Date post: | 28-Dec-2015 |
Category: |
Documents |
Upload: | bartholomew-dawson |
View: | 214 times |
Download: | 0 times |
Information systems and management in business Dr Ali H Higgi
Information systems and management in business
Chapter 3Electronic Business and Business Mobility Enabling Technologies
Information systems and management in business Dr Ali H Higgi
3.1 Introduction
E-Biz enables and facilitates E commerce Intra-organizational collaboration Inter-organizational collaboration Business mobility
E-Biz service key delivery goals Electronic, efficient, cost effective, secure and
interactive E-Biz service delivered via a set of
powerful enabling technologies
Information systems and management in business Dr Ali H Higgi
3.2 E Business Technologies
E-Biz enabling technologies Classification May be classified into seven different
categories Internet Servers Data Structuring Security Interactivity Business Mobility Interoperability
http://www.halaeducation.com/BookImages/Ch3/Figure31.jpg
Information systems and management in business Dr Ali H Higgi
3.3 The Internet, Key processes and Protocols
The Internet – What is it? When an umber of local area networks
(LANs) and wide area networks (WANs) are connected together, the result is a larger network which is typically referred to as an internetwork
The Internet is the most popular internetwork
Information systems and management in business Dr Ali H Higgi
3.3 The Internet, Key processes and Protocols
The Internet Key processes and technologies Two key processes
Web request and fulfillment process Addressing
Information systems and management in business Dr Ali H Higgi
3.3 The Internet, Key processes and Protocols
Web request and fulfillment process The action involving a user requesting a Web
contents through an Internet browser and a Web server delivering the requested contents
Two way information exchange process between a client software and a Web server
Typically there exist no relationship between the client and the Web server
The relation is established via the Web process and is terminated at the end of it
A Web process is normally initiated with Web contents requests by a user
Every new request establishes a new process
Information systems and management in business Dr Ali H Higgi
3.3 The Internet, Key processes and Protocols
Web request and fulfillment process How does it Work?
A four steps process Step1: Web contents request Step 2: Web request forward to Web
server Step3: Web server action – response Step4: Client software response
Information systems and management in business Dr Ali H Higgi
3.3 The Internet, Key processes and Protocols
Internet addressing process Every Web server connected to the
Internet has a unique physical address known as a uniform resource locator or
URL Web contents could be located and
sourced from
Information systems and management in business Dr Ali H Higgi
3.3 The Internet, Key processes and Protocols
Internet addressing process The general structure for a URL
Protocol://Domain Name: Port/Virtual directory/File Name? Parameters
Example http://www.halaeducation.com/Mybook/Bo
ok.htm?name=me&password=allowed Ampersand – & used to separate multiple
parameters = sign is used separate the parameter
from its value
Information systems and management in business Dr Ali H Higgi
3.3 The Internet, Key processes and Protocols
TCP/IP A critically important Protocol TCP/IP stands for transmission control
protocol/Internet protocol It is a communication protocol which is used by
computers to communicate with each other over the internet
It is compatible with most modern operating systems, computer hardware and networking configurations
provides reliable delivery and is able to deliver packets efficiently
free and none proprietary protocol
Information systems and management in business Dr Ali H Higgi
3.4 Web Server definition and Primary Features
What a Server? A combination of computer hardware
and software Dedicated to serving files or data to
requesting client computers Clients are typically connected to it over a
network link Known types
File, database, transactions and Web servers
Information systems and management in business Dr Ali H Higgi
3.4 Web Server definition and Primary Features
What is a Web Server? Essentially a Web server runs a software
suite (program) that enables it to accomplish a number of tasks
Serving Web contents to requesting browsers. Providing security to Web contents and the
associated Web site. Facilitating server administration and
management. Providing proxy capabilities. Supporting data-driven Web sites
(Interactivity)
Information systems and management in business Dr Ali H Higgi
3.5 Data Structuring Technologies
Data Structuring Technologies Within the domain of e business there
exist two important document structuring languages or authoring tools - technologies
HTML and the XML
Information systems and management in business Dr Ali H Higgi
3.5 Data Structuring Technologies
Hyper Text Markup Language – HTML Hyper text markup language is a data
structuring tool that is primarily used to create Web contents
Web browsers are typically the software medium which is used to display HTML based documents
An HTML document would typically contain various predefined tags
Tags examples <p> defines a paragraph, <h1> defines a
headline, <img> define an image
Information systems and management in business Dr Ali H Higgi
3.5 Data Structuring Technologies
Extensible Markup Language – XML standard and none proprietary programming
language used for documents structuring Employ tags for structuring documents XML tags are defined by the document’s
creator and they are not predefined XML tags are created in a manner that
describe and give meaning to the tag’s contents
Information systems and management in business Dr Ali H Higgi
3.5 Data Structuring Technologies
Extensible Markup Language – XML Example
<Mobile No> 0433222445 </ Mobile No>
XML documents Key advantage Can be shared and processed by computer
applications that do not have to be running the same operating systems or similar software applications
Information systems and management in business Dr Ali H Higgi
3.6 Interoperability Technologies - Web Services
What Are Web Services? computer programs or software
modules Accessed remotely over the Internet by
generic browsers or software clients Generic browsers or software clients are
resident in another computer
Information systems and management in business Dr Ali H Higgi
3.6 Interoperability Technologies - Web Services
Web Services Key Benefits Interoperability
provide seamless interoperability between various computer applications running in different platforms and supported by differing operating systems
disparate computers can talk to each other without the need for costly and time consuming investment in middleware
Information systems and management in business Dr Ali H Higgi
3.6 Interoperability Technologies - Web Services
Web Services Key Benefits Minimal investment
Utilization of Internet infrastructure and none proprietary technologies
Standard Technologies Communication protocols, browsing
technologies, document structuring, etc… Simple to use and integrate
Web services could be called upon either from an Internet browser or integration within a client software application using XML and SOAP
Information systems and management in business Dr Ali H Higgi
3.6 Interoperability Technologies - Web Services
Web Services Underpinning Technologies
Extensible Markup Language (XML) Simple Object Access Protocol (SOAP) Universal Description, Discovery and
Integration (UDDI) Web Services Description Language
(WSDL)
Information systems and management in business Dr Ali H Higgi
3.6 Interoperability Technologies - Web Services
Web Services Issues of Concerns – Disadvantages Security
All aspects of Internet based information exchange security challenge arise
Reliability and Availability As a consumer always dependant on the
provider of such Web services No control on availability or lack of it
Information systems and management in business Dr Ali H Higgi
3.7 Virtual Private Network (VPN)
What is a virtual private network? The ability of a computer or a computer
which is connected to a private network to securely accesses another private network over a public network such as the Internet
Information systems and management in business Dr Ali H Higgi
3.7 Virtual Private Network (VPN)
The Strategic Business value of Virtual Private Networks A VPN offer the option to conduct secure, reliable, global
and cost effective business information exchange over the Internet and wireless wide area networks
enables employees of an organization located in remote offices to connect and access their organization cooperate network
eliminates the need for having costly infrastructure Provides businesses with the ability to provide flexible
working practices and support business mobility mobile workers ability to access cooperate network
A business can collaborate with partners over the Internet
Information systems and management in business Dr Ali H Higgi
3.7 Virtual Private Network (VPN)
Internet Security Technologies - Virtual Private Network Tunneling and Protocols VPN provide security and privacy through the use of
VPN tunneling, encryption and firewall authentication
VPN tunneling basically involves establishing and maintaining a logical network connection
The tunnel is then used to transmit encrypted data between a client and a server using specific VPN protocol format
Three protocols are designed to work with VPN tunneling
Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP) Internet Protocol Security (IPsec) [24
Information systems and management in business Dr Ali H Higgi
3.8 Business Mobility Technologies
What is Wireless Local Area Network – WLAN ? A local area network Does not use cables or wires in order
for a client computer to connect to it Uses radio waves to transmit and
receive data Short distance communication
Information systems and management in business Dr Ali H Higgi
3.8 Business Mobility Technologies
WLAN Communication Standards Typically based on the IEEE 802.11 series of
standards - known as Wi-Fi The standards generally distinguished from
one another They operate on different bands, have a
different data transfer rates and transmission range
Three standards exist 802.11a - 5 Ghz, 54 Mbps, 60-120 feet 802.11b - 2.4 GHz, 11 Mbps, up to 300 feet 802.11g - 2.4 GHz54, Mbps, 65-120 feet
Information systems and management in business Dr Ali H Higgi
3.8 Business Mobility Technologies
WLAN Devices or Components Two basic WLAN components
Access points (APs) Wireless network card
Information systems and management in business Dr Ali H Higgi
3.8 Business Mobility Technologies
Wi-Fi Hot Spots Basically wireless local area networks Provide public access to the Internet Access either paid or unpaid Likely to come across in a public place such as
airports lounges, hotels, cafes, universities, etc.. People with mobile devices that are fitted with Wi-Fi
cards can connect to Wi-Fi hot spot service Mobile devices are able to locate the nearest
service to them and connect to it Hot spots services are published in various
directories
Information systems and management in business Dr Ali H Higgi
3.8 Business Mobility Technologies
What is a wireless Wide Area Network – WWAN ? Basically a network that is capable of
delivering data connectivity over a wide spread geographical area without the need for cabling
Employs cellular network technologies, radio, satellite and mobile phone technologies
Information systems and management in business Dr Ali H Higgi
3.9 Interactivity Technologies - Data-Driven Dynamic Web Sites
What are Data-Driven Dynamic Web Sites? One that is able to interact with its user
and deliver contents dynamically Typically contents stored in a database Internet banking, online hotel & airlines
reservation, shopping online – are typical examples
Information systems and management in business Dr Ali H Higgi
3.9 Interactivity Technologies - Data-Driven Dynamic Web Sites
Data-Driven Dynamic Web Sites Technologies Overview A number of Internet technologies deliver
dynamic contents Also known as processing technologies or
scripting languages Three widely used technologies
Php and ASP .net Server based All processing performed at server side and not
the client side
Information systems and management in business Dr Ali H Higgi
3.9 Interactivity Technologies - Data-Driven Dynamic Web Sites
Data-Driven Dynamic Web Sites Technologies Overview
Ajax A combination of technologies which
include HTML , CSS, Javascript, DOM and XMLHttpRequest
Client side processing Other technologies exist
Python and Ruby
Information systems and management in business Dr Ali H Higgi
3.9 Interactivity Technologies - Data-Driven Dynamic Web Sites
Advantages of Processing Web Contents Requests at the Server Side Dynamic Web pages contains code as well as
script (programming code) Processing takes place at the server side Server process the Web page and associated
script The server returns html to browser for display
but not the code Above combination of features results in
advantages Saving in bandwidth providing code security
Information systems and management in business Dr Ali H Higgi
3.10 The php Processing Technology
PHP Overview A Php files ends with the .php
extension for distinction Php code is embedded within the
html of the Web page Php statements are enclosed
between angle brackets and distinguished by starting and ending with ?
Information systems and management in business Dr Ali H Higgi
3.10 The php Processing Technology
Php example <html> <body> <center> <?php print "Welcome", $mytitle, $myname; ?> </center> </body> </html> This page returns a Welcome message with a
name and a title as entered by the person interacting with the page
Typically name and title would be entered via a Web form
Information systems and management in business Dr Ali H Higgi
3.11 The ASP .Net Processing Engine
What is ASP .NET? ASP .NET stands for active server pages .NET Proprietary technology Key features
Code behind HTML is separated from the scripting code Enhances maintenance and coding upgrade
Server side Web controls ASP .NET provides various categories of server-
side Web controls ready for use by developers Text boxes, drop down lists, labels, etc..
Information systems and management in business Dr Ali H Higgi
3.11 The ASP .Net Processing Engine
Key features Objects
Various predefined and tested objects – Minimize development and testing time
Three main objects Response object
Interaction with user Request object
Collects data from users Session object
Maintain interactivity between pages requests Data Access
Facilities data access and storage ADO .net – key component
Information systems and management in business Dr Ali H Higgi
Chapter 3 Knowledge Enhancement and Consolidation Tools and Exercises
Visit the book’s Web site www.halaeducation.com & select module 3
Perform Chapter 1 associated demo and case study through their respective demo and case Studies Links
Information systems and management in business Dr Ali H Higgi
Chapter 3 Problems Solving Skills Development
Visit the book’s Web site www.halaeducation.com & select module 3
Perform Chapter 1 associated skills development through their respective skills development exercises link