0% found this document useful (0 votes)
51 views

What Is Adsl Technology?: E Commerce

Uploaded by

Soham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

What Is Adsl Technology?: E Commerce

Uploaded by

Soham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

E Commerce

What is ADSL TECHNOLOGY?


➢ Short for Asymmetric digital subscriber line (ADSL).
➢ ADSL is a type of DSL broadband communications technology used for connecting to the
Internet.
➢ ADSL allows more data to be sent over existing copper telephone lines (POTS), when compared
to traditional modem lines.
➢ ADSL (Asymmetric Digital Subscriber Line) is a technology for transmitting digital information at
a high bandwidth on existing phone lines to homes and businesses.

Security on web
➢ Security on web means security on internate.
➢ TCP/IP can be made secure with the help of cryptographic methods and protocols that have
been developed for securing communications on the Internet. These protocols include SSL and
TLS for web traffic, PGP (PGP (short for Pretty Good Privacy) is a public key encryption program
originally written by Phil Zimmermann in 1991.)For email, and IPSec for the network layer security.

What is web crawling


➢ A Web crawler is a computer program that browses the World Wide Web in a
methodical (in proper manner), automated manner or in an orderly fashion. This
process is called Web crawling or spidering.
➢ Use Web crawling as a means of providing up-to-date data.
➢ Web crawlers are mainly used to create a copy of all the visited pages for later
processing by a search engine and that will index the downloaded pages to provide fast
searches.
➢ Crawlers can also be used for automating maintenance tasks on a Web site, such as
checking links or validating HTML code.

Difference between active and passive websites

'Active' vs. 'Passive' Websites

Characteristics of a "Passive" Website:

• Posting Information about a Company: Courts have held that merely posting
information about a company, i.e., using the website as an "advertising tool," does not
subject that business to personal jurisdiction.
• Accepting Customers' Names and Addresses: The Ninth Circuit has recognized that a
website that is limited to taking customers' names and addresses is not sufficiently
interactive to confer jurisdiction over the business operating that site.

Rajesh Savaliya Page 1


E Commerce

• Limited Use of an Intermediary Seller (Such as on-line Auctions): The Ninth Circuit has
held that sellers of products via on-line auctions do not subject themselves to
jurisdiction in the state where the goods were sold. It has concluded that the limited of
use of auction sites does not confer jurisdiction because sellers do not know where the
winning bidder will be located and thus are not directing their activity at a specific state.

Characteristics of an "Active" Website:

• Fully Interactive Sites that Take Frequent Orders from Within the Jurisdiction: The
clearest example of an active site is one that fully incorporates on-line ordering and
actively does business in the forum state. The Ninth Circuit has had no difficulty in
determining that websites of major retailers subject those companies to jurisdiction.
• Advertising Website to Potential Customers in the Forum State: A business that
advertises its website within a jurisdiction is considered to be actively marketing its site
and thus subjecting itself to the laws of the jurisdiction where it advertises.
• Frequent Use of an Intermediary Seller (Such as on-line Auctions): Without deciding
the issue, the Ninth Circuit noted that frequent use of an intermediary seller might
confer jurisdiction because frequent use is similar to directed sales.

What is electronic clearing services (ECS)

➢ ECS is an electronic form of funds transfer from one bank account to another.
➢ It can be used by institutions for making payments such as distribution of dividend interest,
salary, and pension, among others.

➢ It can also be used to pay bills and other charges such as telephone, electricity, water or for
making equated monthly installments payments on loans as well as SIP investments. ECS can be
used for both credit and debit purposes.

Types of ECS

There are two types of ECS called ECS (Credit) and ECS (Debit).

Rajesh Savaliya Page 2


E Commerce

ECS (Credit) is used for affording credit to a large number of beneficiaries by raising a
single debit to an account, such as dividend, interest or salary payment.

ECS (Debit) is used for raising debits to a number of accounts of consumers/ account
holders for crediting a particular institution.

Working of the ECS Credit system?

ECS payments can be initiated by any institution (called ECS user) who have to make bulk
or repetitive payments to a number of beneficiaries. They can initiate the transactions
after registering themselves with an approved clearing house. ECS users have also to
obtain the permission as also the account information of the beneficiary for participating
the ECS clearings.

The ECS user's bank is called as the sponsor bank under the scheme and the ECS
beneficiary account holder is called the destination account holder. The destination
account holder's bank or the beneficiary's bank is called the destination bank.

The beneficiaries of the regular or repetitive payments can also request the paying
institution to make use of the ECS (Credit) mechanism for effecting payment.

Working of the ECS Debit system?

It is a scheme under which an account holder with a bank can authorize an ECS
user to recover an amount at a prescribed frequency by raising a debit in his
account. The ECS user has to collect an authorization which is called ECS mandate
for raising such debits. These mandates have to be endorsed by the bank branch
maintaining the account.

Any ECS user desirous of participating in the scheme has to register with an
approved clearing house. The list of approved clearing houses is available at RBI
web-site www.rbi.org.in. He should also collect the mandate (needed information

Rajesh Savaliya Page 3


E Commerce

or permission) forms from the participating destination account holders, with


bank's acknowledgement.

The ECS user has to submit the data in specified form through the sponsor bank to
the clearing house. The clearing house would pass on the debit to the destination
account holder through the clearing system and credit the sponsor bank's account
for onward crediting the ECS user. All the unprocessed debits have to be returned
to the sponsor bank within the time frame specified. Banks will treat the electronic
instructions received through the clearing system.

Security Mechanisms
We use several layers of proven security technologies and processes to provide you with secure
online access to your accounts and information. These are continuously evaluated and updated
by our experts to ensure that we protect you and your information. These include:

• Secure Socket Layer (SSL) Encryption


• Authentication
• Firewalls
• Computer Anti-Virus Protection
• Data Integrity
• Ensuring Your Online Safety

Secure Socket Layer (SSL) Encryption


When you successfully login to Online Banking or another secure RBC website using an
authentic user ID and password, our web servers will establish a secure socket layer
(SSL) connection with your computer. This allows you to communicate with us privately
and prevents other computers from seeing anything that you are transacting – so you
can conduct online business with us safely. SSL provides 128-bit encrypted security so
that sensitive information sent over the Internet during online transactions remains
confidential.

Authentication
To protect our users, we provide secure private websites for any business that users
conduct with us. Users login to these sites using a valid client number or username and
a password. Users are required to create their own passwords, which should be kept
strictly confidential so that no one else can login to their accounts.

Firewalls

Rajesh Savaliya Page 4


E Commerce

We use a multi-layered infrastructure of firewalls to block unauthorized access by


individuals or networks to our information servers.

Computer Anti-Virus Protection


We are continuously updating our anti-virus protection. This ensures we maintain the
latest in anti-virus software to detect and prevent viruses from entering our computer
network systems.

Data Integrity
The information you send to one of our secure private websites is automatically verified
to ensure it is not altered during information transfers. Our systems detect if data was
added or deleted after you send information. If any tampering has occurred, the
connection is dropped and the invalid information transfer is not processed.

Ensuring Your Online Safety


Find out how these security mechanisms safeguard our communications with you and
learn how RBC helps to protect you against fraud.

What is the difference between hypermedia and hypertext?


• Hypertext - Hypertext is basically the same as regular text - it can be stored, read,
searched, or edited - with an important exception: hypertext is text with pointers to
other text. The browsers let you deal with the pointers in a transparent way -- select
the pointer, and you are presented with the text that is pointed to.

• Hypermedia - Hypermedia is a superset of hypertext. Hypermedia documents


contain links not only to other pieces of text, but also to other forms of media -
sounds, images, and movies. Images themselves can be selected to link to sounds or
documents. This means that browsers might not display a text file, but might display
images or sound or animations. Hypermedia simply combines hypertext and
multimedia.

Benefit of hypermedia

I found the Hypermedia topic to be very informative and appropriate because


recently I was introduced to using a Hypermedia Document in place of WORD
and the benefits to both the user and the designer far supercedes the old tech.

Rajesh Savaliya Page 5


E Commerce

Changing from a traditional WORD DOCUMENT to a hypermedia document is


really a smooth transition. If you are typically comfortable using websites,
interactive devices and other forms of technology, using a hypermedia
document will be seamless.

Tech with Purpose: A hypermedia document allows us to incorporate more and


more technology in our teaching methods. However, we need to make sure we
are doing so with purpose.

Visuals can be stimulating: The hypermedia document can be visually


stimulating. Why did the iPod take off when other MP3 players were
unsuccessful? Aesthetics!

Transparency
– It implies that users should be unaware that they are accessing multiple systems.
– It is essential for dealing with higher-level issues than physical media and
interconnection ( for which underlying infrastructure is in-charge)
– Ideal picture is of “Virtual Network” - a collection of work-group, departmental,
enterprise, inter-enterprise LANs that appears to the end user or client application to be
a seamless and easily accessed whole.
– It is accomplished using middleware that facilitates a distributed computing
environment.
– This gives users and applications, transparent access to data, computation and other
resources across collections of multi-vendor, heterogeneous systems.
– Transparency is key to realizing the theoretical benefits of middleware based
architecture.
– The goal is for the applications to send a request to the middleware layer, which then
satisfies the request any way it can, using remote information.
• The E-com framework is being built on the WWW architecture.
• Web provides the functionality necessary for electronic commerce.
• E-com depends on the assumption that computers cooperate efficiently for seamless
information sharing.
• But, this assumption of inter-operability has not been supported by realities of practical
computing.
• As the E-com applications try to impose a certain discipline on the proliferating computers and
networks, the diversity of technical standards, product implementation and competing vendors
in computing world causes problems.
• Real effect of computing is all too often the prevention of data sharing due to incompatibilities –
architectures, data formats and communication protocols.
• E-com architecture is made of three primary entities :
– Client Browser
– Web Server
– Third Party services.

Rajesh Savaliya Page 6


E Commerce

WWW Server Third - Party


Client browser
functions services

Digital Library of
Local or company Information document/
specific data Retrieval Data servers

Mosaic/W W W Data and transaction Third Party


browser management Info processing
tools / services

Browser Extensions Secure Messaging Electronic Payment


Servers
Hypertext and Hypermedia
– Hypertext is an approach to information management.
– In Hypertext, data are stored in a network of documents connected by links.
– A Hypermedia system is made of nodes (documents) and links (pointers).
– Nodes can contain text, graphics, animation, audio, video, images or programs.
– Nodes are connected to other nodes by links.
– Nodes (and in some systems network itself), can be viewed through an interactive
browser and manipulated through a structure editor.
– The node from which a link originates is Anchor or Reference and node at which a link
ends is Referent.
– Hypermedia combines qualities of hypertext and multimedia.
– Hypermedia contains links not only to other pieces of text but also to other forms of
media - sounds, images, movies etc.

URL Anchors

Home Page
(starting point)

Document Nodes
Hyperlinks

Hypertext Information Network

Rajesh Savaliya Page 7


E Commerce

 Benefits of Hypermedia Documents

• More Flexible
– First overview and then sections can be read in different order as per the interest.
• Convenient
– Offer sound, video sequences, animations and even execution of computer programs.
• Increased power and appeal
– When implemented in networked computing environment with high resolution displays
and large on-line storage.
• Dynamic organization
– individual nodes can be updated, new nodes can be linked, new links can be added
• Hypermedia systems allow people to create, annotate, link together, and share information
from a variety of media such as text, graphics, audio, video, animation, and programs.
• Hypermedia systems provide a non-linear, innovative way of accessing and retrieving network
documents.

 HTTPD servers
• These are World Wide Web Servers
• Installing and maintaining a Web server is not a trivial matter, given the security and
administrative issued involved.
• More difficult is to choose a server that best fits the organization’s needs. The following Issues
to be considered for choosing the server :
– Right choice of platform and operating system
– Kind of traffic load anticipated on Web server - heavy or light
– kind of security features envisioned
– flexibility and robustness of server needed
• Flexibility, ease of administration, security features and familiarity often rank much higher in the
decision process.
• A server used for Internet-based marketing and technical support tasks will need more robust
servers than used internally within a firewall for memo and bulletin distribution.
• Httpd servers are ideal for companies that want to provide a multitude of services ranging from
product information to technical support.
• The way to provide other services via the Web is with HTML pages and CGI scripts that allow the
Web server to act as a gateway to other Internet services such as databases (Oracle or Sybase),
Gopher and news.

3.5 Security on the Web


• Security and confidentiality are essential before businesses can conduct financial transactions
over the Internet
• At present, credit card numbers, financial records, and other important information are not
encrypted and can be intercepted by any savvy Internet hacker.
• Many commercial applications require that the client and server be able to authenticate each
other and exchange data confidentially.
• This exchange has three basic properties :
– clients are confident about servers they are communicating with (server
authentication).

Rajesh Savaliya Page 8


E Commerce

– Client conversation with the server is private (privacy using encryption).


– Clients’ conversations cannot be tampered or interfered with (data integrity).

1 > Categories of Internet Data and Transactions

• Public data :
– have no security restrictions, can be read by anyone.
– Should be protected from unauthorized tampering or modification.
• Copyright data :
– that is copyrighted but not secret
– owner of data is willing to provide it but user has to pay for it.
– Objective is to maximize revenue and security.
• Confidential data:
– material that is secret but whose existence is not secret.
– Such data include bank account statements, personal files etc.
– may be referenced by public or copyright data.
• Secret data :
– existence is secret , might include algorithms
– it is necessary to monitor and log all access to secret data.
• Security and verification are necessary for all types of data because of sensitivity of information
being transferred and to protect the consumer from various forms of fraud and misconduct.

2 > WWW - based Security Schemes

• Several methods that can provide security in Web framework include :


• Secure HTTP :
– revision of HTTP
– will enable the incorporation of various cryptographic message formats (such as DSA
and RSA standards) into both Web client and server.
– Most of the security implementation will take place at the protocol.
• Security socket layer (SSL):
– uses RSA security to wrap security information around TCP/IP based protocols.
– Benefit of SSL over S-HTTP is that SSL is not restricted to HTTP, but can also be used for
security for FTP and TELNET among other Internet services.
• SHEN:
– A security scheme for the Web sponsored by W3 consortium.
– It is noncommercial or more research oriented and is similar to SHTTP.
It is likely that in near future, three security schemes will collaborate to develop a single
standard

SHEN security scheme for the Web

• Browser software with encryption algorithms cannot be sent overseas


• The W3 consortium is developing SHEN, which in many ways mirrors S-HTTP.
• SHEN provides for three separate security – related mechanisms :

Rajesh Savaliya Page 9


E Commerce

– Weak authentication with low maintenance overhead and without patent or export
restrictions.
• User identity must be established as genuine.
• Unauthorized access must be improbable but need not be secure from all
possible forms of attack.
– Strong authentication via public key exchange
• A user identity must be established as genuine.
• Unauthorized access must be impossible except by random chance or by access
to unknown technology
– Strong encryption of message content.
• Data must not be transmitted in a form comprehensible to a third party
• An identified party acts as guarantor in this respect.

➔ Just-in-Time Manufacturing :

• It is viewed as an integrated management system, consisting of a number of different


management practices, is dependent on the characteristics of specific plants.
• JIT management system is based on two principles :-
– Elimination of waste (time, materials, labor and equipment) in production cycle.
– Empowering workers
• Management practices associated with JIT systems :
– Focused factory
– Reduced set-up times
– Group technology
– Total productive maintenance
– Multifunction employees
– Uniform workloads
– JIT purchasing
– Total quality control
– Quality circles

JIT purchasing

– Allows a manufacturer to fit in its supplier efforts toward eliminating waste in the
upstream portion of the manufacturing cycle.
– Focuses on the reduction of inventories throughout the logistical systems of the
manufacturing firms involved and Provides a careful audit of the production
process.
– Optimizes supplier and customer relations
– In production, needed materials are to be supplied just in time (no earlier or later
than is demanded for processing)
– Production costs decrease as required stock level is reduced.

Rajesh Savaliya Page 10


E Commerce

– Market risks passed on through supplier chain (material from supplier is ordered
by production plant, only if products can be sold)
– Quality control of production is very much enhanced.
– All stages of production are closely monitored for sufficient assessment of
imperfections.
– Concept of co-makership has been introduced by such collaboration between
suppliers and customers.
– To achieve JIT savings, corporations have installed private communication
networks. The I-way makes this practice more affordable and easily available to a
number of small firms.

➔ Quick Response Retailing [QRR]

• Quick Response (QR) is JIT purchasing version for retailing.


• Most often, shoppers do not keep a store filled with products until the wanted product is
out of stock.
• The failure to stock products that matches customer demand can be extremely costly.
• To reduce risk of being out of stock, retailers are implementing QR systems.
• QR provides a flexible response to product ordering & lowers costly inventory levels.
• QR retailing focuses on market responsiveness while maintaining low level of stocks.
• It creates a closed loop encompassing the retailer, vendor, and customer chain (Fig: Quick
Response Chain)
• Availability of accurate information with respect to the current sales enables complicated
marketing capable of responding to consumer’s preferences.

Rajesh Savaliya Page 11


E Commerce

Quick Response Retailing


Vendor’s
(6)
(3)
(4)
(5)
Product
Customer
Store computer
Information
Information
Orders on
receives
the closest

(2)
(1)
automatically
purchases
collated
warehouse
material to recorded
receivesand
order
ship the

Bybypoint-of-sale
store the (POS)
restocks

V
e
n
d
Quick Response Chain o

Local or access roads, or on-ramps :


– Called “last mile” in telecommunications industry
– Simplify linkages between businesses, schools and homes to the communications
backbone.
– Four categories of access ramps providers:
1> Telecom based
2> Cable TV based
3> Wireless based
4> Computer based on-line info services. (including value added
networks VANs)
– These backbone access providers link users and E-com application providers.
– Before choosing provider, consumer should decide the services.
– Careful consideration is required to applications deployed or accessed,
objectives and costs, security and privacy.(These factors influence choice of tools
and the access ramps consumers/business choose).
• Linking all the components of the I-way require vast capital investments in “open
systems” (interoperable equipment that uses common standards) and installing
gateways between various networks.

Rajesh Savaliya Page 12


E Commerce

• A final requirement is switching hardware and software to move huge amounts of data
effortlessly over such a complex network.
Linking all the components of the i-way will require large capital investment in open
systems and installing gateways between various networks. A final requirement is switching
hardware and software to move huge amounts of data effortlessly over such a complex
network.

Cable TV Set-top Boxes

– Also known as cable converter boxes, converter boxes, and


converters/descramblers.
– Will be Gateway for information services, commercial transactions, and 500-
digitally compressed channels.
– Will have greater intelligence and more features than the existing converter
boxes such as :
• Enabling users to make phone calls
• Surf the Internet
• Plan the viewing schedule for the week.
– This will be possible because, all cable-boxes are owned not by cable subscribers
but by the cable systems that delivers programming.
– Type of boxes will be decided by local cable company.
• Simplest set-top boxes will feature on-screen text-menus enabling features like :
- Lockout, favorite-channel grazing, time-delay programming for unattended VCR recording.

• At the high end it might be a box with a menu system based on icons for navigating
through various activities :
– To shop, access a bank account, play video games, watch a pay-per-movie,
examine an on-screen TV schedule.
• Cable operators will be able to download software through the cable system into the
set-tops.
• Set-tops will have slots for add-on cards that can be used to :
– change or add applications, provide security, expand unit’s memory
• Set-top boxes will also have a serial data port that can be hooked up to a printer.
• Main goal : to be flexible for the applications of tomorrow.
• For more sophisticated transactions, much of the intelligence will be in the set-top
device (as opposed to residing in a central computer).

->> Comparison of accessing I-way via a set-top v/s a PC

• Criteria for comparison


(i) Display
(ii) Controls

Rajesh Savaliya Page 13


E Commerce

(iii) Pipeline
(iv) Brains
(v) Accessibility
• Display
– TV is well adapted to showing full-motion video to viewers sitting several feet
away, but it’s text display is extremely limited.
– High-definition TV, still getting off the ground, is sharper but still too poor for
text.
– Computer displays can easily display video, text, and graphics crisply to a viewer
seated one and half feet away.
– Computers wouldn’t have to adapt much to match TV’s strengths, but TV is a
long way from matching a computer monitor’s strength.
• Controls
– Set-top will use a hand-held remote control that permits selections from menus.
– Computer has a full-function keyboard;most also have a mouse for pointing,
clicking and high-lighting;other devices such as joysticks, trackballs, light pens,
and voice recognition systems are widely available.
– Far more flexible and powerful ways to interact with a computer than with a
television.
• Pipeline
– Existing cable TV systems can deliver a huge amount of info rapidly one way – to
the home – but must be modified to allow a significant return flow.
– New modems and networks let computers communicate over high capacity
cable lines.
– Future systems will need high-capacity lines to deliver the vast volume of data
needed for digitized video like movies on-demand.
• Brains
– Set-top box is a special-purpose computer with powerful graphics and
communications features but limited versatility*
– Box is largely a slave to the central computers of the interactive system.
– PCs are very versatile ; interactive applications are just part of its versatility.
– PCs are powerful in their own right and not dependent on system’s central
computers with which they communicate.
– Centralized control has usually given way to autonomy for users.
• Accessibility
– Every household has a TV and is familiar and comfortable with using it.
– People most likely to use interactive systems may be the same ones most
attracted to computers.
– Leap to interactive use is greater from passive TV watching than from active
computer use.Thus, universality of TV is less advantageous than it appears.
– But a Significant part of public remains uncomfortable with computers.

Rajesh Savaliya Page 14

You might also like