Network - Softech Computer Education
Download
Report
Transcript Network - Softech Computer Education
Chapter [3]
Telecommunication
And
Networks
• Interconnection of two or more computers is
called Network.
• Organizations are becoming internetworked
enterprises to support collaboration, E-Com
and other business applications.
• Internet has become key platform for
internetworking. Global networks, like Intranets
and
Extranets,
support
enterprise
communication with customers and trading
partners.
Companies are deriving strategic business
value from the Internet in terms of –
•
•
•
•
disseminating information globally,
trading interactively with customers,
collaborating with people and business partners.
integrating business processes
Networking benefits
Generate cost savings,
Revenue increases,
Better customer service,
Improve relationships with customer and suppliers,
Improve communications and collaboration among
teams within the enterprise;
Publish and share valuable business information
Manage business resources more effectively;
Compete successfully in fast changing global
economy.
Trends in Telecommunication
Industry Trends
• Network services are available from numerous
companies.
• Growth of the Internet and the WWW has
created a lot of new telecom products and
services.
• Businesses have dramatically increased their
use of Internet and Web for E-Com and
collaboration.
Technology Trends
• Building Client/Server networks based on open
system architecture to provide unrestricted
connectivity.
• Change from analog to digital network technologies
to get higher transmission speeds, transfer of greater
amounts of information, greater economy, much
lower error rates and to support multiple types of
signals such as data, voice, and video.
• Change in communications media. From copper
wire-based media to fiber-optic lines; from landbased microwave systems to satellite transmissions.
Business Application Trends
• The trend toward more vendors, services,
technologies, and open systems dramatically
increases the number of telecommunications
applications.
• Networks are playing a vital role in E-Com,
EDI, EFT, EBT, EB, BBS, Digital cash, CRM,
SCM, Cloud computing and many other
business applications that support the
operations, management and strategic
objectives.
Business Value of Telecommunications
The telecom systems have following strategic
capabilities to gain competitive advantages ~
Overcome geographic barriers
Overcome time barriers
Overcome cost barriers
Overcome structural barriers
Telecommunication Network
A Computer Network is a collection of all types of
Computers, Terminals and Peripheral devices
connected together by a communication system.
The devices connected in a network are called
Node.
Need and Scope of Networks
•
•
•
•
•
•
File Sharing
Printer sharing
E-Mail
Fax Sharing
Remote Access
Proper data
organization
•
•
•
•
Fault Tolerance
Internet Access
Security
Better Customer
Services
• Reduced Cost
• Communication &
Collaboration
Components of Telecommunication Network
Terminal
Communicatio
n Devices
Computer
Communication
Software
Communicatio
n Media
NIC
Multiplexer
Guided
Unguided
Modem
Internetwork
processors
TPC
Radio
wave
Switch
Bridge
Co-ax
Micro
wave
Router
Gateway
FOC
Infrared
wave
Hub
Repeater
Satellite
[A] Terminals
• Any device that is used to transmit or receive
data can be classified as a terminal. Terminal
does not process data.
[B] Communications Devices
• The devices that support data transmission
and reception between nodes are called
communication devices. They include:
Network Interface Card
Modem
Multiplexer
Internetwork processors
1. NIC :~
- Connectivity
- Protocol
- Memory
- Remote booting
2. Modem :~
-
Used when data are communicated through phone lines.
Converts data from digital to analog (Modulation) and
analog to digital (De-modulation).
It is connected to Serial or Parallel port of CPU.
Speed measured in terms of kbps and mbps.
3. Multiplexer :~
Allows sharing of communication line between 2 or more
nodes.
4. Internetwork Processors
Switches creates temp. point to point link between nodes.
It makes routing decision on the basis of physical
address. It can also regenerate incoming signals.
Routers selects the appropriate link from the existing
path. It makes routing decision on the basis of network
address.
Bridge allow communication between similar networks
that employee same protocol, architecture and cabling.
Gateway allows communication between dissimilar
networks.
Repeater Amplifies the weak signals coming from one
section of cable and pass strong signals to the other
section.
Hub is a multi port connecting device that is used to
interconnect devices by means of TPC.
[C] Communications Media
Communication
Channels
Guided Media
Unguided
Media
Twisted Pair Cable
Radio Wave
Co-axial Cable
Micro Wave
Fiber Optical Cable
Infrared Wave
Terrestrial Microwave
Communication Satellites
[1] Twisted-Pair Cable :~
Oldest
Short distance
Cheapest
High error rate
Slowest
Low band width
[2] Co-axial Cable :~
Costlier
Faster
Low error rate High security
Cover long distances
Higher band width
[3] Optical-fiber cable :~
Costliest
Fastest
Low error rate High security
Light weight
Long distance
Highest band width
Can be used in hostile environment
[4] Radio wave :~
It is an Electronic-Magnetic radiation created as beam of energy.
It travels in a straight path.
wave length 1mm to 100,000km
[5] Micro Wave :~
It is also a radio wave.
wave length : 1mm to 1m.
[6] Infrared wave :~
It is wave of light.
Used in Medical and Scientific application; Night vision devices
etc.
[7] Terrestrial Microwave :~
Transmit high-speed radio signals in a line-of-sight
path.
Approximately 30 miles apart.
[8] Communication Satellites :~
Used extensively for high-volume as well as longdistance communication
Cost-effective
Weather conditions and Solar activity can also cause
noise interference.
[D] Computers
• Computers of all sizes and types are connected
through media. They include Host Computers,
Front-End Processors and Network Servers.
[E] Communications Software
• It consists of programs that control and manage
functions of telecommunications networks. They
include Telecommunication Monitors (for Host),
Network Operating Systems (for Servers), Web
browsers(for front end processors).
• These software provide such features as
Performance monitoring
Activity monitoring
Priority assigning
Transmission error correction
Network problem mitigation
Establish communications parameters such as
transmission speed, mode, and direction.
Traffic Management
Security
Classification of Network
Functional
based Network
Client Server
Peer-toPeer
Multi Tier
Classification of Network
Coverage
area based
LAN
MAN
WAN
Classification of Network
Forwarding
based
Switched
Shared
Hybrid
Classification of Network
Ownership
based
Public
Private
Virtual
Private
Classification of Network
Communication
media based
Wired
Wireless
LAN
MAN
WAN
Characteristics
LANs use a variety of telecommunications media.
LAN uses inexpensive transmission device - NIC.
LAN has a central computer with large storage called
File Server.
LAN is controlled by a distributed software called
NOS.
LAN allow end users to communicate electronically;
LAN allow users to share hardware, software, and
data resources;
and
LAN allow users to pool their efforts when working on
group projects.
1
• Security
2
• Expanded PC usage
3
• Distributed processing
4
• E-mail and Message Broadcasting
5
• Organizational Benefits
6
• Data management benefits
7
• Software cost and up-gradation
Metropolitan Area Network
• The term MAN is used to refer to networks
which spans roughly 40 km in length. MAN
support both data and voice.
• MAN has following characteristics ~
Covers area larges then LAN (40 km)
Fiber-Optic transmission technology
Relatively slow in speed (10 mbps)
Error rate higher then LAN
Wide Area Network
• WAN are telecommunications networks that
cover un-restricted geographic areas.
• WAN has following characteristics ~
Covers unrestricted geographic area
Slow in speed (1 Mbps)
High Error rate
Use satellite transmission etc.
Communication channel is furnished by third
party
Client/Server
Peer-to-Peer
Multi-tier
• Client: A workstation operated by users to
avail the services offered by the server. Client
can be classified as –
Fat/Thick
Client: It is a client that performs the
bulk of data processing itself. To maintain a thick
client, organizations have to install, maintain and
upgrade all the applications at many places.
Thin Client: A thin client only presents processed
data provided by server. There is less software
installed these client machines.
Hybrid Client: A hybrid client is a mixture of the
above two client models.
• Server
A server is one or more multi-user Computers
providing computing, connectivity, services and
the interfaces relevant to the business need.
They receive requests from client and provide
them the requested service.
They also regulate access to shared resources.
Depending on the service they provide, there are
many type servers – File server, Database server,
Modem server, Printer server, Transaction server.
Working of a C/S Network
1
2
• Servers NOS based, central computers providing services
to users. Server can allow or deny access.
• End user PC or workstations are the Clients.
3
• Client and Server can operate on separate computer
platforms.
4
• Either the client platform or the server platform can be
upgraded individually.
5
6
• The server is able to service multiple clients
concurrently and clients can access multiple servers.
• Action is always initiated at the client end.
7
• The software implemented within the C/S technology is
called Middleware.
8
• Middleware is a distributed software allows for
communication, directory services, queuing, distributed
file sharing, and printing.
Service
Shared
Resources
• C/S provides clean separation of –Who will
provide and who will avail the services.
• Server regulate their user access to the
shared resources.
Transparency • C/S masks the location of the server from
the clients.
of Location
Mix-and
Match
• The C/S software is independent of
hardware or Operating System platforms.
Scalability
• No. of clients and Services can be added
or removed.
Integrity
• C/S has cheaper program maintenance
and high data integrity due to
centralization of storage.
Issues
• Very high dependency on servers.
• Simultaneous access by large number of
clients slow down the network
transmission.
Peer-to-Peer Network (P2P)
A
Peer-to-Peer (P2P) network is created with
two or more PCs connected together without
using central server.
The computers are called peers because each
one can alternately act as a client or as a
server to other peers.
• Advantages
– Easy and simple to set up.
– Cost effective.
– No dependency on single computer
• Disadvantages
– The performance gets degraded in case of high
network size.
– The data security is very poor.
Tier
system
Single tier
system
Two tier
system
Three tier
system
N-tier
system
• A single computer containing database to store the data and
applications to process the data is called Single tier system.
• In other words, when all the three component viz. User Interface,
Database and Application logic resides in one computer, this is
called Single Tier Architecture.
• Advantages ~
It requires only one stand alone computer.
It requires only one installation for licensed software.
• Disadvantage ~
It can be used by only one user at a time.
It is impractical for an organization which requires many users
to access data concurrently.
Definition ~
• A 2TA consists of two computers : Client and Server.
• DB is stored on the server and UI resides on the client. PL can
be either on the client or on server.
Purpose ~
• To improve usability by supporting user friendly interface.
• To improve scalability by supporting upto 100 users.
• To support simple, non-time critical system by minimizing
operator’s intervention.
Technical details ~
• If processing load is on the client, such client is called Fat
Client and if it is on the server then such server is called Fat
Server.
Advantages ~
More users can interact with the system concurrently.
Disadvantage ~
Performance deteriorates if number of users > 100.
Limited flexibility due to shifting processing capability to
server.
Not cost-effective in terms of software if processing
capability is shifted to client.
Three tier Architecture
Definition ~
• Emerged in 1990s, 3-TA is designed by adding a third tier (middle
tier server) to 2-TA.
• The middle tier provides process management and can accommodate
hundreds of users.
Purpose ~
• To provide increased performance, flexibility, maintainability and
scalability, while holding complexity away from the user.
Client 1
Client 1
Application Server
Data Base Server
Client 1
Three tier Architecture
Advantages ~
• Clear separation of User Interface, Database, Process logic.
• Dynamic load balancing
• Change management
Disadvantages ~
• Increased need for traffic management, load balancing and
fault tolerance.
• Costly tools.
• Server library maintenance tools are inadequate to promote
code sharing.
Public Data Network
A
network shared and accessed by users not
belonging to a single organization.
It
is established and operated by private
operating agency, for the specific purpose of
providing data transmission services for the
public.
The
Internet is an example of a Public Data
Network.
Private Data Network
Private
data networks provide organizations a
dedicated network to transmit data according
to the needs of the organization.
They
are created and used under the
ownership of an individual or organization.
LANs
are the example of private networks.
• VPN is a privately operated network of an
organization that uses a public server.
• VPN is a secure network that uses the Internet as
its main backbone network, and relies on the
firewalls and other security features of the
Internet.
• Types ~
– Remote-access VPN
– Site-to-site VPN
• Intranet based
• Extranet based
The
concept of network computing views
networks as the central computing resource.
Network computing provide a browser-based
user interface for processing small application
programs called applets.
Servers provide the operating system, applets,
database, and DBMS needed by the users and
the network.
Network Computing can be of two types :
Centralized and Decentralized.
Centralised
De-Centralised
• All the computing is
done centrally.
• Server controls all the
peripherals
• greater security
• No
dependency
on
terminals
• High dependency on
server
• Relies heavily on the
quality of administration.
• Each terminal connected
can do processing.
• Each
terminal
has
redundant resources.
• Low security
• Limited dependency on
terminals.
• No
centralized
dependency
• User administer the
network themselves.
Network Topology
The geometric arrangement of nodes in the
network is called Network Topology.
[1] STAR Topology
Advantages ~
- Easy to add and remove nodes.
- Node failure does not turn down the network.
- Easy to diagnose problem
C1
C5
C2
Disadvantages ~
- High dependency on server.
- High cabling cost.
S
C4
C3
[2] RING Topology
Advantages ~
- Nodes has similar work load.
- Easy to expand.
Disadvantages ~
- Expensive.
- Difficult to install.
- Node failure turn down the network.
- Difficult to troubleshoot.
- Adding and removing node disturb the network.
[3] BUS Topology
Advantages ~
- Easy to use & form the network.
- Minimum cable requirement.
- Easy to expand.
Disadvantages ~
- Heavy network traffic can slow down bus transmission.
- Each connection between weaken the signals.
- Difficult to troubleshoot.
[4] MESH Topology
Advantages ~
- Redundancy of communication path.
- Highly reliable.
- Network problems are easy to diagnose.
Disadvantages ~
- Cost of installation and maintenance is high.
Transmission Techniques
Serial Transmission
• Single communication
path.
• Bits travels along a single
path.
• Cheaper mode
• Covers long distance
• Slow in speed.
Parallel Transmission
• 8 Communication paths
• All bits of a byte travels
together.
• Costly
• Not practical for long
distance
• Faster transmission
00000000
1101101010010111110101101101010100111001
11111111
Synchronous
Asynchronous
• Sender and Receiver know in
advance.
• Data are send in multi - word
block.
• Start and Stop bytes are used.
• Transmission is fast.
• Costly device.
• Only sender know the time of
transmission.
• Data are send character by
character.
• Each character is delimited by
Start and Stop bit.
• High reliable.
• Transmission is slow.
0 11011001 1 0 10101100 1 0 10011001 1 0 11000011 1 0 10101100
Transmission Mode
Simplex
Mode
Half
Duplex
Full
Duplex
Network architecture refers to the layout of
the network, hardware and software,
connectivity, communication protocols and
mode of transmission.
This architecture is designed by a network
administrator.
The goal of network architectures is to
promote an open, simple, flexible, and
efficient telecommunications environment.
Transmission Protocol
Definition
•
•
•
•
Language of communication.
Set of rule for inter-computer communication.
Standards of communication.
Software to perform actions in communication.
Functions
•
•
•
•
•
Physical aspect of communication
Linking and de-linking of devices
Syntax ~ character set, coding, format
Semantics ~ type and order
Timing ~
• Types ~
– Ready-made
X.12 (EDI), Ethernet (LAN), TCP/IP (Internet)
– User Defined (OSI model)
Application
Presentation
Session
Transport
Network
Data Link
Physical
• Physical
– Voltage determination, Topology
• Data Link
– Access control, data integrity
• Network
– Route determination, linking and de-linking
• Transport
– Assembling and dissembling of message
– Error recovery, multiplexing, encryption
• Session
– Establishing and termination of session
• Presentation
– Display of message, application interface
• Application
– User services, Database concurrency, Deadlocks
(Transmission Control
Protocol/Internet Protocol)
TCP/IP
OSI Model
TCP/IP
Application or
Process layer
Application layer
Presentation layer
Session layer
Transport layer
Transport layer
Internet layer
Network layer
Network interface
layer
Data Link layer
Physical layer
Physical layer
UnStructured
Internal
Threats
External
Structured
1) Unstructured Threats
This originate from inexperienced individuals using easily available
hacking tools from the internet. E.g. Port scanning tool, Addressswapping tools etc.
These kind of actions are done more out of curiosity rather then bad
intention.
2) Structured Threat
These originate from highly motivated and technically competent
individuals.
They take advantage of system vulnerability and penetrate the security.
They target specific business and hired by organized crime, competitors
etc.
3) External Threat
These originate from individuals not member of the organization and
does not have legitimate access to system.
4) Internal Threat
These originate from employees or individuals who have authorized
access to the network and system.
Software
bugs
Timing
Window
End User
Vulnera
bility
Insecure
default
configurat
ion
Trusting
unworthy
Info.
Bad
Protocol
Software bugs
Buffer overflow, failure to handle exception, input validation error etc. These
are so common that users have developed ways to work with them.
Timing window
System failure to protect the temporary files created on the hard disk.
Insecure default configuration
It occurs when user use vender supplied password.
Bad Protocol
Protocol with poor security control are likely to be exploited by hackers.
Trusting untrustworthy information
It occurs when computers are not programmed to verify that they are receiving
information from a unique host and they allow system access to any body.
Non-professional end users
Unawareness of password protection, backup and recovery operation etc.
Network Security
To protect network communication from
intruder and to safeguard the assets.
Types ~
Physical Security
Logical Security
Security Administrator prepares a security
program to ensure safeguarding of assets.
There are 8 steps of security program
development.
Step 1 : Preparing Project Plan
Step 2 : Assets Classification
Step 3 : Assets Valuation
Step 4 : Threat Identification
Step 5 : Threat Probability
Step 6 : Exposure Analysis
Step 7 : Control Adjustment
Step 8 : Reporting to management
Network Security Protocols are designed to
prevent any unauthorized user, application or
device from accessing network data.
Network security protocols generally
implement Cryptography and Encryption
techniques to secure the data.
[A] Cryptography
• Cryptography is the techniques for secure
communication in the presence of third parties.
• It is about constructing protocols that overcome the
influence of intruders and ensure data
confidentiality, integrity, authentication, and nonrepudiation.
[B] Encryption
• Encryption is the process of encoding messages in
such a way that hackers cannot read it, but only
authorized parties can.
• The three terms related to Encryption are : Plain
text, Cipher text and Encryption model.
• Plain Text
– It is the message written in human understandable
language and that is to be encrypted.
• Cipher Text
– It is the output of the encryption process that is
message translated into codes.
• Encryption Model
– The function of converting plain text into cipher text
is called encryption model.
– The art of breaking ciphers, known as Cryptanalysis,
and the art of devising them, known as Cryptography
are collectively known as Cryptology.
• Approaches to Encryption
– Hardware Encryption
Coding and decoding is done by hardware devices
to support high-speed traffic. All the data
transmission that takes place from the computer
having hardware encryption devices are encrypted
and secure.
– Software Encryption
This technique is employed in conjunction with
specific applications. This means only some specific
data communication is only encrypted and secured
by software encryption.
Network Security Protocol
• SSH (Secure Shell)
– It is a program to log into another computer over
a network and execute commands in the remote
machine. SSH protects a network from attacks
such as IP spoofing and IP source routing.
– During SSH login, the entire login session,
including transmission of password, is encrypted;
therefore it is almost impossible for an outsider to
collect passwords.
• SFTP (Secure File Transfer Protocol)
– Also called Secure FTP, it is a network protocol for
accessing and managing files on remote file
systems.
– Unlike standard File Transfer Protocol (FTP), SFTP
encrypts commands and data both, preventing
passwords and sensitive information from being
transmitted in the plain text.
• HTTPS
– Hypertext Transfer Protocol Secure is a protocol
for secure communication over WWW.
– The security of HTTPS uses long term public keys
to exchange a short term session key to encrypt
the data flow between client and server.
• SSL
– Secure Socket Layer is a protocol that provides a
secure channel between two machines operating
over the Internet.
– In practice, SSL is used to secure online credit card
transactions, system logins to secure webmail.
Fire Wall
• A device acting as a barrier between
company server and outside world.
• Types ~
– Network level firewall
– Application level firewall
It
makes sure that a message is really from
whom it purports to be and that it has not
been tempered with.
This
is achieved by affixing digital signature to
authenticate electronic document.
Site blocking
Web site with objectionable material should
be blocked to prevent employee’s access.
Web site that allow fraud transaction to pass
through
should
be
blocked
for
communication.
Intrusion Detection System (IDS)
NID
Network-Node
IDS
IDS
Hybrid
IDS
HID
Network Administration and Management
Network management refers to the activities,
methods, procedures, and tools that pertain
to
the
Operation,
Administration,
Maintenance, and Provisioning of networked
systems.
FCAPS—Fault, Configuration,
Performance and Security.
Accounting,
Operation
– deals with keeping, the network and the services
up and running smoothly.
Administration
– deals with keeping track of resources in the
network and how they are assigned. It includes all
the “housekeeping”.
Maintenance
– is concerned with performing repairs and
upgrades to make network run "better”.
Provisioning
– is concerned with configuring resources in the
network to support a given service.
Internet : The NET
Worldwide
“network of networks”
Information superhighway.
The Net does not have a central
computer system.
The Net does not have a headquarters
or governing body.
The Internet is growing rapidly.
Universal, Reliable and Cost Effective.
•
•
•
•
•
Off-line communication
Advertising &
promotion
Electronic Trading
Shareware
Entertainment
•
•
•
•
•
On-line communication
Enquiry handling
Database Access
Employment
Education
Business Use of the Internet
•
•
•
•
•
•
•
•
Strategic business alliances
Customer and vendor support
Collaboration among business partners
Buying and selling products and services
Marketing, sales, and customer service applications
Development of cross-functional business applications
Enterprise communications and collaboration
Attracting new customers with innovative marketing
and products.
• Customer Relationship Management.
• Developing new information-based products accessible
on the Web.
An intranet is a network that uses Internet technologies and
TCP/IP network protocols.
Intranet is a privately owned network of an organization
developed using a public server of Internet.
It's a network of computer that facilitates communication
within the organization, among departments, divisions and
regional offices.
An Intranet is protected by security measures such as
passwords, encryption, and firewalls, thus can be accessed by
authorized users through the Internet.
Business Value of Intranets
Communications
and Collaboration
Web Publishing
Business Operations
and Management
[A] Communications and Collaboration
E-mail
Audio
Conferencing
Video
Conferencing
Voice-mail
Chat rooms
Groupware
developing
Paging and
fax
Groups
discussion
[B] Web Publishing
Intranet allow corporate to develop and publishing
hyperlinked multimedia documents
It is ease to use, attractiveness, and low cost of
publishing and accessing multimedia business
information via intranet web sites.
[C] Business Operations and Management
Billing
Inventory
Control
Sales
management
EIS, MIS, DSS
Personnel
information
systems
Company
Calendar
Organization
Hierarchy
New Product
Development
Note
Order processing
Job Openings
Extranets are network that use Internet
technologies to interconnect the intranet of a
business with the intranets of its customers,
suppliers, or other business partners.
Extranets provide the privacy and security of
an Intranet while retaining the global reach of
the Internet.
An extranet requires security and privacy.
These require firewall systems, use of digital
certificates, encryption, and VPN tunnel.
Extranet Tasks
• Create secure Internet links between authorised
•
•
•
•
•
•
•
outsiders.
Encryption of sensitive data and its own firewall
systems to provide adequate security.
Exchange large volumes of documents using EDI.
Share product catalogs exclusively with channel
partners.
Collaborate with other companies.
Jointly develop and use training programs.
Provide or access services provided by one
company to other companies.
Share news of common interest.
1
• It makes customer and supplier access of business web
site a lot easier and faster.
2
• It enable a company to offer interactive Web-based
services to business partners and improve relationship
with them.
3
• Extranets enable collaboration by a business with its
customers.
4
• Extranets support online, interactive product
development, marketing, and customer focused
process.
Extranet Rules
Be as flexible as business
It must be flexible enough to provide customized services.
Deploy additional infrastructure
Company should not always create new infrastructure.
Protect the interest of data owner
The correct user can access the right services.
Serve the partner as customer
Must provide services without needing partners to change their
system, network, security , firewall etc.
Drive information to decision maker
It must provide progress reports to decision maker to measure
performance and popularity.
• According to E-Com forum –
– “E-com is an application of communication
technology to provide automated exchange of
business information with customer, supplier and
financial institution.”
• E-com is a
technologies –
combination
of
following
– EFT, EBT, EDI, EB, E-mail, BBS, WWW, Intranet,
Digital cash.
Placement of
Order
Payment
Authorization
request
Authorization
response
Working of E-Com
Settlement
deposited
Settlement
Request
Order
fulfillment
Benefits of E-com
Reduced cost to buyer
Reduced time in
delivery
Reduced inventory
Reduction in
manufacturing cost
Equal access to market
Improved market
intelligence
Reduced cost to seller
Reduced cost of
delivery
Reduction in
advertising cost
Easy entry to remote
market
Better quality of goods
Types of E-Com
Business-to-Business (B2B)
Business-to-Consumer (B2C)
Consumer-to-Business (C2B)
Consumer-to-Consumer (C2C)
Business-to-Government (B2G)
Business-to-Employee (B2E)
1
• Implementing policies, standards and guidelines.
2
• Performing cost benefit analysis and risk assessment.
3
• Implementing the right level of security.
4
• Establishing and implementing the right level of controls.
5
• Integration of e-Commerce with the business process.
6
• Providing adequate user training.
7
• Performing PIR.
Mobile commerce
Business trading through mobile devices such
cell-phones, PDAs etc.
The technology behind m-commerce is WAP.
The affected industries are –
Financial services
Telecommunication
Retail services
Information services
Electronic Fund Transfer
ATM
Telephone
transfer
EFT
Pre
authorised
Tran.
POS
terminals