Presentation is loading. Please wait.

Presentation is loading. Please wait.

ELC 200 Day 5, 6 (Quiz Day) & 7. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #2 due next class Quiz # 1 on Jan 28 –Chap.

Similar presentations


Presentation on theme: "ELC 200 Day 5, 6 (Quiz Day) & 7. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #2 due next class Quiz # 1 on Jan 28 –Chap."— Presentation transcript:

1 ELC 200 Day 5, 6 (Quiz Day) & 7

2 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #2 due next class Quiz # 1 on Jan 28 –Chap 1-3 of text –15 M/C (60 Points), 4 Short Essay (40 Points) –Open book, open notes Today we will finish discussion on Designing Networks and begin a discussion on Intranets and Extranet

3 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 3 Factors in Designing a Network Location Capacity Distance limitations Cost Potential growth Security Internet Architecture: Factors in Designing a Network

4 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 4 Factors in Selecting Network Architecture Hardware requirements Software requirements Disaster recovery & fault-tolerance requirements Corporate culture and organizational factors Internet Architecture: Factors in Designing a Network

5 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 5 Network Management System Manager Managed Nodes Objects Management Information Base (MIB) –http://www.simpleweb.org/ietf/mibs/http://www.simpleweb.org/ietf/mibs/ Requests & responses http://www.somix.com/ Internet Architecture: Network Management System

6 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 6 Network Management Based on SNMP Management Information Base (MIB) Management Information Base (MIB) Management Information Base (MIB) Network Management Software (Manager) Simple Network Management Protocol (SNMP) RMON Probe Command (Get, Set, etc.) Response Trap

7 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 7 Large-Scale E-commerce Issues Financial exposure IP exposure Legal security Packet sniffing

8 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 8 Ensuring Corporate and Information Security Firewalls IPSec Intrusion detection systems http://www.schneier.com/

9 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 9 Management Implications High demand for Technical talent –Project Management –Business Knowledge –Communication Skills –High SalariesHigh Salaries –Fastest GrowingFastest Growing Retaining Talent –Constructive & Timely Feedback –Recognition & Appreciation –Championing Staff Causes –Support Employee Career goals –Match Industry Standards for Salary

10 Chapter 4 Intranets and Extranets

11 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 11 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet E-mail and Intranet Extranets

12 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 12 WHAT IS AN INTRANET? An organization-wide software and information distribution system applying Internet technology to a closed network Intranet operation is a communication project designed by technical staff A network of people, not wired machines Usually runs in a client/server environment and a local area network configuration

13 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 13 BENEFITS Links employees and managers together Automates a lot of intra-organizational traffic Enables a company to gain better access to its primary resources – knowledge and experience Serves as a creative and empowering tool Establishes the foundation for developing enterprise-wide information systems

14 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 14 BENEFITS (Cont’d) Provides a model for new internal information management & collaborative computing Prepares a wealth of Internet knowledge to employees Eases process integration Allows company to expand the system

15 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 15 APPLICATIONS Human Resources –Employee handbook –Benefits information –Employee surveys –Internal/external recruiting –Candidate screening –Organizational charts –Newsletters –Company calendars Vacation schedules

16 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 16 APPLICATIONS (Cont’d) Sales and Marketing –Product information –Market research –Prospecting –Managing sales contacts –Sales training

17 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 17 APPLICATIONS (Cont’d) Accounting and Finance –Financial reports –Expense reports –Accounts receivable/payable processing –Asset management –Policies and procedures –Payroll

18 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 18 APPLICATIONS (Cont’d) Manufacturing and Operations –Inventory control –Production schedules –Quality assurance –Part order/requisition system

19 ELC 200 Day 6

20 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 20 Bribe List 1947 HD FLH “knucklehead” 2005 Ford Harley-Davidson™ F-350 Super Duty Audi LeMans (any year) Redneck Engineering Chopper –“curves frame”

21 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 21 Agenda Assignment #2 due Quiz # 1 Today –Chap 1-3 of text –15 M/C (60 Points), 4 Short Essay (40 Points) –Open book 60 min –You can leave when have completed the quiz –Good luck

22 ELC 200 Day 7

23 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 23 Agenda Quiz #1 Graded –7 A’s, 9 B’s, 2 C’s and 1 D –Answers were all straight out of the book Assignment #2 Graded –9 A’s, 1 B, 2 C’s, 1 D, 2 F’s and 4 non-submits –Those Zeros for not turning assignments will really screw up your average Assignment #3 assigned today Today finish up on Intranets and Extranets

24 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 24 WHY DOES A COMPANY NEED AN INTRANET? A company has a large pool of information to share among hundreds of its employees –Break point is ~ 100 Intranets are cheap (relatively), robust and fast Intranets operate across platforms –UNIX, Windows, Mac 24/7 to employees Information in intranet can be updated quickly and uniformly

25 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 25 TECHNICAL INFRASTRUCTURE Client/Server Basis –Client/Server software architecture Versatile Message-based Modular infrastructure intended to improve usability Flexibility Interoperability Scalability –Mainframe architecture all intelligence is within the central host computer

26 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 26 TYPES OF CLIENT/SERVER ARCHITECTURE Two-tier architectures –For an organization with 12-100 users –Clients -- Servers Three-tier architectures –User system interface –Processing management –Database management –Clients – Processors – Servers

27 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 27 TWO-TIER ARCHITECTURE DESIGN User System Interface Database Management

28 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 28 THREE-TIER ARCHITECTURE DESIGN User System Interface Database Management Process Management

29 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 29 BASIC INTRANET-ENABLING TECHNOLOGIES Server and Client PCs Web Server Browsers TCP/IP based Electronic Mail Graphic and Multimedia Files Network File System (NFS) Internet Relay Chat (IRC) HTML Authoring Tools HTML Portable Electronic Document (PDF)

30 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 30 USING FIREWALLS Proxy –“Go-between” agent that acts on behalf of another Packet Filter –Checks each packet at network level

31 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 31 Application (Proxy) Firewall SMTP (E-Mail) Proxy FTP Proxy Application Firewall HTTP Proxy Browser Webserver Application 1. HTTP Request Client PC Webserver 2. Inspect Request Message

32 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 32 Figure 9.7: Application (Proxy) Firewall SMTP (E-Mail) Proxy FTP Proxy Application Firewall 3. Examined HTTP Request HTTP Proxy Browser Webserver Application Client PC Webserver

33 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 33 Figure 9.7: Application (Proxy) Firewall SMTP (E-Mail) Proxy FTP Proxy Application Firewall HTTP Proxy Browser Webserver Application 4. HTTP Response Client PC Webserver 5. Inspect Response Message

34 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 34 Figure 9.7: Application (Proxy) Firewall SMTP (E-Mail) Proxy FTP Proxy Application Firewall HTTP Proxy Browser Webserver Application 6. Examined HTTP Response Client PC Webserver

35 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 35 Packet Filter Firewall Packet Filter Firewall IP-H TCP-H UDP-HApplication Message IP-HICMP Message Arriving Packets Permit Deny Corporate NetworkThe Internet Examines Packets in Isolation Fast but Misses Some Attacks

36 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 36 PLANNING AN INTRANET Plan ahead Provide justification with management support –Without management support you have little to no chance of success Build an intranet in-house or outsource it Form an Intranet team –Advisory and Oversight (CYA) Build and test a prototype Ensure effective maintenance

37 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 37 E-MAIL and INTRANET Spamming –Sending unwanted advertisements or literature through e-mail Flaming –Responding to a message or a call in anger

38 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 38 E-MAIL ETIQUETTE Write in different color to express attitude or mood Keep sentences short Be aware of your office and organization culture Avoid FLAMING Don’t use e-mail to send bad news Don’t type in capital letters

39 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 39 EXTRANETS Lets limited, controlled business partners interact with the firm for all kinds of exchanges System designers must collaborate to make sure there is a common interface with the company they are dealing with Benefits: faster time-to-market, customer loyalty, increased partner interaction, and improved processes

40 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 40 KEY CONSIDERATIONS Identifying users Listing technology components Specifying security requirements Discussing administration of extranet Understanding usability of extranet

41 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 41 OTHER CONSIDERATIONS Security –Type of users –Sensitivity of information transacted –Communication lines used Manageability / administration Usability

42 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 42 ROLE OF CHAMPION Ensures accountability for the organization Promotes more effective collaboration with business partners which improves potential for increased revenue Provides a long-term investment in competitive advantage

43 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 43 eCommerce Framework Instead of a Final Exam ELC 200 has a capstone experience project –18% of your final grade Ties in everything you learned in the course from a applied perspective. The final project is an E-Commerce Initiative framework –mini-business plan –Mostly its a proof of concepts –Used in business to develop funding opportunities Parts –Paper – due last week of class –Presentation – due last week of class Guidelines posted in WebCT and handed out in class

44 Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 44 Assignment # 3 On page 129 and 130 –Do the following questions from the Discussion Questions Section –1, 2, 3 & 7 On Page 157 –Do the following questions from the Discussion Questions Section –1, 2, 4, & 6 Turn in a well formatted Word Document Due Feb 8 at the beginning of class


Download ppt "ELC 200 Day 5, 6 (Quiz Day) & 7. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #2 due next class Quiz # 1 on Jan 28 –Chap."

Similar presentations


Ads by Google