0% found this document useful (0 votes)
305 views54 pages

Chapter 3 - Electronic Data Nterchange

Electronic Data Interchange (EDI) allows businesses to exchange standard business documents like purchase orders, invoices, and shipping notices directly between their computer systems without human involvement. EDI uses translation software to convert documents into a standard electronic format for transmission between trading partners. It requires common standards, translation software, value-added networks to facilitate transmission, and inexpensive computers to enable even small businesses to participate. EDI automates business transactions and replaces the need for paper, fax, email and manual data entry.

Uploaded by

Rajan Subedi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
305 views54 pages

Chapter 3 - Electronic Data Nterchange

Electronic Data Interchange (EDI) allows businesses to exchange standard business documents like purchase orders, invoices, and shipping notices directly between their computer systems without human involvement. EDI uses translation software to convert documents into a standard electronic format for transmission between trading partners. It requires common standards, translation software, value-added networks to facilitate transmission, and inexpensive computers to enable even small businesses to participate. EDI automates business transactions and replaces the need for paper, fax, email and manual data entry.

Uploaded by

Rajan Subedi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

E-commerce

Unit3- Electronic Data


Interchange (EDI)
What is EDI?
• Electronic Data Interchange (EDI) is the direct
computer-to-computer exchange of business
documents (business transactions) in a standard
electronic format between one or more mutually
agreeable business partners. This is a business-to-
business (B2B) type of E-Commerce.
• Information stored in one computer is translated
by software programs into standard EDI format
for transmission to one or more trading partners.
Trading partner’s computer, in turn, translates the
information using software programs into a form
they can understand. There is no human
involvement in the processing of the information.
Characteristics of EDI
Computer-to-computer– EDI replaces postal mail,
fax and email. While email is also an electronic
approach, the documents exchanged via email must
still be handled by people rather than computers.
Business documents – These are any of the
documents that are typically exchanged between
businesses. The most common documents
exchanged via EDI are purchase orders, invoices and
advance shipping notices and commission sales
reports, as well as other important or classified
information.
Characteristics of EDI
 Standard format– Because EDI documents must be
processed by computers rather than humans, a standard
format must be used so that the computer will be able to
read and understand the documents. Without a standard
format, each company would send documents using its
company-specific format and, EDI system doesn’t
understand the company-specific format.
 Business partners – The exchange of EDI documents is
typically between two different companies, referred to as
business partners or trading partners. For example,
Company A may buy goods from Company B. Company A
sends orders to Company B. Company A and Company B
are business partners.
Electronic Data Interchange (EDI)
 A typical manual process looks like this, with lots of paper and
people involvement.
Electronic Data Interchange (EDI)
• The EDI process looks like this — no paper, no
people involved.
Basic Infrastructure for EDI
 format standards to facilitate automated processing by
all users,
 translation software to translate from a user's
proprietary format for internal data storage into the
generic external format and back again,
 value-added networks (VAN) to solve the technical
problems of sending information between computers,
 inexpensive microcomputers to bring all potential
users—even small ones—into the market, and
 procedures for complying with legal rules. It has only
been in the past several years that all of these
ingredients have fallen into place.
EDI Format standard
 Standards provide a common syntax, set of rules, and
procedures for their maintenance and enhancements.
 EDI standards are agreements between users of EDI on how
data is to be formatted and communicated.
 Early EDI efforts in the 1960s used proprietary formats
developed by one firm for exclusive use by its trading
partners.
 This worked well until a firm wanted to exchange EDI
documents with other firms who wanted to use their own
formats. Since the different formats were not compatible,
data exchange was difficult.
 To facilitate the widespread use of EDI, standard formats were
developed so that an electronic message sent by one party
could be understood by any receiver that subscribes to that
format standard.
EDI Format standard
 EDI standards presently define and support more than 200
business documents derived from industry and government
working groups. They provide a framework from which new
standards can be derived as well as a data base of elements to
be used in the creation of new standards.
 In general, EDI formatting standards address the following
issues:
 What documents can be communicated electronically;
 What information is to be included;
 What sequence the information should follow;
 What form the information (i.e., numeric, ID codes, etc.) should
use; and
 The meaning of the individual pieces of information.
Two Most Competing EDI
Standards
American National Standards Institute (ANSI)
X12
EDIFACT developed by UN/ECE, Working
Party for the Facilitation of International
Trade Procedures
ANSI ASC X12
 In 1979, the American National Standards Institute (ANSI)
chartered the Accredited Standards Committee (ASC) X12 to
develop uniform standards for inter-industry electronic data
exchange of business transactions, namely electronic data
interchange.
 The data is grouped to represent all the information required
for a particular business function, such as a purchase order.
 ASC X12 specifies business forms by defining standard data
elements with dictionaries that specify name, length of data
field, description, data type, and meaning.
 A group of standards subcommittees are in place to advise,
critique, and monitor the development of all X12 formats and
make these formats available for business or government use.
UN/EDIFACT
 United Nations/Electronic Data Interchange for
Administration, Commerce and Transport is the international
standard that was developed by the United Nations.
 EDIFACT consists of data elements (a value), segments (a
logical group of data elements), and messages (a collection of
segments relating to a business function), and rules for
combining them.
 The EDIFACT standard provides a set of syntax rules to
structure, an interactive exchange protocol and provides a set
of standard messages which allow multi-country and multi-
industry exchange of electronic business documents.
 EDIFACT is widely used across Europe, mainly due to the fact
that many companies adopted it very early on.
Translation software

Translation software makes EDI work by


translating data from the sending firm's
internal format into a generic EDI format.
Translation software also receives a sender's
EDI message and translates it from the generic
standard into the receiver's internal format.
Need of Value Added Networks
 When firms first began using EDI, most
communications of EDI documents were directly
between trading partners.
 Unfortunately, direct computer-to-computer
communications requires that both firms 1) use similar
communication protocols, 2) have the same
transmission speed, 3) have phone lines available at
the same time, and 4) have compatible computer
hardware.
 If these conditions are not met, then communication
becomes difficult if not impossible.
 A value-added network (VAN) can solve these
problems by providing an electronic mailbox service.
Need of Value Added Networks
 A value-added network (VAN) is a private network
provider hired by a company to facilitate electronic data
interchange (EDI) and/or provide other network services
such as message encryption, secure email and
management reporting.
 A Value-Added Network (VAN) simplifies the
communications process by reducing the number of parties
with which a company needs to communicate. The VAN
accomplishes this by acting as an intermediary between
business partners that share standards based or proprietary
data.
 By using a VAN, an EDI sender need only learn to send and
receive messages to or from one party: the VAN. Since a
VAN provides a very flexible computer interface, it can talk
to virtually any type of computer; it can process EDI with
hundreds of trading partners. In addition, VANs provide
important security elements for dissemination of
information between parties.
Computers
• The fourth building block of EDI is inexpensive
computers that permit even small firms to
implement EDI. Since microcomputers are
now so prevalent, it is possible for firms of all
sizes to deal with each other using EDI.
Procedures for Complying With
Legal Rules
• Legal rules apply to the documents that accompany a
wide variety of business transactions. For example, some
contracts must include a signature or must be an original
in order to be legal.
• If documents are to be transmitted via EDI, companies
must establish procedures to verify that messages are
authentic and that they comply with the agreed-upon
protocol.
• In addition, EDI requires companies to institute error-
checking procedures as well as security measures to
prevent unauthorized use of their computer systems.
Web How EDI works?
There are Five basic steps to sending EDI
documents:
1. Sender prepare the documents,
2. Sender translate the documents into EDI format,
3. Sender connects and transmits the EDI documents
to business partner.
4. Receiver (business partner) receives the EDI
document
5. Receiver translates back the EDI document to the
original business documents format.
Web How EDI works?
How EDI works?
 Electronic Data Interchange (EDI) is the computer-to-computer
exchange of structured information, by agreed message
standards, from one computer application to another by
electronic means and with a minimum of human intervention.
 When sending an EDI document, both parties (trading
partners) must adhere to the same set of rules. These
standards define where and how the information from the
document will be found. Translation software processes the
information differently for sent and received messages and
performs a complete audit of each step to ensure information
is sent or received in EDI format.
 When the translator on the receiving computer reads a
document, it knows where to find the buyer's company name,
order number, purchase items and price, for example. This
information is then sent to the receiver's order entry system
without necessitating manual order entry.
EDI vs. E-mail
S.N EDI E-mail
1 EDI is an acronym of Electronic Data E-mail is an acronym of electronic mail
interchange
2 EDI (Electronic Data Interchange) is E-mail system is basically used for sending
the transfer of data from one message electronically to individuals or
computer system to another by group of individuals in an inter and intra
standardized message formatting, office environment.
without the need for human
intervention.
3 EDI is typically used between E-mail system just distributes any types of
businesses to transfer info such as message by electronic means from one
purchase orders, invoices, routing sender to one or more recipients via a
instructions, pricing, etc. between network.
the 2 companies.
4 EDI documents must be processed Since e-mail messages are processed by
by computers rather than humans, a human, there is no such predefined
standard format must be used so standard format and message
that the computer will be able to standardization rule.
read and understand the
documents.
EDI vs. E-mail
S.N EDI E-mail
5 EDI provides communication No such obligation in e-mail system.
between only those trading
partners that agree to exchange
business documentation in EDI
transactions.
6 EDI message can be automatically E-mail gives ability to receive and respond
processed by receiving computer message. There is human intervention.
without any human intervention or
interpretation or re-keying
7 EDI Van converts companies’ data No such conversion is need in e-mail
into an agreed format through system.
access in a set of protocol type.
8 Under high-secure protection, E-mail system is not secured as EDI system
Digital certificate for verification is
also required in EDI services.
Therefore, EDI services prevent bulk
mails and virus data which occur in
the email delivery.
EDI Benefits
• EDI continues to prove its major business value by
lowering costs, improving speed, accuracy and
business efficiency.
• The greatest EDI benefits often come at
the strategic business level.
• The major benefits realized from implementing EDI
are listed below.
1. Cost savings
2. Speed and accuracy
3. Increase in business efficiency
4. Strategic business level
EDI Benefits
• Cost savings:
– Expenses associated with paper, printing, reproduction, storage,
filing, postage and document retrieval are all reduced or
eliminated when you switch to EDI transactions.
– Errors due to illegible faxes, lost orders or incorrectly taken
phone orders are eliminated, saving your staff valuable time
from handling data disputes
• Speed and accuracy:
– EDI can speed up your business cycles (reduce the order-to-cash
cycle time) improving business partner transactions and
relationships. Exchange transactions in minutes instead of the
days or weeks of wait time from the postal service
– Improves data quality, reduction in transactions with errors—
eliminating errors from illegible handwriting, lost faxes/mail and
keying and re-keying errors
EDI Benefits
• Increase in business efficiency:
– Automating paper-based tasks allows your staff to
concentrate on other higher-value tasks and provides
them with the tools to be more productive
– Quick processing of accurate business documents leads to
less re-working of orders, fewer stock outs and fewer
cancelled orders
– Automating the exchange of data between applications
across a supply chain can ensure that business-critical data
is sent on time and can be tracked in real time. Sellers
benefit from improved cash flow and reduced order-to-
cash cycles
– Shortening the order processing and delivery times means
that organizations can reduce their inventory levels
EDI Benefits
• Strategic business level:
– Enables real-time visibility into transaction status. This in
turn enables faster decision-making and improved
responsiveness to changing customer and market
demands, and allows businesses to adopt a demand-
driven business model rather than a supply-driven one
– Shortens the lead times for product enhancements and
new product delivery
– Streamlines your ability to enter new territories and
markets.
EDI Roles and Application Area
• EDI is used across many different industry sectors. It
is applied to address many different business
processes and industry challenges.
• Following are different scenarios in industries that
use EDI extensively:
1. International or cross-border trade
2. Electronic funds transfer
3. Health care EDI for insurance claims processing
4. Manufacturing & retail procurement
5. Ticket, Hotel
Role of EDI in international or
cross-border trade
• EDI has always been very closely linked with
international trade. EDI facilitates the smooth flow of
information and it reduces paper work. EDI benefits
for international trade are:
– Reduced transaction expenditures
– Quicker movement of imported & exported goods
– Improved customer service through “track & trace”
programs
– Faster customs clearance & reduced opportunities for
corruption, a huge problem in trade
Interbank Electronic Funds
Transfer (EFT)
EFTS is credit transfers between banks where funds
flow directly from the payer’s bank to the payee’s
bank.
The two biggest funds transfer services in the United
States are the Federal Reserve’s system, Fed wire, &
the Clearing House Interbank Payments System
(CHIPS) of the New York clearing house.
Automated Clearinghouse (ACH) transfers are used
to process high volumes of relatively small-dollar
payments for settlement in one or two business
days.
Health care for insurance
claims processing
 EDI is becoming a permanent fixture in both insurance &
health care industries as medical provider, patients, & payers
 Electronic claim processing is quick & reduces the
administrative costs of health care.
 Using EDI software, service providers prepare the forms &
submit claims via communication lines to the value-added
network service provider
 The company then edits sorts & distributes forms to the
payer. If necessary, the insurance company can electronically
route transactions to a third-party for price evaluation
 Claims submission also receives reports regarding claim status
& request for additional Information
Manufacturing & retail
procurement
 In manufacturing, EDI is used to support just-in-time.
 In retailing, EDI is used to support quick response
 Companies using Just-In-Time (JIT) & EDI calculates how
many parts are needed each day based on the production
schedule & electronically transmit orders.
 EDI leads to Quick Response to both supplier and customer
– For the customer, QR means better service & availability of
a wider range of products
– For the retailer & supplier, QR may mean survival in a
competitive marketplace
– Much focus of QR is in reduction of lead times using event-
driven EDI
EDI in Automotive Industry
JIT and Lean Manufacturing processes are central to
the smooth running of many production lines around
the world and EDI provides a fast and efficient way to
transfer business documents in order to support
these types of manufacturing processes.
Providing visibility of inventory levels and notification
of when shipments are due to arrive at the
production line are critical to making JIT and Lean
manufacturing processes a success.
EDI in Financial Services Industry
 Financial services firms relies on the ability to manage
complex information flows whether processing payables and
receivables, supporting post-trade securities flows,
transmitting merchant settlement files, or enabling group
benefits eligibility claims.
 The growth of international trade has created
interdependencies between buyers and suppliers across
geographies, resulting in the globalization of the financial
supply chain. Complexities arise when working across
international boundaries, including differences in currencies,
regulations and accounting practices. EDI mitigates these
complexities by aligning financial supply chain information
flows with the movement of goods in the physical supply
chain.
EDI in Retail Industry
 The retail sector has enjoyed the benefits of EDI for decades.
Pioneered by the likes of Walmart and Proctor & Gamble in
the 1980s, vendor managed inventory (VMI) has become a
driving force for the industry to cut costs while increasing
customer service. It is the concept at the core of the grocery
industry’s “quick response” approach to product flow across
the supply chain.
 In VMI, the supplier makes the main inventory replenishment
decisions for the consuming organization. The result is that
the supplier has much greater control of inventory, leading to
less waste or over-supply and the replenishment cycle often
moves from monthly to weekly or daily, increasing customer
service.
Security and Privacy issues of EDI
Confidentiality requires that all communications
between parties are restricted to the parties involved
in the transaction. This confidentiality is an essential
component in user privacy, as well as in protection of
proprietary information and as a deterrent to theft of
information services.
Confidentiality is concerned with the unauthorized
viewing of confidential or proprietary data that one
or both of the trading partners does not want known
by others. Confidentiality is provided by encryption.
Layers of EDI
• EDI is the structured transmission of data
between organizations by electronic means.
• The architecture of EDI is divided into four
layers-
1- Application Layer
2- Standards translation Layer
3- Transport Layer
4- Physical Network Infrastructure Layer
Semantic (Application) Layer
• The Semantic layer describes the business
application that is driving EDI. This layer of EDI
translates business application into request for
quotes, purchase orders, acknowledgement
and invoices.
• This layer is specific to a company, and the
software it uses. i.e. the user interface and
content visible on the screen are tailored or
customized to local environment.
Standard Translation Layer
• To facilitate the transfer of computer files between
two “trading partners’ requires that the computer
application of both sender and receiver use a
compatible format EDI.
• Both trading partners must use a standard format of
EDI and a translation software application that
creates an EDI file format data.
• There are two competing standards
– American National Standards Institute(ANSI)X12
– EDIFACT developed by UN/ECE
Packing (Transport) Layer
• Transport layer is a non electronic way of
sending the business documents from one
company to another company similar to mail,
postal services or private career,
telecommunications, fax etc.
• Now a days the transportation method for EDI
is more complex with compare to e-mail.
– Emphasis of EDI is on automation
– EDI also need to follow certain protocol and legal
status
Physical (Infrastructure) Layer
• The physical layer of EDI also called the
infrastructure layer.
• This layer defined the component
communication path (Dial up lines) Internet,
value-added network, etc for EDI data
transaction.
• It describes the network structure of EDI that
support e-commerce in which information can
be build and what are the communications
established over which EDI data transfer from
one customer to other customers.
Security and Privacy issues of EDI
Encryption is the process of scrambling of data
(transforming plain text or data into cipher text) that
cannot be read by anyone other than the sender and
receiver. Encryption prevents hackers from viewing
data that is transmitted over telecommunications
channels. There are two basic encryption schemes,
private-key and public-key encryption.
Security and Privacy issues of EDI
EDI Authentication
– Both parties should feel comfortable that they are
communicating with the party with whom they
think they are doing business. A normal means of
providing authentication is through the use of
passwords.
– The latest technology to provide authentication is
through the use of digital certificates that function
much like ID cards. The digital certificate has
multiple functions, including browser
authentication.
Security and Privacy issues of EDI
 EDI Data Integrity
– Data sent as part of a transaction should not be modifiable in
transit. Similarly, it should not be possible to modify data in
storage. Data integrity is a guarantee that what was sent by the
sender is actually what is received by the receiver. This is
necessary if there is a need to ensure that the data has not been
changed either inadvertently or maliciously.
– The normal mechanism for acquiring data integrity is for the
sender to run an algorithm against the data that is being
transmitted and to transmit the result of the algorithm
separately from the transmission. Upon receipt of the
transmission, the receiver runs the identical algorithm and then
compares the results. If the results are identical, then data has
not been modified.
Private-key encryption
• Private-key encryption requires that both sending
and receiving parties have the same private digital
encryption keys to encrypt and decrypt message. The
sender encrypts the data using a key.
• The receiver then decrypts the message using the
same key. There are several disadvantages to private-
key encryption. In order to remain secure, the keys
must be changed periodically (requires a different set
of keys for each transaction) and the users must be
in contact with sender as to the actual keys being
used.
Public-key encryption
• Public-key encryption is gaining wide spread acceptance as
the preferred encryption technology. With public-key
encryption, a message recipient generates a matched set of
keys, one public key and one private key. The recipient
broadcasts the public key to all senders or to a public location
where the key can be easily retrieved. Any sender who needs
to send the receiver an encrypted message uses the
recipient's public key to encrypt the message.
• The private key, which is held in private by the recipient, is the
only the key that can be used to trace messages encrypted
with the matched public key. This schema requires that the
private key cannot be generated from the public key.
Public Key Cryptography Case
Characteristics of Public-key
Encryption technology
 Public key cryptography solves private key encryption
problem of having to exchange secret key
 It uses two mathematically related digital keys – public
key (widely disseminated) and private key (kept secret by
owner)
 Both keys (public and private) are used to encrypt and
decrypt message
 Once public key is used to encrypt message, same key
cannot be used to decrypt message
 For example, sender uses recipient’s public key to
encrypt message; recipient uses his/her secret private
key to decrypt it
Evolution of EDI as Driver of E-
Commerce
 In fact, B2B e-commerce did not originate with the Internet,
but root technologies such as EDI were first developed in mid-
1970s and 1980s.
 EDI is a broadly defined communications protocol for
exchanging documents among computers using technical
standards developed by the American National Standards
Institute (ANSI X12 standards) and international bodies such
as the United Nations (EDIFACT standards).
 EDI was developed to reduce the cost, delays, and errors
inherent in the manual exchanges of documents such as
purchase orders, shipping documents, price lists, payments,
and customer data.
Evolution of EDI as Driver of E-
Commerce
EDI has evolved significantly since 1980s. Initially, EDI
focused on document automation (first stage).
Procurement agents created purchase orders
electronically and send them to trading partners,
who in turn shipped order fulfillment and shipping
notices electronically back to the purchaser. Invoice
payment and other documents followed.
These early implementations replaced the postal
system for document transmission, and result in
same-day shipping of orders, reduced errors, and
lower costs.
Evolution of EDI as Driver of E-
Commerce
The second stage of EDI development began in the
early 1990s, driven largely by the automation of
internal industrial processes and movement toward
just-in-time production and continuous production.
 The new methods of production called for greater
flexibility in scheduling, shipping, and financing of
supplies.
To support the new automated production processes
(lean-manufacturing) used by manufactures, EDI was
used to eliminate purchase orders and other
documents entirely, replacing them with production
schedules and inventory balances.
Evolution of EDI as Driver of E-
Commerce
 In the third stage, of EDI, beginning in the mid 1990s,
suppliers of large manufacturing firms were given online
access to selected parts of the purchasing firm’s production
and delivery schedules, and under long term contracts were
required to meet those schedules in their own without
intervention by firm purchasing agents.
 These systems required standardization of business processes
and resulted in automation of production, logistics, and many
financial processes.
 This third stage of EDI introduced the era of continuous
replenishment. For instance, Wal-Mart and Toys“R”Us
provide their suppliers with access to their store inventories,
and the suppliers are expected to keep the stock of items on
the self within pre-specified targets.
Evolution of EDI as Driver of E-
Commerce
 Today, EDI must be viewed a general enabling technology that provides for
exchange of critical business information between computer application
supporting a wide variety business processes.
 EDI is an important industrial network technology, suited to support
communications among a small set of strategic partners in direct, long-
term trading relationships.
 The technical platform of EDI has changed from mainframe to personal
computers; the telecommunications environment is changing from private
dedicated networks to the Internet (referred to as Internet-based EDI or
just Internet EDI).
 Most industry groups are moving from XML as the language for expressing
EDI commercial documents and communication. EDI is developing through
new standards and integration with Internet technologies to achieve
Internet EDI.
Limitation of EDI
 The strength of EDI is its ability to support direct
commercial transactions among strategically related
firms in an industrial network, but this is its weakness as
well.
 EDI is not well suited for the development of electronic
marketplaces where thousands of suppliers and
purchasers meet in a digital arena to negotiate prices.
 EDI supports direct bilateral communications among a
smell set of firms and does not provide for price
transparency among a large numbers of suppliers, does
not scale easily to include new participants, and is not
real time communications environment.
Limitation of EDI
• It is instead a “batch processing” environment in which
messages are exchanged in batches (although even this
feature is changing as EDI moves towards XML and
Internet).
• EDI dos not have a rich communication environment that
can simultaneously support e-mail messaging, sharing of
graphics documents, network messaging, or user friendly
flexible database creation and management.
• EDI is also an expensive proposition, and staff of
dedicated programmers is required to implement it in
large firms; in some cases, a considerable amount of time
is also needed to program existing enterprise system to
work with EDI protocols.

You might also like