Francesca Mazzola : The new client, Cloud Computing Model, Internet Protocol Stack, Who Governs the Internet

  • The new client: the mobile platform

The fastest growing of e-commerce came from the commerce in the United states → due to new technologies and services for e-commerce:

The mobile platform:

tablets;

smatphone;

ultra-lightweight laptops → using new access to internet, such as wi-fi and cell-phones service.

The mobile platform has profound implications for e-commerce: how, where and when consumers buy and shop.

  • Cloud Computing Model

It is the next step after the client / server model.

The cloud computing refers to a model of computing in which firms and individuals obtain computing power and software applications over the Internet.

In the cloud computing model software is provided as a service over the Internet.

Cloud computing has different users in e-commerce. Primary it reduces the cost of building and operating web sites.

Utility:

-for individuals: cloud computing means you no longer need a powerful laptop to engage in e-commerce or other activities, it is possible to use much less-expensive PCs or smartphones.

-for corporations: again, cloud computing provides the possibility of reducing hardware and software costs.

Risks of cloud computing: firms become totally dependent on their cloud service providers.

  • Internet Protocol Stack

The Internet Protocol stack is available to all internet users. The main important Internet protocols are:

 

Hyper Text Transfer Protocol (HTTP) = it’s the Internet protocol used for the transferring web pages (e-mail).

Simple Mail Transfer Protocol (SMTP) = it’s used to send mail to a server.

Post Office Protocol 3 (POP3) = it’s a protocol used by the client to retrieve mail from an Internet server.

Internet Message Access Protocol (IMAP) = more recent than POP3, it is an e-mail protocol that allows users to search, organize and filter their mail prior to downloading it from the server.

File Transfer Protocol (FTP) = one of the original Internet services. Part of the TCP/IP protocol that permits users to transfer files from the server to their client computer and vice versa.

Secure Sockets Layer (SSL) in addition to the Transport Layer Security (TLS) are protocols that secure communications between the client and the server.

Utility programs:

Packet Internet Groper (PING) = it’s a program that allows you to check the status of the connection between your client and the server.

TRACERT (or TRACEROUTE on Unix based systems, e.g., Mac OSX) = it provides the path followed by a message between a client to a connected remote computer on the Internet.

 

 

  • Internet Today

Today internet know a rapid growth of his utility worldwide. The structure model of internet is composed by four layers:

 

  1. network technology substrate layer = layer of internet technology that is composed of telecommunications networks and protocols.
  2. transport services and representation standard layer = layer of internet architecture that houses the TCP7IP protocol.
  3. application layer = layer of internet architecture that contains client applications.
  4. middleware services layer = is the “glue” that ties the applications to the communications networks and includes such services as security, authentication, addresses and storage repositories.

The Internet has a multi-tiered open network architecture featuring multiple national backbones (that is the high speed connection of routers), regional hubs, campus area networks and local client computers.

Internet Service Provider (ISP) = firm that provides the lowest level of service in the multi-tiered Internet architecture by leasing internet access to home owners, small businesses and some large institutions.

 

  • Who governs the Internet?

Internet runs over private and public telecommunications facilities that are themselves governed by laws. There is no one single governing organization that control activity on the Internet. The organizations that influence the system and monitor its operations follow the laws of the sovereign nation states in which they operates.

Leave a comment