Intenet and Intranet Applications
Intenet and Intranet Applications
3. Audio/video file
Media
Player
Browser 2. Response
Web
3. Meta file server
Media 5. Response
player
Fig: Streaming streamed audio and video using a web server with metafile
Third Approach: Using a Media Server
●
The problem with the second approach is that the
browser and the media player both use the services of
HTTP. HTTP is designed to run over TCP. This is
appropriate for retrieving the metafile, but not for
retrieving the audio/video file. The reason is that TCP
retransmits a lost or damaged segment, which is counter
to the philosophy of streaming. We need to dismiss TCP
and its error control; we need to use UDP. However,
HTTP, which accesses the Web server, and the Web
server itself are designed for TCP; we need another
server, a media server.
Client machine Server Machine
1. Get:Meta file
Web
Browser 2. Response server
3. Meta file
Media
Media 5. Response server
player
Browser 2. Response
Web Server
3. Metafile
4. Setup
5. Response
6. Play
7. Response Media Server
Media Player
Audio/Video Stream
8. Teardown
9. Response
●
The HTTP client accesses the Web server using a GET message.
●
The information about the metafile comes in the response.
●
The metafile is passed to the media player.
●
The media player sends a SETUP message to create a
connection with the media server.
●
The media server responds.
●
The media player sends a PLAY message to start playing
(downloading).
●
The audio/video file is downloaded using another protocol that
runs over UDP.
●
The connection is broken using the TEARDOWN message.
●
The media server responds.
b. Streaming Live Audio and Video
●
Streaming live audio/video is similar to the broadcasting of audio and
video by radio and TV stations. Instead of broadcasting to the air, the
stations broadcast through the Internet.
●
There are several similarities between streaming stored audio/video and
streaming live audio/video. They are both sensitive to delay; neither can
accept re-transmission.
●
However, there is a difference. In the first application, the communication
is unicast and on-demand.
●
In the second, the communication is multicast and live.
●
Live streaming is better suited to the multicast services of IP and the use
of protocols such as UDP and RTP.
●
Examples: Internet Radio, Internet Television (ITV), Internet protocol
television (IPTV).
c. Real-Time Interactive Audio and Video
●
In real-time interactive audio/video, people
communicate with one another in real time.
●
The Internet phone or voice over IP is an example of
this type of application.
●
Video conferencing is another example that allows
people to communicate visually and orally.
7.2.2 Audio/Video Conferencing
a. Audio Conferencing
●
Audio conferencing is where at least two individuals in various locations
use technology like a conference bridge to hold an audio call.
●
It aims at accomplishing communications and collaboration at the same
time.
b. Video Conferencing
●
When at least two individuals utilize digital platforms to communicate
and collaborate with each other in order to accomplish a common goal
adequately then it is known as a video conferencing.
Benefits of audio and video conferencing:
●
Reduces Travel Costs: All business meetings happened face-to-face, which involved travel,
expense and time. However, through audio and video conferencing an organization can save a
lot of time and money.
●
Keep connected to our employees: If we have employees working from home or out on the
road, through audio video conference system we can stay in touch with them consistently.
●
Increases productivity: If collaboration is done well, it can increase productivity essentially.
●
Improves teamwork: If we have large teams or members of staff at various locations, video
conferencing will assist to unite them. Employees can share data and collaborate to make a
better-informed decision, which will prompt better working relationships internally.
●
Effective communication: Not just would we be able to hear people’s voices, through video
conferencing we can likewise see the people we are communicating to, see their expressions,
instant responses and body language.
●
Training many people at a time: Organizations spend a lot of time and money on internal
training programs. By using an audio video conference system, we can easily overcome such
kind of situations and save a lot of time.
Components of Video Conferencing/ Technologies for Video
Conferencing
●
Camera
●
Video display
●
Microphone
●
Speaker: to play audio received from remote
locations
●
Codec (Compressor/Decompressor)
Methods of Audio/Video Conferencing
●
Point-to-Point Conferencing: A videoconference that connects
two locations is known as point-to-point conferencing. Each
site sees and hears the other sites at all times
●
Multipoint Conferencing: A videoconference that connects to
more than two sites through the use of a multi-poin control
unit, or MCU is known as multipoint conferencing. Participants
at all sites can hear one another at all times and see the site
that is currently speaking.
Uses of Audio/Video Conferencing
●
Presentations
●
Virtual meetings
●
Videoconference-based learning
●
JIT (just in time) events
●
Recruitment/search committees
●
General meetings
●
Project coordination
●
Informal work sessions
●
Alumni relations
●
Question and answer session
7.2.3 Digital Video/ Audio Broadcasting
a. Digital Video Broadcasting
●
Asynchronous Data Transmission: Data is transmitted without strict synchronization between different channels
or time slots. This flexibility allows data channels to operate independently, and time slots are allocated based
on the necessity of data transmission.
●
Variable Data Rates: Individual data channels may have fixed data rates or may vary based on the
requirements of the transmitted content. This variability allows for optimized data transmission based on content
demands.
●
Equal Forward Error Correction (FEC): Forward Error Correction techniques are employed uniformly across the
data channels to detect and correct errors in the received data, ensuring reliability in transmission.
●
Modulation Techniques: The system utilizes modulation techniques like Single Carrier Quadrature Phase Shift
Keying (QPSK) or Quadrature Amplitude Modulation (QAM) for transmitting digital information. These
modulation schemes are efficient for digital data transmission.
●
Transmission Links: Digital video broadcast systems can use various transmission links for broadcasting:
●
Satellite: Utilizing satellites for wide-area coverage and distribution of digital content.
●
Cable: Transmitting content through cable networks.
●
Terrestrial: Using terrestrial networks (such as antennas or towers) for localized or regional broadcasting.
Benefits of Such a System:
●
Flexibility: The asynchronous nature and variable data rates provide flexibility in
accommodating diverse content types and transmission needs.
●
Reliability: The use of equal FEC across channels ensures error detection and
correction, enhancing the reliability of data transmission.
●
Adaptability to Various Platforms: By utilizing satellite, cable, or terrestrial
transmission links, the system can cater to different geographical areas and audience
preferences.
●
Such a system is adaptable to varying data demands and transmission scenarios,
offering reliability and flexibility in delivering digital content through different mediums.
b. Digital Audio Broadcasting
●
Synchronous Data Transmission: Data transmission is synchronous, where the timing and
data rates for each data channel are fixed and synchronized. This synchronization ensures
consistent transmission across channels.
●
Constant Data Rates: Each data channel maintains a constant data rate, providing a
consistent and predictable transmission speed for the audio data.
●
Fixed Time Slots: The time slots allocated for individual data channels remain fixed,
implying a structured and predetermined allocation of time for each channel.
●
Unequal Forward Error Correction (FEC): The system employs an unequal Forward Error
Correction method across different data channels. This likely means that different levels or
types of error correction techniques are applied to different channels based on their
requirements or priority.
●
Modulation Technique: DAB uses COFDM (Coded Orthogonal Frequency Division
Multiplexing) as its modulation method. COFDM is known for its resilience to multipath
interference and efficient use of bandwidth.
●
Transmission Link: The primary transmission link for Digital Audio Broadcast is terrestrial,
indicating that it's broadcast over land-based networks (such as antennas, towers, or
ground-based transmitters).
Benefits and Implications:
●
Consistent Quality: Synchronous transmission with constant data rates and fixed time
slots helps maintain consistent audio quality across channels.
●
Effective Error Correction: Using unequal FEC allows for customized error correction
methods, addressing the varying needs of different channels for optimal error
recovery.
●
Terrestrial Transmission: Broadcasting via terrestrial links can provide localized
coverage and reach specific geographical areas efficiently.
●
Overall, a Digital Audio Broadcast system with synchronous transmission, constant
data rates, fixed time slots, and COFDM modulation aims to ensure reliable and
consistent transmission of audio content over terrestrial networks.
7.2.4 Internet Relay Chat (IRC)
●
Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text.
●
The chat process works on a client/server networking model.
●
IRC clients are computer programs that a user can install on their system.
●
These clients communicate with chat servers to transfer messages to other clients.
●
IRC is mainly designed for group communication in discussion forums, called channels, but also allows
one-on-one communication via private messages as well as chat and data transfer, including file sharing.
●
There are hundreds of IRC channels (discussion areas) around the world, hosted on servers, on which
people type their messages to others on the same channel interested in the same subject.
●
There are client IRC programs which provide graphical interfaces which make it easier for people log on
and access active channels and send and receive the messages.
●
IRC chat, at present, is not limited to two people, unlike earlier versions.
●
The basic architecture of IRC is shown in the figure above.
●
In the simplest case, there is a single IRC server to which multiple IRC clients
can connect to.
●
An IRC client connects to the server with a specific identity. Most notably, each
client must choose a unique nickname, or “nick”.
●
Once a client is connected, it can communicate one-to-one with other users.
Additionally, clients can run commands to query the server’s state (e.g., to obtain
a list of connected users, or to obtain additional details about a specific nick).
●
IRC also supports the creation of chat rooms called channels for one-to-many
communication.
●
Users can join channels and send messages to the channel; these messages
will, in turn, be sent to every user in the channel.
7.3 Broadband Communications, Policy, xDSL and Cable
Internet
7.3.1 Broadband Communication
●
Broadband communications are usually considered to be any technology
with transmission rates above the fastest speed available over a telephone
line.
●
Broadband transmission systems typically provide channels for data
transmissions in different directions and by many different users. For
example, the coaxial CATV system is a broadband system that delivers
multiple television channels over the same cable.
●
In addition, it can handle data transmissions (primarily Internet access for
home users) in an entirely different frequency spectrum.
Typical broadband communication systems include the following:
●
ISDN (Integrated Services Digital Network): ISDN is implemented over existing
copper telephone cables. The basic rate variety provides two channels of 64-
Kbit/sec throughput that can be bonded to form a 128-Kbit/sec data channel.
Primary rate ISDN provides additional bandwidth in increments of 64 Kbits/sec.
●
ATM (Asynchronous Transfer Mode): Asynchronous Transfer Mode (ATM) is an
International Telecommunication Union- Telecommunications Standards
Section (ITU-T) that is used to transfer all the services like voice, data, or
video. These services can be conveyed in a small fixed-sized packet called the
cell. These cells are connected in a network that transmits the data
asynchronously.
●
Frame Relay: Frame relay is a protocol that defines how frames are routed
through a fast-packet network based on the address field in the frame. Like
ATM, frame relay is primarily used for corporate rather than home connections.
●
DSL (Digital Subscriber Line): DSL is a whole family of high-
bandwidth digital services that the telephone companies offer over
copper telephone cable. Depending on the service, rates can reach
into the multimegabit/sec rates.
●
Wireless Communications: A variety of wireless broadband services
are now available or under development, including satellite-based
systems and terrestrial-based systems that are essentially fixed
cellular systems. Broadband wireless uses microwave and millimeter
wave technology to transmit signals from base stations to customers.
7.3.3 xDSL
●
Digital Subscriber Line is a technology that utilizes high transmission frequencies to convert
ordinary conventional phone line into high-speed data conductor.
●
DSL technologies use sophisticated modulation schemes to pack data onto copper wires.
●
They are sometimes referred to as last-mile technologies because they are used only for
connections from a telephone switching station to a home or office, not between switching
stations.
●
DSL is a family of technologies that are used to transmit digital data over telephone lines.
●
In telecommunications marketing, the term DSL is widely understood to mean asymmetric digital
subscriber line (ADSL), the most commonly installed DSL technology, for Internet access.
●
DSL service can be delivered simultaneously with wired telephone service on the same
telephone line. This is possible because DSL uses higher frequency bands for data.
The different DSL technology are as follows:
●
ADSL (Asymmetric DSL): Provides faster download speeds than
upload speeds, suitable for typical internet usage where users
consume more data than they upload.
●
VDSL (Very High Bitrate DSL): Offers higher bandwidth capabilities
compared to ADSL, enabling faster upload and download speeds.
●
SDSL (Symmetric DSL): Provides equal upload and download speeds,
ideal for applications requiring symmetrical data transmission.
●
HDSL (High Bitrate DSL): Capable of transmitting data at higher rates
but typically requires two copper lines for operation.
How xDSL Works:
●
xDSL utilizes existing copper telephone lines to carry digital data, allowing
simultaneous transmission of voice (telephony) and high-speed internet data.
●
It works by using different frequencies to separate voice and data signals,
enabling users to make phone calls while accessing the internet.
Advantages of xDSL:
●
Availability: Widely available in areas where traditional telephone lines are
present, offering internet connectivity without major infrastructure changes.
●
Cost-Effective: Utilizes existing infrastructure, making it more cost-effective to
deploy compared to laying new cables for broadband.
●
Variety of Types: Offers different variants to suit various speed and bandwidth
requirements.
7.3.4 Cable Ethernet
●
Ethernet uses a communication concept called datagrams to get messages across the
network. The Ethernet datagrams take the form of self-contained packets of information.
These packages have fields containing information about the data, their origin, their
destination and the type of data.
●
The data field in each package can contain up to 1500 bytes. It is also provided with the
sender address, the receiver address, the stamp indicating what the package's contents
are.
●
The commonly used network cables: Cat 5, Cat 5e, Cat 6, Cat 6a, Cat7 all have different
levels of performance, and therefore to is necessary to buy or select the right cable for the
right application.
●
These network cables are used for connecting a variety of network elements from Ethernet
switches and Ethernet routers to computers, servers and other network items - if there is
an Ethernet interface, they can be connected using Ethernet cables.
●
The Ethernet cables are available in a variety of lengths as patch cables, or the cable itself
is available for incorporating into systems, buildings, etc.
Categories for Ethernet Cables:
●
A variety of different cables are available for Ethernet and other
telecommunications and networking applications. These network cables that are
described by their different categories, e.g. Cat 5 cables, Cat-6 cables, etc., which
are often recognized by the TIA (telecommunications Industries Association) and
they are summarized below:
●
Cat-1: This is not recognized by the TIA/EIA. It is the form of wiring that is used for
standard telephone (POTS) wiring, or for ISDN.
●
Cat-2: This is not recognized by the TIA/EIA. It was the form of wiring that was
used for 4Mbit/s token ring networks.
●
Cat-3: This cable is defined in TIA/EIA-568-B. It is used for data networks
employing frequencies up to 16 MHz It was popular for use with 10 Mbps Ethernet
networks (100 Base-T), but has now been superseded by Cat-5 cable.
●
Cat-4: This cable is not recognized by the TIA/EIA. However, it can be used for
networks carrying frequencies up to 20 MHz. It was often used on 16 Mbps token
ring Networks.
●
Cat-5: This is not recognized by the TIA/EIA. This is the network
cable that is widely used for 100Base-T and 1000Base-T networks
as it provides performance to allow data at 100 Mbps and slightly
more (125 MHz for 1000Base-T) Ethernet. Cat 5 cable uses
twisted pairs to prevent internal crosstalk, XT and also crosstalk to
external wires, AXT. Although not standardized, the Cat 5 cable
normally uses 1.5 - 2 twists per centimeter.
●
Cat-6: This cable is defined in TIA/EIA-568-B provides a significant
improvement in performance over Cat 5 and Cat 5e. During
manufacture, Cat 6 cables are more tightly wound than either Cat
5 or Cat 5e and they often have an outer foil or braided shielding.
The shielding protects the twisted pairs of wires inside the Ethernet
cable, helping to prevent crosstalk and noise interference.
7.4 VoIP, FoIP and IP Interconnection
7.4.1 VoIP
●
Voice over Internet Protocol (Voice over IP, VoIP and IP telephony) is a methodology and
group of technologies for the delivery of voice communications and multimedia sessions over
Internet Protocol (IP) networks, such as the Internet.
●
The terms Internet telephony, broadband telephony, and broadband phone service specifically
refer to the provisioning of communications services (voice, fax, SMS, voice-messaging) over
the public Internet, rather than via the public switched telephone network (PSTN).
●
Voice over IP has been implemented in various ways using both proprietary protocols and
protocols based on open standards. VoIP protocols include: SIP (Session Initiation Protocol),
RTP (Real-time Transport Protocol), Skype.
Advantages of using VoIP over PSTN:
●
Cost reduction - low-cost phone calls.
●
Convergence of data/voice networks – unification.
●
Simplification and consolidation - centralized management.
Transmission of Voice using IP Networks
Step 1: Because all transmissions must be digital, the caller’s voice is digitized.
Step 2: Next using complex algorithms, the digital voice is compressed and then
separated into packets; and using the Internet protocol, the packets are
addressed and sends across the network to be reassembled in the proper order
at the destination.
Step 3: During transmission on the Internet, packets may be lost or delayed, or
errors may damage the packets. Conventional error correction techniques
would request retransmission of unusable or lost packets, but if the
transmission is a real-time voice communication that technique obviously would
not work, so sophisticated error detection and correction systems are used to
create sound to fill in the gaps.
Step 4: After the packets are transmitted and arrive at the destination, the
transmission is assembled and decompressed to restore the data to an
approximation of the original form.
VoIP Configurations
a. Dedicated routers :
●
These devices allow us to use our traditional phone to place VoIP calls. They are connected to cable/DSL
modems (or any high-speed internet source) and allow us to attach an ordinary telephone. Once
configured, and with an appropriate VoIP provider and service plan, these devices require no special
software or interaction with a computer.
b. Adapters (USB)
●
These devices also allow us to use a traditional phone to place VoIP calls. They usually come in the form
of USB adapters. They feature a standard modular phone jack to which we can attach an ordinary phone
line. Once connected, our phone behaves as if it were connected to standard phone service.
c. Software-Controlled VoIP Applications
●
There are many software applications (“softphones”) that allow you to place VoIP phone calls. Using an
ordinary computer with a headset, microphone, and sound card. Software-based VoIP applications are
quite attractive to consumers. They often already have most of the components. It can start at little to no
cost
d. Dedicated VoIP phones
●
A VoIP phone looks like an ordinary corded or cordless telephone. It connects directly to a computer
network rather than a traditional phone line. It may consist of a phone and base station that connects to the
internet. It may also operate on a local wireless network. Like the VoIP adapters mentioned above,
dedicated VoIP phones also require a provider and service plan.
H.323 and SIP
●
H.323 is an application layer protocol that is utilized for VOIP, and it is a common protocol
for audio and video conferences. It is not used for other applications such as
application/file-sharing or online games but simply for multimedia conferencing, which
makes it simpler than SIP. It is a binary protocol in which messages are compressed to
binary, which makes it appropriate for narrowband connections. The high level of
interoperability of H.323 is one of its advantages. It contains some additional capabilities
like NAT traversal, support for different addressing schemes, data conferencing, and load
balancing. It also features mechanisms that ensure reliability by recognizing issues with
network connecting equipment.
●
SIP (Session Initiation Protocol) is an application layer protocol that is utilized for VOIP. It
is utilized to control multimedia communication sessions and may be utilized for online
games, fax over IP, instant messaging, video conferencing, and even file transfer. In
addition to multimedia conferencing, SIP may be utilized for file sharing, online gaming,
instant messaging, and other multimedia communications. In contrast, H.323 only
concentrates on multimedia conferencing.
7.4.2 FoIP
●
FoIP (Fax over Internet Protocol), also called IP Faxing, is a method of sending
faxes over the Internet. FoIP changes the transmission medium of faxing in much
the same way that VoIP (Voice over Internet Protocol) changes the transmission
medium of a phone call. In both cases, data makes all or most of the trip between
sending and receiving devices on a packet-switched network (usually the
Internet), avoiding the long-distance phone lines of the circuit-switched telephone
network. This reduces the cost of transmission and can be a more efficient setup
for a business that already has access to Internet bandwidth.
●
The FoIP setup is a lot like the VoIP setup, and you can even send IP faxes using
a VoIP server. However, since a fax requires more bandwidth than a voice, a VoIP
server doesn't automatically work seamlessly for transmitting faxes. It typically
requires some modifications, which you can make by installing a piece of
software. Some companies also make servers that are optimized for both VoIP
and FoIP applications.
How FoIP Works ?
●
FoIP, or Fax over Internet Protocol, enables the transmission of facsimile (fax) documents over the internet
using IP networks instead of traditional phone lines. Here's an overview of how FoIP works:
●
1. Protocol and Standards:
T.38 Protocol: FoIP typically uses the T.38 protocol, specifically designed for real-time fax communications
over IP networks. T.38 standardizes the transmission of faxes over IP networks, ensuring reliability and
interoperability.
2. Process of FoIP Transmission:
●
Fax to Digital Conversion: The analog fax document is converted into digital format by an Analog Telephone
Adapter (ATA), fax server, or specialized FoIP software.
●
Packetization: The digitized fax data is packetized into IP packets for transmission over the internet.
●
T.38 Protocol Handling: If using T.38, the fax data is encapsulated within T.38 packets, ensuring error
correction, real-time delivery, and reliability during transmission.
●
Network Transmission: The packets containing fax data are transmitted over the internet using standard IP
networking protocols (TCP/IP or UDP/IP), just like other data packets.
●
Reception and Reconstruction: At the receiving end, the IP packets are reassembled and converted back to
analog signals if necessary, recreating the fax document.
Key Components Involved:
●
FoIP Gateway or Server: Responsible for managing the conversion of analog fax
signals into digital packets and vice versa.
●
Network Infrastructure: Utilizes existing IP-based networks (such as the internet or
private networks) for transmitting fax data.
●
Fax Machines or Software Clients: Initiates the fax transmission and receives the fax
on the recipient's end.
●
Importance:
●
PCH's efforts are critical in maintaining a resilient and secure internet infrastructure, providing essential
support services that underpin the functioning of the internet globally.
●
The Packet Clearing House's role in managing and supporting critical internet infrastructure is pivotal in
ensuring the reliability, security, and stability of the internet's core elements, contributing to the overall
functionality of the global internet ecosystem.
7.6. Unified Messaging Systems
●
Unified Messaging (UM) is the integration of different electronic
messaging and communications media (e-mail, SMS, Fax, voicemail,
video messaging, etc.) technologies into a single interface, accessible
from a variety of different devices.
●
Importance of Unified Messaging System
1. Reduces travel and administrative costs
2. Lowers IT and other operational costs
3. Better workforce collaboration
4. Secure communication
7.7 Fundamental of E-Commerce
●
E-commerce is the technical term for buying and selling things through the electronic media. E-
commerce relies on technology and digital platforms, including websites, mobile apps and social
media to make buying and selling possible.
7.7.1 Building Blocks (Components) of E-commerce
●
E-commerce comprises of the following elemens:
i. Website
ii. Shopping Cart Software
iii. Ecommerce Payment Methods
iv. Payment Gateway
v. Merchant Bank
vi. SSL
7.7.2 Classification of E-Commerce Applications
i. Electronic Markets: The principal function of an electronic market
is to facilitate the search for the required product or service. Airline
booking systems are an example of an electronic market.
ii. Electronic Data Interchange (EDI): Electronic Data Interchange
(EDI) is the electronic exchange of business documents in a
standard, computer processable, universally accepted format
between-trading partners. EDI is quite different from sending
electronic mail, messages or sharing files through a network.
iii. Internet Commerce: The Internet (and similar network facilities)
can be used for advertising goods and services and transacting
one-off deals. Internet commerce has application for both
business-to-business and business to consumer transactions.
7.7.3 Types of E-Commerce
i. B2B (Business to Business): The two businesses pass information electronically to
each other. B2B e-commerce currently makes up about 94% of all ecommerce
transactions.
ii. B2C (Business to Consumer): This is where the consumer accesses the system of
the supplier. It is still a two-way function but is usually done solely through the Internet.
iii. C2B (Consumer to Business): Consumer to Business is a growing arena where the
consumer requests a specific service from the business.
iv. B2E (Business to Employee): Business to Employee e- commerce is growing in
use. This form of E-commerce is more commonly known as an ‘Intranet’.
v. C2C (Consumer to Consumer): The consumer lists items for sale with a commercial
auction site. Other consumers access the site and place bids on the items. The site
then provides a connection between the seller and buyer to complete the transaction.
●
Note: Other types of e-commerce include Government to Government (G2G),
Government to Consumer (G2C), Consumer to Government (C2G), Government to
Business (G2B), Business to Government (B2G)
Scope of e-commerce:
i. Selling can be focused to the global customer
ii. Pre-sales, subcontracts, supply
iii. Financing and insurance
iv. Commercial transactions: ordering, delivery, payment
v. Product service and maintenance
vi. Co-operative product development
vii. Distributed co-operative working
viii. Use of public and private services
ix. Business-to-administrations (e.g., customs, etc.)
x. Transport and logistics
xi. Public procurement
xii. Automatic trading of digital goods
xiii. Accounting
xiv. Dispute resolution
Advantages of e-commerce:
i. Saves the cost and time of setting up and maintaining a physical store
ii. Provides customers the convenience of shopping from anywhere, anytime
iii. Maintains every business transaction detail, even the smallest one
iv. Makes the shop accessible to customers from all over the globe
v. Many customers can be simultaneously attended to
vi. Checks fraudulent transaction attempts
vii. Helps take business beyond the borders of your country or locality, offering you the
potential for exponential growth
viii. Helps the merchant to offer a competitive price to the buyers, by giving discounts
and other lucrative offers
ix. Provides money back guarantee for ensuring customer satisfaction
x. By linking to other affiliate sites, helps customers to find related things of interest
Disadvantages of e-commerce:
i. E-commerce lacks personal touch
ii. E-commerce delays goods
●
E-commerce websites sometimes take a lot longer to deliver the goods into our hands.
iii. Many goods cannot be purchased online
iv. Anyone can set up an e-commerce website
●
Since anyone can set up an e-commerce website, there is a problem of how to verify
the store from where we are purchasing is genuine.
v. Security
●
When making an online purchase, we have to provide at least our credit card
information and mailing address. In many cases, e-commerce websites are able to
harvest other information about our online behavior and preferences. This could lead to
credit card fraud, or worse, identity theft.
7.7.4 Electronic Payment System
●
E-Commerce or Electronics Commerce sites use electronic payment where electronic payment
refers to paperless monetary transactions. Electronic payment has revolutionized the business
processing by reducing paper work, transaction costs, labor cost. Being user friendly and less
time consuming than manual processing, helps business organization to expand its market reach
/ expansion. Some of the modes of electronic payments are following.
i. Credit card: When a customer purchases a product via credit card, credit card issuer bank pays
on behalf of the customer and customer has a certain time period after which he/she can pay the
credit card bill. It is usually credit card monthly payment cycle.
ii. Debit card: Debit card, like credit card is a small plastic card with a unique number mapped
with the bank account number. It is required to have a bank account before getting a debit card
from the bank. The major difference between debit card and credit card is that in case of payment
through debit card, amount gets deducted from card's bank account immediately and there
should be sufficient balance in bank account for the transaction to get completed.
Whereas in case of credit card there is no such compulsion. Debit cards free customer to carry
cash, cheques and even merchants accept debit card more readily. Having restriction on amount
being in bank account also helps customer to keep a check on his/her spending.
iii. Smart card: Smart card is again similar to credit card and debit card in appearance
but it has a small microprocessor chip embedded in it. It has the capacity to store
customer work related/personal information. Smart card is also used to store money
which is reduced as per usage. Smart card can be accessed only using a PIN of
customer. Smart cards are secure as they store information in encrypted format and are
less expensive/provides faster processing. Mondex and Visa Cash cards are examples
of smart cards.
iv. E-money: E-money transactions refers to situation where payment is done over the
network and amount gets transferred from one financial body to another financial body
without any involvement of a middleman. E-money transactions are faster, convenient
and saves a lot of time. Online payments done via credit card, debit card or smart card
are examples of e-money transactions. Another popular example is e-cash. In case of e-
cash, both customer and merchant both have to sign up with the bank or company
issuing e-cash.
v. Electronic fund transfer (EFT): It is a very popular electronic payment method to
transfer money from one bank account to another bank account. Accounts can be in
same bank or different bank. Fund transfer can be done using ATM (Automated Teller
Machine) or using computer.
7.8 Concept of Grid and Cloud Computing
7.8.1 Grid Computing
●
Grid computing is a computing infrastructure that combines computer
resources spread over different geographical locations to achieve a
common goal. All unused resources on multiple computers are pooled
together and made available for a single task.
●
For example, meteorologists use grid computing for weather modeling.
Since weather modeling requires processing huge amounts of weather
data, using a single computer is slow and time consuming. Due to this
reason, meteorologists run the analysis of weather data over geographically
dispersed grid computing infrastructure and combine the results.
Why is grid computing important?
Grid computing is important for several reasons:
●
Efficiency: With grid computing, we can break down large, complex tasks
into multiple subtasks. And multiple computers can work on the subtasks
concurrently, making grid computing an efficient computational model.
●
Cost: Grid computing works with existing hardware, which means we can
reuse existing computational resources.
●
Flexibility: Grid computing is not constrained to a specific location. Grid
computing network can be set up spanning several regions. This enables
researches from different geographical location to work collaboratively.
Characteristics of grid computing:
i. Large scale
ii. Geographical distribution
iii. Heterogeneity
iv. Resource sharing
v. Multiple administration
vi. Transparent access
vii. Dependable access
viii. Consistent/reliable access
ix. Pervasive/universal access
Advantages:
i. Can solve larger, more complex problem in short time.
ii. Easier to collaborate with other organization.
iii. Make better use of existing hardware.
Disadvantages:
i. Grid software and standards are still evolving.
ii. Non-interactive job submission.