E-commerce
E-commerce
E-commerce
UNIT III
eCommerce architecture is a framework of an online ecommerce platform with all
the design and other technical details and components that help to sell and buy
goods. The term embraces everything, from the front-end user interface to the
back-end server infrastructure.
The architecture model in ecommerce is the way all the technical components and
structures are organized to provide the needed layers, subsystems, and components
of an ecommerce platform and interact between them.
Layers
User Interface (UI) Layer
Presentation Layer
Application Layer
Middleware Layer
Data Layer
Security Layer
Infrastructure Layer
Analytics and Reporting Layer
External Interfaces
Services
1. Application service
Composed of existing and future application
C to B
B to B
Intra organization
2. Brokerage services
This is used to represent an intermediary which provides services between
customer and information provider and give some constraints such as low
price, fast service, max profit.
This adds value to the information received.
Can support data management and transaction services.
This uses software agent to do the work.
3. Interface support layer
This will provide interface of e commerce applications such as interactive
catalogs.
And the customized interface to consumer applications such as home shopping.
Directories on the other hand operate behind the scenes and attempt to organize
the huge amount of information and transactions generated to e commerce.
Web Security deals with the security of data over the internet/network or web or
while it is being transferred over the internet. Web security is crucial for protecting
web applications, websites, and the underlying servers from malicious attacks and
unauthorized access.
1. Encryption
TLS/SSL: Secure Sockets Layer (SSL) and its successor, Transport Layer
Security (TLS), encrypt data transferred between a user’s browser and a website
server. This is crucial for preventing third parties from intercepting sensitive
information like login credentials or credit card details.
HTTPS: Websites use HTTPS (the secure version of HTTP) to protect data
integrity and confidentiality. HTTPS also helps verify that users are connecting to
the intended website and not a malicious copy.
2. Authentication & Authorization
Authentication: Verifies a user’s identity (e.g., through usernames, passwords,
biometrics, or two-factor authentication).
Authorization: Controls what authenticated users can access and modify. For
instance, role-based access control (RBAC) ensures users only access data and
functionalities necessary for their roles.
3. Data Protection
Data Encryption at Rest: Sensitive data stored on servers should be encrypted,
minimizing risks if servers are compromised.
Data Masking and Hashing: Personal information can be masked or hashed,
protecting sensitive data from unauthorized access while still allowing the site to
function properly.
4. Application Security (OWASP)
Input Validation and Sanitization: Prevents attacks by ensuring that all input
data is verified and filtered before processing.
SQL Injection and Cross-Site Scripting (XSS): Two common vulnerabilities
where attackers manipulate database queries or inject malicious scripts into web
pages. Web applications need secure coding practices to mitigate these risks.
Cross-Site Request Forgery (CSRF): An attacker can trick users into performing
unwanted actions on authenticated websites. CSRF tokens, unique to each session,
help guard against this.
5. Network Security
Firewalls and Intrusion Detection Systems (IDS): Firewalls control incoming
and outgoing network traffic based on security rules. IDS tools monitor traffic to
detect and respond to suspicious activity.
Content Security Policy (CSP): A CSP restricts the sources from which a web
page can load content, helping to prevent XSS attacks.
6. User Education and Awareness
Phishing Awareness: Users should be trained to recognize phishing attempts,
which often aim to steal login credentials or distribute malware.
Social Engineering Awareness: Users should be cautious about sharing personal
information, which can be used by attackers to gain unauthorized access.
7. Security Updates and Patching
Regular Updates: Keeping software, plugins, and systems up to date is crucial to
protect against newly discovered vulnerabilities.
Automated Vulnerability Scanning: Tools can automatically scan web
applications and servers for known security issues and flag outdated or insecure
components.
8. Top Web Security Threats
Cross-site scripting (XSS)
SQL Injection
Phishing
Ransomware
Code Injection
Viruses and worms
Spyware
Denial of Service
UNIT V
E-Commerce Catalogs
E-commerce catalogs are the digital equivalents of traditional product catalogs,
displaying all products available on an e-commerce platform in an organized,
accessible format. These catalogs are essential for online stores, as they help
streamline browsing, searching, and purchasing by highlighting product details,
prices, images, and specifications.
1. Product Listings:
a. Each listing typically includes product names, descriptions, prices, and
images. This section should provide all necessary information to help
customers make informed decisions.
2. Product Categories:
a. Categorization is essential for easy navigation. Categories may be
organized by product type, brand, price range, etc., helping users find what
they are looking for without hassle.
3. Search Functionality:
a. A search bar and filters (like color, size, price, etc.) allow users to quickly
find products, improving their shopping experience.
4. Detailed Product Descriptions:
a. These include specifications, dimensions, materials, compatibility, and
other details. Accurate descriptions minimize returns and enhance customer
trust.
5. High-Quality Images and Videos:
a. Images are often the first point of engagement. Multiple views, zoom
features, or even 360-degree videos can provide a more realistic view of the
product.
6. Customer Reviews and Ratings:
a. Reviews offer social proof and can significantly impact purchasing
decisions. Ratings allow users to gauge product quality quickly.
7. Inventory Management:
a. Real-time inventory tracking ensures that only available products are
displayed, reducing instances of canceled orders due to stockouts.
8. Pricing Information:
a. Along with the price, some catalogs display discounts, installment options,
or price comparisons, giving customers a better sense of value.
1. Single-Vendor Catalogs:
a. These are created by businesses that own and manage their inventory. They
are simpler, focusing on the business’s own products.
2. Multi-Vendor Catalogs:
a. Used by marketplaces like Amazon and eBay, these catalogs are extensive,
requiring tools to manage product listings from multiple vendors,
preventing duplication, and ensuring consistency.
3. Service-Based Catalogs:
a. For businesses offering services rather than physical products, the catalog
may list services with descriptions, prices, and booking options.
Information filtering
1. Data Portability: Allows consumers to move their data between service providers
easily, giving them flexibility and freedom to switch platforms while retaining
control over their personal information.
2. Privacy and Security: Ensures that data is protected from unauthorized access.
Compliance with regulations like GDPR or CCPA is essential, ensuring
consumers’ rights to access, delete, or correct their data.
3. Consent Management: Provides users with transparency and control over how
their data is shared or used, often requiring explicit consent before third parties can
access it.
4. Standardization: Uses standard data formats and APIs to ensure interoperability
across platforms. In finance, for instance, the Open Banking API standards in the
UK and Europe enable CDIs for secure data sharing across different financial
institutions.
5. User Interface (UI): A consumer-friendly UI within a CDI allows users to
manage their data preferences easily. This UI can provide insights into what data
is being shared, for what purposes, and with whom.
6. Data Aggregation: Some CDIs can aggregate data from multiple sources,
allowing consumers to view a comprehensive profile of their data (like
consolidated financial records or medical history) across various service providers.
Software agents
Software agents are autonomous programs that perform tasks on behalf of a user
or other program, often with some level of decision-making and adaptability. They
are designed to handle specific tasks—sometimes in complex environments—by
gathering information, processing data, and taking actions that align with a set of
goals or parameters.
1. Simple Agents: These follow straightforward rules to accomplish a task. They are
typically programmed to react to specific inputs with specific outputs, like
automated customer support agents that respond to keywords.
2. Intelligent Agents: These incorporate artificial intelligence (AI) techniques to
analyze, learn from, and respond to their environment. Examples include
recommendation engines on streaming services or virtual personal assistants like
Siri or Alexa.
3. Mobile Agents: These agents can move across different networked environments.
They carry their own state and can execute tasks on different machines within a
network, such as a web crawler navigating various websites to index data.
4. Multi-Agent Systems (MAS): These involve multiple agents that communicate
and cooperate with each other to achieve a common goal or solve complex
problems. They are commonly used in fields like robotics, traffic management,
and simulations.
5. Collaborative Agents: These work alongside humans or other agents to assist in
decision-making. For instance, in business software, they might help teams
coordinate tasks or track project milestones.
Characteristics
1. Autonomy
Agents sense and respond to changes in their environment. This allows them to
adapt their behavior in real time, responding to new data, altered conditions, or
specific events.
3. Proactivity
Rather than simply reacting, agents can take the initiative, anticipating actions that
might benefit their goals and performing tasks that push the system toward a
desirable state.
4. Social Ability
6. Mobility
Some agents, known as mobile agents, can move across different networked
environments, carrying their state and code along. This ability allows them to
execute tasks on multiple systems within a network.
7. Goal-Oriented
Agents are driven by a set of objectives or goals that guide their behavior and
decision-making processes, allowing them to focus on achieving specific
outcomes efficiently.
8. Persistence
Software agents run continuously over a period, sometimes indefinitely, until their
goals are achieved, or they are terminated. This is different from regular programs,
which usually execute a specific function and then exit.
Agents can coordinate actions with other agents to reach shared goals, especially
in MAS. They might use strategies such as cooperation, negotiation, or
competition, depending on their goals and design.
Properties
Machine Learning Algorithms: Agents use ML to learn patterns from data and
adapt their actions based on experience. This includes supervised, unsupervised,
and reinforcement learning methods.
Natural Language Processing (NLP): For agents that interact with humans, NLP
allows them to understand and generate human language, enabling effective
communication in chatbots or virtual assistants.
Computer Vision: Vision-based agents, such as robots, use computer vision to
interpret visual data, recognize objects, and navigate spaces.
Knowledge Representation and Reasoning: Technologies like knowledge
graphs and ontologies allow agents to represent and infer the latest information,
making decisions based on stored knowledge.
Many agents in physical environments rely on sensor data from IoT devices to
perceive their environment. IoT platforms like Thing Speak and AWS IoT Core
enable real-time data collection, analysis, and responses from agents.
Agents need data storage solutions to maintain states, learn from historical data,
and retrieve relevant information. Databases, both relational (SQL) and non-
relational (NoSQL, such as MongoDB and Cassandra), are used for structured
data, while distributed file systems (e.g., HDFS) and data lakes (e.g., Amazon S3)
are used for large datasets.
Knowledge Bases and Ontology-based Systems: These technologies store
structured knowledge about concepts, relationships, and rules, which agents can
use to make informed decisions.
Mobile Code Platforms: Mobile agents, which move across different systems,
rely on technologies that facilitate secure code mobility, like Java’s RMI (Remote
Method Invocation) and Aglets.
Security Protocols for Mobility: To ensure secure migration and execution,
mobile agents use secure authentication, encryption, and sandboxing techniques to
protect against unauthorized actions.
8. Security and Privacy Technologies
Digital token electronic payment systems are platforms that facilitate transactions
using digital tokens, a type of cryptocurrency or electronic representation of value.
These systems enable secure, quick, and often decentralized payments and
exchanges without relying on traditional banking or centralized systems. Here is a
breakdown of key components and concepts in these systems:
1. Digital Tokens
Role in Digital Tokens: EPS enable users to send, receive, and exchange digital
tokens. These systems are typically built on blockchain networks like Ethereum,
Solana, or Binance Smart Chain.
Examples: PayPal (for certain cryptocurrencies), Cash App, and decentralized
exchanges like Uniswap or Pancake Swap.
Mechanisms:
o Peer-to-Peer (P2P): Direct transfers between users without intermediaries.
o Smart Contracts: Automated protocols that execute, verify, and enforce
contract terms, often used in decentralized finance (DeFi) applications.
3. Advantages of Digital Token EPS
4. Security Considerations
5. Challenges
Scalability: Blockchain networks may face scaling issues, especially during high
demand.
Volatility: Token values can be volatile, though stablecoins are an exception.
Security Risks: Hacking, phishing, and smart contract vulnerabilities remain
challenges.
Credit Card Based Electronic Payment Systems
Components
Challenges
Fraud and Security Risks: Despite security measures, credit card fraud remains a
concern, and consumers may be vulnerable to identity theft.
Fees: Merchants often bear transaction fees, which can be a burden for small
businesses.
Disputes and Chargebacks: Customers can dispute transactions, leading to
chargebacks that can impact a merchant's revenue.
Key Components
1. Payment Processors: Companies that handle the transaction between the buyer,
seller, and banks, ensuring that payments are completed securely.
2. Payment Gateways: Technology that captures and transfers payment data from
the customer to the merchant's bank.
3. Merchant Accounts: Specialized bank accounts that allow businesses to accept
credit and debit card payments.
1. Credit and Debit Cards: Widely used for online and in-store purchases. They
involve a bank issuing a card to the user that can be used for transactions.
2. E-Wallets: Digital wallets (like PayPal, Apple Pay, Google Pay) that store users'
payment information and allow for quick transactions without the need to enter
card details.
3. Bank Transfers: Direct transfer of funds from one bank account to another, often
used for larger transactions or bill payments.
4. Cryptocurrencies: Digital currencies (like Bitcoin, Ethereum) that use blockchain
technology for secure transactions. They can be used for online purchases or
investment.
5. Mobile Payments: Transactions made through mobile devices, often using apps
that allow users to pay via QR codes or NFC technology.
6. Buy Now, Pay Later Services: Financing options that allow customers to make
purchases and pay for them in installments over time (e.g., After pay, Klarna).
Advantages
Disadvantages
Implementation of EDI:
EDI Software: Solutions that facilitate the creation, transmission, and receipt of
EDI documents.
Trading Partner Agreements: Contracts that define the EDI processes between
business partners.
Compliance with Standards: Adhering to the relevant EDI standards for
formatting and transmission.
Legal Issues
Security Issues
1. Data Breaches: EDI systems are susceptible to cyberattacks that can compromise
sensitive information. Organizations must implement robust security measures to
protect data in transit and at rest.
2. Encryption: To safeguard data during transmission, businesses should use
encryption protocols (such as SSL/TLS) to ensure that sensitive information
cannot be intercepted or read by unauthorized parties.
3. Access Controls: Strict access controls must be in place to limit who can access
EDI systems and sensitive data. This may include user authentication, role-based
access controls, and regular audits of access logs.
4. Incident Response Plans: Organizations should have a comprehensive incident
response plan in place to quickly address and mitigate the effects of any security
breaches or data loss incidents.
Privacy Issues
Core Features
Magento: Known for its flexibility and scalability, Magento is suitable for both
small businesses and large enterprises.
Shopify: A hosted solution ideal for businesses that want an easy-to-use platform
with a variety of themes and apps.
WooCommerce: A WordPress plugin that turns a WordPress site into a fully
functional e-commerce store, popular for its simplicity and flexibility.
Presta Shop: An open-source platform with a wide range of features and a large
community.
BigCommerce: A SaaS platform that offers robust features with easy
customization and scalability.
E-Commerce and Media Convergence
E-commerce and media convergence refer to the integration of different media platforms
(such as social media, traditional media, and digital content) with e-commerce, creating a
seamless experience where consumers can engage with content and make purchases
simultaneously. This convergence has transformed businesses market products and
services, consumers shop, and content is monetized.
1. Shoppable Content
2. Social Commerce
3. Content-Driven Commerce
6. Omni-Channel Experiences
Challenges
•These Multimedia storage servers are large information warehouses capable of handling
various content, ranging from books, newspapers, advertisement catalogs, movies,
games, & X-ray images.
•These servers, deriving their name because they serve information upon request, must
handle large-scale distribution, guarantee security, & complete reliability
•A multimedia server is a hardware & software combination that converts raw data into
usable information & then dishes out.
•It captures, processes, manages, & delivers text, images, audio & video.
Description: Native or hybrid apps specifically designed for mobile devices like
smartphones and tablets.
Examples: Amazon app, Alibaba app, and Etsy app.
Features:
o Push notifications for promotions and order updates.
o One-click purchasing options.
o Mobile-specific payment methods like Apple Pay or Google Pay.
o Augmented reality (AR) features for virtual try-ons or product placement.
1.4 Marketplaces
Integration with multiple secure payment gateways, support for various currencies,
and ensuring PCI compliance are vital for consumer trust.
Incorporating user-generated content such as reviews and ratings to build trust and
assist other consumers in their purchasing decisions.
Features for real-time order tracking, easy access to customer service, and
handling returns and exchanges efficiently.
Convenience: Shop anytime, anywhere with the flexibility of mobile and web
applications.
Variety: Access a vast selection of products from multiple sellers in one platform.
Personalization: Enjoy tailored shopping experiences based on browsing history,
preferences, and behavior.
Security: Benefit from secure transactions and buyer protection policies that
increase trust in online shopping.
Efficiency: Save time with advanced search features, personalized
recommendations, and fast checkout options.
Security and Privacy: Protecting consumer data and ensuring secure transactions
are top priorities.
User Experience: Balancing feature richness with simplicity to avoid
overwhelming users, particularly on mobile devices.
Integration with Other Systems: Ensuring seamless integration with inventory
management, payment processing, and customer support systems.
Scalability: The ability to handle large volumes of users and transactions,
particularly during peak shopping times like holidays.
E- Commerce Organization Applications.
1. E-commerce Platforms
Google Analytics, Ahrefs, SEMrush, Moz: Provide tools to analyze site traffic,
keyword performance, and customer behavior, aiding in the optimization of online
content and advertisements.
Akeneo, Pimcore, Salsify: Manage product data to maintain accuracy across all
digital touchpoints, improving consistency and quality of product listings.
SAP ERP, Microsoft Dynamics 365, Oracle ERP: Integrate various business
functions like finance, HR, and inventory to ensure streamlined workflows and
real-time data access.
Tableau, Google Data Studio, Power BI: Offer insights into business
performance and customer behavior through data visualization and reporting.
In e-commerce, various internet and digital marketing terminologies are essential for
understanding online business operations, customer interactions, and strategies. Here are some
key terms:
Techniques used to improve a website's ranking on search engines (e.g., Google) to drive
organic (non-paid) traffic. SEO includes keyword optimization, content creation, and
technical improvements to the website.
The amount advertisers pay for each click in a pay-per-click (PPC) ad campaign. It
measures the cost-effectiveness of advertising campaigns by analyzing the cost of each
user click.
3. Conversion Rate
The percentage of users who take a desired action (e.g., purchasing a product, signing up
for a newsletter) compared to the total number of visitors. It's a key metric for gauging
the effectiveness of marketing efforts.
The percentage of users who add items to their shopping cart but leave the site without
completing the purchase. High cart abandonment rates can highlight issues in the
checkout process.
5. Bounce Rate
The percentage of users who visit a webpage and leave without interacting with other
pages. A high bounce rate may indicate issues with content relevance or page load speed.
6. A/B Testing
A method of comparing two versions of a web page, app, or ad to see which one
performs better. This helps businesses optimize their sites and marketing campaigns
based on real user data.
7. Affiliate Marketing
An estimate of the total revenue a business can expect from a customer over the course of
their relationship. CLV helps businesses understand long-term profitability.
9. Remarketing / Retargeting
Techniques used to show targeted ads to users who have previously visited a site but
didn't complete a conversion. These ads appear on other websites, aiming to re-engage
and convert potential customers.
Refers to the overall experience of a user when interacting with a website or app. Good
UX design focuses on making navigation and interactions smooth, intuitive, and
enjoyable.
A strategy that integrates various channels (online, social media, email, in-store) to
provide a seamless customer experience. It allows customers to interact with a brand
consistently across different platforms.
13. CAC (Customer Acquisition Cost)
The total cost spent on acquiring a new customer. It includes advertising, marketing, and
sales costs and helps businesses measure the efficiency of their customer acquisition
strategies.
A service where sellers store their products in Amazon’s warehouses, and Amazon
manages the storage, packaging, and shipping. It’s popular among e-commerce
businesses looking for streamlined logistics.
A service that securely authorizes and processes online transactions for e-commerce sites,
such as PayPal, Stripe, or Square.
A security protocol for establishing encrypted links between a web server and a browser.
In e-commerce, SSL ensures customer data security during transactions.
NSFNET
The National Science Foundation Network (NSFNET) was a program that connected academic
and research institutions across the United States from 1985 to 1995. It was a key link between
ARPANET and the early public internet, and helped to develop the technical underpinnings of
modern networks.
NSFNET was a program to promote advanced research and education networking in the United
States. It was a crucial link between ARPANET and the commercial networks that served as the
early public internet's foundation.
NSFNET (National Science Foundation Network) was a major part of the early Internet
architecture, established in the late 1980s to promote high-speed communication between
research institutions. It served as a backbone that connected various regional and university
networks across the United States. Here is an overview of its architecture and components:
1. Backbone Network
Function: The core of NSFNET was a high-speed national backbone network, designed
to handle vast amounts of data traffic. It connected regional networks to each other and
provided access to supercomputing centers.
Speed: Initially, the NSFNET backbone operated at 56 Kbps, but later upgrades
increased its speed to T1 (1.5 Mbps) and eventually to T3 (45 Mbps) by the early 1990s.
2. Regional Networks
Function: NSFNET connected several regional networks that served as hubs for
universities, research institutions, and smaller networks. Each regional network managed
traffic within its area and routed data to the national backbone.
Key Regions: Some key regional networks included SURAnet, BARRNet, and MIDnet,
which served different geographic regions of the U.S.
3. Supercomputer Centers
Function: The NOC was responsible for monitoring the NSFNET backbone to ensure it
ran smoothly, handled traffic efficiently, and responded to any operational issues.
Management: Merit Network Inc., in partnership with IBM and MCI, managed the NOC
and the day-to-day operations of NSFNET.
6. International Gateways
Function: NSFNET also supported connections to networks outside the U.S., facilitating
global scientific collaboration. These international gateways allowed researchers from
other countries to access NSFNET and exchange data with U.S. institutions.
Function: In the early 1990s, NSFNET played a key role in transitioning to a more
commercialized Internet infrastructure. As private ISPs began to take over, NSFNET was
decommissioned in 1995, giving way to a decentralized, commercial Internet.
NSFNET Components:
1. Routers:
a. Routers played a critical role in the NSFNET architecture by directing data
between the backbone, regional networks, and institutional networks.
b. They performed packet switching and forwarding based on IP addresses, ensuring
data moved across the network efficiently.
c. Early routers were primarily from companies like Cisco and Proteon.
2. Backbone Nodes:
a. These were the key interconnection points in the backbone network, located at
supercomputer centers and major institutions.
b. Each node hosted multiple routers and other networking equipment to ensure
high-speed data transmission.
c. The backbone nodes were strategically distributed across the U.S., providing
robust and reliable network coverage.
3. Leased Communication Lines:
a. The backbone and regional networks were interconnected using leased lines from
telecommunications providers.
b. These lines were initially slow (56 Kbps) but were upgraded to T1 and later T3
connections to handle increasing traffic.
c. The leased lines ensured reliable, dedicated communication channels between
nodes and across regions.
4. Supercomputing Centers:
a. NSFNET connected various supercomputing centers around the U.S., which were
used for advanced research projects.
b. These centers included facilities like the National Center for Supercomputing
Applications (NCSA) at the University of Illinois.
5. Network Operations Center (NOC):
a. The NOC was responsible for monitoring and maintaining the NSFNET
infrastructure.
b. It ensured the network's stability, identified faults, and coordinated
troubleshooting efforts across the network.
6. Domain Name System (DNS):
a. NSFNET used the DNS to translate human-readable domain names into IP
addresses, allowing users to access resources on the network.
b. This system played a key role in making NSFNET easier to use and navigate.
Evolution of NSFNET:
NSFNET began as a research network but eventually evolved into the backbone of the
early internet.
In 1995, NSFNET was officially decommissioned, and its infrastructure was privatized,
leading to the commercial internet we know today.
National Research and Education Network
A NREN specializes, on a national level, in fulfilling the data communications, networking, application
and e-services needs of the host country’s research and education community. NRENs are usually
distinguished by their support of a very-high speed network both at the core and access levels with the
possibility of offering dedicated channels for individual research projects.
Despite the development and proliferation of commercial networks and internet service providers,
NRENs still continue to be launched all over the world. This is due to the fact that the Research and
Education communities often have specific needs in terms of high bandwidth, quality of service, security,
reliability, and availability, that commercial providers can only achieve by means of high investment
levels that are not justified by their commercial business models.
1. High-Speed Connectivity
NRENs typically offer ultra-high-speed connections, often much faster than commercial ISPs.
This connectivity is essential for handling large data transfers associated with scientific research,
simulations, and other data-intensive academic applications.
NRENs enable researchers, educators, and students from different institutions to collaborate
seamlessly. They support joint projects by providing access to cloud resources, shared research
tools, and digital libraries.
NRENs offer specialized services, like dedicated high-performance computing (HPC) resources,
virtual learning environments, digital repositories, identity and access management, and security
protocols tailored to academic needs.
Many NRENs interconnect with other national and regional research networks around the world,
fostering global academic collaboration. Networks like GÉANT in Europe, Internet2 in the U.S.,
and Red CLARA in Latin America are examples of regional NRENs that facilitate cross-border
research partnerships.
5. Funding and Governance
NRENs are often publicly funded, with support from governments, educational institutions, and
research agencies. Governance usually involves representatives from the member institutions,
ensuring that the network’s services align with the needs of its users.
NRENs play a crucial role in advancing research by ensuring that institutions have the digital
infrastructure and support necessary for academic and scientific progress.
Internet Governance
Internet governance refers to the systems, policies, and practices that guide how the internet is
managed, used, and regulated worldwide. It encompasses everything from managing domain
names to setting privacy standards, ensuring data security, and balancing the interests of various
stakeholders, including governments, private companies, non-profits, and individual users.
ICANN (Internet Corporation for Assigned Names and Numbers): This non-profit
organization oversees domain name allocations and IP address assignments, ensuring
every device on the internet has a unique identifier. Its policies impact access,
competition, and freedom of expression online.
IETF (Internet Engineering Task Force) and W3C (World Wide Web Consortium):
These organizations establish technical standards to ensure compatibility and
interoperability across devices and networks. This includes protocols like HTTP, TCP/IP,
and web standards such as HTML.
3. Cybersecurity
Governance also includes creating frameworks for content regulation, balancing freedom
of expression with concerns over harmful content. Intellectual property laws, including
those overseen by the World Intellectual Property Organization (WIPO), protect
copyrights and patents on digital platforms.
5. Data Privacy and User Rights
With the massive amount of personal data online, privacy laws like GDPR (General
Data Protection Regulation) in the EU are essential to internet governance. Such laws
aim to protect user privacy and establish user rights over their data.
6. Multistakeholder Model
Jurisdictional Issues: Different laws across countries create conflicts regarding what
content is permissible and who controls user data.
Censorship vs. Freedom of Speech: Balancing national security and freedom of
expression can lead to censorship concerns.
Power Dynamics: The dominance of large technology companies raises questions about
fair competition and corporate influence on policy.
Global vs. National Interests: Countries often have different priorities (e.g., censorship,
user privacy), making it challenging to establish globally consistent policies.
An overview of Internet Applications
Internet applications are programs and services that use the internet to provide users with various
forms of communication, information access, and interaction. They enable activities such as
browsing websites, streaming media, social networking, and online shopping. Here's an overview
of major types of internet applications and how they work:
Examples: Smart home apps, wearable health monitors, industrial IoT systems
Functionality: IoT apps allow remote control and monitoring of connected devices, like
smart thermostats, lights, and health devices.
Protocols: MQTT (Message Queuing Telemetry Transport), CoAP (Constrained
Application Protocol), and HTTPS.
Front-end: User interface elements, often developed using HTML, CSS, and JavaScript
frameworks.
Back-end: Servers, databases, and application logic, often developed in languages like
Python, Java, or PHP.
APIs: Facilitate integration with third-party services, allowing different applications to
share data and functionality.
Business of Internet Commercialization: Telco/Cable/OnIine companies
1. Telecommunications Companies
Core Business: Telcos initially focused on telephony but have expanded into internet
services, mobile data, and broadband.
Infrastructure: They build and maintain extensive fiber optic and cellular networks,
including 4G, 5G, and eventually, 6G infrastructure.
Revenue Models: Primarily subscription-based for mobile and broadband services.
Additional revenue streams include leasing infrastructure and bundling internet with
other telecom services like TV and VoIP.
Challenges:
o High capital expenditures (CAPEX) for infrastructure development.
o Regulatory requirements, particularly regarding net neutrality and data privacy.
o Competition from tech companies entering the telecommunications space (e.g.,
Google Fiber, SpaceX’s Starlink).
Opportunities:
o Emerging technologies like 5G enable low-latency services, opening doors to new
applications such as IoT, autonomous vehicles, and smart cities.
o Digital transformation of enterprises, where telcos provide critical infrastructure
for cloud computing and edge computing.
2. Cable Providers
Core Business: Traditionally focused on TV services but now also deliver internet and
telephone services, often through coaxial and fiber networks.
Revenue Models: Subscription packages bundling cable TV, broadband, and sometimes
phone services.
Challenges:
o "Cord-cutting," where consumers shift from cable TV to online streaming
services.
o Infrastructure limitations, especially in rural areas where fiber installation is
challenging.
o Pressure from streaming companies that bypass cable for direct-to-consumer
models.
Opportunities:
o Upgrading to hybrid fiber-coaxial (HFC) networks and fiber-to-the-home (FTTH)
for faster internet services.
o Diversifying offerings with on-demand and streaming options to retain customers.
o Partnering with streaming services to integrate content into cable packages.
3. Online Companies
Core Business: Companies like Google, Facebook (Meta), Amazon, and Netflix focus on
delivering digital content, e-commerce, social media, and cloud services, leveraging the
internet infrastructure established by telcos and cable providers.
Revenue Models:
o Ad-based models (e.g., Google, Facebook).
o Subscription-based models (e.g., Netflix, Amazon Prime).
o Data monetization and targeted advertising based on user behavior and
preferences.
Challenges:
o Increasing scrutiny on data privacy, anti-trust concerns, and content moderation.
o Balancing bandwidth use with infrastructure costs (e.g., Netflix consuming high
bandwidth).
o Dependence on the infrastructure controlled by telcos and cable companies,
potentially leading to conflicts over network neutrality.
Opportunities:
o Expanding into cloud computing and AI-driven services (e.g., Google Cloud,
Amazon Web Services).
o Investing in proprietary infrastructure (e.g., Google’s subsea cables, Facebook’s
data centers) to reduce dependency on telcos.
o Developing more personalized and immersive content, such as VR/AR
experiences, social media integrations, and e-commerce enhancements.
Joint Ventures and Partnerships: Telcos and cable companies often partner with online
platforms to offer exclusive content (e.g., telcos partnering with Netflix or Disney+).
Network Neutrality: This remains a pivotal issue as it determines whether online
companies can pay for preferential treatment on networks owned by telcos and cable
providers.
5G and Edge Computing: Online companies increasingly rely on edge computing and
5G from telcos to improve the latency of services, especially for IoT and immersive
media.
National Independent ISPs
National Independent Internet Service Providers (ISPs) are internet providers that operate
independently, rather than as part of large telecommunications corporations. These ISPs often
focus on local or regional areas, prioritizing customer service, competitive pricing, and diverse
service offerings. Independent ISPs can play a vital role in providing internet access in
underserved areas, including rural and remote regions where larger ISPs might not have
sufficient coverage.
Internet Service Providers (ISPs) are categorized into different levels, often referred to as tiers,
based on their role in the internet infrastructure, the scope of their operations, and how they
interconnect with other networks. Here are the different levels of ISPs:
1. Tier 1 ISPs:
Definition: Tier 1 ISPs are the backbone of the internet. They own and operate the largest
networks with global coverage and connect directly to other Tier 1 ISPs without needing
to pay for internet transit, thanks to mutual peering agreements.
Role: They provide connectivity to Tier 2 and Tier 3 ISPs, large organizations, and
sometimes direct end-users.
Peering Relationships: Tier 1 ISPs interconnect with each other through peering, where
they exchange traffic freely.
Network Ownership: They typically own or lease large sections of the internet backbone
infrastructure, including submarine cables and high-capacity fiber networks.
Examples: AT&T, CenturyLink, NTT Communications, TeliaSonera, and Tata
Communications.
2. Tier 2 ISPs:
Definition: Tier 2 ISPs buy internet transit from Tier 1 ISPs but also engage in peering
agreements with other ISPs, often including Tier 2s or regional networks, to reduce
transit costs.
Role: They provide connectivity to Tier 3 ISPs, businesses, and smaller organizations.
They usually have a regional or national presence rather than global.
Peering and Transit: Tier 2 ISPs try to peer with as many networks as possible to limit
the amount of traffic they need to send through paid transit to Tier 1 ISPs.
Examples: Comcast, Vodafone, Cox Communications, and Windstream.
3. Tier 3 ISPs:
Definition: Tier 3 ISPs primarily purchase internet transit from Tier 1 or Tier 2 ISPs to
deliver services to local end-users (individuals, small businesses, etc.).
Role: These ISPs provide the "last mile" of connectivity, delivering internet access to
homes, offices, and smaller businesses.
Limited Peering: Tier 3 ISPs typically don't engage in peering agreements and rely on
upstream providers for global connectivity.
Network Size: Their network infrastructure is often localized, focusing on specific cities,
regions, or neighborhoods.
Examples: Local and regional ISPs like Sonic (California), Frontier, and small municipal
ISPs.