Preview (12 of 37 pages)

This Document Contains Chapters 1 to 2 Chapter 1 Introduction to Electronic Commerce At a Glance Instructor’s Manual Table of Contents • Introduction • Learning Objectives • Teaching Tips • Quick Quizzes • Class Discussion Topics • Additional Projects • Additional Resources • Key Terms Lecture Notes Introduction Electronic commerce began in the United States and was conducted primarily through English-language Web sites for many years. This has changed dramatically and since 2013, China has been the leader in online retail sales. More and more sales are being made on smartphones instead of computers. China is the world’s largest potential online market due to their very active Internet users and overall upward trend in economic growth. Chinese buyers do use U.S. based sites such as Amazon, but also frequently use domestic sites with well-developed brand awareness such as JD.com and Tmall. Chinese online buyers are highly influenced by and want to consult online reviews much more than shoppers elsewhere. They also like to discuss potential purchases online. This has led to the development of independent online review sites and sellers such as Nike becoming active participants in Chinese chat and messaging sites such as Sina Weibo and WeChat. Sellers in China must account for regional differences within a diverse country. Distribution and delivery can be tricky in areas without well-developed roads and standardized shipping practices, which has led to some sellers creating their own distribution systems. This chapter addresses how online businesses have emerged and grown to accommodate various cultures and infrastructure challenges around the world. Learning Objectives In this chapter, students will learn: • What electronic commerce is and how it has evolved in three waves of development • Why companies concentrate on revenue models and the analysis of business processes instead of business models when they undertake electronic commerce initiatives • How to identify opportunities for and barriers to electronic commerce initiatives • How economic forces have led to the development and continued growth of electronic commerce • How businesses use value chains and SWOT analysis to identify electronic commerce opportunities • How the international nature of electronic commerce affects its growth and development Teaching Tips The Evolution of Electronic Commerce 1. In this section, define electronic commerce and describe its evolution from a novelty to its current place as an important component of global business activity. Electronic Commerce and Electronic Business 1. Introduce the terms electronic commerce (e-commerce), electronic business (e-business), and dot-com/pure dot-com. Categories of Electronic Commerce 1. Discuss the five general electronic commerce categories: business-to-consumer (B2C), business-to-business (B2B), transactions and business processes, consumer-to-consumer (C2C), and business-to-government (B2G). 2. Introduce the terms supply management/procurement an de-procurement. Business Processes 1. Introduce the terms business activity, transaction, business processes and telecommuting (telework). Relative Size of Electronic Commerce Elements 1. Use Figure 1-1 to illustrate the three main elements of electronic commerce. 2. Describe two additional categories of electronic commerce: consumer-to-consumer (C2C) and business-to-government (B2G). 3. Use Figure 1-2 to summarize the five categories of electronic commerce. The Development and Growth of Electronic Commerce 1. Note that the Internet has changed the way people buy, sell, hire, and organize business activities in more ways and more rapidly than any other technology in the history of business. Early Electronic Commerce 1. Discuss the following topics: • Electronic Funds Transfers (EFTs): Explain that, for approximately50 years, banks have been using electronic funds transfers (EFTs, also called wire transfers). • Electronic Data Interchange (EDI): Introduce the terms trading partners and value-added network (VAN). The First Wave of Electronic Commerce, 1995–2003 1. Compare the evolution of electronic commerce to other historic changes in economic organization, e.g., the Industrial Revolution. 2. Explain why the first wave of electronic commerce has often been characterized by rapid growth, often called a “boom,” followed by rapid contraction, often called a “bust.” 3. Discuss how the injection of financial investment into e-commerce businesses from 2000-2003 set the stage for significant growth in online business activities in subsequent years. 4. Refer to Figure 1-3 to summarize the growth of actual and estimated global online sales for the B2C and B2B categories. The Second Wave of Electronic Commerce, 2004-2009 1. Emphasize how the second wave was characterized by an expanding international scope, with sellers beginning to do business in other countries and languages. 2. Note that in the second wave, established companies began using their own internal funds to finance gradual expansion of electronic commerce opportunities. 3. Explain why the increase in broadband connections in homes was a key element in the B2C component of the second wave. 4. Highlight the fact that the use of electronic mail (or e-mail) in the first wave was a tool for relatively unstructured communication. 5. Note that in the second wave, sellers began using e-mail as an integral part of their marketing and customer contact strategies. 6. Briefly discuss how companies began the second wave with a renewed interest in making the Internet work as an effective advertising medium. 7. Note that the sale of digital products was fraught with difficulties during the first wave of electronic commerce. Use the music industry as an example. 8. Discuss how the second wave fulfilled the promise of available technology by supporting the legal distribution of music, video, and other digital products on the Web. 9. Describe the concept and examples of Web 2.0. 10. Introduce the terms first-mover advantage and smart-follower strategy. Teaching Tip Students can learn more about social networks using Web 2.0 at http://www.ibm.com/developerworks/webservices/library/ws-socialcollab/index.html?ca=dat The Third Wave of Electronic Commerce, 2010-Present 1. Review the following factors that came together to start a third wave in the development of electronic commerce. • Emergence of Mobile Commerce: Discuss the rise of mobile commerce (m-commerce) and the increasing use of smart phones and tablet computers. Stress that an important change brought about by fully operational handheld devices is that the Internet becomes truly available everywhere. Define mobile software applications (mobile apps) and discuss their impact on mobile commerce. • Emergence of Global Electronic Commerce: Briefly discuss how inexpensive devices such as mobile phones and tablets have made the Internet available everywhere and affected global online business in less developed countries with rapidly growing economies. • Widespread Social Networking: Briefly explain how Web 2.0 technologies that enabled part of the growth in electronic commerce that occurred in the second wave will play a major role in the third wave. Describe social commerce. • Increased Participation by Small Businesses: Briefly explain how the third wave of electronic commerce will include the participation of a significantly larger proportion of smaller businesses. Define the term crowdsourcing. • Sophisticated Analysis of Large Datasets: Introduce the terms big data and data analytics. Note that companies that store large amounts of data about their customers’ behavior on their Web sites can combine that information with their existing data about customers’ past purchases to predict the kinds of products, services, or special offers in which each customer might be interested. • Integration of Tracking Technologies into B2B:Briefly explain how Internet technologies are increasingly integrated with each other and with communication systems to allow companies to communicate with each other and share transaction, inventory level, and customer demand information effectively. The “Boom and Bust” Myth 1. In this section, discuss that the reported “bust” of electronic commerce between 2000 and 2002 was actually a minor slowdown and that growth continued through the 2008 – 2009 global recession. Refer to Figure 1-4 to summarize the growth of actual and estimated online sales. Quick Quiz 1 1. A(n) ____ is an exchange of value, such as a purchase, a sale, or the conversion of raw materials into a finished product. Answer: transaction 2. The group of logical, related, and sequential activities and transactions in which businesses engage are often collectively referred to as ____. Answer: business processes 3. ____ occurs when one business transmits computer-readable data in a standard format to another business. Answer: Electronic data interchange (EDI) 4. Businesses that engage in EDI with each other are called ____. Answer: trading partners 5. ____ is the general term for a group of technologies have emerged and combined to make new businesses possible on the Web. Answer: Web 2.0 Business Models, Revenue Models, and Business Processes 1. Introduce the terms business model and revenue model. Teaching Tip Students can learn more about business models by reading the following article: http://timkastelle.org/blog/2012/01/eight-models-of-business-models-why-theyre-important Focus on Specific Business Processes 1. Emphasize that although much of this book is devoted to explaining technologies, the book’s focus is on the business of electronic commerce; the technologies only enable the business processes. Role of Merchandising 1. Define merchandising. 2. Note that the skills of merchandising and personal selling can be difficult to practice remotely. However, companies must be able to transfer their merchandising skills to the Web for their Web sites to be successful. Product/Process Suitability to Electronic Commerce 1. Refer to Figure 1-5 to illustrate examples of business processes categorized by suitability for electronic commerce and traditional commerce. 2. Introduce the terms commodity item and shipping profile. 3. Explain that a product that has a strong brand reputation is easier to sell on the Web than an unbranded item, because the brand’s reputation reduces the buyer’s concerns about quality when buying that item sight unseen. 4. Point out that traditional commerce, rather than electronic commerce, can be a better way to sell items that rely on personal selling skills. 5. Note that a combination of electronic and traditional commerce strategies works best when the business process includes both commodity and personal inspection elements. Electronic Commerce: Opportunities, Cautions, and Concerns 1. Emphasize that not every business process is suitable for electronic commerce. Opportunities for Electronic Commerce 1. Introduce the terms virtual community and social networking sites. Teaching Tip Ask students to discuss virtual communities in which they participate. 2. Students should be able to identify the benefits of electronic commerce, such as its ability to increase the speed and accuracy with which businesses can exchange information, reducing costs on both sides of transactions. 3. Students should also appreciate the ability to consider a wide variety of products and services 24 hours a day, every day, and that they can have digital products delivered through the Internet. 4. Note also that the benefits of electronic commerce extend to the general welfare of society. Electronic payments of tax refunds, public retirement, and welfare support cost less to issue and arrive securely and quickly when transmitted over the Internet. Electronic Commerce: Current Barriers 1. Point out that some business processes might never lend themselves to electronic commerce. Use the examples of perishable foods and high-cost, unique items such as custom-designed jewelry. 2. Discuss four issues that currently act as barriers to electronic commerce. • The Need for a Critical Mass: Provide examples of products and services that require a critical mass of potential buyers be equipped and willing to buy through the Internet. Use online grocers such as Peapod as an example. • Predictability of Costs and Revenues: Briefly describe the challenge for businesses surrounding return-on-investment calculations and employee recruitment and retention. • Technology Integration Issues: Highlight the difficulty of integrating existing databases and transaction-processing software designed for traditional commerce into the software that enables electronic commerce. • Cultural and Legal Concerns: Outline aspects of cultural and legal obstacles to conducting all types of electronic commerce. Quick Quiz 2 1. A(n) ____ is a set of processes that combine to achieve a company’s goal, which is to yield a profit. Answer: business model 2. A(n) ____ is a specific collection of business processes used to identify customers, market to those customers, and generate sales to those customers. Answer: revenue model 3. A(n) ____ is a product or service that is hard to distinguish from the same products or services provided by other sellers; its features have become standardized and well known. Answer: commodity item 4. A product’s ____ is the collection of attributes that affect how easily that product can be packaged and delivered. Answer: shipping profile 5. ____ sites are Web sites that individuals and businesses use to conduct social interactions online. Answer: Social networking Economic Forces and Electronic Commerce 1. Introduce the formal definition of market and the term hierarchical business organizations, which economists generally refer to as firms or companies. Transaction Costs 1. Define the term transaction costs. Be sure to mention that a significant component of transaction costs can be the investment a seller makes in equipment or in the hiring of skilled employees to supply the product or service to the buyer. 2. Use Figure 1-6 to illustrate a market form of economic organization for a sweater dealer. Markets and Hierarchies 1. Introduce the terms vertical integration. Use Figure 1-7 to illustrate a hierarchal form of economic organization for a sweater dealer. 2. Introduce the term strategic business unit (SBU)/business unit. Using Electronic Commerce to Reduce Transaction Costs 1. Mention that businesses and individuals can use electronic commerce to reduce transaction costs by improving the flow of information and increasing the coordination of actions. 2. Use the example of an employment transaction, emphasizing how the use of telecommuting and mobile technologies reduce transaction costs. Network Economic Structures 1. Introduce the terms network economic structure, strategic alliances/strategic partnerships, virtual companies, and strategic partners. 2. Explain why network organizations are particularly well suited to technology industries that are information intensive. Reference Figure 1-8 to illustrate a network organization. 3. Note electronic commerce can make networks, which rely extensively on information sharing, much easier to construct and maintain. Some researchers believe these network forms of organizing commerce will become predominant in the near future. Network Effects 1. Introduce the terms law of diminishing returns and network effect. 2. Point out that regardless of how businesses in a particular industry organize themselves–as markets, hierarchies, or networks – your students will need a way to identify business processes and evaluate whether electronic commerce is suitable for each process. Quick Quiz 3 1. ____ are the total of all costs that a buyer and seller incur as they gather information and negotiate a purchase-and-sale transaction. Answer: Transaction costs 2. The practice of an existing firm replacing one or more of its supplier markets with its own hierarchical structure for creating the supplied product is called ____. Answer: vertical integration 3. A(n) ____ is one particular combination of product, distribution channel, and customer type. Answer: strategic business unit, business unit 4. Entities that come together as a team for a specific project or activity are called ____. Answer: strategic partners 5. As more people or organizations participate in a network, the value of the network to each participant increases. This increase in value is called a(n) ____. Answer: network effect Identifying Electronic Commerce Opportunities 1. Explain that one way for students to focus on specific business processes as candidates for electronic commerce is to break the business down into a series of value-adding activities that combine to generate profits and meet other goals of the firm. 2. Define the term industry. Strategic Business Unit Value Chains 1. Introduce the terms value chain, primary activities, and supporting activities. 2. Illustrate a value chain for a strategic business unit, including both primary and supporting activities using Figure 1-9. These value chain activities will occur in some form in any strategic business unit. 3. Review the primary activities each strategic business unit conducts using Figure 1-9: design, identify customers, purchase materials and supplies, manufacture product or create service, market and sell, deliver, and provide after-sale service and support. 4. Review the primary support activities the central corporate organization typically supplies using Figure 1-9: finance and administration activities, human resource activities, and technology development activities. Industry Value Chains 1. Define the terms value system and industry value chain. 2. Note that, by becoming aware of how other business units in the industry value chain conduct their activities, managers can identify new opportunities for cost reduction, product improvement, or channel reconfiguration. 3. Illustrate an industry value chain for a wooden chair from its inception as trees in a forest to its grave in a landfill or at a sawdust recycler using Figure 1-10. 4. Point out that many managers have found ways to use electronic commerce technologies to reduce costs, improve product quality, reach new customers or suppliers, or create new ways of selling existing products. 5. Explain that, when firms are considering electronic commerce, the value chain can be an excellent way to organize the examination of business processes within their business units and in other parts of the product’s life cycle. SWOT Analysis: Evaluating Business Unit Opportunities 1. Point out that most electronic commerce initiatives add value by either reducing transaction costs, creating some type of network effect, or a combination of both. 2. Explain the importance of SWOT analysis (strengths, weaknesses, opportunities and threats). 3. Refer to Figure 1-11 to illustrate questions that an analyst would ask in conducting a SWOT analysis for any company or strategic business unit. 4. Refer to Figure 1-12 to explain the results of Dell Computer’s SWOT analysis. International Nature of Electronic Commerce 1. Note the rapidly increasing proportion of online business activity based outside the U.S. 2. Refer to Figure 1-13 to illustrate the proportion of online B2C sales that arise in the main geographic regions of the world. 3. Introduce the key issues that any company faces when it conducts international commerce: trust, culture, language, government, and infrastructure. Trust Issues on the Web 1. Explain that companies with established reputations in the physical world often create trust by ensuring that customers know who they are. 2. Discuss the rationale for the following statement: For businesses to succeed on the Web, they must find ways to quickly generate the trust that traditional businesses take years to develop. Language Issues 1. Explain the phrase, “think globally, act locally.” 2. Point out that the first step that a Web business usually takes to reach potential customers in other countries, and thus in other cultures, is to provide local language versions of its Web site. Note that this may mean translating the Web site into another language or regional dialect. 3. Introduce machine translation and localization. Cultural Issues 1. Emphasize the following two points: • An important element of business trust is anticipating how the other party to a transaction will act in specific circumstances. • A company’s brand conveys expectations about how the company will behave; therefore, companies with established brands can build online businesses more quickly and easily than a new company without a reputation. 2. Define the term culture. 3. Provide examples of errors stemming from subtle language and cultural standards. 4. Discuss why designers of Web sites for international commerce must be very careful when they choose icons to represent common actions. Culture and Government 1. Note that the censorship of Internet content and communications restricts electronic commerce because it prevents certain types of products and services from being sold or advertised. Further, it reduces the interest level of many potential participants in online activities. 2. Discuss how countries, such as the People’s Republic of China and Singapore, are wrestling with the issues presented by the growth of the Internet as a vehicle for doing business. 3. Point out that some countries, although they do not ban electronic commerce entirely, have strong cultural requirements that have found their way into the legal codes that govern business conduct. Infrastructure Issues 1. Point out that businesses that successfully meet the challenges posed by trust, language, and culture issues still face the challenges posed by variations and inadequacies in the infrastructure that supports the Internet throughout the world. 2. Introduce the terms freight forwarder, customs broker, and bonded warehouse. 3. Illustrate multiple flows of information and transfer of physical objects that occur in a typical international trade transaction using Figure 1-14. Quick Quiz 4 1. A(n) ____ is a way of organizing the activities that each strategic business unit undertakes to design, produce, promote, market, deliver, and support the products or services it sells. Answer: value chain 2. ____ means a translation that considers multiple elements of the local environment, such as business and cultural practices, in addition to local dialect variations in the language. Answer: Localization 3. A(n) ____ is a company that arranges shipping and insurance for international transactions. Answer: freight forwarder 4. A(n) ____ is a secure location where incoming international shipments can be held until customs requirements are satisfied or until payment arrangements are completed. Answer: bonded warehouse Class Discussion Topics 1. How does the international nature of e-commerce affect its infrastructure? 2. What steps should be taken to overcome the cultural issues of electronic commerce? 3. Describe the changes in the types of businesses participating in electronic commerce as technology advances have occurred through the first, second, and third wave. Additional Projects 1. Look at the following Web site: http://www.jpeterman.com/!LDpstjukHvlflHaogITYkA!/. Use SWOT analysis to evaluate the business strategy. 2. Create a diagram (similar to the diagram in Figure 1-9) that describes the industry value chain for an industry that holds special interest for you.(Also, refer to Decision Support Tools: Porter's Value Chain at http://www.ifm.eng.cam.ac.uk/research/dstools/value-chain-/) Additional Resources 1. SWOT Analysis: http://www.netmba.com/strategy/swot 2. Business Models on the Web: http://www.digitalenterprise.org/models/models.html 3. The Case and the Plan for the Virtual Company: http://www.inc.com/magazine/20100401/the-case-and-the-plan-for-the-virtual-company.html 4. Three Trends Shaping B2B Marketing: http://www.inc.com/articles/201101/3-trends-shaping-b2b-marketing.html 5. Cultural Impact On E-Commerce: A Comparative Study: http://iacis.org/iis/2013/241_iis_2013_431-440.pdf Key Terms  Big data: the term used in business to describe very large stores of information such as that collected by online sellers about their customers.  Bonded warehouse: a secure location where incoming international shipments can be held until customs requirements are satisfied or until payment arrangements are completed.  Business activity: a task performed by a worker in the course of doing his or her job.  Business model: a set of processes that combine to achieve a company’s goal, which is to yield a profit.  Business processes: the group of logical, related, and sequential activities and transactions in which businesses engage.  Business unit: a unit within a company that is organized around a specific combination of product, distribution channel, and customer type. Synonymous with strategic business unit.  Business-to-business (B2B): transactions conducted between businesses on the Web.  Business-to-consumer (B2C): transactions conducted between shoppers and businesses on the Web.  Business-to-government (B2G): a category of electronic commerce that includes business transactions with government agencies, such as paying taxes and filing required reports.  Commodity item: a product or service that has become so standardized and well known that buyers cannot detect a difference in the offerings of various sellers; buyers usually base their purchase decisions for such products and services solely on price.  Consumer-to-consumer (C2C): a category of electronic commerce that includes individuals who buy and sell items among themselves.  Crowdsourcing: Web sites used to gather multiple small investors together for specific business funding activities.  Culture: the combination of language and customs that are unique to a particular population.  Customs broker: a company that arranges the payment of tariffs and compliance with customs laws for international shipments.  Data analytics: the highly sophisticated tools for investigating patterns and knowledge contained in big data.  Dot-com: a company that operates only online.  E-procurement: synonymous with business-to-business (B2B).  Electronic business (e-business): another term for electronic commerce; sometimes used as a broader term for electronic commerce that includes all business processes, as distinguished from a narrow definition of electronic commerce that includes sales and purchase transactions only.  Electronic commerce (e-commerce): business activities conducted using electronic data transmission over the Internet and the World Wide Web.  Electronic data interchange (EDI): exchange between businesses of computer-readable data in a standard format.  Electronic funds transfer (EFT): electronic transfer of account exchange information over secure private communications networks.  Firms or companies: the terms economists generally use to refer to hierarchical business organizations.  First-mover advantage: the benefit a company can gain by introducing a product or service before its competitors.  Freight forwarder: a company that arranges shipping and insurance for international transactions.  Hierarchical business organization: firms that include a number of levels with cumulative responsibility. A top-level president or officer typically heads these organizations. A number of vice presidents report to the president. A larger number of middle managers report to the vice presidents.  Industry: multiple firms selling similar products to similar customers.  Industry value chain: the larger stream of activities in which a particular business unit’s value chain is embedded.  Law of diminishing returns: the characteristic of most activities to yield less value as the amount of consumption increases.  Localization: a type of language translation that considers multiple elements of the local environment, such as business and cultural practices, in addition to local dialect variations in the language.  Machine translation: language translation that is done by software; such translation can reach speeds of 400,000 words per hour.  Market: a real or virtual space in which potential buyers and sellers come into contact with each other and agree on a medium of exchange (such as currency or barter).  Merchandising: the combination of store design, layout, and product display intended to create an environment that encourages customers to buy.  Mobile commerce (m-commerce): resources accessed using devices that have wireless connections, such as stock quotes, directions, weather forecasts, and airline flight schedules.  Mobile software applications (mobile apps): apps issued by sellers to make shopping at their stores easier and more convenient that accounted for 42% of all B2C mobile sales in 2014.  Network economic structure: a business structure wherein firms coordinate their strategies, resources, and skill sets by forming a long-term, stable relationship based on a shared purpose.  Network effect: an increase in the value of a network to its participants, which occurs as more people or organizations participate in the network.  Primary activities: activities that are required to do business: design, production, promotion, marketing, delivery, and support of products or services.  Procurement: the business activity that includes all purchasing activities plus the monitoring of all elements of purchase transactions.  Pure dot-com: a company that operates only online; also called dot-com.  Revenue model: the combination of strategies and techniques that a company uses to generate cash flow into the business from customers.  Shipping profile: the collection of attributes, including weight and size that affect how easily a product can be packaged and delivered.  Smart-follower strategy: an approach in which a business observes first-mover failures and enters a business later, when large investments are no longer required and business processes have been tested.  Smartphones: mobile phones that include a Web browser, a full key board, and an identifiable operating system that allows users to run various software packages.  Social commerce: the use of interpersonal connections online to promote or sell goods and services.  Social networking site: Web sites used by individuals and businesses to conduct social interactions online.  Strategic alliance: the coordination of strategies, resources, and skill sets by companies into long-term, stable relationships with other companies and individuals based on shared purpose.  Strategic business unit (SBU): a unit within a company that is organized around a specific combination of product, distribution channel, and customer.  Strategic partners: the entities taking part in a strategic alliance.  Strategic partnerships: synonymous with strategic alliance.  Supply management: synonymous with procurement, which is the business activity that includes all purchasing activities plus the monitoring of all elements of purchase transactions.  Supporting activities: secondary activities that back up primary business activities. These include human resource management, purchasing, and technology development.  SWOT analysis: evaluation of the strengths and weaknesses of a business unit, and identification of the opportunities presented by the markets of the business unit and threats posed by competitors of the business unit.  Telecommuting: an employment arrangement in which the employee logs in to the company computer from an off-site location through the Internet instead of traveling to an office.  Telework: synonymous with telecommuting.  Trading partners: businesses that engage in EDI with one another.  Transaction: an exchange of value, such as a purchase, a sale, or the conversion of raw materials into a finished product.  Transaction costs: the total of all costs incurred by a buyer and seller as they gather information and negotiate a transaction.  Value-added network (VAN): an independent company that provides connection and EDI transaction forwarding services to businesses engaged in EDI.  Value chain: a way of organizing the activities that each strategic business unit undertakes to design, produce, promote, market, deliver, and support the products or services it sells.  Value system: synonymous with industry value chain.  Vertical integration: the practice of an existing firm replacing one of its suppliers with its own strategic business unit that creates the supplied product.  Virtual community: an electronic gathering place for people with common interests.  Virtual companies: a strategic alliance occurring between or among companies that operate on the Internet.  Web 2.0:technologies that include software that allow users of Web sites to participate in the creation, editing, and distribution of content on a Web site owned and operated by a third party.  Wire transfer: synonymous with electronic funds transfer, which is the electronic transfer of account exchange information over secure private communications networks. Chapter 2 Technology Infrastructure: The Internet and the World Wide Web At a Glance Instructor’s Manual Table of Contents • Introduction • Learning Objectives • Teaching Tips • Quick Quizzes • Class Discussion Topics • Additional Projects • Additional Resources • Key Terms Lecture Notes Introduction A growing number of Internet users, especially in developing countries, use a smartphone or a tablet device instead of a computer to go online. Many companies have developed Web sites that work well on the smaller screens and keyboards of these devices. However, as the number of Internet users connected through mobile telephone networks increases, the volume is taxing existing technologies and threatening to overload networks. Wireless telephone networks use antennas on towers to collect mobile device signals and transfer them into a wired network through equipment at the base of the towers. As more users operate devices within the range of a particular tower, the speed of service each user experiences slows down, sometimes significantly. Currently the only solution is for telecommunications companies to add more cell towers, which is expensive and requires locations that can be hard to acquire. With mobile data traffic expected to double in 2017 and triple in 2018, the search for solutions is underway. Steve Perlman, the developer of WebTV is working on p Cell, which has been shown in lab tests to operate at 35 times the speed of current wireless network technologies. It is currently being tested with Dish Network in San Francisco. Instead of cell towers, pCell creates a network of “personal cells” based on each device using a series of small radio transmitters. It is designed to work with existing mobile devices and gives each device access to the full speed of the network. This chapter addresses technologies that created the Internet and enabled the World Wide Web to emerge as a powerful global business platform. The continuing development of these technologies will make new digital products and services available in the future. Learning Objectives In this chapter, students will learn: • About the origin, growth, and current structure of the Internet • How packet-switched networks are combined to form the Internet • How Internet, e-mail, and Web protocols work • About Internet addressing and how Web domain names are constructed • About the history and use of markup languages on the Web • How HTML tags and links work • About the cost and performance of Internet connection technologies • About Internet2 and the Semantic Web Teaching Tips The Internet and the World Wide Web 1. Introduce the terms computer network, an internet, and the Internet. 2. Note that networks of computers and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce. 3. Introduce the term World Wide Web (Web). Origins of the Internet 1. Explain the 1960 origins of the Internet by discussing the need for powerful computers for coordination and control of weapons defense systems. Note that the initial research goal was to design a worldwide network that could remain operational, even if parts of the network were destroyed by enemy military action or sabotage. 2. Emphasize that the computer networks that existed at that time used leased telephone company lines for their connections. Note that the Defense Department was concerned about the inherent risk of a single-channel method for connecting computers, and its researchers developed a different method of sending information through multiple channels using packets. 3. Describe the 1969 ARPANET network developed by Defense Department researchers in the Advanced Research Projects Agency (ARPA). Emphasize that the ARPANET was the earliest of the networks that eventually combined to become what we now call the Internet. 4. Note that throughout the 1970s and 1980s, many researchers in the academic community connected to the ARPANET and contributed to the technological developments that increased its speed and efficiency. At the same time, researchers at other universities were creating their own networks using similar technologies. New Uses for the Internet 1. Students will be very interested to learn that e-mail was born in 1972 when Ray Tomlinson, a researcher who used the network, wrote a program that could send and receive messages over the network. 2. Introduce the terms mailing list, Usenet (User’s News Network), and newsgroups. 3. Mention that the use of the networks was limited to those members of the research and academic communities who could access them. 4. Between 1979 and 1989, network applications were improved and tested by an increasing number of users. As the number of people in different organizations using these networks increased, security concerns arose; these concerns continue to be problematic. Commercial Use of the Internet 1. An important fact to point out is that, in 1989, the National Science Foundation (NSF) permitted two commercial e-mail services, MCI Mail and CompuServe, to establish limited connections to the Internet for the sole purpose of exchanging e-mail transmissions with users of the Internet. 2. Note that as the 1990s began, people from all walk so life (not just scientists or academic researchers) started thinking of these networks as the global resource that we now know as the Internet. Growth of the Internet 1. Emphasize that the privatization of the Internet was substantially completed in 1995, when the NSF turned over the operation of the main Internet connections to a group of privately owned companies. 2. Introduce the terms network access points (NAPs), network access providers, and Internet service providers (ISPs). 3. Define the term Internet hosts and refer to Figure 2-1 to illustrate the dramatic growth in the number of Internet hosts. The Internet of Things 1. Point out that in recent years, devices other than computers have been connected to the Internet, such as mobile phones and tablet devices. The connection of these devices to the Internet serves to connect the users of those devices to each other. However, the connection of devices to the Internet that are not used by persons is increasing rapidly. 2. Explain how computers can also be connected to each other using the Internet to conduct business transactions without human intervention. 3. Define the term Internet of Things. Teaching Tip To learn more about the Internet of Things, see: http://www.internet-of-things.eu/ Quick Quiz 1 1. The ____ is a particular internet, which uses a specific set of rules and connects networks all over the world to each other. Answer: Internet 2. A(n) ____ is an e-mail address that forwards any message it receives to any user who has subscribed to the list. Answer: mailing list 3. ____ sell Internet access rights directly to larger customers and indirectly to smaller firms and individuals through other companies, called Internet service providers (ISPs). Answer: Network access providers 4. ____ are computers directly connected to the Internet. Answer: Internet hosts 5. The subset of the Internet that includes computers and sensors connected to each other for communication and automatic transaction processing is often called the ____. Answer: Internet of Things Packet-Switched Networks 1. Introduce the terms local area network (LAN) and wide area networks(WANs). 2. Note that the early models for WANs were the circuits of the local and long-distance telephone companies of the time, because the first early WANs used leased telephone company lines for their connections. 3. Introduce the terms circuit, circuit switching, packet-switched, and packets. Routing Packets 1. Introduce the terms routing computers, router computers, routers, gateway computers, border routers(edge routers),routing algorithms, routing tables, and configuration tables. 2. Point out that individual LANs and WANs can use a variety of different rules and standards for creating packets within their networks. The network devices that move packets from one part of a network to another are called hubs, switches, and bridges. Emphasize that routers are used to connect networks to other networks. 3. An important concept for students to understand is that when packets leave a network to travel on the Internet, they must be translated into a standard format. Routers usually perform this translation function. 4. Refer to the diagram in Figure 2-2 to illustrate a small portion of the Internet that shows an organizations router-based architecture. The figure shows only the routers that connect each organization’s WANs and LANs to the Internet, not the other routers that are inside the WANs and LANs or that connect them to each other within the organization. 5. Introduce the terms Internet back bone and backbone routers. Teaching Tip To learn more about routing tables, see:http://compnetworking.about.com/od/hardwarenetworkgear/f/routing_table.htm Public and Private Networks 1. Introduce the terms public network, private network, and leased line. 2. Note that the advantage of a leased line is security. 3. Explain why the largest drawback to a private network is the cost of the leased lines, which can be quite expensive. Virtual Private Networks (VPNs) 1. Introduce the term virtual private network (VPN). 2. Introduce the terms IP tunneling, encapsulation, and IP wrapper. 3. Explain that the word virtual is used as part of VPN because, although the connection appears to be a permanent connection, it is actually temporary. The VPN is created, carries out its work over the Internet, and is then terminated. Intranets and Extranets 1. Remind students that in the early days of the Internet, the distinction between private and public networks was clear. However, as networking (and inter-networking) technologies became less expensive and easier to deploy, organizations began building more and more internets (small “i”), or interconnected networks. 2. Distinguish between the terms intranet and extranet. Point out that “intranet” is used when the internet does not extend beyond the boundaries of a particular organization; “extranet” is used when the internet extends beyond the boundaries of an organization and includes networks of other organizations. Quick Quiz 2 1. A network of computers that are located close together is called a(n) ____. Answer: local area network (LAN) 2. The combination of telephone lines and the closed switches that connect them to each other is called a(n) ____. Answer: circuit 3. (True or False) Although circuit switching works well for telephone calls, it does not work as well for sending data across a large WAN or an interconnected network like the Internet. Answer: True 4. The computers that decide how best to forward each packet are called ____. Answer: routing computers, router computers, routers, gateway computers, border routers, edge routers Internet Protocols 1. Define protocol. Introduce the terms Network Control Protocol (NCP), proprietary architecture, closed architecture, and open architecture. 2. Review the four key rules for message handling. 3. Explain how the open architecture approach has contributed to the success of the Internet because computers manufactured by different companies (Apple, Dell, Hewlett-Packard, etc.)can be interconnected. TCP/IP 1. Introduce the terms Transmission Control Protocol (TCP) and Internet Protocol (IP). 2. Explain that the TCP controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations. The IP specifies the addressing details for each packet, labeling each with the packet’s origination and destination addresses. 3. Emphasize that in addition to its Internet function, TCP/IP is used today in many LANs. The TCP/IP protocol is provided in most personal computer operating systems commonly used today, including Linux, Macintosh, Microsoft Windows, and UNIX. IP Addressing 1. Introduce the terms InternetProtocolversion4 (IPv4) and IP address. 2. Explain that computers do all of their internal calculations using a base 2 (or binary) number system in which each digit is either a 0 or a 1, corresponding to a condition of either off or on. 3. Introduce the term dotted decimal. 4. Note that today, IP addresses are assigned by three not-for-profit organizations: the American Registry for Internet Numbers (ARIN), the Reséaux IP Européens (RIPE), and the Asia-Pacific Network Information Center (APNIC). 5. Inform your students on how to use the ARIN Who is page at the ARIN Web site to search the IP addresses owned by organizations in North America. 6. Point out that, in the early days of the Internet, the four billion addresses provided by the Internet Protocol version 4 (IPv4) rules certainly seemed to be more addresses than an experimental research network would ever need. 7. Introduce the terms subnetting, private IP addresses, and Network Address Translation (NAT). Teaching Tip To learn more about TCP/IP and subnetting, see: http://support.microsoft.com/kb/164015. 8. Point out that the Internet Engineering Task Force (IETF) worked on several new protocols that could solve the limited addressing capacity of IPv4 and, in 1997, it approved Internet Protocol version 6 (IPv6) as the protocol that will replace IPv4. 9. Note that the last available IPv4 addresses were allocated in summer 2015. Companies that still need IPv4 addresses can buy them on secondary markets or use subnetting and their NAT devices to adapt their traffic to IPv6. 10. Explain the major advantage of IPv6. It uses a 128-bit number for addresses instead of the 32-bit number used in IPv4. 11. Discuss the IPv6 shorthand notation system for expressing addresses. Introduce the terms colon hexadecimal or colon hex. Explain the hexadecimal (base 16) numbering system that uses 16 characters (0, 1, 2, 3, 4, 5, 6, 7, 8, 9, a, b, c, d, e, and f). Electronic Mail Protocols 1. Introduce the term electronic mail (e-mail). 2. Explain that most organizations use a client/server structure to handle e-mail. 3. Introduce the terms e-mail server and e-mail client software. 4. Emphasize that if e-mail messages did not follow standard rules, an e-mail message created by a person using one e-mail client program could not be read by a person using a different e-mail client program. 5. Introduce the terms Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), Multipurpose Internet Mail Extensions (MIME), and Interactive Mail Access Protocol (IMAP). Web Page Request and Delivery Protocols 1. Introduce the terms Web client computers, Web client software, Web browser software, Web server software, client/server architecture, Hypertext Transfer Protocol (HTTP), and Uniform Resource Locator (URL). Quick Quiz 3 1. A(n) ____ is a collection of rules for formatting, ordering, and error checking data sent across a network. Answer: protocol 2. (True or False) The IP controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations. Answer: False 3. The term ____ refers to the use of reserved private IP addresses within LANs and WANs to provide additional address space. Answer: subnetting 4. The purpose of a(n) ____ is to respond to requests for Web pages from Web clients. Answer: Web server Emergence of the World Wide Web 1. Set the stage by mentioning that the ideas behind the Web developed from innovative ways of thinking about and organizing information storage and retrieval. 2. Point out that two important ideas that became key technological elements of the Web are hypertext and graphical user interfaces. The Development of Hypertext 1. Briefly describe: a. Vannevar Bush’s Memex hypothetical machine that would include mechanical aids, such as microfilm readers and indexes, that would help users quickly and flexibly consult their collected knowledge. b. Ted Nelson’s description of a system in which text on one page links to text on other pages. c. Doug Englebart’s first experimental hypertext system on one of the large computers of the 1960s. d. Tim Berners-Lee’s project to improve the laboratory research document-handling procedures for his employer. 2. Introduce the terms hypertext, hypertext server, Hypertext Markup Language (HTML), Web servers, and hypertext link/hyperlink. Graphical Interfaces for Hypertext 1. Introduce the term Web browser. 2. Describe the difference between an HTML document and a word-processing document. 3. Define the basic functions of a graphical user interface (GUI): presenting program control functions and program output to users and accepting their input. The World Wide Web 1. Note that initially, few people outside the scientific research community had software that could read HTML documents on the World Wide Web. 2. Describe the historical significance of Mosaic, the first GUI program that could read HTML and use HTML hyperlinks to navigate from page to page on computers anywhere on the Internet. 3. Use Figure 2-3 to illustrate the overall rapid growth rate of the Web. 4. Invite students to offer ideas explaining the increase in the number of Web sites that occurred from 2010 to 2011, with the number of sites doubling. The Deep Web 1. Using the example of visiting Amazon.com and searching for a book about “online business,” computers, briefly describe the concept of the deep Web. Explain that the query of the databases’ information about books is used to create a Web page that is a customized response to the user’s search. 2. Note that the deep Web can be difficult or impossible to search because its information is not stored on the Web, but in databases that are searched only when a user requests that information through the Web site that maintains the database. Teaching Tip To learn more about the deep Web, see: http://money.cnn.com/2014/03/10/technology/deep-web/ and http://computer.howstuffworks.com/internet/basics/how-the-deep-web-works.htm Domain Names 1. Introduce the concept of domain names and the term top-level domain (TLD). 2. Note that, since 1998, the Internet Corporation for Assigned Names and Numbers (ICANN) has had the responsibility of managing domain names and coordinating them with the IP address registrars. 3. Introduce the terms generic top-level domain (gTLD) and sponsored top-level domain (sTLD). 4. Use Figure 2-4 to illustrate a list of some commonly used TLDs, including gTLDs and some of the more frequently used country TLDs. Quick Quiz 4 1. A(n) ____ is a software interface that lets users read (or browse) HTML documents and move from one HTML document to another through text formatted with hypertext link tags in each file. Answer: Web browser 2. A(n) ____ is a way of presenting program control functions and program output to users and accepting their input. Answer: graphical user interface (GUI) 3. The store of information that is available through the Web is called the ____. Answer: deep Web 4. ____ are sets of words that are assigned to specific IP addresses. Answer: Domain names Markup Languages and the Web 1. Discuss the most important parts of a Web page – the structure of the page and the text that makes up the main part of the page. 2. Introduce the terms text markup language, markup tags (tags), Standard Generalized Markup Language (SGML),Worldwide Web Consortium (W3C), and Extensible Hypertext Markup Language (XHTML). 3. Refer to Figure 2-5 to illustrate how HTML, XML, and XHTML have descended from the original SGML specification. Hypertext Markup Language 1. Introduce the concept of hypertext elements. 2. Explain to students that HTML is easier to use than SGML and is the prevalent markup language used to create documents on the Web today. The W3C maintains detailed information about HTML versions and related topics on its W3C HTML Working Group page. 3. The latest version of HTML is 5.0 which was finalized in 2014. You can learn more about it by visiting the W3C HTML 5 page. 4. Introduce the terms metalanguage and Extensible Markup Language (XML). HTML Tags 1. Most HTML tags have an opening tag and a closing tag that format the text between them. 2. Figure 2-6 shows some sample text marked up with HTML tags. Figure 2-7 shows this text as it appears in a Web browser. HTML Links 1. Note that users can read Web pages in serial order or in whatever order they prefer by following hyperlinks. 2. Figure 2-8 illustrates the differences between reading a paper catalog in a linear way and reading a hypertext catalog in a nonlinear way. 3. Introduce the terms linear hyperlink structure, hierarchical hyperlink structure, home page or start page, and site map. 4. Figure 2-9 illustrates three common Web page organization structures: linear, hierarchical and hybrid. 5. Introduce the term an shortage. Cascading Style Sheets 1. Introduce the terms style sheet and cascading style sheet. 2. Note that the term cascading is used because designers can apply many style sheets to the same Web page, one on top of the other, and the styles from each style sheet flow (or cascade) into the next. Extensible Markup Language (XML) 1. As companies began to conduct business online, they turned to XML to help them maintain Web pages that contained large amounts of data. 2. Point out that XML includes data-management capabilities that HTML cannot provide. Use Figures 2-10 and 2-11 to illustrate how HTML might be used to display a Web page that includes a list of countries and some basic facts about each country. 3. Explain that XML differs from HTML in two important respects. First, XML is not a markup language with defined tags. It is a framework within which individuals, companies, and other organizations can create their own sets of tags. Second, XML tags do not specify how text appears on a Web page; the tags convey the meaning (the semantics) of the information included within them. • Refer to Figures 2-12 and 2-13 to illustrate the difference between appearance and semantics. 4. Emphasize that the greatest strengths of XML is that allows users to define their own tags, but that this is also its greatest weakness. To overcome that weakness, many companies have agreed to follow common standards for XML tags. These standards, in the form of data-type definitions (DTDs) or XML schemas, are available for a number of industries including Legal XML, MathML, and Extensible Business Reporting Language (XBRL). 5. Introduce the term XML vocabulary. 6. Note that although it is possible to display XML files in some Web browsers, XML files are not intended to be displayed in a Web browser. 7. Introduce the terms Extensible Style sheet Language (XSL) and XML parsers. 8. Use Figure 2-14 to illustrate a diagram showing one way that a Web server might process HTTP requests for Web pages generated from an XML database in different formats for different Web browsing devices. Teaching Tip To learn more about XML, see: http://www.w3schools.com/xml/default.ASP Quick Quiz 5 1. A(n) ____ language specifies a set of tags that are inserted into the text. Answer: text markup 2. A(n) ____ structure resembles conventional paper documents in that the reader begins on the first page and clicks the Next button to move to the next page in a serial fashion. Answer: linear hyperlink 3. In HTML, hyperlinks are created using the HTML ____. Answer: anchor tag 4. (True or False) XML files, like HTML files, can be created in any text editor. Answer: True Internet Connection Options 1. Introduce the term Internet access providers (IAPs). Connectivity Overview 1. Review the most common connection types ISPs offer: voice-grade telephone lines, various types of broadband connections, leased lines, and wireless. 2. Introduce the term bandwidth. Discuss the major distinguishing factors between various ISPs and their connection options - that is, the bandwidth they offer. 3. Introduce the term net bandwidth. 4. Note that bandwidth can differ for data traveling to or from the ISP depending on the user’s connection type. Connection types include symmetric connections and asymmetric connections. 5. Introduce the terms upstream bandwidth (upload bandwidth) and downstream bandwidth(downstream bandwidth or downlink bandwidth). Voice-Grade Telephone Connections 1. Introduce the terms plain old telephone service (POTS) and broadband services. Broadband Services 1. Introduce the terms Digital Subscriber Line (DSL) and asymmetric digital subscriber line (ADSL, usually abbreviated DSL). 2. Explain that DSL connection methods do not use a modem. Note that unlike DSL, cable modem connection band widths vary with the number of other subscribers competing for the shared resource. Leased-Line Connections 1. Introduce the terms T1 line, T3 line, frame relay, asynchronous transfer mode (ATM), and optical fiber. Wireless Connections • Note that the Internet was built on telephone company wires and infrastructure but that many Internet users today use some form of wireless connection. Wireless Ethernet (Wi-Fi) 1. Introduce the terms Wi-Fi and wireless Ethernet. 2. Note that the technology is also known by its network specification number (802.11) and that the latest version, 802.11ac, is replacing 802.11n because it has greater bandwidth. 3. Introduce the terms wireless access point (WAP), roaming, and hot spots. Personal area networks 1. Introduce the terms Bluetooth, personal area networks (PANs)or piconets, Ultra-Wideband (UWB) and ZigBee. 2. One major advantage of Bluetooth technology is that it consumes very little power, which is an important consideration for mobile devices. 3. Many observers believe that UWB technologies will be used in future personal area networking applications such as home media centers and in linking mobile phones to the Internet. 4. An increasing number of applications have been developed to run on ZigBee that control home energy management systems (including lighting, heating, cooling), commercial building automation, security systems, and remote controls for consumer electronic products. Fixed-Point Wireless 1. Introduce the terms fixed-point wireless, repeaters (transceivers) and mesh routing. Satellite Microwave 1. Satellite microwave transmissions made Internet connection possible for the first time to many people in rural areas and are now used by airlines to provide inflight Internet. 2. While satellite networks were the only option for many years, many types of wireless networks are now available. Mobile Telephone Networks 1. Introduce the term short message service (SMS). 2. Review data transmission speeds for mobile data including third-generation (3G) wireless technology, Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX), that are generally referred to as fourth-generation (4G) wireless technology. 3. Note that most tablet devices, mobile phones, and smartphones have the ability to use either a mobile telephone network or a locally available wireless network. 4. Refer to Figure 2-15 to summarize the speed and cost information for the most commonly available wired and wireless options for connecting a home or business to the Internet. Teaching Tip To learn more about WiMAX, see: http://computer.howstuffworks.com/wimax.htm Quick Quiz 6 1. ____ is the amount of data that can travel through a communication line per unit of time. Answer: Bandwidth 2. ____ connections provide the same bandwidth in both directions. Answer: Symmetric 3. The telephone lines used to cover the vast distances between rural customers are usually ____ lines, which cost less than telephone lines designed to carry data, are made of lower-grade copper, and were never intended to carry data. Answer: voice-grade 4. The most common wireless connection technology for use on LANs is called ____. Answer: Wi-Fi, wireless Ethernet, or 802.11n 5. Many mobile phones have a small screen and can be used to send and receive short text messages using a protocol called ____. Answer: short message service (SMS) Internet2 and the Semantic Web 1. Students will find it interesting to learn that Internet2 is also used by universities to conduct large collaborative research projects that require several supercomputers connected at very fast speeds or that use multiple video feeds, features that would be impossible on the Internet given its lower bandwidth limits. 2. Introduce the terms Semantic Web, software agents, resource description framework (RDF), and ontology. 3. Note that thus far, several areas of scientific inquiry have begun developing ontologies that will become the building blocks of the Semantic Web in their areas. • Biology, genomics, and medicine have all made progress toward specific ontologies. • Other sciences, such as climatology, hydrology, and oceanography have similar incentives (as many researchers around the world work on common problems such as global warming) and scientists are developing ontologies for their disciplines. 4. Introduce students to the Db pedia project. 5. Note that current commercial applications of Semantic Web community research include the natural language interfaces of mobile phone search utilities such as Siri and Google Now. Teaching Tip To learn more about Internet2, see: http://www.internet2.edu/about-us/ Quick Quiz 7 1. ____ is used by universities to conduct large collaborative research projects that require several supercomputers connected at very fast speeds, or that use multiple video feeds, features that would be impossible on the Internet given its lower bandwidth limits. Answer: Internet2 2. A(n) ____ is a set of standards for XML syntax. Answer: resource description framework (RDF) 3. The ____ project envisions words on Web pages being tagged (using XML) with their meanings. Answer: Semantic Web 4. A(n) ____ is a set of standards that defines, in detail, the relationships among RDF standards and specific XML tags within a particular knowledge domain. Answer: ontology Class Discussion Topics 1. Is there a practical application for the W3C Semantic Web? 2. What is the difference between the Internet and the World Wide Web? 3. What do you think is the main motivation for the creation of Internet2? 4. What is a software agent and why is it such an integral part of Internet2? Additional Projects 1. Provide answers for the following questions: a. How will Internet2 benefit current Internet users? b. Is Internet2 a separate network and will it replace the current commercial Internet? c. What kind of technology will be needed to use the advanced Internet applications and technologies? d. What are some of Internet2's long-term goals? 2. Describe how a VPN connection using IP tunneling allows company employees in remote locations to send sensitive information to company computers. Additional Resources 1. Routing packets: http://computer.howstuffworks.com/router5.htm 2. Frame relay: http://www.arcelect.com/frame_relay-56kbps_ft1-t1.htm 3. Introduction to RDF: http://www.w3schools.com/webservices/ws_rdf_intro.asp Key Terms  ADSL: one of the newest technologies that uses the DSL protocol to provide service in the broadband range. It provides transmission bandwidths from 100 to 640 Kbps upstream and from 1.5 to 9 Mbps (million bits per second) downstream.  Anchor tag: used to create HTML hyperlinks.  Asymmetric connections: provide different bandwidths for each direction.  Asymmetric digital subscriber line (ADSL): one of the newest technologies that uses the DSL protocol to provide service in the broadband range. It provides transmission bandwidths from 100 to 640 Kbps upstream and from 1.5 to 9 Mbps (million bits per second) downstream.  Asynchronous transfer mode (ATM): technology used by NAPs.  Backbone routers: very large computers that can each handle more than 5 billion packets per second.  Bandwidth: the amount of data that can travel through a communication line per unit of time.  Base 2 (binary): number system in which each digit is either a 0 or a 1, corresponding to a condition of either off or on.  Bluetooth: one of the first wireless protocols, designed for personal use over short distances.  Border router: the computer that decides how best to forward each packet.  Broadband: connections that operate at speeds of greater than about 200 Kbps.  Cascading style sheet (CSS): a specific type of style sheet that can be applied to each Web page, one on top of the other, and the styles from each style sheet flow (or cascade) into the next.  Circuit: the combination of telephone lines and the closed switches that connect them to each other.  Circuit switching: centrally controlled, single-connection model where a single path of connected circuits switched into each other is maintained for the entire length of the call.  Client/server architecture: combination of client computers running Web client software and server computers running Web server software.  Closed architecture: in the early days of computing, the practice of each computer manufacturer creating its own protocol, so computers made by different manufacturers could not be connected to each other.  Closing tag: HTML tag that formats text.  Computer network: any technology that allows people to connect computers to each other.  Configuration tables: information stored includes lists of connections that lead to particular groups of other routers, rules that specify which connections to use first, and rules for handling instances of heavy packet traffic and network congestion.  Data-type definitions (DTDs):are common standards for XML tags that are available for many industries including legal, math and science and accounting and finance.  Deep Web: the store of information that is available through the Web.  Digital subscriber line (DSL): connection methods do not use a modem. They use a piece of networking equipment that is a form of network switch.  Domain name: set of words that are assigned to specific IP addresses.  Dotted decimal: four numbers separated by periods.  Downlink bandwidth: a measure of the amount of information that can travel from the Internet to a user in a given amount of time.  Download bandwidth: a measure of the amount of information that can travel from the Internet to a user in a given amount of time.  Downstream bandwidth: a measure of the amount of information that can travel from the Internet to a user in a given amount of time.  DSL: also known as Asymmetric digital subscriber line (ADSL). It provides transmission bandwidths from 100 to 640 Kbps upstream and from 1 to 15 Mbps (million bits per second) downstream.  Edge router: the computers that decide how best to forward each packet.  Electronic mail: mail sent across the Internet.  E-mail: mail sent across the Internet.  E-mail client software: communicates with the e-mail server software on the e-mail server computer to send and receive e-mail messages.  E-mail server: a computer that is devoted to handling e-mail. Software that runs on the e-mail server stores and forwards e-mail messages.  Encapsulation: placing the encrypted packets inside another packet.  Extensible Business Reporting Language (XBRL): XML schema for accounting and finance that is one of the most widely used in the world.  Extensible Hypertext Markup Language(XHTML): a reformulation of HTML version 4.0 as an XML application.  Extensible Markup Language (XML): another markup language that was derived from SGML for use on the Web. Used to markup information that companies share with each other over the Internet.  Extensible Style Sheet Language (XSL): used to write XML formatting instructions.  Extranet: an intranet that has been extended to include specific entities outside the boundaries of the organization, such as business partners, customers, or suppliers.  Fixed-point wireless: uses a system of repeaters to forward a radio signal from the ISP to customers.  Fourth-generation (4G) wireless technology: wireless technology that offers download speeds up to 14 Mbps and upload speeds up to 8 Mbps.  Frame relay: used by NAPs and the computers that perform routing functions on the Internet backbone.  Gateway computers: the computer that decides how best to forward each packet.  Generic top-level domain (gTLD): TLDs that are available to specified categories of users (.biz, .info, .name, and .pro.).  Graphical user interface (GUI): a way of presenting program control functions and program output to users and accepting their input.  Hexadecimal (base 16): numbering system that uses 16 digits (0, 1, 2, 3, 4, 5, 6, 7, 8, 9, a, b, c, d, e, and f).  Hierarchical hyperlink structure: in this structure, the Web user opens an introductory page called a home page or start page.  Home page: an introductory page. This page contains one or more links to other pages, and those pages, in turn, link to other pages.  Hot spots: WAPs that are open to the public.  Hyperlink: points to another location in the same or another HTML document.  Hypertext: page-linking system.  Hypertext element: text elements that are related to each other.  Hypertext link: points to another location in the same or another HTML document.  Hypertext Markup Language (HTML): the language used for the creation of Web pages.  Hypertext server: a computer that stores files written in Hypertext Markup Language (HTML).  Hypertext Transfer Protocol (HTTP): the set of rules for delivering Web page files over the Internet.  Interactive Mail Access Protocol (IMAP):a newer e-mail protocol that performs the same basic functions as POP, but includes additional features.  internet(small “i”):a group of computer networks that have been interconnected.  Internet: global system of interconnected computer networks.  Internet access providers (IAPs):companies that provide Internet access to individuals, businesses, and other organizations.  Internet backbone: routers that handle packet traffic along the Internet’s main connecting points and the telecommunications lines connecting them.  Internet hosts: computers directly connected to the Internet.  Internet of Things: the subset of the Internet that includes these computers and sensors connected to each other for communication and automatic transaction processing.  Internet Protocol (IP): specifies the addressing details for each packet, labeling each with the packet’s origination and destination addresses.  Internet Protocol version 4 (IPv4):uses a 32-bit number to identify the computers connected to the Internet.  Internet Protocol version 6 (IPv6): uses a 128-bit number for addresses instead of the 32-bit number used in IPv4.  Internet service providers (ISPs):offer many different types of connections to the Internet.  Internet2: an experimental test bed for new networking technologies that is separate from the original Internet.  Intranet: an internet that does not extend beyond the organization that created it.  IP address: a 32-bit number used to identify the computers connected to the Internet.  IP tunneling: creates a private passageway through the public Internet that provides secure transmission from one computer to another.  IP wrapper: the outer packet of an encrypted packet.  Leased line: a permanent telephone connection between two points.  Legal XML: XML schema for information in the legal profession.  Linear hyperlink structure: resembles conventional paper documents in that the reader begins on the first page and clicks the Next button to move to the next page in a serial fashion.  Local area network (LAN): a network of computers that are located close together.  Long Term Evolution (LTE): a 4G wireless technology that offers download speeds up to 14 Mbps and upload speeds up to 8 Mbps.  Mailing list: an e-mail address that forwards any message it receives to any user who has subscribed to the list.  Markup tags: provide formatting instructions that Web client software can understand.  MathML: XML schema for mathematical and scientific information.  Mesh routing: directly transmits Wi-Fi packets through hundreds, or even thousands, of short-range transceivers that are located close to each other.  Metalanguage: a language that can be used to define other languages.  Multipurpose Internet Mail Extensions (MIME): a set of rules for handling binary files, such as word-processing documents, spreadsheets, photos, or sound clips that are attached to e-mail messages.  Net bandwidth: the actual amount of data that is transmitted per second.  Network access points (NAPs):originally located in San Francisco, New York, Chicago, and Washington, D.C., each operated by a separate telecommunications company.  Network access providers: sell Internet access rights directly to larger customers and indirectly to smaller firms and individuals  Network Address Translation (NAT) device: converts private IP addresses into normal IP addresses when it forwards packets from computers to the Internet.  Network Control Protocol (NCP): protocol used by ARPANET.  Network specification: the set of rules that equipment connected to the network must follow.  Newsgroups: the more than 1000 different topic areas used by Usenet.  Ontology: a set of standards that defines, in detail, the relationships among RDF standards and specific XML tags within a particular knowledge domain.  Open architecture: included the use of a common protocol for all computers connected to the Internet and four key rules for message handling.  Opening tag: HTML tag that formats text.  Optical fiber: technology used by NAPs.  Packet-switched (network): on this network, files and e-mail messages are broken down into small pieces, called packets, that are labeled electronically with their origins, sequences, and destination addresses.  Packets: files and e-mail messages are broken down into small pieces.  pCell: a system that creates a network of “personal cells” for each mobile device that allows each device access to the full speed of the network.  Personal area networks (PANs): small Bluetooth networks.  Piconets: small Bluetooth networks.  Plain old telephone service (POTS): uses existing telephone lines and an analog modem to provide a bandwidth of between 28 and 56 Kbps.  Post Office Protocol (POP):used by an e-mail client program running on a user’s computer to request mail from the organization’s e-mail server.  Private IP addresses: a series of IP numbers that are not permitted on packets that travel on the Internet.  Private network: a leased-line connection between two companies that physically connects their intranets to one another.  Proprietary architecture: in the early days of computing, each computer manufacturer created its own protocol, so computers made by different manufacturers could not be connected to each other.  Protocol: a collection of rules for formatting, ordering, and error checking data sent across a network.  Public network: any computer network or telecommunications network that is available to the public.  Repeaters: transmitter-receiver devices (also called transceivers) that receive the signal and then retransmit it toward users’ roof-mounted antennas and to the next repeater.  Resource description framework (RDF): a set of standards for XML syntax. It would function as a dictionary for all XML tags used on the Web.  Roaming: shifting from one WAP to another, without requiring intervention by the user.  Router computers: the computers that decide how best to forward each packet.  Routers: the computer that decides how best to forward each packet.  Routing algorithms: rules in programs on router computers that determine the best path on which to send each packet.  Routing computers: the computers that decide how best to forward each packet.  Routing tables: information stored includes lists of connections that lead to particular groups of other routers, rules that specify which connections to use first, and rules for handling instances of heavy packet traffic and network congestion.  Semantic Web: project envisions words on Web pages being tagged (using XML) with their meanings.  Short message service (SMS): protocol used by many mobile phones have a small screen and can be used to send and receive short text messages.  Simple Mail Transfer Protocol (SMTP): specifies the format of a mail message and describes how mail is to be administered on the e-mail server and transmitted on the Internet.  Software agents: intelligent programs used to read XML tags to determine the meaning of words in their contexts.  Sponsored top-level domain (sTLD): a TLD for which an organization other than ICANN is responsible.  Standard Generalized Markup Language (SGML): used for many years by the publishing industry to create documents that needed to be printed in various formats and that were revised frequently.  Start page: contains one or more links to other pages, and those pages, in turn, link to other pages.  Style sheet: a set of instructions that gives Web developers more control over the format of displayed pages.  Subnetting: the use of reserved private IP addresses within LANs and WANs to provide additional address space.  Symmetric connection: provides the same bandwidth in both directions.  Tags: provide formatting instructions that Web client software can understand.  TCP/IP: the rules that govern how data moves through the Internet and how network connections are established and terminated.  Text markup language: specifies a set of tags that are inserted into the text.  Third-generation (3G) wireless technology: offers download speeds up to 2 Mbps and upload speeds up to 800 Kbps.  Top-level domain (TLD): the rightmost part of a domain name.  Transceivers: transmitter-receiver device that receives a signal and then retransmits it toward users’ roof-mounted antennas and to the next repeater.  Transmission Control Protocol (TCP): controls the disassembly of a message or a file into packets before it is transmitted over the Internet, and it controls the reassembly of those packets into their original formats when they reach their destinations.  Ultra-Wideband (UWB): provides wide bandwidth (up to about 480 Mbps in current versions) connections over short distances (30 to 100 feet).  Uniform Resource Locator (URL): the combination of the protocol name and the domain name.  Upload bandwidth: a measure of the amount of information that can travel from the user to the Internet in a given amount of time.  Upstream bandwidth: a measure of the amount of information that can travel from the user to the Internet in a given amount of time.  Usenet: allows anyone who connects to the network to read and post articles on a variety of subjects.  User’s News Network: allows anyone who connects to the network to read and post articles on a variety of subjects.  Virtual private network (VPN): a connection that uses public networks and their protocols to send data in a way that protects the data as well as a private network would, but at a lower cost.  Web: a subset of the computers on the Internet that are connected to one another in a specific way that makes them and their contents easily accessible to each other.  Web browser: a software interface that lets users read (or browse) HTML documents and move from one HTML document to another through text formatted with hypertext link tags in each file.  Web browser software: software that sends requests for Web page files to other computers, which are called Web servers.  Web client computers: run software called Web client software or Web browser software.  Web client software: software that sends requests for Web page files to other computers, which are called Web servers.  Web server software: receives requests from many different Web clients and responds by sending files back to those Web client computers.  Web servers: runs software called Web server software.  Wide area networks (WANs): networks of computers that are connected over greater distances.  Wi-Fi: the most common wireless connection technology for use on LANs.  Wireless access point (WAP):a device that transmits network packets between Wi-Fi-equipped computers and other devices that are within its range.  Wireless Ethernet: the most common wireless connection technology for use on LANs.  World Wide Web: subset of the computers on the Internet that are connected to one another in a specific way that makes them and their contents easily accessible to each other.  World Wide Web Consortium (W3C): a not-for-profit group that maintains standards for the Web.  Worldwide Interoperability for Microwave Access (WiMAX): a 4G wireless technology that offers download speeds up to 14 Mbps and upload speeds up to 8 Mbps.  XML parsers: programs that can format an XML file so it can appear on the screen of a computer, a tablet device, a smartphone, an Internet capable mobile phone, or some other device.  XML schemas: common standards for XML tags that are available for a number of industries.  XML vocabulary: a set of XML tag definitions.  ZigBee: a short-range wireless technology that was developed to be low cost and run on very little power. Instructor Manual for Electronic Commerce Gary P. Schneider 9781305867819

Document Details

Related Documents

Close

Send listing report

highlight_off

You already reported this listing

The report is private and won't be shared with the owner

rotate_right
Close
rotate_right
Close

Send Message

image
Close

My favorites

image
Close

Application Form

image
Notifications visibility rotate_right Clear all Close close
image
image
arrow_left
arrow_right