1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

Information systems slide technical aspects of e commerce part 2

55 189 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 55
Dung lượng 388 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Operating System HD Controller Hard Drive Motherboard Presentation Session Transport Network Datalink Application: Programs that directly access the presentation layer belong at least

Trang 1

Technical Aspects of

E-Commerce Part 2 of 2

Mort Anvari

Trang 3

Web Server

FW

PC PC

PC

PC

Mail Server

SQL Server

File Server

Trang 4

Operating System

HD Controller Hard Drive

Motherboard

Presentation Session Transport Network

Datalink

Application: Programs that

directly access the presentation layer belong

at least in part to the application layer.

Web Server CGI Script

Software Hardware

Trang 5

What is it?

- The physical components of a computing

system

- If it can be held in your hand it’s hardware

- If it can’t it’s software

Trang 6

Operating System

HD Controller Hard Drive

Motherboard

Presentation Session Transport Network

Datalink

Application: Programs that

directly access the presentation layer belong

at least in part to the application layer.

Web Server CGI Script

Software Hardware Current Topic

Trang 8

- CISC (Complex Instruction Set Comp.)

Can do complex operations Can do many functions

i.e 486, Pentium, PowerPC

- RISC (Reduced Instruction Set Comp.)

Can do a few simple operations Faster than CISC

i.e SPARC, HP9000

Trang 10

Hard Drives

- Highly Redundant Drive Enclosure

External to server Can lose multiple drives Very fast

Very expensive

Trang 11

Backup Systems

- DAT (Digital Audio Tape)

Fast, efficient and reliable

Tape sizes from 2-24GB

Backwards compatible

- DLT (Digital Linear Tape)

Very fast, reliability problems

Tapes can hold up to 70GB

New technology

Trang 13

Network Interfaces

- LAN (Local Area Network)

Small in geographic size

Fast and cheap

Owned

- WAN (Wide Area Network)

Connects distant LANs

Slow and expensive

Rented

Trang 14

Random Access Memory

- Regular

Garden variety memory

- Parity

Checks for memory errors

Stops machine on error

- ECC (Error Checking and Correcting)

Checks for memory errors

Corrects errors

Trang 15

- Only allows traffic to pass that meets a set of

criteria based on company policy

- Like the gate house in a jail

- It’s software

Trang 16

Web Server

FW

PC PC

PC

PC

Mail Server

SQL Server

File Server

Trang 17

Operating System

HD Controller Hard Drive

Motherboard

Presentation Session Transport Network

Datalink

Application: Programs that

directly access the presentation layer belong

at least in part to the application layer.

Software Hardware Current Topic

Firewall Software

Trang 18

What is it?

- A series of devices called nodes

interconnected by communication pathways

- Nodes can be computers or devices that help the network function

- Networks can be connected or contain sub

networks

- It’s made up of hardware and software

Trang 19

Web Server

FW

PC PC

PC

PC

Mail Server

SQL Server

File Server

Trang 20

Operating System

HD Controller Hard Drive

Motherboard

Presentation Session Transport Network

Datalink

Application: Programs that

directly access the presentation layer belong

at least in part to the application layer.

Software Hardware Current Topic

Power Point

Web Client Mail

Client

Trang 21

- The OSI Model

- An Example Transmission

Trang 22

The OSI Model

- Framework describing network

protocols

- 7 Layers

- 1 Layer = 1 Aspect of Networking

- Layers only aware of neighbors

- Layers provide flexibility and

functionality

Trang 23

The OSI Model

The OS and the Network Card work together to make a

complete stack.

The OS is responsible for these functions

The Network Card is responsible for these

Application Presentation Session Transport Network Datalink

Trang 28

- Router works at this level

- If destination is on same network

host sends data directly

Trang 29

Network Layer

- If destination is on another network host sends data to right router

- If right router is unknown, data is

sent to the Default Router or Default Gateway

Trang 30

Data Link Layer

- How data should actually be transmitted

- How the bits should be arranged

Trang 31

Data Link Layer

- A bridge splits network into 2

segments

- Makes decisions based on MAC

address in each packet

- Improves performance

- A switch is a bridge that works

with more than 2 segments

Trang 32

The Physical Layer

- Defines the electrical, mechanical and physical aspects of a network

Trang 33

Star Topology Very Manageable and Reasonably Priced

Physical Layer: Topologies

Hub

Computers Network Cable

Trang 34

Physical Layer: Topologies

Point to Point Topology

Used Almost Exclusively in WANs

Trang 35

Physical Layer: Topologies

Trang 36

Send picture to client

Encrypt using SSL Establish

connection

Establish connection Divide picture into tiny packets

Divide picture into tiny packets

Send to proper network

Send to proper network

Format packet and identify client

Format packet and identify client

Transmit packet to client

Transmit packet to client

Authenticate and receive connection

Reassemble packets into picture

Reassemble packets into picture Determine if it’s our packet and network

Determine if it’s our packet and network Check for errors and if it’s ours

Check for errors and if it’s ours Receive packets from server

Receive packets from server

Application Presentation Session Transport Network Datalink Physical

Client

Trang 37

An Example

When the packet is transmitted each layer

has added it’s own “Header” The Datalink layer often adds a “Tail” as well

to provide error checking

A Packet in Transit

D

D N N T T S S P P Data Fragment D

Trang 38

PC Client

PC

PC

Router PC

PC PC

Trang 39

What is it?

- The conversion of data into a form that cannot

be easily understood by unauthorized people

- The opposite is decryption, that is, changing the difficult to read form back into the original

- It’s usually software, but can be hardware

Trang 40

- What does it do for me?

- Symmetric Encryption

- Asymmetric Encryption

- One Way Hash

- Example: An Encrypted E-Mail

Trang 41

What does it do for me?

Confidentiality: The data can only be read

by the intended recipients

Non-Repudiation: The data cannot be

forged If data is “signed” by a person,

the data could only have come from

them No more “I didn’t send that!”

Data Integrity: The data cannot be modified without detection

Trang 42

Symmetric Encryption

- Data is encrypted and decrypted

with the same key

- Fast

- Key must be kept secret

- Key must be sent Out of Band

- DES and IDEA are symmetric

Trang 43

Asymmetric Encryption

- Uses 2 keys

- Data encrypted with one key can

only be decrypted with the other

- Public key is shared with all

- Public key can be sent In Band

- Private key must be kept secret

- RSA is asymmetric

Trang 44

One Way Hash

- A “fingerprint” of data

- Any size data = same size hash

- Tiny changes in data produce

a very different hash

Trang 45

Example: Encrypted E-Mail

Anne wants to send e-mail to Bob The plaintext message compressed to make

it smaller and the ciphertext stronger

Plaintext Compression Small

Plaintext

Trang 46

Example: Encrypted E-Mail

The plaintext message is run through a hash algorithm to generate a

“fingerprint”

Small Plaintext Hash Function Fingerprint

Trang 47

Example: Encrypted E-Mail

The fingerprint is encrypted using

Anne’s private key This makes it into a digital signature It is then appended to the plaintext

Anne’s Private

Key

Small Plaintext

Signature Fingerprint

Trang 48

Example: Encrypted E-Mail

A Random key is generated and the mail is symmetrically encrypted using that

e-Small Plaintext Random Key

Ciphertext Encrypted with Random Key Signature

Trang 49

Example: Encrypted E-Mail

The Random Key is Encrypted using

Bob’s public key The result is called a

“Strong Box” Remember that only Bob can read the contents of the Box

Trang 50

Random Key

A Box for Bob

Example: Encrypted E-Mail

The Box is attached to the ciphertext

and they are sent over e-mail to Bob

Ciphertext

Encrypted

with Random

Key

To Bob Internet

Trang 51

Example: Encrypted E-Mail

Bob decrypts his Strong Box to get the Random Key Only Bob’s private key

can open the Box which was encrypted with his public key

Trang 52

Example: Encrypted E-Mail

Bob decrypts the ciphertext using the

random key which he got from his

Key

Small Plaintext

Signature

Trang 53

Example: Encrypted E-Mail

Bob decrypts Anne’s signature using

her public key Since only Anne could have encrypted it with her private key, Bob knows the message had to come from her

Anne’s Public

Key Signature Fingerprint

Trang 54

Example: Encrypted E-Mail

Bob runs the unencrypted message

through the hash function If this

fingerprint is the same as the one from the signature, the message was not

changed in transit

Small Plaintext

Hash Function

Calculated Fingerprint

Received

 or

Trang 55

Example: Encrypted E-Mail

Finally, the message is uncompressed Bob can read the message knowing for certain that it’s from Anne, it’s what

Anne wrote and only the two of them

could have read it

Plaintext Compression Small

Plaintext

Ngày đăng: 08/01/2018, 10:37

TỪ KHÓA LIÊN QUAN