You are on page 1of 52

UNIT-1

PART-A
1. Define E-Commerce.
E-commerce (electronic commerce or EC) is buying and selling of goods and services,
or the transmitting of funds or data, over an electronic network, primarily the internet. These
business transactions occur either as business-to-business, business-to-consumer, consumer-to-
consumer or consumer-to-business.
Here are a few examples of e-commerce:

➢ accepting credit cards for commercial online sales


➢ generating online advertising revenue
➢ trading stock in an online brokerage account
➢ driving information through a company via its intranet
➢ driving manufacturing and distribution through a value chain with partners on an extranet
➢ Selling to consumers on a pay-per-download basis, through a Web site.

2. State the application of e-commerce.


Following are some of the widely used e-commerce applications:
• E marketing
• E advertising
• E banking
• Mobile commerce
• E learning
• E shopping
• Online trading
• Entertainment

3. Draw the Electronic Framework Model.


4. List out the Multimedia content for E-Commerce Application.
• Multimedia content can be considered both fuel and traffic for electronic commerce
applications.
• The technical definition of multimedia is the use of digital data in more than one format, such
as the combination of text, audio, video, images, graphics, numerical data, holograms, and
animations in a computer file/document
• Multimedia is associated with hardware components in different networks.
• The accessing of multimedia content depends on the hardware capabilities of the customer.

5. What is meant by E-Commerce Framework?


• A framework can be defined as a structure for supporting or attaching something else,
particularly a support that is used as the foundation for something being created.
• Hence, an e-commerce framework comprises the set of infrastructure required for carrying out
the e-commerce business. This set of infrastructure typically includes the network requirements
and the different software applications that are for e-commerce.
• This framework must allow flexibility, interoperability and directness necessary for the
successful development of electronic commerce.
• The e-commerce framework offers a set of options to the customers. Most of the electronic
commerce plans have different strategies for security and privacy, their skill to deal with the
payments, and their usability to different transactions.

6. Specify the pillars supporting E-Commerce.


The pillars supporting E commerce are public policy and technical standard
Public policy:
They govern issues like universal access, privacy and information pricing; such issues
support encryption and decryption mechanism, secure protocols etc. for travel of information safely
on the information highway.
Technical Standard:
Technical Standard relate for seamless integration across the transportation network. They
also provide standards for accessing information on any type of device like laser disc, PCs, Portable
hand held devices.

7. What do you mean by convergence?


Convergence is the melding of consumer electronics, television, publishing,
telecommunications, and computers for the purpose of facilitating new forms of information based
commerce.
Phenomenon of convergence:
Convergence of content translates all types of information content- books, business
documents, videos, movies, music into digital information.
Convergence of information access devices have the sophistication to function as both
computers and televisions.
PART-B
1. Write an account on E-Commerce framework.
An e-commerce framework comprises the set of infrastructure required for carrying out the e-
commerce business. This set of infrastructure typically includes the network requirements and
the different software applications that are for e-commerce.
• Common business services for facilitating the buying and selling process
• Messaging & information distribution as a means of sending and retrieving information
• Multimedia content & network publishing, for creating a product & a means to
communicate about it
• The information superhighway- the very foundation-for providing the high way system
along which all e-commerce must travel

2. Explain about Multimedia content for E-Commerce applications.


Multimedia Content for E-Commerce Applications
• Multimedia content can be considered both fuel and traffic for electronic commerce
applications.
• The technical definition of multimedia is the use of digital data in more than one format,
such as the combination of text, audio, video, images, graphics, numerical data,
holograms, and animations in a computer file/document.
• Multimedia is associated with Hardware components in different networks.
• The Accessing of multimedia content depends on the hardware capabilities of the
customer.

3. Give short note on anatomy of e-commerce applications.


Anatomy of E-Commerce applications E-Commerce applications are:
1. Multimedia Content for E-Commerce Applications
2. Multimedia Storage Servers & E-Commerce Applications
i. Client-Server Architecture in Electronic Commerce
ii. Internal Processes of Multimedia Servers
iii. Video Servers & E-Commerce
3. Information Delivery/Transport & E-Commerce Applications
4. Consumer Access Devices

4. Explain about Traditional business commerce.


➢ Heavy dependency on information exchange from person to person.
➢ Communication/ transaction are done in synchronous way.
➢ Manual intervention is required for each communication or transaction.
➢ It is difficult to establish and maintain standard practices in traditional commerce.
➢ Communications of business depends upon individual skills.
➢ Unavailability of a uniform platform as traditional commerce depends heavily on
personal communication.
➢ No uniform platform for information sharing as it depends heavily on personal
communication.
5. Give short note on Electronic business commerce.
➢ Information sharing is made easy via electronic communication channels making
little dependency on person to person information exchange.
➢ Communication or transaction can be done in asynchronous way. Electronics
system automatically handles when to pass communication to required person or
do the transactions.
➢ A uniform strategy can be easily established and maintain in e-commerce.
➢ In e-Commerce or Electronic Market, there is no human intervention.
➢ E-Commerce website provides user a platform where al l information is available
at one place.
➢ E-Commerce provides a universal platform to support commercial / business
activities across the globe.

PART C
1. Draw and explain the electronic commerce framework in detail.
Definition of e commerce framework:
• A framework can be defined as a structure for supporting or attaching something else,
particularly a support that is used as the foundation for something being created.
• Hence, an e-commerce framework comprises the set of infrastructure required for
carrying out the e-commerce business. This set of infrastructure typically includes the
network requirements and the different software applications that are for e-commerce.

The various building blocks are:


1. Common business services:
These services provide the infrastructure for buying and selling process, such
services support various levels like security, authentication, electronic payment etc.
2. Messaging and information distribution infrastructure:
These services provide the infrastructure for sending and retrieving information; such
services support a variety of software in a number of forms like e mail, EDI or point to
point file transferring system.
3. Multimedia content and network publishing services:
These services provide the infrastructure for determining the appropriate means of
communication between the various points and checks for the delivery of information’s.
Such services also support a wide range of format like text, data, graphics, video, audio,
etc.
4. Information services:
Information services provide the infrastructure for providing a transporting medium
along which all data should travel. They support technologies like telecom, cable, TV,
wireless and internet.
The following are the two pillars supporting all e commerce applications.
Public policy:
They govern issues like universal access, privacy and information pricing; such issues
support encryption and decryption mechanism, secure protocols etc. for travel of information
safely on the information highway.

Technical Standard:
Technical Standard relate to seamless integration across the transportation network.
They also provide standards for accessing information on any type of device like laser disc, PCs,
Portable hand held devices.

2. Differentiate traditional commerce vs electronic commerce.

Sr. Traditional Commerce E-Commerce


No.

1 Heavy dependency on information Information sharing is made easy via


exchange from person to person. electronic communication channels making
little dependency on person to person
information exchange.

2 Communication/ transaction are Communication or transaction can be done


done in synchronous way. Manual in asynchronous way. Electronics system
intervention is required for each automatically handles when to pass
communication or transaction. communication to required person or do the
transactions.

3 It is difficult to establish and A uniform strategy can be easily established


maintain standard practices in and maintain in e-commerce.
traditional commerce.

4 Communications of business In e-Commerce or Electronic Market, there


depends upon individual skills. is no human intervention.

5 Unavailability of a uniform platform E-Commerce website provides user a


as traditional commerce depends platform where al l information is available
heavily on personal communication. at one place.

6 No uniform platform for information E-Commerce provides a universal platform


sharing as it depends heavily on to support commercial / business activities
personal communication. across the globe.

3. Explain the various e-commerce applications.


Following are some of the widely used e-commerce applications:
➢ E marketing
➢ E advertising
➢ E banking
➢ Mobile commerce
➢ E learning
➢ E shopping
➢ Online trading
➢ Entertainment

E-Marketing:
E-Marketing (Electronic Marketing) are also known as Internet Marketing, Web
Marketing, Digital Marketing, or Online Marketing. E-marketing is the process of marketing a
product or service using the Internet. It not only includes marketing on the Internet, but also
includes marketing done via e-mail and wireless media. It uses a range of technologies to help
connect businesses to their customers.

E-Advertising:
It is also known as online advertising. It is a form of promotion that uses Internet and
World Wide Web to deliver marketing messages to attract customers.
Online advertisements are purchased through one of the following common vehicles:

➢ Cost per Thousand (CPM): Advertisers pay when their messages are exposed to specific
audiences.
➢ Cost per Click (CPC): Advertisers pay every time a user clicks on their ads.
➢ Cost per Action (CPA): Advertisers only pay when a specific action (generally a
purchase) is performed.

E-Banking:
Online banking offers several main benefits to depositors. It provides a real-time view of
finances and eliminates the need for numerous visits to a bank teller. Banks that offer online
banking are sometimes called "brick-to-click." Many of these banks still provide branch services
but support online options.

Mobile commerce:

Mobile Commerce, also known as M-Commerce, is the ability to conduct commerce as


a mobile device such as mobile phone. Banks and other financial institutions use M-Commerce
to allow their customers to access account information and make transactions such as
purchasing, withdrawals. Using a mobile browser, customers can shop online without having to
be at their personal computer.

Some services are:


1. Mobile Ticketing
2. Mobile Banking
3. Mobile Purchase
4. Mobile Vouchers, Coupons and Loyalty cards.
E learning:
• E-learning is essentially the computer and network-enabled transfer of skills and
knowledge.
• E-learning applications and processes include web-based learning, computer-based
learning.
• E-learning can also refer to the educational website such as those offering learning
scenarios worst ad interactive exercises for children.

E shopping:

• Online shopping is a form of electronic commerce which allows consumers to directly


buy goods or services from a seller over the Internet using a web browser.
• When an online store is set up to enable businesses to buy from other businesses, the
process is called business-to-business (B2B) online shopping.
• Online shoppers commonly use credit card to make payments, however some systems
enable users to create accounts and pay by alternative means ,such as
❖ Billing to mobile phones and landline
❖ Cheque, debit cards, gift cards and postal money order

Online trading:

• An online trading community provides participants with a structured method for trading,
bantering (exchanging goods with goods) or selling goods and services.
• These communities often have forums and chat rooms, designed to facilitate
communication between the members.
• A formal trading community consists of a website or network of websites that facilitates
and tracks the made transactions.

Entertainment:

• The conventional media that have been used for entertainment are-
o Books/magazines
o Radio
o Television
o Video games
• The internet as an entertainment media is not an elastic by itself but rather a unique
interactions of all the above media.
• Computer based systems have been used as an entertainment medium in the form of
video games, CD, ROMs, etc.

4. Discuss the anatomy of E-Commerce Application.


Anatomy of E-Commerce applications
E-Commerce applications are:
1. Multimedia Content for E-Commerce Applications
2. Multimedia Storage Servers & E-Commerce Applications
i. Client-Server Architecture in Electronic Commerce
ii. Internal Processes of Multimedia Servers
iii. Video Servers & E-Commerce
3. Information Delivery/Transport & E-Commerce Applications
4. Consumer Access Devices
Multimedia Content for E-Commerce Applications
➢ Multimedia content can be considered both fuel and traffic for electronic commerce
applications.
➢ The technical definition of multimedia is the use of digital data in more than one format,
such as the combination of text, audio, video, images, graphics, numerical data,
holograms, and animations in a computer file/document.
➢ Multimedia is associated with Hardware components in different networks.
➢ The Accessing of multimedia content depends on the hardware capabilities of the
customer.

Multimedia Storage Servers & E-Commerce Applications:


➢ E-Commerce requires robust servers to store and distribute large amounts of
digital content to consumers.
➢ These Multimedia storage servers are large information warehouses capable of
handling various content, ranging from books, newspapers, advertisement
catalogs, movies, games, & X-ray images.
➢ These servers, deriving their name because they serve information upon request,
must handle large-scale distribution, guarantee security, & complete reliability
i. Client-Server Architecture in Electronic Commerce
➢ All e-commerce applications follow the client-server model Clients are devices
plus software that request information from servers or interact known as message
passing
➢ Mainframe computing , which meant for “dump”
➢ The client server model, allows client to interact with server through request-
reply sequence governed by a paradigm known as message passing. See in fig.

ii. Internal Processes of Multimedia Servers


➢ The internal processes involved in the storage, retrieval & management of
multimedia data objects are integral to e-commerce applications.
➢ A multimedia server is a hardware & software combination that converts raw data
into usable information & then dishes out.

iii. Video Servers & E-Commerce


➢ The electronic commerce applications related to digital video will include
1. Telecommunicating and video conferencing
2. Geographical information systems that require storage & navigation
over maps
3. Corporate multimedia servers
4. Postproduction studios
5. Shopping kiosks.

Information Delivery/Transport & E-Commerce Applications

➢ Transport providers are principally telecommunications, cable, & wireless


industries. Transport Routers Information Transport Providers Information
Delivery Methods.
➢ Cable television companies Cable TV coaxial, fiber optic & satellite lines
➢ Computer-based on-line servers Internet; commercial on-line service providers
➢ Wireless communications Cellular & radio networks; paging systems

Consumer Access Devices

➢ Computers with audio & video Personal/desktop computing capabilities Mobile


computing
➢ Telephonic devices Videophone
➢ Consumer electronics Television + set-top box Game systems
➢ Personal digital assistants (PDAs) Pen-based computing, voice-driven
computing
5. Discuss about major categories of Electronic Commerce.
E-Commerce or Electronics Commerce business models can generally categorized in following
categories.

• Business - to - Business (B2B)


• Business - to - Consumer (B2C)
• Consumer - to - Consumer (C2C)
• Consumer - to - Business (C2B)
• Business - to - Government (B2G)
• Government - to - Business (G2B)
• Government - to - Citizen (G2C)

Business - to - Business (B2B)

Website following B2B business model sells its product to an intermediate buyer who
then sells the product to the final customer. As an example, a wholesaler places an order from
a company's website and after receiving the consignment, sells the end product to final
customer who comes to buy the product at wholesaler's retail outlet.

Business - to - Consumer(B2C)

Website following B2C business model sells its product directly to a customer. A
customer can view products shown on the website of business organization. The customer can
choose a product and order the same. Website will send a notification to the business
organization via email and organization will dispatch the product/goods to the customer.
Consumer - to - Consumer (C2C)

Website following C2C business model helps consumer to sell their assets like
residential property, cars, motorcycles etc. or rent a room by publishing their information on
the website. Website may or may not charge the consumer for its services. Another consumer
may opt to buy the product of the first customer by viewing the post/advertisement on the
website.

Consumer - to - Business (C2B)

In this model, a consumer approaches website showing multiple business organizations


for a particular service. Consumer places an estimate of amount he/she wants to spend for a
particular service. For example, comparison of interest rates of personal loan/ car loan provided
by various banks via website.

Business - to - Government (B2G)

B2G model is a variant of B2B model. Such websites are used by government to trade
and exchange information with various business organizations. Such websites are accredited
by the government and provide a medium to businesses to submit application forms to the
government.

Government - to - Business (G2B)

Government uses B2G model website to approach business organizations. Such


websites support auctions, tenders and application submission functionalities.

Government - to - Citizen (G2C)

Government uses G2C model website to approach citizen in general. Such websites support
auctions of vehicles, machinery or any other material. Such website also provides services like
registration for birth, marriage or death certificates.
UNIT-2
PART-A

1. List out the Elements of Network Infrastructure.

1. Network Interface Card (NIC)


➢ A network interface card is more commonly referred to as NIC. It is a device
that allows computers to be joined together in a local area network (LAN).
2. Switches, Routers, and Hubs
➢ It is a device in networks that filters and forwards packet between Local Area
Network (LAN) segments.
➢ The router is a device that connects multiple networks to form a lager internet
work.
➢ A Hub is a network device that provides a central point of connectivity to a
physical network.
3. Gateways
➢ A node in a network that serves as an entrance to another net web page.

2. What are the components of I-Way?

1. Network Access Equipment


➢ Network Access Equipment which is at the consumer end and enables the
consumer to access the network.
2. Access Roads or Media
➢ The access roads or access media is the way in which the consumer homes
and work places are linked with the backbone of the network infrastructure
for e-commerce.
3. Global Information Distribution Networks
➢ Global Information Distribution Networks providing the infrastructure for
connecting across the countries and continents. They included such networks
as the long distance telephone lines, the satellite networks and the internet.
3. Define NIC.

A network interface card (NIC) is a circuit board or card that is installed in a computer
so that it can be connected to a network.
A network interface card provides the computer with a dedicated, full-time connection
to a network. Personal computers and workstations on a local area network (LAN) typically contain a
network interface card specifically designed for the LAN transmission technology. NICs may be used
for both wired and wireless connections.

4. What is global information distribution network?


Global Information Distribution Networks providing the infrastructure for
connecting across the countries and continents. They included such networks as the long
distance telephone lines, the satellite networks and the internet.

Telecom
based access

Cable TV
Consumer based access
Telecom Networks
access
Satellite Networks
equipment
Internet
Wireless
based access

Internet,
Intranet,
Extranet based
access

Network access Access Media Global information


equipment distribution networks

5. Define Network Infrastructure.


Network infrastructure refers to the hardware and software resources of an
entire network that enable network connectivity, communication, operations and management of an
enterprise network. Network infrastructure provides the communication path and services between
users, processes, applications, services and external networks/the Internet.
A typical network infrastructure includes:

• Networking Hardware:
o Routers
o Switches
o LAN cards
o Wireless routers
o Cables
• Networking Software:
o Network operations and management
o Operating systems
o Firewall
o Network security applications
• Network Services:
o T-1 Line
o DSL
o Satellite
o Wireless protocols
o IP addressing
6. List out the public policy issues shaping the I-way.

There are seven major issues to e discussed about I-way:


➢ Cost,
➢ Subsidies,
➢ Allocation of scarce resources,
➢ Regulation,
➢ Universal access,
➢ Privacy
➢ Social issues.

7. What is LAN, MAN & WAN?

1. LAN
➢ A Local Area Network (LAN) is a network that is restricted to smaller physical
areas e.g. a local office, school, or house. Approximately all current LANs
whether wired or wireless are based on Ethernet.
2. MAN
➢ A Metropolitan Area Network (MAN) is a network that connects two or more
computers, communicating devices or networks in a single network that has
geographic area larger than that covered by even a large ‘Local Area Network’
but smaller than the region covered by a ‘Wide Area Network’.
3. WAN
➢ Wide Area Network is a computer network that covers relatively larger
geographical area such as a state, province or country. It provides a solution to
companies or organizations operating from distant geographical locations who
want to communicate with each other for sharing and managing central data or
for general communication.

PART B

1. What are the public policy issues shaping the I-way?


There are seven major issues to be discussed about I-way:
Cost, subsidies, allocation of scarce resources, regulation, universal access, privacy and social
issues.
Cost: Who will pay for constructing the I-way?
Subsidies: Who are to be given subsidies?
Allocation of scarce resources: Investment of the allocation of different scarce resources
would be wasted or not?
Regulation: Who will fund for the highway and who will write and enforce the rues to use the
highway?
Universal access: Who can access and at what cost?
Privacy: Is using online activities secure?
Social and religious barriers: In cyberspace, everybody has right to write anything or publish.

2. Explain about Access Roads or Access Media.


The access roads or access media is the way in which the consumer homes and work places
are linked with the backbone of the network infrastructure for e-commerce.
These can be categorized into four major types:
➢ Telecom based
➢ Cable TV based
➢ Wireless based
➢ Internet, intranet and Extranet based
Telecom based
The telecom industry provides both long distance and local telecom services for e-
commerce application. The telecom companies provide a high-speed “pipeline” capable of
carrying high values of interactive voice, data and video to homes and businesses.
Cable TV based
The cable TV network provides a popular media for pushing high speed data to homes.
The cable TV networks may be wired or wireless.
Wireless based
The wireless approach focuses on propagation of the signals to several homes in an area
from strand-mounted transceivers, just like the cellular telephone technology.
Internet, internet and Extranet based
The internet, intranets and extranets are the most popular platforms for e-commerce. The
internet is the most common platform for B2C e-commerce, the intranet for corporate
internal management and the extranet is the most common platform for B2B e-commerce.

3. Explain about two major technology underlying high speed global


Information distribution networks.
The global information distribution networks consist of the infrastructure crises crossing
the countries and continents. They include the long distance telephone lines, satellite networks,
and the internet.
Long Distance Network
Long distance telephone connectivity is provided through cable (co-axial or fiber) by the
interexchange carriers. Long distance cellular networks are using the wireless technologies to
connect the consumers worldwide.
Satellite Networks
Satellite networks play a vital role in the communication industry. They have advantages
over the terrestrial networks in that:
➢ They are accessible from any point on the globe
➢ They can provide broad band digital services to many points without the cost
of acquiring wire/cable installation
➢ They can add receiving and sending sites without significant additional costs.
Communications satellites form a crucial part of the global communication infrastructures,
providing a wide range of services including broadcast video and overseas telephone links.

4. Write short notes on Switches, routers, and hubs.


SWITCH
➢ It is a device in networks that filters and forwards packet between Local Area
Network (LAN) segments.
➢ Switches operate at the data link layer and sometimes that network layer of the Open
system Interconnection (OSI) reference model and therefore support any packet
protocol.
➢ LANs that use switches to join segments are called switched LANs or in the case of
Ethernet networks, switched Ethernet LANs.
ROUTERS
➢ The router is a device that connects multiple networks to form a lager internet work.
➢ A router uses combination of hardware and software to actually route data from its
source to its destination.
➢ A router can set up to route data packets from a number of different network
protocols.
HUBS
➢ A Hub is a network device that provides a central point of connectivity to a physical
network.
➢ Each individual computer connects to the Hub with its own network cable.
➢ Network traffic that enters the hub is then replicated and sent back out every port in
the Hub.

5. Explain Set-top boxes. Write down types of Set-top boxes?


These are known as receiver, converters and decoders. Set-top boxes generally are digital
devices that communicate using computer language.
Digital Media Adapters, Digital Media Receivers, Windows Media Extender and most
video games consoles are also examples of set-top boxes.
Types of Set-top Boxes
❖ Broadcast TV set-top boxes
❖ A more primitive set-top box with no back channel
❖ Enhanced TV set-top boxes
❖ Advanced set-top boxes
❖ Hybrid digital cable box

PART C

1. Discuss about the components of the I-way.


The I-way or information super high way consists of various components which can be
broadly categorized as:
1. Network Access Equipment
➢ Network Access Equipment which is at the consumer end and enables the
consumer to access the network. It consists of the hardware such as
computers, modems, routers, switches for computer networks, set-up boxes
for television networks, and software platforms such as browsers and
operating systems.

2. Access Roads or Media


➢ The access roads or access media is the way in which the consumer homes
and work places are linked with the backbone of the network infrastructure
for e-commerce.
3. Global Information Distribution Networks
➢ Global Information Distribution Networks providing the infrastructure for
connecting across the countries and continents. They included such networks
as the long distance telephone lines, the satellite networks and the internet.

There are seven major issues to be discussed about I-way:


❖ Cost,
❖ Subsidies,
❖ Allocation of scarce resources,
❖ Regulation
❖ Universal access,
❖ Privacy
❖ Social issues
Cost: Who will pay for constructing the I-way?
Subsidies: Who are to be given subsidies?
Allocation of scarce resources: Investment of the allocation of different scarce resources
would be wasted or not?
Regulation: Who will fund for the highway and who will write and enforce the rues to
use the highway?
Universal access: Who can access and at what cost?
Privacy: Is using online activities secure?
Social and religious barriers: In cyberspace, everybody has right to write anything or
publish.

2. Discuss about the Global information distribution network.


• Global Information Distribution Networks providing the infrastructure for connecting
across the countries and continents. They included such networks as the long distance
telephone lines, the satellite networks and the internet.

• The global information distribution networks consist of the infrastructure crises crossing
the countries and continents. They include the long distance telephone lines, satellite
networks, and the internet.
Long Distance Network
Long distance telephone connectivity is provided through cable (co-axial or
fiber) by the interexchange carriers. Long distance cellular networks are using the wireless
technologies to connect the consumers worldwide.
Satellite Networks
Satellite networks play a vital role in the communication industry. They have
advantages over the terrestrial networks in that:
➢ They are accessible from any point on the globe
➢ They can provide broad band digital services to many points without the cost
of acquiring wire/cable installation
➢ They can add receiving and sending sites without significant additional costs.
• Communications satellites form a crucial part of the global communication
infrastructures, providing a wide range of services including broadcast video and
overseas telephone links.

3. Discuss about network access equipments.


Users today, are accessing enterprise networks from anywhere in the world at any time
with a myriad of access technologies and devices running any number of operating systems and
application. They can be classified in two forms.
1. Local-on-Ramps
2. Global Information Distribution Networks.

Local-On-Ramps
This comprises much equipment to run internet.
1. Set-top boxes
➢ These are known as receiver, converters and decoders. Set-top boxes generally are
digital devices that communicate using computer language.
➢ Digital Media Adapters, Digital Media Receivers, Windows Media Extender and
most video games consoles are also examples of set-top boxes.
Types of Set-top Boxes
❖ Broadcast TV set-top boxes
❖ A more primitive set-top box with no back channel
❖ Enhanced TV set-top boxes
❖ Advanced set-top boxes
❖ Hybrid digital cable box
2. Computer-Based Telephony
Computer telephony (CT) adds a new dimension to business communications whare the
telephone intelligent devices and internet with other devices and applications on Local Area
Network (LAN), Wide Area Network (WAN).
3. Hubs, Wiring, Clusters, Routers and Digital Switches
A network hub or concentrator is a device for connecting multiple twisted pair or fiber
optics. Hubs work at the physical layer of the OSI.
Network hubs are also responsible for operating LAN computers through other LAN
computers. Switches have the same function as that of hub.
Routers are Internet-working devices that intelligently connect the LAN and WAN of
various providers. A router is located at the gateway where it directs the flow and determines
the route of packets as they travel from one to another network.
4. Wired Internet Connection
Wired Internet Connection or fiber optic communication is a method of transmitting
information from one place to another by sending light through an optic fiber.The process of
communicating using fiber-optics involves the following basic steps:
❖ Creating the optical signal using a transmitter relying the signal along the fiber.
❖ Ensuring that the signal does not become too distorted or weak.
❖ Receiving the optical signal and converting it into an electrical signal.
5. Network Interface Card (NIC)
A network interface card (NIC) is a circuit board or card that is installed in a computer
so that it can be connected to a network.
A network interface card provides the computer with a dedicated, full-time connection
to a network. Personal computers and workstations on a local area network (LAN) typically
contain a network interface card specifically designed for the LAN transmission technology.
NICs may be used for both wired and wireless connections.

Global Information Distribution Networks.

Global Information Distribution Networks providing the infrastructure for connecting across
the countries and continents. They included such networks as the long distance telephone lines,
the satellite networks and the internet.

The global information distribution networks consist of the infrastructure crises crossing the
countries and continents. They include the long distance telephone lines, satellite networks, and
the internet.
Long Distance Network
Long distance telephone connectivity is provided through cable (co-axial or
fiber) by the interexchange carriers. Long distance cellular networks are using the wireless
technologies to connect the consumers worldwide.
Satellite Networks
Satellite networks play a vital role in the communication industry. They have
advantages over the terrestrial networks in that:
➢ They are accessible from any point on the globe
➢ They can provide broad band digital services to many points without the cost
of acquiring wire/cable installation

4. Describe the Network Infrastructure for e-commerce.


Electronic commerce needs a network infrastructure to transport the content- data, audio,
visual, text, animation and so on. This network infrastructure is provided by what is known as
the I-way or information super highway.
The Elements of Network Infrastructure
1. Network Interface Card (NIC)
➢ A network interface card is more commonly referred to an as NIC. It is a
device that allows computers to be joined together in a local area network
(LAN). Network computers communicate with each other using a given
protocol or agreed- upon language for transmitting data packets between the
different machines, known as nodes.
➢ A network card, network adapter, LAN adapter or NIC is a piece of computer
hardware designed to allow computers to communicate over a computer
network.
➢ It allows users to connect to each other either by using cables or wireless
technology. A network interface controller (NIC) is a hardware interface that
handles and allows a network cable device to access a computer network such
as the Internet.
2. Switches, Routers, and Hubs
➢ Switch is a device in networks that filters and forwards packets between LAN
segments. Switches operate at the data link layer and sometimes that network
layer of the OSI reference model and therefore support any packet protocol.
➢ The router is a device that connects multiple networks to form a larger internet
work. A router uses combination of hardware and software to actually route
data from its source to its destination. A router can set up to route data packets
from a number of different network protocols.
➢ A Hub is a network device that provides a central point of connectivity to a
physical network. Each individual computer connects to the Hub with its own
network cable. Network traffic that enters the hub is then replicated and sent
back out every port in the Hub.

3. Gateways
➢ It is a node in a network that serves as an entrance to another net web page. In
homes, the gateway is the ISP that connects the user and firewall.
➢ The gateway is also associated with both a router which use headers and
forwarding tables to determine where packets are sent and a switch which
provides the actual path for the packet in an out of the gateway.

5. Explain about Access Roads & Radio based Wireless Networks?


The access roads or access media is the way in which the consumer homes and work
places are linked with the backbone of the network infrastructure for e-commerce.
These can be categorized into four major types:
➢ Telecom based
➢ Cable TV based
➢ Wireless based
➢ Internet, intranet and Extranet based
Telecom based
The telecom industry provides both long distance and local telecom services for
e-commerce application. The telecom companies provide a high-spped “pipeline” capable
of carrying high values of interactive voice, data and video to homes and businesses.
Cable TV based
The cable TV network provides a popular media for pushing high speed data to
homes. The cable TV networks may be wired or wireless.
Wireless based
The wireless approach focuses on propagation of the signals to several homes in
an area from strand-mounted transceivers, just like the cellular telephone technology.
Internet, internet and Extranet based
The internet, intranets and extranets are the most popular platforms for e-
commerce. The internet is the most common platform for B2C e-commerce, the intranet for
corporate internal management and the extranet is the most common platform for B2B e-
commerce.
Types of
Network Type User Type Access
Information
Any individual or
Unlimited public General public and
Internet LAN with dial-up
with no restrictions advertorial
cable access
Authorized Private and Specific corporate
Intranet
employees only restricted and proprietary
Authorized groups Private and Shared in authorized
Extranet from collaborating authorized partners, collaborating
companies restricted groups.

Radio Based Wireless Networks


The wireless operators are typically radio-based i.e. cellular, paper and specialized
mobile radio (SMR) based. The wireless based systems have revolutionized the ways of
thinking about information delivery. The radios based wireless networks work on the radio
frequencies and have the advantage over terrestrial (wired) networks because they can be
accessible from any point on the globe without the cost of installing a wire or a cable.

UNIT-3
PART-A

1. Define Network Security and Draw the Model for Network Security.
A network security system typically relies on layers of protection and consists of
multiple components including networking monitoring and security software in addition to
hardware and appliances. All components work together to increase the overall security of the
computer network.

2. What is a Firewall? Define its types?


When a computer is connected to Internet, it can create many problems for corporate
companies. Most companies put a large amount of confidential information online. Such
information should not be disclosed to the unauthorized persons. Second problem is that the
virus, worms and other digital pests can breach the security and can destroy the valuable data.

A firewall is a device installed between the internet network of an organization and


the rest of Internet. The main purpose of a firewall is to separate a secure area from a less secure
area and to control communications between the two. Firewall also controls inbound and
outbound communications on anything from a single machine to an entire network.
Firewall systems fall into two categories
• network-level
• application-level.

3. Distinguish between encryption and decryption.


Data that can be read and understood without any special measures is called
plaintext or cleartext. The method of disguising plaintext in such a way as to hide its substance
is called encryption.
Encrypting plaintext results in unreadable gibberish called ciphertext. You use
encryption to ensure that information is hidden from anyone for whom it is not intended, even
those who can see the encrypted data. The process o reverting ciphertext to its original plaintext
is called decryption. The below figure illustrates this process.
4. Give the advantages of public key cryptography.
• In public key cryptography, there is no need for exchanging keys, thus eliminating the
key distribution problem.
• The primary advantage of public-key cryptography is increased security and
convenience: private keys never need to be transmitted or revealed to anyone.
• Another major advantage of public-key systems is that they can provide digital
signatures.
• Security is easy as only the private key must be kept secret.

5. Expand PGP and PEM.


PRETTY GOOD PRIVACY (PGP) is an encryption program that
provides cryptographic privacy and authentication for data communication. PGP is often used
for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions
and to increase the security of e-mail communications.PGP encryption uses a serial combination
of hashing, data compression, symmetric-key cryptography, and finally public-key
cryptography; each step uses one of several supported algorithms. Each public key is bound to
a user name and/or an e-mail address.
PRIVACY-ENHANCED MAIL (PEM) is an Internet standard that provides for secure
exchange of electronic mail. PEM employs a range of cryptographic techniques to allow for
confidentiality, sender authentication, and message integrity. The message integrity aspects
allow the user to ensure that a message hasn't been modified during transport from the sender.
The sender authentication allows a user to verify that the PEM message that they have received
is truly from the person who claims to have sent it. The confidentiality feature allows a message
to be kept secret from people to whom the message was not addressed.

6. What are the properties of digital signature?


There are five properties of digital signature
Authenticity: a valid signature implies that the signer deliberately signed the associated
message.
UN forge ability: only the signer can give a valid signature for the associated message.
Non re usability: the signature of a document cannot be used on another document.
Non-repudiation: the signer cannot deny having signed a document that has valid signature.
Integrity: ensure the contents have not been modified.
PART B
1. What is DES? Explain how it is implemented?
The Data Encryption Standard (DES) is an outdated symmetric-key method of
data encryption.DES works by using the same key to encrypt and decrypt a message, so both the
sender and the receiver must know and use the same private key. Once the go-to, symmetric-key
algorithm for the encryption of electronic data, DES has been superseded by the more
secure Advanced Encryption Standard (AES) algorithm.
The Data Encryption Standard is a block cipher, meaning a cryptographic key and
algorithm are applied to a block of data simultaneously rather than one bit at a time. To encrypt
a plaintext message, DES groups it into 64-bit blocks. Each block is enciphered using the secret key
into a 64-bit cipher text by means of permutation and substitution. The process involves 16 rounds
and can run in four different modes, encrypting blocks individually or making each cipher block
dependent on all the previous blocks.
Decryption is simply the inverse of encryption, following the same steps but reversing
the order in which the keys are applied.

2. Describe about encrypt document and e-mail.


Most email messages you send travel vast distances over many networks, secure and
insecure, monitored and unmonitored, passing through and making copies of themselves on
servers all over the internet. In short, pretty much anyone with access to any of those servers –
or sniffing packets anywhere along the way- can read your email messages sent in plaintext.
There are two confidential sender authentication methods. They are:
(i) PRETTY GOOD PRIVACY (PGP) is an encryption program that provides cryptographic
privacy and authentication for data communication. PGP is often used for signing, encrypting,
and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the
security of e-mail communications.PGP encryption uses a serial combination of hashing, data
compression, symmetric-key cryptography, and finally public-key cryptography; each step uses
one of several supported algorithms. Each public key is bound to a user name and/or an e-
mail address.
(ii)PRIVACY-ENHANCED MAIL (PEM) is an Internet standard that provides for secure
exchange of electronic mail. PEM employs a range of cryptographic techniques to allow for
confidentiality, sender authentication, and message integrity. The message integrity aspects
allow the user to ensure that a message hasn't been modified during transport from the sender.
The sender authentication allows a user to verify that the PEM message that they have received
is truly from the person who claims to have sent it. The confidentiality feature allows a message
to be kept secret from people to whom the message was not addressed.
3. What is Cryptography? Explain any one technique in detail.
Cryptography is a technique to provide message confidentiality. The term cryptography
is a Greek word which means “secret writing” or “hidden”. It is an art and science of
transforming messages so as to make them secure and immune to attacks. Cryptography
involves the process of encryption and decryption.
Public-key cryptography:
Public Key Cryptography, also known as public key cryptography, is a method of
encrypting data with two different keys namely Public key and private key. The public key is
available for anyone to use. Data encrypted with the public key can only be decrypted with the
private key, and the data encrypted with the private key can only be decrypted with the public
key.

4. Write short note on properties of Digital Signature.


There are five properties of digital signature
• Authenticity: a valid signature implies that the signer deliberately signed the associated
message.
• UN forge ability: only the signer can give a valid signature for the associated message.
• Non re usability: the signature of a document cannot be used on another document.
• Non-repudiation: the signer cannot deny having signed a document that has valid
signature.
• Integrity: ensure the contents have not been modified.

5. Expand and Explain PGP.


Pretty Good Privacy (PGP) is an encryption program that provides cryptographic
privacy and authentication for data communication. PGP is often used for signing, encrypting,
and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the
security of e-mail communications.PGP encryption uses a serial combination of hashing, data
compression, symmetric-key cryptography, and finally public-key cryptography; each step uses
one of several supported algorithms. Each public key is bound to a user name and/or an e-
mail address.
Some Features are:
Compatibility
As PGP evolves, versions that support newer features and algorithms are able to create
encrypted messages that older PGP systems cannot decrypt, even with a valid private key.
Therefore, it is essential that partners in PGP communication understand each other's capabilities
or at least agree on PGP settings.
Confidentiality
PGP can be used to send messages confidentially. For this, PGP combines symmetric-
key encryption and public-key encryption. The message is encrypted using a symmetric
encryption algorithm, which requires a symmetric key. Each symmetric key is used only once
and is also called a session key. The message and its session key are sent to the receiver. The
session key must be sent to the receiver so they know how to decrypt the message, but to protect
it during transmission it is encrypted with the receiver's public key. Only the private key
belonging to the receiver can decrypt the session key.

Digital signatures
PGP supports message authentication and integrity checking. The latter is used to detect
whether a message has been altered since it was completed (the message integrity property) and
the former to determine whether it was actually sent by the person or entity claimed to be the
sender (a digital signature). Because the content is encrypted, any changes in the message will
result in failure of the decryption with the appropriate key. The sender uses PGP to create a
digital signature for the message with either the RSA or DSA algorithms. To do so, PGP
computes a hash (also called a message digest) from the plaintext and then creates the digital
signature from that hash using the sender's private key.
PART C

1. Explain in detail about client server network security.


Client-Server: One remote process acts as a Client and requests some resource from another
application process acting as Server.
In client-server model, any process can act as Server or Client. It is not the type of machine,
size of the machine, or its computing power which makes it server; it is the ability of serving
request that makes a machine a server.

A system can act as Server and Client simultaneously. That is, one process is acting as
Server and another is acting as a client. This may also happen that both client and server
processes reside on the same machine.

Types of holes in client-server network security


Client server network security problems manifest themselves in three ways.
1. Physical Security Holes: These result when individuals gain unauthorized physical access
to a computer.
• A good example would be a public workstation room, where it would be easy for a
wandering hacker to reboot a machine into a single-user mode and tamper with the files,
if, precautions are not taken.
• On the network, this is also a common problem, as hackers gain access to network
systems by guessing passwords of various users.
2. Software Security Holes: These result when a badly written programs or “privileged”
software are “compromised” into doing things they shouldn’t.
3. Inconsistent Usage Holes: These result when a system administrator assembles a
combination of hardware and software such that the system is seriously flawed from a security
point of view. The incompatibility of attempting two unconnected but useful things creates the
security hole. Problems like this are difficult to isolate once a system is set up and running, so
it is better to carefully build the system

2. Explain in detail about Open Systems Interconnection.


The Open System Interconnection (OSI) model defines a networking framework to
implement protocols in seven layers. In the OSI model, control is passed from one layer to the next,
starting at the application layer in one station, and proceeding to the bottom layer, over the channel to
the next station and back up the hierarchy.

The OSI Model Layers

The OSI model takes the task of internetworking and divides that up into what is referred to as
a vertical stack that consists of the following 7 layers:
1. Physical Layer: This layer conveys the bit stream through the network at the electrical,
optical or radio level. It provides the hardware means of sending and receiving data on a carrier
network.
2. Data Link Layer: This layer sets up links across the physical network, putting packets
into network frames. This layer has two sub-layers, the Logical Link Control Layer and the Media
Access Control Layer. Ethernet is the main data link layer in use.
3. Network Layer: This layer handles the addressing and routing of the data (sending it in
the right direction to the right destination on outgoing transmissions and receiving incoming
transmissions at the packet level). IP is the network layer for the Internet.
4. Transport Layer: This layer manages packetization of data, then the delivery of the
packets, including checking for errors in the data once it arrives. On the Internet, TCP and UDP
provide these services for most applications as well.
5. Session Layer: This layer sets up, coordinates and terminates conversations. Services
include authentication and reconnection after an interruption. On the Internet, Transmission
Control Protocol (TCP) and User Datagram Protocol (UDP) provide these services for most
applications.
6. Presentation Layer: This layer is usually part of an operating system (OS) and converts
incoming and outgoing data from one presentation format to another (for example, from clear
text to encrypted text at one end and back to clear text at the other).
7. Application Layer: This is the layer at which communication partners are identified,
network capacity is assessed and that creates a thing to send or opens the thing received.

3. Write short notes on Firewall.


A firewall is a device installed between the internet network of an organization and the
rest of Internet. When a computer is connected to Internet, it can create many problems for
corporate companies. Most companies put a large amount of confidential information online.
Such information should not be disclosed to the unauthorized persons. Second problem is that
the virus, worms and other digital pests can breach the security and can destroy the valuable
data.
The main purpose of a firewall is to separate a secure area from a less secure area and to
control communications between the two. Firewall also controls inbound and outbound
communications on anything from a single machine to an entire network.
On the other hand, Software firewalls, also sometimes called personal firewalls, are
designed to run on a single computer. These are most commonly used on home or small
office computers that have broadband access, which tend to be left on all the time.

A firewall can serve the following functions:


1. Limit Internet access to e-mail only, so that no other types of information can pass between
the intranet and the Internet
2. Control who can telnet into your intranet (a method of logging in remotely
3. Limit what other kinds of traffic can pass between your intranet and the Internet .
A firewall can be simple or complex, depending on how specifically you want to control
your Internet traffic. A simple firewall might require only that you configure the software in the
router that connects your intranet to your ISP. A more complex firewall might be a computer
running UNIX and specialized software.
Firewall systems fall into two categories
• network-level
• application-level.

Network-Level Firewalls
It can be used as packet filter. These firewalls examine only the headers of each packet
of information passing to or from the Internet. The firewall accepts or rejects packets based on
the packet’s sender, receiver, and port. For example, the firewall might allow e-mail and Web
packets to and from any computer on the intranet, but allow telnet (remote login) packets to and
from only selected computers.
Packet filter firewall maintains a filtering table that decides which packets are to be
forwarded or discarded. A packet filter firewall filters at the network or transport layer.

Application-Level Firewalls
These firewalls handle packets for each Internet service separately, usually by running a
program called a proxy server, which accepts e-mail, Web, chat, newsgroup, and other packets
from computers on the intranet, strips off the information that identifies the source of the packet,
and passes it along to the Internet.
When the replies return, the proxy server passes the replies back to the computer that
sent the original message. A proxy server can also log all the packets that pass by, so that you
have a record of who has access to your intranet from the Internet, and vice versa.

4. Describe the Data and message security.


Data and message security Transaction security issues divided as data security and message
security
Data Security
➢ Electronic data security is important at a time when people are considering
banking and other financial transaction by PCs.
➢ One major threat to data security is unauthorized network monitoring also called
packet sniffing.
Example: Telnet, FTP and re login sessions through it gains the information like
username and password.
Message Security
➢ Messaging Security is a program that provides protection for companies
messaging infrastructure.
➢ It protects all the personal message of the company which are related to
company’s vision and mission.
1. Message confidentiality: is need for sensitive data such as credit card numbers, employee
records, government flies, etc. Environment must protect all message traffic (after delivery it
shows removes from environment). Distributed and wireless network valunrate the data
communication.
2. Message and system integrity: it is unauthorized combining of message either by
intermixing, concatenation. Error detection code, check sum, sequence no and encryption
technique are the methods of integrity.
3. Message sender authentication or identification: It verifies the identity of an user
using certain encrypted information transferred from sender to receiver.

5. Write briefly about Digital Signature.

➢ Digital signatures allow us to verify the author, date and time of signatures, authenticate
the message contents. It also includes authentication function for additional capabilities.
Digital signatures are easily transportable, cannot be imitated by someone else, and can
be automatically time-stamped. The ability to ensure that the original signed message
arrived means that the sender cannot easily repudiate it later.

➢ A digital signature should not only be tied to the signing user, but also to the
message.

How Digital Signature works?


➢ A digital signature works by creating a message digest which ranges from between a
128-bit and a 256-bit number which is generated by running the entire message through
a hash algorithm. This generated number is then encrypted with the sender’s private key
and added to the end of the message.

➢ When the recipient receives the message they run the message through the same hash
algorithm and generate the message digest number. They then decrypt the signature
using the senders public key and providing the two numbers match they know the
message is from who it says its from and that is has not been modified.

➢ A digital signature is basically a way to ensure that an electronic document (e-mail,


spreadsheet, text file, etc.) is authentic. Authentic means that we know who created the
document and that it has not been altered in any way since that person created it.
➢ Digital signatures rely on certain types of encryption to ensure authentication.
Encryption is the process of taking all the data that one computer is sending to another
and encoding it into a form that only the other computer will be able to decode.
Authentication is the process of verifying that information is coming from a trusted
source. These two processes work hand in hand for digital signatures.
Applications:

There are several reasons to implement digital signatures to communications:


Authentication
Digital signatures help to authenticate the sources of messages. For example, if a bank’s
branch office sends a message to central office, requesting for change in balance of an account.
If the central office could not authenticate that message is sent from an authorized source, acting
of such request could be a grave mistake.
Integrity
Once the message is signed, any change in the message would invalidate the signature.
Non-repudiation
By this property, any entity that has signed some information cannot at a later time deny
having signed it.
Reliability and Security
Digital signature makes the business environment more reliable. It is very helpful to prevent
forgery and fraud act.
Speed
Digital signature has given speed to the business world. In past time to make sure the
authorized persons transactions were held in person to person and it took more time than
average, but now digital signature has solved this problem.
UNIT-4
PART A

1. What is WWW & Define CPM?


WWW: The World Wide Web consists of information organized into web pages
containing text and graphic images. It contains hypertext links or highlighted keywords and
images that lead to related information.
CPM: Cost per thousand impressions, or "CPM," refers to the cost of displaying an
advertisement one thousand times (known as "impressions"). The CPM pricing structure is used
for some display ads and is an important metric for ecommerce businesses that maintain affiliate
networks.

2. Differentiate EDI with E-mail.


EDI E-mail
EDI is an acronym of Electronic Data E-mail is an acronym of Electronic Mail
Interchange
It is the inter-organizational exchange of It is basically used for sending message
business documentation in structured, electronically to individuals or group of
machine processable form. individuals in an inter or intra office environment.
It requires network to connect them.
It eliminates the paper documents associated It gives users ability to review and respond to
with common business transactions. messages quickly.

3. Expand EDI and State the various applications of EDI.


EDI stands for Electronic Data Interchange. EDI is defined as the computer-to-computer
exchange the business documents in a standard structured format.
Applications of EDI:
International or cross-border trade
Electronic funds transfer
Health care EDI for insurance claims processing
Manufacturing & retail procurement
4. What is hypertext and transparency?
Hypertext: Hypertext is an approach information management in which data are
shared in the network of document connects by links (this link represents relationship between
nodes).
Transparency: Transparency implies that users should be unaware that they are
accessing multiple systems. Transparency is essential for dealing with higher level issues than
physical media
5. Define Electronic payments systems and its types.
Electronic payment systems: EPS is a financial exchange that takes place online
between buyers and sellers. The content of this exchange is usually some form of digital
financial instrument (such as encrypted /credit card numbers, electronic cheques or digital cash)
that is asked by a bank or an intermediary, or by a legal tender.
The various types of electronic payment systems are as follows:
Types:
Electronic cash or e-cash
Electronic cheques
Electronic wallets
Credit cards and Debit cards
Smart cards and Micropayment

PART-B

1. Summarize idea behind hypertext publishing with respect to web


background.
Web provides functionality necessary for e-commerce. The web has become an umbrella
for wide range of concepts and technology that differ markedly in purpose and scope which
include hypertext publishing concept, the universal reader concept and the client server concept.
Hypertext publishing promotes the idea of seamless information world in which all
online information can be accessed and retrieved. In a constant and simple way, hypertext
publishing is a primary application of web interest in hypermedia.

Hypertext versus hypermedia


Hypertext:
Hypertext is an approach information management in which data are shared in the
network of document connects by links (this link represents relationship between nodes).
Hypermedia:
A hypermedia system is made up of nodes (documents) ad links (pointers). A node
generally represents a simple concept and idea. Nodes can contain texts, graphics, audio, video
images etc. nodes are connected to other nodes by links. The movement between nodes is made
by activating links which connect related concept or nodes links can be bidirectional
Benefits of hypermedia:
• Hypermedia documents are much more flexible than conventional documents
• Hypermedia documents offer video sequences animation and even compute programs
• It provides dynamic organization.

2. Draw and explain layered architecture of EDI.


There are four EDI layers: they are,
1. Semantic (or application) layer
2. Standards translation layer
3. Packing (or transport) layer
4. Physical network infrastructure layer
• Semantic layer describes the business application that is driving EDI.
• Standard layer specifies the business form structure so that information can be
exchanged.
• Transport layer correspond too closely with the non electronic activity of sending a
business form from one company A to company B.
• Physical network infrastructure layer simply sending e-mail message or sharing files
through network, or a modem.

3. Give consumer oriented e-commerce applications.


The wide range of applications envisioned from the consumer market place can be
broadly classified into.

Consumer Life style needs Complementary multimedia services

Movies on demand, video cataloging, interactive ads,


Entertainment
multi user games, on-line discussions.
Financial services and
Home banking, financial services, financial news.
information
Home shopping, electronic catalogs, telemedicine,
Essential services
remote diagnostics
Interactive education, multi user games, video
Education and training
conferencing, on-line databases.
• Personal Finance and Home Banking Management:
Home banking services are often classified as
1. Basic Services
2. Intermediate services
3. Advanced services
• Home shopping:
One of the examples often sighted about e-commerce is home shopping which
is widely used and had generated substantial revenue for many companies racing to
develop on-line malls.
1. Television based shopping: TV shopping has evolved over years to provide a wide
variety of goods ranging from clothing, small electronic house ware, jewellery and
computing.
2. Catalog based shopping: The online catalog business consists of brochures, CD
ROM catalogs and online interactive catalogs.
3. Home Entertainment: It is another application area of E-commerce, the most
important services provided under. These are movies on demand, interactive games.

4. What is VAN? Explain.


A van is a combination network that typically exchanges EDI messages among trading partners.
It also provides other services, including holding messages in e-mail boxes interfacing with other
VANs and supporting may telecommunications modes and transfer protocol. The below figure
shows the EDI process.

5. Explain the implementation of EDI software with a neat diagram.


EDI software has four layers as shown in the fig.
Business Applications
Internet format conversion
EDI translator
EDI envelope for documents messaging
Group A Group B

Business Business
Applications Applications
Internet format Internet format
conversion conversion
EDI translator EDI translator
EDI envelope for EDI envelope for
documents documents
messaging messaging

Modem Modem

Private Value Added Network (VAN)


Or
Public Internet

EDI Business Application Layer:


EDI process creates a document in a software application. This software application sends
the document to Edi translator, which automatically reformats the invoice into the agree-on EDI
standard.

EDI Transport Layer:


Translation is an integral part of the overall EDI solution. Translators describe the
relationship between the data elements in the business application and the EDI standard.
Translator ensures that the data are converted into a format that the trading partner can use.
EDI communication Layer:
The communication portion dials the phone number for VAN service provider or other
type of access method being used. Three main types of EDI access methods are available.
Direct dial or modem to modem connection
Limited third party VAN services
Full service third party VANs
PART-C

1. Write an essay about customer oriented applications.


The wide range of applications envisioned from the consumer market place can be
broadly classified into:

Consumer Life style needs Complementary multimedia services

Movies on demand, video cataloging, interactive ads,


Entertainment
multi user games, on-line discussions.
Financial services and
Home banking, financial services, financial news.
information
Home shopping, electronic catalogs, telemedicine,
Essential services
remote diagnostics
Interactive education, multi user games, video
Education and training
conferencing, on-line databases.

Personal Finance and Home Banking Management:


Home banking services are often classified as
1. Basic Services
2. Intermediate services
3. Advanced services

Basic services:
It is related to personal finance i.e. checking savings account statement around
the clock, banking with ATM’s (Automated Teller Machines). Bill payment, balancing
cheque book status of payment or stock payment requested etc.
Intermediate services:
It includes a broader array of financial management services which include non-
banking activities. Also bank activities such as household banking, tax return
preparations etc.
Advanced services:
It includes stock and mutual funds brokerage or trading services such as currency
trading and credit card or debit card management.

Home shopping:
One of the examples often sighted about e-commerce is home shopping which is widely
used and had generated substantial revenue for many companies racing to develop on-line malls.
The malls will enable a customer to enter an online store look at products, try on computerized
clothes, see a reflection in a digital mirror and purchase with overnight delivery against credit
card billing. The exact operating method of these services has yet to be determined, but the
retailers are well aware of the potential opened up by the ability to transmit huge amounts of
digital information into home and to provide interactive control to the shopper.
1. Television based shopping: TV shopping has evolved over years to provide a wide variety
of goods ranging from clothing, small electronic house ware, jewellery and computing.
2. Catalog based shopping: The online catalog business consists of brochures, CD ROM
catalogs and online interactive catalogs. Most online catalogs are some form of electronic
brochure. Electronic brochures are multimedia replacement for direct mail, paper & brochures
used in the business to business marketing. Basically electronic catalog contains highly
interactive programs using still images, graphics, animation, sound, text & data. One of the
disadvantages of this catalog is its prohibitive cost.
3. Home Entertainment: It is another application area of E-commerce, the most important
services provided under. These are movies on demand, interactive games. The online gaming
industry in turn parallels the TV industry where the customer is primarily interested in good
quality programming & is not faithful to any one network. In the entire home entertainment area,
the key element is the notion of customer control under programming entertainment on demand
as expected to give each viewer total control over what, when and where to watch. In addition
to game technology we also witness the emerging services of entertainment support function
such as on screen catalogues, TV guide that inform users what is on TV.

2. Discuss the architecture framework for e-commerce.


Architectural framework of e-commerce means the synthesizing of various existing resources
like DBMS, data repository, computer languages, software agent-based transactions, monitors of
communication protocols to facilitate the integration of data and software for better applications.
The architectural framework for e-commerce consists of six layers of functionality or services as follows:
• Application services.
• Brokerage services, data or transaction management.
• Interface and support layers.
• Secure messaging, security and electronic document interchange.
• Middleware and structured document interchange, and
• Network infrastructure and the basic communication services.
Applications
In the application layer services of e-commerce, it is decided that what type of e-commerce
application is going to be implemented. There are three types of distinguished e-commerce applications
i.e., consumer to business application, business-to-business application.
Information Brokerage and Management Layer
This layer is rapidly becoming necessary in dealing with the voluminous amounts of information on
the networks. This layer works as an intermediary who provides service integration between customers
and information providers, given some constraint such as low price, fast services or profit maximization
for a client.
Interface and Support Services
The third layer of the architectural framework is interface layer. This layer provides interface for e-
commerce applications. Interactive catalogs and directory support services are the examples of this layer.
Interactive catalogs are the customized interface to customer applications such as home shopping .
Interactive catalogs are very similar to the paper-based catalog. The only difference between the
interactive catalog and paper-based catalog is that the first one has the additional features such as use of
graphics and video to make the advertising more attractive.
Secure Messaging Layer
In any business, electronic messaging is an important issue. The commonly used messaging systems
like phone, fax and courier services have certain problems like in the case of phone if the phone line is
dead or somehow the number is wrong, you are not able to deliver the urgent messages.

Middleware services
The enormous growth of networks, client server technology and all other forms of communicating
between/among unlike platforms is the reason for the invention of middleware services. The middleware
services are used to integrate the diversified software programs and make them talk to one another.
Network Infrastructure
We know that the effective and efficient linkage between the customer and the supplier is a
precondition for e-commerce. For this a network infrastructure is required.

3. Discuss the Electronic Payments Systems.


Electronic payment systems are proliferating in banking, retail, health care, on-line markets,
and even government—in fact, anywhere money needs to change hands.
• Organizations are motivated by the need to deliver products and services more cost
effectively and to provide a higher quality of service to customers.
• The emerging electronic payment technology labeled electronic funds transfer (EFT).
• EFT is defined as “any transfer of funds initiated through an electronic terminal, telephonic
instrument, or computer or magnetic tape so as to order, instruct, or authorize a financial
institution EFT can be segmented into three broad categories:
• Banking and financial payments – Large-scale or wholesale payments (e.g., bank-to-bank
transfer) – Small-scale or retail payments (e.g., automated teller machines) – Home banking
(e.g., bill payment)
• Retailing payments – Credit Cards (e.g., VISA or MasterCard) – Private label credit/debit
cards (e.g., J.C. Penney Card) – Charge Cards (e.g., American Express
• On-line electronic commerce payments –
1. Token-based payment systems
• Electronic cash (e.g., DigiCash) • Electronic checks (e.g., NetCheque)
• Smart cards or debit cards (e.g., Mondex Electronic Currency Card)) –
2. Credit card-based payments systems
• Encrypted Credit Cards (e.g., World Wide Web form-based encryption)
• Third-party authorization numbers (e.g., First Virtual)

4. Expand and Explain EDI.


Electronic Data Interchange (EDI) - interposes communication of business information
in standardized electronic form. Prior to EDI, business depended on postal and phone systems
that restricted communication to those few hours of the workday that overlap between time
zones.
Why EDI?
• Reduction in transaction costs
• Foster closer relationships between trading partners EDI & Electronic Commerce
• Electronic commerce includes EDI & much more
• EDI forges boundary less relationships by improving interchange of information
between trading partners, suppliers, & customers.
EDI semantic layer:
• Describes the business application
• Procurement example – Requests for quotes – Price quotes – Purchase orders –
Acknowledgments – Invoices
• Specific to company & software used Standards translation:
• Specifies business form structure so that information can be exchanged
• Two competing standards – American National Standards Institute (ANSI) X12 –
EDIFACT developed by UN/ECE, Working Party for the Facilitation of International
Trade Procedures EDI transport layer
• How the business form is sent, e.g. post, UPS, fax
• Increasingly, e-mail is the carrier • Differentiating EDI from e-mail – Emphasis on
automation – EDI has certain legal status Physical network infrastructure layer
• Dial-up lines, Internet, value-added network, etc. Information flow with EDI:
1. Buyer sends purchase order to seller computer
2. Seller sends purchase order confirmation to buyer
3. Seller sends booking request to transport company
4. Transport company sends booking confirmation to seller
5. Seller sends advance ship notice to buyer
6. Transport company sends status to seller
7. Buyer sends Receipt advice to seller
8. Seller sends invoice to buyer
9. Buyer sends payment to seller
5. Explain briefly about World Wide Web Process.

• WWW or World Wide Web is used for people around the world and it would easily link to other
pieces of information, so that only the most important data would quickly found by a user.
• WWW is a global web in which millions of users are communicating with each other with the
help of computers.
• It is a wide-area hypermedia Information retrieval initiative aiming to give universal access to a
large universe of documents. It is an Internet based computer network that allows users on one
computer to access information stored on another through the world wide network.

Working of the WWW


The WWW works on a Client-server approach. Whenever the user wants to retrieve a webpage, the
www works as follows:
• A user enters the URL of the webpage in the address bar of the web browser.
• The web browser requests the Domain Name Server for the IP address corresponding to
www.yahoo.com.
• After receiving the IP address, the browser sends the request for the webpage to the Internet
using HTTP protocol which specific the way the browser and Web Server communicates. The
Internet Routers send the request to the intended web server.
• Then the web server receives the request using HTTP protocol.It then examines the hard disk or
memory and if the requested file is found it returns it back to the web browser and closes the
Http connection.
• The Web browser then interprets the file and displays the contents of the webpage in the browser
window.

UNIT-5
PART A -4 MARKS
1. Define supply chain management.
Supply chain consists of all parties involved, directly or indirectly in fulfilling a customer
request.

Supply Chain Management (SCM)


Supply chain management (SCM) is the management of a network of interconnected business
involved in the ultimate provision of product and service packages required by end customers.

Supply Chain Management spans all movement and storage of raw materials, work-in-process
inventory, and finished goods from point-of-origin to point-of-consumption.

Supply Chain Management can also refer to supply chain management software which is tools
or modules used in executing supply chain transactions, managing supplier relationships and
controlling associated business processes.
2. Define Global Marketing.
Definition:
The Oxford University Press defines global marketing as “marketing” on a worldwide scale
reconciling or taking commercial advantage of global operational differences, similarities and
opportunities in order to meet global objectives.”

Global marketing:
When a company becomes a global marketer, it views the world as one market and creates
products that will only require weeks to fit into any regional marketplace. Marketing decisions
are made by consulting with marketers in all the countries that will be affected. The goal is to
sell the same thing the same way everywhere. The Four elements of global marketing of
marketing:
Four Elements of Global marketing
1. Product
2. Prize
3. Placement
4. Promotion
3. What is Horizontal Organization?
A horizontal market is a market which meets a given need of a wide variety of industries,
rather than a specific one.
Examples:

In technology, horizontal markets consist of customers that share a common need that
exists in many or all industries.
• For example, customers that need to purchase computer security services or software
exist in such varied industries as finance, healthcare, government, etc.
• Horizontal marketing participants often attempt to meet enough of the different needs
of vertical markets to gain a presence in the vertical market.

4. Define Electronic White Pages and Yellow pages.


White Pages
Analogues to the telephone white pages, the electronic white pages provide services from a static
listing of e-mail addresses to directory assistance. White pages directories, also found within
organizations, are integral to work efficiency. The problems facing organizations are similar to
the problems facing individuals.
A white pages schema is a data model, specifically a logical schema, for organizing the data
contained in entries in a directory service, database, or application, such as an address book.
Yellow Pages
The term Yellow Pages refers to a telephone directory of businesses, categorized according to
the product or service provided.
The traditional term Yellow Pages is now also applied to online directories of businesses.
To avoid the increasing cost of yellow paper, the yellow background of the pages is currently
printed on white paper using ink. Yellow paper is no longer used.

5. State the two types of digital libraries.


A digital library is a collection of documents in organized electronic form, available on the
internet or CD-ROM. Many organizations manage their information through corporate library.
If it provides the architecture to model, map, integrate and information in digital documents is
called digital library. It provides information structures by this organization and workers access
vast amount of data encoded in multimedia formats.
Digital libraries are of two types:

1. Electronic document-based digital libraries


2. Database oriented warehouses.

1. Document digital library: The term document is used to donate all non data records i.e. books,
reports, e-files, videos and audios.

2. Data warehouses: It is a central repository for combining and storing vast amount of data from
different sources. Sources are mainframe database, text reports etc.

6. What is data Warehouse?


A data warehouse (DW or DWH), also known as an enterprise data warehouse (EDW),
is a system used for reporting and data analysis, and is considered a core component of business
intelligence. DWs are central repositories of integrated data from one or more disparate sources.
They store current and historical data in one single place] and are used for creating analytical
reports for knowledge workers throughout the enterprise. Examples of reports could range from
annual and quarterly comparisons and trends to detailed daily sales analysis.
Types of data warehouses
There are four types of data warehouses:
1. Physical data warehouse: It gathers corporate data along with the schemas and the processing
logics. Logical data warehouse: It contains all the Meta data and business rules.
2. Data library: This is sub set of the enterprise wide data warehouse.
Decision support system (DSS): These are the applications but make use of data warehouse.

7. Define SGML and TIFF.


SGML:
Standard Generalized Markup Language (SGML). SGML is a standard for defining
generalized markup languages for documents. Generalized markup is based on two postulates:
Markup should be declarative: it should describe a document's structure and other attributes,
rather than specify the processing to be performed on it. Declarative markup is less likely to
conflict with unforeseen future processing needs and techniques.
Markup should be rigorous so that the techniques available for processing rigorously defined
objects like programs and databases can be used for processing documents as well
TIFF:
Tagged Image File Format, abbreviated TIFF or TIF, is a computer file format for
storing raster graphics images, popular among graphic artists, the publishing industry, and
photographers.
The TIFF format is widely supported by image-manipulation applications, by publishing
and page layout applications, and by scanning, faxing, word processing, optical character
recognition and other applications.
A TIFF file can be identified as a file with a ".tiff" or ".tif" file name suffix.

PART-B

1. Elucidate the characteristics of supply chain management in e-


commerce.
In electronic commerce, supply chain management has the following characteristics:
• The ability to manage information not only within a company but across industries and
enterprises.
• A centralized global business and management strategy with flawless local execution.
• A reconfiguration of the supply chain management into high performance teams going from
the shop floor to senior management.
• An ability to saw raw material from anywhere in the world.

2. Elucidate the structure of electronic commerce catalogues.


• An electronic catalogue is an online publication, that is to say a graphic interface -generally
an html page in which the products and services offered by a company are showed. Digital
catalogues can store great quantities of items, which can be organized and classified into
different categories for users to search in a more rapid and effective way.
• There are different types of catalogues according to their functions. The simplest catalogues
show only descriptions of the products and price lists, and do not enjoy a purchase and
payment online method. Others have shopping carts, order forms and offer payment methods.
The amount of functions an online catalogue has will determine the price of its development.
• The main aims of e-catalogues are to advertise, to sell, to distribute, and to draw the
customer’s attention. They are the digital representation of a company and a powerful e-
commerce tool. In the e-commerce world we find business-consumer transactions and
business to business transactions. In this way, e-catalogues are excellent communication tools
between a company and its client, suppliers or other companies. For all these reasons,
catalogues became a marketing tool used everyday by different types of organizations.
• There are different types of electronic catalogues according to the way they appear on the
Internet. Retailer’s e-catalogues are generally independent pages on the Internet, and their
aim is to promote and sell products and services. But, big companies generally include their
e-catalogues on their general websites. Generally, they are not used as tools for selling but as
means to promote products and services and to draw the customer’s attention. There are also
malls, that is to say e-catalogue groups –ebay.com for example. In this case, an Internet
provider gathers different companies’ digital publications, showing a great number of offers
made by the users.

3. What are the models of supply chain? Explain.


The 6 supply chain models are:
• The continuous flow models
• The fast chain models
• The efficient chain models
• The custom configured model
• The agile model
• The flexible model
1. The continuous flow model for supply offers stability in high demand situations that vary
very little.
2. The fast chain model is ideal for manufacturers that manufacture products that are
trendy with short life cycles.
3. The efficient chain model is a model that is best for businesses that are in very
competitive markets and where end to end efficiency is the premium goal.
4. The custom configured models focus on providing custom configurations especially
during assembly and production.
5. The agile model is primarily a method of supply chain management that is ideal for
businesses that deal in specialty order items.
6. The flexible model gives businesses the freedom to meet high demand peaks and
manage long periods of low volume movement.

4. Discuss the various types of digital documents.


Digital Document Management Issues and Concerns

Ad hoc documents: Letters, finance reports, manuals are called ad hoc documents, which are
prepared by managers &professionals.
Process-specific documents: invoices and purchase orders which are created, constructed and
distributed by support personnel. These are form based.
Knowledge-oriented documents: these are technical documents, catalogs of product
information, and design documents.

Types of Digital Documents


Four types of digital documents are:
Structuring applications around a document interface
Structuring interlinked textual & multimedia Documents.
Structuring and encoding information using document-encoding standards
Scanning documents for storage and faxing.
Document Imaging
➢ Document imaging emulates microfiche and microfilm.
➢ An imaging system passes appear document through a scanner that renders it digital and
then stores the digital data as a bit-mapped image of document.
➢ The problem with the imaging approach is that the output contains only images not text.

The following imaging standards are prominently used:

➢ TIFF (tag image file format): format for interchange of bit-mapped images.
➢ ITU-TSS (international telecommunication union-telecommunication standardization
sector) Group IV T.6 facsimile: this standard is used for compression and exchange of
bit-mapped files.

Structured Documents
➢ A structured document provides clear description of document content.
➢ Structured documents apply data-base structuring capabilities to individual documents
and document collections.

Hyper Text Documents


➢ Hyper text is a way of making document-based information more mobile.
➢ Information in enterprises is seldom located on server but is distributed throughout the
organization.

Active Documents
Active document represents what is known as document oriented computing.

5. Write about Document based work flow.


The following focus activities make up the document based framework flow:

• Document modeling: it defines the structure and processes the document


• Transformation :creates modules for capturing and validating
• Synthesizing: create value-added information from the combination of two or more
documents
• Business modeling: defines the structure and processes of the business environment.

PART-C
1. Compare and contrast push based supply chain vs. pull based supply
Chain.
The major differences between push and pull view in supply chain are as follows:
• In the push system, the implementation begins in anticipation of customer order whereas
in the pull system, the implementation starts as a result of customer’s order.
• In the push system, there is an uncertainty in demand whereas in pull system, the demand
remains certain.
• The push system is a speculative process whereas the pull system is a reactive process.
• The level of complexity is high in the push system whereas it is low in the pull system.
• The push based system concentrates on resources allocation whereas the pull system
stresses on responsiveness.
• The push system has a long lead time whereas the pull system has a short lead time.
• The push system assists in supply chain planning whereas the pull system facilitates in
order completion.
To conclude, the push based supply chain integrations works with an objective of
minimizing the cost whereas the pull based supply chain integration works with an objective to
maximize the services it provides.
Push & Pull System
Mostly we find a supply chain as merger of both push and pull systems, where the
medium between the stages of the push-based and the pull-based systems is referred as the push–
pull boundary.
The terms push and pull were framed in logistics and supply chain management, but
these terms are broadly used in the field of marketing as well as in the hotel distribution business.

To present an example, Wal-Mart implements the push vs. pull strategy. A push and pull system
in business represents the shipment of a product or information between two subjects. Generally,
the consumers use pull system in the markets for the goods or information they demand for their
requirements whereas the merchants or suppliers use the push system towards the consumers.
In supply chains, all the levels or stages function actively for the push and the pull system. The
production in push system depends on the demand predicted and production in pull system
depends on absolute or consumed demand.
The medium between these two levels is referred as the push–pull boundary or decoupling point.
Generally, this strategy is recommended for products where uncertainty in demand is high.
Further, economies of scale play a crucial role in minimizing production and/or delivery costs.
For example, the furniture industries use the push and pull strategy. Here the production unit
uses the pull-based strategy because it is impossible to make production decisions on the basis
on long term prediction. Meanwhile, the distribution unit needs to enjoy the benefits of economy
of scale so that the shipment cost can be reduced; thus it uses a push-based strategy.

2. List all the digital document types. Explain.

Types of Digital Documents

Four types of digital documents are:

• Structuring applications around a document interface


• Structuring interlinked textual & multimedia Documents.
• Structuring and encoding information using document-encoding standards
• Scanning documents for storage and faxing.

Document Imaging
➢ Document imaging emulates microfiche and microfilm.
➢ An imaging system passes appear document through a scanner that renders it digital and
then stores the digital data as a bit-mapped image of document.
➢ The problem with the imaging approach is that the output contains only images not text.
The following imaging standards are prominently used:
➢ TIFF (tag image file format): format for interchange of bit-mapped images.
➢ ITU-TSS (international telecommunication union-telecommunication standardization
sector) Group IV T.6 facsimile: this standard is used for compression and exchange of bit-
mapped files.

Structured Documents
➢ A structured document provides clear description of document content.
➢ Structured documents apply data-base structuring capabilities to individual documents and
document collections.
Standard for structured documents are:
➢ SGML (Standard Generalization Mark-up Language):
➢ It is an ISO standard for interchange & multi formatting description of text document in
terms of logical structure.

ODA (Office Document Architecture):


It is an ANSI & ISO standard for interchange of compound office documents.ODA specifies
both content & format.

CDA (Compound Document Architecture):


It defines set of rules for content and format .It defines services for compound documents.

RTF (Rich –Text Format):


It is developed by Microsoft for interchanging of desk top documents.

Hyper Text Documents


Hyper text is a way of making document-based information more mobile.
Reasons for mobility of information are:
➢ Information in enterprises is seldom located on server but is distributed throughout the
organization.
➢ Accessing & retrieving large monolithic document is time consuming.
➢ Reuse of document for composing new documents is difficult task.
➢ In this relationships between documents can be represented through hypermedia links i.e.
hyperlinks.

Standards of Hypermedia:
➢ HyTime: it adds time based relationships like synchronization, it is extension of SGML.
➢ HTML: developed by WWW to support distributed hypermedia.
➢ MHEG(multimedia /hypermedia encoding/exporting Group):standard for presenting
objects in multimedia

Active documents
➢ Active document represents what is known as document oriented computing.
➢ Active document provide an interactive interface between documents.
➢ Active documents are especially powerful because they combine composition of
information with the distributed nature of information.
➢ Ex: spreadsheet, word-processing..etc.

3. Corporate digital library is vital for today’s business. Justify.


• A digital library is a library in which collections are stored in digital formats. The
digital content may be stored locally, or accessed remotely via computer networks. A
digital library is a type of information retrieval system.
• It provides the architecture to model, map, integrate, condense and transform scattered
information housed in digital documents.
• Companies can perform more substantive, accurate and consistent analyses using the
digital library as a foundation for decision support system.
Benefits of digital libraries
• No physical boundary
• Round the clock availability
• Multiple accesses
• Structured approach
• Information retrieval
• Preservation and conservation
• Space
• Networking
• Cost
Types of digital libraries
• Document Digital Libraries
• Data Warehouses

1. Document Digital Libraries: It is a distributed network of interlinked information mainly


for electronic publishing.
Types of Digital Documents:
• Active or compound documents
• Distributed hypertext
• Structured documents
• Imaging
Structured Documents: It provides a clear description of document contents. Database
structuring capabilities are applied to individual documents.
Document Imaging: It involves scanning of documents for storage as a bitmap image.
Keywords are entered for indexing and retrieval during scanning.
2. Data Warehouses: These are Central Information repositories for combining and storing
vast amounts of historical and reference data from a number of different sources. It is a
physical separation of an organization’s operational data systems from its decision support
systems.

4. Explain about Electronic White and Yellow Pages.


Electronic white Pages
➢ Analogues to the telephone white pages, the electronic white pages provide services from
a static listing of e-mail addresses to directory assistance.
➢ White pages directories, also found within organizations, are integral to work efficiency.
➢ The problems facing organizations are similar to the problems facing individuals.
➢ A white pages schema is a data model, specifically a logical schema, for organizing the
data contained in entries in a directory service, database, or application, such as an
address book.
➢ A white pages schema typically defines, for each real-world object being represented:
➢ What attributes of that object are to be represented in the entry for that object.
➢ What relationships of that object to other objects are to be represented?
➢ One of the earliest attempts to standardize a white pages schema for electronic mail use
was in X.520 and X.521, part of the X.500 a specification that was derived from the
addressing requirements of X.400.
➢ In a white pages directory, each entry typically represents an individual person that
makes the use of network resources, such as by receiving email or having an account to
log into a system.
➢ In some environments, the schema may also include the representation of organizational
divisions, roles, groups, and devices.
➢ The term is derived from the white pages, the listing of individuals in a telephone
directory, typically sorted by the individual's home location (e.g. city) and then by their
name.
Electronic Yellow Pages
➢ The term Yellow Pages refers to a telephone directory of businesses, categorized
according to the product or service provided.
➢ The traditional term Yellow Pages is now also applied to online directories of businesses.
➢ To avoid the increasing cost of yellow paper, the yellow background of the pages is
currently printed on white paper using ink. Yellow paper is no longer used.
➢ The name and concept of "Yellow Pages" came about in 1883, when a printer in
Cheyenne, Wyoming working on a regular telephone directory ran out of white paper
and used yellow paper instead.
➢ In 1886 Reuben H.Donnelley created the first official yellow pages directory, inventing
an industry.
➢ Today, the expression Yellow Pages is used globally, in both English-speaking and non-
English speaking countries.
➢ In the US, it refers to the category, while in some other countries it is a registered name
and therefore a proper noun.

5. Discuss about Intra organizational E-commerce.


Internal commerce is the application of electronic commerce to processes or operations.
Specifically, we define internal commerce as using methods and pertinent technologies for
supporting internal business processes between individuals, departments, and collaborating
organizations.

Types:

1. Private commerce
2. Public commerce

In a general sense, the term Information System (IS) refers to a system of people, data records
and activities that process the data and information in an organization, and it includes the
organization's manual and automated processes.

In a narrow sense, the term information system (or computer-based information system) refers
to the specific application software that is used to store data records in a computer system and
automates some of the information-processing activities of the organization.
These forces are commanding a rethinking of the importance of the networks-computers and
communications and their role in the better utilization of corporate information in operational
and analytical decision making.

Information architecture (IA) is the art of expressing a model or concept of information used
in activities that require explicit details of complex systems.

Among these activities are library systems, content Management Systems, web development,
user interactions, data base development, programming, technical writing, enterprise
architecture, and critical system software design.

You might also like