Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 81

E Commerce

Electronic Commerce Framework


Electronic Commerce Framework
Electronic Commerce Framework
1.Network Infrastructure
Electronic Commerce Framework
2. Multimedia Content and Network publishing
Electronic Commerce Framework
3. Messaging and Information Distribution
Infrastructure
Electronic Commerce Framework
4. Common Business Infrastructure
• Facilitating the buying and selling Process,
Security, Authentication, electronic payment.
Frame work of e commerce
Anatomy of E Commerce Applications
Anatomy of e commerce Application
Anatomy of e commerce Application
Anatomy of E Commerce Applications
Anatomy of E Commerce Applications
Anatomy of E Commerce Applications
Multimedia Server
Video Server
Information delivery
Consumer Access Devices
E Commerce Consumer Application
E Commerce Consumer Application
What do Consumers really want?
Advantages of E Commerce
1. Buying/selling a variety of goods and services
from one's home or business
2. Anywhere, anytime transaction
3. Can look for lowest cost for specific goods or
service
4. Businesses can reach out to worldwide
clients - can establish business partnerships
Advantages of E Commerce
5. Supply chain management is simpler, faster,
and cheaper using ecommerce
• Can order from several vendors and monitor
supplies.
• Production schedule and inventory of an
organization can be inspected by cooperating
supplier who can in-turn schedule their work
Disadvantages of E Commerce
1. Electronic data interchange using EDI is
expensive for small businesses
2. Security of internet is not very good - viruses,
hacker attacks can paralyze e-commerce
3. Privacy of e-transactions is not guaranteed
4. E-commerce de-personalises shopping
Threats of E-commerce:

• Hackers attempting to steal customer information


or disrupt the site
• A server containing customer information is stolen.
• Imposters can mirror your ecommerce site to steal
customer money
• Authorised administrators/users of an ecommerce
website downloading hidden active content that
attacks the ecommerce system.
Threats of E-commerce:

• A disaffected employee disrupting the ecommerce system.


• It is also worth considering where potential threats to your
ecommerce site might come from, as identifying potential threats
will help you to protect your site. Consider:
• Who may want to access your ecommerce site to cause disruption
or steal data; for example competitors, ex-employees, etc.
• What level of expertise a potential hacker may possess; if you are
a small company that would not be likely to be considered a target
for hackers then expensive, complex security may not be needed.
Features of E-Commerce:

1.Ubiquity
Internet/Web technology is The marketplace is
extended beyond traditional available everywhere:
at work, at home, and boundaries and is removed
from a temporal and elsewhere via mobile devices,
anytime. geographic location. ―Marketspace‖ is
created; shopping can take place anywhere.
Customer convenience is enhanced, and shopping
costs are reduced.
2. Global reach
• The technology reaches Commerce is enabled
across cultural and across national boundaries,
around the earth. national boundaries
seamlessly and without modification.
―Marketspace‖ includes potentially billions of
consumers and millions of businesses
worldwide.
3. Universal standards
• There is one set of There is one set of technical media standards technology
standards, namely Internet across the globe.

4. Richness
• Video, audio, and text messages Video, audio, and text marketing messages are are
possible. integrated into a single marketing message and consuming experience.
5. Interactivity

• The technology works Consumers are engaged in a dialog that through interaction
with the user. dynamically adjusts the experience to the individual, and makes the
consumer a co-participant in the process of delivering goods to the market.
6. Information density
• The technology Information processing, storage, and reduces
information costs and raises quality. communication costs drop
dramatically, while currency, accuracy, and timeliness improve
greatly. Information becomes plentiful, cheap, and accurate.
7. Personalization/Customization
• The Personalization of marketing messages and technology
allows personalized messages to customization of products
and services are be delivered to individuals as well as groups.
based on individual characteristics.
I way
• https://www.youtube.com/watch?v=0pMm_Q
xCg3I
I way (Information Highway)

 A telecommunications infrastructure or system (such


as television, telephony, or computer networks)
used for extensive and typically rapid access to
information is known as an information
superhighway.
 Throughout the 1990s, the term “information
superhighway” or “infobahn” was commonly used
to refer to alphanumeric communication
technologies as well as the Internet
telecommunications network.
Three components of the I-way infrastructure

• Consumer access equipment


• Local on-Ramps
• Global information Distribution Network
1. Consumer access equipment

Consumer access equipment are devices used


by consumers to access the multimedia
interactive contents of e-commerce. In this
segment, hardware and software vendors are
also included.
Eg Computer,hubs, switches, browser etc,
Modem, Tv settop boxes, TV signal
descramblers, cellphones.
2. Local on-Ramps
 Link the users and the e commerce application
providers such as Telecom networks, satellite
networks and the internet.
 Telecom Based
Long distance, local telephone services, high
speed pipeline(high volumn of contents),
connect Global distribution N/w, capable of
handling miilions of simultaneous calls, accurate
usage of tracking and billing.
https://actingcollegeses.com/library/acting-ques
tions/read/36065-what-is-an-i-way-what-are-its-
components
Components of iway

• 1. Consumer access equipment


• This is equipment that is located at the
consumer’s end and allows them to connect
to the network. It consists of hardware such as
computers, modems, routers, switches, and
routers for computer networks, as well as
software platforms such as browsers and
operating systems for television networks.
• 2. Access Road or media
• Serve as a communication backbone for data
and information transmission. Telecom-based
cable TV-based, wireless-based, or computer-
based online systems are the four types of
access providers.
• 3. Global information distribution networks
• These networks provide the infrastructure for
connecting people and information across
countries and continents. Long-distance
telephone lines, satellite networks, and the
internet are examples of these networks.
The Internet’s Benefits as an Information
Superhighway

• E-journals and e-books are among the information


sources available on the Internet.
• It becomes a useful tool for gaining access to a large
volume of data in a short period of time.
• It provides access to not only plain texts, but also
audio, video, and images.
• It allows the researcher to access online sites as well
as read citations and supporting data, allowing for a
more collaborative approach to study.
The I-way is shaped by public policy issues.

• 1. Price
• Who should foot the bill for the I-construction? way’s Some
people prefer the interstate highway model, in which the
government builds, owns, and maintains the highways.
Others are in favor of the current controlled phone system.
• 2. Subsidies
• Subsidies are a type of subsidy. Subsidies, tax incentives,
government contracts, and other sorts of encouragement
may be hoped for by developers. What will be subsidized
by these tax breaks? This issue has yet to be resolved.
• 3. Local Infrastructure Access
• Local infrastructure is a question of local policy and investment
inside a country, and it is the area with the most disparities
between countries. The discrepancy in data communications
settings between developed and developing countries is a
cause of operational annoyance for enterprises and has an
impact on international connections. State-owned
telecommunications companies control both domestic and
international communications in various countries. There,
obtaining a direct link into a given place is exceedingly difficult,
and the usage of an expensive Telco-operated network is
sometimes required.
• 4. Restrictions
• Some free-market advocates believe that if a
roadway is built using private cash, there is no need
for government oversight. Some think that highway
operators should compete openly, but that they
should be regulated to ensure public access, privacy,
and appropriate tools. What exactly are the
guidelines? Who is the author of them? Who is
responsible for enforcing them? These subjects are
still up for discussion which is more like a debate.
• 5. Accessibility for All
• Equal access is likely to involve cable and phone
companies installing updated networks to service certain
customers at below-cost rates and to extend lines to areas
where other technologies (such as a satellite) make more
sense. Some argue that highway companies must provide
universal access at a fair price. Non-profit groups may not
be able to afford to connect to the I-way if it is built and
maintained by private interests without major government
funding. It’s still unclear whether universal access is
national or international.
• 6. Obstacles of social and religious nature
• Cyberspace is regarded as a symbol of freedom of
expression and democracy. The Internet provides
interesting problems and policy issues for many
strongly religious countries where free expression
is prohibited. The Internet creates numerous issues
in other nations where women have been denied a
voice and access to media for many years (the
Internet does not discriminate between gender)
• Drawbacks of Iway
• The variety of information makes it tough to decide which type
of information to use.
• Results may be unpredictable due to restricted search engines
and the way web pages were constructed, and it would be
tough to search efficiently most of the time.
• The internet has a tendency to leave out vital information.
• Web pages are insecure in the sense that they lack
permanence and, at times, disappear entirely.
• Some internet information is restricted, requiring the
researcher to subscribe or register
Network Access Equipment

1. Repeater
2. Hub
3. Switch
4. Bridge
5. Router
6. Multi layer Switch
7. Brouter
8. Modem
9. Firewall
1. Repeater

• A repeater is a layer on one device, it means it


operates at physical layer.
• It just regenerates the signal in a single local
area network.
2. Hub

• It operates at physical layer ie it is a layer one


device and whatever it receives, it always does
broadcasting and that is the drawback of a
hub.
3. Switch

• A switch is also a local area networking device and


it connects devices in a single local area network.
• It is a layer two device and it operates at data link
layer
• Switch is an intelligent device, it stores the MAC ()
address table.
• Unlike Hub, Switch does unicasting (it means it
can send the data to the exact recipient, whereas
Hub broadcasts the data to all the recipients.
4. Bridge

• A bridge is also a layer two device. It operates


at the data link layer.
• A bridge connects two LAN segments that are
running with the same protocols.
• A bridge can also regenerate the signals
because it is a combination of a repeater and
MAC address reading capability.
5. Router

• A router is a layer three device which operates


at the network layer.
• Routers take for forwarding decision based on
the IP addresses and router is a networking
device that can connect two or more different
protocols.
• So one side if it is Ethernet another side if it is
Wi-Fi and router can connect these two
technologies as well.
6. Multi Layer Switch

• Multi layer switch or a layer three switch generally, switches


are layer two switch.
• It means, it works at the data link layer and it takes
forwarding decisions based on the MAC addressers.
• We have a contemporary switch which is a multi-layer switch .
• It can be a layer two switch as well as layer three switch.
• It does the functionalities of a switch as well as the
functionalities of a router to an extent.
• So multilayer switch or a layer three switch can act as well as
a switch.
7.Brouter

• Brouter is a combination of a bridge as well as a


router.
• A bridge can connect two different LAN segments
of same protocol, a router can connect two or
more protocols.
• But Brouter is a combination of a bridge as well
as a router.
• It means it can act as a layer two bridge, or it can
act as a layer three router.
8. Modem

• It means modulator and demodulator.


• Modulator means digital information is going to
be carried on an analog carrier signal.
• The demodulator just retrieves the transmitted
signals.
• Ex – In a traditional landline phones that is
exclusively for carrying the voice signals in the
analog signals but we can send our digital
information using Modem.
9. Firewall

• Firewall is a security device.


• It is a networking device only but still it is mainly
used for providing security to the network.
• Ex – if we deploy a firewall in our campus or in
our network this firewall filters packet based on
IP addresses based on post numbers based on
the application data.
• So it is a network a firewall filters the incoming
traffic as well as the outgoing traffic.
Internet Terminology
Internet Terminology
Internet Terminology
Internet Terminology
Internet Terminology
Internet Terminology
Internet Terminology
Internet Terminology

You might also like