MOBILE COMMUNICATION AND INTERNET TECHNOLOGIES http://web.uettaxila.edu.pk/CMS/AUT2014/teMCITms/ Introductory Lecture COURSE ADMINISTRATION Instructor: Dr. Adeel Akram (adeel.akram@uettaxila.edu.pk) Course Coordinator: Mr. Munir Abbas (munir.abbas@uettaxila.edu.pk) Course web page: http://web.uettaxila.edu.pk/ Schedule Tuesdays 6pm to 9pm THE NEW INTERNET In the last few years, the Internet has moved beyond the three "classical" services of email, file transfer and remote login. This course covers emerging Internet multimedia services, their technical background and open issues in depth. The course will cover the following areas with reference to their applications over wireless communication infrastructure: Internet architecture review Multicast routing and address allocation Properties of real-time services QoS: Resource reservation and differentiated services Packet scheduling Audio and video coding Streaming audio and video Adaptive applications Internet telephony Media-on-demand and content distribution networks (CDNs) Conference control Mobility (mobile IP and other technologies) e-Commerce Pervasive Computing Internet of Things COURSE OBJECTIVE We aim to study existing Internet technologies that have evolved with the passage of time for provision of classical services to a level where they provide same services to a large number of users without compromising on performance, security, privacy and reliability. The course focusses on how internet services have been modified to provide similar services to mobile wireless users that were originally envisioned for the static wired clients. Discussion on new avenues that have emerged with the advent of newer wireless devices and communication platforms that will utilize internet technologies to serve mobile applications transforming at run time according to user’s demands. COURSE TEXT BOOK Management Information System 12th Edition Kenneth C. Laudon, Jane P. Laudon WHAT IS COMMERCE? Middle French, from Latin commercium, from com- (together)+ merc- (merchandise) (1537) “The exchange or buying and selling of commodities on a large scale involving transportation from place to place.” Buying and selling ( transactions ) Large scale ( scalability ) Transportation ( supply chain ) Every business process in the world must be re-engineered: “Can it be made electronic?” NEED TECHNOLOGY TO SUPPORT ALL OF THESE COMMERCE (8000 B.C.) BUYER FINDS SELLER SELECTION OF GOODS NEGOTIATION SALE PAYMENT DELIVERY INFORMATION PHYSICAL+ INFORMATION POST-SALE ACTIVITY ECOMMERCE SOME TECHNOLOGIES USED: SEARCH ENGINE ON-LINE CATALOG RECOMMENDER AGENT CONFIGURATOR SHOPPING BOT SOME INFORMATION GATHERED: BUYER FINDS SELLER SELECTION OF GOODS AGGREGATOR AUTOMATED AGENTS TRANSACTION PROCESSOR NEGOTIATION SEARCH BEHAVIOR BROWSING BEHAVIOR CUSTOMER PREFERENCES EFFECTIVENESS OF PROMOTIONS BARGAINING STRATEGIES PRICE SENSITIVITIES PERSONAL DATA SALE MARKET BASKET DATA INTERCHANGE CRYPTOGRAPHY PAYMENT E-PAYMENT SYSTEMS TRACKING AGENT INFORMATION PHYSICAL+ INFORMATION ON-LINE HELP BROWSER SHARING INTERNET TELEPHONY CREDIT/PAYMENT INFORMATION DELIVERY REQUIREMENTS DELIVERY ON-LINE PROBLEM REPORTS POST-SALE ACTIVITY CUSTOMER SATISFACTION FOLLOW-ON SALES OPPORTUNITIES THE ELECTRONIC ENTERPRISE ENTERPRISE RESOURCE PLANNING SCM S2S ERP Strategic Planning Collaborative SCM Demand Planning Collab. Planning Mfg. Exec. E-Mail WH Mgmt. Portal/ Extranet Trans. Mgmt. CUSTOMER RELATIONSHIP MANAGEMENT Distrib. Planning Supply Planning Product Mgmt. Mfg. Mfg. Planning Trans. Planning Web/ Intranet Employee Systems Finance Fact. HH Devices CRM IndustrySpecific Solutions Legacy Systems Svc. Auto. Order Mgmt. HR Voice (IVR, ACD) Logistics Marketing Auto. Sales Auto. Conf. Web Storefront Mobile Sales (Prod. CFG) Employee SS Field Service Collaborative CRM SUPPLY CHAIN MANAGEMENT E-Mail Operational EDI Closed-Loop Processing (EAI Toolkits, ETLM Tools, Embedded Mobile Agents) Conf. Direct Interaction DW KM/CM Finance. DM HR DM Cust. DM Analytical Order DM Prod. DM ACD = AUTOMATIC CALL DISTRIBUTOR CFG = CONFIGURATION DM = DATA MINING DW = DATA WAREHOUSE ETLM = EXTRACT, TRANSFORM, LOAD & MANAGE HH = HAND-HELD IVR = INTERACTIVE VOICE RESPONSE SOURCE: META GROUP INTERNET-CONNECTED SUPPLY CHAIN Wholesale Distributors Suppliers Manufacturers Supplier Exchanges Logistics Exchanges Logistics Providers Customers Customer Exchanges Virtual Manufacturers Contract Manufacturers Information Flow Goods Flow Logistics Providers SOURCE: AMR RESEARCH (2000) WHY E-COMMERCE? WHY NOW? Computers are faster 1973: 2013: 1 million instructions/sec 20 billion instructions/sec Have more main memory 1973: 2013: 0.125 megabytes 2 gigabytes Cost less 1973: 2013: $4,000,000 $1,00 PROGRESS OF TECHNOLOGY Have more disk storage 1973: 2013: IMPROVEMENT: 12000 x 10 MB 120,000 MB (soon 1 terabyte = 1000GB) Higher communication speeds Human speech: 30 bits/sec 1973 Modem 300 bits/sec 2003 Modem: 56,000 bits/sec T1 line: 1,544,000 bits/sec DSL (high end) 7,000,000 bits/sec Internet 2: 1,000,000,000 bits/sec Optical 10,000,000,000,000 bits/sec in 1 fiber (entire U.S. telephone traffic) 1973-2013 IMPROVEMENT: 30 BILLION x INTERNET TECHNOLOGY TOPICS Infrastructure • Electronic payments Wireless • Databases Web Architecture • Mass personalization, CRM, Data Mining Search engines • Privacy Technology Cryptography • Enterprise Resource Planning Network Security • Intelligent agents Data interchange INFRASTRUCTURE FOR E-COMMERCE What worldwide structure is required to support e-Commerce? Network + communications Machines Software Protocols Security Payment interface to banking systems THE INTERNET The fundamental technology linking business and people around the world in less than 1 second Nothing competes with it How does it work? How big is it? Who owns it? Who governs it? How does it grow? How big can it get? What architecture allows this? What are the limitations? WIRELESS TECHNOLOGIES & M-COMMERCE Can’t get (much) away from radio Differences between wireless and wired communication Cells, frequency allocations Shared medium: SDMA, FDMA, TDMA, CDMA 1G, 2G, 2.5G, 3G, 4G Wireless LAN: IEEE 802.11 Bluetooth WAP, iMode Universal Wideband (UWB) WEB ARCHITECTURE How are web sites constructed? TIER 4 Database TIER 3 Applications TIER 2 Server TIER 1 SOURCE: INTERSHOP SEARCH ENGINES Finding web pages Crawlers, spiders, bots Query interfaces Retrieval methods Indexing Document ranking Artificially altering retrieval order Document clustering Multilingual issues Multimedia retrieval CRYPTOGRAPHY Secrecy Information cannot be used if intercepted Authentication We’re sure who the parties are Integrity Data cannot be altered Non-repudiation Sender cannot deny sending the message Cryptography Symmetric encryption (DES, Rijndael) Public key cryptosystems (RSA) Digital signatures & certificates, public key infrastructure (PKI) NETWORK SECURITY Access control authorization / authentication Authentication something you know: passwords something you have: smart card something you are: biometrics someplace you are: GPS Network protection, firewalls, proxy servers Intrusion detection Denial of service (DOS) attacks Viruses, worms DATA INTERCHANGE How can sites exchange information without prior agreement? What do the data fields mean? price, extended price, unit price, prix, цена, τιμή, 가격 XML: Extensible Markup Language How can machines communicate without humans? How can data formats and structures be communicated? XML schemas Ontologies eCommerce Data Exchange Needs RFQs Ship Notices Catalogs Letters of Credit Quotations Purchase Orders Electronic Payments Bills of Lading Invoices ELECTRONIC PAYMENTS Forms of money token (cash), notational (bank account), hybrid (cheque) Credit-card transactions Secure protocols: SSL, SET Automated clearing and settlement systems PayPal Smart cards, electronic cash, digital wallets Micropayments Wireless payments Electronic invoice presentment and payment Required course: Electronic Payment Systems (20-763) DATABASES The relational database model Query specification: SQL (Structured Query Language) Database management Databases in e-Commerce Data warehousing MASS PERSONALIZATION & DATA MINING Treating each user as an individual key is INFORMATION How to acquire and store information about customers Cookies Question and response Clickstream analysis External databases How to use information effectively and instantly Personalization technology Customization DATA MINING Extracting previously unknown relationships from large datasets Discovery of patterns Predicting the future past behavior as predictor of future purchasing Market basket analysis diapers/beer DATA MINING TOOLS Visualization (“seeing” the data) Predictive Modeling Database Segmentation Classify the users Link Analysis Association discovery Neural networks Systems that learn from data Deviation Detection Are any of the data unusual? Fraud detection PRIVACY TECHNOLOGY Digital privacy & privacy threats Technology P3P EPAL Anonymity Mediation Digital pseudonyms (aliases) ERP (ENTERPRISE RESOURCE PLANNING) & SCM (SUPPLY CHAIN MANAGEMENT) The supply network Collaboration models Vendor-managed inventory Scan-based trading ERP functions and architecture EAI (Enterprise Application Integration) Web Services AGENTS AND ELECTRONIC NEGOTIATION Programs to perform tasks on your behalf Avatars (characters in human form) Meta-searchers, shopping bots, news agents, stock agents, auction bots, bank bots How to make agents “intelligent” Rule-based systems Knowledge representation Agents that learn Inductive inference JULIA from CONVERSIVE COOPERATING AGENTS Doctor Pete Schedule a treatment plan using only authorized providers within a 20-miles and a rating of excellent or very good. Lucy’s agent looks up providers, checks for distance, authorization Lucy’s agent formulates a schedule and rating. of appointmentsLucy’s for therapists that information agent retrieves fits into Pete and Lucy’s schedule. about Mom’s prescribed treatment from the doctor’s agent. Semantic Web Lucy SOURCE: WILLIAM HOLMES, LOCKHEED-MARTIN M2M COMMERCE & AUCTION MODELS How can machines do business with other machines? Electronic discovery Electronic negotiation Auction strategy The semantic Web Q&A