Technical Components of an E-commerce System

3:37 AM / Posted by Alagan /

The Internet has had such a huge impact on the world (in business, media and society) that it is easy to overlook the technology that preceded it, that enabled it and that has evolved subsequently. In eCommerce terms, though, this does not mean that this technology is any less valid. Remember, we are trying to find the right tools for the right job.

Networks

Networks are electronic/data highways which link computers together for the purpose of sharing resources. They are characterised by:

· the type of data transmission technology they use;

· whether they carry voice, data, or voice and data;

· whether they are public or private (i.e. who can use them);

· the nature of connection - dial-up, dedicated or virtual connections;

· the types of physical links (such as optical fiber, coaxial cable, and copper wire).

The type of data transmission refers to the protocol they use, i.e. the set of rules for communicating that the end points in a connection use when they exchange signals. Both endpoints must understand and observe the protocol. The Internet uses TCP/IP protocols, which includes TCP (Transmission Control Protocol) and IP (Internet Protocol), HTTP, FTP and other protocols, each with a defined set of capabilities.


Local Area Networks (LANS)

LANs link a number of computers by relatively short lengths of cable, usually within the same room or building . Typically, a more powerful computer, called a server, will serve data and applications to a number of desktop PCs. Due to the short length of the cables, data transmission is very fast (MegaBits or even GigaBits per second). Company LANs are usually controlled by a member of the IT department called the network administrator.

It is important to recognise LANs as part of the communications infrastructure because they are often the basis of a company's IT systems. As such, any implementation of eCommerce will require integration of the LAN with external communications media. A LAN that uses Internet.Protocols is, essentially, an intranet, and can support applications run on the Internet if appropriate server software is installed.

The purpose of an intranet is to allow everyone to share information and facilitate group work processes. Like any other network, it holds file directories and allows resource sharing. Intranets are still very much in their infancy as regards the level of sophistication around the types of applications and information held on them. According to recent research completed by InformationWeek the most common applications on intranets are policy and procedure manuals, document sharing and corporate phone directories.

The intranet must have a firewall to prevent unauthorised access from outside the company. Firewalls are hardware/software combinations that allow people from outside an intranet to access data on the Internet, but keep intruders from getting onto the intranet. Depending on how secure a site needs to be and how much time, money and resources can be spent on a firewall, there are many kinds that can be built. Most of them, however, incorporate the following elements:

  • proxy servers;
  • routers;
  • bastion hosts.


Wide Area Networks (WANs)

WANs connect a number of computers, or LANs using long-distance connections. The connections may be along private cables, microwave or satellite links or may be leased from a network provider, such as an Internet Service Provider (ISP) or a telecoms operator. A WAN may contain a number of switching and relaying computers called 'nodes' or 'gateways'. A connection between two major nodes is called a 'backbone'. The Internet itself is a very large WAN. The extension of a simple LAN to the WAN is also the basis for the similar extension of the concept of the intranet to an extranet, which is a key component of business-to-business eCommerce. Essentially an extranet is a private network that uses the Internet protocols and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. An extranet can be viewed as part of a company's intranet that is extended to users outside the company. Therefore, the same benefits that Internet technologies have brought to the Internet and to corporate intranets are now being made available to accelerate business between businesses.

An extranet requires security and privacy. These require firewall server management (in much the same way as intranets) and, increasingly, the use of Virtual Private Networks (VPN's - see below) that are able to tunnel securely through the public network.

The reasons why extranets are, potentially, so important to the area of business-to-business eCommerce, are that they allow organisations to:

· exchange large volumes of data using EDI;

· share product catalogues exclusively with wholesalers or distributors;

· collaborate with other companies on joint development efforts;

· jointly develop and use training programs with other companies;

· provide or access services provided by one company to a group of other companies, such as an online banking application managed by one company on behalf of affiliated banks;

· share news of common interest exclusively with trading partner companies.

Virtual Private Networks

Historically, organisations that needed to construct networks that would serve multiple sites, or maybe allow communication with their clients or suppliers, would achieve this by constructing a virtual private network,or VPN.

With the advent of the Internet, along with relatively cheap broadband access technologies, interest in constructing VPNs across the Internet has grown considerably because it has the potential to offer a VPN service at significantly lower cost than would be the case with networks constructed from dedicated leased lines. However, the very public nature of the Internet means that, although it is possible still to construct trusted VPNs in this environment, many users require a higher degree of assurance that their communications over the VPN will be secure. Hence, this has given rise to the use of technologies that allow secure VPNs to be constructed. The basic concept behind a secure VPN is that all communications taking place across the VPN are encrypted, thus preventing the data from being read in any meaningful form, even if a potential eavesdropper is able to examine the data packets being transmitted on the network. The devices communicating over the network, or the network users, or both, may well also need to be authenticated, to ensure that only trusted individuals or equipment can be attached to the network. Most current implementations of secure VPNs are based on a family of encryption technologies known as IPSec, which is used to construct a secure 'tunnel' across the Internet that can carry the client's data.

VPN technology is accessible to business users in a variety of forms. The telecommunications service providers have offered trusted VPN services for a number of years and, increasingly, are also offering secure VPN services. In both cases, the offering is a managed service, having the advantage of off-loading the maintenance and management of the network from the user. Perhaps the most interesting aspect of secure VPNs is that it is possible for these services to be provided and managed by the businesses that use them. As they rely on encryption technology that can be installed either as software in a PC or as add-ons to existing LANs, VPN services can potentially be used by all sizes of business user, from the SME up to the multi-national.

VPNs can significantly improve the security of communication within a distributed organisation. This can be important for:

· Internal communications within the organisation;

· Communications with client or trading partners, where confidentiality of commercially sensitive information may be a requirement;

· Providing secure networking for home workers.

The same secure VPN technology can also be applied as a means of overcoming the present shortcomings in wireless LAN security; if all information transmitted over the wireless LAN is properly encrypted using the IPSec mechanisms, it is no longer a concern that an eavesdropper might be able to 'see' the data packets being communicated, since it will be impossible to decrypt the data. Secure VPNs can, in many ways, be viewed as a means of making the other networking technologies safer to use in a commercial environment; hence, coupled with the other technologies mentioned in earlier sections, VPNs become an essential factor in delivering the benefits that can accrue from these technologies.

A major benefit with managed VPN services is that they significantly reduce the costs associated with constructing and managing a wide area data network. This can be significant for all sizes of business. Even the larger multinationals often cannot afford the expense of running a truly private WAN, whereas the established telecommunications suppliers can offer a managed service at a much more affordable cost.

Virtual private network technology is not only available today from companies specialising in VPNs, but also from operating system vendors (e.g. Microsoft) and traditional firewall vendors. There is limited interoperability between products from different vendors today, since standards are only now being finalised. Therefore, the user is likely to need software from the same vendor for both end points of the tunnels. The key standard that is emerging is IPsec (secure IP), whilst others include SOCKS and Layer 2 Tunneling Protocol (L2TP). The L2TP standard combines attributes of Microsoft's Point to Point Tunneling Protocol (PPTP) and Cisco's L2F (layer 2 forwarding.)

The development of E-Commerce in the context of business developments.

Communication

1. Options:

· Telephone: dial-up or leased line

· ISDN: basic rate or primary rate

· Value Added Networks

· X.400: ISO standard secure messaging

· Networks: local area networks, wide area networks or intranets

· Internet: messaging, file transfer, Telnet, World Wide Web, XML

2. Standards:

· Standards are the means by which data is sent in an agreed format by eCommerce trading partners.

· In Electronic Data Interchange (EDI), standards pertain specifically to the syntax used to prepare messages for exchange. They enable, for example, one accounts system to understand an electronic version of an invoice sent out by another accounts system because the relevant pieces of data (e.g. invoice number) are always located in the same part of the message.

· In the case of EDI, these standards are generally nationally and

· The means which data is sent in an agreed format by E-commerce trading partners.

E.g.:

· EDI: syntax used to prepare message for exchange

· Gif and JPG: graphic standards

· World Wide Web:HTML, PERL, Javascript, Java, Software

3. The e-commerce software function includes:

· Data extraction from relevant application or data entry

· Data encoding to agreed standard format

· Data transmission to recipients.

· Data receipt by recipients.

· Data decoding for internal applications.

· Data insertion into relevant applications

Business-to-Business E-commerce

Key areas in B2B e-commerce:

  • Electronic Data Interchange (EDI)
  • Enhanced messaging: e-mail, voice-mail, fax
  • Teleconferencing
  • Integrated Systems: intranets/extranets, database publishing, workflow

Supply Chain E-commerce

  • Key areas in B2B e-commerce:
    1. Stock control
    2. Just-in-time delivery
    3. Transportation
    4. Warehouse management
    5. Automatic Identification: Barcodes, Transponders

Business-to-Consumer E-commerce

  • B2C e-commerce application includes:
    1. Database application
    2. Kiosks
    3. Internet store fronts
    4. Downloadable software and software support
    5. Internet auctions
    6. Advertising on the Internet
    7. Interactive TV

Impact of E-commerce on the Business

  • The impact of E-commerce to business includes:
    1. Instantaneous means of data exchange
    2. Exchange information efficiently and accurately
    3. Convenience in time and geographic.
    4. Reducing manual and paper-based operations
    5. Re-thinking and simplifying the information flow
    6. Using the information flow in new and dynamic ways.

Business Process Re-design

  1. BPR focuses on radically changing the way internal processes are conducted in order to increase profitability and competitiveness.
  2. E-commerce provides an opportunity to radically re-engineer business processes, even those that may have already been subject to such an activity.
  3. Workflow is used to within the BPR project to help rationalise internal business procedures.
  4. Flexible Working is an approach to organising the way people work together, from employees to top management and the way they interact with trading partners. It consist of:
    • Teleworking : Working a day or more from home and the rest at the office
    • Mobile working : Profession that requires the person to move from place to place and yet maintain contact with an office.
    • Virtual Teams : Teleworking extended to a group of people working on one task or project.

Labels:

2 comments:

Comment by Unknown on September 3, 2010 at 4:30 AM

Only one software can give you the things which you never expect like data recovery softwares or services which recovers the lost data within minutes.

Comment by Curvve on April 22, 2013 at 4:44 AM

Thanks For Sharing...your Post is really appreciate fully...Its a well established fact that when it comes Designing.

e-commerce design

Post a Comment