay is a digital packet network service that provides all the
features and benefits of a dedicated network service without the expense of
multiple dedicated circuits. This data is carried in the form of packets and given
an ID on a per packet basis. It is then sent across the network in a very efficient
way. In a Frame Relay network, circuits are connected to a packet switch within
the network that ensures that packets are routed to the correct location. Frame
Relay is a digital dedicated service that is leased from a carrier. It is a switched
service.

Application-level security

• Web applications can be protected from ‘SQL Injection Attacks’ where
the attacker enters SQL commands into Web form input fields or URL
query strings to try to manipulate the SQL statement being sent to and
from the database. To avoid SQL injection attacks, the following methods
should be used:

o Use of queries or stored procedures to access a database as opposed
to using string concatenation

o Limitation the amount of characters in Web form input fields and
URL query strings to a proper amount

o Validate text input and URL query strings for improper characters
(e.g. apostrophe, dash)

o Do not display errors to the user that contain information about the
database or actual source code

• ASP.Net Web applications must be secured from ‘Cross Site Scripting’
(XSS) attacks. To accomplish this, developers must ascertain that the
ASP.Net ‘validateRequest’ Page directive is set to True (the default setting)
so that users of the application are prevented from entering HTML or
JavaScript code into Web forms.

Data transmission security

When confidential or important data is passed between the user and the Web
server, the HTTPS (SSL over HTTP) protocol will be used. SSL provides server
authentication, data encryption (‘over the wire’), and data transmission integrity.
The SSL certificate used on the Web server will need to be ‘trusted’ by the Web
browsers listed on the CDE’s Minimum Web Browser Requirement Web page.

Database security

• Web applications should use minimum privileges to access database
objects (i.e. tables, views, stored procedures). For instance, if the Web
application needs read-only access to a specific database table, the
database permissions should be set accordingly than giving the Web
application ‘admin or owner’ rights to the entire database.
• Individual database fields storing confidential or sensitive data (for
example, passwords, social security number) must be stored using
encryption techniques.

Password requirements

Passwords whether created by application developers, administrators, or users
must meet or be required through validation to meet all of the following
parametres. Passwords must:
• Be at least eight characters in length.
• Contain characters from three of the following four categories:
o Uppercase letters (A though Z)
o Lowercase letters (a through z)
o Numbers (0 through 9)
o Special characters (!, @, #, $, ^, &, *, -, =, _, +, ?)
• Not be the same as the logon or user name.

Special note:-

• Common Gateway Interface (CGI): Process used to share the data
between the web server and the web browser

• Hubs: Central locations in networks that bring media segments together

• Repeaters: devices that operate at the physical layer of the OSI model,
whose basic purpose is to extend the distance of LAN

• Bridge: Device that is attached to two or more LANs to create an extended
LAN

• Router: Operates at the third network layer of ISO-OSI model and
connects more than two different types of network

• Network cables: Medium through which information generally travels
from one node/network device to another

• Fibre optic cable: Cable that consists of a centre glass core surrounded
by several layers of protective materials, and which transmits light rather
than electronic signals

• Wireless LANs: LANs that use high frequency radio signals, infrared
light beams, or lasers to communicate between the workstations, servers,
or hubs

• Line-of-sight communication: Communication through unblocked direct
line between the workstation and the transceiver










Saturday, 25 June 2016

Network Infrastructure for E-Commerce

Network Infrastructure for E-Commerce

 Structure

1 Introduction Objectives

2 Local Area Network (LAN)

3 Ethernet: IEEE 802.3: Local Area Network (LAN) Protocols

4 Wide Area Network (WAN)

5 The Internet

6 TCP/IP Reference Model

7 Domain Names

8 Hyper Text Markup Language (HTML)

9 Summary

10 Glossary


1 Introduction 

In this unit, you will be learning about the network
infrastructure for e-commerce, including topics such as Local Area Network
(LAN), Ethernet, Wide Area Network (WAN), the Internet, TCP/IP Reference
Model, Domain Names, and Hyper Text Markup Language (HTML).
You may know by now that that all the services of e-commerce work on
the Internet which is known as the ‘network of networks’. Computer network is
a collection of more than two computers, which are connected together to share
information and computer peripherals. The key word in the definition is ‘sharing’,
the main function of computer networking. The ability to share information
efficiently is what gives computer networking its power and appeal. Through
the efforts of all major factors involved—the sharing of time, talent, and
resource—the primary goal of computer networking is to reduce resources.

Objectives

After studying this unit, you should be able to:
• Give examples of the importance of Local Area Network (LAN)
• Generalize the workings of Ethernet (IEEE 802.3)
• Demonstrate the working of Wide Area Network (WAN)
• Summarize the importance of the Internet
• Evaluate the TCP/IP Reference Model
• Discuss the functioning of domain names
• Summarize the highlights of Hyper Text Markup Language (HTML)


2 Local Area Network (LAN)

A LAN (refer to Figure 2.1) covers only a limited geographically area ranging
from 0 to 2 Km, such as organizations, home, buildings. In a local area network,
nodes are connected in a network and operating systems are installed on them.
In this type of networking, generally, Cat 5 cable (8 wires) is used, meaning the
connection is done through wire. However, there is another option of connecting
LAN, which is WLAN, where connection is possible without wires. LAN stores
the system and application software that can be shared by the computers to
other computers and peripherals. Most LANs connect nodes and computers.
They have their own CPU for executing programs. The importance of LAN in an
organization is very high because users can easily communicate to each other
through LAN and they can share resources such as printers, memories, database
and other peripherals of network.

                                                     Figure 2.1 Local Area Network

Metropolitan Area Network (MAN): 

Metropolitan Area Network or MAN (referto Figure 2.2) occupies a larger area compared to LAN, such as a town or a university/organization premises (which is spread between 05 km to 20 km). It
incorporates a number of LANs to form a network. This bulky network comprises of an optical fibre setup. MAN connects the computer system, other resources and some times local area network to a range from 5 to 50 km, meaning it can effectively cover a town. It uses high speed data transfer mediums like fibreoptic, coaxial cable, etc.

Figure 2.2 Metropolitan Area Network

3 Ethernet: IEEE 802.3: 

Local Area Network (LAN) Protocols IEEE 802.3 is covered by a small area (Local Area Network). It refers to the family of Ethernet Protocols. There are two methods of process in Ethernet standard: first is half-duplex and second is a full-duplex mode. In the half duplex mode, data are transmitted using the popular Carrier-Sense Multiple Access/Collision Detection (CSMA /CD) protocol on a shared medium. The main disadvantages of the half-duplex are effectiveness and space limitation, in which the link distance is limited by the minimum MAC frame size. This restriction reduces the effectiveness drastically for high-rate transmission. Therefore, the carrier extension technique is used to make sure that the minimum frame size of 512 bytes in Gigabit Ethernet gets a reasonable link distance. Four data rates are currently defined for operation over optical fiber and twisted-pair cables. These are:
(i) 10 Mbps - 10Base-T Ethernet (IEEE 802.3)
(ii) 100 Mbps - Fast Ethernet (IEEE 802.3u)
(iii) 1000 Mbps - Gigabit Ethernet (IEEE 802.3z)
(iv) 10-Gigabit - 10 Gbps Ethernet (IEEE 802.3ae)

4 Wide Area Network (WAN)

A WAN (refer to Figure 2.3) crosses almost whole geographic areas, such as
nations. WANs often connect n number of smaller networks. Communication
medium of this networks are telephone line, satellite links, microwave, etc. In
other words, a Wide Area Network (WAN) is a bulky communication of network
that consists of a group of LANs and other different networks (refer to Table
2.1). WAN generally crosses a big geographical area, and can be used to connect
cities, states, or even countries.

                                                       Figure 2.3 Wide Area Network

 

                                                         Table 2.1 Wide Area Network

5 The Internet

The Internet is the network of networks or a means of connecting a computer or
network to any other computer or network in the world, through specific network
components and servers. When two computers are connected over the Internet,
they can exchange all types of information, such as video, computer programs,
text, graphics and voice.
 It is not possible for one to make an Internet. Still, organizations around
the world over collaborate in its functioning and development. The high-speed,
fibre-optic cables (called backbones) through which the bulk of the Internet
data travels are owned by telephone companies in their respective countries.
The Internet grew out of the Advanced Research Projects Agency’s Wide Area
Network (then called ARPANET) recognized by the US Department Of Defense
in 1960s for collaboration in military research among business and government
laboratories. Later universities and other US institutions connected to it. This
resulted in ARPANET growing beyond everyone’s expectations and acquiring
the name ‘Internet’. The development of hypertext based technology (called
World Wide web, WWW, or just the Web) provided means of displaying text,
graphics, and animations, and easy search and navigation tools that has triggered
the Internet’s explosive worldwide growth.

6 TCP/IP Reference Model

The builder of the TCP/IP protocol group created their own architectural model
to help describe its components and functions. This model goes by different
names, including the TCP/IP model, the DARPA model (after the agency that
was largely responsible for developing TCP/IP) and the DOD model (after the
United States Department of Defense, the “D” in “DARPA”).
In spite of the model you use to represent the function of a network—and
regardless of what you call that model—the functions that the model representsare pretty much the same. This means that the TCP/IP and the OSI models are
relatively same in nature even if they do not carve up the network functionality
pie in precisely the same way. There is a fairly natural correspondence between
the TCP/IP and OSI layers; it just isn’t always a ‘one-to-one’ relationship. Since
the OSI model is used so widely, it is common to explain the TCP/IP architecture
both in terms of the TCP/IP layers and the corresponding OSI layers.

                                              Figure 2.4 TCP/IP Layer Communications

 

Characteristics of Gateways

• Gateway routers are used to connect dissimilar LANs and perform all the
functions of bridges and routers. It operates as all seven layers of the
OSI Reference Model.
• Gateways provide full protocol conversion from one proprietary LAN
technology to another.
• Gateway uses higher layers of the OSI model, perhaps through layer 7,
the application layer.

                             Figure 2.5 TCP/IP Reference Model for Communication

 

The TCP/IP model (refer to Figure 2.5) has four layers that match six of
the seven layers in the OSI Reference Model. The TCP/IP model does not
address the physical layer, which is where network component and hardware
devices reside. The next three layers—network interface, the Internet and (hostto-
host) transport—correspond to layers 2, 3 and 4 of the OSI model. The TCP/
IP application layer conceptually ‘blurs’ the top three OSI layers. It is important
to note that some people consider certain aspects of the OSI session layer to
be possibly part of the TCP/IP host-to-host transport layer.

7 Domain Names

As numeric strings are hard to remember, which make up the IP address, all
servers on the Internet also have human-readable names, called domain names.
For instance, it is easier for us to remember www.sriram.ac.in than
134.45.56.178. An organization might block all access to certain domain names
or allow access only to specific domain names. A domain name always contains
two or more components separated by ‘dots’; for example microsoft.com,
tcs.co.in, etc. The last portion of the domain name is the top label domain name
and describes the type of organization. The major types of top label domain
names are:

com : represents commercial entities
org : represents miscellaneous organizations that do not fit any other
         category, such as non-profit group.
edu : represents educational institutions
net : represents organizations directly involved in Internet operations
gov : represents the United States Federal Government Entities
mil : represents the military of the United States

Country Codes: 

This is a two-letter abbreviation for a particular country; for
example ‘in’ represents India, ‘uk’ represents the United Kingdom, and ‘fr’
represents France.

8 Hyper Text Markup Language (HTML)

HTML is a method where ordinary text can be converted into hypertext. It is a
set of special codes included to control the layout and appearance of the text.
Technically, HTML is not a programming language. It combines instruction within
data to tell a display program called browser, how to render the data that the
document contains.
The following is the structure of HTML:
<html>
<head> about authors </head>
<title> First Page </title>
<body>
<h1> Hello this my Home page!
</body>
</html>

< HTML>: 

This tag defines the top most elements, identifying it as an HTML document.

<Head>:

 This tag contains information about your HTML file.

<Title>: 

This tag is nested within the head tag. It identifies your page to the
rest of the world. Output of tag is displayed on your browser’s title bar but does
not appear as part of the page.

<body>:

This is a body part of your HTML web page. Within this tag all the
various tag is used. Every tag has prespecified attributes and there possible
values.

Levels of Heading: 

Six different levels up to <h1>,<h2>,<h3>,<h4>,
<h5>,<h6>

Adding a comments:<! - - and ends with — >

Creating List: 

There are two types of list : ordered list and unordered list.

Ordered List:

<ol>
<li> MS-Windows
<li> MS-Excel
<li> MS-Word
</ol>

Unordered List:

<ul>
<li> MS-Windows
<li> MS-Excel
<li> MS-Word
</ol>

Creating Definition Lists:

A glossary consists of three tag elements:
<dl>: Define the List
<dt>: Define term
<dd>: Define the definition

Inserting Images:

To insert images in your page use <img> tag as follows:
<img src=”flower.gif” height=”100" width=”100" border=”1">

Linking the HTML page:

To link one HTML to another use anchor tag as follows:
<a href = “first.html” > Click me </a>

Setting font size:

We can set font of text by using font tag as follows:
<font face=”Arial” size=”4" color=”red”>

Marquee tag:

This tag offers some movement from up, down, left, right of given text:
<marquee direction=”up” bgColor=”red” behavior=”scroll”> MY Moving Text
is displayed here </marquee>

Table tag:

Page layout on the web has to be set by using tables because HTML has no
method to set margin or columns.
Example:
<table border=”1" cellspacing=”6" cellpadding=”6"
width=”80%”>
<tr> <th> Roll no </th>
<th> Name </th>
</tr>
<tr> <td> 34 </td>
<td> Pooja </td>
</tr>
<tr> <td> 35 </td>
<td> Priya </td>
</tr>
</table>

Form tag:

Form tag is an important element for doing online business. Forms are necessary
for gathering user information, conducting surveys, or even providing interactive
services. Forms are supported by both client and server for successful
implementation. A number of features are available for building forms, including
text boxes, check boxes, radio buttons, submit buttons and text area. A user
can enter text, selects items from a list, check boxes, and then submit the
information to the server. A program on the server then interprets the data acts
on it appropriately, either by returning information in hypertext form, downloading
a file, or electronically notifying the company of your order.
The corresponding coding of above HTML form is given below:

<form method=”post” action=”/cgi-bin/purchase.asp”>

Item Name: <input type=”text” name=” item_name” value=” CD”> <br>
Item Code: <input type=”text” name=”code” value=”CD_Mos_2" > <br>
Number of Quantity: <input type=”text” name=” Qty” value=”4" > <br>
           <input type=”submit” value=”submit”>

Generating forms in HTML is only half the task. The harder part is to
decode the input data submitted from the form. All the programs use data
submitted from the form. All the programs that use data submitted from an
HTML form must conform to the specification called Common Gateway Interface
(CGI).
The important aspect of web server development is application gateway,
more specifically, CGI, which is a specification for communicating data between
an information server, in this case, Web server, and another application. CGI is
used wherever the web server needs to send or receive data from another
application, such as a database. A CGI script is a program that negotiates the
movement of data between the Web server and an outside application.
Use of CGI is to pass data, filled in by a user in an HTML form, from the
web server to a database. Data also can be returned to the user’s browser via
CGI. CGI scripts may be written in high level language such as C and Perl,
because they can run so many platforms.

9 Summary

Let us recapitulate the important concepts discussed in this unit:
• Computer network is a collection of more than two computers, which are
connected together to share information and computer peripherals.
• A LAN covers only a limited geographically area ranging from 0 to 2 Km,
such as organizations, home, buildings.
• MAN occupies a larger area compared to LAN, such as a town or a
university/organization premises (which is spread between 05 km to 20
km) is termed as Metropolitan Area Network or MAN.
• IEEE 802.3 is covered by small area (Local Area Network). It refers to the
family of Ethernet Protocols. We have two methods of process in Ethernet
standard: first is half-duplex and second is a full-duplex mode.
• A Wide Area Network (WAN) crosses almost whole geographic areas,
such as nations. Communication medium of this networks are telephone
line, satellite links, microwaves, etc.
• The Internet is the network of networks and a means of connecting a
computer or network to any other computer or network in world through
specific network components and servers.
• The builder of the TCP/IP protocol group created their own architectural
model to help describe its components and functions. This model goes
by different names, including the TCP/IP model, the DARPA model (after
the agency that was largely responsible for developing TCP/IP) and the
DOD model (after the United States Department of Defense, the “D” in
“DARPA”).
• HTML is a method where ordinary text can be converted into hypertext. It
is a set of special codes included to control the layout and appearance of
the text. Technically, HTML is not a programming language.

10 Glossary

• Computer network: 

Collection of more than two computers, which are
connected together to share information and computer peripherals

• LAN: 

Supplies networking capability to a group of computers in close
proximity to each other such as in an office building, a school, or a home

• MAN: 

Metropolitan Area Network; covers a wider area than LAN

• WAN: 

Network that crosses almost whole geographic area, such as nation
and all over world; WANs often connect n number of smaller networks

• The Internet: 

Network of networks and a means of connecting a computer
or network to any other computer or network in the world through specific
network components and servers

• HTML: 

Method where ordinary text can be converted into hypertext; it is
a set of special codes included to control the layout and appearance of
the text

• Protocol: 

A set of rules that control the way data is sent between
computers

• Architecture: 

The design and structure of a computer system