Breaking

रविवार, 19 अप्रैल 2020

BCA 6th Sem Notes- The Largest Extranet, Architecture of the Internet


  • UNIT-I 
Introduction to E-Commerce
The Scope of Electronic Commerce 
Definition of Electronic Commerce,
Electronic E-commerce and the Trade Cycle
Electronic Markets, Electronic Data Interchange
Internet Commerce, E-Commerce in Perspective
Business Strategy in an Electronic Age: Supply Chains
Porter’s Value Chain Model, Inter-Organizational Value Chains
Competitive Strategy, Porter’s Model
First Mover Advantage Sustainable Competitive Advantage
Competitive Advantage using E-Commerce
Business Strategy, Introduction to Business Strategy
Strategic Implications of IT, Technology
Business Environment, Business Capability
Exiting Business Strategy, Strategy Formulation & Implementation Planning
E-Commerce Implementation
E-Commerce Evaluation








  • UNIT-II 
  • Business-to-Business Electronic Commerce
    Characteristics of B2B EC
    Models of B2B Ec
    Procurement Management Using the Buyer’s Internal Marketplace
    Just in Time Delivery
    B2B Models
    Auctions and Services from Traditional to Internet-Based EDI
    The Role of Software Agents for B2B EC
    Electronic marketing in B2B
    Solutions of B2B EC
    Managerial Issues
    Electronic Data Interchange (EDI)
    EDI: The Nuts and Bolts
    EDI & Business








  • UNIT-III 
  • Internet and Extranet
    The Largest Extranet,

    Architecture of the Internet
    Intranet and Extranet Intranet software ,Applications of Intranets
    Intranet Application Case Studies
    Considerations in Intranet Deployment
    The Extranets, The structures of Extranets
    Extranet products & services
    Applications of Extranets,Business Models of Extranet Applications, Managerial Issues
    Electronic Payment Systems,Is SET a failure
    Electronic Payments & Protocols
    Security Schemes in Electronic payment systems, Electronic Credit card system on the Internet
    Electronic Fund Transfer and Debit cards on the Internet
    Stored – value Cards and E-Cash,Electronic Check Systems
    Prospect of Electronic Payment Systems,
    Managerial Issues







  • UNIT-IV 









  • UNIT-V                 

  • The Largest Extranet, Architecture of the Internet


    An Extranet is a restricted public network that is shared on a limited basis. Extranets are typically constructed. internet with security features that restrict access to authorized individuals and digital entities. 
    The following examples largest  extranet.

    Project Extranet
    A construction project uses an extranet to share documents with stakeholders such as project management tea subcontractors. The extranet consists of a document management system connected to the internet with secure that limit access to authorized individuals.

    Supplier Extranet
    A retailer offers an extranet to supply chain partners to facilitate processes such as invoice payment and revere The extranet consists of a custom built website that is restricted to authorized partners with techniques such authentication.

    Integration
    An ecommerce site integrates with a major retail partner to automatically exchange inventory data using a sec network on top of the internet.

    Employee Extranet
    A restaurant chain offers employees an extranet that allows them to view their timesheets and other data. The allows employees to submit any concerns or recommendations they have without their manager seeing it. The allows the restaurant's corporate functions such as human resources to connect directly to employees.

    Architecture of the Internet

    The Internet architecture is based on a simple idea: ask all networks want to be part of carrying a single packet type, a specific format the IP protocol. In addition, this IP packet must carry an address defined with sufficient generality in order to identify each computer and terminals scattered throughout the world

    To complete the IP, the US Defense added the TCP protocol; specify the nature of the interface with the user. This protocol further determines how to transform a stream of bytes in an IP packet, while ensuring quality of transport this IP packet. Both protocols, assembled under the TCP / IP abbreviation, are in the form of a layered architecture. They correspond to the packet level and message-level reference model.
    The Internet model is completed with a third layer, called the application level, which includes different protocols on which to build Internet services. Email (SMTP), the file transfer (FTP), the transfer of hypermedia pages, transfer of distributed databases (World Wide Web), etc., are some of these services. Figure shows the three layers of the Internet architecture

    IP packets are independent of each other and are individually routed in the network by interconnecting devices subnets, routers. The quality of service offered by IP is very small and offers no detection of lost or possibility of error recovery packages.

    TCP combines the functionality of message-level reference model. This is a fairly complex protocol, which has many options for solving all packet loss problems in the lower levels. In particular, a lost fragment can be recovered by retransmission on the stream of bytes. TCP uses a connection-oriented mode.
    An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network.[1]The application layer abstraction is used in both of the standard models of computer networking: the Internet Protocol Suite (TCP/IP) and the OSI model.

    Next Topic


    कोई टिप्पणी नहीं:

    एक टिप्पणी भेजें