Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 6-1© 2007 Prentice-Hall, Inc ELC 200 Day 9.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Mobile Communication MMS.
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 6-1© 2007 Prentice-Hall, Inc ELC 200 Day 9.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 6-1© 2007 Prentice-Hall, Inc ELC 200 Day 11.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 6-1© 2007 Prentice-Hall, Inc ELC 200 Day 9.
ELC 200 Day 10. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #3 Corrected –2 A’s, 10 B’s, 3 C’s, 1 D, 2 F’s and 1 non-submit.
ELC 200 Day 10. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #3 Not Corrected –Still missing 3 assignments –Will be.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Wireless Application Protocol and i-Mode By Sridevi Madduri Swetha Kucherlapati Sharrmila Jeyachandran.
Communications and Networks
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 1-1© 2007 Prentice-Hall, Inc ELC 200 Day 10.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks.
COMMUNICATIONS AND NETWORKS
WAP: Wireless Application Protocol Mike Mc Ardle ACSG April, 2005.
Networks Olga Agnew Bryant Likes Daewon Seo.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 6-1© 2007 Prentice-Hall, Inc Mobile Commerce: The Business of Time.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 5 Updated January 2009 Raymond Panko’s Business Data Networks and Telecommunications,
Communications & Networks
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
Computer networks 6: Wireless and Mobile Networks.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Chapter 5 Networks Communicating and Sharing Resources
Switched and Wireless LANs. 2 Shared media LANs u Limits to Shared Media LANs –FDDI, 100Base-X, 100VG-AnyLAN all shared media LANs v Only one station.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Chapter 7 Connecting to the Internet. Connecting to the Internet FAQs: – What is the Internet? – What are the options for Internet service? – What is.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Chapter 9 Mobile Computing and Commerce and Pervasive Computing.
The Digital Revolution and The Global E-Marketplace Chapter 25 Matakuliah: J0474 International Marketing Tahun: 2009.
Chapter 7 Mobile Commerce— The Business of Time
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Telecommunications, the Internet, and Wireless Technology.
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
Managing Telecommunications Chapter 6 Emily Gehm Jessica Paul Melanie Wall.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Wireless, Mobile Computing today’s wireless devices and wireless transmission media wireless networks according to their effective distance Define mobile.
WAP Architecture Presented by, Nithya Inbamani. WAP Background Wireless Application Protocol – secure specification. Wireless Application Protocol – secure.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
WIRELESS NETWORKS. Wireless?  A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier.  The last link with the.
ICT Unit 4: Network and the effects of using them
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Fidelity 1 1.
Communications and Networks Chapter 9 McGraw-Hill/Irwin
Data Communication and Networks
Data Communication and Networks
Data Communication and Networks
Data Communication and Networks
Data Communication and Networks
Presentation transcript:

Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 6-1© 2007 Prentice-Hall, Inc ELC 200 Day 9

6-2 © 2007 Prentice-Hall, Inc Agenda Questions from last class? Assignment 3 Due Assignment 4 Will be Posted next week –Due Oct 16 Quiz 2 will be on Oct 9 << Change –Chapter’s 3, 4, 5 & 6 –20 4 Points each –4 short 5 Points each –1 extra credit question for 5 Points –60 mins, Open Book, Open Notes Possible Extra Credit questions –Where’s my name? –Who’s this guy? >>> Discussion on Mobile Commerce

Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 6-3© 2007 Prentice-Hall, Inc Mobile Commerce: The Business of Time

6-4 © 2007 Prentice-Hall, Inc How Cellular Works Network of cell sites distributed over a wide area –Radio transceiver –Base station controller –Tower and antennas Mobile telecommunications switching office (MTSO) is a cellular switch that places calls from land-based telephones to wireless customers System identification code (SIC or EISN) Controlled channel Phone transmits a registration request MTSO keeps track of the phone’s location in a database

6-5 © 2007 Prentice-Hall, Inc How Cellular Works (Cont’d) MTSO finds you and your phone in the database MTSO picks up frequency that your phone will use in that cell MTSO tells your phone over the control channel which frequencies to use When your phone and the tower switch to those frequencies, the call is connected

6-6 © 2007 Prentice-Hall, Inc Cellular Telephony B E H D I G L K F C M A J N P Handoff O PSTN Mobile Telephone Switching Office 1. Automatic Handoff Between Cellsites O to P as Phone Travels Between Cells

6-7 © 2007 Prentice-Hall, Inc Wireless LAN (WLAN) Uses radio waves to connect laptops and other electronic devices to a LAN Identical to a regular LAN, except that the devices are wireless Wireless network interface card (WNIC) is a card that interfaces between the wireless device and an access point for data or voice transmission and reception Access point (AP) is when a wireless station sends a frame to a server, an access point acts as a bridge that passes the frame over the wired LAN to the server

6-8 © 2007 Prentice-Hall, Inc Typical Wireless LAN Operation with Access Points Switch Client PC Server Large Wired LAN Access Point A Access Point B UTPRadio Link Handoff If mobile computer moves to another access point, it switches service to that access point Notebook CSMA/CA+ACK UTP

6-9 © 2007 Prentice-Hall, Inc Typical Wireless LAN Operation with Access Points Wireless Notebook NIC Access Point Industry Standard Coffee Cup To Ethernet Switch Antenna (Fan) PC Card Connector

6-10 © 2007 Prentice-Hall, Inc Typical Wireless LAN Operation with Access Points D-Link Wireless Access Point

6-11 © 2007 Prentice-Hall, Inc Linksys Switch With Built-In Wireless Access Point Typical Wireless LAN Operation with Access Points

6-12 © 2007 Prentice-Hall, Inc Typical Wireless LAN Operation with Access Points The Wireless Station sends an frame to a server via the access point The access point is a bridge that converts the frame into an Ethernet frame and sends the frame to the server Mobile Station Access Point Ethernet Switch Server Frame Frame

6-13 © 2007 Prentice-Hall, Inc Wireless LAN Speeds Mbps (rare) 2.4 GHz band (limited in bandwidth) b11 Mbps, 2.4 GHz 3 channels/access point a54 Mbps, 5 GHz (> bandwidth than 2.4 GHz) 11 channels/access point g54 Mbps, 2.4 GHz limited bandwidth

6-14 © 2007 Prentice-Hall, Inc Ad Hoc Networks Ad Hoc Mode –There is no access point. –Stations broadcast to one another directly –Not scalable but can be useful for SOHO use –NICs automatically come up in ad hoc mode

6-15 © 2007 Prentice-Hall, Inc Security Attackers can lurk outside your premises –In “war driving,” drive around sniffing out unprotected wireless LANs –In “drive by hacking,” eavesdrop on conversations or mount active attacks. Site with WLAN Outside Attacker Doonesbury July 21, 2002

6-16 © 2007 Prentice-Hall, Inc Factors When Considering WLAN Range and coverage Throughput Security and integrity Cost and scalability User costs Standardization of WLANs

6-17 © 2007 Prentice-Hall, Inc Wireless Security Concerns Transmitted message must be protected all the way to its destination host Host system must verify or authenticate the user Wired Equivalent Privacy (WEP) is part of Wi-Fi security mechanism that makes it possible to encrypt messages before heading for their destination –Uses a secret key to encrypt messages –40-bit key is standard but vulnerable –Even the latest 128-bit key is not fully secure

6-18 © 2007 Prentice-Hall, Inc Wireless Application Protocol (WAP) Basis for the mobile Internet Universal standard for positive wireless Internet implementation Adds an Internet protocol layer to the cellular network –

6-19 © 2007 Prentice-Hall, Inc Schematic of the WAP Model

6-20 © 2007 Prentice-Hall, Inc WAP Protocol Stack Wireless Application Environment (WAE) WAP element that establishes an interoperable environment to allow operators and service providers to build applications and services for a large variety of wireless platforms. Wireless Session Protocol (WSP) WAP element that decides whether a network and a device will communicate back and forth or whether data will be transmitted straight from a network to the device. Wireless Transaction Protocol (WTP) WAP layer that ensures that data flow from one location to another efficiently based on a request/reply paradigm Wireless Transport Layer Security (WTLS) WAP element that gives security to the system via encryption, data integrity verification, and authentication between the user and the server Wireless Datagram Protocol (WDP) WAP feature that confirms easy adaptation to the WAP technology Network Carrier Method (NCM) A technology that a wireless provider uses

6-21 © 2007 Prentice-Hall, Inc WAP Limitations Small keypad and without a mouse Devices have limited memory Reliability uncertain A period of high latency or delays before making the connections Security issues Legal Issues

6-22 © 2007 Prentice-Hall, Inc Mobile Payments Framework and Examples

6-23 © 2007 Prentice-Hall, Inc Trust Issues Customers have an inherent resistance to sharing personal or private information with technology Trust is a psychological state involving confident positive expectation about another person’s motive with respect to a given exchange or a relationship entailing risk Gaining customer trust in m-commerce can be a daunting process To enhance trust in mobile commerce, security must be designed into the entire mobile system –Enhancing customer familiarity with the company –Building a reputation that suggests certainty and less risk –Providing attractive rewards to attract potential customers –Maintaining company integrity –Strengthening security controls –Use external auditing

6-24 © 2007 Prentice-Hall, Inc Managerial Issues Evaluate corporate needs Evaluate the wireless needs Send out a request for proposal (RFP) Request a demo of the proposed wireless system Install and test the wireless system Train employees Provide ongoing maintenance Most important element is the human staff Best practice to reduce costs is to standardize wireless devices

6-25 © 2007 Prentice-Hall, Inc Implications for Management M-commerce is long on technologies but short on standards M-commerce opens doors to new ways of doing business M-commerce will dominate areas where they have time-based and location-based value Consider cultural and location-based issues Prepare the company to offer mobile services that will be strategically advantageous to the business Experiment with the new m-technology and view the whole effort as an investment in tomorrow’s way of doing business

6-26 © 2007 Prentice-Hall, Inc Chapter Summary M-commerce is the transmission of user data without wires The wireless Web is a technological frontier, open and growing The main benefits are convenience, flexibility, and efficiency with anytime, anywhere access Wireless limitations address distance, speed, and security factors Four critical success factors need to be monitored: mobility, personalization, global standardization, and customer profiling

6-27 © 2007 Prentice-Hall, Inc Chapter Summary (Cont’d) Bluetooth is a universal, low-cost wireless technology designed for short-range radio hookup for wireless connections among computers, scanners, and printers Key layers of Bluetooth are the radio layer, baseband layer, and link manager protocol The transmitted message must be protected all the way to its destination, and the host system must verify or authenticate the user it is communicating with 2G digital cellular technology expedites vehicles in motion

6-28 © 2007 Prentice-Hall, Inc Chapter Summary (Cont’d) A cell site contains a radio transceiver and a base station controller Cell sites coordinate the hand off as you move from one cell to another The most common standard for wireless networking is the WLAN To consider WLAN technology, you must consider range and coverage, throughput, security and integrity, cost and stability, and standardization Most WAP benefits are reflected in wireless applications

6-29 © 2007 Prentice-Hall, Inc Chapter Summary (Cont’d) WAP has the limitations of low-power CPU, small screens with questionable clarity, limited device memory, small keypads and no mouse, questionable connections for reliability, and high latency Companies are beginning to consider the liability issues, as well as managerial issues