SEOMining SEOMining


Building Blocks   «Prev  Next »
Lesson 2 Foundation technologies
Objective Identify the network and security technologies required for eBusiness.

Foundation Technologies

Any eBusiness solution, whether B2B or B2C, must be based on a solid technology foundation. Network technologies, data, and applications form the base of the eBusiness pyramid. using-technology
As we discussed in a previous module with the issue of future proofing, the speed at which new technologies emerge in this area makes technology decisions obsolete in a very short time, regardless of how good they are. For this reason, it is important to utilize a standards-based technology rather than proprietary systems that could result in a technology dead-end, from which it is difficult and costly to recover. Where possible, it is often better for an organization to acquire technology and customize it than to develop it from scratch.
As we discussed in an earlier lesson, these technologies may be provided internally (in-house) or by a technology partner (outsourced).

Foundation technologies

Foundation technologies are focused on providing a secure, compatible, and manageable infrastructure and interface for the applications and data that make up the eBusiness solution. These technologies not only form the fundamental building blocks of the solution, but also provide the means by which the rest of the components interact.
Let's briefly look at the two key subsystems of this foundation layer that must work in harmony to support the solution:

Networks

The network is the base technology; its purpose is to enable efficient and reliable communication between host-end systems and between host and client-end systems. The network can be subdivided into the following components:
Text 1
1) network-structure 1
Network Structure 2
2) Network Structure 2
Network Structure 3
3) Network Structure 3
Network Structure 4
4) Network Structure 4
Network Structure 5
5) Network Structure 5

Network Components

Network Layer Choices

Some of the factors that will influence your choices in the network layer are as follows:
  1. Application requirements: The Application requirements are of prime importance. The solution should not be built around the network layer. Rather, the network layer should be chosen to support the application.
  2. External connectivity: Does the application require connectivity to a wide variety of client-end devices and applications? Where are the customer's located? What is the total and simultaneous user count expected to be?
  3. Internal connectivity: In some cases, legacy systems in the organization may dictate these choices.
  4. Bandwidth: The types and quantities of data movement and the number and type of connections both internally and externally set the minimum bandwidth requirements. Physical constraints or monetary constraints may determine maximum bandwidth.
  5. Skills and expertise: In some cases, the costs of finding and retaining the necessary expertise to implement and maintain the desired network infrastructure may prove prohibitively costly.

Security

The job of the network subsystem is to allow users to connect to the eBusiness systems. The security subsystems control and even prevent some users from accessing the network subsystem. As was mentioned in an earlier module, the architect's responsibility is to know the security chinks in the site's armor. Security protects the company's resources, and can be either physical (hardware), logical (software), or a combination of both.

Security subsystems

Security subsystems have to be balanced to ensure they are strong enough to provide the appropriate levels of security without interfering with the running of the applications or the maintenance and upkeep of the system.

Tasks of Security Subsystems

The tasks of the security subsystem are as described in the Easy Reference:

Tasks of the security subsystem

Function Description
Authenticate and authorize Identify who is accessing the system Determine and control the levels of access to resources based on a set of permissions
Control Integrity Ensure the data is transmitted intact to the intended recipient without being intercepted
Audit Monitor and log the activities of connected users and system events

B2B Digital Marketing Strategy

Directory Services

Security systems may utilize advanced Directory Services to centrally maintain information for and about the resources, such as users, shared facilities, applications, and policies. Directory Services allow a single network logon to a system that can then be centrally maintained. Lightweight Directory Access Protocol (LDAP) is a common technology for implementing Directory Services.

In the next lesson, we will discuss the use of a database in an eBusiness context.

Foundation Technologies - Quiz

Click the Quiz link below to complete a quiz on foundation technologies.
Foundation Technologies - Quiz
Standards-based technology: Technology based on Open Systems standards. B2C: A primary two-business model where the seller is a business and the buyer is a consumer or individual such as with a bookstore that sells books to the public.
2. Lightweight Directory Access Protocol (LDAP): Lightweight Directory Access Protocol, a set of protocols for accessing information directories. LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. Because it is a simpler version of X.500, LDAP is sometimes called X.500-lite.
Although not yet widely implemented, LDAP should eventually make it possible for almost any application running on virtually any computer platform to obtain directory information, such as email addresses and public keys. Because LDAP is an open protocol, applications need not worry about the type of server hosting the directory.
Proprietary systems: Proprietary is the opposite of open. A proprietary design or technique is one that is owned by a company. It also implies that the company has not divulged specifications that would allow other companies to duplicate the product.