P. 1
EDI

EDI

|Views: 23|Likes:
Published by Shankari Maharajan

More info:

Published by: Shankari Maharajan on Jan 06, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less

10/16/2013

pdf

text

original

Electronic data interchange (EDI) is the structured transmission of data between organizations by electronic means.

It is used to transfer electronic documents or business data from one computer system to another computer system, i.e. from one trading partner to another trading partner without human intervention. It is more than mere e-mail; for instance, organizations might replace bills of lading and even cheques with appropriate EDI messages. It also refers specifically to a family of standards, e.g. UN/EDIFACT, ANSI X12. The National Institute of Standards and Technology in a 1996 publication [1] defines electronic data interchange as "the computer-to-computer interchange of strictly formatted messages that represent documents other than monetary instruments. EDI implies a sequence of messages between two parties, either of whom may serve as originator or recipient. The formatted data representing the documents may be transmitted from originator to recipient via telecommunications or physically transported on electronic storage media.". It goes on further to say that "In EDI, the usual processing of received messages is by computer only. Human intervention in the processing of a received message is typically intended only for error conditions, for quality review, and for special situations. For example, the transmission of binary or textual data is not EDI as defined here unless the data are treated as one or more data elements of an EDI message and are not normally intended for human interpretation as part of online data processing."
[1]

EDI can be formally defined as 'The transfer of structured data, by agreed message standards, from one computer system to another without human intervention'. Most other definitions used are variations on this theme. Even in this era of technologies such as XML web services, the Internet and the World Wide Web, EDI may be the data format used by the vast majority of electronic commerce transactions in the world.

[edit]Standards EDI is considered to be a technical representation of a business conversation between two entities, either internal or external. Note that there is a perception that "EDI" constitutes the entire electronic data interchange paradigm, including the transmission, message flow, document format, and software used to interpret the documents. EDI is considered to describe the rigorously standardized format of electronic documents. EDI is very useful in supply chain. The EDI standards were designed to be independent of communication and software technologies. EDI can be transmitted using any methodology agreed to by the sender and recipient. This includes a variety

of technologies, including modem (asynchronous, and bisynchronous), FTP, E-mail, HTTP, AS1, AS2, etc. It is important to differentiate between the EDI documents and the methods for transmitting them. When they compared the bisynchronous protocol 2400 bit/s modems,CLEO devices, and value-added networks used to transmit EDI documents to transmitting via the Internet, some people equated the nonInternet technologies with EDI and predicted erroneously that EDI itself would be replaced along with the non-Internet technologies. These non-internet transmission methods are being replaced by Internet Protocols such as FTP, telnet, and E-mail, but the EDI documents themselves still remain. As more trading partners use the Internet for transmission, standards have emerged. In 2002, the IETF published RFC 3335, offering a standardized, secure method of transferring EDI data via e-mail. On July 12, 2005, an IETF working group ratified RFC4130 for MIME-based HTTP EDIINT (aka. AS2) transfers, and is preparing a similar RFC for FTP transfers (aka. AS3). While some EDI transmission has moved to these newer protocols, the providers of the value-added networks remain active. EDI documents generally contain the same information that would normally be found in a paper document used for the same organizational function. For example an EDI 940 ship-from-warehouse order is used by a manufacturer to tell a warehouse to ship product to a retailer. It typically has a ship to address, bill to address, a list of product numbers (usually a UPC code) and quantities. It may have other information if the parties agree to include it. However, EDI is not confined to just business data related to trade but encompasses all fields such as medicine (e.g., patient records and laboratory results), transport (e.g., container and modal information), engineering and construction, etc. In some cases, EDI will be used to create a new business information flow (that was not a paper flow before). This is the case in the Advanced Shipment Notification (856) which was designed to inform the receiver of a shipment, the goods to be received and how the goods are packaged. There are four major sets of EDI standards:  The UN-recommended UN/EDIFACT is the only international standard and is predominant outside of North America.   The US standard ANSI ASC X12 (X12) is predominant in North America. The TRADACOMS standard developed by the ANA (Article Numbering Association) is predominant in the UK retail industry.  The ODETTE standard used within the European automotive industry

All of these standards first appeared in the early to mid 1980s. The standards prescribe the formats, character sets, and data elements used in the exchange of business documents and forms. The complete X12 Document List includes all major business documents, including purchase orders (called

"ORDERS" in UN/EDIFACT and an "850" in X12) and invoices (called "INVOIC" in UN/EDIFACT and an "810" in X12). The EDI standard says which pieces of information are mandatory for a particular document, which pieces are optional and give the rules for the structure of the document. The standards are like building codes. Just as two kitchens can be built "to code" but look completely different, two EDI documents can follow the same standard and contain different sets of information. For example a food company may indicate a product's expiration date while a clothing manufacturer would choose to send color and size information.

[edit]Specifications Organizations that send or receive documents between each other are referred to as "trading partners" in EDI terminology. The trading partners agree on the specific information to be transmitted and how it should be used. This is done in human readable specifications (also called Message Implementation Guidelines). While the standards are analogous to building codes, the specifications are analogous to blue prints. (The specification may also be called a mapping but the term mapping is typically reserved for specific machine readable instructions given to the translation software.) Larger trading "hubs" have existing Message Implementation Guidelines which mirror their business processes for processing EDI and they are usually unwilling to modify their EDI business practices to meet the needs of their trading partners. Often in a large company these EDI guidelines will be written to be generic enough to be used by different branches or divisions and therefore will contain information not needed for a particular business document exchange. For other large companies, they may create separate EDI guidelines for each branch/division. [edit]Transmission Trading partners are free to use any method for the transmission of documents. In the past one of the more popular methods was the usage of a bisync modem to communicate through a value added network (VAN). Some organizations have used direct modem to modem connections and bulletin board systems (BBS), and recently there has been a move towards using some of the many Internet protocols for transmission, but most EDI is still transmitted using a VAN. In the healthcare industry, a VAN is referred to as a "clearinghouse". [edit]Value-added

networks

In the most basic form, a VAN (value-added network) acts as a regional post office. They receive transactions, examine the 'from' and the 'to' information, and route the transaction to the final recipient. VANs provide a number of additional services, e.g. retransmitting documents, providing third party audit

For example. Hyper Text Transfer Protocol Secure (HTTPS). The VAN is responsible for routing. storing and delivering EDI messages. and handling telecommunications support.information. but have additional legal restrictions that govern protected healthcare information. a standard used by the World Wide Web. businesses frequently use a VAN even when both trading partners are using Internet-based protocols. AS2 provides security for the transport payload through digital signatures and data encryption. Many organizations are migrating to this protocol to reduce costs. Because each node in a traditionally business-related AS2 transmission usually involves a security certificate.  VANs may be operated by various entities Telecom companies   Industry group consortiums A large company interacting with its suppliers/vendors [edit]Internet/AS2 Until recently. routing a large number of partners through a VAN can make certificate replacement much easier. Healthcare clearinghouses perform many of the same functions as a VAN. non-repudiable delivery through the use of receipts. There are also standards for embedding EDI documents into XML. VANs also provide an advantage with certificate replacement in AS2 transmissions. AS2 (Applicability Statement 2) is the draft specification standard by which vendor applications communicate EDI or other business-to-business data (such as XML) over the Internet using HTTP. [edit]EDI via the Internet (Web EDI) The Internet. and AS2. uses its own communications protocols to ensure that EDI documents are transmitted securely. The most popular protocols are File Transfer Protocol Secure (FTPS). and ensures reliable. Value Added Networks   Value Added Networks are the go-between in EDI communications. Because of these and other services VANs provide. the Internet transmission was handled by nonstandard methods between trading partners usually involving FTP or email attachments. messages may need extra envelopes or may be routed using intelligent *VANs which are able to read the EDI message itself. The Internet has provided a means for any company. Wal-Mart is now requiring its trading partners to switch to the AS2 protocol (Wal-Mart EDI Requirement). to become part of a major supply chain initiative hosted by a global retailer or manufacturing . acting as a gateway for different transmission methods. They also provide delivery reports  Depending on the VAN type. as with VAN providers. no matter how small or where they are located in the world.

Using a friendly web-based interface. Even though VANs offer a very secure and reliable service to companies wishing to trade electronically.company. WebEDI is traditionally based on the "hub and spoke'"model. emerging regions such as Brazil. Many companies around the world have shifted production of labour intensive parts to low-cost. All you require is an Internet connection. and Eastern Europe.   Hubs or ASPs implement EDI using email or virtual mailboxes Trading partners can send EDI messages directly to a web-enabled EDI messaging site. via the hub. This is especially important in the emerging markets where IT awareness and infrastructure are very limited. suppose candy is packaged in a large box that contains 5 display boxes and each display box contains 24 boxes of candy packaged for the consumer. Simple pre-populated forms enable businesses to communicate and comply with their trading partners' requirements using built-in business rules. the Internet is making EDI more available to all. This service seamlessly transforms your data into EDI format and transmits it to your trading partner. webEDI enables small to medium-sized businesses to receive. You will also be able to receive EDI documents and send EDI invoices and shipping documents with no software to install. 240 consumer packaged boxes or 1200 . Web-based EDI. China. directly into the user's accounts system  WebEDI-based users can interact with VANs without incurring the costs of setting up a dedicated VAN connection [edit]Interpreting data Often missing from the EDI specifications (referred to as EDI Implementation Guidelines) are real world descriptions of how the information should be interpreted by the business receiving it. Russia. create and manage electronic documents using just a web browser. allows a company to interact with its suppliers in these regions without the worry of implementing a complex EDI infrastructure. EDI messages are simply sent using a web browser  Systems that are currently being developed will enable EDI messages to be displayed in a web browser and directed via open standard XML. edited and sent as easily as an email. turn around. with major trading partners or Application Service Providers (ASPs) being the hubs and smaller partners being the spokes. EDI transactions can be received. or webEDI. WebEDI has the added advantages that it is accessible anywhere in the world and you do not need a dedicated IT person to manage any software installation. India. In its simplest form. If an EDI document says to ship 10 boxes of candy it may not be clear whether to ship 10 consumer packaged boxes. For example.

not the direction of merchandise. the effect is devastating to both businesses. The translation software will then "validate" the EDI file sent to ensure that it meets the standard agreed upon by the trading partners. transform the file to the appropriate format for the translator. In case of a retailer sending a Purchase Order to a supplier. money or other things represented by the document. box or each. that the structure of the file meets the EDI standards and that the individual fields of information conforms to the agreed upon standards. For an "inbound" document the EDI solution will receive the file (either via a Value Added Network or directly using protocols such as FTP or AS2). Another critical component of any EDI translation software is a complete "audit" of all the steps to move business documents between trading partners. reduced customer service and ultimately lower profits. The next step is to convert/transform the file that the translator creates into a format that can be imported into a company's back-end business systems or ERP. Typically the translator will either create a file of either fixed length. pack. an integrated proprietary "mapper" or to use an integrated standards based graphical "mapper" using a standard data transformation language such as XSLT. EDI translation software provides the interface between internal systems and the EDI format sent/received. The audit ensures that any transaction (which in reality is a business document) can be tracked to ensure that they are not lost. The final step is to import the transformed file (or database) into the company's back-end enterprise resource planning (ERP). an EDI document that tells a warehouse to perform an outbound shipment is an inbound document in relation to the warehouse computer system.consumer packaged boxes. they must also agree on what that particular qualifier means. they have a stock outage and the effect is lost sales. validate that the trading partner who is sending the file is a valid trading partner. they do not fulfill the order as they have not received it thereby losing business and damaging the business relationship with their retail client. It is not enough for two parties to agree to use a particular qualifier indicating case. convert the file into "EDI" format (adding in the appropriate identifiers and control structures) and send the file to the trading partner (using the appropriate communications protocol). This can be accomplished by using a custom program. In EDI terminology "inbound" and "outbound" refer to the direction of transmission of an EDI document in relation to a particular system. For an "outbound" document the process for integrated EDI is to export a file (or read a database) from a company's back-end ERP. [edit]Advantages of using EDI over paper systems . if the Purchase Order is "lost" anywhere in the business process. To the supplier. take the received EDI file (commonly referred to as a "mailbag"). For the retailer. For example. variable length or XML tagged format or "print" the received EDI document (for non-integrated EDI environments). It is an outbound document in relation to the manufacturer or dealer that transmitted the document.

organizing. The key is to determine what method of integration is right for the company which will determine the cost of implementation.45 in North America. the invoice will typically be sent when the goods ship and will therefore require a process that handles large numbers of invoices whose corresponding goods have not yet been received.EDI and other similar technologies save a company money by providing an alternative to. [edit]Barriers to implementation There are a few barriers to adopting electronic data interchange.78 in APAC. In EMEA. EDI can be an important component of just-in-time production systems. The existing process may therefore assume that goods are typically received before the invoice. because EDI eliminates the need to rekey documents on the destination side. For a business that only receives one P. For example. Existing business processes built around slow paper handling may not be suited for EDI and would require changes to accommodate automated processing of business documents. According to the 2008 Aberdeen report "A Comparison of Supplier Enablement around the World". For this reason. In this case. and searching paper documents. $42. They also report that the average paper requisition to order costs a company $37. The preliminary expenses and time that arise from the implementation. the implementation of an integrated EDI solution may be necessary as increases in . meetings. distributing.O.83 in North America. businesses may implement inexpensive "rip and read" solutions or use outsourced EDI solutions provided by EDI "Service Bureaus". printed shipping manifests. Even when paper documents are maintained in parallel with EDI exchange. Another advantage of EDI is reduced errors. One very important advantage of EDI over paper documents is the speed in which the trading partner receives and incorporates the information into their system thus greatly reducing cycle times. customization and training can be costly and therefore may discourage some businesses. etc. or replacing information flows that require a great deal of human interaction and materials such as paper documents.05 in EMEA and $14. $34. Another significant barrier is the cost in time and money in the initial set-up. a business may receive the bulk of their goods by 1 or 2 day shipping and all of their invoices by mail. 41% of orders are transmitted electronically. One of the most significant barriers is the accompanying business process change. 36% of orders are transmitted electronically and in APAC.90 in EMEA and $23. e. electronic exchange and the use of data from that exchange reduces the handling costs of sorting. fully integrated EDI may not make economic sense. EDI and similar technologies allow a company to take advantage of the benefits of storing and manipulating data electronically without the cost of manual entry. only 34% of purchase orders are transmitted electronically in North America. such as shipping and billing errors. For other businesses. With EDI. per year from a client.g. faxes. With an EDI requisition to order costs are reduced to $23.90 in APAC.

detailing each [2] company's variation . the existence of EDI clearinghouses has sprung up. An EDI clearinghouse is one entity agreeing to act as a . [edit]Examples [edit]United of disadvantages of EDI States health care systems The United States health care system consists of thousands of different companies and other entities. For example. it would be more accurate to take the business view that EDI is a system for exchanging business documents with external entities. pressures from larger trading partners (called hubs) often force smaller trading partners to use EDI. 3. allowing a supplier to update a retailer's Accounts Payables system without appropriate checks and balances would be a recipe for disaster. Some entities may elect not to support different methods of delivery depending on a trading partner's expected volume. it set down standard transaction sets for specific EDI transactions and mandated electronic support for every insurance company in the United States for these transactions. In short. Many view EDI from the technical perspective that EDI is a data format. Each entity may have a different method of delivery. any partner not willing to use EDI with Wal-Mart will not be able to do business with the company. The key hindrance to a successful implementation of EDI is the perception many businesses have of the nature of EDI. the Health Insurance Portability and Accountability Act (HIPAA) was enacted. submission and testing of transactions between different entities in US health care.trading volumes brought on by EDI force them to re-implement their order processing business processes. In 1996. Businesses new to the implementation of EDI should take pains to avoid such pitfalls. Increased efficiency and cost savings drive the adoption of EDI for most trading partners. or FTP[4]. registration. But even if a company would not choose to use EDI on their own. 2. include managerial problems in the support. An example of this is Wal-Mart`s insistence on using EDI with all of its trading partners. the drawbacks. which gives way to the existence of Companion Guides. Due to varying implementation on nearly all points of EDI including contact. and integrating the data from those documents into the company's internal systems. Though an EDI standard exists for health care transactions. 1. though not directly related to EDI itself. mailing hard media such as a CD-ROM or tape backup. the standard allows for variation between implementation. Successful implementations of EDI take into account the effect externally generated information will have on their internal systems and validate the business information received. While the benefits of EDI are numerous and only increase with increased volume. maintenance and implementation of EDI transactions. ranging from dial-up BBS systems[3].

between organisations. such as between medical providers and insurance companies they accept coverage from. and its impacts are far greater than mere automation. Because of the above points. 4. Email enables freeformat. rather than between people. It is actually much broader in its application than the procurement process. though they may cover a large portion. textual messages to be electronically transmitted from one person to another. EDI." [5] BY: Nivedita Definition Electronic Data Interchange (EDI) may be most easily understood as the replacement of paper-based purchase orders with electronic equivalents. The essential elements of EDI are: . on the other hand. and transmits them electronically between computer applications. EDI offers the prospect of easy and cheap communication of structured information throughout the corporate community. Architecture for EDI EDI can be compared and contrasted with electronic mail (email). a survey of Canadian businesses found at least 140 that had adopted some form of EDI. Though this may not be necessary. One such example is Emdeon. This all comes at a massive cost in time and management as a company may attempt to support a broad range of transactions with a broad range of entities. one single computer application cannot handle all health care entities. it can lead to an obvious management headache as a company attempts to register itself with various EDI partners. and is capable of facilitating much closer integration among hitherto remote organisations. directly from a computer application in one organisation to an application in another'. In 1992. They may act as a value-added network and attempt to conform their different supported entities to one submission standard. and that they [had] in fact been disadvantaged by it. in an automated manner. transactions and methods. pre-printed forms or business documents). A more careful definition of EDI is 'the exchange of documents in standardised electronic form. supports structured business messages (those which are expressed in hard-copy. but that many (in the sample) "[had] not benefited from implementing EDI. and they may not cover all HIPAA-mandated transactions for all of their supported entities. An EDI clearinghouse will not cover all health care entities.middle-man between multiple entities and their end-clients. This example is an extension of the lack of strict standards across implementations.

the opportunity can be taken to rationalise procedures. This strategic potential inherent in EDI is expected to be. Benefits of EDI EDI's saves unneccessary re-capture of data. It is entirely feasible for organisations to implement EDI directly with one another. data management and networking capabilities. This leads to faster transfer of data. to enable the efficient capture of data into electronic form. speed and quality benefits. Because EDI necessarily involves business partners. and direct communication between applications (rather than merely between computers). less time wasted on exception-handling. Benefits can be achieved in such areas as inventory management. relatively fast delivery of electronic documents from sender to receiver (generally implying receipt within hours. far fewer errors. History of EDI . In addition. the use of structured. and hence a more stream-lined business process. the processing and retention of data. it can be used as a catalyst for gaining efficiencies across organisational boundaries. but increasingly the open. EDI offers the prospect of easy and cheap communication of structured information throughout the government community. EDI can be used to automate existing processes. A common connection point is needed for all participants. EDI depends on a moderately sophisticated information technology infrastructure. public Internet) rather than the despatch of physical storage media such as magnetic tapes and disks. in the medium term. together with a set of electronic mailboxes (so that the organisations' computers are not interrupted by one another). or even minutes). and efficient and reliable data transmission between remote sites. controlled access to it.y y y y the use of an electronic transmission medium (originally a value-added network. even more significant that the short-term cost. but it generally proves advantageous to use a third-party network services provider. and security and communications management features. and between government agencies and their suppliers and clients. and thereby reduce costs. interpreted and checked for compliance with an explicit set of rules). formatted messages based on agreed standards (such that messages can be translated. administration and cash management. and improve the speed and quality of services. transport and distribution. This must include data processing.

500 corporations using EDI in Australia and New Zealand. Benefits can be attained in such areas as inventory management. (5. In 1968 the United States Transportation Data Coordinating Committee (TDCC) was formed. and fewer data-caused delays in the business process. Problems created by the trans-Atlantic use of two different (and largely incompatible) sets of standardised documents have been addressed by the formation of a United Nations Joint European and North American working party (UN-JEDI). Electronic transmission commenced during the 1960s. The transaction volumes in Australia to date were. which gradually extended and replaced those created by the TDCC. but less so with the U. to coordinate the development of translation rules among four existing sets of industry-specific standards. Commerce and Transport (EDIFACT) document translation standards. These were later extended by the United Nations Economic Commission for Europe (UNECE) into what became known as the GTDI (General-purpose Trade Data Interchange standards). moreover. EDI's direct impact is to reduce the amount of data capture and transcription.00012. less time spent on exceptionhandling.000). .000 British exporting organisations. the U.The early applications of what became known as EDI were undertaken in the United States. it was claimed that there were 1. was developing its own standards for documents used in international trade. which began the development of the Electronic Data Interchange for Administration.000). and were gradually accepted by some 2. called Tradacoms.000) and Singapore (2. languages and numbers of copies) was addressed by devising a standard manifest. administration and cash management.K. A full range of business documents is in the process of being developed. A further significant move towards standardisation came with the X12 standards of the American National Standards Institute (ANSI). This generally results in a decreased incidence of errors.K. The idea's origins have an international flavour. Department of Customs and Excise. This would have compared favourably with the populations variously claimed for the U. (12. however. transport and distribution. By the time of the 1991 EDICA Conference in Sydney. with the assistance of SITPRO (the British Simplification of Trade Procedures Board).S. where the task of co-ordinating airfreighted consignments of food and consumables (which arrived with differing manifests. The standardisation of documents was a necessary concomitant to that change. being traceable back to the 1948 Berlin Airlift. At about the same time. small compared with those countries. initially in the rail and road transport industries.

.

purchase order or invoice y y . such as an investor report.The sending and/or receiving party involved in the exchange of EDI transmissions Translator .Software that is used to convert standardized EDI data to a corporate proprietary format and vice versa Transaction Set .Definitions y Trading Partner .The EDI format for a business document.

The use of EDI allows for the following benefits: y y y y y y y y y Reduced manual data entry Reduced postage and handling costs Reduced labor processing costs Reduced order cycle Increased customer service Improved accuracy of data Reduced lead times Reduced paper handling Reduced inventory carrying costs .

.

VANs are networks dedicated exclusively to EDI. where organizations communicate directly with one another over a private network. they also contain storage areas. entering into TPAs with them and purchasing the necessary hardware and software. EDI can occur point-to-point. a means of communication must be chosen. via the Internet (also known as open EDI). VANs are able to provide translation services to small organizations that find it too cost prohibitive to do in-house with their own software. similar to e-mail boxes. After identifying trading partners. where data sent from one party can be held until it is scheduled to be delivered to the receiver. Not only do they function like telephone lines by allowing for the transfer of information. and most commonly. . via value-added networks (VANs) provided by third-party value-added-network services.COMMUNICATION METHODS. Companies may need to join more than one VAN because their partners belong to more than one.

Additionally. Some charge high implementation or setup fees followed by low monthly usage fees. by the early 2000s most VANS were able to communicate with one another. or vice versa. VANs offer a wide variety of other services including data backup. training. Charges often are made based on the number of documents or characters involved in a given transmission. followed by a charge of 30 cents per 1.However. It can be less expensive for companies to make transactions during off-peak or evening hours. VANs vary in the way they charge companies.024 characters (per kilo character or k/char) transmitted. technical support. Depending on need. charges can vary depending on participants' phone companies and the time of day when transactions are made. . report generation. all of the services offered by a VAN may not be required by a particular company. one EDI provider charged its clients a monthly mailbox fee of $17. For example.50. In addition to translation. and the issuance of warnings if data is not properly transmitted between parties.

This paper examines the concepts from the perspectives of each discipline. Supplier X could recognize an electronic Purchase Order from Retailer A but not from Retailer B. three other issues are important for EDI trading to take place: standardization of formats. For example.e. 1.Intro EDI (Electronic Data Interchange) is simply the means to communicate between companies from one computer to another. most of our pay checks are directly deposited into our bank accounts). It is the marrying of these three disciplines that allows the "paperless trading" that comprises EDI technologies. Besides the three career disciplines that are internal to the organization. and data communications. data processing is clearly necessary for application processing. and value-added networks (VANs).1 Looking closer at EDI . The absence of a standard format led to the condition where computers could not longer "talk" to one another without a great deal of effort by programmers. The problem was that the all efforts employed proprietary or unique formats. Introduction Traditional electronic data interchange (EDI) has been evolving for approximately 25 years and has truly become the paperless environment that is so often talked about. Internet standards are excluded from the discussion of communications protocols. security. since the audience is probably already familiar with SMTP. Because the key idea involved is the exchange of documents that allow a business application to take place without human intervention. Data communication is then necessary for the exchange to take place. 2. EDI is a complicated mixture of three disciplines: business. This transfer of funds is accomplished by the use of an electronic file being sent form your company to your bank). data processing. What is EDI? Since EDI is commonly defined as the direct computer-to-computer exchange of standard business forms. 2. MIME. For many years companies have been using computers to send business documents instead of mailing paper documents (i. it clearly requires a business process. and other Internet messaging protocols.

In the EDI environment. inexpensive. whereas EDI requires standard message formats between trading partners. requests for quotations. Fax machines accept nonstandard data formats. payments. and anything that can be scanned can be faxed. e-mail requires human interface. 2.2 Comparing EDI and fax Similarities exist between EDI and fax in that both use telephones lines and both can travel from computer to computer (Sawabini. 3. fax also apply to EDI vs. invoices. the focus of this document in on EDI. quotations. The key idea involved is the exchange of documents that allow a business application to take place without human intervention. By incorporating a wide range of technologies. . EC includes EDI. and e-mail is not acceptable to applications. Fax is primarily paper based and requires a human interface. Often today one will see the term EC/electronic data interchange (EC/EDI). and the sharing of common databases as additional activities that aid in the efficient conduct of business. e-mail: e-mail message format is not standard. and safe method of sending purchase orders. and other frequently used business documents. but recognizes the need for interpersonal (human to human) communications. Many businesses choose EDI as a fast. 2. not EC. 1995).3 Comparing EDI and e-mail Similarities also exist between e-mail and EDI. Fax receipts are not generally acceptable to applications. EC being the broad view of electronic trading. three of the four differences listed for EDI vs. Data processing allows the EDI operation to take information that is resident in a user application and transform that data into a format that is recognizable to all other user applications that have an interest in using the data. There are distinct differences however.EDI is commonly defined as the direct computer-to-computer exchange of standard business forms. the transfer of moneys. The ability to send business documents between machines simplifies and expedites the business process itself. EDI is defined as the interprocess (computer application to computer application) communication of business information in a standardized electronic form. This term has evolved from placing EDI under the EC (EC) umbrella. However. as depicted in figure 1. Both travel from computer to computer and both use an electronic mailbox. data processing will handle both outgoing and incoming data. EC is much broader than EDI. However. Data processing and EDI One of the technological fields required to implement EDI is data processing.

Once the standards have been employed and the required software is in place. the new trading partner is simply set up under existing mapping rules. Data communications and EDI The other technological field that is heavily involved in EDI implementation is data communications. These files may or may not be formatted by the user. The mapping itself requires knowledge of both the translation software and the EDI standards being used so new mapping and processing rules can be set up for the translator. 1995). a new mapping scheme needs to be identified and associated with that trading partner (Sokol. 4.Figure 1: Data Processing and EDI The user-defined files in figure 1 are the flat files that are produced by a business application. The mapping of the user-defined data elements into the translation software requires some skill in mapping. 4. Following are some basic concepts that describe mechanisms and methods used in this transport of data: . This software is available through commercial retailers on various platforms from PCs to mainframes. the EDI participant still needs to have the ability to communicate with remote trading partners to take advantage of EDI. If a new trading partner places no new requirements on the translator. when the trading partner requires that additional or different data fields be sent. However.1 Transport mechanisms move the data Data must be transported across telecommunications lines in order for the trading partners to trade information. The translation software in figure 1 is the software that maps the elements of a userdefined file into the ANSI X12 or EDIFACT standard format. These are the business files that need to be translated into the X12 format.

again application independent. X.435.500.400 standard calls for an outer envelope that is application independent and is used to route the message. Some of these common standards are SMTP. In this standard. routers are used mainly over leased lines.400 is an electronic messaging standard that was developed by the Consultative Committee on International Telegraph and Telephone." This method allows for high-speed continuous transmission in which the sending and receiving modems are controlled by clock pulses. which is used to deliver the message to the recipient. Routers. is transmission by binary synchronous modem or "bisync. X. .2 Communications protocols standardize the data formats EDI transactions can be passed between trading partners using standard transmission protocols. and then reads the header to determine the recipient. and diagrams must be transmitted using protocols that allow the transfer of binary data. have the potential to become the de facto standard of transmission for high-volume traffic. requiring expensive setups and ongoing data communications transport costs. The clock pulses regulate the rate and timing of the data flow. Modems are heavily used by EDI practitioners today. A message transfer agent (MTA) receives the message. charts.400. Currently. Internet Protocols are excluded from this discussion as the audience is already very familiar with them.400 header precedes the message itself. although not the primary transport mechanism for EDI transactions today. discards the outer envelope.Direct connect is the term used to indicate that two EDI trading partners trade information directly to each other without a third-party connection service. Graphic images. as this paper is written. an X. each body part being an application-specific message. X. Direct connects are normally used by large corporations for intracompany EDI transactions and for intercompany transactions with trading partners that have established highvolume rates of exchange of EDI data. 4. and X. which is tasked with developing standards to enable incompatible networks and computer systems to exchange data. The architecture of the X. MIME. Within the outer envelope lies the content header. Modem-to-modem connections provide a level of security and reliability that long-time practitioners are reluctant to give up. The header allows the sender of the message to specify information relating to the transmission and delivery and notice requests. The message itself is composed of body parts. The standard in the industry.

" 5. X.500 is an addressing directory containing the names and characteristics of electronic messaging receivers. The business process and EDI Any business application that can be improved through paperless trading in a fast. The idea is the production of a global electronic directory and a guide to associated databases so the user can find an e-mail address if it is needed and not known. including those that include the X. new EDI technology is developing fastest in this area. within industry itself.2 A typical small purchasing application The business application depicted in figure 2 is a simple purchasing application. . First. the President has issued an initiative to streamline government procurement through the use of EC.400 messages. efficient environment is a good candidate for EDI. X. 5.X. The current push in the EDI world comes from companies who wish to trade with each other electronically--buyers and their suppliers--hence the term "trading partners. the thrust within the government has been to implement the initiative using EDI technologies. This business process was chosen for two reasons. Second.435 standard.435 is the specification for the EDI body part that attaches to the X. These factors make the procurement process the most relevant business process to examine at this time 5. X. banking industry.400 standard to make it deal more effectively with EDI transmission requirements. and auto industry.500 facilitates the delivery of X.435 is a standard that further enhances the X.400 message. credit card industry.1 Applications of EDI The business process examined here to which to apply EDI concepts is the procurement process. EDI is currently widely used by the airline industry. Since the initiative was announced in October 1993.

Typically. the supplier issues a quotation to the buyer. Any drawings. Normally a list of terms and conditions designed to give legal protection to the buyer on various matters prescribed by law are incorporated in. diagrams.and then Figure 2: Business Application and EDI As shown in figure 2. all purchase . the purchasing department issues a serially numbered purchase order. Once a supplier has been selected. the buyer begins the process of selecting the supplier that will be used. or related documentation that is necessary to precisely describe the item being purchased will be incorporated or referenced in the purchase order. an RFQ might be issued for 200 gallons of white. When competitive bidding is used. The quotation will contain pricing information so the buyer can do a price comparison between the suppliers. the procurement process normally begins with the buyer being made aware of a need within the organization to make a purchase. When a supplier receives an RFQ that the supplier has an interest in bidding on. Additionally any conditions or sampling plans will be stated precisely. or attached to. For instance. As soon as a need is established and precisely described. The supplier who is issuing a quotation may quote a price of $xxx. The purchase order itself becomes a legally binding contract. or a combination of the two to secure the final supplier. New items or high-value items may require investigation by the buyer in selecting an appropriate supplier. For this reason the buyer will carefully prepare the purchase order and ensure that the wording is precise and specific. The buyer will select a preliminary group of suppliers and then employ the methods of competitive bidding. Routine items may be purchased using suppliers that have already been contracted with. the buyer issues an RFQ to the suppliers that the buyer might be willing to do business with. negotiation.xx. latex-based paint. the RFQ will contain the same basic information that will be included on the purchase order.

delivery performance and contract termination. then the business process is a candidate for EDI. shipment rejections. Marriage of the three disciplines EDI involves three very different and distinct disciplines. terms and conditions that are in conflict between buyer and seller are excluded from the contract. Normal business methods suggest that the supplier may not bother to acknowledge the offer if the items are immediately shipped to the buyer. there has to be a business process. The supplier may acknowledge the buyer's order accepting the buyer's terms and conditions. or may acknowledge and incorporate the supplier's own terms and conditions in the acknowledgment. and invoicing and payment procedures. Second. contract acceptance. Change orders are required when a company makes a change in the contract after a purchase order has been issued. warranties. These boilerplate terms and conditions cover a wide range of concerns including.orders as boilerplate to those orders. In general. 6. compliance with regulations. First. when accepted by the supplier. once the business process has been identified. For this reason it is imperative that the buyer beware of the terms and conditions in the order acceptance. the change order either supplements or replaces the original purchase order. The purchase contract then comes into existence when the contract is performed or when formal acknowledgment of acceptance of the offer is made. The business process is the domain of the business functional area. patent rights and infringements. then the supplier should send the acknowledgment back to the buyer. The original copy of the purchase order constitutes a legal offer to buy. The buyer will issue the change order and. leaving the settlement to negotiation or suit. Some type of standard must come into play in the automation process so that paper documents that are the output of the business process can be put into a format that is interchangeable between computers. If the business process would be improved by being accomplished more quickly and with increased efficiency. assignment and contracting or the order. When the items are not immediately shipped. If the seller's terms are different than the buyer's. the law allows them to be incorporated into the contract as long as they do not alter the buyer's intent or unless the buyer files a written objection to the inclusion of new terms and conditions. data processing technologies have to be applied to the business process so that the process can be handled using computers. The automation of the business process is the .

7. Even on a slow modem connection. they keystroke the information received into a local application and then perform more data entry by entering a response into a local application. The data is then translated into a standard format electronically and sent to the trading partner electronically. at the original point of entry.1 Paper document flow The traditional document flow for purchasing transactions starts with data entry by the purchaser to create a paper document to send by mail to trading partners.domain of the data processing discipline. At the receiving end. The data communications aspect of EDI is the domain of the data communications discipline. The resultant paper document is then mailed to the purchaser. As EDI technologies evolve. once at the point of creation and once at the point of entry to the foreign system. do not use the same . 1991). using data communications technologies. document standards are the heart of EDI (Kimberly. Standards Although communications and document standards are both critical. though using the same types of data. the time is considerably shorter than through the postal service. the data fields are mapped into local applications. the terminology changes.1 The role of standards Standards are a necessary part of EDI. and the only data entry required is for new data that may be needed to respond to the data received. The procedure is both time consuming and labor intensive because data from both trading partners has to be entered twice. Once the trading partners receive the data. In addition. Every business has application files that are used to manipulate their data in ways that are familiar to the business. Third. the originator must await a paper response sent by mail. 6. 7. The marriage of these disciplines allows for the "paperless trading" that comprises EDI technologies. the standardized business form must be transmitted from and received by computers. The problem is that most businesses.2 EDI flow EDI data is key in only one time. 6. Time for transmission is also very fast in comparison to postal mail.

This requirement makes the standard more complex than an industry-specific standard. All business that conform to specific standards can share data in the formats delineated by those standards. has been moving at a snail's pace. Everyone agrees that EDIFACT is the international standard. has developed the EDI standard that is used in Europe. depending on the level of security needed. a business has multiple functionality and only has to use one standard for each business function.S. The actual implementation of EDIFACT within the U. Standards are the solutions to this problem. Security One of the major roles that is provided by the data communications technology is the ability to apply security to EDI transactions so that the transactions will not be tampered with or observed.application programs or hardware and software platforms. 7. an organization within the United Nations. If businesses are to be able to communicate their data to one another. One of the requirements placed on the committee was and is to keep the standard open to interindustry applications. and Transportation (EDIFACT) is the UN standard that the whole world has agreed to eventually adopt. 7. . most notably HL7. but tried and true X12 standards are not abandoned in favor of EDIFACT.4 Other document standards Other document standards are in existence.3 EDIFACT The International Standards Organization (ISO). 7. Commerce. which is used by the hospital systems and is ANSI approved. The Electronic Document Interchange for Administration. With a single standard. The ANSI ASC X12 committee has the mandate to develop variable-length data formats for standard business transactions. and the X12 standard has been evolving ever since. they must have a common ground to meet on to allow the exchange of the information. The standard appears to currently be taking the same route that metric standards have taken. but the advantages easily overcome the disadvantage of complexity. 8. The security modules that are discussed in this section are depicted in figure 3.2 ANSI ASC X12 The American National Standards Institute's Accredited Standards Committee X12 (ANSI ASC X12) is the accepted standard for EDI transactions in the United States. The committee was accredited in 1980.

Encryption is the scrambling of data so that it indecipherable to anyone except the intended recipient. Confidentiality is provided by encryption. There are two . Encryption prevents snoopers. Confidentiality is concerned with the unauthorized viewing of confidential or proprietary data that one or both of the trading partners does not want known by others. as well as in protection of proprietary information and as a deterrent to theft of information services. and other prying eyes from viewing data that is transmitted over telecommunications channels. This confidentiality is an essential component in user privacy.1 Confidentiality Confidentiality requires that all communications between parties are restricted to the parties involved in the transaction. hackers.Figure 3: Data Communications Security 8.

including browser authentication. The digital certificate has multiple functions. The recipient broadcasts the public key to all senders or to a public location where the key can be easily retrieved. private-key and public-key encryption. in general.2 Authentication Both parties should feel comfortable that they are communicating with the party with whom they think they are doing business. There are several disadvantages to private-key encryption. The private key. it should not be possible to modify data in storage. However.3 Data Integrity Data sent as part of a transaction should not be modifiable in transit. The latest technology to provide authentication is through the use of digital certificates that function much like ID cards. Similarly. Public-key encryption is gaining wide spread acceptance as the preferred encryption technology. one public key and one private key. In order to remain secure. the keys must be changed periodically and the users must be in synch as to the actual keys being used. With public-key encryption. databases will be built to store public keys and enhance the technology significantly. 8. Data integrity is a guarantee that what was sent by the sender is actually what is received by the receiver. Private-key encryption requires that both sending and receiving parties have the same private-encryption keys. . With the advent of X.500. a message recipient generates a matched set of keys. 8. The sender encrypts the data using his key. is cumbersome and expensive. Public key technology is the direction encryption technology is currently headed. The receiver then decrypts the message using his identical key. This schema requires that the private key cannot be generated from the public key. This is necessary if there is a need to ensure that the data has not been changed either inadvertently or maliciously. Encryption. which is held in private by the recipient is the only key that can decipher messages encrypted with the matched public key.basic encryption schemes. A normal means of providing authentication is through the use of passwords. authentication schemes do not hide data from prying eyes. Any sender who needs to send the receiver an encrypted message uses the recipient's public key to encrypt the message.

For example. a contracting officer may have a specified spending limit. . then data has not been modified.000. Value-added networks As seen in the previous discussions. For small businesses and businesses that do low volumes between each other the cost is not always worth the efficiencies achieved. the receiver runs the identical algorithm and then compares the results. A digital signature algorithm can be used to generate digital signatures. The normal mechanism for acquiring data integrity is for the sender to run an algorithm against the data that is being transmitted and to transmit the result of the algorithm separately from the transmission.000. say $25. the seller may not have the authority to fill the order because the signature of the contracting officer's supervisor is needed on all orders over $25. The authorization limits normally will have been agreed upon through a trading partner agreement. setting up to use EDI involves considerable expense. Electronic signatures are the computerized version of the signature function. Thus the signatory cannot repudiate the signature at a later date. 9. Upon receipt of the transmission.Providing data integrity is generally cumbersome and not used unless one of the trading partners requires it. 8. The digital signature is also useful to the recipient as a nonrepudiation device whereby the recipient can prove to a third party that the signature was in fact generated by the signatory. If the results are identical. The current technology ensures this through the use of digital signatures. Commercial Value-added networks (VANs) make the burdens of the communications complexities easy by offering their communications services to prospective EDI users (Bort and Bielfeldt. If that contracting officer decides to place an order for $30.4 Nonrepudiation Neither party should be able to deny having participated in a transaction after the fact.000.1 Connectivity VANs establish communications paths between their customers and with other VANs. Signatures are needed in some business applications for authorization purposes. 1996). 9. By using these services a business does not have to worry about the myriad of communications complexities from having trading partners using different hardware. The digital signature itself is used to detect unauthorized modification to data and to authenticate the identity of the signature.

Figure 4: Value-Added Network Connection Likewise. 9. . In both cases. The electronic mailbox is used for both store-and-retrieve and store-and-forward operations.software. instead of simultaneously. Value-added services offer the traditional VAN services and add to that the translation services required to create an X12 file. A business with an X12 translator still needs personnel on board that understand X12 and can use the software effectively. and transport mechanisms. the sender of the EDI message transmits the electronic message to the VAN on its own time schedule. The VAN then acts on the message depending on whether the service is store-and-retrieve or store-and-forward. This service enables the sender and receiver to communicate. Store-and-retrieve service allows the VAN to store the message in the receiver's mail box. These services allow the typical business to enter the EDI arena at minimal cost and maximum efficiency. but at different times of the day.2 Delivery Mailbox software is the most important feature offered by VANs. The typical buyer-VAN-seller connection is depicted in figure 4. EDI software is not inexpensive. The receiver then retrieves its messages based upon the needs and schedules of the receiver.

Access control is normally provided by a login and password sequence. 9. a VAN provides security at several levels for its mailbox customers. Many trading partners require acknowledgment for transactions received. the VAN can provide an audit trail of the requested data.4 Audit and control One of the features a VAN can offer a customer is a usage accounting data option whereby the VAN reports how much traffic comes to the customer in a given time period. both sender and receiver employ the services of a VAN because it eliminates the need to support different communications configurations between themselves and their trading partners.Store-and-forward service allows the VAN to forward messages to the receiver when the business need is not for immediate or event-driven notification. Messages are screened for the individual customer to ensure that they were sent by authorized trading partners of the customer. . 1995). This service requires that the encryption be done at the customer site to be of any real value. 9. The standard VAN interconnection is through bisynchronous modem connections. Some VANs offer cryptography services. Transmission status reports to clarify status of an individual transaction are also available (Canis. Using VANs also reduces the cost of communications equipment and staff to support the multiple configurations. Still. and ensures they are acceptable to the customer. The VAN can also track the transaction traffic. 9. This is not an issue because VANs interconnect regularly with each other.3 Security Generally. and VANs can provide automatic sending of acknowledgments. This service also checks for message types and formats.5 Value-added services In the typical EDI implementation. If specific transactions need to be tracked. not all trading partners will use the same VANs. The cryptography is used to authenticate and encrypt messages to ensure confidentiality. Event-driven mailbox services can be handled by forwarding of the message to the receiver or by immediate notification from the VAN to the receiver that a message has been stored that meets the prearranged criteria for event-driven notification.

feed the EDI data received back into the databases and back-end processes have a huge impact on the total level of automation within the organization. In the past. is just another way to format and transfer data. Effects and level of automation The benefits associated with EDI often cause overblown expectations. Normally if these services are used. in turn. Conclusions and future of EDI EDI is well established as effective technology got reducing costs and increasing efficiency. the effects of EDI will be lessened considerably. But if the automation level of the organization is not high and is not integrated. The effects of EDI depend greatly on the level of automation within an organization. The real use of EDI and the amount of value to be gained from its implementation depend upon whether or not EDI is integrated into the overall data processing effort of the organization. If the organization is only using EDI to send data in a format required by a trading partner. As the two technological communities begin to merge and as the business community sees the advantages of this merger. EDI applications that are fed by back-end processes and the databases that support these processes and then. 11. As EDI working groups within the Internet Engineering Task Force create interoperability standards for the use of EDI over the Internet and as security issues are addressed.Most VANs offer translation services so that customers do not have the need to purchase or maintain translation software. and reduced order-cycle times--is attainable. EDI over the Internet will be part of normal business. The EDI working group already has a charter for an interoperability . 10. EDI. the effect is much more limited than if EDI is integrated into the back-end processes of the organization. EDI technologies are approximately the same age as Internet technologies. EDI and the Internet will eventually become ubiquitous. VANs have the capability to respond to presence of data and can fax or e-mail a notification to the customer if data is in the customer's mailbox. but this is rapidly changing. The well-known list of EDI-related benefits--lower costs. in and of itself. the technologies have been mutually exclusive. the customer will supply the formats for the data and the VAN will map the data itself. EDI users are already seeing dramatic cost savings by moving their traffic from the traditional VAN services to the Internet. higher productivity.

standard for process-to-process EDI. batch-style interactions. . real-time EDI over the Internet will replace normal time-delayed. Once that standard is in place.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->