Professional Documents
Culture Documents
The concept of 'marketspace' (Rayport & Sviokla 1994) has been adopted to distinguish the space,
within which EC is conducted, from the conventional, physical marketplaces in which traditional
commerce occurs. The marketspace is the virtual context in which buyers and sellers discover one
artother, and transact business. lt is the working environment that arises from the complex of
increasingly rich and mature telecommunications-based services and tools, and the underlying
info rmation i nf rastructu re.
EC can support most of the processes involved in the purchasing of physical goods and services,
with the exception of the actual delivery or performance: as the old hacker's joke goes, there just is
no u ubp (unix-to-unix-beer-protocol).
Digital goods and services (Negroponte 1995) are those whose purchase can be not only negotiated
and settled using the information infrastructure, but which can also delivered through the same
channels. Hence, for digital goods and services, the marketspace provides a context that can support
the entire procurement process.
Web Designing and Publishing: Form of Electronic Commerce
lntroduction
The term'electronic publishing'can be used to refer to the efforts of conventional publishers to adapt
their existing forms of hard-copy publishing to take advantage of the new opportunities offered by the
information infrastructure. This paper takes the view that this is an unnecessarily constraining
perspective, and should be avoided if the real potentials of the technology are to be fullilled.
A considerable proportion of the existing literature on the topic relates expressly to the publication of
academic works (Harnad 1991, 1995, Clarke 1994, Barry 1995b, Treloar 1995, 1996, Peek & Newby
1996, Bailey 1995-97), and particularly e-journals (Odlyzko 1995). Another segment relates to e-
zines (electronic magazines - Labowitz 1997). Many sources focus on particular technologies and
their application to electronic publishing, particularly the World-Wide Web (Zwass 1996). Another
relevant literature is that relating to digital libraries (D-lib 1997, Ketchpel 1997). For general references,
see also Varian (1997) and Kahin (1997).
This paper adopts an alternative approach. lt considers electronic publishing as a pariicular form of
the general class of electronic commerce systems.
iele,rant concepts of electronic commerce are reviewed, in order to establish a working def inition of
electronic publishing.Three models are then presented, which provide:
O a structured description of the processes involved in the business of electronic publishing;
tr a taxonomy of business models whereby electronic publishing can be funded; and
tr an interpretation of the maturation path that is being followed by existing publishers, as
they convert from conventional to electronic publishing.
lmplications of the analysis are drawn, for both practitioners and researchers.
Electronic Commerce
This short, preliminary section provides an outline of key electronic commerce concepts, as a basis
for the subsequent analysis.
'Electronic commerce' (EC) is a general term for the conduct of business with the assistance of
telecommunications infrastructure, and of tools and services running over that infrastructure.
EC's scope extends across all forms ol business process within and between private sector
organisations (corporations, partnerships and sole traders), public sector agencies, convivial sector
organisations (associations and clubs) and individuals.
E-COMMERCE : CONVERGENCE OF TECHNOLOGIES / 33
EC's most active area of application has to date been in procurement processes, where models of
both'deliberative purchasing'also encompasses other business processes such as the design of
complex artefacts like buildings, ships and aircraft, and administrative mechanisms such as insurance
claims, and registration, licensing and court procedures.
The concept of 'marketspace' (Rayport & Sviokla 1994) has been adopted to distinguish the space,
within which EC is conducted, from the conventional, physical marketplaces in which traditional
commerce occurs. The marketspace is the virtual context in which buyers and sellers discover one
another, and transact business. lt is the working environmeni that arises from the complex of
increasingly rich and mature telecommunications-based services and tools, and the underlying
info rmation inf rastructu re.
EC can support most ol the processes involved in the purchasing of physical goods and services,
with the exception of the actual delivery or pedormance: as the old hacker's joke goes, there just is
no uubp (unix{o-unix-beer-protocol).
Digital goods and services (Negroponte 1995) are those whose purchase can be not only negotiated
and settled using the information infrastructure, but which can also delivered through the same
channels. Hence. for digital goods and services, the marketspace provides a context that can support
the entire procurement process.
7' lt was the dramatic, and iotally unexpected, growth in video-on-demand and interactive shopping that
created the demand for more bandwidth to the residential marketptace.
a. true
b. false
8. All companies in the industry will have to focus on customers, as they provide the volume and velocity
needed to achieve required price/performance ratios.
a. true
b. false
9. Today'q information industry is characterized by which of the foilowing?
a. inefficientinformationdistribution
b. adequate matching of information content with the needs of recipients
c. limited use of economic resources
d. all of the above
10. Of the three new form-based industries, the transpoft area is farthest along in moving to the new
model.
a. true
b. false
ANsWERs
l.c 2.a 3.b 4.d 5.a 6.c 7.b 8.a 9.a 10.b
Cuprn 2
ELECTRO]VCS AI{D
COMM(I]VICATIOI{S
2.1 Electronics
The introduction of vacuum tubes at the beginning of the 20th century was the starting point of the
rapid growth of modern electronics.With vacuum tubes the manipulation of signals became possible,
which could not be done with the early telegraph and telephone circuit or with the early transmitters
using high-voltage sparks to create radio waves. For example, with vacuum tubes weak radio and
audio signals could be amplified, and audio signals, such as music or voice, could be superimposed
on radio waves.The development of a large variety of tubes designed for specialized functions made
possible the swift progress of radio communication technology before World War ll and the develop-
ment of early computers during and shortly after the war.
The transistor, invented in 1948, has now almost completely replaced the vacuum tube in most of its
applications. lncorporating an arrangement of senticonductor materials and electrical contacts, the
trahsistor provides the same functions as the vacuum tube but at reduced cost, weight, and power
consumption and with higher reliability. Subsequent advances in semiconductortechnology, in part
attributabte to the intensity of research associated with the space-exploration eflort, led to the devel-
opment of the integrated circuit. lntegrated circuits may contain hundreds of thousands of transis-
tors on a small piece of materialand allow the construction of complex electronic circuits, such as
those in microcomputers, audio and video equipment, and communications satellites.
cycles of an alternating current (AC) are permitted to pass are called rectifier tubes; these are used
in the conversion of alternating current to direct current (DC) (see Electricity; Rectification). By
inserting a grid, consisting of a spiral of metalwire, between the cathode and thsanode and applying
a negative voltage to the grid, the flow of electrons can be controlled. When the grid is negative, it
repels electrons, and only a fraction of the electrons emitted by the cathode can reach the anode.
Such a tube, called a triode, can be used as an amplifier. Smallvariations in voltage at the grid, such
as can be produced by a radio or audio signal, will cause large variations in the flow of electrons f rom
the cathode to the anode and, hence, in the circuitry connected to the anode.
2.2.2 Transistors
Transistors are made from semiconductors.These are materials, such as silicon or germanium, that
are "doped" (have minute amounts of foreign elements added) so that either an abuidance or a lack
of free electrons exists. ln the former case, the semiconductor is called n-type, and in the latter
case, p-type. By combining n{ype and ptype materials, a diode can be produced. When this diode
is connected to a battery so that the p{ype material is positive and the ntype negative, electrons are
repelled from the negative battery terminal and pass unimpeded to the p-pggion, which lacks elec-
trons. With battery reversed, the electrons arriving in the p-material can pasi only with difficulty to
the n-material, which is already filled with free electrons, and the current is almosi zero.
The bipolar transislor was invented in 1 948 as a replacement for the triode vacuum tube. lt consists
of three layers of doped material, forming two p-n (bipolar) junctions with configurations of p-n-p or n-
p-n. One junction is connected to a battery so as to allow current flow (forwaid bias), and the other
junction has a battery connected in the opposite direction (reverse bias). tf the curreni in the lonruard-
biased junction is varied by the addition of a signal, the current in the reverse-biased junction of the
transistor will vary accordingly. The principle can be used to construct amplifiers in which a small
signal applied to the forward-biased junction causes a large change in current in the reverse-biased
junction.
Another type of transistor is the field-effect transistor (FET). Such a transistor operates on the
principle of repulsion or attraction of charges due to a superimposed electric field. Amplification of
current is accomplished in a manner similar to the grid control of a vacuum tube. Field-effect transis-
tors operate more efficiently than bipolar types, because a large signal can be controlled by a very
small amount of energy.
2.2.3 lntegratedCircuits
Most integrated circuits are small pieces, or "chips," of silicon, perhaps 2 to 4 sq mm (0.0g to 0.1 5 sq
in) long, in which transistors are fabricated. Photolithography enables the designerto create tens of
thousands of transistors on a single chip by proper placement of the many n-type and p{ype regions.
Topview t<;
F.l[TE
Nor gstet
ffil
AEF
1oo
connectihg pint 110*J I
2.2A Resistors
lf a battery is connected across a conducting material, a certain amount of current
willflow through
current is dlpendent on the voltage of the battery, on the dimensions
the material (see Resistance).This
of the material itself. Resistors with known resistance are
of the sampie, and on the conductivity
used for current control in electronic circuits.The resistors are made from
carbon mixtures, metal
resistors, with an adjustable
films, or resistance wire and have two connecting wires attached. Variable
to control volume on radios and television sets'
sliding contact arm, are often used
2.2.5 Capacitott
material (see capacitor).
capacitors consist of two metal plates that are separated by an insulating
38 / ELECTRONIC COMMERCE
lf a battery is connected to both plates, an electric charge will flow for a short
time and accumulate
on each plate. lf the battery is disconnected, the capacitor retains the charge and the voltage
associated with it. Rapidly changing voltages, such as caused by an audio o, radio signal, produ-e
larger current llows to and from the plates; the capacitor then functions
for the
changing current. This effect can be used, for example, to separate an audio".or" radio
"onjrctor
signalfrom a
direct current in order to connect the output of one amplifier stage to the input of the neit
amplifier
stage.
2.2.6 lnductors
lnductors consist of a conducting wire wound into the form of a coil. When a current passes through
the coil, a magnetic field is set up around it that tends to oppose rapid changes in current intensity
(see lnduction). As a capacitor, an inductor can be used to distinguish betwlen rapidly and
slowly
changing signals. When an inductor is used in conjunction with a capacitor, the voltage in the inductor
reaches a maximal value for a specific frequency. This principle is used in a radio receiver, where a
specific frequency is selected by a variable capacitor.
particular type of task{or example, to control the arm of a robot to weld a car's body, to write a letter,
to draw a graph, or to direct the general operation of the computer.
added, the number of possible patterns is doubled. Eight bits is called a byte; a byte has 256
possible combinations of 0s and 1s.
infor
A byte is a usefulquantity in which to store es enough possible patterns
fo represent the entire in lower and numeric digits, punctuation
"tpn"U"t, graphics sy
marks, and severalcharacter-sized nglish characters such as d'
A kilobyte-
A byte also can be interpreted as a pittern that represents a number between 0 and 255-
characters; a gigabyte can
10oo bytes-can store lOOO characters;a megabyte can store 1 million
store 1 billion characters; and a terabyte can store 1 trillion characters'
read or
The physical memory of a computer is either random access memory (RAM), which can be
can be read the computer
changed by the user or computer, or read-only memory (ROM), which by
in tiny
but not altered. One way to store memory is within the circuitry of the computer, usually
within these computer chips
computer chips that holi millions of bytes of information. The memory
on external storage de-
is RAV. Memory also can be stored outside the circuitry of the computer
vices, such as magnetic floppy disks, which can store about 2 megabytes of information; hard
(compact discs),
drives, which can store thousahds of megabytes of information; and CD-ROMs
can store nearly as much
which can store up to 630 megabytes of infoimation. A single CD-ROM
information as 700 floppy disks can.
computer. Other input devices include a joystick, a rodlike device often used by game players; a
scanner, which converts images such as photographs into binary inforrnation that the computer can
manipulate; a light pen, which can draw on, or select objects from, a computer's video display by
pressing the pen against the display's surface; a touch panel, which senses the placement of a
user's finger;and a microphone, used to gather sound information.
The Central Processing Unit (CPU) lnformation from an input device or memory is communicated via
the bus to the CPU, which is the part of the computer that translates commands and runs programs.
The CPU is a microprocessor chip{hat is, a single piece of silicon containing millions of electrical
components. lnformation is stored in a CPU memory location called a register. Registers can be
thought of as the CPU's tiny scratchpad, temporarily storing instructions or data. When a program is
run, one register called the program counter keeps track of which program instruction comes next.
The CPU's control unit coordinates and times the CPU's functions, and it retrieves the next instruc-
tion from memory.
ln a typical sequence, the CPU locates the next instruction in the appropriate memory device. The
instruction then travels along the bus f rom the computer's memory to the CPU, where it is stored in
a special instruction register. Meanwhile, the program counter is incremented to prepare for the next
instruction. The current instruction is analyzed by a decoder, which determines what the instruction
will do. Any data the instruction needs are retrieved via the bus and placed in the CPU's registers.
The CPU executes the instruction, and the results are stored in another register or copied to Jpecific
memory locations.
2.1.6 Programminglanguages
Programming languages contain the series of commands that create software. ln g6neral, a lan-
guage that is encoded in binary numbers or a language similar to binary numbers that a computer's
hardware understands is understood more quickly by the computer. A program written in this type of
language also runs faster. Languages that use words or other commands that reflect how humans
think are easier for programmers to use, but they are slower because the language must be trans-
lated first so the computer can understand it.
(1) Machine Language
Computer programs that can be run by a computer's operating system are called executables. An
executable program is a sequence of extremely simple instructions known as machine code. These
instructions are specific to the individual computer's CPU and associated hardware; for example,
lntel Pentium and Power PC microprocessor chips each have different machine languages and
require different sets of codes to perform the same task. Machine code instructions are few in
nurhber (roughly 20 to 200, depending on the computer and the CPU). Typical instructions are for
copying data f rom a memory location or for adding the contents of two memory locations (usually
registers in the CPU). Machine code instructions are binary-that is, sequences of bits (Os and 1s).
Because these numbers are not understood easily by humans, computer instructions usually are not
written in machine code.
(21 Assembly Language
Assembly language uses commands that are easier for programmers to understand than are machine-
ELECTRONICS AND COMMUNICATIONS / 41
language commands. Each machine language instruction has an equivalent command in assembly
language. For example, in assembly language, the statement "MOV A, B" instructs the computer to
copy data f rom one location to another. The same instruction in machine code is a string of 16 Os and
1s. Once an assembly-language program is written, it is converted to a machine-language program
by another program called an assembler. Assembly language is fast and powerful because of its
correspondence with machine language. lt is still difficult to use, however, because assembly-language
instructions are a series of abstract codes. ln addition, different CPUs use different machine languages
and therefore require different assembly languages. Assembly language is sometimes inserted into
a high-level language program to carry out specific hardware tasks or to speed up a high-level
program.
(3) High-LevelLanguages
High-level languages were developed because of the difficulty of programming assembly languages.
High-level languages are easier to use than machine and assembly languages because their com-
mands resemble natural human language. ln addition, these languages are not CPU-specific. ln-
stead, they contain general commands that work on different CPUs. For example, a programmer
writing in the high-level Pascal programming language who wants to display a greeting need include
only the following command:
*Write ( rHello, e-Commerce User! I ),.
This command directs the compute/s CPU to display the greeting, and it will work no matter what
type of CPU the computer uses. Like assembly language instructions, high-level languages also
must be translated, but a compiler is used. A compiler turns a high-level program into a CPU-specific
machine language. For example, a programmer may write a program in a high-level language such as
C and then prepare it for different machines, such as a Cray Y-MP supercomputer or a personal
computer, using compilers designed for those machines. This speeds the programmer's task and
makes the software more portable to different users and machines.
American naval officer and mathematician Grace Murray Hopper helped develop the first commerbially
available high-level software language, FLOW-MATIC, in 1957. Hopper is credited for inventing the
term bug, which indicates a computer malfunction; in 1945 she discovered a hardware failure in the
Mark ll computer caused by a moth trapped between its mechanical relays.
From 1954 to 1958 American computer scientist Jim Backus of lnternational Business Machines,
lnc. (lBM) developed FORTRAN, an acronym for FORmula TRANslation. lt became a standard
programming language because it can process mathematicalformulas. FORTRAN and its variations
are still in use today.
Beginner's All-purpose Symbolic lnstruction Code, or BASIC, was developed by American math-
ematician John Kemeny and Hungarian-American mathematician Thomas Kurtz at Dartmouth Col-
lege in 1 964. The language was easier to learn than its predecessors and became popular due to its
friendly, interactive nature and its inclusion on early personal computers (PCs). Unlike other lan-
guages that require that all their instructions be translated into machine code first, BASIC is inter-
preted-that is, it is turned into machine language line by line as the program runs. BASIC commands
typify high-level languages because of their simplicity and their closeness to natural human lan-
guage. For example, a program that divides a number in half can be written as
10 INPUT IIENTER A NUMBER,I' X
20 l=X/2
30 PRrNT ilHALF OF THAT NUMBER rS, r' Y
The numbers that precede each line are chosen by the programmer to indicate the sequence of the
42 / ELECTRONIC COMMERCE
commands'The first line prints "ENTER A NUMBER" on the computer
screen followed by a question
mark to prompt the user to type in the number labeled "X." ln
the next line, that number is divided by
two, and in the third line, the result of the operation is displayed
on the computer screen.
otherhigh-level languages in use today include C, Ada, pascal, LlSp, prolog,
Java' New compilers are being developed, and many features
coBol, HTML, and
available in one language are being
made available in others.
(4) Object-Oriented programming Languages
object-oriented programming (ooP) languages like c++ are based
on traditional high-levet languages,
but they enable a programmer to think in terms of collections of
cooperating objects instead of lists
of commands. objects, such as a circle, have properties such
as the radius of the circle and the
inherit features from other
tures such as right angles
es the programmer's task,
display (LCD)to display information. Laptop computers usually have similar hardware and software
as pCs, but they ur" ror" compact and have flat, lightweight LCDs instead of video display monitors.
workstations are similar to personal computers but have greater memory and more extensive
to
mathematical abilities, and they are connected to other workstations or personal computers
that
exchange data. They are typicilly found in scientific, industrial, and business environments
require high levels of computational abilities.
Mainframe computershave more memory, speed, and capabilities than workstations and are usually
and
shared by multiple users through a series of interconnected computers.They control businesses
industrial facilities and are used lor scientific research. The most powerful mainframe computers,
used to
called supercomputers, process complex and time-consuming calculations, such as those
and the
create weather predictrons. They are used by the largest businesses, scientif ic institutions,
military. Some supercomputers have many sets of CPUs. These computers break a
task into small
pro""sses portion the task to increase overall speed and efficiency. Such
pieceq and each bpU a of
computers are called parallel processors.
The signals may be generated by mechanical switches or by solid-state transducers. Once the input
signal has been accepted and conditioned (to remove unwanted elecirical signals, or "noise"), it is
processed by the digital logic circuits.The various families of digitai logic devices, usually integrated
circuits, perform a variety of logic functions through logrc gates, including "OR;'"ANDJ'and "NOT"'
and combinations of these (such as "NOR." which includes both OR and NOT). One widely used logic
family is the transrstor-transistor logic (TTL)" Another family is the complementary metal oxide semi-
condlctor logic (CMOS), which performs srmilar functions at very low power levels bui at slightly
lower operatrng speeds. Several other, less popular tamilies of logic circuits exist, including the
currently obsolete resistor-transistor logic (RTL) and the emitter coupled logic (ELC), the latter used
for very-high-speed systems.
The elemental blocks in a logrc device are called digital logic gates. An AND gate has two or more
inputs and a single output. The output of an AND gate is true only if all the inputs are true. An OR
gate has two or more inputs and a single output. The output of an OR gate is true if any one of the
Inputs is true and is false if all of the inputs are false. An INVERTER has a single input and a single
output terminal and can change a true signal to a false signal, thus performing the NOT function.
More complicated logic circurts are built up from elementary gates. They include flip{lops (binary
switches), counters, comparators, adders, a.nd more complex combinations.
To perform a desired overallfunction, large numbers of logtc elemenls may be connected in complex
circuits. ln some cases microprocessors are utilized to perform many of the switching and timing
functions of the individuai logic elements (see Micrcprocessor). The processors are specifically
programmed with individual inslructions to perform a given task or tasks. An advantage of micro-
proJ"..or. is that they make possible the performance ol different logrc functions, depending on the
program instructions that are stored. A disadvantage of microprocessors is that normally they oper-
ateln a sequential mode, which may be too slow for some applications. ln these cases specifically
designed logic circuits are used'
2.1 0 Communications
More and more businesses and other governmental agencies are using PCs and computer in networks
for basic business applications.The small computer is providing an economical method for distributing
computing needs within am organization. lnstead of using a computer terminal connected to the
main computer system for performing these simple computing functions, a computer network consisting
of small computers in conlunction *ith larger central system with data base inforrnation is'becorning
"
a more feasible alternative.
ln cases where the officesiplants of an organisation are spread over the large geographical area, it
has been felt that computerisation of officeslplants activities in isolation does not step up efficiency.
ln such cases reliable data communication has to go hand with computerisation to achieve the
desired efl iciency standards.
The clevelopment of computer systems has been combined with improved communication
facilities
be
which extend the power ol the computer beyond the computer room, and a!low system benefits to
more widely available. This combination allows computer facilities at remote sites, whilst
preserving
is the "dialing-
on one site the expertise needed to operate the whole system.The simplest example
up,, on the telephone network to connect a remote terminal with the computer and
all its facilities.
Outside
Modem world
Tape device
Prini server
Star
LAN PC Hard disk Printer
To PBX
network
This blend of computers and communications is now taken for granted and as industry-standard in a
rapidly growing number of business organisations. Even the most unsophisticated user may un-
t<nowingty be using very complex systems. For example, a small business may have a fairly simple
terminai which is connected, via telephone, to a local computer service bureau, in orderto use one of
the facilities offered by that bureau.
Not apparent to user, however, the local call may link to a system a very long way from home (see
Fig.2,1). The first connection is to the local small communications computer. This concentrates the
da1a, along with that from other local users, and passes it to a larger computer in the capital. Here,
because ol the particular services being used, it is passed via a communications satellite in orbit
above the ocean, to the service company's main computer centre in the United States. The results
come back over the same links, giving the user the impression that the bureau is just next door'
This development was mobilised due to developments in "personal/office computing" (e.9. word-
processing, desk-top microcomputers, business minicomputers) coupled with moves towards digital
communications, as exemplified by digitaltelephone exchanges, digitalfacsimile, etc. Opportunities
are now being seized to take advantage of the economies of scale and added cost-efficiency offered
by combining services. The convergence of voice, word processing and message systems is being
cipitalised on to the advantage of the user. The results are that a business manager will no longer
have to turn separately to the :
o lnformation technology department for computer services
o PABX for telephones
c Typing pool for document preparation
D Mail room for document transmission'
The first step towards understanding communications is to look at computer data at its must base
level. As all of .us know computer and computer device manage store and exchange data using
electronic pulses or digital signals, that come in two varieties, the binary digit'0' indicates the
absence 1"bFf"; and't;indicaie ("ON") the presence of electric current. A series of ONs and OFFs
in various combinations can be sent on the communication channels to represent any character.
Every character (letter, numeral, symbol, or punctuation mark) is composed of a group of bits called
codes. To avoid incompatibility beiween systems, the computer industry has created a number of
standards that establish relationships between bit combinations and their corresponding characters.
The most widely used codes are the American Standards Code for lnformation lnterchange ((ASCll))
and the IBM standard, Extended Binary Coded Decimal lnterchange Code (EBCDIC).
To ensure successfultransmission of data between two points, the sender and receivers should use
the same code, or they can use translates to aid in communication. Translation are data communica-
tion software, which translate the sender's data into the codes receiver understand.
To ensure successfultransmission of data between two points, the sender and receivers should
use
the same code, or they can use translates to aid in communication. Translation are data communica-
tion software, which translate the sender's data into the codes receiver understand.
There are several manufacturers of computer hardware and software across the globe. For successful
data communication these products should be compatibles with each other or they should conform
to certain set of rules so that any one can use them. These set of rules is known as communication
protocols or communication standard.
ln other words protocols are technical customs or guide lines that govern the exchange of signal
transmission and reception between equipments'
48 / ELECTRONTC COMMERCE
Each protocolspecifies the exact order in which signals will be transferred, what signalwill indicate
that the opposite device has completed its transfei, and so forth. Both hardwar" anO
software are
designed to handle specific protocols.
Communication protocols are usually defined and approved by some international body
such as lSO,
CCITT or IEEE' At times protocols defined by certain manlfacturer of comput"r. t; networking
products become so widely accepted, that they be :ome'defacto/ standard
even tirough these protocols
may not have approval of any standardisation body. Some ol the functions thal communication
protocol regulates are:
A Controlof information transfer
D Structure and formats of data
D Error recoveries
D Retransmissioncontrol
O lnterfaces management.
Only communication devices using same protocols can communicate with each other.
To make sure that the bits (or characters) are securely transmitted through the channel or line, we
need a link level protocol between two computers. Some of the main functions to be performed by
such a link level protocol are:
O Assuring the data to be transmitted is split into data blocks with beginning and ending
markers. This is called framing and the transmission block is called alr"re.
D Achieving data transparency. This allows a link to treat a bit pattern, including normally
restricted control characters, just as pure data.
tr Controlling the flow of data across the link. lt is essential not to transmit bits faster. Than
they can be received at the other end. Otherwise, the receiver overflows and the data is
overrun, or all buffering capacity is used up, leading to loss of data.
o Controlling errors. This involves detection of errors using some kind of redundancy check.
It also involves acknowledgement or correctly received messages and requests for
retransmission of faulty messages.
There are basically two classes of link protocols.They are, Binary SYNchronous protocols (BlSNyC)
and High Level Data Link Control (HDLC) protocols. BISYNC is based on character control, whereas
HDLC is a bit oriented protocol. ln fact, HDLC is widely used in most link protocols of computers.
Computing technology today allows people to create stunning graphics, the likes we have seen in
Jurassic Park, and The Abyss, and provide impressive digitized sound systems such as the Talk
album by the Classic Rock band of the seventies Yes. Yet, the most amazing technologies are really
those available to the common household and businesses, Networking technology is racing towards
the future in instant global communication.There are now proposals for global coverage of data and
telephony communication via satellites f rom various organizations but before we can tilk to the boss
through video telephones on a regular basis like George Jetson, we first have to understand the
current capabilities of global networks and computing technology.
For businesses, large and smallalike, computing and networking technology is quickly becoming an
absolute necessity. Computers are already populating many offices by providing tools such as word
processors, databases, and spreadsheets. Towards the late 8O's, Local Area Networks (LANs) of
computers became a much demanded utility as businesses tried to connect the various depart-
ments of their organization together. Now into the 9O's, networking on a much larger scale, nation-
ELECTRONICS AND COMMUNICATIONS / 49
The SENDOR
creates the
I
I
Data has a wide definition and includes multimedia objects may range from a simple text retrieval to
intricate voice-annotated changes in a complex 3-D visualization model of particle physics. The
range of bandwidth involved is truly staggeririg. A typical database text retrieval requires about 1
Kbps, whereas a complex visualization needs an 800 Mbps throughout, which is almost a million
times greater.
ln between those extremes there is a whole gamut of multimedia objects such as text, graphics,,
audio, and video, each of which requires a different amount of bandwidth for timely transmission
within computers and across the netWorks depending on the type of application of which they are a
part. The most demanding of those multimedia objects are high-quality videos with synchronized
audio that must be transmitted interactively and in real time. As a result, audio and video transmis-
sions are practical only when compression schemes are incorporated within the transmission proc-
ESS.
This variety of multimedia objects must be transported over private and public networks and data
transmission facilities consisting of various types of analog and digital links whose configurations
offer different bandwidth capabilities. These may range from 1O Kbps of the traditional telephone
lines all the way to the 1.2- Gbps, capacity of high-speed ATM cell relay services.
Bandwidth capacities also depend on the nature of connecting media, which may range from copper
wire, througI coaxial cable and optical fiber to photonic networks of the future. Switching and inter-
facing mechanisms present varying bandwidth capacities that must also be taken into account in
multimedia networking design.
Data communications includes data transmission, but also includes the control, checking and move-
ment handling of information . ln computer systems, it includes:
tr The physicaltransmission circuits and networks
tr The hardware and software which support the data communication functions
D Procedures for detecting and recovering f rom errors
tr Rules and protocols to ensure the disciplined (and therefore comprehensible) exchange of
information.
would access the computer with the needed data base through the network by using the appropriate
network and systems software, and request that the desired information be transferred to a f ile within
his/her own system. Any additional information needed from another data base for completing this
budget could be obtained in a similar manner.When the planner's finished, a hard copy of the budget
.ouh b" printed and mailed,and /or the budget file could be sent through a network to another
system for review by other personnel'
Suppose a manager had to Write several letters to clients. lnstead of dictating these letters to a
,""i"t"ry as has been done in the past, he/she would use the same PC and a word processing
program for writing the main body of each letter. These letters are then sent via the network to a
similar small computer on the secretary's desk for completion. The secretary uses the same or
a
similar word processing program to perform any needed editing and to complete each letter by adding
the p[roper address. n'"opy of each letter suitable for mailing is then obtained by using a
letter
qu"iity printer located in yet anothe t areaand which is shared by other users' The secretary would
quality printer, once
send ihe finished letter to the computer which is dedicated to serving the letter
quality printer, insert the
again using the same network.Then the secretary would walk to the letter
afpropriate letterhead paper and direct this third computer to print each letter'
personnel in other
Now suppose that the manager has some technical memorandums to be sent to
company divisions in other physical locations. lnstead of actually printing a hard copy and mailing it,
be sent by network directly to the computer of the division secretaries where
the memorandum could
possible because the company's cornputer network consists not only the
it would be printed. This is
computers in the same UuitOing ( local network), but also those at remote sits. These sites may be
even different countries. This type of communications is often
in the same town, different towns, or
described
referred to as electronic mail. The business office using the equipment and methods
above is often referred to as an electronic office'
<_1
ttttttttlt
tllttttttt
llrl_Jl_Jl_J,<o
Fig.2.7:The difference between analog and digital signals.
AMPLITUDE
--i Time
sisnarof *s str
modem is avai
specify bits per second for modem speed; for example , 12OO baud means 1200 bps'
Bir
Value
Bit
Va ue
Baud
Number
Bit
Value
Baud
*
1
e:B1og2(1+S)
where e (lCC), B is the bandwidth , and S is tbe signal-to-noise
is the information carrying capacity
ratio. This expression shows that the ICC is proportional to the bandwidth , but is not identical
to it.
2.15.5 Latency
The information carrying capacity of a communications channel is very important, but it is an
average figure; it tells us nothing about how quickly a given bit of data will move from one point to
another. The time taken for this to happen is called the latency of the system. The theoretical limit
to latency is the speed of light; as far as we know, information cannot be transmitted faster than this.
An electrical signal propagates along a wire at about 70% of the speed of light. Over a wide-area
network the latency is much longer, because the message has to be processed at a number of
intermediate stations between the sender and the recipient.
EMI because it uses light rather than electronic signals to transfer data.
tr Crosstalk is a form of EMI caused by wires next to each other interfering with signals as
they travel through the transmission media.
D Dispersion applies to f iber-optic cables. Chromatic dispersion occurs when light enters the
core at different angles and spreads apart slightly as it travels to the destination.
rectly. Public two-way radios with several frequency options are widely available as well. Usually
limited in range to a few miles, these units are great aids for such mobile professionals as construc-
tion workers, film crews. event planners, and security personnel. Simpler two-way radios, called
walkie-talkies, have been popular children's toys for years. Most walkie-talkies broadcast on channel
14 of the citizens band (CB), a range ol frequencies grouped into channels and allocated for public
use. CB radios can lransmit and receive on 40 different channels.
Shortwave Long-range broadcast services and f requencies, in what is known as the shortwave radio
band (with frequencies of 3 to 30 megaherlz), are available for amateur or ham radio operators.
Shortwave radio broadcasts can travel long distances because of the concentration of ionized, or
electrically charged, particles in the layer ol the atmosphere known as the ionosphere. This layer
reflects radio signals, sending signals that are transmitted upward back to earth. This skipping of
waves against the ionosphere can greatly increase the range of the transmitter.The degree of reflec-
tivity of the ionosphere depends on the time of day. During daylight hours, the ionosphere has the
concentration of ions necessary for reflectirrg radio waves in the higher f requencies of the shbrtwave
band back to earth. At night, it has the concentration necessary for reflecting lower frequencies
within the shortwave band. lf adequate density of ions is not reached, the radio waves simply
continue through the ionosphere into space.
2.19.5 SatelliteCommunications
Satellite communications services connect users directly to the telephone network from almost
anywhere in the world. Specialtelephones are available to consumers that communicate directly
with communications satellites orbiting the earth. The satellites transmit these signals to ground
stations that are connected to the telephone system.These satellite services, while more expensive
than celtular or other wireless services, give users access to the telephone network in areas of the
v.rorld where no telephone service exists.
2.2O Networks
Computers can communicate with other computers through a series of connections and associated
60 / ELECTRONIC COMMERCE
hardware called a network. The advantage of a network is that data can be exchanged rapidly, and
software and hardware resources, such as hard-disk space or printers, can be shared.
One type of network, a local area network (LAN), consists of several PCs or workstations connected
to a special computer called the server. The server stores and manages programs and data. A server
often contains all of a networked group's data and enables LAN workstations to be set up without
storage capabilities to reduce cost.
Mainframe computers and supercomputers commonly are networked. They may be connected to
PCs, workstations, or terminals that have no computational abilities of their own. These "dumb"
terminals are used only to enter data into, or receive output from, the central computer.
Wide area networks (WANs) are networks that span large geographicalareas. Computers can connect
to these networks to use facilities in another city or country. For example, a person in Los Angeles
can browse through the computerized archives of the Library of Congress in Washington, D.C. The
largest WAN is the lnternet, a global consortium of networks linked by common communication
programs.The lnternet is a mammoth resource of data, programs, and utilities. lt was created mostly
by American computer scientist Vinton Cerf in 1973 as part of the United States Department of
Defense Advanced Research Projects Agency (DARPA). ln 1984 the development of lnternet
technology was turned over to private, government, and scientific agencies.The World Wide Web is
a system of information resources accessed primarily through the lnternet. Users can obtain a
variety of information in the form of text, graphics, sounds, or animations.These data are extensively
cross-indexed, enabling users to browse (transfer f rom one information site to another) via buttons,
highlighted text, or sophisticated searching software known as search engines.
describes the activity of subatomic particles (particles that make up atoms), as the basis for quan-
tum computing. Quantum computers may one day be thousands to millions of times faster than
current compulers, because they take advantage of the laws that govern the behavior of subatomic
particles. These laws allow quantum computers to examine al!-possible answers to a query at one
iime. Future uses of quantum computers could include code breaking and large database queries.
Communications between computer users and network$ Atill benefit f rom new technologies such as
broadband communication systems that can carry signilicantly more data and carry it faster, to and
from the vast interconnected databases that continue to grow in number and type.
ln 1965, Gordon Moore was preparing a speech and made a memorable observation.When he
started to graph data about the growth in memory chip performance, he realized there was a striking
trend. Each new chip contained roughly twice as much capacity as its predecessor, and each chip
was released within 18-24 months of the previous chip. lf this trend continued, he reasoned, comput-
ing power would rise exponentially over relatively brief periods of time.
Moore's observation, now known as Moore's Law, described a trend that has continued and is still
remarkably accurate. lt is the basis for many planners' performance forecasts. ln 26 years the
numbei. of transistors on a chip has increased more than 3,200 times, from 2,300 on the 4004
in 1971
to 7.5 million on the Pentium" ll processor.
,,Gordon Moore just plain got it right . . . I should also mention that Moore's Law has also given rise
to Machrone's Law, which was true for many years, which is that the machine you want always costs
$5,0001'
E Bill Machrone : A very small addendum to Moore's Law is Rock's Law which says that the
cost of capital equipment to build semiconductors will double every four years."
D lntel's recent roadmap for notebook products looks quite jolly. Already in the beginning of
next year we will see the first Giga Hertz processor for mobile platforms and mobile Pentium
lll processors at up to 1.26 GH1 will arrive soon afterwards as well. The workstation and
server roadmap is not quite as interesting, except for the lSct that lntel is counting a loi on
,Third party'chipset makers to provide non-RDRAM platfdrms for those systems.
I
.F'
a
t
.q,
fl
Cn par 3
IIfFORMATIO]Y
TECH]VOLOGY
5.1.3 Relevance
What is it that makes data interesting or valuable? The most straightforward way in which
data is
useful is when it is relevant to a decision. Each morning, we don't usually think about
what the
weather is like outside until we 1re deciding what to do with the day (if it's a weekend) or
what to wear
(if it's a workday). Data about a delivery of a particular batch of baby-1qe6
to a particular supermarket
is lost in the bowels of the company's database, never to come to light again, unless and
until
something exceptional such as the bill not being paid, the custom]er complaining abotrt
l"?p"l:,
short delivery, or an extortionist making a telephone call io claim that poison has bben
added to
some of the bottles.
The question as to what data is 'relevant to a decision' is not always clear-cut. The narrowest
interpretation that we could make is that data is relevant and of value, only if it actually
;"1;;
difference to the decision made. As we shall see in the next section, decision-making processes
are
often corniilex,^anci in many circumstances it is unknowable whether data made a difference
or not.
So that very ndrrow criterion, attractive though it may seem, is not a very useful approach.
A broader interpretation is that data is relevant and thErefore of value, if, depending on whether
or not
it is available to the decision-maker, it could make a difference to the decision. inis approach
can
also lead to difficulties. How do we decide whether it might make difference? What if the data
4 might
make a difference, but in law shouldn't (e.g. where a person's etlthic background or mar1al
status is
precluded by anti-discrirnination legislation from being a factor in employment
decisions, but the
decision-maker is known to have a bias for or against people from a pariicular race or country, or
people who are divorced)? What if the data might make a difference but logically
shouldn't (e.g.
because the person making the decision doesn'f understand how interest is catcutiteo on
a loan)?
ln addition to decision-making, there are other circumstances in which data can be interesting
or
valuable' When we read the newspaper, listen to the news on the radio, or watch ,infotainment,
programs on television, we are seldom making decisions, and yet we perceive informational
value in
some of the data presel:teC to us. Sometimes it is merely humorous. Sometimes it is not what we
INFORMATION TECHNOLOGIES / 65
would have expected, and therefore has'surprisal'value ("GoshlThe government might survive the
election yet!" Or "An injury incurred in training will keep the star fullback out of the Grand Final!").
ln other cases, it may be something that fits into a pattern of thought we have been quietly and
perhaps only semi-consciously developing for some time, and which seems, for no very clear rea-
son, to be worth filing away (things like the proportion of this year's immigrants who were British, or
Kiwis; or the proportion of companies who are requiring skills with web-publishing as a condition of
employment).
The most useful and convCntional way to use the term'information' in the information systems
discipline is to encapsulate these points:
A 'lnformdtion' is data that has value. lnformational value depends upon context. Until it is
placed in an appropriate context, data is not information, and once it ceases to be in that
context it ceases to be information.
O Some people feelvery uncomfortable with this def inition. lt forces us to confront the f luidity
of the sjtuation. Rather than a nice, straightforward 'thing', describable in mathematical
terms, and analysable using formidable scientific tools, this definition makes information
rubbery and intangible, a'will o'the wisp'.
Finally, we must again acknowledge that the term'information'is frequently used, even in the infor-
mation systems discipline, in senses different f rom the somewhat formal def inition proposed above.
ln particular,'information'and'data'are olten used interchangeably (which seems like a terrible
waste of a usefulword).
3.1.4 Decision
The most common manner in which data can have value, and thereby become information, is by
making a difference to a decision. lt is therefore important to consider in some depth what a decision
is, and what decision-making processes are about. A'decision'is a choice arnong alternative courses
of action. ln many cases, the making of the decision is performed in the same breath as the taking
of the action itself. ln other circumstances, however, we may make a nrental commitment, but take
no action until a short time later. Note, too, that'action' includes 'inaction', i.e. we can decide to do
nothing, as in "shall ltake part in the demonstration against the cuts to the tertiary education budget
tomorrow? No, I don't think l'll bothe/'.
A'decision-making process' is the procedures which result in a decision being reached. How a
decision comes about is important to understand.The simplest model of decision-making envisages
four steps:
D ATrigger
tr lnformation-Gathering
O Alternative-Generation
5.1.5 Ghoice t
The'trigger'is something that causes a person to realise a decision is needed, such as the notice
you will receive to re-enrol for units next year. ln order to make the decision, you will need to gather
information about what units are going to be offered, and of course you'll need to know your results
for the previous year. The decision-maker needs to generate a set of options, and then to choose
among them.
Gaining access to information is crucial to most of these steps. ln order to choose, for example, you
66 / ELECTRONIC COMMERCE
n99d to know what your objectives are, in order to work out a criterion whereby you
can work out
which is the best of the available options.
ln practice, this model is too simple. lt's a'normative model', because it describes
how scientists
think people ought to make decisions.To support organisations making complex
decisions, we need
'behavioural models' which describe how managers and executives really
make them.
One example of the difference between the two is that most people don't actually
search out the
'satisfice'. This odd word was coined, because peo-
ey don't diligently search a huge decision-space in
think of a few possibilities, and ask themselves ,,ls
that's adequate, they stop searching, and the deci-
sion's made. That's 'satisficing'. ln order to understand topics in information systemi, it is important
to always keep in mind these fundamental notions of data, information and decision-making.
The information industry is far from being a mature industry, as evidenced by the low penetration of
even basic phone service in a large partbf the world. While the information industry is about a sixth
of the U.S. economy, it accounts ior a mere fraction of that amount for the vast majority of nations.
However, that proportion will surely increase, fueling unprecedented growth. Coupled with the dra-
it is
matic new capabiiities made possible by phenomenal and unrelenting advances in technology,
evident that the information industry is in perhaps the most exciting period ever seen in any industry.
3.9.1 Creation
The first function is the creation and collection of information content. ln the digital future, content is
clearly key, and the networks will evolve to support increasingly rich forms of it. Content includes
text, images, data, movies, and television programming (including sports), as well as evolving con-
tent, including on-line games and interactive shopping.
5.9.2 Display
The second function is information display. Historically, each form of content utilized its own form of
display, creating manufacturing companies with distinct core competencies. For example, textual
information has been predominLntly displayed on paper;telecommunications companies have used
audio handsets; still images have mostly been displayed on photographic paper (with a trend toward
plain paper); computer lnd television images are typically displayed on cathode ray tube (CRT)
ierminals; and portable computers and similar devices use liquid crystal displays (LCD) and other
f lat-screen technologies.
3.9.3 Storage
The third function is information storage. Because the creation and consumption of information are
typically separated, and because information tends to have lasting value, storing information is a
jaluabie function. lnformation can be stored through a variety of means: books, magnetic media,
CD-ROMs, microfiche, answering machines, film, videotape, audiotape, and game cartridges. Other
emerging technologies for storage include DVD-ROMs, llash memory (semiconductor-based memory
cards), and holographic memorY.
The key driver of the value of a storage system is the extent to which information within it is readily
accessible.Thus, storage that permitJthe use of advanced database-management software, as well
as random access, is increasingly preferred over other kinds of storage'
3.9.4 Processing
The fourth function is the processing of information (the applications business), which creates infor-
mation through the intelligent manipulation of data. ln the past, a variety of processing approaches
and technologies have be-en used, based on the specific media. For voice information in the telecom-
munications industry, companies have used voice-processing technologies. For text information,
publishers have used wordprocessors (with spelling and grammar checks) and desktop-publishing
software. ln the imaging business, companies have primarily used chemical processes to improve
images, though sottware-Uased approaches are becoming more prevalent. For audio/video informa-
tionJcompanies have relied heavily on editing and mixing technologies. Finally, processing has been
(almost by definition) the most intensive for data applications.
5.9.5 lransport
The filth function is the dist igformatio lndustries
based on different forms of 5laborate infrastruc.
tures for distribution.The tel velopeda network of
copper wires. ln the past decade, a wireless infrastructure based on cellular technology has also
been created for voice communication.Text information has historically been distributed in a manner
similar to manufactured goods_from factory to intermediaries to end users. lmage information has
largely ridden on the same infrastructure, which includes the postal system and various express-
deiivery companies. The telecommunications industry has also entered this area via the fax ma-
chine. Video and audio information was historically broadcast over the airwaves; but, in the last two
72 I ELECTRONIC COMMERCE
cjecades, the cable-television system has come to dominate video distribution, along
with the sale
and rental of videocassettes. lncreasingly, satellite transmission is also playing a larler role
in the
distribution of video information. Finally, for data transport, a variety of'compirter-n6tworking
ap-
proaches, such as Ethernet and token-rings, h we become widespread. The
lnternet, utilizing the
telephone rtation network for computers. The underlying
technologi he separation of these industries by form have
been rend the forces at work leading to convergence.
Thomson, and Philips have already moved ahead in developing a new generation of content display
devices. They dominate the manufacturing of traditional consumer electronics products as well as
for telephony and fax machines, which places them in a superior position to PC manufacturers and
traditional telecommunications providers such as Lucent, Motorola, and Nokia. These companies
will continue to dominate in infrastructure but will cede the consumer markets to electronics manu-
facturers.
Devices were originally manufactured to display content in the form in which it was created. Sepa-
rate industries were creatbd around designing and building phones, televisions, computers, and
printing presses, and developing and printing film. Devices are now being designed to handle content
in multiple forms. For example, digitalwireless phones have an LCD display that can receive alpha-
numeric messages, including caller lD and eventually e-mail.
meet the preferences of each consumer and grow with the menu of services on the network.
/\ €
Netu,orks Devices
PROCESSINC
t.13.7 Ouality0bsession
Outstanding quality will bEa minimum requirement to be in the running for global business. Companies
must benchmark their performance against the best in the world anO aOopt continuous improvement
processes to stay competitive.
5.13.8 XassCustomization
lncreasingly, companies are called upon to provide customized products to markets at costs
compa-
rable to mass-produced ones. Companies can do this by creating flexible manufacturing
systems
and by investing heavily in information technology. Both Dell and Gateway computers are built to
order and shipped directly to the customer. By avoiding high inventory and distribution costs, both
are redefining how to address the market; both Apple and Compaq are moving to this model.
5.15.9 Weakthroughlnnovation
With the rapidity of technological change in the information industry, the importance of research and
development has never been greater. Technological breakthroughs will be crucial at both the basic as
well as the applied levels. ln other words, companies must periodically break preveiiling price/per-
formance norms. For example, Sony has excelled at creating new products that meet needs custom-
ers never thought they had, with products such as the transistor radio, Walkm an stereos, aid com-
pact-disc players. Leading the markets in this manner wilt be key in the future.