Introduce the terms computer network, an internet, and the Internet. Note that networks of computers and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce. Introduce the term World Wide Web Web. Origins of the Internet 1.
Explain the origins of the Internet by discussing the need for powerful computers for coordination and control of weapons defense systems.
Note that the initial research goal was to design a worldwide network that could remain operational, even if parts of the network were destroyed by enemy military action or sabotage. Emphasize that the computer networks that existed at that time used leased telephone company lines for their connections. Note that the Defense Department was concerned about the inherent risk of a single-channel method for connecting computers, and its researchers developed a different method of sending information through multiple channels using packets.
Note that throughout the s and s, many researchers in the academic community connected to the ARPANET and contributed to the technological developments that increased its speed and efficiency. At the same time, researchers at other universities were creating their own networks using similar technologies. New Uses for the Internet 1. Students will be very interested to learn that e-mail was born in when Ray Tomlinson, a researcher who used the network, wrote a program that could send and receive messages over the network.
Mention that the use of the networks was limited to those members of the research and academic communities who could access them. Between and , network applications were improved and tested by an increasing number of users. As the number of people in different organizations using these networks increased, security concerns arose; these concerns continue to be problematic.
Commercial Use of the Internet 1. An important fact to point out is that, in , the National Science Foundation NSF permitted two commercial e-mail services, MCI Mail and CompuServe, to establish limited connections to the Internet for the sole purpose of exchanging e-mail transmissions with users of the Internet. Note that as the s began, people from all walks of life not just scientists or academic researchers started thinking of these networks as the global resource that we now know as the Internet.
Growth of the Internet 1. Emphasize that the privatization of the Internet was substantially completed in , when the NSF turned over the operation of the main Internet connections to a group of privately owned companies. Define the term Internet hosts and refer to Figure to illustrate the dramatic growth in the number of Internet hosts.
The Internet of Things 1. Point out that in recent years, devices other than computers have been connected to the Internet, such as mobile phones and tablet devices. The connection of these devices to the Internet serves to connect the users of those devices to each other.
However, the connection of devices to the Internet that are not used by persons is increasing rapidly. Explain how computers can also be connected to each other using the Internet to conduct business transactions without human intervention. Define the term Internet of Things. Quick Quiz 1 1. Answer: Internet 2. Answer: mailing list 3. Answer: Network access providers 4. Answer: Internet hosts 5. Answer: Internet of Things. Packet-Switched Networks 1. Note that the early models for WANs were the circuits of the local and long-distance telephone companies of the time, because the first early WANs used leased telephone company lines for their connections.
Introduce the terms circuit, circuit switching, packet-switched, and packets. Routing Packets 1. Introduce the terms routing computers, router computers, routers, gateway computers, border routers edge routers , routing algorithms, routing tables, and configuration tables. Point out that individual LANs and WANs can use a variety of different rules and standards for creating packets within their networks.
The network devices that move packets from one part of a network to another are called hubs, switches, and bridges. Emphasize that routers are used to connect networks to other networks. An important concept for students to understand is that when packets leave a network to travel on the Internet, they must be translated into a standard format. Routers usually perform this translation function. Refer to the diagram in Figure to illustrate a small portion of the Internet that shows an organizations router-based architecture.
Introduce the terms Internet backbone and backbone routers. Public and Private Networks 1. Introduce the terms public network, private network, and leased line.
Note that the advantage of a leased line is security. Explain why the largest drawback to a private network is the cost of the leased lines, which can be quite expensive. Introduce the term virtual private network VPN. Introduce the terms IP tunneling, encapsulation, and IP wrapper. Explain that the word virtual is used as part of VPN because, although the connection appears to be a permanent connection, it is actually temporary. The VPN is created, carries out its work over the Internet, and is then terminated.
Intranets and Extranets 1. Remind students that in the early days of the Internet, the distinction between private and public networks was clear. Distinguish between the terms intranet and extranet. Quick Quiz 2 1. Answer: local area network LAN 2.
Answer: circuit 3. True or False Although circuit switching works well for telephone calls, it does not work as well for sending data across a large WAN or an interconnected network like the Internet. Answer: True 4. Answer: routing computers, router computers, routers, gateway computers, border routers, edge routers. Internet Protocols 1. Define protocol. Introduce the terms Network Control Protocol NCP , proprietary architecture, closed architecture, and open architecture. Review the four key rules for message handling.
Explain how the open architecture approach has contributed to the success of the Internet because computers manufactured by different companies Apple, Dell, Hewlett-Packard, etc. Explain that the TCP controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations.
IP Addressing 1. Explain that computers do all of their internal calculations using a base 2 or binary number system in which each digit is either a 0 or a 1, corresponding to a condition of either off or on. Introduce the term dotted decimal. Point out that, in the early days of the Internet, the four billion addresses provided by the Internet Protocol version 4 IPv4 rules certainly seemed to be more addresses than an experimental research network would ever need. Note that the last available IPv4 addresses were allocated in summer Companies that still need IPv4 addresses can buy them on secondary markets or use subnetting and their NAT devices to adapt their traffic to IPv6.
Explain the major advantage of IPv6. It uses a bit number for addresses instead of the bit number used in IPv4. Discuss the IPv6 shorthand notation system for expressing addresses. This latest edition provides comprehensive coverage of up-to-the-minute technologies, emerging strategies, and the latest market developments.
College Students gain an understanding of the dynamics within this fast-paced industry as the textbook balances technological issues with the strategic business aspects of successful e-commerce.
Content addresses e-commerce growth in the rapidly-developing economies of India, Brazil and China and examines the role of social media and technology-enabled outsourcing, online marketing strategies, and online payment processing systems. Cases featuring real company situations provide the basis forcase discussions, class presentations, and extended written assignments. S we also have Electronic Commerce 12th edition testbank, instructor manual and other resources for sale.
Contact for more info. Your email address will not be published. Save my name, email, and website in this browser for the next time I comment. Notify me of new posts by email. Will be used in accordance with our Privacy Policy. User icon An illustration of a person's head and chest.
Sign up Log in. Web icon An illustration of a computer application window Wayback Machine Texts icon An illustration of an open book. Books Video icon An illustration of two cells of a film strip. Video Audio icon An illustration of an audio speaker.
Audio Software icon An illustration of a 3.
0コメント