E Commerce Coursefile
E Commerce Coursefile
UNIT-I
Introduction:
Electronic commerce is a modern business methodology that addresses the
needs of organization, merchants and the consumers to cut costs while
improving the quality of goods and services and increasing the speed of service
delivery.
• It takes place between companies, between companies and their customers, or between
companies and public administrations.
1. Electronic Markets
• Present a range of offerings available in a market segment so that the purchaser can
compare the prices of the offerings and make a purchase decision.
Example: Airline Booking System
• Communicated from one computer to another without the need for printed orders and
invoices & delays & errors in paper handling
Example: EDI is used in the large market chains for transactions with their suppliers
3. Internet Commerce
• It is use to advertise & make sales of wide range of goods & services.
• This application is for both business to business & business to consumer transactions.
Example: The purchase of goods that are then delivered by post or the booking of tickets
that can be picked up by the clients when they arrive at the event.
2. If it is doubled they will not buy and at the service provider economics will increased
then network operators might look to advertises to fill the gap
2. Home Shopping:
• It is already in wide use.
3. Home Entertainment:
• It is another application for e-commerce
• Customer can watch movie, play games, on-screen catalogs, such as TV guide.
• In Home entertainment area, customer is the control over programming
• In Table tells the, What will be required in terms of Television-based technology for this
telemart to become a reality
The Telemart: Present and Future Functions
• Compressing and decoding The transition to digital satellite
a digital signal(images are and cable network head broad
compress to reduce quantity casting involves linking the TV
of information) to decoder to reconvert into an
analog signal
• Decoding a scrambled The broad casting of pay channel
signal requires the encryption of the
signal on emission & unscrambled
• Rapid loading of program An increase in the no. of individual
on memory interactive services is possible
only if n/w overloading is kept
minimum
• Electronic money or Once separated from the telephone,
card payment terminal telemart will need a keyboard
liked up to the TV set in order to
ensure interactivity. The
keyboard will have a payment
connection to simplify the
billing process
Advanced Services
Size of the home Entertainment Market:
• Entertainment services are play a major role in e-commerce
• This prediction is underscored by the changing trends in consumer behavior.
• It is shown in Table
Impact of Home entertainment on traditional industries:
• This will have devastating effects on theater business
• Economic issues might allow theaters to maintain an important role in the movie industry
• Today average cable bill is approximately $30 a month
• Seller contacts his bank or billing service to verify the validity of the cash
• The benefits of electronic processing include the reduction in credit losses, lower
merchant transaction costs, & faster consumer checkout & merchant-to-bank settlement
• Step2: The point-of-sale software directs the transaction information to the local network
• Step3: System verifies the source of the transaction and routes it.
• Step4: In this, transaction count and financial totals are confirmed between the terminal
and the network
• Step5: In this, the system gathers all completed batches and processes the data in
preparation for settlement
A merchant client takes one of two forms:
• Merchants are charged a flat fee per transaction for authorization and data capture
services
• The other form of billing allows merchants to pay a ”bundled” price for authorization,
data capture, & settlement
Cost of Electronic Purchasing:
• Cash seems to be preferable to electronic payments, such as, on-line debit, credit, and
electronic check authorization
• Consumers appear to spend more when using cards then when spending cash
• The actual details of OMC vary from industry to industry and also for individual products
and services
• The sales force broadcasts ads (direct marketing), sends personalized e-mail to customers
(cold calls), or creates a WWW page
• Not, all customers’ orders are created equal; some are better for the business.
Order Scheduling
• In this phase the prioritized orders get slotted into an actual production or operational
sequence.
• This task is difficult because the different functional departments- sales, marketing,,
customer service, operations, or production- may have conflicting goals, compensation
systems, & organizational imperatives:
Production people seek to minimize equipment changeovers, while marketing & customer
service reps argue for special service for special customers.
• The emerging electronic payment technology labeled electronic funds transfer (EFT).
• Retailing payments
SCCE_CSE Page 30
1) Digital Token-Based Electronic Payment Systems
Electronic tokens are three types:
1. Cash or Real-time
• Transactions are settled with exchange of electronic currency.
2. Debit or Prepaid
• Users pay in advance for the privilege of getting information.
• Ex: prepaid payment mechanisms are stored in smart cards and electronic purses that
store electronic money.
3. Credit or Postpaid
• The server authenticates the customers and verifies with the bank that funds are adequate
before purchase.
1. Monetary value
2. Interoperability
3. Retrievability
4. Security
• This method involves a pair of numeric keys: one for locking (encoding) and the other for
unlocking (decoding). (Through public key and private key).
SCCE_CSE Page 31
• Maintaining enough money in the account to bank the purchase.
Some customers might prefer to purchase e-cash with paper currency, either to maintain
anonymity or because they don’t have a bank account.
• As soon as the customer wants to make a payment, the software collects the necessary
amount from the stored tokens.
Electronic Checks
• It is another form of electronic tokens.
• In the given model shown in fig, buyers must register with third-party account server
before they are able to write electronic checks.
4. Financial risk is assumed by the accounting server & may result in easier acceptance
SCCE_CSE Page 32
Smart Cards Electronic Payment Systems
• Smart cards have been in existence since the early 1980s and hold promise for secure
transactions using existing infrastructure.
• Smart cards are credit and debit cards and other card products enhanced with
microprocessors capable of holding more information than the traditional magnetic stripe.
• The smart card technology is widely used in countries such as France, Germany, Japan,
and Singapore to pay for public phone calls, transportation, and shopper loyalty
programs.
– It includes access to multiple accounts, such as debit, credit, cash access, bill
payment & multiple access options at multiple locations
SCCE_CSE Page 33
Electronic Purses
• To replace cash and place a financial instrument are racing to introduce “electronic
purses”, wallet-sized smart cards embedded with programmable microchips that store
sums of money for people to use instead of cash for everything
2. It verifies card is authentic & it has enough money, the value is deducted from balance on
the card & added to an e-cash & remaining balance is displayed by the vending machine.
– Credit cards
• Removes the amount of the charge from the cardholder’s account and
transfers it to the seller’s bank.
– Charge cards
Advantages:
Disadvantages:
• A merchant bank or acquiring bank is a bank that does business with merchants who
want to accept payment cards.
SCCE_CSE Page 34
• Software packaged with your electronic commerce software can handle payment card
processing automatically.
• Electronic cash is a general term that describes the attempts of several companies to
create value storage and exchange system that operates online in much the same way that
government-issued currency operates in the physical world.
– Privacy
– Security
– Independence
– Portability
– Convenience
SCCE_CSE Page 35
Electronic Cash Storage
• Two methods
– On-line
• Individual does not have possession personally of electronic cash
• Trusted third party, e.g. e-banking, bank holds customers’ cash accounts
– Off-line
– Dishonest merchant
• Merchant’s risk
– Disputed charges
• Atomic transactions
• Anonymity of buyer
• Economic and computational efficiency: allow micropayments
SCCE_CSE Page 36
The payment interface must be as easy to use as
• Scalability in number a telephone.
of servers and users
• Database integration. With home banking, for
Designing Electronic ex, a customer wants to play with all his
Payment systems accounts.
It includes several factors: • Brokers. A “network banker”-someone to
broker goods & services, settle conflicts, &
• Privacy. A user ‘inancial transactions electronically-must be in
expects to trust in a place
secure system; just as a
telephone is a safe • Pricing. One fundamental issue is how to price
payment system services. For e.g., from cash to
• Security. A secure bank payments, from paper-based to e-cash.
system verifies the The problem is potential waste of resources.
identity of two-party
transactions through • Standards. Without standards, the welding of
“user authentication” different payment users into different networks
& reserves flexibility & different systems is impossible.
to restrict
information/services
through access INTER ORGANIZATIONAL COMMERCE:
control
Electronic Data Interchange
• Intuitive interfaces.
• Electronic Data Interchange (EDI) - interposes communication of business information in
standardized electronic form
• Prior to EDI, business depended on postal and phone systems that restricted
communication to those few hours of the workday that overlap between time zones
Why EDI
SCCE_CSE Page 37
Benefits of EDI
• Cost & time savings, Speed, Accuracy, Security, System Integration, Just-In-Time
Support.
• Reduced paper-based systems, i.e. record maintenance, space, paper, postage costs
SCCE_CSE Page 38
EDI semantic layer:
– Price quotes
– Purchase orders
– Acknowledgments
– Invoices
Standards translation:
– Emphasis on automation
– EDI has certain legal status
SCCE_CSE Page 39
Physical network infrastructure layer
• Dial-up lines, Internet, value-added network, etc.
EDI in Action
• The fig shows the information flow when paper documents are shuffled between
organizations via the mailroom
• When the buyer sends a purchase order, then relevant data extracted & recorded on a hard
copy.
• This hard copy is forwarded to several steps, at last manually entered into system by the
data entry operators
• This process is somewhat overhead in labor costs & time delays.
EDI in Action
SCCE_CSE Page 40
8. Seller sends invoice to buyer
Benefits of EDI
• Cost & time savings, Speed, Accuracy, Security, System Integration, Just-In-Time
Support.
• Reduced paper-based systems, i.e. record maintenance, space, paper, postage costs
• Trade efficiency, which allows faster, simpler, broader & less costly transactions
SCCE_CSE Page 41
Role of EDI in international trade
• EDI facilitates the smooth flow of information
4. Faster customs clearance & reduced opportunities for corruption, a huge problem in trade
• Electronic claim processing is quick & reduces the administrative costs of health care.
• Using EDI software, service providers prepare the forms & submit claims via
communication lines to the value-added network service provider
• The company then edits sorts & distributes forms to the payer. If necessary, the insurance
company can electronically route transactions to a third-party for price evaluation
• Claims submission also receives reports regarding claim status & request for additional
information
SCCE_CSE Page 42
4. Manufacturing & retail procurement using EDI
• These are heavy users of EDI
• Delivery has to be responsive, or it will cost too much in money & time.
• Getting data to suppliers quickly
• For the retailer & supplier, QR may mean survival in a competitive marketplace
2. Delayed (USPS). The “mailbox rule” provides that an acceptance communicated via
USPS mail is effectively when dispatched
SCCE_CSE Page 43
• If digital signatures are to replace handwritten signatures, they must have the same legal
status as handwritten signatures.
• It provides a means for a third party to verify that notarized object is authentic.
Traditional EDI
• It replaces the paper forms with almost strict one-to-one mappings between parts of a
paper form to fields of electronic forms called transaction sets.
• It covers two basic business areas:
1. Trade data Interchange (TDI) encompasses transactions such as purchase orders, invoice
& acknowledgements.
2. Electronic Funds Transfer (EFT) is the automatic transfer of funds among banks & other
organizations
• Old EDI is a term created by those working on the next generation of EDI standards in
order to differentiate between the present & the future.
Old EDI
• Automating the exchange of information pertinent to business activity
New EDI
• It is refocusing of the standardization process.
• In this, the structure of the interchanges is determined by the programmer who writes a
program.
Open EDI
• It is a business procedure that enables e-commerce to occur between organizations where
the interaction is of short duration.
• It is process of doing EDI without the upfront trading partner agreement that is currently
signed by the trading partners
SCCE_CSE Page 44
• The goal is to sustain ad hoc business or short-term trading relationships using simpler
legal codes.
• It is a law of contract within the context of e-commerce where transactions are not
repeated over long period of time.
– Data Segments are logical groups of data elements that together convey
information
• EDIFACT has fewer data elements & segments & only one beginning segment (header),
but it has more composites.
• It is an ever-evolving platform
1. Business application
3. EDI Translator
SCCE_CSE Page 45
4. EDI envelope for document messaging
• These 4 layers package the information & send it over the value-added network to the
target business, which then reverses the process to obtain the original information
3. If there are on the same type of computer, the data move faster
SCCE_CSE Page 46
• Purchase orders, invoices, drawings, e-mail- all could be sent with end-to-end
acknowledgment of message receipt.
• Disadvantage is EDI-enabling VANs is that they are slow & high-priced, charging by the
no. of characters transmitted
Internet-Based EDI
Several factors make internet useful for EDI:
SCCE_CSE Page 47
UNIT-III
➢ It is of two types
1. Private commerce
2. Public commerce
➢ In a general sense, the term Information System (IS) refers to a system of people, data
records and activities that process the data and information in an organization, and it
includes the organization's manual and automated processes.
➢ In a narrow sense, the term information system (or computer-based information system)
refers to the specific application software that is used to store data records in a computer
system and automates some of the information-processing activities of the organization.
➢ These forces are commanding a rethinking of the importance of the networks-computers
and communications and their role in the better utilization of corporate information in
operational and analytical decision making.
Global suppliers
public electronic commerce
The information
banks superhighway
I
firewall
Accounting engineering
E-COMMERCE 5
SCCE_CSE Page 1
➢ Information architecture (IA) is the art of expressing a model or concept of information
used in activities that require explicit details of complex systems.
➢ Among these activities are library systems, content Management Systems, web
development, user interactions, data base development, programming, technical writing,
enterprise architecture, and critical system software design.
Most definitions have common qualities: a structural design of shared environments, methods of
organizing and labelling websites, intranets, and online communities, and ways of bringing the
principles of design and architecture to the digital landscape
➢ The common focus in most of these modern management particles is the use of
technology for improving efficiency and eliminating wasteful tasks in business
operations.
➢ Efficient operations of the macro forces and internal commerce are:
➢ Total quality management
SCCE_CSE Page 2
➢ The Oxford University Press defines global marketing as “marketing” on a worldwide
scale reconciling or taking commercial advantage of global operational differences,
similarities and opportunities in order to meet global objectives.”
Global marketing:
➢ When a company becomes a global marketer, it views the world as one market and
creates products that will only require weeks to fit into any regional marketplace.
Marketing decisions are made by consulting with marketers in all the countries that will
be affected. The goal is to sell the same thing the same way everywhere.
The Four elements of global marketing of marketing:
Product:
➢ A global company is one that can create a single product and only have to tweak elements
for different markets. For example coca-cola uses two formulas (one with sugar, one
with corn syrup) for all markets.
Price:
➢ Price will always vary from market to market. Price is affected by many variables: cost
of product development (produced locally or imported), cost of ingredients, cost of
delivery (transportation, tariffs, etc.), and much more.
Placement:
➢ How the product is distributed is also a country-by-country decision influenced by how
the competition is being offered to the target market. Using Coca-Cola as an example
again, not all cultures use vending machines.
Promotion:
➢ After product research, development and creation, promotion is generally the largest line
item in a global company’s marketing budget. At this stage of a company’s development,
integrated marketing is the goal.
➢ The global corporation seeks to reduce costs, minimize redundancies in personnel and
work, maximize speed of implementation, and to speak with one voice.
Disadvantages:
➢ Differences in consumer needs, wants, and usage patterns for products
Marketing Research:
➢ It involves the identification, collection, analysis, and dissemination of information.
Each phase of this process is important.
➢ Finally, the findings, implications and recommendations are provided in a format that
allows the information to be used for management decision making and to be acted upon
directly.
➢ The procedures followed at each stage are methodologically sound, well documented,
and, as much as possible, planned in advance.
➢ Marketing research uses the scientific method in that data are collected and analyzed to
test prior notions or hypotheses.
-Flat hierarchy
-High transparency
Vertical Organization:
➢ A vertical market is a market which meets the needs of a particular industry: for example,
a piece of equipment used only by semiconductor manufacturers. It is also known as a
niche market.
➢ Vertical market software is software aimed at addressing the needs of any given business
within a discernible vertical market.
Horizontal organization:
Examples
➢ In technology, horizontal markets consist of customers that share a common need that
exists in many or all industries.
➢ For example, customers that need to purchase computer security services or software
exist in such varied industries as finance, healthcare, government, etc.
➢ Horizontal marketing participants often attempt to meet enough of the different needs
of vertical markets to gain a presence in the vertical market.
➢ An example could be software that manages services in hotels - amenities solutions.
➢ In recent years, virtual enterprises have gained much attention as more and more firms
from computer chip manufacturing to aircraft manufacturing.
➢ Virtual organization is defined as being closely coupled upstream with its suppliers and
downstream with its customers.
➢ Virtual organization has been variously referred to as network organizations, organic
networks, hybrid networks and value-adding partnership.
➢ The main goal of electronic brokerages organization is to increase the efficiency of the
internal marketplace.
➢ Internal markets are beginning to appear not only in corporations but even in non
business institutions like the government.
➢ They are created inside organizations, allowing firms, suppliers, government agencies to
meet the new challenges of the fast-changing environment.
customer
customer
internal markets
customer Order
Design
customer management
customer order & financial brokerages
accounting
Manufacturing
E-COMMERCE 24
➢ In last decade, a vision of speeding up or automating routine business tasks has come to
be known as “work-flow automation.
➢ This vision has its root in the invention of the assembly line and the application of
Taylor's scientific management principles.
➢ Today, a similar trend is emerging in the automation of knowledge-based business
processes called work-flow automation.
➢ The goal of work-flow automation is to offer more timely, cost-effective, and integrated
ways to make decisions.
➢ Typically, work-flows are decomposed into steps or tasks, which are task oriented.
Work-Flow Coordination:
➢ The key element of market-driven business is the coordination of tasks and other
resources throughout the company to create value for customer.
➢ To this end, effective companies have developed horizontal structures around small
multifunctional teams that can move more quickly and easily than businesses that use the
traditional function-by-function, sequential approach.
➢ Some of the simplest work-flow coordination tools are electronic forms routing
applications such as lotus notes.
➢ As the number of parties in the work flow increases, good coordination becomes crucial.
Middleware is maturing:
➢ By this users or third-party providers need to learn how to develop work-flow
applications within middleware environment.
➢ "Mass Customization" is the new frontier in business competition for both manufacturing
and service industries.
Implementation:
➢ Many implementations of mass customization are operational today, such as software-
based product configurations which make it possible to add and/or change functionalities
of a core product or to build fully custom enclosures from scratch.
➢ Technology has moved into products, the workplace, and the market with astonishing
speed and thoroughness.
➢ Lambert and Cooper (2000) identified the following components which are:
-Organization structure
-Management methods
➢ Reverse Supply Chain Reverse logistics is the process of planning, implementing and
controlling the efficient, effective inbound flow and storage of secondary goods and
related information opposite to the traditional supply chain direction for the purpose of
recovering
UNIT-IV
CORPORATE DIGITAL LIBRARY
➢ DIMENSIONS OF THE INTERNAL ELECTRONIC COMMERCE SYSTEM
➢ MARKETING A BUSINESS CASE FOR A DOCUMENT LIBRARY
2. Presentation of documents.
➢ Organization needs online –transactions for design, production, logistics and profitability.
Types of On-line transaction:
➢ Two types of on-line transaction are :
➢ OLAP refers to the activity involved in searching the wealth of data residing throughout
an enterprise for trends, opportunities.
Presentation or visualization:
➢ This process will highlight the trouble spots and area of opportunities.
2. Collecting of information.
3. Queue of information.
4. Organizing of information.
Digital Library Layer
➢ Many organizations manage their information through corporate library, if it provide the
architecture to model, map, integrate & information in digital documents is called digital
library.
Data warehouses:
➢ It is a central repository for combining and storing vast amount of data from diff sources.
Logical cases
Customers Government
&stake-holders & contracts
regulations
R&D
Sales &
Corporate engineering
marketing Human
Service and
digital library
resources
supports Manufacturing
Documentation,
and
manuals, Accounting
production
records
and finance
E-COMMERCE 14
Digital Document Management Issues and Concerns
➢ Ad hoc documents: Letters, finance reports, manuals are called ad hoc documents,
which are prepared by managers &professionals.
Document Imaging
➢ Document imaging emulates microfiche and microfilm.
➢ An imaging system passes appear document through a scanner that renders it digital and
then stores the digital data as a bit-mapped image of document.
➢ The problem with the imaging approach is that the output contains only images not text.
➢ TIFF (tag image file format): format for interchange of bit-mapped images.
➢ ITU-TSS (international telecommunication union-telecommunication standardization
sector) Group IV T.6 facsimile: this standard is used for compression and exchange of bit-
mapped files.
Structured Documents
Standards of Hypermedia:
➢ HyTime: it adds time based relationships like synchronization, it is extension of SGML.
Active documents
➢ Active document represents what is known as document oriented computing.
Document Constituencies:
➢ The emerging document processing & management strategies must address these
constituencies.
➢ They need system to access distributed repositories& to manipulate them in a number of
ways.
Document-oriented processes
➢ Document creation
➢ Business modeling: defines the structure and processes of the business environment.
Corporate Data Warehouses
search and
clients clients
retrieval
Middleware for
data access
E-COMMERCE 27
➢ Data warehouse is needed as enterprise wide to increase data in volume and complexity.
Physical data warehouse: It gathers corporate data along with the schemas and the processing
logics.
Logical data warehouse: It contains all the Meta data and business rules.
Data library: This is sub set of the enterprise wide data warehouse.
Decision support system (DSS): These are the applications but make use of data warehouse
Managing data
➢ Translation
➢ Summarizing
➢ Packaging
➢ Distributing
➢ Garbage collection
➢ Timely and accurate information become an integral part of the decision-making process.
➢ User can manage and access large volumes of in one cohesive framework.
➢ Marketing research.
➢ Retailers vs manufacturers
Retailers’ vs Manufacturers:
➢ The role of Retailers and manufacturers are fast reversing in electronic commerce.
➢ It gives information to the micro marketers not only about its own business but also
consumer’s information.
➢ Consumer target is two-way flow of communication between seller and buyer.
➢ Direct mail and telemarketing are two fast growing ways to micro market.
➢ Today, exorbitant advertising cost represents the barrier to reaching the customer
effectively. Internet and other networks plays good role in advertising.
➢ The major difference between the internet and other I-way advertising media are
ownership and membership fees.
➢ There are very good reasons for embracing the inevitability of growing of commercial
advertising on the internet:
- Advertising conveys much needed information
- Advertising generates significant revenue
➢ Advertising process
➢ Core content
➢ Supporting content
➢ Two different advertising paradigms are emerging in the on-line world, they are:
➢ Broadcasting message provides a means for reaching a great number of people in short
period of time.
➢ It mimics the traditional model, in which customer id exposed to the advertisement
during TV programming.
➢ Disadvantage of the direct mail include relatively high cost per contact.
➢ Billboards
➢ Catalog model is the least intrusive model but requires active search on the part of
customer.
➢ Disadvantage of yellow page include lack of timeliness and little creative flexibility.
Marketing Research
➢ Market research is extremely important for companies in terms of how they allocate their
advertising dollars in sales promotions, how they introduce new products, how they target
new markets.
Broadly marketing research is divided into three faces:
➢ Data collection
➢ Data organization
Data collection:
Markets mainly relied on source database for understanding consumer behavior.
➢ Source data base mainly comprise of numeric information.
➢ Delivery of source database services fallows two main patterns.
➢ Data collect and collate data, making it available by data base producers.
➢ Data collect and collate data, making it available by central hosts like CompuServe,
American online..etc.
Data organization:
➢ Everyone is collecting data from electronic commerce, but very few are organizing it
effectively for developing a marketing strategy.
The key abilities in their environment are:
➢ Leverage its established database into customized offerings by audience and markets.
➢ Market research is undergoing major changes; the next generation of source database will
definitely include multimedia information.
UNIT-V
➢ Information filtering.
➢ Using the knowledge of the environment, the system attempts to locate the information
that matches the given description.
➢ Search and retrieval methods that refine queries through various computing techniques
such as nearest neighbors, them variants of original query.
Information filtering:
2. Remote filter
➢ Local filters: local filters work on incoming data to a PC, such as news feeds.
➢ Remote filters: remote filters are often software agents that work on behalf of the user
and roam around the network from one data base to another.
CONSUMER SEARCH AND RETRIVAL
➢ SEARCH AND RESOURCE DISCOVERY PARADIGMS
➢ INFORMATION FILTERING
➢ Search & retrieval system are designed for unstructured & semi structural data.
➢ First is, the user formulates a text based query to search data.
➢ Second is, the server interprets users query, performs the search and returns the user a list
of documents.
➢ Third is, the user selects documents from the hit list and browses them, reading and
perhaps printing selected portions of retrieved data.
.
➢ Client
➢ Sever
➢ Indexer
➢ It uses an an English language query front end a large assortment of data bases that
contains text based documents.
➢ It allows users search the full text of all the documents on the server.
➢ Users on diff platforms can access personal, company, and published information from
one interface I.e. text, picture, voice, or formatted document.
➢ Anyone can use this system because it uses natural language questions to find relevant
documents.
➢ Then the servers take the user questions and do their best to find relevant documents.
➢ Then WAIS returns a list of documents from those users selects appropriate documents.
➢ Today, the Netscape or NCSA mosaic browser with the forms capability is often used as
a front-end to talk to WIAS sever.
Search Engines:
➢ To find every item that matches a query, no matter where it is located in the file system.
➢ It uses both keywords and information searching to rank the relevance of each document.
➢ Other approaches to data searching on the web or on other wide area networks are
available.
Indexing methods:
➢ To accomplish accuracy and conserve disk space, two types of indexing methods are
used by search engines.
They are:
1. File-level indexing
2. Word-level indexing
File-level indexing:
➢ It associates each indexed word with a list of all files in which that word appear at least
once.
➢ It does not carry any information about the location of words within the file.
Word-level indexing:
➢ It is more sophisticated and stores the location of each instance of the word.
➢ The disadvantage of the word-level indexing is that all the extra information they contain
gobbles up a lot of disk space, it is 35-100 percent of the original data.
➢ The process of indexing data is simple one ,it has large number of indexing packages:
➢ These indexing packages are categorized into three types, they are:
Sound: speech input and output, music and wide variety of acoustic cues include realistic sounds
that supplement and replace visual communication.
Video: analog are digital video input from multiple media, including video tapes, CD-ROM,
incorporated broadcast videos turners, cables and satellites.
3D-images: virtual reality displays offer a 3D environment in which all portions of the user
interface are 3D.
Searching using these new types of information poses interesting challenges that need to be
addressed soon.
2. Yellow pages
➢ The white pages are used to people or institutions and yellow pages are used to
consumers and organizations.
➢ The problems facing organizations are similar to the problems facing individuals.
➢ What attributes of that object are to be represented in the entry for that object.
➢ In a white pages directory, each entry typically represents an individual person that
makes the use of network resources, such as by receiving email or having an account to
log into a system.
➢ In some environments, the schema may also include the representation of organizational
divisions, roles, groups, and devices.
➢ The term is derived from the white pages, the listing of individuals in a telephone
directory, typically sorted by the individual's home location (e.g. city) and then by their
name.
-Decentralized maintenance
-Each site running x.500 is responsible only for its local part of the directory.
Searching capabilities: x.500 provides powerful searching capabilities i.e. in the white pages;
you can search solely for users in one country. From there you can view a list of organizations,
then departments, then individual names.
This represents the tree structure.
➢ Single global name space: x.500 provides single name space to users.
Root
o
Countries U.S
U.K Fr.
Organizations
a b c d e f ghI
individuals j k
E-COMMERCE 28
➢ To avoid the increasing cost of yellow paper, the yellow background of the pages is
currently printed on white paper using ink. Yellow paper is no longer used.
➢ The name and concept of "Yellow Pages" came about in 1883, when a printer in
Cheyenne, Wyoming working on a regular telephone directory ran out of white paper and
used yellow paper instead.
➢ In 1886 Reuben H.Donnelley created the first official yellow pages directory, inventing
an industry.
➢ Today, the expression Yellow Pages is used globally, in both English-speaking and non-
English speaking countries.
➢ In the US, it refers to the category, while in some other countries it is a registered name
and therefore a proper noun.
➢ Third-party directories can be categorized variously:
➢ Basic yellow pages: These are organized by human-oriented products and services.
➢ Business directories: This takes the extended information about companies, financial-
health, and news clippings.
➢ State business directories: this type of directory is useful in businesses that operate on a
state or geographic basis.
➢ Directories by SIC :( standard industrial classification) directories are compiled by
the government.
➢ Metropolitan area business directory: It develops sales and marketing tools for specific
cities.
➢ Credit reference directory: this directory provides credit rating codes for millions of US
companies.
➢ World Wide Web directory: this lists the various hyperlinks of the various servers
scattered around the internet.
INFORMATION FILTERING
➢ An Information filtering system is a system that removes redundant or unwanted
information from an information stream using (semi)automated or computerized methods
prior to presentation to a human user.
➢ Its main goal is the management of the information overload and increment of the
semantic signal-to-noise ratio. To do this the user's profile is compared to some reference
characteristics.
Email filtering:
➢ It is the processing of e-mail to organize it according to specified criteria.
➢ Most often this refers to the automatic processing of incoming messages, but the
term also applies to the intervention of human intelligence in addition to anti-spam
techniques, and to outgoing emails as well as those being received.
➢ Common uses for mail filters include removal of spam and of computer viruses.
➢ A less common use is to inspecting outgoing e-mail at some companies to ensure that
employees comply with appropriate laws.
➢ Users might also employ a mail filter to prioritize messages, and to sort them into folders
based on subject matter or other criteria
Mail-filtering agents:
➢ Users of mailing-filtering agents can instruct them to watch for items of interest in e-mail
in-boxes, on-line news services, electronic discussion forums, and the like.
➢ The mail agent will pull the relevant information and put it in the users personalized
newspapers at predetermined intervals.
➢ Example of Apple’s Apple Search software. Mail filters can be installed by the user,
either as separate programs (see links below), or as part of their e-mail program (e-mail
client).
➢ In e-mail programs, users can make personal, "manual" filters that then automatically
filter mail according to the chosen criteria.
➢ Most e-mail programs now also have an automatic spam filtering function.
➢ Internet service providers can also install mail filters in their mail transfer agents as a
service to all of their customers. Corporations often use them to protect their employees
and their information technology assets.
News-filtering agents:
➢ Users can also create personalized news clipping reports by selecting from news services.
➢ Consumers can retrieve their news from through the delivery channel of their choice like
fax, e-mail, www page, or lotus notes platform.
The theory behind multimedia is digitizing traditional media likewords, sounds, motion and
mixing them together with elements of database.
Compression Methods:
➢ Sector-oriented disk compression (integrated into the operating system, this
compression is invisible to end user)
➢ Backup or archive-oriented compression(Compress file before they are downloaded
over telephone lines)
➢ Graphic & video-oriented compression(Compress graphics & video file before they are
downloaded)
➢ Compression of data being transmitted over low-speed network(tech used in
modems, routers)
Data compression in action:
➢ In general a block of text data containing 1000 bits may have an underlying information
content of 100 bits, remaining is the white space.
➢ The goal of compression is to make the size of the 1000-bit to 100-bit (size of underlying
information).this is also applicable to audio and video files also.
Compression Techniques:
➢ Compression techniques can be divided into two major categories:
Lossy:
➢ Lossy compression means that it given a set of data will undergo a loss of accuracy or
resolution after a cycle of compression and decompression. it is mainly used for voice,
audio and video data.
Lossless:
➢ Lossless compression produces compressed output that is same as the input. It is mainly
used for text and numerical data.
Lecture 1
Symmetric Multiprocessing
n/w
Print Database Communicati
services reuest Disk ip/op File system service
on services
s
scheduler
E-COMMERCE 9
Multimedia Server:
➢ A server is h/w & s/w systems that turns raw data into usable information and provide
that to users when they needed.
➢ E-commerce application will require a server to manage application tasks, storage,
security, transaction management and scalability.
Multiprocessing:
➢ Current execution of several tasks on multiple processors. this implies that the
ability to use more than one CPU for executing programs. processors can be tightly or
loosely coupled.
Symmetric multiprocessing:
➢ Symmetric multiprocessing treats all processors as equal I.e. any processor can do
the work of any other processor. It dynamically assigns work to any processor.
Multitasking:
➢ Multitasking means that the server operating systems can run multiple programs
and give the illustration that they are running simultaneously by switching control between
them.
1. Preemptive
2. Non preemptive
Multithreading:
➢ Multithreading is a sophisticated form of multitasking and refer to the ability to
support separate paths of execution within a single address space.
Lecture 1
Asymmetric Multiprocessing
n/w
Print Database Communicati
Disk ip/op
services reuest
File system service
on services
E-COMMERCE 12
2. Desktop-based (CD-ROM)
Disk arrays:
➢ Disk arrays store enormous amounts of information and are becoming an important
storage technologies for firewall servers and large servers.
➢ Range provided for small arrays is 5-10 gigabytes.
CD-ROM:
➢ CD-ROM is premiere desktop stop storage.
➢ It is a read only memory, to read CD-ROM a special drive CD-ROM drive is required.
➢ That allows a single cd-rom disc contains 530MB for audio CD.
➢ That allows a single cd-rom disc contains 4.8 GB for video CD.
➢ Unit cost in large quantities is less than two dollars, because CDs are manufactured by
well-developed process.
➢ The laser projects a beam of light, which is focused by the focusing coils.
➢ The laser beam penetrates a protective layer of plastic & strikes the reflective aluminum
layer on the surfaces
➢ Light striking a land reflects back to the detector.
➢ Light pulses are translated into small electrical voltage to generate 0’s & 1’s.
Lecture 3
Desktop
Telecom computing
services
Consumer
electronics
On-line
services Content
creation
E-COMMERCE 20
➢ It poses interesting technical challenges; they are constant rate and continuous time media
instead of text, image, audio and video.
Types of Codec's:
1. Hybrid
2. Software-based.
Hybrid: hybrid codec use combination of dedicated processors and software. It requires
specialised add-on hardware.
➢ The standard consists of three parts audio, video, and systems. A system allows the
synchronization of video & audio.
1. as apart of MPEG
2. as motion JPEG
Next, a process called quantization manipulates the data and compresses strings of identical
pixels by run length encoding method.
➢ DESKTOP VIDEO PROCESSING includes upgrade kits, sound cards, video playback
accelerator board, video capture hardware and editing software.
➢ Microphones, speakers, joystik, and other peripherals are also needed.
Desktop video hardware for playback and capture:
➢ Desktop video require a substantial amounts of disk space and considerable CPU horse-
power.
➢ It also requires specialized hardware to digitize and compress the incoming analog signal
from video tapes.
➢ .The two lines of video playback products become available in the marketplace I.e. video
ASIC chips and board level products.
Video playback:
➢ The two lines of video playback products become available in the marketplace I.e. video
ASIC chips and board level products.
-Video
-Graphics
Video capture and editing:
➢ Video capture board are essential for digitizing incoming video for use in multimedia
presentations or video conferencing
➢ Video capture program also include video-editing functions that allows users crop, resize
and converts formats and add special effects for both audio and video like fade-in,
Embosses, zooma and echo's.
➢ Developers are crating next generation editing tools to meet business presenters and
video enthusiasts.
➢ The best graphical editing tools make complex procedures accessible even to novice
users.
Desktop video application software:
➢ The text that appear in the movie. Any PC wants to handle digital video must have a
digital-video engine available.
1. Apple’s QuickTime
➢ These two are software's only; they don’t need any special hardware.
Apple’s QuickTime:
➢ QuickTime is a set of software programs from apple that allows the operating
system to pay motion video sequences on a PC without specialized hardware.
➢ QuickTime has it s own set of compression/decompression drivers.
➢ Apple’s QuickTime was the first widely available desktop video technology to treat video
as a standard data type.
➢ In this video data could not be cut, copied, and pasted like text in a page composition
program.
➢ Apple’s QuickTime movie can have multiple sound tracks and multiple video tracks.
➢ Microsoft video for windows has its own set of compression/decompression drivers.
➢ The Economics:
➢ Three factors have made desktop video conferencing:
2. ISDN
3. Internet
➢ The drawback with a POST solution is a restriction to the top speed of today’s modems
of 28.8 Kbps.
➢ It need a s/w ,once properly installing a s/w users allows to pipe video,audio,and data
down a standard telephone line.
Point-to-Point video conferencing using POTS
Telephone
•
network
modem modem
E-COMMERCE 41
➢ The fallowing fig explains the basic architecture for television or video conferencing
using ISDN network transport switching.
➢ This architecture is commonly found in videophones. Networks required for video
conferencing are fiber optic cable or analog POST.
➢ For video compression and decompression, the ISDN networks uses the H.261
technology, it is specified by the international telegraph and telephone consultative
committee algorithm.
sender
Receiver
Video
phone
H.261 decoder
Telephone ISDN
network
monit
or
E-COMMERCE 43
1. CU- See Me
2. MBONE
Reflector
Sender
with video
camera
Receivers
Characteristics:
➢ topology: combination of mesh and star networks
MBONE tools:
➢ Videoconferencing: vic -t ttl destination-host/port (supports: NV, H.261, CellB,
MPEG, MJPEG)