Professional Documents
Culture Documents
Mr. Dominic K. Louis (Lecturer, Faculty of Informatics) Ghana Telecom University College
text, images, audio, video) over networks by such means as electrical signals carried over telephone lines, radio waves or satellite transmission apparatus.
A network is a set of devices that can directly access
CLASSIFICATION OF NETWORKS
Network Classification
Communication Media
Types of Technology
Types of Ownership
Geographic Scope
Network Topology
COMMUNICATION MEDIA
Information may only be transmitted by voice,
videos, data, e-mail, fax and multimedia means (e.g. Voice + data + text +image).
These may be sub-categorised as:
Twisted pair Coaxial cable Fibre optic Wireless technologies
IS/IT Procurement - March 2012 4
Communications Media
Twisted-pair wire:
Ordinary telephone wire Copper wire twisted into
pairs
Transmission speeds range
from 2 million bits per second (unshielded) to 100 million bits (shielded)
Source: Phil Degginger/Getty Images.
Communications Media
Coaxial cable:
Sturdy copper or
from 200 million bits to over 500 million bits per second
Source: Ryan McVay/Getty Images.
Communications Media
Fiber-optic cable: One or more hair-thin filaments of glass fiber wrapped in a protective jacket
Transmission speeds ranges
Wireless Technologies
Terrestrial microwave Earthbound microwave systems that transmit high-
speed radio signals in a line-of-sight path Between relay systems spaced approximately 30-miles apart
Communications satellites Satellite serves as relay stations for communications
Wireless Technologies
Cellular and PCS telephone and pager systems
Divide the geographic area into small areas or cells Each cell has transmitter or radio relay antenna to send
Bluetooth
Short-range wireless technology To connect PC to peripherals such as printer
IS/IT Procurement - March 2012 9
TYPE OF TECHNOLOGY
The dominant technology for a particular
10
TYPE OF OWNERSHIP
Networks may be Public or Private, open or closed. The worlds largest Public network is the Internet,
an ever growing number of networks and users in almost every country in the world.
The internet was created in the 1960s by the US military-
industrial complex to enable government researchers working on military projects to share computer files.
IS/IT Procurement - March 2012 11
research or political, educational or business purposes. 4. To communicate with other computers either one at a time (instant message) or many at once ( chat rooms or discussions groups). etc.
IS/IT Procurement - March 2012 12
13
14
documents which, in turn, can provide links to further documents.The web is the most common ways for business to establish a presence on the internet.
Private networks are those in which the organisation
typically runs its own private data-switching equipments, as well as modems, multipliers and other circuit interface devices.
IS/IT Procurement - March 2012 15
that operate like an internal internet. Such a system may allow other links in the supply chain to communicate in procurement and vice versa. Intranets
uses Internet technologies (such asWeb browsers and servers,
TCP/IP protocols, HTML, etc.) to provide an Internet-like environment within the organization for information sharing, communications, collaboration and support of business processes Protected by security measures Can be accessed by authorized users through the Internet
IS/IT Procurement - March 2012 16
partners
Extranet is the term used for an internet that has been
extended to include access to or from selected external organisation such as customers or suppliers thus making possible collaborative inter-enterprise sharing of information and communication.
IS/IT Procurement - March 2012 17
Extranet Uses
18
transmission schemes with other enterprises who are regular trading partners.
Alternatively organisations use a third party value added
collected in an electronic mailbox provided by the value added network (VAN) service provider and owned by the user.
IS/IT Procurement - March 2012 19
by theVAN services to other electronic mailboxes owned by intended recipients where they are held until the receiving organisation asks for them.
This process provides the opportunity for transmission
20
GEOGRAPHIC SCOPE
Networks are categorised as LANS,WANS,
communication networks linking personal computers and workstations or telephones within a limited geographical area such as a building or a group of buildings within a distance of one or two miles.
IS/IT Procurement - March 2012 21
geographical area such as whole country.The Internet links together hundreds of computerWANs. Most telephone systems are WANs.
23
speed or telephone networks designed to link two or more LANs within a limited geographical regions as the various departments of a local authority.
24
backbone but relies on firewalls, encryption and other security. In other words its a pipe traveling through the Internet
NETWORK TOPOLOGY
In this context, topology relates to the inter
connection or organisation of computers in a network. It may also be defined as the physical configuration of the various nodes and the manner in which they are linked. A node is a point to which a group of devices such as microcomputers or terminals and transmission lines connect.
IS/IT Procurement - March 2012 26
or token ring.
A star network means that the arrangement of the
computer that holds databases and programs for many pc work stations or terminals which are called clients).
IS/IT Procurement - March 2012 27
28
the hub fails then all the computers on that hub fail.
If however, a line from the hub to the
stays up.
IS/IT Procurement - March 2012 29
computers communicate through the passage down the centre in the bus as shown on slide 63.
The disadvantage is that cable breaks can disable the
whole network.
IS/IT Procurement - March 2012 30
arranged in a ring as shown on slide 63. With this there is no central server computers communicate by passing an electronic token or signal from computer to computer until the information reaches the destination computer that matches the address on the data. Again a break on the ring can disable the entire network.
IS/IT Procurement - March 2012 31
topologies.
Because each topology has its own strengths and weaknesses
to change the role of the purchasing department from a transaction-oriented function to a more managerial function focused on establishing and maintaining relationships
Growth rate of e-procurement revised downwards
between organisations computer systems for the convenience of sharing information, and sending/receiving documents.
The key operational function is that EDI comprises
The EDI software translates the order from the internal format to the ISO standard 850 Procurement Order document format.
IS/IT Procurement - March 2012 35
Company A sends 850 Procurement Order documents to company B over a third party value added network or encrypted in EDIFACT format over the Internet. Company B receives the 850 Procurement Order document and translates it from EDI to its proprietary format. (Typically Company B will send an acknowledgement to Company A).
IS/IT Procurement - March 2012 36
d)
Advantages of EDI
1) EDI effectively puts the product back on the shelf
used by buyers and sellers in commercial transactions, by standard electronic computers often without the need for human intervention.
IS/IT Procurement - March 2012 37
Advantages of EDIcont.
One of the best examples in the way an EDI works is the EPOS at some supermarkets.
When a product is procured, the checkout operator scans
the bar code on its label which automatically registers the price on the cash till. That same signal also triggers a computer process which: reorders the items from the manufactures, sets off a production cycle, arranges invoicing, payment and transportation of the new order.
IS/IT Procurement - March 2012 38
Advantages of EDIcont.
2)
EDI promotes a reduction in lead times through buyers and suppliers working together in a real-time environment.
For instance, Armstrong and Jackson provides a
real-life example of pre and post-EDI lead times in which the latter shows reduction of 8 days to acknowledge the order and 5 days to deliver it.
IS/IT Procurement - March 2012 39
Advantages of EDIcont.
Day 1: Order prepared and authorised electronically posted into EDI service. Day 2: Order taken from EDI service by recipient and put straight into order system, acknowledgement created automatically and sent to EDI service. Day 3: Manufacturing process begins (7 DAYS), acknowledgement received by originator and processed automatically. Day 9: Manufacturing complete. Day 11: Delivery complete.
IS/IT Procurement - March 2012 40
Advantages of EDIcont.
3) 4)
Reduction in cost of inventory and release of working capital. Promotion of such strategies as Just-in-Time (JIT) as a consequence of points 2 and 3 above. Better customer service.
5)
41
Advantages of EDIcont.
6)
Facilitation of global purchasing through international standards, e.g. EDIFACT which is compatible with most equipment in most countries.
For example, in 1970 SITPRO (Simplification of International Trade Procedures) board was established to guide, stimulate and assist the rationalisation of international trade procedures and the documentation and information flows associated with them. SITPRO worked with the British Standards Institution (BSI) in connection 42 with EDI standards.
Advantages of EDIcont.
7) Facilitation of invoice payments by the computer-
to-computer transfer of money which eliminates the need for the preparation and posting of cheques.
8) Promote the integration of functions, particularly
and techniques of implementation, software maintenance, manpower and participant training and how to promote systems and applications integration.
Consider the organizational and process changes involved.
IS/IT Procurement - March 2012 44
data is being processed and reprocessed the more there is to save time and money.
Potential EDI users should therefore calculate
the cost per transaction. If it is cheaper to fax or manually perform the task the buyer probably lacks the volume to invest in EDI.
IS/IT Procurement - March 2012 45
indicators of a reasonable opportunity for the application of EDI in the procurement environment:
A high volume of paperwork transaction documents. Numerous suppliers. A long internal administration lead time associated with the
procurement cycle. A desire for personnel reductions, new hire avoidance, or both. A need to increase the professionalism of procurement personnel.
IS/IT Procurement - March 2012 46
LIMITATIONS of EDI
Historically the two principal limitations of EDI relate to cost and inflexibility. Cost EDI was, and still is, an expensive option given
that, until recently, organisations sent all EDI transactions over aVAN that had high set-up and running costs often on the basis of per thousand characters transmitted.
The scope of EDI was also internationally limited to ensure
controlled activity within a closed-door environment.The heavy overhead associated with EDI infrastructure was prohibitive for many small and medium sized enterprises.
IS/IT Procurement - March 2012 47
LIMITATIONS of EDI..cont.
Internet and Extranet approaches can enable small businesses to
link into secure EDI networks at minimal cost.The Internet pricing model of flat monthly rates have forced most of the VAN networks to lower their pricing structures. A new market shift is also under way in which organisations are moving from proprietary technology to Extranet solutions. A comparison of EDI and extranet technology is shown on the next slide Small businesses using the internet can compete on a level playing field with large competitors, expand globally and improve their trading partner relationships.
IS/IT Procurement - March 2012 48
Extranets
Package solutions that leverage and extend existing internet. Inexpensive and fast internet connections. Web browser, support EDI protocols as well as many other open Standards Supports real-time buying and selling, allowing for tighter and more proactive planning
49
Restricted to only the largest vendors who can support the EDI infrastructure.
transmitting data most suited to straightforward business transactions such as the placement of procured orders for known requirements. It is not suitable for transactions requiring tight coupling and coordination such as the combination of several possible procured alternatives or supply chain optimisation. Unlike human beings computers are poor at interpreting unstructured data and cannot derive useful information from web documents that are not predefinedMarch 2012permanent. and 50 IS/IT Procurement -
INFLEXIBILITYcontd
The standard document language used to create
looks, it cannot describe data.(i.e. HTML can state what items a supplier can offer, it cannot describe them).
INFLEXIBILITY..contd
XML(Extensible Markup Language) approved by
theWorld WideWeb Consortium (w3c) in 1998 is an attempt to solve the HTML problem and provide a foundation for a whole new way of communicating across the Internet.
The major difference between EDI and XML is
INFLEXIBILITY..contd
XML is a language and its success in any
business will always depend on how its being used by a given application.
As a language, XML provides a basic syntax
that can be used to share information between many types of computers, different applications and organizations.
IS/IT Procurement - March 2012 53
INFLEXIBILITY..contd
XML can describe (as distinct from display) data. For example , it enables the procurer to understand in detail what a supply has to offer and ensures that a procurement order is accurate and describes what the procurer requires. XML provides a direct route between the procurer
and supplier irrespective of the size of either what was unavailable with EDI. Its argued that when widely used, XML will result in IS/IT Procurement - Marchof EDI. the demise 2012 54
INFLEXIBILITY..contd
What XML will do- and is already doing- is to force EDI
solution providers to consider how they need to reengineer the EDI business model to fit into a more flexible framework and also how to leverage the benefits of the Internet.
As far as MRO (maintenance, repair and operating)
supplies e- procurement is concerned, XML will become an important element and it will be necessary for both purchasers and suppliers to consider how their applications will work within the XML framework.
IS/IT Procurement - March 2012 55
more organizations include. Encrypted e-mails (which are very cost effective for businesses)
Orders can be collected securely online and put into existing in-house
systems which automatically e-mail suppliers when stock value reach lower limits.
Cellular phones and PDAs owing to changing technology.
Until recently PCs were the Internets access device of choice, but preferred substitutes such as cellular phones and PDAs are outselling PCs several times over as IBM publication states. 56
IS/IT Procurement - March 2012
a world wide web site that provides a major starting point for web users. (i.e. an entry point or homepage for accessing Internet content and services).
Portals may be Horizontal or Vertical.
Typical horizontal or consumer portals include yahoo, excite,
Lycos, and Microsoft network. Vertical or Enterprise Information Portals (EIPs) provide information to a particular group or interest who access the customised or personalised portal. As Pimblett states.
IS/IT Procurement - March 2012 57
58
of applications to derive information from databases and other information repositories that were previously unavailable to managers or sales personnel in the field.
In a front-to-back scenario, portals allow a greater number of
points of entry for supply of databases and enterprise resource planning systems.
IS/IT Procurement - March 2012 59
reason why many organizations have been slow to adopt e-business approaches.
IS/IT Procurement - March 2012 60
orders, credit card numbers) sent by third parties Loss of messages. Messages may be read by persons other than the intended recipient. A third party may pretend to be one of the original two parties. One of the parties may claim never to have sent or received a particular message.
IS/IT Procurement - March 2012 61
the act of encoding information in such a way that only the holder of a secret password can decode and read it. Encryption is based on an algorithm or mathematical formula that can transform unintelligible text, and a key (symmetric encryption) or pair of keys ( asymmetric encryption) to decrypt the text. Certification authorities are entities that certify signatures and provide proof that a signature is valid.
IS/IT Procurement - March 2012 62
63
64
consult ISO and BS specifications 17799 and 7799 in which information security is defined as maintaining: Confidentiality- personal and business sensitive confidential information is protected from unauthorised disclosure, loss, damage or use.
IS/IT Procurement - March 2012 66
alteration and is reliable. Other useful sources of information on the security and legal aspects of e-business include relevant publications of the UK government and the European Commission.
IS/IT Procurement - March 2012 67
process, it expands its capability for delivery and increased business value via information.
Understanding how to evolve to an intelligent
enterprise means the organization has comprehended the steps along the way.
Organizations need to recognise where they are and
technology (IT) and information system (IS) differently. Organisations are at varying levels of IT/IS evolution and maturity, and at the same time the technology continues to move forward. The key to using information successfully is not in how far the organisation has evolved but how it is evolving. The intelligent enterprise shows sound judgement and rationality in planning a practical approach to delivering solutions that meet the long-term information need of 71 the organisation.
..cont
purchasing systems should relate to these basic purpose. However, if a buyer is involved in specifying an upgrade or a new system, there are several other costs and measures that should be considered:
o IT software licence fees o Database integration costs- set-up and or integration
with existing systems o Installation costs o Training costs, including software maintenance and upgrade time and costs.
73
businesses The product may or may not work as advertised or may not provide the level and quality of work that may be desired. There is a need to consider as many of the potential issues as possible. The supplier may not be financially stable enough to stay till the live of the technology. IT/IS should provide a technical solution to organisations challenges but not to create more problems.
IS/IT Procurement - March 2012 74
Evolution of purchasing
Stage 1. Product-Centered Characteristics Concerned with the 5 rights Concentrate exclusively on the purchasing of tangible products and outcome dimensions by means of which this product can be described and mentioned Moves beyond a concern with outcomes and begins to measure the process via which the outcome is delivered. Expand to include purchaser-supplier relationships and how these might be used to manage the quality and nature of the supplier. Focused on best product management methods. Employs an integrated methodology to manage relationships, processes and outcomes. Jointly resources this methodology with suppliers
75
Evolution of purchasing
by Reck, R.F and Long B. (1998)
Stage 1. Passive Characteristics Purchasing reacts to request by functions and has no strategic direction Low purchasing visibility Supplier selection based on prices and availability Purchasing function adopts latest techniques but strategy is independent of firms strategy Performance based on cost reduction Purchasing supports firms competitive strategy Purchasing included in sales proposal teams Suppliers considered as a resource Mkts are analyzed and monitored Fully integrated into firms strategy Use of cross functional teams Performance measurement of purchasing
76
2. Independent
3. Supportive
4. Integrative
77
78
Five rights
These objectives aim at securing goods and services:
1. 2. 3. 4. 5.
of the right quality, at the right time, delivered to the right place, in the right quantity, at the right price
Others are : 6. at the right terms, and 7. from the right source.
IS/IT Procurement - March 2012 79
Procurement Process
Identifying the need Determining the quality requirements, Determining the quantity requirements, Solicitation of bids/quotes Selecting the sources of supply, Negotiating the terms of purchase and delivery, Issuing the formal purchase orders/procurement contracts, Monitoring and follow-up of the contract, Reviewing performance
IS/IT Procurement - March 2012
80
Procurement Process..cont
Identification of Need This need is normally identified by the function Together with the procurement and supply function develop a clear specification which will provide potential suppliers with adequate information.
81
Procurement Processcont
Quality May be defined as the suitability of the product for its intended use.
The procurement department should have wide
82
Quality cont.
Quality may be defined as fitness for
83
- detail benefits in measurable form - provide critical accountability and monitoring -distinguish mandatory from desirable features - help manage priorities -build in transaction, flexibility and scalability - precede organisational requirement analysis - Define Statement of work and evaluation criteria
IS/IT Procurement - March 2012 84
business case Changes during actual procurement process are very expensive, get it right first time Introduce to IT/IS procurement contract management Laws and regulations Governing IT/IS must be covered extensively Supplier selection must include the undertaking due diligence, Negotiation before awarding
85
IT/IS OPTIONS
Three options in order of preference:
1. 2.
Buy a package on the market Get external supplier to develop what the organisation Develop it in house
86
3.