This literature review is drawn in order to discuss about the networking system and its application in an e-commerce website. In this era of technology and internet the security of the information is one of the most important facts in case of information technology. Information is related to several factors like public personal life and the data related to the organisation’s confidential subjects [6]. That is the reason of making all the data very secured. The security of the information is kept by creating well structured network system for the transaction of data. The network system is consisted with several important features and elements which should be created in such a manner so that the organisations can keep the data more secure. The security of the data is also very important in terms of sending encrypted information also [8]. Not only from the security point of view but also from the point of view of fast and reliable internet connection the networking should be more efficient and the most important thing related to the networking system is that it should provide an uninterrupted connection.
In an e-commerce website the application of the network system is essential in order to set up a reliable connection regarding the transaction of money and to order and receive several products [36].For the fast and reliable connection the users need a fast connection [31]. Several features should be included in the networking system of the e-commerce site so that the security and the reliability of the connection can be maintained.
This literature review discusses about the features of the network system which is also very important for the point of view of making a secure and reliable connectionfor the e-commerce site. All the advantages and the disadvantages of the network system are also included in this literature review. The design of the network system is also included with regarding screenshots.
Firstly the author discusses about the several features of the network system that can be used for the advancement of the connection for the e-commerce site. According to the author in the e-commerce site there are mainly two kinds of people [32]. There is an admin who operates all the connection and the switches all the connection according to the requirement. Another kind of people are the users who are the mainly the customers of the e-commerce site [2]. The primary concept related to the system is that the connection between the admin and the users should be designed in such a way so that the information can be kept safe and the actions taken by the customers are also reviewed by the admin [33]. The customer’s requirements are the most important thing in case of an e-commerce site. The customer orders several kinds of products through the website from any place in the world and for that reason the network system should also be of the WAN type as it requires a large amount of area [43]. To create this kind of connection the network system should contain such flow that can restrict the transfer of data in every direction[1]. The author says that in this network the customers are able to only receive the data from the admin and also send the information to the admin without permission. As this a website based service therefore the system should be designed in a greater aspect. The requirements of the customers are the most important thing in this market and for that reason the flow of the data from the customer end should be always given priority [12]. The admin has the authority to both send and receive the information from the users. The admin can also make changes to the computers. The customers can be connected to the internet through several routers but the users can communicate to each of the computer of the e-commerce site with the permission of the admin.
The author explains that the network system should be designed in such a way so that the connection is uninterrupted and also secure. The speed of the internet connection and the criteria provided by the admin of the e-commerce siteshould be maintained in order to make the network system more efficient [5]. To make a strong and secure network system on the provided infrastructure and architecture the requirements should be cleared. After understanding the objectives of the system the main criteria of the system designing are that the issues related to the present network system should be understood [44].
The author also says that the network system should contain the features which can overcome the issues regarding the system [4]. There are also many constraints which can create problem during the implementation of the network system. Constraints should be of several types like physical constraint and the network constraint [38]. For an example the absence of the electrical outlet in the LAN connection can be the example of the physical constraints. Again the lack of proper amount of the bandwidth and the connection speed in the café can be considered as the network constraints in the system.
The author explains that the specifications about the functional parameters of the network system should also be cleared in terms of making the design implemented in the proper way. The frequency, bandwidth and the proper bit rate of the system should be created in such a way so that the network can function in the best possible way [9]. The author says that the value of the radio frequency should be well defined in the pre phase of designing the network system. In case of designing the wireless network the range of the frequency should be in between 2.4 GHz and 5GHz frequency range. This actually depends upon the positioning of the internet café. The issues related to the network system should be measured on the basis of the frequency range.
The author also concerns about thechecking of the location. The location should be suitable to set up the elements of the network system so that the network functions in a proper way. The location should have enough space to accommodate the server, routers and the switches [7]. The author says that the admin of the e-commerce siteshould also take proper action to create the back up of the network system after accommodating all the network elements in the proper location [35]. The author also says that the installation of the networking elements should be in such a way so that the devices are out of any kind of fire and other hazards. The main concern of the system is also related to the safety of the hardware parts of the network.The author tells about the access points in case of designing the network system [11]. The main concept related to the requirement of the access point of the e-commerce siteis that requirements should be properly understood. After designing these parts the final work is to analyze the outline of the network system in order to revise this and from that any kind of error will be come out.
The author says that the system is designed with several internet protocols which are also an important part of making the system with much more advanced security features and accessibility [37]. The main concern related to the system is that it also consists of different network features like the CDMA, GSM network which are used in case of the WAN system.
The author describes about all the network elements of the system in order to create the proper set up of the system and the main concern related to the elements of the network system is that those should be maintained in a regular manner [39]. There are several kinds of networking elements in the system. Those are the server, router, connection wires and computing system. The main concern of the system is that it can manage the connection with proper IP address and the main relation between the network elements and the computers is designated by the use of the IP address [44]. Every computer has a unique system in order to make the system more advanced in terms of the efficiency and the security of the system [14]. The main advantage of the system is that it can manage the network parameters according to the requirements in the range of the data that is permitted by the admin of the system.
The author describes that the IP address or the Internet Protocol address is the main rectification of the elementary computers in the network system. The IP address is used to identify the computer in particular to the system [23]. The author says that the classless category of the IP range is suitable for the network connection. As there are different types of the network system used in the whole system there are different types or classes of the network are used. In the customer’s home the IP address is of class C type whereas in the main server the IP i=address is of class A type. This range lies in between the IP addresses 192.168.0.0 and 192.168.0.75 and the main server IP address 255.255.255.240 and 255.255.255.252. This is the range of the IP addresses for making the static IP range for the proper functioning of the network system [28]. The internet protocol is used in order to make the system more effective for the classification of the system and then main concern related to the system is that the IP address should be designed for keeping the network system in a better working condition by helping it to identify the computers in faster manner.
Figure 1: Network diagram of the e-commerce structure
The author says that the network system should follow proper subnet design to provide the best possible network architecture. The subnet mask is used in order to identify the network address and it is basically a 32 bit number that masks the IP address [16]. It actually devidesbt7he IP address into two parts which are network address and the host address.
The author says that there are several network systems for the use of the internet connection in a faster and secure way[20]. The nature of the network also depends upon the directions of the flow of data in the connection between the admin and the users.
The authors says that there are mainly three types of network system and those are LAN, MAN and WAN. The LAN connection is used for the implementation of the Local Area Network [19]. This type of network system is utilised in case of locations having small spaces where the system is also have very specific types of purposes for the use of the internet [13]. The schools, houses and hospitals can be considered as the locations in which the LAN connection can be implemented. The author also says that there are two ways to initiate the network and those are Ethernet and the Wi-Fi connection respectively.
Then the MAN connection can also be used in the network system in case of the big enterprise, as an example in case of the several universities and large business entities this kind of network system can be implemented [26]. The MAN actually stands for the Metropolitan Area Network. It connects between the Internet and the computer user in a fluent way.
The WAN connection stands for the Wide Area network and it is mainly used in case of the wide area and it is established throughout the whole world. The system is also bigger than the area covered by the LAN and the MAN network. Internet is one of the best examples of the WAN network system.
The author says that the WAN connection is the suitable network connection which can be used for the connection of the network and the main concern related to this network system which is used in the e-commerce sites is the accessibility and the security of the data [15]. The Wireless application protocol is also used in this system which is also known as the WAP system. WAP is based on the client-server connection which is mainly functioned for the transfer of the data between the server of the website and the client who is using the server. The unstructured Supplementary Services Data (USSD) and the General Packet Radio Service (GPRS) are used in order to make the communication more efficient. The main concern with the system is that it can make the system with much more security [21]. The author says that the web transaction model is designed in such a manner so that the cellular standards and the protocols related to the internet and communication can be maintained. In this case the client sends the request or the URL to the origin server and then it goes to the CGI scripts services and then the content is transferred to the client as the response or document [39]. The user then finally receives the data in a suitable form. This is also known as the WWW transaction model. In case of the WAP transaction model the data is also transformed in terms ofmaking the system more efficient and also it helps the system more efficient in terms of data communication [28]. The client transfers the data through a gateway to the server. The client sends the encoded request to the gateway and then it again sends the data to the origin server using the URL request [10]. The CGI scripts are then converted into the content and the content is transferred to the gateway through the response or document. The gateway is simply consisted with the encoders and the decoders. The gateway also sends the data to the client in the decoded format.
The author says that there are several layers in the WAP architecture and those are application layer, session layer, transaction layer, security layer, transport layer and in the lowest layer there are several parts like GSM, CDMA, CDPD, Flex and many others [27]. The layers are responsible for the management of the parts of WAP and additionally the layer is the main part of the system and the main advantage of using the system is that the layers are created in order to make the system more efficient by distributing the functioning among several layers of the system [17].
According to this author in many cases it is seen that hackers are intended to steal the information regarding the public personal details and in that case it may be a serious issue for the site [40]. The data loss is one of the most important dangers which can be considered as the main problems of the network site [25]. The information related to the public personal transaction is the most important thing and that is why several risk factors should be analyzed in a detailed way so that the security features can be reviewed [42]. If there is a lack of designing the network in a proper way then the possibility of data loss is also decreased and in that case the system is also very slowed down.
The author says that the security of the network system depends upon several features of the networking system [22]. The network should be designed in such a manner so that the layers of the networking system are well maintained in terms of security. The main concern related to the security of the networking system is that the firewalls and the other security features like antivirus of the website should always be active and the main concern related to the system is that the maintenance of the security features should be done in a regular manner [29]. The author says that the data used in the system also should be encrypted in order to increase the security of the data [24]. The main concern with the system is that it can make the system more efficient with respect to the security issues if the main software and the platform are up to date with respect to the security features. The network should follow all the standards defined by the IEEE and also it should follow all the protocols of using the internet [3]. The server of the e-commerce site should be maintained in such a way so that the customer gets a well maintained connection and the main site can also provide uninterrupted connection. The author also suggests to use the SSL and VPN technology which can be used in order to make the system more advanced in terms of the security.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
Client side 1 |
10 |
14 |
192.168.0.0 |
/28 |
255.255.255.240 |
192.168.0.1 – 192.168.0.14 |
192.168.0.15 |
Client side 2 |
10 |
14 |
192.168.0.16 |
/28 |
255.255.255.240 |
192.168.0.17 – 192.168.0.30 |
192.168.0.31 |
Client side 3 |
10 |
14 |
192.168.0.32 |
/28 |
255.255.255.240 |
192.168.0.33 – 192.168.0.46 |
192.168.0.47 |
Server Side |
10 |
14 |
192.168.0.48 |
/28 |
255.255.255.240 |
192.168.0.49 – 192.168.0.62 |
192.168.0.63 |
Customer 1 |
2 |
2 |
192.168.0.64 |
/30 |
255.255.255.252 |
192.168.0.65 – 192.168.0.66 |
192.168.0.67 |
Customer 2 |
2 |
2 |
192.168.0.68 |
/30 |
255.255.255.252 |
192.168.0.69 – 192.168.0.70 |
192.168.0.71 |
Customer 3 |
2 |
2 |
192.168.0.72 |
/30 |
255.255.255.252 |
192.168.0.73 – 192.168.0.74 |
192.168.0.75 |
Figure 2: Network address scheme
(Source: Created by author)
Web server testing (HTTP resolved)
Web Server:
The domain naming service support the business network to resolve their unique internet protocol to a string and vice versa. The domain naming system is centralized part for the e-business. However, in this developed network structure the www.ebusiness.comis set as a domain name for this web server and IP address is 192.168.0.50. A domain name is something that can be easily recognizable and remember.
Figure 3: Tracing route through console (customer side 2 to web server)
(Source: Created by author)
In the above screenshot the outline of the website is shown keeping the main framework behind it. The simulation is done using the Cisco packet tracer software.
Figure 4: Get ICMP response form web server
(Source: Created by author)
In the above figure 4, a trace route command is use to reach the server host from client computer 1. This command is used to tracer the route between the host to server. The web server is reachable from any host in this network, the above figure is an evidence of that process.
Figure 5: Success of Simulation evidence
(Source: Created by author)
In this section, the trace route and ping request is use to test the connectivity of this intended network. In above figure 5, showing that a host send a ICMP request to the web server and server response to the request.
Figure 6: Simulation of network system used for the e-commerce site
(Source: Created by author)
In the above diagram the simulation of the network system is shown of the e-commerce website. The computers in the blue and the green circles are the customers’ computers and the routers and the red circle is the main source website and the computers of the employees. The server in the orange circle is the main server of the system. The main service given by the system is done by the functioning of the above mentioned diagram.
Conclusion
From the above discussion it can be concluded that the network system of the e-commerce site should be very well structured in terms of the architecture. The e-commerce site is mainly known as the online platform for transaction of products between the customers and several online selling organisations. In order to maintain the proper condition of using the e-commerce site the users should have a high speed internet connection with proper security. The network elements of the system should be designed in such a manner so that the e-commerce site can connect through a high speed internet connection to the customers. There are many security issues like hacking, data breech and risk factors which can damage the security of the e-commerce site. To overcome the security features of the e-commerce site the firewall and the antivirus should be strong enough and well maintained so that security is maintained. The data should also be encrypted so that the hackers cannot reach the data very easily. The SSL and VPN technology can also be used in order to make the system more advanced in terms of the security.
References
[1] N. Hua, “E-commerce performance in hospitality and tourism,” Int. J. Contemp. Hosp. Manag., vol. 28, no. 9, pp. 2052–2079, 2016.
[2] K. Z. K. Zhang and M. Benyoucef, “Consumer behavior in social commerce: A literature review,” Decision Support Systems, vol. 86. pp. 95–108, 2016.
[3] Q. Yan, S. Wu, L. Wang, P. Wu, H. Chen, and G. Wei, “E-WOM from e-commerce websites and social media: Which will consumers adopt?,” Electron. Commer. Res. Appl., vol. 17, pp. 62–73, 2016.
[4] S. Mittal, A. Goel, and R. Jain, “Sentiment analysis of E-commerce and social networking sites,” Proc. 10th INDIACom; 2016 3rd Int. Conf. Comput. Sustain. Glob. Dev. INDIACom 2016, pp. 2300–2305, 2016.
[5] Y. Baghdadi, “A framework for social commerce design,” Inf. Syst., vol. 60, pp. 95–113, 2016.
[6] F. Aulkemeier, M. Schramm, M. E. Iacob, and J. van Hillegersberg, “A service-oriented e-commerce reference architecture,” J. Theor. Appl. Electron. Commer. Res., vol. 11, no. 1, pp. 26–45, 2016.
[7] K. C. Yang, C. H. Huang, C. Yang, and C. W. Tsai, “Applying Social Marketing Theory to develop retargeting and social networking advertising website,” in IEEE International Conference on Industrial Engineering and Engineering Management, 2016, vol. 2016–January, pp. 1845–1849.
[8] A. Kaur and R. Kaur, “Future prospects of integration of e-commerce & social networking sites,” An Int. Multidiscip. Res. J., vol. 6, no. 4, pp. 280–287, 2016.
[9] D. Kang, W. Jang, and Y. Park, “Evaluation of e-commerce websites using fuzzy hierarchical TOPSIS based on E-S-QUAL,” Appl. Soft Comput. J., vol. 42, pp. 53–65, 2016.
[10] I. Petkova, “Between high-tech and high-fashion: How E-Commerce fashion organizations gain moral and pragmatic legitimacy in the fashion field,” Poetics, vol. 57, pp. 55–69, 2016.
[11] E. Kim, R. Urunov, and H. Kim, “The Effects of National Culture Values on Consumer Acceptance of E-commerce: Online Shoppers in Russia,” in Procedia Computer Science, 2016, vol. 91, pp. 966–970.
[12] Y. Yu, X. Wang, R. Y. Zhong, and G. Q. Huang, “E-commerce Logistics in Supply Chain Management: Practice Perspective,” in Procedia CIRP, 2016, vol. 52, pp. 179–185.
[13] E-commerce Europe, “European B2C E-commerce Report 2016,” 2016.
[14] M. C. Han and Y. Kim, “Can Social Networking Sites Be E-commerce Platforms?,” Pan-Pacific J. Bus. Res., vol. 7, no. 1, pp. 24–39, 2016.
[15] L. Chen and R. Wang, “Trust Development and Transfer from Electronic Commerce to Social Commerce: An Empirical Investigation,” Am. J. Ind. Bus. Manag., vol. 6, no. 6, pp. 568–576, 2016.
[16] S. Akter and S. F. Wamba, “Big data analytics in E-commerce: a systematic review and agenda for future research,” Electron. Mark., vol. 26, no. 2, pp. 173–194, 2016.
[17] N. Hajli, J. Sims, A. H. Zadeh, and M.-O. Richard, “A social commerce investigation of the role of trust in a social networking site on purchase intentions,” J. Bus. Res., vol. 71, pp. 133–141, 2016.
[18] B. T. Ward, J. C. Sipior, and L. Volonino, “Internet Jurisdiction for E-commerce,” J. Internet Commer., vol. 15, no. 1, pp. 1–17, 2016.
[19] A. Hannak, G. Soeller, D. Lazer, A. Mislove, and C. Wilson, “Measuring Price Discrimination and Steering on E-commerce Web Sites,” in Proceedings of the 2014 Conference on Internet Measurement Conference – IMC ’14, 2014, pp. 305–318.
[20] R. Fayad and D. Paper, “The Technology Acceptance Model E-Commerce Extension: A Conceptual Framework,” Procedia Econ. Financ., vol. 26, pp. 1000–1006, 2015.
[21] D. Chaffey, Digital Business and E-Commerce Management – Strategy, Implementation and Practice. 2015.
[22] A. A. Alyoubi, “E-commerce in Developing Countries and how to Develop them during the Introduction of Modern Systems,” in Procedia Computer Science, 2015, vol. 65, pp. 479–483.
[23] O. Abdulkarimli, “Taxation of E-commerce,” Baku State Univ. Law Rev., vol. 1, pp. 99–109, 2015.
[24] N. Späth, “the E-Commerce Market in Germany,” Ger. Trade Invest, 2015.
[25] N. Hajli and J. Sims, “Social commerce: The transfer of power from sellers to buyers,” Technol. Forecast. Soc. Change, vol. 94, pp. 350–358, 2015.
[26] Q. Zhao, Y. Zhang, D. Friedman, and F. Tan, “E-commerce Recommendation with Personalized Promotion,” in Proceedings of the 9th ACM Conference on Recommender Systems – RecSys ’15, 2015, pp. 219–226.
[27] B. Kuzucu Yapar, S. Bayrakdar, and M. Yapar, “The Role of Taxation Problems on the Development of E- Commerce,” Procedia -Social Behav. Sci., vol. 195, pp. 642–648, 2015.
[28] A. A. Al-Bakri and M. I. Katsioloudes, “The factors affecting e-commerce adoption by Jordanian SMEs,” Manag. Res. Rev., vol. 38, no. 7, pp. 726–749, 2015.
[29] J. Chen and X. L. Shen, “Consumers’ decisions in social commerce context: An empirical investigation,” Decis. Support Syst., vol. 79, pp. 55–64, 2015.
[30] T. Yang, J. Xun, and X. He, “British SMEs’ e-commerce technological investments and firm performance: an RBV perspective,” Technol. Anal. Strateg. Manag., vol. 27, no. 5, pp. 586–603, 2015.
[31] H. S. Yoon and L. G. Occeña, “Influencing factors of trust in consumer-to-consumer electronic commerce with gender and age,” International Journal of Information Management, vol. 35, no. 3. pp. 352–363, 2015.
[32] Z. Yang, Y. Shi, and B. Wang, “Search engine marketing, financing ability and firm performance in E-commerce,” in Procedia Computer Science, 2015, vol. 55, pp. 1106–1112.
[33] R. Awiagah, J. Kang, and J. I. Lim, “Factors affecting e-commerce adoption among SMEs in Ghana,” Inf. Dev., vol. 32, no. 4, pp. 1–22, 2015.
[34] M. S. Featherman and N. Hajli, “Self-Service Technologies and e-Services Risks in Social Commerce Era,” J. Bus. Ethics, vol. 139, no. 2, pp. 251–269, 2016.
[35] P. Ueasangkomsate, “Adoption E-Commerce for Export Market of Small and Medium Enterprises in Thailand,” Procedia – Soc. Behav. Sci., vol. 207, pp. 111–120, 2015.
[36] T. Yamakami, “A view model of social commerce: The building blocks of next-generation e-commerce,” in 14th International Symposium on Communications and Information Technologies, ISCIT 2014, 2015, pp. 284–288.
[37] M. Kaptein and P. Parvinen, “Advancing e-commerce personalization: Process framework and case study,” Int. J. Electron. Commer., vol. 19, no. 3, pp. 7–33, 2015.
[38] B. K. Yapar, S. Bayrakdar, and M. Yapar, “The Role of Taxation Problems on the Development of E-Commerce,” Procedia – Soc. Behav. Sci., vol. 195, pp. 642–648, 2015.
[39] E. Turban, J. Strauss, and L. Lai, “Social Commerce: Marketing, Technology and Management,” in Springer, no. Loeb, 2015, pp. 1–37.
[40] G. Clarke, C. Thompson, and M. Birkin, “The emerging geography of e-commerce in British retailing,” Reg. Stud. Reg. Sci., vol. 2, no. 1, pp. 371–391, 2015.
[41] W. X. Zhao, S. Li, Y. He, E. Y. Chang, J. R. Wen, and X. Li, “Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information,” IEEE Trans. Knowl. Data Eng., vol. 28, no. 5, pp. 1147–1159, 2016.
[42] N. Hua, C. Morosan, and A. DeFranco, “The other side of technology adoption: Examining the relationships between e-commerce expenses and hotel performance,” Int. J. Hosp. Manag., vol. 45, pp. 109–120, 2015.
[43] S. Sivapalan, A. Sadeghian, H. Rahnama, and A. M. Madni, “Recommender systems in e-commerce,” in World Automation Congress Proceedings, 2014, pp. 179–184.
[44] “{{metadata.title}}”, Netacad.com, 2017. [Online]. Available: https://www.netacad.com/. [Accessed: 25- Sep- 2017].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download