Professional Documents
Culture Documents
Information technology (IT) has become a vital and integral part of every
business plan. From multi-national corporations who maintain mainframe
systems and databases to small businesses that own a single computer, IT plays
a role. The reasons for the omnipresent use of computer technology in business
can best be determined by looking at how it is being used across the business
world.
FUNCTION IT SYSTEMS
Function IT systems are applications that allow individuals to function
effectively in the workplace. Examples of common IT systems that enhance
workplace functions are word processor applications, spreadsheet applications,
statistical analysis software and computer aided design (CAD) programs.
Employees can work and perform their task individually or collectively using
these specialized software technologies.
NETWORK IT SYSTEMS
Network IT systems allow effective communication within and outside an
organisation. Examples range from simple e-mail (electronic mail) to blogs,
wiki sites, IM (instant messaging) and electronic conferencing systems. These
types of technologies promote interaction and collaboration among working
groups and also facilitate quick information flow at all levels.
2 | Page
MANAGEMENT IT SYSTEMS
Management IT systems (MITS) can be defined as planned applications that are
designed to process data and transform the processed data into useful
information for management decision making.
It should be noted that Management Information systems (MIS) are subsets of
Enterprise IT systems (this is explained later on in this article). However,
because of the vital role MIS play in a business environment, it is considered
here as a major information technology for businesses.
In a typical scenario, management operates at different levels and so it is
possible to apply management information systems at these varied levels.
Basic examples of management information systems are human resources
management systems, financial management information systems and
marketing management information systems.
ENTERPRISE IT SYSTEMS
Enterprise IT systems are technologies designed to integrate and manage entire
business processes for large organisations. Typically, enterprise application
software is hosted on large servers over a computer network. Transmission of
information can either be internal or external.
Examples of enterprise information systems may be accounting software, health
care specific software or Electronic Data Interchange (EDI). Another good
example of software application within this category is Customer relationship
3 | Page
processes to improve data quality either at the source or over its lifecycle.
Challenges arise when it is time to assign resources to be accountable for data
quality and fix data issues, which is precisely when IT needs to transfer
ownership of data governance to the business while continuing with oversight
and the essential role IT plays in data governance success.
until present time. Since computers can be considered as the key innovations to
the development in information technology, from that time on information
technology is literally defined as tool, application, systems or simply products
which are based on computer-processed information.
can
be
shared.
COMMUNICATION
7 | Page
INVENTORY MANAGEMENT
DATA MANAGEMENT
The days of large file rooms, rows of filing cabinets and the mailing of
documents is fading fast. Today, most companies store digital versions of
documents on servers and storage devices. These documents become instantly
available to everyone in the company, regardless of their geographical location.
Companies are able to store and maintain a tremendous amount of historical
8 | Page
Storing data is only a benefit if that data can be used effectively. Progressive
companies use that data as part of their strategic planning process as well as the
tactical execution of that strategy. Management Information Systems (MIS)
enable companies to track sales data, expenses and productivity levels. The
information can be used to track profitability over time, maximize return on
investment and identify areas of improvement. Managers can track sales on a
daily basis, allowing them to immediately react to lower-than-expected numbers
by boosting employee productivity or reducing the cost of an item.
Companies are using IT to improve the way they design and manage customer
relationships. Customer Relationship Management (CRM) systems capture
every interaction a company has with a customer, so that a more enriching
experience is possible. If a customer calls a call center with an issue, the
customer support representative will be able to see what the customer has
purchased, view shipping information, call up the training manual for that item
and effectively respond to the issue. The entire interaction is stored in the CRM
system, ready to be recalled if the customer calls again. The customer has a
9 | Page
better, more focused experience and the company benefits from improved
productivity.
DEFINITION (INFORMATION
TECHNOLOGY)
Information
technology (IT)
is
the
application
as computer
10 | P a g e
BUSINESS/IT ALLIGNMENT
Business-IT alignment is a dynamic state in which a business organization is
able to use information technology (IT) effectively to achieve business
objectives - typically improved financial performance or marketplace
competitiveness. Some definitions focus more on outcomes (the ability of IT to
produce business value) than means (the harmony between IT and business
decision-makers within the organizations)
12 | P a g e
also need less or perhaps no more physical space and resources to manage all
the data and information related to your business.
Another role of information technology in business which is no less crucial is to
minimize costs. In the first place, automation will reduce even eliminate the
need for human power to do certain tasks. On different occasion, information
technology application in business can help alleviate overall operating costs
because you do not have to make frequent close or distant trip to see and talk
with customers, clients, business partners, or even your own colleagues. In the
same way, you can also make the most of your time thanks to mobile devices.
You can practically work from anywhere, anytime. Sending emails, editing
documents, and doing presentations while on the go. Now your office can tag
along wherever you go. You no longer have to be confined to the office and still
become more productive in business.
BETTER COMMUNICATION
technology, you can accelerate decision making process and most importantly,
brings money into your business.
Previously, your products and services are only exposed to certain group of
people within your network. However, with the advance of information
technology, you now can reach a wider audience than you ever expected.
Instead of words of mouth, recent information technology products such as
social media or social games promotes viral marketing where messages are
passed like domino effects to unidentifiable amount of audience which may or
may not be your target audience. In one way, you can deliver messages of your
business to greater amount of audience without making much effort. However,
it is argued that most of the time this method just does not work due to its
anonymous nature.
Last but not least, information technology also assume a role in improving your
business because of the insight and understanding it offers. Like previous
example of creating buzz prior to new product launch, you can actually gain
significant data of your target audience buying behavior as well as general
market insight. By better understanding market demand and consumer buying
behavior, you will be able to tailor a more specific, if not well-suited solutions
and hopefully, boosting sales or performance.
15 | P a g e
16 | P a g e
IT has also helped to bridge the cultural gap by helping people from different
cultures to communicate with one another, and allow for the exchange of views
and ideas, thus increasing awareness and reducing prejudice.
IT has also made it possible for businesses to be open 24 x7 all over the globe.
This means that a business can be open anytime anywhere, making purchases
from different countries easier and more convenient. It also means that you can
have your goods delivered right to your doorstep with having to move a single
muscle.
Lastly, IT has helped in the creation of new and interesting jobs like Computer
programming, Systems analyzing, Hardware and Software developing and Web
designing.
Now that business has become very competitive, there is the need to use IT to
remain ahead and in business. Good IT use can get you ahead of competitors.
In terms of Functionality and Flexibility, internally IT can help improve
infrastructure performance thus increasing functionality and the range of
options that can be pursued. Externally, it can help create an efficient, flexible
online/offline platform for doing business with customers, suppliers and
partners.
In commerce, IT can internally help improve internal operating efficiency and
quality. Externally, it can help streamline and integrate channels to market,
create new channels and integrate multiple online/offline channels.
IT can also help improve the performance of knowledge workers and enhance
organizational learning. Externally, it can improve the performance of
knowledge workers in customer, supplier and partner organizations; add
17 | P a g e
information value to existing products and services; create new informationbased products and services.
IT can also help attract and retain top talent; increase satisfaction, engagement
and loyalty; create a culture of involvement, motivation, trust and shared
purpose. Externally, can help attract and retain high quality customers,
suppliers, partners and investors; increase external stakeholders satisfaction,
engagement and loyalty.
The combination of computers, the Internet, servers, and other high-tech
equipment can have a profound impact on daily operations. Here are some
specific advantages of IT and why its worth implementing in your business.
Whether its customer contact info, inventory, or finances, you need to back up
sensitive data and keep it out of the hands of the wrong parties. In the past, this
was typically limited to saving information on a computer, disc, or USB, where
it could be compromised or destroyed.
IT offers a significant improvement because it provides more comprehensive
security for electronic information so you can have greater peace of mind that it
wont be lost.
When you store data on multiple servers and allow access only to a small
number of authorized individuals, it becomes extremely difficult for hackers to
get a hold of it, or for a technological disaster to destroy it. Important
18 | P a g e
information will remain in safe hands and your business will experience
minimal downtime, even in a worst-case scenario.
One of the main factors that determines productivity is how efficiently team
members can work with others. In an increasingly globalized world, its more
and more common for companies to employ a dispersed workforce with people
working in different states and even different countries.
Outdated systems can inhibit communication and collaboration, but information
technology greatly improves it and allows team members to work side by side
throughout all stages of a project, even if theyre not in the same location.
Since its just as easy to work remotely as it is from a central office, you can get
more done in less time. By taking it one step further and utilizing mobile
devices like smartphones and tablets, tasks can be completed even on the go and
deadlines will more often be met.
This also minimizes the potential for mistakes, which should ultimately improve
the customer experience.
TOP-TIER TALENT
19 | P a g e
to a small geographical area, youre free to hire team members from all over the
world.
This makes it ideal for companies in smaller towns that simply dont have the
talent pool of larger cities. It can also help attract highly skilled individuals
because of your businesss efficiency. With an organized infrastructure acting
like a well-oiled machine, employee retention and minimal turnover should
become more the rule for your company rather than the exception.
FINANCIAL SAVINGS
EXPERT SUPPORT
By investing in IT infrastructure, youre typically covered whenever a techrelated issue arises. Whether you experience a software glitch or a network goes
down, having quick access to professionals ensures that your business will get
the help it needs to stay functional.
20 | P a g e
This allows your regular employees to perform their jobs and focus on whats
really important, with little disruption to daily operations.
BUSINESS OBJECTIVES OF
INFORMATION TECHNOLOGY
PRODUCT DEVELOPMENT
Information technology can speed up the time it takes new products to reach the
market. Companies can write product requirement documents by gathering
market intelligence from proprietary databases, customers and sales
representatives. Computer-assisted design and manufacturing software speed up
decision making, while collaborative technologies allow global teams to work
on different components of a product simultaneously. From innovations in
microprocessors to efficient drug delivery systems, information technology
helps businesses respond quickly to changing customer requirements.
STAKEHOLDER INTEGRATION
where a service agent could look up the relevant information on severs based in
corporate headquarters in Dallas, Texas, or in Frankfurt, Germany. Public
companies use their investor relations websites to communicate with
shareholders, research analysts and other market participants.
PROCESS IMPROVEMENT
COST EFFICIENCIES
22 | P a g e
COMPETITIVE ADVANTAGE
GLOBALIZATION
23 | P a g e
A.
BUSINESS
TECHNOLOGY
IS
CONTINUOUSLY
b.
c.
d.
24 | P a g e
2.
In
the
1980s,
business
technology
became
known
b.
3.
b.
Information
technologys
role
became
to CHANGE business.
B.
b.
c.
NASDAQ
electronic
stock
25 | P a g e
3.
b.
Virtual
communities
are
forming
as
people
C.
MOVING
FROM
INFORMATION
TECHNOLOGY
2.
3.
4.
5.
26 | P a g e
II.
THE
ROAD
TO
KNOWLEDGE:
THE
INTERNET,
2.
3.
B.
2.
b.
Others
create
interactive
intranets,
allowing
3.
b.
4.
5.
6.
7.
b.
C.
BROADBAND TECHNOLOGY.
1.
2.
28 | P a g e
b.
3.
b.
4.
b.
29 | P a g e
III.
MANAGING INFORMATION.
A.
MANAGERS
HAVE
ALWAYS
HAD
TO
SIFT
2.
Businesspeople
refer
to
this
information
overload
as "INFOGLUT."
3.
4.
b.
30 | P a g e
c.
d.
5.
b.
B.
MANAGING KNOWLEDGE.
1.
KNOWLEDGE
MANAGEMENT means
sharing,
b.
3.
31 | P a g e
IV.
2.
3.
B.
HARDWARE
Hardware includes computers, pagers, cellular phones, scanners,
printers, fax machines, and personal digital assistants.
32 | P a g e
1.
2.
C.
2.
3.
People are taking the Internet with then, and this has
changed the way information is delivered.
4.
D.
COMPUTER NETWORKS.
1.
FROM
PROCESSING TOWARD
MAINFRAME
NETWORK
COMPUTER
SYSTEMS that
In
the
SYSTEM (also
new NETWORK
COMPUTING
called CLIENT/SERVER
2.
33 | P a g e
b.
c.
ii.
3.
4.
b.
c.
5.
6.
7.
8.
34 | P a g e
V.
SOFTWARE.
A.
COMPUTER
b.
c.
2.
35 | P a g e
b.
B.
BUSINESSPEOPLE
MOST
FREQUENTLY
C.
1.
2.
3.
4.
5.
6.
ACCOUNTING.
D.
NEW
CLASS
OF
SOFTWARE
PROGRAM,
36 | P a g e
VI.
EFFECTS
OF
INFORMATION
TECHNOLOGY
ON
MANAGEMENT.
A.
b.
2.
3.
ADVANTAGES OF TELECOMMUTING:
a.
b.
EMPLOYEES and
EXPERIENCED
EMPLOYEES
by TEMPTING
OUT
OF
RETIREMENT.
37 | P a g e
c.
d.
WITH
SMALL
CHILDREN and
is
4.
DISADVANTAGES OF TELECOMMUTING:
a.
Long-distance
work
can
give
workers
c.
d.
5.
Electronic
communication CAN
NEVER
REPLACE
b.
c.
d.
e.
B.
SECURITY ISSUES.
1.
2.
b.
c.
3.
Viruses
are
spread
by
downloading
infected
c.
Software
programs
such
as
4.
C.
b.
c.
d.
PRIVACY ISSUES.
1.
b.
2.
b.
3.
b.
c.
d.
e.
D.
STABILITY ISSUES.
1.
2.
3.
41 | P a g e
VII.
2.
B.
RESEARCHERS
WHO
HAVE
OF
2.
42 | P a g e
Information Technology in business can also open up opportunities for low cost
business operations. Many companies and entrepreneurs, for instance, go into
telecommuting when looking for workers and employees. Not only does
43 | P a g e
44 | P a g e
CLOUD COMPUTING
Indeed, these so-called micro-multinationals have the same capabilities at their
fingertips as their larger counterparts because they can purchase most
communications and computer infrastructure necessities online at minimal cost.
For instance, for as little as 10 cents an hour, companies can purchase cloud
computing services which offer nearly unlimited computing capacity
from notable providers such as Amazon, Google, and Microsoft.
OTHER IT RESOURCES
In addition, email and social networks, "wikis" (shared Web pages on which
people can post and edit messages), voice-over Internet services, video
teleconferencing, and online sales and advertising platforms all provide nearly
limitless possibilities to connect, outsource, and streamline business operations.
Aside from improving company performance, these platforms are increasingly
important in finding new clients and matching talent pools with job
opportunities.
47 | P a g e
TECHNOLOGY STRATEGY
Technology strategy (Information Technology strategy or IT strategy) is the
overall plan which consist of objective(s), principles and tactics relating to use
of the technologies within a particular organization. Such strategies primarily
48 | P a g e
focus on the technologies themselves and in some cases the people who directly
manage those technologies. The strategy can be implied from the organization's
behaviors towards technology decisions, and may be written down in a
document.
Other generations of technology-related strategies primarily focus on: the
efficiency of the company's spending on technology; how people, for example
the organization's customers and employees, exploit technologies in ways that
create value for the organization; on the full integration of technology-related
decisions with the company's strategies and operating plans, such that no
separate technology strategy exists other than the de facto strategic principle
that the organization does not need or have a discreet 'technology strategy'.
A technology strategy has traditionally been expressed in a document that
explains how technology should be utilized as part of an organization's
overall corporate strategy and each business strategy. In the case of IT, the
strategy is usually formulated by a group of representatives from both the
business and from IT.[1] Often the Information Technology Strategy is led by an
organization's Chief Technology Officer (CTO) or equivalent. Accountability
varies for an organization's strategies for other classes of technology. Although
many companies write an overall business plan each year, a technology strategy
may cover developments somewhere between three and 5 years into the future.
INFORMATION TECHNOLOGY IN
BANKS AS A BUSINESS
The term Information Technology is often used in a broader sense to include
Information systems as well as Information Technology. However Information
49 | P a g e
50 | P a g e
2. Operating Systems such as DOS & WINDOWS, UNIX & LINUX which
act as an interface between the application programmes and computer
hardware.
3. Software Packages and Development tools which are used for developing
applications to store and process data. Various database systems,
relational databases, front end tools, programming languages are some of
the examples of this type.
4. Networking systems, which enable computers at different locations to
communicate with each other for file transfers, job processing and
resource sharing. These include networks operating within a limited area
to networks, which spread across the world.
5. Telecommunication systems such as analogue and digital networks,
satellite networks which provide media for data transmission and
networking for co-operative processing of data and resource sharing.
52 | P a g e
sector banks and other institutions. In order to facilitate banks to have better
control over their funds, it was proposed to introduce national settlement system
(NSS) in a phased manner.
members to report all their call/notice money market deals on NDS. Deals done
outside NDS should be reported within 15 minutes on NDS, irrespective of the
size of the deal or whether the counterparty is a member of the NDS or not.
2. Full compliance with the reporting requirement to NDS was reviewed in
September 2003. In some cases where there was repeated non-reporting of
deals by an NDS member, it was considered that non-reported deals by that
member are treated as invalid with effect from a future date.
55 | P a g e
NETWORKING &
COMMUNICATION SYSTEMS
INTERNET
Internet is the global connection of computers. The computers are connected
through a huge networks of telecommunication links. This connection
mechanism is dynamic, that is, it keeps on changing constantly and is spread all
over the world. Using Internet you can communicate or find out about
happenings in any part of the world. Internet is also called as network of
networks. This global network links thousands of computers at universities,
research institutions, government agencies and business houses throughout the
world. Some common definitions given in the past include:
A network of networks based on the TCP/IP protocols,
A community of people who use and develop those networks,
A collection of resources that can be reached from those networks.
The networks that make up the Internet are based on standard set of protocols (a
mutually agreed upon method of communication between parties), the Internet
also has gateways to networks and services that are based on other protocols.
The Internet had its origin in the cold war between Russia and America during
the second half of the decade from 1960 to 1970. When U.S. Air Force needed
to ensure that it could still communicate with its forces in the event of a Nuclear
Strike. The Internet was originated on 2nd January 1969 when U.S. department
56 | P a g e
A host computer that provides information for others to use is normally called a
server. Examples of servers are web servers, file servers, mail servers and news
servers.
58 | P a g e
59 | P a g e
60 | P a g e
CLIENT-SERVER COMPUTING
The term client/server was known to be used first in the 1970s at the Xerox Palo
Alto Research Centre (PARC). While trying to run software on computers tied
together in networks, the researchers in PARC found that the software
organization seemed to work more efficiently when portions of computer
applications spread out among co-operating machines. Each cooperation, which
could be more than one per application, was driven by software acting as the
client, making requests and getting service from the other. The server side of
such co-operations remain passive, serving only to the needs of the clients. The
researchers started calling this style of software co-operation as client/server
computing.
The PC revolution has also ushered in the era of down-sizing because due to the
emerging computing technology the power of mainframes can be delivered on
desktops. In mainframes, applications were stored and maintained centrally and
dumb terminals were directly connected to the system to access the data.
Whenever an update is made to a system, it is applied on the mainframe for use
by everyone. This model is called host-based computing. Centralized host-based
computing models allow many users to share a single computer's applications,
have a single centralized and integrated database and DBMS software for
different applications. Network technology provided users the access to central
data on the main computer, the file server, from remote locations. In
network/file server computing architecture, many users can share data and
61 | P a g e
resources one at a time. When user A is using File X, user B and user C have to
wait as the application software is bound to the server over the network.
62 | P a g e
The FDDI is a star token ring network which can transmit data at 10Ombps upto
200 kilometers to which around as many as thousand terminals can be
connected. The FDDI can also support ISDN connection over its ring. It uses
Light Emitting Diodes (LEDs) as its light source as it is less expensive as well
as more safe for the user than the laser beam.
The FDDI cabling consists of two fiber rings one transmitting clockwise and
other transmitting counter clockwise which act as back up lines for each other. It
also possible to join the two fibres and form one single ring with twice the
original length. The FDDI ring has two classes of stations as class A and Class
B stations. Class A stations are connected to both the rings and class B to any
one of the ring. This is done to provide fault tolerance to important stations. The
FDDI uses Token Ring' type transmission in which a terminal has to capture the
token and transmit the message. After the message is transmitted the station
generates new token.
The FDDI network provides high bandwidth upto 100mbps, high level of
security from tapping and eavesdropping, reliability and sturdiness, immunity
from electromagnetic interference and ease of handling due to its light weight.
The FDDI is a complex topology requiring high skills to set up and maintain the
network. The equipments such as adapters and concentrators are expensive and
optic fiber itself is expensive. The cost elements make FDDI networks less
common.
64 | P a g e
BRANCH NETWORK
The branches of banks have different services to provide to their customers like
maintaining savings and loan accounts, document collection which require
maintaining a database of their customers and the transactions. The branches
also have other functions like clearing, funds transfer, interbranch transactions,
foreign exchange transactions, etc. Accounts of all these services are required to
be centralised and merged with the main accounts of the bank. The branches
also have to send a lot of reports and information like cash transactions, forex
transactions to their head offices. The working of different desk therefore
require a centralised database and centralised accounting. This requires
establishing a LAN within a branch with terminals for each user to perform his
task and a central server to consolidate all the transactions. As the transactions
of the branches are reported to controlling offices the branch level network also
needs to have connectivity to the central computers of the bank. Many banks
have their transactions replicated to the 'Data Centres' where transactions from
all the branches are stored.
BANK NETWORK
requires a very strong network across the entire bank so that the customer can
avail bank's services as per his convenience. Similarly, large corporate offices
have bank terminals at their offices through which they can operate their
accounts. The bank wide network connects different networks , ATMs and
customers of the bank to the central computer or data centres and branches of
the bank. The bank wide network therefore is essentially a WAN with need to
have lot of security features built in and yet easy to use by the customers.
The recent trend, the large banks have their own networks connecting their
overseas branches too. The hubs are located in different countries and data is
stored at a place to the bank. It is also possible that the bank may centraise some
of their operations in any particular office located in a country which is different
than that where the transactions take place.
INFINET
67 | P a g e
INFINET is a Closed User group (CUG) VSAT technology based network that
has 675 VSATs supporting around 200 locations across India.
IDRBT (Institute for Development and Research in Banking Technology)
inaugurated INFINET (INdian FINancial NETwork) in June 1999 to provide a
reliable communication backbone for the banking and financial sector.
INFINET is a CUG (Closed User Group) VSAT-based network that has 675
VSAT's supporting around 200 locations across India. It's for the exclusive use
of member banks and financial institutions nationwide.
INFINET being the backbone for the national payment systems soon garnered
membership from many banks and financial institutions. This created a need for
higher bandwidth speed to support newer users. A new terrestrial network that
provides bandwidth up to 34 Mbps was setup by Cisco Systems and CMC
Limited. The aim was to enable all inter- and intra-bank transactions at highspeed and in a reliable manner.
FEATURES OF INFINET
68 | P a g e
HI SPEED CONNECTIVITY
Since inauguration IDRBT uses VSAT on the backbone and Ethernet on the
LAN. .The primary objective of IDRBT was to help its members carry out interand intra-bank transactions seamlessly through the electronic medium.
INFINET has proved to be very fruitful. Various inter-bank and intra-bank
applications like simple messaging, MIS (Management Information Systems),
ECS (Electronic Clearing Service), electronic debit, online processing, trade in
government securities, centralized funds, anywhere/anytime banking, and interbranch reconciliation are now carried out using INFINET.
VSAT GEAR
The INFINET is primarily a TCP/IP based network. A detailed IP-addressing
scheme has been devised by IDRBT for all the CUG members. The scheme has
to be followed strictly by members when they interact through the
communication backbone. The network consists of a central earth station (Hub),
which is located at Hyderabad. The Hub consists of an 11 meter antenna and
other communications equipment. The network started with one eighth of
transponder number 13 on INSAT 2B in June 1999. Later, in July 2000, a full
transponder, number 8 was allotted on INSAT 3B.
The network works on TDM/TDMA (Time Division Multiplexing/Time
Division Multiple Access) technology. The central earth station is housed in a
VSAT control center located in the ground floor of the executive facilities center
of the Institute. A DAMA (Demand Assigned Multiple Access) overlay will be
soon provided to facilitate high-speed data communications, voice, and video.
MORE BANDWIDTH
69 | P a g e
A leased line backbone with multiple 2 Mbps lines and Gigabit Ethernet as a
LAN backbone was implemented to meet greater bandwidth needs. The new
terrestrial network links will integrate with the existing VSAT network to
complement the total bandwidth. INFINET will now become a blend of both
leased line and VSAT network technologies. An important factor is that the
terrestrial WAN network will allow easy migration to Ethernet speeds in future.
The NMS (Network Management System) of the leased line network is located
at the INFINET hub at Hyderabad. The backup NMS is located at the RBI
(Reserve Bank of India) office in Mumbai.
The institute has tied up with Cisco Systems to set up the terrestrial network
with the help of 45 Cisco routers. This includes 25 high-end routers, security
systems, NMS software, and switches. Cisco's 7500 series routers would form
the core of the network, located in important cities, and will interconnect
various cities. Cisco's 3600 routers will be deployed at the distribution level to
enable bank branches to ride on the core network.
SAFEGUARDING
The network design has taken into consideration multiple paths for any location.
This ensures that data can traverse the network and reach the destination even if
the primary connectivity is down. All the locations have been configured along
with the ISDN ports in their respective routers as backup. In an extreme case of
all the land-based lines going down, the VSAT links can be used to send data
from one location to another.
To defend INFINET from hacking or intrusion, PIX firewalls from Cisco have
been deployed in all key locations within the network. And to address the vital
issue of security of financial transactions in the electronic environment, the
70 | P a g e
Institute has set up a Center for Security Technology. This center will play a key
role to help evolve security standards, protocols, certification procedures, and
solutions to suit Indian financial conditions
SWIFT
71 | P a g e
The SWIFT acronym stands for Society for Worldwide Inter-bank Financial
Telecommunications. It is basically a communication channel to exchange
information among banks and financial institutions.
Prior to the introduction of SWIFT system the communication between various
bank in different countries were using mediums like telephone, telegram, telex,
mail, courier, etc. Such a system resulted in lot of delay and was proving costly.
Say for example a letter from India to UK could take anything from 5 to 10
days. Similarly a telegram could lake a minimum of 3 days. Further each bank
could use their own mode of cornmunicalion depending upon the development
of communication system in that country. Added to this was the usage of
language. The communication would take place in a common language know to
the two parties to the transaction, say in English Then each of the bank had its
own standards for putting through the transactions. Interpretation of the
message was another area which caused lot of misunderstandings. There was an
urgent need to formalise and standardise the mode of communication as well as
the terms generally used in all such communication.
In May 1973. 239 major banks from 15 countries formed the organisation called
SWIFT as a co-operative body with its headquarters at Brussels, Belgium. The
live operations commenced on May 9th, 1977. SWIFT allows the financial
institutions world-wide to exchange standardised messages relating to
international financial transactions. The user of system include Banks, nonbanking financial institutions like dealers in securities, brokers, clearing and
depository institutions, trust or fiduciary services companies, stock exchanges,
etc.
SWIFT network consists of Regional Processors (RP) and SWIFT Access
Processors(SAP). One RP is installed for a region. One such regional processor
72 | P a g e
is located at Singapore. The SAP is one or more for each country depending
upon the commercial importance of the centre. The SAP is the gateway to
SWIFT network for that country. All the SAPs and RPs arc networked through
high speed global telecommunication network to two main frame computer one
in USA and another at Netherlands. All computers in the network have atleast
one standby processor which provide extensive hardware backup. Likewise, all
the data communication paths within the network are duplicated to ensure
continued service in the event of any failure of one path.
Each of the user is given a uniquely identifier code by a 11 digit code called
Bank Identifier Code commonly known as BIC. SWIFT periodically publishes
the address of all its members in BIC directory. Soft copies of the updates are
supplied to its members once every quarter. The structure of the BIC address is
as follows
The first four digit code represents hanks name it is unique to each bank and
Canara Bank
BKDN
Dena Bank
BKID
Bank of India
SYNB
Syndicate
STIN
State Bank of
CitiBank NA
Bank
SBIN
Indore
CHAS
Bank
COBA
Commerzebank AG
DEUT
Deutsche Bank AG
73 | P a g e
The next two digit code represents the country where the bank is located
e.g.
CN
China
DE
Germany
GB
United Kingdom IN
India
IT
Italy
MY
Malaysia
MX
Mexico
US
United States
JP
Japan
LU
Luxemburg
The next two digit code represents (he regional processor to which the bank
is linked to
BB
Mumbai
BJ
Beijing
FF
Frankfurt
JT
Tokyo
2L
London
33
New York
KK
Copenhagen
66
Los Angeles
PP
Paris
SG
Singapore
The last three digit code represents the branch/office of the bank
SBINUS33DTS
SBIBDEFF
UBININBBNPT -
ABNAINBBDEL -
CNRBINBBWXM-
CNRBGB2L
74 | P a g e
SWIFT establishes one of its SAP in each country depending upon the
commercial importance of the city. Banks in India were hooked to SWIFT
network on 02.12.1991. The SAP is located al World Trade Centre, Cuffe
Parade, Mumbai. The system is maintained by M/s. CMC Ltd. All the members
are given one access to the SAP. Each of the member banks has to designate one
of its office through which the connectivity will be obtained. The designated
office is known as Computer Based Terminal (CBT) of the bank. The CBT will
be located in the premises of the member banks. The CBT is connected to the
SAP either through a dial-up line or leased line. All the equipments installed in
the CBT should conform to SWIFT specifications. It is the responsibility of the
member banks to maintain the system in their CBT. The CBT acts as the
gateway to SWIFT for its branches. All the other branches of the banks are in
turn connected to the CBT and this is again through leased lines or dial-up lines.
The Indian set-up is explained in figure below :-
75 | P a g e
The progress and evolution of civilizations can be marked by the ages through
which the world has successively passed. The Stone Age, the Iron Age, the
Bronze Age and so on. This Age can be called the Information Era. In the earlier
ages, there were tangible, ascertainable materials to mark the progress of that
era. The present Era, however, is represented by Information, which is not
tangible. Despite that the business of trading in this intangible commodity,
(Information) i.e., buying and selling of information, is a very profitable
business. The dealers in information literally pluck information "out of the air"
and trade in it. This is a direct result of the low cost of communication, i.e.
computers, electronics and communications. The low cost of communication
tools is in turn the result of advances of technology. These advances have made
technology tools available at reasonable prices to the common man, and have
led to the intensive and intelligent use of Information. Information Technology,
the synthesis of computers and communications, has paved the way for the
Information Super Highway. The Information Super Highway is nothing but the
networking of networks of computers to share information. Therefore the
Internet, which is a network of networks, can be called the trailblazer of the
Information Super Highway.
The Information Super Highway connects small home users to big corporate
giants. A PC can be hooked onto the world to access any required information.
This vision is called "Information at your fingertips".
The term Information Super Highway should be interpreted not so much as a
"Highway", where information travels, but more as a Stock Exchange, or
market, where the commodities traded are not stocks and shares, but bits of
Information. If a person is told a fact already known to him, it is not
information. Information has been defined as the reduction of uncertainty.
Sharing information by connecting computers from research laboratories,
76 | P a g e
offices, and homes, through a high-speed network is the basic concept of the
Information Super Highway.
India is poised to make a major breakthrough in the area of Information
Technology, through a nationwide "National Information Highway". The
Government of India has already initiated a series of policies to create an
environment for the National Information Highway.
100 crores.
The DOE also has six earth stations linked to Intelsat. Maximum data
77 | P a g e
The National Information Highway will initially cover cities with high
78 | P a g e
79 | P a g e
The ISDN network which is being installed at different places in world aims at
replacing existing analogue telephone network with digital network which can
provide all these services. The efforts to install this network is being coordinated by CCITT which is a global body for telephone, telegrams and data
communication. The ISDN network would allow connection of different types
of terminals like telephone, computers, fascimile machines, Alarm services like
wake up calls, medical alarms, fire alarm, telemetery services like electricity
meters to be connected to the ISDN network directly. The ISDN service also
aims at providing 'teletext or e-mail' facility which would provide instant mail
facility using text only. The Non ISDN terminals can be connected through an
interface. Further, ISDN service is aimed at to allow simultaneous connection to
different services like telephone, fax, computer connection at the same time
without disturbing other connection. It is expected that over a period of time,
ISDN would replace existing analogue telephone system.
ISDN Services
80 | P a g e
VSAT
VSAT stands for Very Small Aperture Terminal and refers to receive/transmit
terminals installed at dispersed sites connecting to a central hub via satellite
using small diameter antenna dishes (0.6 to 3.8 meter).
81 | P a g e
RECENT DEVELOPMENTS
RTGS
The Real Time Gross Settlement (RTGS) System was implemented by the
Reserve Bank on March 26, 2004, after a comprehensive audit and review of
the software, also by conducting extensive training of users at commercial
banks. The RTGS provides for an electronic based settlement of inter-bank and
customer based transactions, with intra-day collateralised liquidity support from
the Reserve Bank to the participants of the system. The RTGS system has also
been enabled for straight through processing (STP) of customer transactions
without manual intervention.
The RTGS System will be fully integrated with the Accounting System of the
Reserve Bank and other settlement services such as Deferred Net Settlement
(DNS) Systems, the settlement of which would be performed as RTGS
transactions through a facility for Multi Lateral Net Settlement batch
processing.
The RTGS System has several unique features. It is a single, all-India system,
with the settlement being effected in Mumbai. The payments are settled
transaction by transaction. The settlement of funds is final and irrevocable. The
settlement is done in real time; the funds settled can be further used
immediately. It is a fully secure system, which uses digital signatures and PKI
based encryption, for safe and secure message transmission. It provides for
intra-day collateralised liquidity support for the member-banks to smoothen the
temporary mismatches of fund flows and thereby ensuring smooth settlements.
82 | P a g e
CORE BANKING
Core Banking is the network of all branches of the bank with its core (Central)
office \ Headquarters. The concept behind the core banking is to make the
branch customer as bank customer and to provide a platform to the branches of
bank for their various settlements.
Many a times customer has to fulfill various formalities or have to lot of paper
work for just transferring the money from one branch to other branch. Core
banking seems to be very useful in this regard because the customer can now
treat the whole bank as one branch and can do the transfer of funds easily. The
branches of the bank will settle the transactions among itself via the central
office. This concept provides an easy and quick settlement of cheques drawn on
one branch to another branch of the same bank.
83 | P a g e
85 | P a g e
In foreign countries, most banks employ dedicated security staff and internal
audit staff, to design, implement or review computer security. More recently,
risk analysis methods or systems have been introduced to assist in such review
programmes. Indian banks should also invest in security awareness or education
for their IT staff, and either employ outside consultant or use their own internal
specialists. A strong change control methodology should also be used for both
cetral and distributed software in order to limit software-based attacks, and to
reduce the risk of virus infection. This has become a general area of concern as
a result of the widespread use of PC technology within banking systems.
The networking of physical security alarm systems can offer a degree of
security only previously available at expensively manned checkpoints.
However, networking is sometimes impractical or not economic and manned
checkpoints will remain for these occasions, especially when the resource risk
(e.g. data centre) justifies this resource expenditure. Closed Circuit Television
(CCTV) offers some advantages to reduce the level of manning or human
patrols required, and many installations have justified such approaches not only
for key unmanned centres or rooms, but also for perimeter protection.
The linking of alarm systems to local police stations, specialists security
monitoring service organisations, or centrally manned bank installations
remains a matter for individual economic-choice.
The security and performance benefits of using hardware in addition to security
software solutions are essential requirements for many existing bank systems.
The volume of transactions demands very efficient methods for central message
switching or transaction processing systems. Most of the better banking security
designs are therefore built into the application layer and call host security
modules for fast, efficient and secure cryptographic support.
86 | P a g e
Typically, link encryption devices have been used for confidentiality of traffic.
However, until recently the necessary management systems which are required
to diagnose equipment fault conditions from a central location have not been
widely used. These types of network management and key distribution services
have grown in importance. Some banks have started operating private networks.
Network management systems are an important feature which support the
investment in private networks and help to control and maintain network
services available.
87 | P a g e
IMPACT OF IT
Banking industry provides financial services to the customers such as
acceptance of deposits, giving loans, providing facilities for transfer of funds,
giving financial guarantees, providing foreign exchange facilities, etc. All these
services are basically information processing services with cash operations
forming the only physical process again based on information processing. The
currency notes or cash itself is a banking service in the form of promissory
notes issued by the central banking authorities. The advent of Information
technology has changed the way in which the data is processed. Therefore,
almost all services provided by banks including the concept of money or credit
are influenced by the information technology thereby opening new
opportunities as well as posing new threats before the banking industry. We
shall attempt understanding this impact from basic functions of banking to the
concept of money and monetary policies of central bank.
The elimination of manual records, the introduction of electronic fund transfer,
ATMs etc. raise the important issue of security and integrity of data. This
includes issues relating to confidentiality of information, preventing data
corruption and prevention of fraud. Appropriate technologies for encryption of
data for secured transaction, regular & multiple backups, extensive use of
passwords and other forms of authorization would need to be adopted.
For paperless and electronic financial transactions in India, a host of legal
aspects need to be looked into. As in case of EFT, a cheque is not required to be
presented physically for making payment as per the current practice. Also the
88 | P a g e
legal liabilities of banks and customers in case of loss of ATM cards, ATM
frauds etc. are not quite understood in the present system. The adoption of new
technologies would warrant a thorough review of the system towards changed
legal stipulations.
Finally, the most important aspect of costs involved and benefits expected need
a closer scrutiny. Expenditure on IT has always not been in tune with the returns
envisaged.
89 | P a g e
CONCLUSION
IT continues to develop rapidly as the key underlying technologies of
semiconductors, disk drives, and network communications improve at
exponential rates. Constant improvements in the underlying technologies make
possible new IT applications that affect all areas of society, including the
economy, households, government, and the R&D enterprise.
Throughout society, the utility of IT applications tends to advance much more
slowly than the underlying technologies. A doubling of processing speeds, for
example, does not bring a doubling of utility. The effective implementation and
use of IT are the result of a complex process that requires not only adoption of a
technology but also changes in organizations and institutions. As part of this
process, individuals and organizations actively adapt (and sometimes resist) the
technologies. As a result, the effects of IT on society often take place more
slowly than visionaries predict. Nevertheless, the effectsdriven by the
continual change in underlying technologiesare substantial over time.
90 | P a g e
BIBLIOGRAPHY
BOOKS:
1. Information Technology & Electronic Banking - Iib
2. Banking Technology Part 1 & 2 - Iib
3. Alavudeen, A.; Venkateshwaran, N. (2010), Computer Integrated
Manufacturing, Phi Learning
MAGAZINES:
1. Information Week
2. ICFAI Reader (Various Issues)
3. IT NEXT
SITES:
1. http://en.wikipedia.org
2. www.smallbusiness.chron.com
3. www.computerworld.in
4. www.bankingtech.com
4. www.rbi.org.in
5. www.google.co.in
91 | P a g e