Infrastructure for EC Sistem e - Business

advertisement
Infrastructure for EC
Sistem e-Business
(MG-652)
Jurusan Manajemen
Agenda
•
•
•
•
•
•
•
•
•
•
Learning Objectives
A Network of Networks
Internet Protocols
Web-Based Client/Server
Internet Security
Selling on the Web
Chatting on the Web
Multimedia Delivery
Analyzing Web Visits
Managerial Issues
05 September 2002
Chandra Wibowo W.
2
TCP / IP
Network of Networks
Domain Names
Internet Client / Server
Applications
Internet Protocols
Internet2 and
Next Generation Internet
Web-Based
Client Server
Cornerstones of Security
Hypertext Transport Protocol
Web Browsers
Web Servers
Encryption
Digital Signatures
Digital Certificates and
Certificate Authorities
Secure Socket Layer
Internet
Security
Infrastructure
for
eBusiness
Functional Requirements
Outsorcing vs Insourcing
Selling on the Web
Electronic Catalogs and
Merchant Servers
Electronic Commerce Suites
Secure Electronic
Transactions
Webcasting
Firewall
Virtual Private Networks
Multimedia Delivery
Bandwidth Requirements for
Streaming Audio and Video
Intenet Telephones
Chatting on the Web
05 September 2002
Analyzing Web Visits
Chandra Wibowo W.
3
Learning Objectives
•
•
•
•
•
•
Describe the protocols underlying Internet client/server
application.
Compare the functions and structures of Web browsers and
servers.
Discuss the security requirements of Internet and EC applications
and how these requirements are fulfilled by various hardware and
software systems.
Describe the functional requirements for online selling and what
the specialized services and servers are that perform these
functions.
Describe the business functions that Web chats can fulfill and list
some of the commercially available systems that support chat.
Understand the ways in which audio, video, and other multimedia
content are being delivered over the Internet and to what
business uses this content is being applied.
05 September 2002
Chandra Wibowo W.
4
A Network of Networks
•
•
The Internet is a network of thousands of interconnected networks.
Included among the interconnected networks are:
•
The backbones are run by the network service providers (NSPs), including
companies like MCI, Sprint, UUNET/MIS, PSINet, and BBN Planet. Each
backbone can handle over 300 terabytes per month.
The delivery subnetworks are provided by the local and regional Internet
Service Providers (ISPs). The ISPs exchange data with the NSPs at the
network access points (NAPs).
See figure 11.4 Internet Network Architecture
The paths traversed by the packets are determined by special computers
called routers. The routers have updateable maps of the networks on the
Internet that enable them to determine the paths for the packets. Cisco
(www.cisco.com) is the premier provider of high-speed routers.
•
•
•
1. The interconnected backbones that have international reach.
2. A multitude of access/delivery subnetworks.
3. Thousands of private and institutional networks connecting various organizational
servers and containing much of the information of interest.
05 September 2002
Chandra Wibowo W.
5
Internet Network
Architecture
ISP
ISP
ISP
ISP
NAP
NAP
ISP
ISP
NAP
NAP
ISP
ISP
ISP
ISP
05 September 2002
Chandra Wibowo W.
6
Internet Protocols
• The problem of internetworking is how to
build a set of protocols that can handle
communications between any two (or more)
computers, using any type of operating
system, and connected using any kind of
physical medium.
• A protocol is a set of rules that
determines how two computers
communicate with one another over a
network.
05 September 2002
Chandra Wibowo W.
7
The protocols around which the Internet was designed embody
a series of design principles:
• Interoperable – the system supports computers and
software from different vendors. Æ Not required to buy
specific systems.
• Layered – the collection of Internet protocols works in
layers with each layer building on the layers at lower levels.
See figure 11.5.
• Simple – each of the layers in the architecture provides
only a few functions or operations. Æ Application
programmers are hidden.
• End to end – the Internet is based on “end-to-end”
protocols. This means that the interpretation of the data
happens at the application layer (i.e., the sending and
receiving side) and not at the network layers. Æ It is much
like the post office.
05 September 2002
Chandra Wibowo W.
8
TCP / IP Architecture
Application Layer
FTP, HTTP, Telnet, NNTP
Transport Layer
Transmission Control Protocol
(TCP)
User Datagram Protocol (UDP)
Internet Protocol (IP)
Network Interface Layer
Physical Layer
05 September 2002
Chandra Wibowo W.
9
TCP/IP
•
•
•
•
•
The protocol that solves the global internetworking problem is the
Transmission Control Protocol/Internet Protocol (TCP/IP). This
mean that any computer or system connected to the Internet run
TCP/IP. TCP/IP is two protocols – TCP and IP – not one.
The request or response on the Internet must be divided into
packets that are labeled with the addresses of the sending and
receiving computers. Æ This is where IP comes into play. The IP
formats the packets and assigns addresses.
The current version of IP is version 4 (IPv4) Æ 32 bits.
The next generation Internet Protocols (IPng) is version 6 (IPv6)
Æ 128 bits.
See table 11.1 Internet Client/Server Applications.
05 September 2002
Chandra Wibowo W.
10
Internet Client / Server
Architecture
Application
Protocol
Purpose
E-mail
Simple Mail Transport Protocol
(SMTP),
Post Office Protocol version 3
(POP3),
Multipurpose Internet Mail
Extensions (MIME)
Allows the transmission of text
messages and binary attachments
across the Internet
File Transfer
File Transfer Protocol (FTP)
Enables files to be uploaded and
downloaded across the internet
Chat
Internet Relay Chat Protocol (IRC)
Provides a way for users to talk to one
another in real time over the
internet. The real time chat groups
are called channels
UseNet
Newsgrou
ps
Network News Transfer Protocol
(NNTP)
Dicussion forums where users can
asynchronously post messages and
read messagess posted by others
World Wide
Web
(WWW)
HyperText Transport Protocol
(HTTP)
Offers access to hypertext documents,
executable programs and other
internet resources
05 September 2002
Chandra Wibowo W.
11
Web-Based
Client/Server
•
The World-Wide-Web (WWW) has come to dominate the traffic
on the Internet. Æ The majority of EC applications are Web
based.
1. The clients are called Web browsers.
2. The servers are called Web servers.
•
Web browsers and servers need a way:
•
•
To fulfill these needs, we use the URL and the HTTP.
URL: Universal Resource Locators are ubiquitous, appearing on the
Web, in print, on billboards, on television, and anywhere else a
company can advertise. Æ “www.?????.com
HTTP: HyperText Transfer Protocol. Users navigate from one
page to the another by clicking on hypertext links within a page.
•
1. To locate each other so they can send requests and responses back and
forth.
2. To communicate with one another.
05 September 2002
Chandra Wibowo W.
12
WEB BROWSERS
•
The two major browsers in the market
are:
1. Netscape Communicator 4.77 and 6.01.
2. Microsoft Internet Explorer 5.0 (IE5.0),
IE5.5, and IE6.0.
•
The problem is that IE only works with
Windows and Macintosh, while Netscape
is open to most of the major platforms.
05 September 2002
Chandra Wibowo W.
13
WEB SERVERS
•
A Web server is not a hardware platform; it is a software program.
•
The primary function of all these programs is to service HTTP requests
are:
–
–
UNIX Æ http daemon.
Windows NT Æ http service.
–
–
Provide access control.
Run scripts and external programs to either add functionality to Web documents
or provide real-time access to databases and other dynamic data.
Enable management and administration of both the server functions and the
contents of the Web site.
Log transactions that the users make.
–
•
–
Web servers can be distinguished by:
–
–
–
–
Platforms – Unix platform, Windows NT, and others.
Performance – various servers, speed, etc.
Security – filtering IP address, encrypted data exchange, etc.
Commerce – support online selling and buying (like shopping cart and catalog
services).
05 September 2002
Chandra Wibowo W.
14
COMMERCIAL WEB
SERVERS
• Apache – www.apache.com this server runs
on Windows NT.
• Microsoft Internet Information Server –
Windows NT and ASP (Active Server
Pages). IIS is easy to install and
administer.
• Netscape Enterprise Server – runs on
both Unix and Windows NT. The ease of
installation and maintenance rivals IIS.
05 September 2002
Chandra Wibowo W.
15
WEB SERVER
USAGE SURVEY
• Netcraft (www.netcraft.com) has
been conducting monthly survey to
determine the market share of the
various servers (by numbers
connected to the Internet). Æ See
table 11.3 Netcraft Survey.
05 September 2002
Chandra Wibowo W.
16
Internet Security
CORNERSTONES OF SECURITY
The National Computer Security Association (NCSA) has
identified four cornerstones of secure EC, included are:
• Authenticity – Is the sender (either client or server of a
message who they claim to be?
• Privacy – Are the contents of a message secret and only
known to the sender and receiver?
• Integrity – Have the contents of a message been modified
(intentionally or accidentally) during transmission?
• Nonrepudiation – Can the sender of a message deny that
they actually sent the message? Æ The key to
nonrepudiation is a “signature” that makes it difficult to
dispute.
05 September 2002
Chandra Wibowo W.
17
ENCRYPTION
•
•
One way to ensure the confidentially and privacy of messages is to
make sure that even if they fall into the wrongs hands they cannot
be read. Æ Cryptography comes into play.
All cryptography has four basic parts:
•
•
•
See figure 11.6 Synchronous Private Key Encryption.
See figure 11.7 Public Key Encryption.
See figure 11.8 Digital Envelope.
1. Plaintext – the original message in human-readable form.
2. Ciphertext –the plaintext message after it has been encrypted into
unreadable form.
3. Encryption algorithm – the mathematical formula used to encrypt the
plaintext into ciphertext and vice versa.
4. Key – the secret key used to encrypt and decrypt a message.
Different keys produce different ciphertext when used with the same
algorithm.
05 September 2002
Chandra Wibowo W.
18
Synchronous Private
Key Encryption
Private Key
Message
Text
Encryption
Private Key
Ciphered
Text
Sender
05 September 2002
Decryption
Message
Text
R e c e ive r
Chandra Wibowo W.
19
Public Key Encryption
Public key of
Recipient
Message
Text
Encryption
Private Key of
Recipient
Ciphered
Text
Decryption
Sender
05 September 2002
Message
Text
R e c e ive r
Chandra Wibowo W.
20
Digital Envelope
Session
Key
Public key of
Recipient
Private key of
Recipient
Session
Key
Digital Envelope
Session Key
Message
Text
Encryption
Session Key
Ciphered
Text
Decryption
Sender
05 September 2002
Message
Text
Receiver
Chandra Wibowo W.
21
DIGITAL SIGNATURES:
AUTHENTICITY AND
NONDENIAL
• How can you ensure that a message is actually
coming from the person you think sent it?
• Similarly, how can you ensure that a person has no
way of denying he/she sent a particular message?
• One part of the answer is a digital signature –
the network equivalent of a personal signature
that cannot be forged. Digital signatures are
based on public key encryption.
• See figure 11.9 Digital Signature.
05 September 2002
Chandra Wibowo W.
22
Digital Signature
Public key of
Recipient
Message
Text
Encryption
Private Key of
Recipient
Ciphered
Text
Decryption
Message
Text
Signature
S ig n atu re
Sender
Receiver
Private Key of
Sender
05 September 2002
Public Key of
Sender
Chandra Wibowo W.
23
DIGITAL CERTIFICATES
AND CERTIFICATE
AUTHORITIES (CAs)
• If you have to know someone’s public key
to send them a message, where does it
come from and how can you be sure of
their actual identity. Æ Digital
Certificates verify that the holder of
public and private key is who they claim to
be.
• Digital certificates are issued by third
parties called certificate authorities
(CAs). Æ VeriSign (www.verisign.com).
05 September 2002
Chandra Wibowo W.
24
SECURE SOCKET LAYER
• SSL encrypts communications
between browsers and servers.
• S-HTTP Æ alternative protocol.
• SSL is a protocol that operates at
the TCP/IP layer. Æ SSL version 3.
05 September 2002
Chandra Wibowo W.
25
SECURE ELECTRONIC
TRANSACTIONS
• The SSL is not designed to handle any of the
steps beyond the transmission of the card
number.
• A cryptographic protocol that is designed to
handle complete transaction is SET, Æ jointly
developed by VISA, Mastercard, Netscape, and
Microsoft.
• The SET protocol provides authentication,
confidentiality, message integrity, and linkage,
and it relies on public and private keys for the
consumer and the merchant.
05 September 2002
Chandra Wibowo W.
26
FIREWALLS: ACCESS
CONTROL
• A firewall is a network node consisting of both hardware
and software that isolates a private network from a public
network.
• The are two basic types of firewalls:
1. Dual homed gateway – a special server (bastion gateway)
connects a private internal network to the outside Internet.
The gateway server has two network cards, so that data
packets reaching one card are not relayed to the other card.
Special software (proxies) run on the gateway server and pass
repackaged packets from one network to the other. There is a
proxy for each Internet service. See figure 11.10 Bastion Host
Gateway.
2. Screen host gateway – a network router is used to control
access to the bastion gateway. The router ensures that all
inbound traffic must pass through the bastion gateway. See
figure 11.11 Screened Subnet Gateway.
• Firewall systems can be created from scratch.
05 September 2002
Chandra Wibowo W.
27
VIRTUAL PRIVATE
NETWORKS
• An expensive alternative is a Virtual
Private Network (VPN).
• A VPN combines encryption,
authentication, and protocol tunneling to
provide secure transport of private
communications over the public Internet.
See table 11.4 VPN products and providers.
05 September 2002
Chandra Wibowo W.
28
Selling on the Web
•
FUNCTIONAL REQUIREMENTS
•
eCOMMERCE SOLUTIONS: OUTSOURCING vs INSOURCING
•
ELECTRONIC CATALOGS and MERCHANT SERVERS
•
eCOMMERCE SUITES
The TCP/IP, Web browsers, commercial Web servers, and firewalls
provide an open foundation for creating Web sites that can easily
support marketing and service activities.
Smaller or medium-sized companies with few IT staff and smaller
budgets are best served by outside contractors.
Electronic catalogs are the virtual equivalents of traditional product
catalogs. See figure 11.12. Merchant Server Architecture.
eCommerce suites offer merchants greater flexibility, specialization,
customization, and integration in supporting complete front- and backoffice functionality. See figure 11.13. Open Market EC Server
Architecture.
05 September 2002
Chandra Wibowo W.
29
Merchant Server
Architecture
Store HTML
Pages
3 rd Party
Applications
Merchant
Server
Internet
W eb Browser
Financial
Network
W eb Server
Database
Catalog Order
05 September 2002
Chandra Wibowo W.
30
Open Market eBusiness
Server Architecture
In te r n e t
W eb B row s er
C a ta lo g
A p p lic a tio n
C a ta lo g
D a ta b a s e
C u s to m e r
M a n a g e m e n t,
R e g is tr a tio n
P r o f ile s , S e r vic e
C u s to m e r
D a ta b a s e
O r d e r C a p tu r e ,
C o m p le tio n
O rd er
D a ta b a s e
W e b S e r ve r
F u lf illm e n t
S ys te m s
P a ym e n t
P r o c e s s in g ( S E T
& P u rc h as e
O rd er)
P a ym e n t
D a ta b a s e
F in a n c ia l
N e tw o r k
05 September 2002
Chandra Wibowo W.
31
Chatting on the Web
Online forums and chat groups are now being used for a variety
of purposes in EC.
• Communication centers – businesses whose primary service
is a virtual meeting place where communications can take
place among the participants.
• Customer service – a number of customer service sites now
offer online support where customers can converse with
help-line staff and other customers.
• Community discussion – several EC sites provide forums and
chat services with a marketing eye toward developing a
community of loyal users, followers, and advocates.
05 September 2002
Chandra Wibowo W.
32
Multimedia Delivery
Provide multimedia content and information for additional interactive
services.
• WEB CHASTING
•
•
Webcasting is a term used to describe Internet-based broadcasting of
audio and video content.
BANDWIDTH REQUIREMENTS for STREAMING AUDIO and
VIDEO
Bandwidth refers to the speed with which content can be delivered.
INTERNET TELEPHONES
Internet phones are not real telephones – they are programs that let you
talk with other people using the Internet. Æ The main attraction of
Internet telephones is cost.
Internet phones come in three versions:
1. PC-to-PC
2. PC-to-Phone
3. Phone-to-Phone
05 September 2002
Chandra Wibowo W.
33
Analyzing Web Visits
• Both B2C and B2B Web sites require a
through understanding of the usage
patterns of their sites – the who, what,
where, and when.
• Every time a user accesses a Web server,
the server logs the transaction in a special
access log file.
05 September 2002
Chandra Wibowo W.
34
Managerial Issues
1.
2.
3.
4.
5.
It is the business that count – When one thinks of the
Web, one immediately thinks of the technology.
In house or outsource – large scale companies should be
built in-house. Small companies should using the
outsourcing services.
Analyzing the data – One advantage of online marketing
and selling is that an automatic record is made of
everyone who visits your Web site.
Security – Hackers, Virus, etc.
Evolving – the web is still in its infancy. The underlying
standards, protocols, and governance continue to undergo
rapid change.
05 September 2002
Chandra Wibowo W.
35
Download