E-Business William R. Mussatto CyberStrategies, Inc. [email protected] 12/2/2000.

22
E-Business William R. Mussatto CyberStrategies, Inc. [email protected] 12/2/2000

Transcript of E-Business William R. Mussatto CyberStrategies, Inc. [email protected] 12/2/2000.

E-Business

William R. Mussatto

CyberStrategies, [email protected]

12/2/2000

Topics

• What is E-Business?

• E-Commerce

• Customer Relationship Management

• Supply Chain Management

• Business Intelligence

Defining the Problem

• What must businesses communicate?– Status, orders, general information,

advertisement.

• With whom must they communicate?– Customers, internally, with other businesses.

• Before the Internet, how did they communicate?– Dedicated lines, VANs, ship media, phone/fax.

E-Business Definitions

• IBM Definition:– The transformation of key business processes

through the use of Internet technologies.

• My Definition:– The enabling and creation of key business

processes through the use of Internet technologies.

Definitions

• Enabling and Transforming Communications between ...– businesses and customers– businesses and trading partners

• suppliers, partners

• Enabling and Transforming Exchange of Goods and Services– transactions, information

Internet Concepts and Technologies

• Internet -- short for Internetworking– a network of networks– TCP/IP

• Transmission Control Protocol / Internet Protocol

– vendor independent– shared public infrastructure

• not owned by anyone

• Loosely Cooperative– best effort delivery

TCP/IP Overview

• TCP / IP = Transmission Control Protocol / Internet Protocol

• Early 1970s– ARPANET

• Distributed with UC Berkeley UNIX in Early 1980s

• Public Domain, Non-Proprietary, Open Source

OSI 7-Layer Reference Model

Application

Presentation

Session

Network

Transport

Data Link

Physical

Application

Presentation

Session

Network

Transport

Data Link

Physical

Network

Data Link

Physical

Router’s/Switches effect this.

TCP/IP Overview Five Layer Model

• Application– includes OSI Application, Presentation, and

Session layers

• Transport (TCP / UDP)

• Network (IP)– datagrams / packets

• Data Link

• Physical

TCP/IP Overview

• Packet Switching– datagrams

• Nodes– hosts

• end-user machines

• clients or servers

– routers• connecting different networks

The “Net”

Company BCompany A

PSI Network

World Comm Network

TCP/IP Overview

• Connection-Oriented– TCP– reliable two-way, byte stream protocol

• Connectionless– UDP = User Datagram Protocol

• also known as the “Unreliable Datagram Protocol”

TCP/IP OverviewCommon Application Protocols

• HTTP: HyperText Transfer Protocol– the Web

• FTP: File Transfer Protocol– uploading and downloading files

• SMTP: Simple Mail Transfer Protocol– email

• POP: Post Office Protocol– email

Internet ProtocolsLayers

Layer Protocols

Application Telnet(login)

HTTP(web)

FTP(files)

SMTP(mail)

DNS(names)

NTP(time)

NFS(files)

Transport TCP UDP

Network IP

ISO 8802-2Datalink Ethernet

IEEE802.3

IEEE802.5

X.25 SLIP PPP

Physical Various

Internet Concepts and Technologies

• Douglas Comer’s Animations– http://www.netbook.cs.purdue.edu/index.htm– some topics are too detailed

The WebSome Key Acronyms

• HTTP: HyperText Transfer Protocol– rules for exchanging multimedia files– request / response– stateless (memoryless)

• workaround: cookies

• HTML: HyperText Markup Language– web documents

• XML: eXtensible Markup Language– very important for B2B communications

The WebURIs / URLs

• URI: Uniform Resource Identifier

• URL: Uniform Resource Locator– uniquely identifies resource and method to

access it over the web

• Two Forms of URLs– absolute– relative to some known base URL

The WebURIs / URLs

• Absolute– http: “//” host [: port] [abs_path]– http://www.csz.com:80/ucr/iep/index.htm– ftp://myhost.yahoo.com/memos/memo2.doc– file://memos/memo2.doc

• Relative– just the [abs_path] portion

How the Web Communicates• Methods

– GET, HEAD must be supported– POST

• for sending data back to server

• although GET can also be used indirectly to pass parameter information back to the server

• Examples– http://www.fascinating-olds.com/idc/detail.idc?

productid=228

The WebSecurity

• Basic Authentication– .htaccess files (Unix)

• Secure Sockets Layer (SSL)– https– RSA Encryption

• public key / private key

• Patent expires shortly.

– not really part of HTTP

The WebHTML

• Main Tags– <html> </html> starts HTML stream– <head> </head> delimits HEAD of document– <title> </title> title that appears at top of

browser frame– <body> </body> delimits document BODY– <a href=“…URL…”>Text</a> creates a

hyperlink– <img src=“…”> inserts an image into a file

Class Problem

• How could a realtor obtain initial authorization for a loan from a house?– Internet access is available. – Persons seeking the loan have all sufficient

paperwork to prove who they are and have proper bank references.

– Take about 10 minutes.