E-Commerce A/601/7313 LEVEL 3 LO1 - Know the technologies required for an e-commerce system.

42
Unit 06 E-Commerce A/601/7313 LEVEL 3 LO1 - Know the technologies required for an e-commerce system

Transcript of E-Commerce A/601/7313 LEVEL 3 LO1 - Know the technologies required for an e-commerce system.

Unit 06

E-CommerceA/601/7313

LEVEL 3

LO1 - Know the technologies required for an e-commerce system

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Learning Outcome (LO) The learner will:

Pass The assessment criteria are the pass requirements for this unit. The learner can:

Merit For merit the evidence must show that, in addition to the pass criteria, the learner is able to:

Distinction For distinction the evidence must show that, in addition to the pass and merit criteria, the learner is able to:

1 Know the technologies required for an e-commerce system

P1 Describe the technologies required for e-commerce

2 Understand the impact of e-commerce on organisations

P2 Explain the impact of introducing an e-commerce system to an organisation

M1 - Describe how organisations promote their business using e-commerce

3 Understand the effects of e-commerce on society

P3 Explain the potential risks to an organisation of committing to an e-commerce system

M2 - Explain solutions for the potential risks of using e-commerce

4 Be able to plan e-commerce strategies

P4 Review the regulations governing e-commerce

P5 Examine the social implications of e-commerce on society

D1 - Compare the benefits and drawbacks of e-commerce to anOrganisation

P6 Plan an e-commerce strategy

M3 - Provide annotated planning documentation for your e-commerce strategy

D2 - Evaluate youre-commerce strategy

LO1 - Assessment Criteria

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

A business is thinking of going online and developing an e-commerce strategy but in order for them to decide they require some advice so that they can make an informed decision. They will need to know the cost implications, the benefits and downsides, the hardware and software necessary to get online and manage their accounts, how the trading and business functions will work and the legal and moral implications of on-line trading. They also want to be aware of the risks involved so they can make a decision of how much of an online presence they will need to prepare.

Develop an e-commerce strategy for a local shop in order to enhance and benefit their business functions. Develop plans, target marketing, cost analysis and sketches that take into account rival strategies based on market analysis and business reviews.

Resources Learners will need access to word processing, publisher and/ or

presentation software. A selection of trade magazines such as Computing, Computer Shopper, PC advisor and Computer Weekly would be advantageous. Learners will also need access to the internet.

Scenario

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1 - Know the technologies required for an e-commerce system Learners should be encouraged to visit a range of e-commerce sites to

help them understand what e-commerce is. As a group they could be encouraged to identify the hardware and software components required in order to have an e-commerce site and discuss these findings.

The tutor should explain the technical terminology and protocols that are applicable to the unit as it is essential that learners understand the term TCP/IP and what is meant by ports and protocols. To reinforce this they could be asked to identify a range of protocols from a suggested list of websites.

Learners are also required to understand domain names and the registration process, as a group they could be provided with exercises to identify the parts of a domain name. They should also look at how they can register or check domain names without physically having to register or purchase.

Learners need to understand internet speeds, they could use an online speed checker to find out the speed of the website they are using and should then as a group discuss the advantages and disadvantages of having a fast speed/ slow speed. Learners should be encouraged to research W3C and what this means.

Assessment Criteria P1

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1 - The assessment criterion P1 could be evidenced by the use of a report, leaflet or presentation delivered by the learner that could be supported by tutor observation and/ or recorded evidence. The learner is required to describe the technologies required for an e-commerce system, as outlined in the teaching content.

Assessment Criterion P1

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.1 - Technologies – Servers The term web server can refer to either the hardware (the computer) or the

software (the computer application) that helps to deliver web content that can be accessed through the Internet. The most common use of web servers is to host websites, but there are other uses such as gaming and data storage The primary function of a web server is to cater web page to the request of clients using HTTP. This means delivery of HTML documents and any additional content that may be included by a document, such as images, style sheets and scripts.

A user agent, such as a web browser or web crawler, initiates communication by making a request for a specific piece of information using HTTP and the server responds with the content of that resource or an error message if it is unable to do so.

For companies that prefer to manage their own hosting they will need specific hardware to store, serve, process and manage user accounts and internet activity. This is called a Web Server, sets an open traffic line between server and outside hosting and allows the user to manage their own business.

Managing the website internally allows the users to change anything without the need to upload, making the changes automatic and live each time. Longer term this is more beneficially for a company for the sheer reason of being able to manage your own content and expand through software rather than proxy.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.1 - Technologies – Servers

The two main types of server for this is IIS and Apache. Internet Information Services (IIS) is a server designed to work with a Microsoft environment, and manages web activity in terms of modules, Security, Content, Compression, Caching, Logging and Diagnostics which all add up to a website management bundle for all activity on the site. Ruby on Rails, ASP (.net and classic) and Python are all languages that work out of the box on IIS whereas they have it be added to Apache as modules to be managed. More importantly it comes free with Microsoft Windows and functions well within with similar coding parameters.

Apache server is often referred to as simply Apache, a public-domain open source Web server developed by a loosely-knit group of programmers. Core development of the Apache Web server is performed by a group of about 20 programmers, called the Apache Group. However, because the source code is freely available, anyone can adapt the server for specific needs, and there is a large public library of Apache add-ons. It is the most accepted web server because it offers all the functionality of the IIS and is more adaptable. Being free is it’s biggest selling point though it does everything IIS can do with add –ins.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Servers are the lifeblood of any online presence. Servers provide the shared resources that network users crave, such as file storage, databases, e-mail, Web services, and so on. Choosing the equipment you use for your companies server is one of the key decisions any company with a web presence needs to make when you set up an online store. Servers are usually built from higher grade components than standard computers for the reasons given below.

Web Server

A Web server is a server computer that runs software that enables the computer to host an Internet or Intranet Web site. The two most popular Web server programs are Microsoft’s IIS (Internet Information Services) and Apache, an open-source Web server managed by the Apache Software Foundation.

The choice of service depends on the size of the site, the content on the site, the need for security, the need for expansion, the users demands in terms of database access, blogs, streaming, wikis etc.

These often store copies of commonly used Web pages in a local cache. When a user requests a Web page from a remote Web server, the proxy server intercepts the request and checks to see whether it already has a copy of the page in its cache. If so, the Web proxy returns the page directly to the user. If not, the proxy passes the request on to the real server.

P1.1 - Technologies – Servers

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

File servers File servers provide centralized disk storage that can be conveniently shared by client computers on the

network. The most common task of a file server is to store shared files and programs. For example, the members of a small workgroup can use disk space on a file server to store their Microsoft Office documents.

File servers must ensure that two users don’t try to update the same file at the same time. The file servers do this by locking a file while a user updates the file so that other users can’t access the file until the first user finishes.

For document files (for example, word-processing or spreadsheet files), the whole file is locked. For database files, the lock can be applied just to the portion of the file that contains the record or records being updated.

Mail Server A mail server is a server that handles the network’s e-mail needs. It is configured with e-mail server

software, such as Microsoft Exchange Server. Exchange Server is designed to work with Microsoft Outlook, the e-mail client software that comes with Microsoft Office. Most mail servers actually do much more than just send and receive electronic mail. For example, here are some of the features that Exchange Server offers beyond simple e-mail:◦ Collaboration features that simplify the management of collaborative projects.◦ Audio and video conferencing.◦ Chat rooms and instant messaging (IM) services.◦ Microsoft Exchange Forms Designer, which lets you develop customized forms for applications, such as

vacation requests or purchase orders.

P1.1 - Technologies – Servers

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Print servers Sharing printers is one of the main reasons that many small networks exist. Although it isn’t

necessary, a server computer can be dedicated for use as a print server, whose sole purpose is to collect information being sent to a shared printer by client computers and print it in an orderly fashion.

A single computer may double as both a file server and a print server, but performance is better if you use separate print and file server computers. With inexpensive ink-jet printers running about £50 each, just giving each user his or her own printer is tempting. However, you get what you pay for. Instead of buying £50 printers for 15 users, you may be better off buying one £1,000 laser printer and sharing it. The £1,000 laser printer will be much faster, will be cheaper to operate.

Proxy Server Simply put, a proxy server is a server that sits between a client computer and a real server. The

proxy server intercepts packets that are intended for the real server and processes them. The proxy server can examine the packet and decide to pass it on to the real server, or it can reject the packet. Or the proxy server may be able to respond to the packet itself, without involving the real server at all.

Web servers

P1.1 – Task 1 – Describe the functions and use of different Servers in benefitting a small web-presence business needs.

P1.1 - Technologies – Servers

Web Server File Server Mail Server Print Server Proxy Server

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Just having a computer is not enough to make a web presence, not a good working and business capable one. For a few pages yes, but adding in extra capacity requires an extra outlay and consideration. The hardware components that comprise a typical web server computer are similar to the components used in less expensive computers. However, web server computers are usually built from higher grade components than a users computer. Additional hardware consideration have to be given.

Network Interface Cards (NIC) - Every computer on the internet, both users and servers, requires a network interface card (or NIC) in order to access the outside world. A NIC is usually a separate adapter card that slides into one of the computer’s motherboard expansion slots. However, most newer computers have the NIC built into the motherboard, so a separate card isn’t needed.

For client computers, you can usually get away with using the inexpensive built-in NIC because client computers are used only to connect one user to the network. However, the NIC in a server computer connects many network users to the server. As a result, it makes sense to spend more money on a higher quality NIC for a heavily used server. A NIC is a Physical layer and Data Link layer device. Because a NIC establishes a network node, it must have a physical network address, also known as a MAC address. The MAC address is burned into the NIC at the factory, so you can’t change it. Every NIC ever manufactured has a unique MAC address.

PC Monitors started off as 2 colour, green and not green, 1-bit colour. Then came CGA in 1980, 2-bit colour, four colours and with it the first colour game that could take advantage of this amazing technology, Zork. In 1984 came the first VGA monitors, sixteen colours, 4-bit, and with it the first versions of Wolfenstein. VGA moved up to 8-bit and with a graphics card, finally to 16 bit, 16.7 million colours.

P1.2 - Technologies – Devices

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Monitor – Vga – 16 colours 14” screenGraphics Card – NoneProcessor - 286Memory – 1mb , minimumSound – Internal speaker.Controller – Keyboard or mouse controlled only.

Monitor – Vga – 16 bit colours 14” screenGraphics Card – None but Open GL or 16mb for optimum effects. Processor – Pentium 1Memory – 8mb , minimum, 64mb optimalSound – None or 16mb optimal.Controller – Keyboard, mouse or joypad controlled.

Monitor – Vga – 16 bit colours 14” screenGraphics Card – Processor: AMD 64 3200+/Intel Pentium 4 3.0GHz or better Memory: 8 GB free hard-drive space, 512MB RAM (XP)/1GB RAM (Vista) Graphics: Shader 3.0 or better, 256MB Nvidia GeForce 6600GT/ATI Radeon 1600XT or betterMonitor – 17” minimum

P1.2 - Technologies – Devices

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Hard drives: Most desktop computers use inexpensive hard drives called IDE drives (sometimes also called ATA). These drives are adequate for individual users, but because performance is more important for servers, another type of drive known as SCSI is usually used instead. For the best performance, use the SCSI drives along with a high performance SCSI controller card.

There are two sizes of hard drive for a PC, 2.5” for a laptop and 3.5” for a full machine. This has been the de facto standard since PC’s first came out. The original PC hard drive on home computers were a massive 20mb. But with operating systems starting at MS Dos 3, all you needed was 2mb for operating system storage. Word processors were 4mb, spreadsheets another 1mb leaving a massive 13mb for games and file storage. These all used an IDE standard, the same connectors on the PC for linking up the Hard Drive to the motherboard.

Speed differentiation came into play, hard drive speeds of 5300 rpm, increased to 7200 rpm, and hard drives grew in size exponentially. 80mb became 120, then 200, 320, 500 and then a massive 10gb by 2000. Now the standard hard drive with a new PC is 250gb but 1.5 terabyte ones are available for home use at affordable prices. The faster the hard drive, the quicker the loading speed. The new standard is SATA which is faster than IDE and easier to install allowing the use the daisy chain multiple drives onto a PC.

P1.2 - Technologies – Devices

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Motherboard and Processor: The motherboard is the computer’s main electronic circuit board to which all the other components of your computer are connected. More than any other component, the motherboard is the computer. All other components attach to the motherboard. CPU), supporting circuitry called the chipset, memory, expansion slots, a standard IDE hard drive controller, and I/O ports for devices such as keyboards, mice, and printers. The processor, or CPU, is the brain of the computer. Although the processor isn’t the only component that affects overall system performance, it is the one that most people think of first when deciding what type of server to purchase. Intel has four processor models, Two of them — the Pentium 4 and Celeron — should be used only for desktop or notebook computers.

Server computers should have an Itanium 2 or a Xeon processor, or a comparable processor from one of Intel’s competitors, such as AMD. Each motherboard is designed to support a particular type of processor. CPUs come in two basic mounting styles: slot or socket. However, you can choose from several types of slots and sockets, so you have to make sure that the motherboard supports the specific slot or socket style used by the CPU. Some server motherboards have two or more slots or sockets to hold two or more CPUs.

P1.2 - Technologies – Devices

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Memory: Never scrimp on memory. People rarely complain about servers having too much memory. Many different types of memory are available, so you have to pick the right type of memory to match the memory supported by your motherboard. The total memory capacity of the server depends on the motherboard. Most new servers can support at least 12GB of memory, and some can handle up to 32GB.

Modem: A modem connects the computer to the outside world, it is that simple, Broadband, Dialup and even Wi-Fi are all modems of a kind that connect the computer to the outside world. They are provided by ISP’s when a user joins but can be purchased. They communicate in the language sent by the user to the ISP and provide an open line of communication once the user has been verified. Like all hardware there is a speed difference and this is linked to the power of the box and tre capacity to receive by the provider.

Keyboard and Mouse: Computers are driven, the user controls what happens and the standard method of control is the keyboard and mouse. But there are different kinds, better ones, aesthetic ones, disability access ones and odd ones. In the standard office we use a standard 102 key keyboard, we are used to it, we are used to two button mice, we are used to WIMP, and this is done to ease of use and what we know.

P1.2 – Task 2 – Describe the different kinds of hardware necessary to create a website and their purpose in displaying a web result.

P1.2 - Technologies – Devices

Network Card Hard Drive Modem Monitor

Motherboard Memory Keyboard and Mouse

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.3 - Web Software – HTML Coders

In the early days of web design all code had to be created using HTML, now HTML is hidden behind the GUI of websites, still there running the system and still accessible but not as obvious. Programmers still use HTML but programs have surpassed this. The inclusion of JavaScript, CSS, MySql, embedded flash, dHTML, sHTML etc. means that more lines of code are added than ever before.

Look at the examples from here to see the difference even major companies have gone through to revamp their image through effective web design.

Programs that generate this additional code include Dreamweaver, Moodle, Web Plus and Coffeecup. There are two kinds for this, offline and online. Offline programs create the whole site with additional language add ins like JavaScript and allow the user more control over the finishes result rather than template altering. Additions in terms of behaviours add functionality to the site. Coffeecup and WebPlus are similar, basing designs on templates and adding in code.

Online site creators like moonfruit, wix and godaddy all give the user options to customise the layout and content. This will contain dynamic code and everything tricky that can be created with a higher level of technicality within Dreamweaver but reduce the control the user has and reduces the skillset gained from web creation.

P1.3 – Task 3 - Describe, with evidence, the different levels of Design Creation software available and the advantages and disadvantages of online vs. offline creation.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.4 - Web Software - BrowsersBrowsers (e.g. Internet Explorer, Mozilla Firefox, Google Chrome, Opera, Safari) Browsers exist merely to display results and translate the HTML code

from the external and internal sites onto a GUI for the user to read and use. The choice of Browser is dependant on the users preferences rather than needs. They all do the same thing, display results. Browsers come with a small range of additional options to benefit the user and claim loyalty, for example:• Embedded Email in IE• Proxy and Java blocking in Opera• Compatibility with OS like Safari• Ease of Use like Chrome• Adding favourites or stash like Opera.• Speed of display like Firefox

• From within all Browsers is the options for connectivity which allows the easier access to networking. Also the access to history, RSS feeds, setting privacy levels, security settings etc. are all available on any web browser.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.4 - Web Software - Browsers At the end of the day all browsers are free,

some come preinstalled with the OS like IE in windows, Safari on IOS, Firefox in Linux and there is nothing to stop a user from installing other browsers for their own particular reasons. For comparison details click here.

Heavy web users need an internet browser that is both fast and secure, and though all browsers enable internet access, not all are created equal. Different browsers can render webpages differently, and there can be a large disparity in performance between the top competitors. The three main things to consider when choosing an internet browser are simplicity, speed and security.P1.4 – Task 4 - Describe what a web browser does and

how they work and outline the range of different choices are available for a company.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Cards and cabling are all very well but operating systems need to be able to communicate through these by using translation and communication software called the Network operating System (NOS).

File sharing services One of the most important functions of a network operating system is its ability to

share resources with other network users. The most common resource that’s shared is the server’s file system. A network server must be able to share some or all of its disk space with other users so that those users can treat the server’s disk space as an extension of their own computer’s disk space.

The NOS (Network Operating System) allows the system administrator to determine which portions of the server’s file system to share. Although an entire hard drive can be shared, it is not commonly done. Instead, individual directories or folders are shared. The administrator can control which users are allowed to access each shared folder.

Because file sharing is the reason many network servers exist, network operating systems have more sophisticated disk management features than are found in desktop operating systems. For example, most network operating systems have the ability to manage two or more hard drives as if they were a single drive. In addition, most can create mirrors, which automatically keeps a backup copy of a drive on a second drive.

P1.5 - Web Software – Server Software

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Security services All network operating systems must provide some measure of security to protect the

network from unauthorized access. Hacking seems to be the national pastime these days. With most computer networks connected to the Internet, anyone anywhere in the world can and probably will try to break into your network.

The most basic type of security is handled through user accounts, which grant individual users the right to access the network resources and govern what resources the user can access. User accounts are secured by passwords; therefore, good password policy is a cornerstone of any security system.

Most network operating systems let you establish password policies, such Microsoft’s Server Operating Systems as requiring that passwords have a minimum length and include a mix of letters and numerals. In addition, passwords can be set to expire after a certain number of days, so users can be forced to frequently change their passwords.

Most network operating systems also provide for data encryption, which scrambles data before it is sent over the network or saved on disk, and digital certificates, which are used to ensure that users are who they say they are and files are what they claim to be.

P1.5 - Web Software – Server Software

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Directory services Directories are essential ways of storing information. Network directories provide information

about the resources that are available on the network, such as users, computers, printers, shared folders, and files. Directories are an essential part of any network operating system.

In early network operating systems, such as Windows NT 3.1 and NetWare 3.x, each server computer maintained its own directory database of resources that were available just on that server. The problem with that approach was that network administrators had to maintain each directory database separately.

That wasn’t too bad for networks with just a few servers, but maintaining the directory on a network with dozens or even hundreds of servers was next to impossible. In addition, early directory services were application-specific. For example, a server would have one directory database for user logins, another for file sharing, and yet another for e-mail addresses. Each directory had its own tools for adding, updating, and deleting directory entries.

Modern network operating systems provide global directory services that combine the directory information for an entire network and for all applications so that it can be treated as a single integrated database. These directory services are based on an ISO standard called X.500. In an X.500 directory, information is organized hierarchically. For example, a multinational company can divide its user directory into one or more countries, each country can have one or more regions, and, in turn, each region can have one or more departments.

P1.5 - Web Software – Server Software

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Network Support A network operating system must support a wide variety of networking protocols in

order to meet the needs of its users. That’s because a large network typically consists of a mixture of various versions of Windows, as well as Macintosh and possibly Linux computers. As a result, the server may need to simultaneously support TCP/IP, NetBIOS, and AppleTalk protocols.

Many servers have more than one network interface card installed. In that case, the NOS must be able to support multiple network connections. Ideally, the NOS should have the ability to balance the network load among its network interfaces. In addition, in the event that one of the connections fails, the NOS should be able to seamlessly switch to another connection.

Finally, most network operating systems include a built-in ability to function as a router that connects two networks. The NOS router functions also include firewall features in order to keep unauthorized packets from entering the local network.

P1.5 – Task 5 – Describe File Sharing Services, Security Services, Directory Services and Network support software and the importance of these services on a School Network for Staff and Students.

P1.5 - Web Software – Server Software

File Sharing Security Network Services Network Support

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

A database table is similar in appearance to a spreadsheet, in that data is stored in rows and columns (flat file). As a result, it is usually quite easy to import a spreadsheet into a database table. The main difference between storing your data in a spreadsheet and storing it in a database is in how the data is organized.

Database creation software comes in two kinds, standard package software like Access, Fox, OneNote, Works, OpenOffice and data integrated software like MySql and JQuery.

Standard Package – These work like any other stand alone packages, they manage information in tables, produce queries, reports, searches, are linked with relationships etc. They work independent of Web Sites but can be used to manage information offline, customer orders, invoices etc. There is a degree of compatibility and serve their function.

Data Integrated – Programs such as MySql, Ajax, Jquery work within websites to produce functionality to sites. When a user logs in to a site it picks up the information to the database and allows the user to access information from prior experience. This could be customisation of the layout, their bills, their orders, their music of files on a cloud. Everything on a website that knows the user is used in this way from Amazons recommends to Welcome displays.

◦ P1.6 – Task 6 – Describe and give examples of Standard and Integrated database functions and describe their uses within an e-commerce site.

P1.6 - Web Software – Database Software

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

A Port is an application that serves as a communications endpoint in an operating system, associated with an IP address of the host, as well as the type of protocol used for communication. The purpose of ports is to uniquely identify different applications or processes running on a single computer and thereby enable them to share a single physical connection to a packet-switched network like the Internet.

The protocols that primarily use ports are the Transport Layer protocols (TCP) and the User Datagram Protocol (UDP) of the Internet Protocol Suite.

A port is identified for each address and protocol by a 16-bit number, commonly known as the port number. The port number, added to a computer's IP address, completes the destination address for a communications session. That is, data packets are routed across the network to a specific destination IP address, and then, upon reaching the destination computer, are further routed to the specific process bound to the destination port number.

For example, a computer sending an email sends the command via the POP3 port (110) and then receives a response back via the SMTP computer (25). If you ring up a school (server) and the receptionist answers (DNS) you then ask for IT Support (some other port depending on why you rang). The confusing part is that they can be the same number (IP Address and Protocol)

Of the thousands of available ports, about 250 well-known ports are reserved by convention to identify specific service types on a server.

P1.7 - Web Architecture – Ports

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

The port numbers are divided into three ranges: the well-known ports, the registered ports, and the dynamic or private ports. The well-known ports are those from 0 through 1023. Examples include:

20 & 21: File Transfer Protocol (FTP) 22: Secure Shell (SSH) 23: Telnet remote login service 25: Simple Mail Transfer Protocol (SMTP) 53: Domain Name System (DNS) service 80: Hypertext Transfer Protocol (HTTP) used in the World Wide Web 110: Post Office Protocol (POP3) 119: Network News Transfer Protocol (NNTP) 143: Internet Message Access Protocol (IMAP) 161: Simple Network Management Protocol (SNMP) 194: Internet Relay Chat (IRC) 443: HTTP Secure (HTTPS) 465: SMTP Secure (SMTPS) P1.7 – Task 7 – Describe what Ports are and give examples of their functions

and describe the need to clarify these functions within an e-commerce site.

P1.7 - Web Architecture – Ports

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Transmission Control Protocol (TCP): Provides reliable connection oriented transmission between two hosts. TCP establishes a session between hosts, and then ensures delivery of packets between the hosts. Internet Protocol (IP): A routable protocol that uses IP addresses to deliver packets to network devices. IP is an intentionally unreliable protocol, so it doesn’t guarantee delivery of information. It works on the Network layer of the TCP and communicates with these devices to provide a function, printing, internet access, file access, communication. It does not operate applications but initiates communication.

P1.8 - Web Architecture – ProtocolsAppleTalk - Apple computers have their own suite of network protocols known as AppleTalk because of the language barrier between operating systems and hardware differences. The AppleTalk suite includes a Physical and Data Link layer protocol called LocalTalk, but can also work with standard lower level protocols, including Ethernet and Token Ring.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

802.2 - A joint standard, IEEE 802.2, was created for the Logical Link Control (LLC) layer of all systems. In other words, the LAN link layer has been divided into two sub-layers. The bottom MAC layer—partially overlapping the physical layer—deals with access to the communication medium. The top LLC layer enables you to initiate, administer, and terminate logical connections between individual LAN stations.

P1.8 - Web Architecture – ProtocolsSeveral LAN systems have been created independently from each other. Ethernet II is still used. Some years ago, the Institute of Electrical and Electronics Engineers (IEEE) came up with a project. The aim of this project was to unify existing initiatives and work out standards for particular LAN types (e.g. Ethernet, Arcnet, Token Ring, etc). These standards described the Media Access Control (MAC) layer for each type. The IEEE 802.3 standard was created for Ethernet, IEEE 802.4 for Token Bus, IEEE 802.5 for Token Ring, and so on.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.8 - Web Architecture – Protocols

802.3 or Ethernet - Ethernet has been around in various forms since the early 1970s. The current incarnation of Ethernet is defined by the IEEE standard known as 802.3. Various types of Ethernet operate at different speeds and use different types of media. However, all the versions of Ethernet are compatible with each other, so you can mix and match them on the same network by using devices such as bridges, hubs, and switches to link network segments that use different types of media.This is pretty much the standard used in computers, speeds vary but the technology stays the same.

802.5 – Put simply this is the network card that pushes the technology behind Token Rings. This card addressing managed the tokens, sends the information around the network looking for the outlet for the information and gathering in the tokens sent out by users. When it receives the token and deals with it, the information is changed on the users machine to indicate that the token has been received and dealt with. The card then discards additional requests from the network to process the information again unless the user requests that the information is different or has changed.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

The User Datagram Protocol (or UDP) is a connectionless Transport layer protocol that is used when the overhead of a connection is not required. After UDP has placed a packet on the network (via the IP protocol), it forgets about it. UDP doesn’t guarantee that the packet actually arrives at its destination. Most applications that use UDP simply wait for any replies expected as a result of packets sent via UDP. If a reply doesn’t arrive within a certain period of time, the application either sends the packet again or gives up.

Probably the best-known Application layer protocol that uses UDP is DNS, the Domain Name System. When an application needs to access a domain name such as www.brookeweston.org, DNS sends a UDP packet to a DNS server to look up the domain. When the server finds the domain, it returns the domain’s IP address in another UDP packet. (Actually, the process is much more complicated than that.

FDDI - Fibre Distributed Data Interface, a 100Mbps network standard used with fibre-optic backbone. When FDDI is used, FDDI/Ethernet bridges connect Ethernet segments to the backbone. Fibre optic cabling and fibre optic data management is expensive but it manages large networks and traffic at a far faster speed. The FDDI cards manage the information transfer rate along those lines, sending on further information when the router or server receives the first sections.

P1.8 – Task 8 – Describe what Protocols are and give examples of their functions and describe the need to clarify these functions within an e-commerce site.

P1.8 - Web Architecture – Protocols

TCP/IP Appletalk UDP 802 standards FDDI

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.9 - Web Architecture – TCP/IP You need TCP/IP to connect to the Internet. Realise that there is a difference

between installing TCP/IP on your network and installing it for dial-up networking use; these are two separate installations and uses for the protocol.

You install TCP/IP to use with the dial-up networking feature. This installation enables you to connect to the Internet by means of a modem. The TCP/IP communicates with Web servers on the Internet. If you install TCP/IP on your network, you use it to connect to the other computers on your LAN. One installation has nothing to do with the other. For more information,

Using TCP/IP to connect to the Internet provides you with all the Internet features and advantages, including e-mail, Web browsers, and file transfer. Also, TCP/IP includes various programs (which are also protocols) that you can use to access information on the Internet. If you have special needs for FTP or Telnet, for example, TCP/IP provides those programs for you to use. If you plan to expand your network to the Internet someday, your knowledge and use of TCP/IP will help you tremendously. Knowing how to configure TCP/IP will make it easier for you to transfer your Web sites and pages to the Web and to configure clients and servers for the Internet. Having TCP/IP in place means less configuring when you move to the Internet.

P1.9 – Task 9 – Describe what TCP/IP is and give examples, explaining the importance of TCP/IP in setting up an e-commerce presence.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.10 - Web Architecture – RegistrationInternet service providers (e.g. Virgin Media, BT, Sky) Internet service providers are there for a reason, companies and individuals

need to either connect through a provider or use their own T-Line like a T1. ISP’s provide a service that most individuals are not aware of, from minor hosting to providing a static IP address. The range of ISP’s is broad, each sells a connection package with phone options and each can be measured in terms of speed of connection, bandwidth and for most, a small degree of site or file hosting.◦ Speed of connection – this is how fast an individual file can go from the website to

your screen, measures in Megabit speed which is 1/8 of a Megabyte per second. The faster the speed the faster a page opens.

◦ Bandwidth – this is how large a file can be downloaded at one time and can be compared to road width, smaller the bandwidth, the more buffering a file has to do to load.

◦ Static IP – Used by business to limit down activity such as blocking, easier to block and restrict a static address than a dynamic address, whereas dynamic addresses are more difficult to hack or be subject to DDOS attacks.

◦ Hosting – a lot of small companies host on their ISP and bounce to a registered domain name from. This is good for small businesses as the storage space for small sites is already there. Bouncing the web address is not seen by the customers and it is a secondary site that makes it more difficult to hack.

P1.10 – Task 10 – Describe, with evidence, the purpose and function of making the right choice of ISP’s for an e-commerce presence.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.11 - Web Architecture – RegistrationWeb hosting services (e.g. free hosts; Google Sites, Free-space; paid hosts; JimdoPro, Fasthosts) Web hosting differs from ISP’s because they provide a place to store, locate,

display and manage website functions. Where ISP’s can bounce, hosts store. The difference is the range of hosts is the service they provide for that fee. These services include:◦ Database management through SQL◦ Auto redirecting of IP addressing◦ Email exchanging◦ Virtual Private networking◦ Dedicated server activity

The difference between pricing strategies depends on the level of service the user requires, free hosts like Google share the space but not the activity, Bit and tinyurl provide space and a small degree of activity management whereas fasthosts and others provide more management facilities such as forums, secure logins and database management, shopping basket protection, blog and wiki activity etc. None of these provide filtering, that is something that the user still has to manage like forum maintenance and management. Ultimately the provision of hosting is the difference between a look-at-me site and an managed shopping experience.

P1.11 – Task 11 - Describe, with evidence, the purpose and functions of Web Hosting for an e-commerce presence.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.12 - Web Architecture – Domains◦ Part 1 - Transfer Protocol

http:// – Hypertext Transfer Protocol https:// – Hypertext Transfer Protocol, Secure ftp:// - File Transfer Protocol for FTP site. Allows upload/download of files.

◦ Part 2 – www (which part of internet is being addressed)◦ Part 3 – domain name – name of organisation that controls the site

that the page is stored on◦ Part 4 – indicates the type of organisation (.co/.sch/.gov/.edu/.org

etc)◦ Part 5 – the country in which the site is located◦ Part 6 – sub domain or webpage currently viewing

◦http://www.purelygadgets.co.uk/aboutus.php

Part 1 Part 2 Part 4Part 3 Part 5 Part 6

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.12 - Web Architecture – Domains

Web addresses as seen in the previous slide are broken down for a reason. First there was IP addresses, then the web grew to the point when remembering all those numbers was impossible. When the system of DNS came into place, the translation of IP addresses to wording allowed businesses, government offices, companies and individuals to generate their own unique address that was more memorable for the customer.

How difficult would Easyjet.com find business if the customer has to remember 12 numbers, or Thetrainline, Google, Amazon, all branded names based on their DNS name rather than their IP.◦ Internet Service Provider (ISP)

has unique IP (Internet Protocol) address four numbers separated by full stops

Domain Name System (DNS) translates IP address numbers into domain name Without the DNS you would have to remember numbers instead of names. For example – typing http://193.164.107.139 would lead to the same page

as http://www.brookweston.org URL (Uniform Resource Locator)

standard address used to find a pageP1.12 – Task 12 - Describe, with evidence, what DNS and URL are and what it does in terms of securing business, naming and address management.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

All websites are programmed in, some have multiple languages within them, a little JavaScript, mostly HTML, some MySql and a bit of PHP. All serve their purpose and all have adapted over the years. Now they are invaluable in the production of a good working site. Each language is different but there is a compatibility within them that allows the other codes to use or display them.

And there are others, .Net, Python, C++ etc.

P1.13 - Web Architecture – Programming

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

MySql - Another component of standard web server installations, MySQL is a free, open source database server. It’s not a programming language as such, but it is a new language to learn if you want to talk to databases so it’s a key component of modern websites. Again, MySQL is what powers WordPress  - so all your posts and content are actually stored inside a MySQL database.

PHP - PHP is the undisputed king of server-side languages in use on the Internet today – running on 75% of all web servers – and is the power behind WordPress, Wikipedia, and even the user-facing part of Facebook. As a server side language, the code is processed before it reaches the user’s browser, so all they see is the final page and none of the original PHP code. PHP is mainly used in conjunction with MySQL to pull information from a database, manipulate it and present it to the user.

P1.13 - Web Architecture – Programming

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

JavaScript - Not to be confused with Java, the full object oriented software programming language, Javascript is the daddy of interactive webpages. It’s a scripting language that’s run locally on the user’s browser, allowing webpages to respond to user interactions such as clicking on elements and timing events. Generally, if there’s something interactive on a site, and it isn’t Flash – it’s more than likely Javascript.

HTML – This is the original and standard web code that makes pages appear on the screen, the mark-up language of all pages written as a basic script that holds the other pieces of code within it. It is the accepted standard of all web pages for layout and structure, doing little more than putting things into their place and setting fonts, colours, proportions and locations.

P1.13 - Web Architecture – Programming

P1.13 – Task 13 - Describe, with evidence, what web programming is and the need for additional coding to make web pages more productive.PHP MySql Javascript HTML

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.14 - Web Architecture – SpeedsIn the production, uploading and side management of any website, internally and externally managed there are consideration that need to be looked at by any business from the amount of space and hosts they use to the amount of traffic they can handle on a daily business basis. This is called User side and server side management. User side is the considerations that the company can manage on their own, server side is what hosts and network stores can manage. Connection Speed (e.g. dial-up, broadband, mobile broadband, WI-FI)

Dial up is dying but there is still 3% of the population that is still managing a slower connection. Slower connections means pages do not load, users get impatient and go elsewhere, video files will far too long to load, streaming buffers to the point of being unwatchable. Similar with mobile broadband when it loses signal can cause data transfers to crash or a delay in reconnection, Wi-Fi can be restricted in public places so linked sites can come up as web filtered. Tis can have an impact on what the user places on their site, causes them to reconsider content, possibly creating a secondary site to accommodate these customers.

P1.14 – Task 14 - Describe, with evidence, how connection speed can have an impact on the business trade of an e-commerce site.

Use this site as evidence of testing.

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

The ability to access all of the content as it was intended to be regardless of the system or software they are using their social, educational, physical or legal environment. In short everyone can access the web content irrespective of external

factors.◦ Something as simple as having interactive help features, different

colour or size options and alternate mirrored low bandwidth sites can help accessibility of content for a broad spectrum of users

◦ Some examples are alt tags, alternative content, alter text size, alter colours used, image file size

Throughout this AO you will need to investigate: ◦ The factors affecting web accessibility including

People with Disabilities (Visual and Physical) The Social factors – language barriers and cultural background Legal and policy factors – requirements from governments Technical factors - The system they are using or for example a

slow Internet connection

P1.13 - Web Architecture – W3C

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Web Accessibility is something a lot of companies do not take into consideration when preparing or making a website for their customers. There is a small percentage of the population that are affected by sites with no accessibility but this is still a customer base that needs to be addressed. When making a site you will need to consider how these can be addressed and enable web accessibility.

Interesting articles about web accessibility:◦ http://en.wikipedia.org/wiki/Web_accessibility ◦ http://www.w3.org/WAI/intro/accessibility.php - very good◦ http://www.w3.org/WAI/

P1.15 – Task 15 - Describe, with evidence, how web Accessibility and W3C compliance needs to be taken into consideration when developing an e-commerce presence.

P1.15 - Web Architecture – W3C

People with Disabilities (Visual and Physical) Social Factors

Legal and Policy Factors Technical Factors

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.1 – Task 1 – Describe the functions and use of different Servers in benefitting a small web-presence business needs.P1.2 – Task 2 – Describe the different kinds of hardware necessary to create a website and their purpose in displaying a web result.P1.3 – Task 3 - Describe, with evidence, the different levels of Design Creation software available and the advantages and disadvantages of online vs. offline creation.P1.4 – Task 4 - Describe what a web browser does and how they work and outline the range of different choices are available for a company.P1.5 – Task 5 – Describe File Sharing Services, Security Services, Directory Services and Network support software and the importance of these services on a School Network for Staff and Students. P1.6 – Task 6 – Describe and give examples of Standard and Integrated database functions and describe their uses within an e-commerce site.P1.7 – Task 7 – Describe what Ports are and give examples of their functions and describe the need to clarify these functions within an e-commerce site.

P1 – Assessment Criteria

Scenario Criteria Assessment1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

P1.8 – Task 8 – Describe what Protocols are and give examples of their functions and describe the need to clarify these functions within an e-commerce site.P1.9 – Task 9 – Describe what TCP/IP is and give examples, explaining the importance of TCP/IP in setting up an e-commerce presence.P1.10 – Task 10 – Describe, with evidence, the purpose and function of making the right choice of ISP’s for an e-commerce presence.P1.11 – Task 11 - Describe, with evidence, the purpose and functions of Web Hosting for an e-commerce presence.P1.12 – Task 12 - Describe, with evidence, what DNS and URL are and what it does in terms of securing business, naming and address management. P1.13 – Task 13 - Describe, with evidence, what web programming is and the need for additional coding to make web pages more productive.P1.14 – Task 14 - Describe, with evidence, how connection speed can have an impact on the business trade of an e-commerce site.P1.15 – Task 15 - Describe, with evidence, how web Accessibility and W3C compliance needs to be taken into consideration when developing an e-commerce presence.

P1 – Assessment Criteria