Unit 09 - Work To Do Home page

Download Report

Transcript Unit 09 - Work To Do Home page

E-Commerce
A/601/7313
LEVEL 3
LO1 - Know the technologies
required for an e-commerce system
Learning Outcome (LO)
The learner will:
Pass
The assessment criteria are
the pass requirements for this
unit.
The learner can:
1
Know the technologies
required for an ecommerce system
P1
Describe the
technologies required
for e-commerce
2
Understand the impact
of e-commerce on
organisations
P2
Explain the impact of
introducing an ecommerce system to an
organisation
M1 - Describe how
organisations promote
their business using ecommerce
3
Understand the effects
of e-commerce on
society
P3
Explain the potential
risks to an organisation
of committing to an ecommerce system
M2 - Explain solutions
for the potential risks of
using e-commerce
4
Be able to plan ecommerce strategies
P4
Review the regulations
governing e-commerce
P5
Examine the social
implications of ecommerce on society
P6
Plan an e-commerce
strategy
Scenario
Criteria
1
2
3
4
5
6
7
Merit
For merit the evidence
must show that, in
addition to the pass
criteria, the learner is
able to:
Distinction
For distinction the
evidence must show
that, in addition to the
pass and merit criteria,
the learner is able to:
D1 - Compare the
benefits and drawbacks
of e-commerce to an
Organisation
M3 - Provide annotated
planning documentation
for your e-commerce
strategy
8
9
10
11
12
13
14
D2 - Evaluate your
e-commerce strategy
15
Assessment




A business is thinking of going online and developing an ecommerce strategy but in order for them to decide they require some
advice so that they can make an informed decision. They will need to
know the cost implications, the benefits and downsides, the
hardware and software necessary to get online and manage their
accounts, how the trading and business functions will work and the
legal and moral implications of on-line trading. They also want to be
aware of the risks involved so they can make a decision of how much
of an online presence they will need to prepare.
Develop an e-commerce strategy for a local shop in order to enhance
and benefit their business functions. Develop plans, target
marketing, cost analysis and sketches that take into account rival
strategies based on market analysis and business reviews.
Resources
Learners will need access to word processing, publisher and/ or
presentation software. A selection of trade magazines such as
Computing, Computer Shopper, PC advisor and Computer Weekly
would be advantageous. Learners will also need access to the
internet.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment





P1 - Know the technologies required for an e-commerce system
Learners should be encouraged to visit a range of e-commerce sites to help
them understand what e-commerce is. As a group they could be encouraged
to identify the hardware and software components required in order to have
an e-commerce site and discuss these findings.
The tutor should explain the technical terminology and protocols that are
applicable to the unit as it is essential that learners understand the term
TCP/IP and what is meant by ports and protocols. To reinforce this they
could be asked to identify a range of protocols from a suggested list of
websites.
Learners are also required to understand domain names and the registration
process, as a group they could be provided with exercises to identify the
parts of a domain name. They should also look at how they can register or
check domain names without physically having to register or purchase.
Learners need to understand internet speeds, they could use an online
speed checker to find out the speed of the website they are using and
should then as a group discuss the advantages and disadvantages of having
a fast speed/ slow speed. Learners should be encouraged to research W3C
and what this means.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment

P1 - The assessment criterion P1 could be
evidenced by the use of a report, leaflet or
presentation delivered by the learner that could
be supported by tutor observation and/ or
recorded evidence. The learner is required to
describe the technologies required for an ecommerce system, as outlined in the teaching
content.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment




The term web server can refer to either the hardware (the computer) or the
software (the computer application) that helps to deliver web content that can be
accessed through the Internet. The most common use of web servers is to host
websites, but there are other uses such as gaming and data storage The primary
function of a web server is to cater web page to the request of clients using
HTTP. This means delivery of HTML documents and any additional content that
may be included by a document, such as images, style sheets and scripts.
A user agent, such as a web browser or web crawler, initiates communication by
making a request for a specific piece of information using HTTP and the server
responds with the content of that resource or an error message if it is unable to
do so.
For companies that prefer to manage their own hosting they will need specific
hardware to store, serve, process and manage user accounts and internet activity.
This is called a Web Server, sets an open traffic line between server and outside
hosting and allows the user to manage their own business.
Managing the website internally allows the users to change anything without the
need to upload, making the changes automatic and live each time. Longer term
this is more beneficially for a company for the sheer reason of being able to
manage your own content and expand through software rather than proxy.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment


The two main types of server for this is IIS and Apache. Internet
Information Services (IIS) is a server designed to work with a
Microsoft environment, and manages web activity in terms of
modules, Security, Content, Compression, Caching, Logging and
Diagnostics which all add up to a website management bundle for
all activity on the site. Ruby on Rails, ASP (.net and classic) and
Python are all languages that work out of the box on IIS whereas
they have it be added to Apache as modules to be managed. More
importantly it comes free with Microsoft Windows and functions well
within with similar coding parameters.
Apache server is often referred to as simply Apache, a publicdomain open source Web server developed by a loosely-knit group
of programmers. Core development of the Apache Web server is
performed by a group of about 20 programmers, called the Apache
Group. However, because the source code is freely available, anyone
can adapt the server for specific needs, and there is a large public
library of Apache add-ons. It is the most accepted web server
because it offers all the functionality of the IIS and is more
adaptable. Being free is it’s biggest selling point though it does
everything IIS can do with add –ins.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment

Servers are the lifeblood of any online presence. Servers provide the shared resources that
network users crave, such as file storage, databases, e-mail, Web services, and so on. Choosing
the equipment you use for your companies server is one of the key decisions any company
with a web presence needs to make when you set up an online store. Servers are usually built
from higher grade components than standard computers for the reasons given below.
Web Server

A Web server is a server computer that runs software that enables the computer to host an
Internet or Intranet Web site. The two most popular Web server programs are Microsoft’s
IIS (Internet Information Services) and Apache, an open-source Web server managed by the
Apache Software Foundation.

The choice of service depends on the size of the site, the content on the site, the need for
security, the need for expansion, the users demands in terms of database access, blogs,
streaming, wikis etc.

These often store copies of commonly used Web pages in a local cache. When a user
requests a Web page from a remote Web server, the proxy server intercepts the request and
checks to see whether it already has a copy of the page in its cache. If so, the Web proxy
returns the page directly to the user. If not, the proxy passes the request on to the real
server.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
File servers

File servers provide centralized disk storage that can be conveniently shared by client computers on the
network. The most common task of a file server is to store shared files and programs. For example, the
members of a small workgroup can use disk space on a file server to store their Microsoft Office
documents.

File servers must ensure that two users don’t try to update the same file at the same time. The file
servers do this by locking a file while a user updates the file so that other users can’t access the file until
the first user finishes.

For document files (for example, word-processing or spreadsheet files), the whole file is locked. For
database files, the lock can be applied just to the portion of the file that contains the record or records
being updated.
Mail Server

A mail server is a server that handles the network’s e-mail needs. It is configured with e-mail server
software, such as Microsoft Exchange Server. Exchange Server is designed to work with Microsoft
Outlook, the e-mail client software that comes with Microsoft Office. Most mail servers actually do
much more than just send and receive electronic mail. For example, here are some of the features that
Exchange Server offers beyond simple e-mail:
◦
◦
◦
◦
Scenario
Collaboration features that simplify the management of collaborative projects.
Audio and video conferencing.
Chat rooms and instant messaging (IM) services.
Microsoft Exchange Forms Designer, which lets you develop customized forms for applications, such
as vacation requests or purchase orders.
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
Print servers

Sharing printers is one of the main reasons that many small networks exist. Although it
isn’t necessary, a server computer can be dedicated for use as a print server, whose
sole purpose is to collect information being sent to a shared printer by client computers
and print it in an orderly fashion.

A single computer may double as both a file server and a print server, but performance
is better if you use separate print and file server computers. With inexpensive ink-jet
printers running about £50 each, just giving each user his or her own printer is
tempting. However, you get what you pay for. Instead of buying £50 printers for 15
users, you may be better off buying one £1,000 laser printer and sharing it. The £1,000
laser printer will be much faster, will be cheaper to operate.
Proxy Server

Simply put, a proxy server is a server that sits between a client computer and a real server.
The proxy server intercepts packets that are intended for the real server and processes
them. The proxy server can examine the packet and decide to pass it on to the real server,
or it can reject the packet. Or the proxy server may be able to respond to the packet itself,
without involving the real server at all.
Web servers
P1.1 – Task 1 – Describe the functions and use of different Servers in benefitting a small webpresence business needs.
Web Server
Scenario
Criteria
File Server
1
2
3
4
Mail Server
5
6
7
8
9
Print Server
10
11
12
13
14
Proxy Server
15
Assessment

Just having a computer is not enough to make a web presence, not a good working and
business capable one. For a few pages yes, but adding in extra capacity requires an extra
outlay and consideration. The hardware components that comprise a typical web server
computer are similar to the components used in less expensive computers. However,
web server computers are usually built from higher grade components than a users
computer. Additional hardware consideration have to be given.

Network Interface Cards (NIC) - Every computer on the internet, both users and servers,
requires a network interface card (or NIC) in order to access the outside world. A NIC is usually
a separate adapter card that slides into one of the computer’s motherboard expansion slots.
However, most newer computers have the NIC built into the motherboard, so a separate card
isn’t needed.

For client computers, you can usually get away with using the inexpensive built-in NIC because
client computers are used only to connect one user to the network. However, the NIC in a
server computer connects many network users to the server. As a result, it makes sense to
spend more money on a higher quality NIC for a heavily used server. A NIC is a Physical layer
and Data Link layer device. Because a NIC establishes a network node, it must have a physical
network address, also known as a MAC address. The MAC address is burned into the NIC at
the factory, so you can’t change it. Every NIC ever manufactured has a unique MAC address.

PC Monitors started off as 2 colour, green and not green, 1-bit colour. Then came CGA in 1980,
2-bit colour, four colours and with it the first colour game that could take advantage of this
amazing technology, Zork. In 1984 came the first VGA monitors, sixteen colours, 4-bit, and
with it the first versions of Wolfenstein. VGA moved up to 8-bit and with a graphics card,
finally to 16 bit, 16.7 million colours.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
Monitor – Vga – 16 bit
colours 14” screen
Graphics Card – None but
Open GL or 16mb for
optimum effects.
Processor – Pentium 1
Memory – 8mb , minimum,
64mb optimal
Sound – None or 16mb
optimal.
Controller – Keyboard,
mouse or joypad
controlled.
Monitor – Vga – 16
colours 14” screen
Graphics Card –
None
Processor - 286
Memory – 1mb ,
minimum
Sound – Internal
speaker.
Controller –
Keyboard or mouse
controlled only.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
Monitor – Vga – 16 bit
colours 14” screen
Graphics Card –
Processor: AMD 64
3200+/Intel Pentium 4
3.0GHz or better
Memory: 8 GB free harddrive space, 512MB RAM
(XP)/1GB RAM (Vista)
Graphics: Shader 3.0 or
better, 256MB Nvidia
GeForce 6600GT/ATI
Radeon 1600XT or better
Monitor – 17” minimum
12
13
14
15
Assessment



Hard drives: Most desktop computers use inexpensive hard drives called IDE
drives (sometimes also called ATA). These drives are adequate for individual
users, but because performance is more important for servers, another type of
drive known as SCSI is usually used instead. For the best performance, use the
SCSI drives along with a high performance SCSI controller card.
There are two sizes of hard drive for a PC, 2.5” for a laptop and 3.5” for a full
machine. This has been the de facto standard since PC’s first came out. The
original PC hard drive on home computers were a massive 20mb. But with
operating systems starting at MS Dos 3, all you needed was 2mb for operating
system storage. Word processors were 4mb, spreadsheets another 1mb leaving a
massive 13mb for games and file storage. These all used an IDE standard, the
same connectors on the PC for linking up the Hard Drive to the motherboard.
Speed differentiation came into play, hard drive speeds of 5300 rpm, increased to
7200 rpm, and hard drives grew in size exponentially. 80mb became 120, then
200, 320, 500 and then a massive 10gb by 2000. Now the standard hard drive
with a new PC is 250gb but 1.5 terabyte ones are available for home use at
affordable prices. The faster the hard drive, the quicker the loading speed. The
new standard is SATA which is faster than IDE and easier to install allowing the
use the daisy chain multiple drives onto a PC.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment

Motherboard and Processor: The motherboard is the computer’s main electronic
circuit board to which all the other components of your computer are connected.
More than any other component, the motherboard is the computer. All other
components attach to the motherboard. CPU), supporting circuitry called the
chipset, memory, expansion slots, a standard IDE hard drive controller, and I/O ports
for devices such as keyboards, mice, and printers. The processor, or CPU, is the brain
of the computer. Although the processor isn’t the only component that affects
overall system performance, it is the one that most people think of first when
deciding what type of server to purchase. Intel has four processor models, Two of
them — the Pentium 4 and Celeron — should be used only for desktop or notebook
computers.

Server computers should have an Itanium 2 or a Xeon processor, or a comparable
processor from one of Intel’s competitors, such as AMD. Each motherboard is
designed to support a particular type of processor. CPUs come in two basic
mounting styles: slot or socket. However, you can choose from several types of slots
and sockets, so you have to make sure that the motherboard supports the specific
slot or socket style used by the CPU. Some server motherboards have two or more
slots or sockets to hold two or more CPUs.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment

Memory: Never scrimp on memory. People rarely complain about servers having too much
memory. Many different types of memory are available, so you have to pick the right type of
memory to match the memory supported by your motherboard. The total memory capacity
of the server depends on the motherboard. Most new servers can support at least 12GB of
memory, and some can handle up to 32GB.

Modem: A modem connects the computer to the outside world, it is that simple,
Broadband, Dialup and even Wi-Fi are all modems of a kind that connect the computer to
the outside world. They are provided by ISP’s when a user joins but can be purchased. They
communicate in the language sent by the user to the ISP and provide an open line of
communication once the user has been verified. Like all hardware there is a speed
difference and this is linked to the power of the box and tre capacity to receive by the
provider.

Keyboard and Mouse: Computers are driven, the user controls what happens and the
standard method of control is the keyboard and mouse. But there are different kinds, better
ones, aesthetic ones, disability access ones and odd ones. In the standard office we use a
standard 102 key keyboard, we are used to it, we are used to two button mice, we are used
to WIMP, and this is done to ease of use and what we know.
P1.2 – Task 2 – Describe the different kinds of hardware necessary to create a website and their
purpose in displaying a web result.
Network Card
Hard Drive
Modem
Motherboard
Memory
Keyboard and Mouse
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
Monitor
11
12
13
14
15
Assessment
In the early days of web design all code had to be created using HTML, now
HTML is hidden behind the GUI of websites, still there running the system and
still accessible but not as obvious. Programmers still use HTML but programs
have surpassed this. The inclusion of JavaScript, CSS, MySql, embedded flash,
dHTML, sHTML etc. means that more lines of code are added than ever before.
 Look at the examples from here to see the difference even major companies have
gone through to revamp their image through effective web design.
 Programs that generate this additional code include Dreamweaver, Moodle, Web
Plus and Coffeecup. There are two kinds for this, offline and online. Offline
programs create the whole site with additional language add ins like JavaScript
and allow the user more control over the finishes result rather than template
altering. Additions in terms of behaviours add functionality to the site. Coffeecup
and WebPlus are similar, basing designs on templates and adding in code.
 Online site creators like moonfruit, wix and godaddy all give the user options to
customise the layout and content. This will contain dynamic code and everything
tricky that can be created with a higher level of technicality within Dreamweaver
but reduce the control the user has and reduces the skillset gained from web
creation.
P1.3 – Task 3 - Describe, with evidence, the different levels of Design Creation
software available and the advantages and disadvantages of online vs. offline
creation.

Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
Browsers (e.g. Internet Explorer, Mozilla Firefox, Google Chrome, Opera,
Safari)
 Browsers exist merely to display results and translate the HTML code
from the external and internal sites onto a GUI for the user to read and
use. The choice of Browser is dependant on the users preferences rather
than needs. They all do the same thing, display results. Browsers come
with a small range of additional options to benefit the user and claim
loyalty, for example:
• Embedded Email in IE
• Proxy and Java blocking in Opera
• Compatibility with OS like Safari
• Ease of Use like Chrome
• Adding favourites or stash like Opera.
• Speed of display like Firefox
• From within all Browsers is the options for
connectivity which allows the easier access to
networking. Also the access to history, RSS feeds,
setting privacy levels, security settings etc. are all
available on any web browser.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment


At the end of the day all browsers are free,
some come preinstalled with the OS like IE
in windows, Safari on IOS, Firefox in Linux
and there is nothing to stop a user from
installing other browsers for their own
particular reasons. For comparison details
click here.
Heavy web users need an internet browser
that is both fast and secure, and though all
browsers enable internet access, not all are
created equal. Different browsers can
render webpages differently, and there can
be a large disparity in performance between
the top competitors. The three main things
to consider when choosing an internet
browser are simplicity, speed and security.
P1.4 – Task 4 - Describe what a web browser does and
how they work and outline the range of different choices
are available for a company.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
Cards and cabling are all very well but operating systems need to be able to
communicate through these by using translation and communication software called
the Network operating System (NOS).
File sharing services
 One of the most important functions of a network operating system is its ability to
share resources with other network users. The most common resource that’s
shared is the server’s file system. A network server must be able to share some or
all of its disk space with other users so that those users can treat the server’s disk
space as an extension of their own computer’s disk space.
 The NOS (Network Operating System) allows the system administrator to
determine which portions of the server’s file system to share. Although an entire
hard drive can be shared, it is not commonly done. Instead, individual directories
or folders are shared. The administrator can control which users are allowed to
access each shared folder.
 Because file sharing is the reason many network servers exist, network operating
systems have more sophisticated disk management features than are found in
desktop operating systems. For example, most network operating systems have the
ability to manage two or more hard drives as if they were a single drive. In
addition, most can create mirrors, which automatically keeps a backup copy of a
drive on a second drive.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
Security services
 All network operating systems must provide some measure of security to protect
the network from unauthorized access. Hacking seems to be the national pastime
these days. With most computer networks connected to the Internet, anyone
anywhere in the world can and probably will try to break into your network.
 The most basic type of security is handled through user accounts, which grant
individual users the right to access the network resources and govern what
resources the user can access. User accounts are secured by passwords; therefore,
good password policy is a cornerstone of any security system.
 Most network operating systems let you establish password policies, such
Microsoft’s Server Operating Systems as requiring that passwords have a minimum
length and include a mix of letters and numerals. In addition, passwords can be set
to expire after a certain number of days, so users can be forced to frequently
change their passwords.
 Most network operating systems also provide for data encryption, which scrambles
data before it is sent over the network or saved on disk, and digital certificates,
which are used to ensure that users are who they say they are and files are what
they claim to be.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
Directory services

Directories are essential ways of storing information. Network directories provide
information about the resources that are available on the network, such as users, computers,
printers, shared folders, and files. Directories are an essential part of any network operating
system.

In early network operating systems, such as Windows NT 3.1 and NetWare 3.x, each server
computer maintained its own directory database of resources that were available just on
that server. The problem with that approach was that network administrators had to
maintain each directory database separately.

That wasn’t too bad for networks with just a few servers, but maintaining the directory on a
network with dozens or even hundreds of servers was next to impossible. In addition, early
directory services were application-specific. For example, a server would have one directory
database for user logins, another for file sharing, and yet another for e-mail addresses. Each
directory had its own tools for adding, updating, and deleting directory entries.

Modern network operating systems provide global directory services that combine the
directory information for an entire network and for all applications so that it can be treated
as a single integrated database. These directory services are based on an ISO standard called
X.500. In an X.500 directory, information is organized hierarchically. For example, a
multinational company can divide its user directory into one or more countries, each country
can have one or more regions, and, in turn, each region can have one or more departments.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
Network Support

A network operating system must support a wide variety of networking protocols in
order to meet the needs of its users. That’s because a large network typically consists of
a mixture of various versions of Windows, as well as Macintosh and possibly Linux
computers. As a result, the server may need to simultaneously support TCP/IP, NetBIOS,
and AppleTalk protocols.

Many servers have more than one network interface card installed. In that case, the
NOS must be able to support multiple network connections. Ideally, the NOS should
have the ability to balance the network load among its network interfaces. In addition,
in the event that one of the connections fails, the NOS should be able to seamlessly
switch to another connection.

Finally, most network operating systems include a built-in ability to function as a router
that connects two networks. The NOS router functions also include firewall features in
order to keep unauthorized packets from entering the local network.
P1.5 – Task 5 – Describe File Sharing Services, Security Services, Directory Services and
Network support software and the importance of these services on a School Network for
Staff and Students.
File Sharing
Security
Network Services
Network Support
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment




◦
A database table is similar in appearance to a spreadsheet, in that data is stored in rows
and columns (flat file). As a result, it is usually quite easy to import a spreadsheet into a
database table. The main difference between storing your data in a spreadsheet and
storing it in a database is in how the data is organized.
Database creation software comes in two kinds, standard package software like Access,
Fox, OneNote, Works, OpenOffice and data integrated software like MySql and JQuery.
Standard Package – These work like any other stand alone packages, they manage
information in tables, produce queries, reports, searches, are linked with relationships
etc. They work independent of Web Sites but can be used to manage information
offline, customer orders, invoices etc. There is a degree of compatibility and serve their
function.
Data Integrated – Programs such as MySql, Ajax, Jquery work within websites to
produce functionality to sites. When a user logs in to a site it picks up the information to
the database and allows the user to access information from prior experience. This
could be customisation of the layout, their bills, their orders, their music of files on a
cloud. Everything on a website that knows the user is used in this way from Amazons
recommends to Welcome displays.
P1.6 – Task 6 – Describe and give examples of Standard and Integrated database
functions and describe their uses within an e-commerce site.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment





A Port is an application that serves as a communications endpoint in an
operating system, associated with an IP address of the host, as well as the
type of protocol used for communication. The purpose of ports is to uniquely
identify different applications or processes running on a single computer and
thereby enable them to share a single physical connection to a packetswitched network like the Internet.
The protocols that primarily use ports are the Transport Layer protocols
(TCP) and the User Datagram Protocol (UDP) of the Internet Protocol Suite.
A port is identified for each address and protocol by a 16-bit number,
commonly known as the port number. The port number, added to a
computer's IP address, completes the destination address for a
communications session. That is, data packets are routed across the network
to a specific destination IP address, and then, upon reaching the destination
computer, are further routed to the specific process bound to the destination
port number.
For example, a computer sending an email sends the command via the POP3
port (110) and then receives a response back via the SMTP computer (25). If
you ring up a school (server) and the receptionist answers (DNS) you then ask
for IT Support (some other port depending on why you rang). The confusing
part is that they can be the same number (IP Address and Protocol)
Of the thousands of available ports, about 250 well-known ports are
reserved by convention to identify specific service types on a server.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment















The port numbers are divided into three ranges: the well-known ports, the
registered ports, and the dynamic or private ports. The well-known ports are
those from 0 through 1023. Examples include:
20 & 21: File Transfer Protocol (FTP)
22: Secure Shell (SSH)
23: Telnet remote login service
25: Simple Mail Transfer Protocol (SMTP)
53: Domain Name System (DNS) service
80: Hypertext Transfer Protocol (HTTP) used in the World Wide Web
110: Post Office Protocol (POP3)
119: Network News Transfer Protocol (NNTP)
143: Internet Message Access Protocol (IMAP)
161: Simple Network Management Protocol (SNMP)
194: Internet Relay Chat (IRC)
443: HTTP Secure (HTTPS)
465: SMTP Secure (SMTPS)
P1.7 – Task 7 – Describe what Ports are and give examples of their functions and
describe the need to clarify these functions within an e-commerce site.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
AppleTalk - Apple computers have their own
suite of network protocols known as AppleTalk
because of the language barrier between
operating systems and hardware differences.
The AppleTalk suite includes a Physical and
Data Link layer protocol called LocalTalk, but
can also work with standard lower level
protocols, including Ethernet and Token Ring.
Transmission Control Protocol (TCP): Provides reliable connection oriented
transmission between two hosts. TCP establishes a session between hosts, and
then ensures delivery of packets between the hosts.
Internet Protocol (IP): A routable protocol that uses IP addresses to deliver
packets to network devices. IP is an intentionally unreliable protocol, so it doesn’t
guarantee delivery of information. It works on the Network layer of the TCP and
communicates with these devices to provide a function, printing, internet access,
file access, communication. It does not operate applications but initiates
communication.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
Several LAN systems have been created independently from each other. Ethernet
II is still used. Some years ago, the Institute of Electrical and Electronics Engineers
(IEEE) came up with a project. The aim of this project was to unify existing
initiatives and work out standards for particular LAN types (e.g. Ethernet, Arcnet,
Token Ring, etc). These standards described the Media Access Control (MAC) layer
for each type. The IEEE 802.3 standard was created for Ethernet, IEEE 802.4 for
Token Bus, IEEE 802.5 for Token Ring, and so on.
802.2 - A joint standard, IEEE 802.2, was
created for the Logical Link Control (LLC)
layer of all systems. In other words, the LAN
link layer has been divided into two sublayers. The bottom MAC layer—partially
overlapping the physical layer—deals with
access to the communication medium. The
top LLC layer enables you to initiate,
administer, and terminate logical
connections between individual LAN
stations.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
802.3 or Ethernet - Ethernet has been around in various
forms since the early 1970s. The current incarnation of
Ethernet is defined by the IEEE standard known as 802.3.
Various types of Ethernet operate at different speeds and
use different types of media. However, all the versions of
Ethernet are compatible with each other, so you can mix
and match them on the same network by using devices
such as bridges, hubs, and switches to link network
segments that use different types of media.
This is pretty much the standard used in computers,
speeds vary but the technology stays the same.
802.5 – Put simply this is the network card that pushes the technology behind Token Rings.
This card addressing managed the tokens, sends the information around the network
looking for the outlet for the information and gathering in the tokens sent out by users.
When it receives the token and deals with it, the information is changed on the users
machine to indicate that the token has been received and dealt with. The card then
discards additional requests from the network to process the information again unless the
user requests that the information is different or has changed.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
The User Datagram Protocol (or UDP) is a connectionless Transport layer protocol that is used when
the overhead of a connection is not required. After UDP has placed a packet on the network (via the IP
protocol), it forgets about it. UDP doesn’t guarantee that the packet actually arrives at its destination.
Most applications that use UDP simply wait for any replies expected as a result of packets sent via UDP.
If a reply doesn’t arrive within a certain period of time, the application either sends the packet again or
gives up.
Probably the best-known Application layer protocol that uses UDP is DNS, the Domain Name System.
When an application needs to access a domain name such as www.brookeweston.org, DNS sends a
UDP packet to a DNS server to look up the domain. When the server finds the domain, it returns the
domain’s IP address in another UDP packet. (Actually, the process is much more complicated than that.
FDDI - Fibre Distributed Data Interface, a 100Mbps network standard used with fibre-optic backbone.
When FDDI is used, FDDI/Ethernet bridges connect Ethernet segments to the backbone. Fibre optic
cabling and fibre optic data management is expensive but it manages large networks and traffic at a far
faster speed. The FDDI cards manage the information transfer rate along those lines, sending on further
information when the router or server receives the first sections.
P1.8 – Task 8 – Describe what Protocols are and give examples of their functions and describe the need
to clarify these functions within an e-commerce site.
TCP/IP
Scenario
Criteria
Appletalk
1
2
3
4
UDP
5
6
7
802 standards
8
9
10
11
12
13
14
FDDI
15
Assessment



You need TCP/IP to connect to the Internet. Realise that there is a difference
between installing TCP/IP on your network and installing it for dial-up
networking use; these are two separate installations and uses for the protocol.
You install TCP/IP to use with the dial-up networking feature. This installation
enables you to connect to the Internet by means of a modem. The TCP/IP
communicates with Web servers on the Internet. If you install TCP/IP on your
network, you use it to connect to the other computers on your LAN. One
installation has nothing to do with the other. For more information,
Using TCP/IP to connect to the Internet provides you with all the Internet
features and advantages, including e-mail, Web browsers, and file transfer.
Also, TCP/IP includes various programs (which are also protocols) that you can
use to access information on the Internet. If you have special needs for FTP or
Telnet, for example, TCP/IP provides those programs for you to use. If you plan
to expand your network to the Internet someday, your knowledge and use of
TCP/IP will help you tremendously. Knowing how to configure TCP/IP will make
it easier for you to transfer your Web sites and pages to the Web and to
configure clients and servers for the Internet. Having TCP/IP in place means less
configuring when you move to the Internet.
P1.9 – Task 9 – Describe what TCP/IP is and give examples, explaining the importance of TCP/IP in
setting up an e-commerce presence.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
Internet service providers (e.g. Virgin Media, BT, Sky)
 Internet service providers are there for a reason, companies and
individuals need to either connect through a provider or use their
own T-Line like a T1. ISP’s provide a service that most individuals
are not aware of, from minor hosting to providing a static IP
address. The range of ISP’s is broad, each sells a connection
package with phone options and each can be measured in terms of
speed of connection, bandwidth and for most, a small degree of site
or file hosting.
◦ Speed of connection – this is how fast an individual file can go from the
website to your screen, measures in Megabit speed which is 1/8 of a Megabyte
per second. The faster the speed the faster a page opens.
◦ Bandwidth – this is how large a file can be downloaded at one time and can be
compared to road width, smaller the bandwidth, the more buffering a file has
to do to load.
◦ Static IP – Used by business to limit down activity such as blocking, easier to
block and restrict a static address than a dynamic address, whereas dynamic
addresses are more difficult to hack or be subject to DDOS attacks.
◦ Hosting – a lot of small companies host on their ISP and bounce to a registered
domain name from. This is good for small businesses as the storage space for
small sites is already there. Bouncing the web address is not seen by the
customers and it is a secondary site that makes it more difficult to hack.
P1.10 – Task 10 – Describe, with evidence, the purpose and function of making
the right choice of ISP’s for an e-commerce presence.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
Web hosting services (e.g. free hosts; Google Sites, Free-space; paid
hosts; JimdoPro, Fasthosts)
 Web hosting differs from ISP’s because they provide a place to store,
locate, display and manage website functions. Where ISP’s can
bounce, hosts store. The difference is the range of hosts is the
service they provide for that fee. These services include:
◦
◦
◦
◦
◦
Database management through SQL
Auto redirecting of IP addressing
Email exchanging
Virtual Private networking
Dedicated server activity
The difference between pricing strategies depends on the level of service
the user requires, free hosts like Google share the space but not the activity,
Bit and tinyurl provide space and a small degree of activity management
whereas fasthosts and others provide more management facilities such as
forums, secure logins and database management, shopping basket
protection, blog and wiki activity etc. None of these provide filtering, that is
something that the user still has to manage like forum maintenance and
management. Ultimately the provision of hosting is the difference between a
look-at-me site and an managed shopping experience.
P1.11 – Task 11 - Describe, with evidence, the purpose and functions of
Web Hosting for an e-commerce presence.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
◦ Part 1 - Transfer Protocol
 http:// – Hypertext Transfer Protocol
 https:// – Hypertext Transfer Protocol, Secure
 ftp:// - File Transfer Protocol for FTP site. Allows upload/download of files.
◦ Part 2 – www (which part of internet is being addressed)
◦ Part 3 – domain name – name of organisation that controls the site
that the page is stored on
◦ Part 4 – indicates the type of organisation (.co/.sch/.gov/.edu/.org
etc)
◦ Part 5 – the country in which the site is located
◦ Part 6 – sub domain or webpage currently viewing
◦ http://www.purelygadgets.co.uk/aboutus.php
Part 1 Part 2
Scenario
Criteria
1
2
Part 4 Part 5
Part 3
3
4
5
6
7
8
9
10
11
12
Part 6
13
14
15
Assessment
Web addresses as seen in the previous slide are broken down for a reason. First there
was IP addresses, then the web grew to the point when remembering all those
numbers was impossible. When the system of DNS came into place, the translation of
IP addresses to wording allowed businesses, government offices, companies and
individuals to generate their own unique address that was more memorable for the
customer.
 How difficult would Easyjet.com find business if the customer has to remember 12
numbers, or Thetrainline, Google, Amazon, all branded names based on their DNS
name rather than their IP.
◦ Internet Service Provider (ISP)
 has unique IP (Internet Protocol) address
 four numbers separated by full stops
 Domain Name System (DNS)
 translates IP address numbers into domain name
 Without the DNS you would have to remember numbers instead of names.
 For example – typing http://193.164.107.139 would lead to the same page as
http://www.brookweston.org
 URL (Uniform Resource Locator)
 standard address used to find a page
P1.12 – Task 12 - Describe, with evidence, what DNS and URL are and what it does in
terms of securing business, naming and address management.

Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment


All websites are programmed in, some have multiple languages
within them, a little JavaScript, mostly HTML, some MySql and a bit of
PHP. All serve their purpose and all have adapted over the years. Now
they are invaluable in the production of a good working site. Each
language is different but there is a compatibility within them that
allows the other codes to use or display them.
And there are others, .Net, Python, C++ etc.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment


MySql - Another component of standard web
server installations, MySQL is a free, open
source database server. It’s not a programming
language as such, but it is a new language to
learn if you want to talk to databases so it’s a
key component of modern websites. Again,
MySQL is what powers WordPress - so all your
posts and content are actually stored inside a
MySQL database.
PHP - PHP is the undisputed king of server-side
languages in use on the Internet today – running
on 75% of all web servers – and is the power
behind WordPress, Wikipedia, and even the
user-facing part of Facebook. As a server side
language, the code is processed before it
reaches the user’s browser, so all they see is the
final page and none of the original PHP code.
PHP is mainly used in conjunction with MySQL to
pull information from a database, manipulate it
and present it to the user.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment



JavaScript - Not to be confused with Java, the
full object oriented software programming
language, Javascript is the daddy of
interactive webpages. It’s a scripting
language that’s run locally on the user’s
browser, allowing webpages to respond to
user interactions such as clicking on elements
and timing events. Generally, if there’s
something interactive on a site, and it isn’t
Flash – it’s more than likely Javascript.
HTML – This is the original and standard web
code that makes pages appear on the screen,
the mark-up language of all pages written as
a basic script that holds the other pieces of
code within it. It is the accepted standard of
all web pages for layout and structure, doing
little more than putting things into their place
and setting fonts, colours, proportions and
locations.
P1.13 – Task 13 - Describe, with evidence, what web programming is
and the need for additional coding to make web pages more productive.
PHP
Scenario
Criteria
MySql
1
2
3
4
5
6
Javascript
7
8
9
10
11
12
HTML
13
14
15
Assessment
In the production, uploading and side management of any website,
internally and externally managed there are consideration that need to be
looked at by any business from the amount of space and hosts they use to
the amount of traffic they can handle on a daily business basis. This is
called User side and server side management. User side is the
considerations that the company can manage on their own, server side is
what hosts and network stores can manage.
 Connection Speed (e.g. dial-up, broadband, mobile broadband, WI-FI)
Dial up is dying but there is still 3% of the population that is still
managing a slower connection. Slower connections means pages do not
load, users get impatient and go elsewhere, video files will far too long
to load, streaming buffers to the point of being unwatchable. Similar
with mobile broadband when it loses signal can cause data transfers to
crash or a delay in reconnection, Wi-Fi can be restricted in public places
so linked sites can come up as web filtered. Tis can have an impact on
what the user places on their site, causes them to reconsider content,
possibly creating a secondary site to accommodate these customers.


P1.14 – Task 14 - Describe, with evidence, how connection speed
can have an impact on the business trade of an e-commerce site.
Use this site as evidence of testing.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
The ability to access all of the content as it was intended to be
regardless of the system or software they are using their social,
educational, physical or legal environment.


In short everyone can access the web content irrespective of external
factors.
◦ Something as simple as having interactive help features, different
colour or size options and alternate mirrored low bandwidth sites can
help accessibility of content for a broad spectrum of users
◦ Some examples are alt tags, alternative content, alter text size, alter
colours used, image file size
Throughout this AO you will need to investigate:
◦ The factors affecting web accessibility including
 People with Disabilities (Visual and Physical)
 The Social factors – language barriers and cultural background
 Legal and policy factors – requirements from governments
 Technical factors - The system they are using or for example a
slow Internet connection
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment


Web Accessibility is something a lot of companies do not take
into consideration when preparing or making a website for their
customers. There is a small percentage of the population that are
affected by sites with no accessibility but this is still a customer
base that needs to be addressed. When making a site you will
need to consider how these can be addressed and enable web
accessibility.
Interesting articles about web accessibility:
◦ http://en.wikipedia.org/wiki/Web_accessibility
◦ http://www.w3.org/WAI/intro/accessibility.php - very good
◦ http://www.w3.org/WAI/

P1.15 – Task 15 - Describe, with evidence, how web Accessibility
and W3C compliance needs to be taken into consideration when
developing an e-commerce presence.
People with Disabilities (Visual and Physical)
Social Factors
Legal and Policy Factors
Technical Factors
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
P1.1 – Task 1 – Describe the functions and use of different Servers in
benefitting a small web-presence business needs.
P1.2 – Task 2 – Describe the different kinds of hardware necessary to
create a website and their purpose in displaying a web result.
P1.3 – Task 3 - Describe, with evidence, the different levels of Design
Creation software available and the advantages and disadvantages of
online vs. offline creation.
P1.4 – Task 4 - Describe what a web browser does and how they work and
outline the range of different choices are available for a company.
P1.5 – Task 5 – Describe File Sharing Services, Security Services, Directory
Services and Network support software and the importance of these
services on a School Network for Staff and Students.
P1.6 – Task 6 – Describe and give examples of Standard and Integrated
database functions and describe their uses within an e-commerce site.
P1.7 – Task 7 – Describe what Ports are and give examples of their
functions and describe the need to clarify these functions within an ecommerce site.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment
P1.8 – Task 8 – Describe what Protocols are and give examples of their
functions and describe the need to clarify these functions within an ecommerce site.
P1.9 – Task 9 – Describe what TCP/IP is and give examples, explaining the
importance of TCP/IP in setting up an e-commerce presence.
P1.10 – Task 10 – Describe, with evidence, the purpose and function of
making the right choice of ISP’s for an e-commerce presence.
P1.11 – Task 11 - Describe, with evidence, the purpose and functions of
Web Hosting for an e-commerce presence.
P1.12 – Task 12 - Describe, with evidence, what DNS and URL are and what
it does in terms of securing business, naming and address management.
P1.13 – Task 13 - Describe, with evidence, what web programming is and the need
for additional coding to make web pages more productive.
P1.14 – Task 14 - Describe, with evidence, how connection speed can have an
impact on the business trade of an e-commerce site.
P1.15 – Task 15 - Describe, with evidence, how web Accessibility and W3C
compliance needs to be taken into consideration when developing an e-commerce
presence.
Scenario
Criteria
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Assessment