Detailed Table of Contents



Similar documents
Chapter 4: Networking and the Internet

Basic Internet programming Formalities. Hands-on tools for internet programming

CHAPTER 9: THE EVOLVING INTERNET

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Network Configuration Settings

Connecting with Computer Science, 2e. Chapter 5 The Internet

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

JAVA Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Component-based Approach to the Development of Internet EDI Software for Electronic Document Management

SSVP SIP School VoIP Professional Certification

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Client/server is a network architecture that divides functions into client and server

SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems

TEACHING AND EXAMINATION SCHEME FOR

Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc

Web Application Development

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Technical Support Information Belkin internal use only

Overview of TCP/IP. TCP/IP and Internet

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Multi-Homing Dual WAN Firewall Router

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Architecture Design For Web-based Application Systems. Instructor: Dr. Jerry Gao Class: CMPE296U

The TCP/IP Reference Model

COM 440 Distributed Systems Project List Summary

Computer Networks/DV2 Lab

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

EUCIP IT Administrator - Module 3 Networks Syllabus Version 3.0

How to Build an E-Commerce Application using J2EE. Carol McDonald Code Camp Engineer

Answer Question No. 1 which is compulsory and any five from the rest. a) What are the various components of electronic commerce applications?

What is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator.

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Address Resolution Protocol (ARP)

Introduction To Computer Networking

M3-R3: INTERNET AND WEB DESIGN

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Chapter 5. Data Communication And Internet Technology

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Network Models OSI vs. TCP/IP

ICTTEN8195B Evaluate and apply network security

Chapter 1 Personal Computer Hardware hours

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Contents. Client-server and multi-tier architectures. The Java 2 Enterprise Edition (J2EE) platform

Basic Network Configuration

HomeWorks P5 Processor Ethernet TCP / IP Networking Specification

Network Programming TDC 561

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19

Advanced Higher Computing. Computer Networks. Homework Sheets

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

OS/390 Firewall Technology Overview

Chapter 12 Supporting Network Address Translation (NAT)

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Enterprise Application Integration

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

How do I get to

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Web Hosting & Maintenance

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection

Kick starting science...

Service Oriented Architectures

Portals, Portlets & Liferay Platform

Application Layer -1- Network Tools

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.

What Is the Java TM 2 Platform, Enterprise Edition?

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Specialized Programme on Internetworking Design and LAN WAN Administration

The OSI and TCP/IP Models. Lesson 2

1 Introduction: Network Applications

SSVVP SIP School VVoIP Professional Certification

Deploying BusinessObjects Enterprise in a Complex Network Environment

VPN. Date: 4/15/2004 By: Heena Patel

Using MIS 3e Chapter 6A Appendix

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

EXPLORER. TFT Filter CONFIGURATION

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Architectural Overview

Device Log Export ENGLISH

EUCIP - IT Administrator. Module 4 - Expert Network Use. Version 2.0

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Proxies. Chapter 4. Network & Security Gildas Avoine

Network Layers. CSC358 - Introduction to Computer Networks

Lectures 1 and 2 INFS 766/INFT 865. Internet Security Protocols. Lectures 1 and 2 Firewalls and Their Limitations. Prof. Ravi Sandhu REFERENCE BOOKS

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Transcription:

Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts 20 Review Questions 21 2. Internetworking Concepts, Devices, Basics, History and Architecture 23 2.1 Why Internetworking? 24 2.2 Problems in Internetworking 24 2.3 Dealing with Incompatibility Issues 25 2.4 A Virtual Network 28 2.5 Internetworking Devices 29 2.6 Repeaters 30 2.7 Bridges 31 2.8 Routers 36 2.9 Gateways 39 2.10 A Brief History of the Internet 40 2.11 Growth of the Internet 41 2.12 Internet Topology 43 2.13 Internal Architecture of an ISP 45 Summary 48 Key Terms and Concepts 50 Review Questions 50 3. TCP/IP Part I (Introduction to TCP/IP, IP, ARP, RARP, ICMP) 54 3.1 TCP/IP Basics 56 3.2 Why IP Addresses? 57 3.3 Logical Addresses 60 3.4 TCP/IP Example 60 3.5 The Concept of IP Address 68 3.6 Address Resolution Protocol (ARP) 74 3.7 Reverse Address Resolution Protocol (RARP) 78 3.8 Internet Control Message Protocol (ICMP) 78 3.9 Datagram Fragmentation and Reassembly 82 Summary 90 Key Terms and Concepts 93 Review Questions 94 4. TCP/IP Part II (TCP, UDP) 98 4.1 Basics of TCP 98 4.2 Features of TCP 99 4.3 Relationship between TCP and IP 102 vii viii

4.4 Ports and Sockets 104 4.5 Connections Passive Open and Active Open 107 4.6 TCP Connections 108 4.7 What Makes TCP Reliable? 109 4.8 TCP Packet Format 110 4.9 Persistent TCP Connections 112 4.10 User Datagram Protocol (UDP) 113 4.11 UDP Packet 113 4.12 Differences between UDP and TCP 114 Summary 116 Key Terms and Concepts 117 Review Questions 117 5. TCP/IP Part III (DNS, Email, FTP, TFTP) 120 5.1 Domain Name System (DNS) 120 5.2 Electronic Mail (Email) 127 5.3 File Transfer Protocol (FTP) 142 5.4 Trivial File Transfer Protocol (TFTP) 148 Summary 149 Key Terms and Concepts 151 Review Questions 151 6. TCP/IP Part IV (WWW, HTTP, TELNET) 154 6.1 A Brief History of WWW 155 6.2 The Basics of WWW and Browsing 155 6.3 Locating Information on the Internet 162 6.4 Hyper Text Markup Language (HTML) 163 6.5 Web Browser Architecture 169 6.6 Web Pages and Multimedia 172 6.7 Remote Login (TELNET) 174 Summary 178 Key Terms and Concepts 180 Review Questions 180 7. An Introduction to Electronic Commerce 183 7.1 Aspects of Electronic Commerce 183 7.2 Types of Electronic Commerce 185 7.3 Approaches for Developing Electronic Commerce Solutions 185 7.4 Electronic Procurement 193 7.5 Phases in a Procurement Process 195 7.6 E-procurement Models 196 7.7 E-procurement Solutions 199 7.8 Trading Models 201 7.9 Buyer Side Purchasing 203 7.10 Supply Chain Management (SCM) and Customer Relationship Management (CRM) 209 Summary 211 Key Terms and Concepts 212 Review Questions 212 8. Introduction to Web Technology 214

8.1 Features Required for Enabling e-commerce 214 8.2 Web Pages Types and Issues 215 8.3 Tiers 215 8.4 The Concept of a Tier 216 8.5 A Comparison of Microsoft and Java Technologies 219 8.6 Web Pages 223 8.7 Static Web Pages 224 8.8 Plug-ins 228 8.9 Introduction to Frames and Forms 229 8.10 Frames 230 8.11 Forms 232 Summary 238 Key Terms and Concepts 240 Review Questions 240 9. Dynamic Web Pages 244 9.1 The Need for Dynamic Web Pages 244 9.2 The Magic of Dynamic Web Pages 245 9.3 An Overview of Dynamic Web Page Technologies 253 9.4 An Overview of Dynamic HTML (DHTML) 261 9.5 Common Gateway Interface (CGI) 262 9.6 Microsoft s Active Server Pages (ASP) 263 9.7 Basics of ASP Technology 264 9.8 ASP Example 264 9.9 Modern Trends in ASP 270 9.10 Java and the Concept of a Virtual Machine 270 9.11 Java Servlets and Java Server Pages (JSP) 277 9.12 Java Servlets 278 9.13 Java Server Pages (JSP) 284 Summary 286 Key Terms and Concepts 287 Review Questions 287 10. Active Web Pages 291 10.1 Active Web Pages is a Better Solution 292 10.2 Java Applets 292 10.3 Why are Active Web Pages Powerful? 293 10.4 When not to Use Active Web Pages 294 10.5 Lifecycle of Java Applets 294 10.6 ActiveX Controls 297 10.7 Java Beans 298 Summary 298 Key Terms and Concepts 298 Review Questions 299 11. User Sessions in E-commerce Applications 301 11.1 Problems with Statelessness 303 11.2 Sessions and Sessions Management 305 11.3 Techniques for Maintaining State Information 308 11.4 Peer-to-Peer (P2P) Computing 313 Summary 314

Key Terms and Concepts 314 Review Questions 315 12.Electronic Commerce Transaction Management 317 12.1 Transaction Concepts 318 12.2 The Need for TPMS 320 12.3 Transaction Processing Monitors (TP Monitors) 325 12.4 Object Request Brokers (ORB) 325 12.5 Component Transaction Monitors (CTM) 326 12.6 Microsoft Transaction Server (MTS) 327 12.7 Microsoft Message Queue Server (MSMQ) 331 12.8 Enterprise Java Beans (EJB) 334 Summary 347 Key Terms and Concepts 347 Review Questions 348 13. Electronic Commerce Security Issues 350 13.1 Basic Concepts 350 13.2 Cryptography 352 13.3 Digital Signature 359 13.4 The Practical Scenario 363 13.5 Digital Certificates 364 13.6 Internet Client-side Issues 367 13.7 Organizational Security Issues 368 Summary 369 Key Terms and Concepts 370 Review Questions 371 14. Online Security and Payment Processing Mechanisms 374 14.1 Secure Socket Layer (SSL) 374 14.2 Credit Card Processing Models 378 14.3 Secure Electronic Transaction (SET) 388 14.4 SSL Versus SET 397 14.5 3D Secure Protocol 397 14.6 Electronic Money 398 Summary 404 Key Terms and Concepts 404 Review Questions 405 15. Middleware and Component-based E-commerce Architectures 408 15.1 CORBA 409 15.2 Java Remote Method Invocation (RMI) 421 15.3 Microsoft s Distributed Component Object Model (DCOM) 424 Summary 427 Key Terms and Concepts 427 Review Questions 427 16. Electronic Data Interchange (EDI) 430

16.1 An Overview of EDI 431 16.2 The Origins of EDI 432 16.3 Understanding EDI 433 16.4 Data Exchange Standards 441 16.5 EDI Architecture 443 16.6 The Significance of EDI in International Trade 444 16.7 Financial EDI 444 16.8 EDI and the Internet 446 Summary 448 Key Terms and Concepts 448 Review Questions 449 17. Extensible Markup Language (XML) 451 17.1 Standard Generalized Markup Language (SGML) 454 17.2 Basics of XML 455 17.3 XML Parsers 460 17.4 The Need for a Standard 476 Summary 477 Key Terms and Concepts 478 Review Questions 478 18. Wireless Application Protocol (WAP) 481 18.1 Limitations of Mobile Devices 482 18.2 The Emergence of WAP 483 18.3 WAP Architecture 484 18.4 The WAP Stack 490 18.5 Concerns about WAP and its Future 509 18.6 Alternatives to WAP 510 Summary 511 Key Terms and Concepts 512 Review Questions 512 Appendix A: Case Study: Online Shopping with ASP 515 A.1 Presentation of Information: The Default Page (default.asp) 515 A.2 Capturing and Processing Orders 525 Appendix B: An Overview of Emerging Technologies 539 B.1 The Need for.net 539 B.2 An Overview of the.net Framework 540 B.3 The New C# Language 545 B.4.NET Against J2EE 545 B.5.NET A Case Study 546 B.6 Web Services 554 Appendix C: Ways of Accessing the Internet 560 C.1 Dial-up Access for an Individual User 560 C.2 Leased Lines 562 C.3 Digital Subscriber Line (DSL) 563 C.4 Cable Modems 567 Appendix D: An Introduction to Object Technology 570 D.1 How is Object Technology Different? 571 D.2 Abstraction 571 D.3 Class 572

D.4 Object-Oriented Principles 573 D.5 Object Technology Case Study 576 Appendix E: PKI-based Mechanisms for Secure E-commerce A Case Study 583 E.1 Background Cryptographic Toolkits 583 E.2 Cryptographic Solutions A Case Study 584 Answers to Objective Questions 591 Index 596