E Commerce
E Commerce
quality of goods & services & increasing the speed of service delivery. E-
occurring at many firms. The broad goals of reengineering & E-commerce are
remarkably similar reduced cost, power product cycle times, faster customer
2
WHAT IS E-COMMERCE?
• E-commerce is concerned with transactions carried out between two
organizations, business or individuals on-line using their respective computers
which are connected by a telecommunication system. The transactions include
orders sent to vendors to supply items, invoices sent by vendors, payment
usually made be debiting on organization’s account with a bank and crediting to
the vendor’s account, cash payments made using what is known as electronic
cash (e-cash). The important point is that all transactions are carried out
electronically using the network connection. Transactions may be between two
commercial organizations, between government department and a commercial
organization, between a customer and a commercial organization or between
two individuals.
3
WHAT IS E-COMMERCE?
There a variety of e-commerce applications. Some of these are:
• Retail stores such as book stores, music stores, toy stores, etc.
• Auction sites using which an individual buyer and seller can buy and sell goods.
• Co-operating businesses connected using their own private telecommunication
network carrying out transactions in semi-automated way.
• Banks connected to their customers providing services such as deposits,
payments, and giving information on status of an account.
• Railways/airlines/cinema theatres permitting booking tickets on-line and paying
for them on on-line using credit cards.
• Filling tax returns with government agencies on-line and obtaining an
immediate acknowledgement.
• Electronic publishing to promote marketing, advertising, sales and customer
support
4
In the electronic 'highway system' multimedia content is stored in the
form of a electronic document. These documents are often digitized,
compressed & stored in computerized libraries or multimedia storage
warehouses called server that are linked by transport network to each
other & to software/hardware clients that allow customer to access them.
On the I-way messaging software fulfills this role in any number of forms
E-mail, EDI or point to point file transfer.
Encryption & authentication methods are developed to insure security of
the contents while traveling the I-way & at their destination.
5
Platform independence, tool independence, performance, and scalability merit
further elicitation.
Platform and Tool Independence : Data that flows through a firm's information
systems and e-business systems often exists in a multitude of platform specific
formats. The collaborative platform must be capable of manipulating highly
distributed data regardless of its platform-Windows, Linus, MacOS, PalmOS, WAP-
specific or Unix. The Web provides the ideal channel through its hypertext markup
language (HTML), extended markup language (XML), and hypertext transfer protocols
(HTTP).
Performance and Scalability : Scalability defines how well the system can handle
increasing numbers of users and transaction loads. A system that works well with 50
users but grinds to a half when 400 users adopt it is poor on scalability. Scalability
problems might not show up right from the start, but when they do, they are usually
the hardest and most expensive of problems to fix. In addition to selecting software
and hardware components that have proven scalability. Three other factors must be
kept in mind (1) plan for additional system response delays as usage grows, (2) plan
for delays in automated real-time updates to back-end repositories and databases as
usage grows, and (3) plan for response delays when a system is accessed through
multiple channels (e.g. a Web based order tracking system accessed through a
wireless application cellular phone).
6
Features of the Ideal Collaborative Platform
Requirement Description
Portability It must allow different computing platforms such as Macs, Windows PCs,
Unix workstations, WAP devices, and PalmOS systems to seamlessly
interoperate. The HTTP protocol and Java used with the Web browser as
the primary client are usually strong candidates.
Consistent and Using Web browsers as the front end facilities building a simple, easy-to-
easy-to-use client use interface with a consistent look and feel.
interface
Scalability The number of users may increase exponentially without any significant
degradation in the platform's performance. This is a function of both
hardware and software platform choices.
Integration The platform must be able to integrate with existing applications and
legacy systems and data. Legacy systems are integrated especially well
using Web protocol based software translators called wrappers.
Customizability The platform must be capable of being customized by the end user and
must be sufficient flexible for accommodating yet-unknown integration
needs. Proprietary solutions usually provide higher degrees of
customizability but at the cost of portability, scalability and cost.
Security Sufficiently high levels of security must be implemented. Using the Web
as a base platform does not usually allow for out-of-the box security
solutions, but very high levels of security are possible in most Web
browsers.
Structural Both structured data (such as database records) and highly unstructured
flexibility data must be supported. Continued -
7
Protocol Data transmission protocols used within the platform must be capable of
efficiency across adjusting themselves to the richness/bandwidth of the channels that they
all channels might be using at any give time. Furthermore, multiple customer contact
and access channels must be usable.
Technological The platform must be relatively mature. The Web does not fit the bill well, but
maturity the tradeoffs between cost and maturity still make it a good choice.
Training costs The costs incurred in training users and customers should be reasonable.
The Web browser is a tool that many corporate users are familiar with,
so training costs can be expected to be lower with web based systems
front-ends.
Project decompo- The platform must not require an all-or-nothing approach to system building.
sability The project itself must be implement in small results driven increments
Open architecture The platform must have an open architecture and not a proprietary one.
8
New and Old Ways of Purchasing an Item
Sales Cycle Step Traditional Commerce (Multiple Electronic Commerce (Single
Media Employed) Medium Employed)
Acquire product information Magazines, flyers online Web pages
catalogs
Request item Printed forms, letters e-mail
Get order approved
Check catalogs prices Catalogs Online catalogs
Check product availability and confirm price
Generate order Printed form e-mail, Web pages
Send order (buyer); Fax, mail E-mail, EDI
Receive order (supplier)
Prioritize order Online database
Check inventory at warehouse Printed form, phone, fax Online database
Web pages
Schedule delivery Printed form e-mail online database
Generate invoice Printed form Online database
Receive product Shipper
Confirm receipt Printed form e-mail
Send invoice (supplier); Mail E-mail
Receive invoice (buyer) EDI
Schedule payment Printed form EDI
Online database
Send payment (buyer); Mail EDI
Receive payment (supplier) EDI 9
The Internet Hierarchy
Network access
points (NAPs) Sprint MFS Pacbell
Regional
networks CERnet UUnet PSInet SURAnet
Local ISP’s
User
organisations
10
Some of the Security Standards for the Internet
11
Credit card
Multimedia
Edit cash authoring
Electronic
Security Commerce Information
E-mail, Web Applications production
FAQs Manufacturing
Services Production
Distribution
12
Intranets, the Internet and extranets
Corporate Intranet
Firewall
Network
Shared database
Business partner
intranet
Extranet
The Internet
Firewall
Network
13
Commercial transaction with and without an intermediary
Without an intermediary
Firm A Buyer A
Firm B Buyer B
Firm C Buyer C
Firm D Buyer D
With an intermediary
Firm A Buyer A
Intermediary
Firm B Buyer B
Firm C Buyer C
Firm D Buyer D 14
Database Server
Data TIER-1
Integrity Data Processing
logic Access
TIER-2
LAN or WAN
TIER-3
Client’s Role (Tier 3) – Data Entry, Forms Creation, Windowing, Querying, Reporting.
Application Server Role (Tier-2)- Rule based processing on command from client and fetching data from
database
Database Server (Tier-1)-All database management functions and serving the needs of clients and application
servers.
Product on Consumer Information automatically Information automatically
store shelf purchases Recorded by point-of sale Recorded by point-of sale
product (POS) device (POS) device
Web pages
(pages visited etc.)
Customer
Web survey forms
Customer database
Survey
E-mail Surveys database
17
E-COMMERCE – BUSINESS TRANSACTION
• Transaction between a company & the consumer over public networks. e.g. home
shopping, home banking using encryption for security & electronic cash , credit or
debit token for payment.
• Transaction with trading partner-EDI
• Transactions for information gathering such as market research using bar bode
scanners information processing for managerial decision making or organization
problem solving information manipulation for operation & supply chain
management etc.
– Interorganisation Electronic Commerce.
EDI
• Interorganisation
E-mail
• Inside & across organisation boundaries
19
THE CYCLE OF ELECTRONIC COMMERCE
Follow-on sales
Access
Searches
Queries
Surfing
Standard orders
Distribution
Online:
soft goods
Delivery: hard
goodsElectronic
Customer Support
20
COMPONENTS OF E-COMMERCE
Electronic Commerce
Institutions Processes
Government Marketing
Merchants Sales
Manufacturers Payment
Suppliers Fulfillment
Consumers Support
Networks
Corporate
Internet
Commercial
21
Some of the portals on web accessible for transactions in India
22
On-line Payment Process Using a third-party Processor
Customer Merchant
Verification Authorization
Payment
server
On-line third-party
processors with links to
multiple payment
systems
Credit cards VISACharge cards American Bank accounts debit Private labels cards DigiCash
Express cards J.C. Penny
23
Some opportunities of electronic commerce
Customer
Your Business
Business Partners
Speed up production
Increase efficiency of
processes
Share information
Generate new information Manage supply chain
based products Reduce transaction expenses
Create dynamic virtual organizations
24
Electronic commerce and business processes
Seller
Customer
customer Newsgroups
Net communities
Provide Demos Web site Evaluate
info reviews Ordering
Credit cards,
P.O.s
digital cash Payment
EDI Purchase
\Fulfill Fulfillment
order Deliver soft goods electronically
Web site, phone
fax, Use, Service and
Support e-mail maintain support
Emailing lists
25
Applications Elements of electronic commerce applications
Computer
Video Game
Servers Servers
Personal digital
assistant Network
Corporate
Internet Servers
• Information
Delivery Libraries
Infrastructure • Chatlines
Telephone
Network • Software
Service
Provider Electronic
Government
Television publishing
Servers
Information Servers with Variety of
Content
Printer
Consumer Devises 26
Web Store Front-end
Systems Web Store
Call centre
ERP
Electronic mall
E-TPS
WAP/Wireless
Rule based
Direct Mall Inference CRM Rules
Engine
Phone/TVR
Channel Rules
Channels
Transform
Markets and Competitors
Analyze and Distribute
Customers and Partners
Interpret and Pattern Mine
Orders and Contracts
Real Time Decision Support
Products and Services
Problem and Solutions
27
Multi-channel information and knowledge integration is a necessity in all businesses
VENDOR CUSTOMER
Delivered Delivered
items items Inspection
Receiving
Vendor Delivery Delivery Office
note
Office
note
Purchase Discrepancy Accepted Accepted
order copy note items note items
Rejected
items note
Purchase Stores
Rejected order Office Office
Purchase order
Rejected items
Request to credit
Vendor’s bank account
Vendor’s Customer’s
Credit bank account Credit bank account
Advice Vendor’s
account
30
From the above example we see the following hardware and software would be needed for
establishing e-Commerce between businesses :
Each of the businesses must have a LAN interconnecting its offices. The offices themselves should
have computers for data entry/receipt, comparison, etc. The system may be a distributed client
/server type system with each office being a client and the databases being stored in a
appropriate servers. The internal system architecture of the business is not a major issue.
However, the protocol used by the LAN is normally the same as that used by internet, namely
TCP/IP. The organizational computer network using this protocol is called an Intranet. Besides
using TCP/IP protocol intranets also have one or more World Wide Web servers.
The two intranets must be interconnected. There are two alternatives. One is to connect each of
the intranets to the internet. This is an inexpensive solution but maybe insecure unless special
precautions are taken. The other solution is to connect the intranets to constitute what is known
as an Extranet. Extranet is a private interconnection of the intranets of business associates. Each
intranet supports web pages which can be accessed by the members of the extranet.
A method of paying for goods or services received electronically. This implies that the business
partners must know one another's bank account details. Further, funds transfer must be secure.
No one should be able to illegally access a business partner's account and transfer money.
We have assumed that documents are interchanged by e-mail. This is acceptable between close
business associates. It is not secure and there is no authentication of documents sent and
received. For more secure transactions e-Commerce has introduced a method called Electronic
Data Interchange which has a provision for authentication.
31
Typical E-Commerce System
Payment Authorization/
Customers Settlement
Customer Orders
care Payment Tech
Authorize
Customer
Administrative Tools
Administratio
n Interface
WEB Tools to Maintain
Online store
Customer
Customer/Order Tagging Tools
contact
Management Order Status
Inventory Product
Order Financial Credit
Charge
Warehouse Management
System
Order Order Financial System
Fulfillment Server
Ship Confirm ABC ABC
Ship Confirm Order Company
Inventory/PO Receiving Company Financial
Status
Distributed PO
Computing
Environment
32
Business Partners
Suppliers, Distributors, Resellers
Production
Distribution
Logistics
Finance /Accounting/Auditing
Enterprise Resource Planning
HRMS/ORMS/Purchasing
Management Control
Administrative Control
STAKEHOLDERS
Enterprise
EMPLOYEES
Knowledge-Tone
Applications
Applications
Integration
Distribution
Logistics
Customers, Resellers
33
E-Business Application Architecture
EDI Systems
Commercial
Partner
System
36
Buyer Seller
Purchase request
Finance Finance
initiated in the
department department
organisation
Payment Bill
37
EDI can substantially automate the information flow and facilitate management of the
business process. The EDI transactions for a purchase, shipment, and corresponding
payment are as follows :
38
Buyer Seller
Purchase request
Finance Finance
initiated in the
department department
organisation Billing
Payment details
Purchase order
details delivery
Automated order
confirmation
Product delivery
39
Export Import
A,B
Seller Buyer
Bank Bank
C,F
Freight C,D Freight
forwarder forwarder
Transport Transport
Customs Customs
Storage and Storage and
container container
warehouse warehouse
A :Establishment of commercial agreement (commercial) D :Arrangement of insurance (insurance)
B :Arrangement of payment (financial) B :Clearance of export (customs)
C :Arrangement of transport (transport intermediary) C :Clearance of import (customs)
41
Goods or
services bought
Company X Company Y
Bank X Bank Y
(Payer) (Payee)
Remittance Remittance
information information
Transfer of
funds
Clearinghouse
42
Remittance Remittance
Value added
information information
network(VAN)
Company X Company Y
Bank X Bank Y
(Payer) (Payee)
Payment Payment
authorization settlement notice
Transfer of
funds
Clearinghouse
43
Compliances for E-Commerce
BAI- Developed by the Bank Administration Institute (BAI), these proprietary standards
have been used by U.S. banks for sending and receiving invoice and remittance
information (no funds transfers) for several decades.
820 and 823 – In the 1980's the American National Standards Institute (ANSI), whose
standards apply to most regular EDI transactions in the United States, created the
ANSI X12 820 formats for payment orders and remittance advice.
CCD. NACHA's first U.S. standards effort, the cash concentration and disbursement
format offers electronic funds transfer capabilities, but can be used only for corporate
payments requiring minimal remittance information.
CTP – The corporate trade payments format overcame the 94- character restriction of
standard ACH transfers by accommodation remittance information in additional
predefined 94 character blocks.
CCD+- In 1987, NACHA introduced CCD+, which allows companies to transmit funds
and single ANSI X12 820 remittance advice in the same transaction.
CTX. NACHA'S Corporate Trade Exchange is essentially ANSI X12 820 information
tucked into an ACH funds- transfer envelope. CTX is the only format that enables U.S.
companies to move dollars and data together. To biggest problem with CTX is that few
banks have the systems required to process these transactions.
EDIFACT -EDIFACT is being used for the international financial EDI pilot project
currently being conducted by SWIFT.
44
Original Value-added Equipment
information producer (VAP) producer (EP)
producer (OIP)
Customized
product design
brokerage
45
E-COMMERCE APPLICATION
Multimedia Storage Servers
These multimedia storage servers are large information warehouses capable of handling various
content, ranging from book, newspapers, advertisement catalogs movies, games & X ray
images.
Client – Server Architecture
Server manages application tasks, handling storage & security & provides scalability – ability to
add more clients as needed for serving more customers & client devices handle user interface.
Multimedia server handles the critical elements (distribution, connectivity, security, accounting)
& make scaling more cost-effective.
Internal Processes of Multimedia Servers
A multimedia server is a hardware & software combination that converts raw data into usable
information & then dishes out this information where & when users need it. It captures,
processes, manages & delivers text, images, audio, & video. Most multimedia servers provides
a core set of functions to display, create & manipulate multimedia documents over net & to store
& retrieve multimedia documents over net & to store & retrieve multimedia documents.
46
E-COMMERCE APPLICATION
48
Web site's backup needs requires :
• A secure place to keep your backed-up files that is accessible at all
times.
• A combination of software and hardware to handle the backups.
• A tape backup on your server, allowing you to perform your own
data backups remotely.
• An online backup service (if you don't use a tape backup) where
you transfer your data electronically to a secure location. Or you
can use the service to schedule automatic backups of selected files
to be backed up at each session
49
There are two kinds of modified backups, each with significant differences :
1. Differential Method (I full backup +several differential backups) : With
this method, you back up the data that has been modified since the last full
backup. This is done by setting the backup software to leave a file's "archive flat"
unchanged after it is backed up. This method gives you redundancy – the original
full backup and the most current differential backup. Using the full backup and
the latest differential backup, one can safely restore an entire hard drive. This
method requires a lot of tape space, however.
2. Incremental Method (I full backup+ several incremental backups) : This
method backs up only the files that have been modified since the last backup,
either full or incremental. Setting the backup software to clear the file's "archive
flat" after it is backed up does this. This requires minimum tape space but may
require several tape backup sets to find a lost file. To restore an entire hard drive
you must restore the full backup and then restore each incremental backup in
the cycle.
Get the biggest and fasten backup system you can afford.
50
Working group Submitted
Internet engineering
individual, IESG, or RFC editor
structure group
IAB initiates process Content concerns
or editorial comments
RFC is published
and widely distributed
51
DIGITAL CERTIFICATE
55
REDUNDANCY
Redundancy is a safety measure where you install multiple units of all critical
hardware devices. Redundancy of two, three, or more times may be used to support
the operations of a Web site including its switches, routers, and other components.
BACKUP
Server crashes and hard drive failures are inevitable due to such things as
equipment failure, lightening, power outages, simple age or defect-related failures,
bugs, hackers, viruses and, of course, human error. The most basic method of saving
your data is to "Backup". All backup solutions have one thing in common –they
involve copying data from your hard drive(s) to a second media, from which you can
restore your data in the event that your hard drive(s) or server fail.
56
RAID
RAID is an acronym for "redundant array of independent (or inexpensive) disks" and is a
system designed to link the capacity of two or more hard drives that are then viewed as
a single large virtual drive by the RAID management software. By doing this it is possible
to improve data storage reliability and thereby achieve fault tolerance.
RAID must be a part of any Web site. By purchasing a good UPS you've protected your
site against power problems. Now you need to protect your Web site against data
problems and drive failure. That's where RAID comes is.
A basic RAID system includes RAID functionality built into a controller and two or more
hard drives.
57
RAID LEVELS
RAID-0 divides each data file into blocks and distributes these among multiple disks in a
process called disk stripping. This provides high performance since more than on disk is
read and/or written to simultaneously.
RAID-1 is the easiest and, for a small Web site can be one of the least expensive ways
to protect your Web site's data from a hard drive failure. With RAID-1 as the data is
being written it is simultaneously being copies or mirrored onto a second disk which is
considered to be the most common, secure and reliable form of RAID.
RAID-3 Stripes data across multiple disks one byte at a time. Parity is also calculated bit-
by-bit and stored on an extra "parity drive". All drives have synchronized rotation.
When a drive fails, data is rebuilt transparently in the background from the remaining
functioning drives as the system continues to operate.
RAID -5 is the most popular high-end RAID technique used today. RAID -5 stripes data
at the sector or block level across a minimum of three drives. It also provides stripe
error correction information by stripping it along with the data evenly over the drive
set. This results in excellent performance and good fault tolerance but it still lags
behind the performance found with RAID-1 disk mirroring. Most of the high-end pre-
configured RAID set-ups are RAID-5.
58