- UNIT-I
The Scope of Electronic Commerce
Definition of Electronic Commerce,
Electronic E-commerce and the Trade Cycle
Electronic Markets, Electronic Data Interchange
Internet Commerce, E-Commerce in Perspective
Business Strategy in an Electronic Age: Supply Chains
Porter’s Value Chain Model, Inter-Organizational Value Chains
Competitive Strategy, Porter’s Model
First Mover Advantage Sustainable Competitive Advantage
Competitive Advantage using E-Commerce
Business Strategy, Introduction to Business Strategy
Strategic Implications of IT, Technology
Business Environment, Business Capability
Exiting Business Strategy, Strategy Formulation & Implementation Planning
E-Commerce Implementation
E-Commerce Evaluation
Characteristics of B2B EC
Models of B2B Ec
Procurement Management Using the Buyer’s Internal Marketplace
Just in Time Delivery
B2B Models
Auctions and Services from Traditional to Internet-Based EDI
The Role of Software Agents for B2B EC
Electronic marketing in B2B
Solutions of B2B EC
Managerial Issues
Electronic Data Interchange (EDI)
EDI: The Nuts and Bolts
EDI & Business
Internet and Extranet
The Largest Extranet,
Architecture of the Internet
Intranet and Extranet Intranet software ,Applications of Intranets
Intranet Application Case Studies
Considerations in Intranet Deployment
The Extranets, The structures of Extranets
Extranet products & services
Applications of Extranets,Business Models of Extranet Applications, Managerial Issues
Electronic Payment Systems,Is SET a failure
Electronic Payments & Protocols
Security Schemes in Electronic payment systems, Electronic Credit card system on the Internet
Electronic Fund Transfer and Debit cards on the Internet
Stored – value Cards and E-Cash,Electronic Check Systems
Prospect of Electronic Payment Systems,
Managerial Issues
UNIT-IV
Architecture of the Internet
Intranet and Extranet Intranet software ,Applications of Intranets
Intranet Application Case Studies
Considerations in Intranet Deployment
The Extranets, The structures of Extranets
Extranet products & services
Applications of Extranets,Business Models of Extranet Applications, Managerial Issues
Electronic Payment Systems,Is SET a failure
Electronic Payments & Protocols
Security Schemes in Electronic payment systems, Electronic Credit card system on the Internet
Electronic Fund Transfer and Debit cards on the Internet
Stored – value Cards and E-Cash,Electronic Check Systems
Prospect of Electronic Payment Systems,
Managerial Issues
The Largest Extranet, Architecture of the Internet
An Extranet is a restricted public network that is shared on a limited basis. Extranets are typically constructed. internet with security features that restrict access to authorized individuals and digital entities.
The following examples largest extranet.
Project Extranet
A construction project uses an extranet to share documents with stakeholders such as project management tea subcontractors. The extranet consists of a document management system connected to the internet with secure that limit access to authorized individuals.
Supplier Extranet
A retailer offers an extranet to supply chain partners to facilitate processes such as invoice payment and revere The extranet consists of a custom built website that is restricted to authorized partners with techniques such authentication.
Integration
An ecommerce site integrates with a major retail partner to automatically exchange inventory data using a sec network on top of the internet.
Employee Extranet
A restaurant chain offers employees an extranet that allows them to view their timesheets and other data. The allows employees to submit any concerns or recommendations they have without their manager seeing it. The allows the restaurant's corporate functions such as human resources to connect directly to employees.
Architecture of the Internet
The Internet architecture is based on a simple idea: ask all networks want to be part of carrying a single packet type, a specific format the IP protocol. In addition, this IP packet must carry an address defined with sufficient generality in order to identify each computer and terminals scattered throughout the world
To complete the IP, the US Defense added the TCP protocol; specify the nature of the interface with the user. This protocol further determines how to transform a stream of bytes in an IP packet, while ensuring quality of transport this IP packet. Both protocols, assembled under the TCP / IP abbreviation, are in the form of a layered architecture. They correspond to the packet level and message-level reference model.
The Internet model is completed with a third layer, called the application level, which includes different protocols on which to build Internet services. Email (SMTP), the file transfer (FTP), the transfer of hypermedia pages, transfer of distributed databases (World Wide Web), etc., are some of these services. Figure shows the three layers of the Internet architecture
IP packets are independent of each other and are individually routed in the network by interconnecting devices subnets, routers. The quality of service offered by IP is very small and offers no detection of lost or possibility of error recovery packages.
TCP combines the functionality of message-level reference model. This is a fairly complex protocol, which has many options for solving all packet loss problems in the lower levels. In particular, a lost fragment can be recovered by retransmission on the stream of bytes. TCP uses a connection-oriented mode.
An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network.[1]The application layer abstraction is used in both of the standard models of computer networking: the Internet Protocol Suite (TCP/IP) and the OSI model.
कोई टिप्पणी नहीं:
एक टिप्पणी भेजें