330 likes | 513 Views
Chapter Nine. ACG 5458 Internet Standards, Protocols, and Languages. Internet Standards, Protocols, and Languages. The Role of Standards The Global Environment and Standard Setting Standard-Setting Issues, Committees, Structures and Interfaces Internet Protocols and Languages
E N D
Chapter Nine ACG 5458 Internet Standards, Protocols, and Languages
Internet Standards, Protocols, and Languages • The Role of Standards • The Global Environment and Standard Setting • Standard-Setting Issues, Committees, Structures and Interfaces • Internet Protocols and Languages • Implications for the Accounting Profession
Interesting Aspects of the Internet • Tremendous size and use • High growth rate • Interconnection of different hardware, software, telecommunications, multiple cultures and languages • Lack of designated ownership How is this possible? Because of common, agreed-upon standards for development and operation
ANSI ANSI’s IETF & Nat’l Bureau WWW NII/GII founded ASC X12 IRTF of Standards functioning founded founded founded (renamed NIST) ISOC founded OBI ISO IAB UN/EDIFACT WWW WWWC founded founded founded standard prototyped founded CEFACT approved migration started 1918 1979 1986 1989 1991 1995 1997 1947 1983 1987 1990 1994 1996 Figure 9-1 Time line of major standard setting bodies and internet societies You will only need to know a couple of these - See subsequent slides
Internet Standards - ANSI ANSI - American National Standards Institute • Private nonprofit organization • Voluntary consensus standard setting process • ASC – Accredited Standards Committee • 1979 X12 uniform data standards for interindustry EDI • Has developed over 275 standard transaction sets
Internet Standards - UN/EDIFACT United Nations / Electronic Data Interchange for Administration, Commerce, and Transport • Challenges the US ASC X12 data standard • Is used throughout the world • ASCX12 is migrating towards UN/EDIFACT • XML and XBRL are encouraging possibilities for new common standards
US and International Standard Setting Bodies • UN ECE – United Nations Economic Commission for Europe • CEFACT – Centre for Facilitation of Procedures and Practices for Administration, Commerce, and Transport • ISO – International Organization for Standardization – over 120 member countries • NIST – National Institute of Standards and Technology I will not have these on an exam
Internet Specific Committees ISOC – Internet Society Nongovernmental, international nonprofit with voluntary, consensus standard setting processes • IAB – Internet Architecture Board • IETF – Internet Engineering Task Force • IESG – Internet Engineering Steering Group • IRTF – Internet Research Task Force • RFC - Requests for Comments on new protocols • ICANN – Internet Corporation for Assigned Names and Numbers (Only this one on an exam) • Responsible for domain registration functions • Passed new extensions in November, 2000: .biz, .info, .name, .pro, .museum, .aero, and .coop
World Wide Web Specific Committees • W3C – World Wide Web Consortium • Seed funded by DARPA, CERN, UN/ECE • Goal: to lead the advancement of the Internet through common protocols to ensure its interoperability (Only this one on Exam) • OBI – Open Buying on the Internet • Group of Fortune 500 companies • To encourage B2B marketplace on the Web • GIIC - Global Information Infrastructure Commission • Communication link between organizations and committees • Strong ties with the World Bank and industry leaders • Reducing the Digital Divide is one of lead projects
Region GNP/Capita Net Hosts per 10k PCs per 1,000 Mobile Phones Per 1,000 Phone Lines Per 1,000 Sub-Sahar. Africa $1,440 2.0 8 5 14 South Asia $1,940 0.2 3 1 19 East Asia and the Pacific $3,280 2.0 14 25 70 Middle East and North Africa $4,630 0.4 10 8 81 Europe and Central Asia $5,510 15.0 34 23 200 Latin America and Caribbean $6,340 15.0 34 45 123 United States $20,314 1509.0 459 256 661 European Union $20,440 608.0 311 230 514 Figure 9-4 Levels of access to technology by region Source: GIIC, 2000
Internet Security Committees and Organizations • SEI – Software Engineering Institute - Carnegie Mellon University • CERT – Computer Emergency Response Team (Only this one on exam) • FIRST - Forum of Incident Response & Security Teams • ICSA – International Computer Security Association • US Government Agencies • NIST’s CSRC – Computer Security Resource Clearinghouse • CSTC – Computer Security Technology Center • CIAC – Computer Incident Advisory Capability • FedCIRC – Federal Computer Incident Response Capability • Advanced Security Projects • Secure Systems Services
The Difference Betweena Protocol and a Computer Language • Protocols are agreed-upon methods of communicating and transmitting data between telecommunication devices. • Computer languagesfocus on communicating with the computer and its operating system.
Internet Security Protocols and Languages • Interoperability: the capability for applications running on different computers to exchange information and operate cooperatively. • OSI – Open Systems Interconnections • 1984 model for the standardization of data communication procedures that support interoperability
Figure 9-5 OSI model APPLICATION LAYER PRESENTATION LAYER UPPER LAYERS SESSION LAYER TRANSPORT LAYER NETWORK LAYER DATA LINK LAYER PHYSICAL LAYER LOWER LAYERS
TCP/IP STACK OSI MODEL APPLICATION APPLICATION PRESENTATION SESSION TRANSPORT TRANSPORT INTERNET (IP) NETWORK DATA LINK NETWORK INTERFACE PHYSICAL Comparison of Models
OSI Model Layers • Application layer: connects operating system to system and user applications • Presentation layer: controls the syntax (format) of the data transferred – HTML • Session layer: Establishes and maintains connections, checks on packets integrity • Transport layer: TCP controls the packet routing on the Internet • Network layer: IP addresses determine ultimate end node of the Internet • Data link layer: controls data transmission from one computer to the next- can be connection or connectionless • Physical layer: controls the transfer of bits from the computer to the telecommunications medium
The TCP/IP Protocol • Works in the network and session layers • Guarantees delivery of all data packets • Is built into the UNIX operating system • Microsoft Windows interface: Winsock • IP address must be present for sender and receiver for TCP/IP to work • IPv4 is 32 bits, has 4-byte sections 3 classes for large, medium and small networks 2 classes for special and experimental purposes • IPv6 has 128 bits to accommodate more hosts • Domain names (Universal Resource Locators) help transform these streams of numbers into meaningful code: Disney.com
Order of Bits 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 0 Network Identifier 7 bits CLASS A Host Identifier 24 bits: 224 = 16,777,216 possible hosts 10 Host Identifier 16 bits: 216 = 65,536 possible hosts Network Identifier 14 bits CLASS B Host Identifier 8 bits: 28 = 256 possible hosts 110 Network Identifier 21 bits CLASS C Figure 9-6 The IPv4 protocol
Common Top Level Domain Name Extensions Top level domain names (managed by ICANN): • .edu = higher education organizations • .com = commercial organizations • .net = Network providers • .org = Nonprofit organizations • .es, .uk, .ca, .de = countries (Spain, United Kingdom, Canada, Germany) • .gov = government agency New Global Top Level Domain Names: Generic Top Level Domain Memorandum of Understanding (gTLD): .biz, .info, .name, .pro, .museum, .aero, .coop
Telnet and FTP • Both run on top of TCP/IP in Session layer • Both allow remote access and activity Usually use a combination of user-id and password to enter the network • Telnet - allows remote terminal emulations and logins • File Transfer Protocol (FTP) file transfers to a server: for file uploads and downloads
NTTP, HTTP and HTTP 1.1 • NTTP – Network News Transfer Protocol for the News Industry to transfer and search for articles on the Internet • Hypertext Transfer Protocol - (HTTP) • Basic WWW protocol: request/response • Runs on top of the TCP protocol in Presentation layer • Defines message formats and transmissions • Defines web server and browser commands • PEP Protocol Extension Protocol allows dynamic interactions for transaction-based applications • HTTP- 1.1 the next generation! RFC 2774 • S-HTTP (EIT) – secures message (lock at bottom of your browser screen) produces a digital signature
SGML and HTML • SGML – standard generalized markup language • Independent of Hardware and Software • Data encoding system that promotes data sharing by tagging data with: Data – structure – format (look) • DTD: document type definition are the rules for SGML • HTML – hypertext markup language • Encodes and recognizes documents <start> </finish> • Not as flexible as SGML
XML XML – eXtensible Markup Language (WWW3) • Allows customized tags: More flexible than HTML • License-free, platform independent, well-supported. • Supports Web/EDI solutions • Method for putting structured data into a text file that is not meant to be read as is: • Uses the tags to delimit the data, leaving the interpretation of the data to the application that reads it • Is a family of technologies: XLink, XFragments, Xpointer • Requires more bits than comparable binary formats
Java Object-oriented programming language, not a protocol • Developed by SUN Microsystems in 1995 • Platform neutral • Benefit: runs anywhere • Costs: less efficient in processing due to the additional processing layer and the need for a JAVA interpreter (termed the virtual machine), • Portable: Write Once, Run Anywhere • Supports GUIs and client/server applications • Similar to C++ • Hot Java – first Java- enabled web browser with “applets” • MID: Sun’s wireless JAVA profile for PDAs and cell phones
Messaging (e-mail) Protocols Basic Mail Protocols: • SMTP: Protocol to pass e-mails from server to server on the Internet • POP2: SMTP server to desktop “store + forward”: messages are downloaded periodically • POP3: Newer version of POP2 without the need to have an SMTP server. E-mails are downloaded, read, and discarded • IMAP4: Remote file server: read the files from the server – no downloading • ACAP: IMAP capabilities plus user preferences are stored on the server: great for traveling workers.
Security-Enhanced Mail Protocols • X400 – Protocol that requires e-mail messages to pass through known, trusted carriers such as AT&T or MCI • PEM – Privacy Enhanced Mail Protocol • Origin authentication and Nonrepudiation, • Message integrity and Confidentiality • MIME – Multipurpose Internet Mail Extension protocol – allows multimedia • MOSS – MIME Object Security Services • Adds some security to MIME • Allows ASCII and non-ASCII message formats
Security-Enhanced Mail Protocols • S/MIME – alternative to MIME/MOSS • Developed by RSA Data Security based on public keys • Adds digital signatures and encryption; • MSP – mail protocol of the US Government • PGP- Pretty Good Privacy • Developed by Phillip Zimmerman • Uses public key encryption technology • For individuals there is a free download available go to MIT’s web site for the PGPv6.5
S-HTTP and SSL • S-HTTP is a method of secure transmission • Developed by a private organization, Enterprise Integration Technologies (EIT) • Uses encryption and produces a digital signature • SSL - Secure Sockets Layer, creates a secure session with a web server - Developed by Netscape - Uses public and private key encryption - Does not produce a digital signature - Can be used with S-HTTP for enhanced security
SET • SET: Secure Electronic Transmission • Uses public and private key encryption (DES and RSA) • Ensures confidentiality and integrity • Authenticates both merchants and cardholders • Is interoperable with other protocols • 13 European and 5 Asian countries have adopted SET • US companies use the SSL/S-HTTP combination
Figure 9-12 The role of SET in the electronic shopping experience Cardholder browses Cardholder fills Cardholder selects through merchandise order form after items to be via some form of possible price purchased catalog negotiation Cardholder gives order and payment instructions and digitally signs them Merchant requests Cardholder selects payment authorization payment mechanism from cardholder’s financial institution Merchant requests Confirmation sent by Merchant ships goods payment from merchant to to cardholder cardholder’s financial cardholder institution Source: SET Specification, 1997
Comparison of Features SSL SET Encryption of data during transmission? Yes Yes Confirmation of message integrity? Yes Yes Authentication of merchant? Yes Yes Authentication of consumer? * can be used in SSLv3 No* Yes Transmission of specific data only on a “need to know” basis? No Yes Inclusion of bank or trusted third party in transactions? No Yes No need for merchant to secure credit card data internally? No Yes
Mobile Protocols Mobile devices include digital phones, pagers, and personal digital assistants Mobile Internet access is used for email, electronic payments and vending machine use. WAP: Wireless Application Protocol • Developed by Ericsson, Motorola, Nokia, and Unwired Planet • Challenges include: • Smaller display, limited memory, and slow processing • HTML tags do not all translate well to the small screens • Transmission security is a huge concern • WML:Wireless Markup Language has been developed to overcome some of these challenges • WTLS:Wireless Transport Layer Security Specification adds security through encryption and authentication
Implications for theAccounting Profession Accountants need to understand Internet protocols to be able to evaluate a client’s information system reliability and security. Accountants need to become more active in Internet standard-setting processes.