This website uses cookies to ensure you have the best experience. Learn more

Logical Vs Physical Topology Essay

2773 words - 12 pages

E-commerce has presented a new way of doing business all over the world using internet. Organizations have changed their way of doing business from a traditional approach to embrace ecommerce processes. As individuals and businesses increase information sharing, a concern regarding the exchange of money securely and conveniently over the internet increases. Therefore, security is a necessity in an e-commerce transaction. The purpose of this paper is to present a token based Secure E-commerce Protocol. The purpose of this paper is to present a paradigm that is capable of satisfying security objectives by using token based secure

Keywords: Trusted Third Party (TTP), Pretty Good ...view middle of the document...

The eradication of trust in e-commerce applications may cause prudent business operators and clients to forego the use of the Internet for now and revert back to traditional methods of doing business. Gaining access to sensitive information and replay are some common threats that hackers impose to E-commerce systems [2].
The successful functioning of E-commerce security depends on a complex interrelationship between several applications development platforms, database management systems, systems software and network infrastructure [3]. By doing online business, it is a facility of reaching to everyone. Exploring the opportunities challenges conventional notions of business competition through electronic flows of information and money [6]. Payment on Internet or network is a critical important chain of whole e-commerce, which contains the payment activity [4]. Security protection starts with the preservation of the confidentiality, integrity and availability of data and computer resources [5]. These three tenets of information security are sometimes represented in the Confidentiality, Integrity and Authentication Triad in the Figure 1.


FIGURE 1: The Confidentiality, Integrity and Authentication Triad.

Including the elements of the Confidentiality, Integrity and Authentication Triad, the six security needs in E-commerce are:
i. Access Control.
ii. Privacy/Confidentiality.
iii. Authentication.
iv. Non Repudiation.
v. Integrity.
vi. Availability.
Access control ensures only those that legitimately require access to resources are given access [3].
Confidentiality is concerned with warranting that data is only revealed to parties who have a legitimate need, while privacy ensures that customers’ personal data collected from their electronic transactions are protected from indecent and/or unauthorized disclosure [6]. Issues related to privacy can be considered as a subset of issues related to access control.
Authentication provides for a sender and a receiver of information to validate each other as the appropriate entity. This means having the capability to determine who sent the message and from where and which machine.
Non-repudiation is a property of the transaction that positively confirms that a particular client did indeed request the transaction in question without having the ability to deny making the request [4].
Integrity ensures that if the context of a message is altered, the receiver can detect it. It is possible that as a file, electronic mail, or data is transmitted from one location to another, its integrity may be compromised.
Availability as defined in an information security context ensures that access data or computing resources needed by the appropriate personnel are both reliable and available in a timely manner.
Several research papers have been presented discussing security aspects in E-commerce. Ecommerce software packages should also...

Other Papers Like Logical vs Physical Topology

Unit 3. Assignment 1. Network Topology Paper

787 words - 4 pages still be regarded as a logical network, if not a physical one. Indeed, the hardware may be abstracted away completely in the case of a software bus. With the dominance of switched Ethernet over passive Ethernet, passive bus networks are uncommon in wired networks. However, almost all current wireless networks can be viewed as examples of passive bus networks, with radio propagation serving as the shared passive medium. The bus topology makes the

Nt1210 Intro To Networking Lab 2.3

1082 words - 5 pages -- through the body and picks up currents when in very close range with another device or individual carrying a transmitter. Exercise 2.3.2 Briefly define the term network topology. What is the metric used to define networks by topology? The shape of a local-area network (LAN) or other communications system. Topologies are either physical or logical. The metric all depends on the type of network and how many devices connect to it. Exercise

Physical and Network Topology

2961 words - 12 pages . 6. The hub is a central point of failure, but hub faults are rare. C. Ring topology [pic] 1. A ring network is like a bus network with the two ends connected. 2. Used primarily by Token Ring and Fiber Distributed Data Interface (FDDI) protocols 3. Most (but not all) ring networks are logical rings. a. The physical

Mr Usman

667 words - 3 pages understandable to computers and the process is call digitization. Purpose of protocols: Is for computer and the network they use to understand and work with each other and it set the rules that determine how device communicate, Topologies Bus: in the bus topology system is connected in a line and when a packet is sent in a bus topology, there is no intermediary to determine who the packet should to, and every packet that is sent in a bus topology is

Salmagundi Quiz

652 words - 3 pages (Synchronous Optical Network – double ring) Mobile broadband wireless Wireless regional area networks (WRAN) 802.3 Nickname Physical topology Logical topology Media Access Method Operating System Velma & Scooby Want Praise Because Solving Mysteries Rocks! Port Number 21 22 23 25 53 69 80 110 119 123 161 520 802.5 Token Ring Star Ring Token Passing Default File System Ethernet Star Bus CSMA/CD Date Released DOS Win 1.0 Win95a Win95B


3036 words - 13 pages (University of Phoenix, 2008), the network topologies also differ slightly at each plant location. A network topology as defined by the ATIS Telecom Glossary (2008) is "the specific physical, i.e., real, or logical, i.e., virtual, arrangement of the elements of a network." The Corporate headquarters in San Jose, California uses in Ethernet based Bus network topology as the core of its network design. Like modern corporate network environments


2656 words - 11 pages . 2.1.4 Network Topology Network topology defines the structure of the network. One part of the topology definition is the physical topology, which is the actual layout of the wire or media. The other part is the logical topology, which defines how the media is accessed by the hosts for sending data. The physical topologies that are commonly used are as follows: • A bus topology uses a single backbone cable that is terminated at

Tcp Ip Lan Plan

563 words - 3 pages | | |through a single communication mediums | | |MAC |It defines the network logical topology, |Network adapter card | | |which is the actual pathway of the data | | | |signals being

Light Tree

5142 words - 21 pages layer, which efficiently routes unicast, broadcast and multicast packet-switch traffic. TABLE OF CONTENTS Chapter No. Title Page No. List of Tables………………………………………………I List of Figures…………………………………………….II 1 Introduction..........................................................................1 1.1 Overview…….........................................................1 1.2 Classification of physical topology networks..........1 1.3 Types of

Interior Gateway Routing Protocol (Igrp)

1894 words - 8 pages 5. Interior Gateway Routing Protocol (IGRP) [pic]Top 10 Graphics: 1. Routed versus Routing Protocols 2. Multiprotocol Routing 3. Representing Distance with Metrics 4. Distance Vector Concept 5. Distance Vector Network Discovery 6. Distance Vector Topology Changes 7. Interior or Exterior Routing Protocols 8. Interior IP Routing Protocols 9. IP Routing Configuration Tasks 10. IGRP Configuration Example

Chapter 11 Ccna

2950 words - 12 pages switch is also called the ____. a.|FRAP|c.|FRND| b.|PDN|d.|FRAD| ____ 13. Frame Relay separates each data stream into logical (software-maintained) connections called ____. a.|logical circuits|c.|physical circuits| b.|virtual circuits|d.|connection circuits| ____ 14. LMI uses ____ packets (sent every 10 seconds by default) to verify the Frame Relay link and to ensure the flow of data. a.|keepalive|c.|hello| b.|discover|d.|beam

Related Essays

Lan Topologies Essay

832 words - 4 pages LAN Topologies Lord Bones IT240 Jan 01, University of Phoenix - AXIA College LAN Topologies With this assignment I will discuss some topologies of a LAN as requested by questions 11, 12, and 13, chapter three from the textbook Local Area Networks. A “LAN (Local Area Network) topology is the appearance or layout of a network” (Regan, 2006). There are two forms of topologies of a network, namely, the physical- and logical topology with

Literature Essay

1314 words - 6 pages Name: Myrrone B. Cuenca Sec:4FB Course:ACT What is Network Topology The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. Logical topology was discussed in the Protocol chapter. Main Types of Network Topologies In networking, the term "topology" refers to

Lan Topologies Essay

767 words - 4 pages (two to three sentences) of each concept and be prepared to discuss it with the class. Physical vs. Logical Topology – The term physical topology refers to the physical structure of the network, such as the method used to connect workstations to the actual cables, which transmit the data. Logical topology on the other hand, relates to the way that signals act upon the network media and the path that data takes as it moves around the network

It204 Fundamentals Of Networking Essay

649 words - 3 pages LAN’s. This is how the whole thing works. The Wide Area Network typically is multiple Local area networks connected together so the company’s electronic devices can share resources and communicate over a wide area. Networks LAN or WAN have to be set up a certain way to insure the data is pass through the way intended by the network design team. Physical and Logical topology have everything to do with each other and nothing at all to do with each