Sunteți pe pagina 1din 51

Internetworked Enterprise

Internetworked Enterprise
Businesses are becoming internetworked enterprises. The Internet and Internet-like networks inside the enterprise (intranets), between an enterprise and its trading partners (extranets), and other types of networks have become the primary information technology infrastructure of many organizations. Telecommunications networks enable managers, end users, and their teams and workgroups to electronically exchange data and information anywhere in the world with other end users, customers, suppliers, and other organizations. By using such networks, companies can: Coordinate their work activities Manage their business operations and organizational resources Compete successfully in todays fast changing global economy Many organizations today could not survive without a variety of interconnected computer networks to service the information processing and communications needs. The success of the electronic commerce systems among business and their customers and suppliers and enterprise collaboration systems are all based on Internetworked enterprise. Electronic commerce or e-commerce has been defined as the ability to perform transactions involving the exchange of goods or services between two or more parties using electronic tools and technique. The explosion of E-commerce has created new phenomena in our lifestyle especially in shopping activities. Consumers can easily buy products or services like magazines and airlines tickets via Internet. An internetworked enterprise uses the internet, intranets, extranets and other networks to support every step of the commercial process. Enterprise Collaboration systems uses the groupware tools to support communication, coordination and collaboration among the members of networked teams and workgroups.

What is Internet
The Internet is the largest network of networks today, and the closest model we have to the information superhighway of tomorrow. According to the definition provided by Oxford dictionary, the Internet is an arrangement of connected computers, which lets the computer users all over the globe exchange data. The Internet is an extraordinary entertainment and learning tool that may be utilized in a number of modes to increase the ability of a user to collect information. The principal components of the Internet are the World Wide Web (WWW) and e-mail. With the passage of time, the Internet has become the most effective business tool in the contemporary world. It can be described as a global meeting place where people from every corner of the world can come simultaneously.

Characteristics of Internet
Complex Network: With the simplified definition as a network of networks that comprises of over 150 million computers World-wide acceptance Used for :
information searching and access information interchange commercial exchanges

Internet Infrastructure
Every computer that is connected to the Internet is part of a network, even the one in your home. For example, you may use a modem and dial a local number to connect to an Internet Service Provider(ISP). A computer or computer network is attached with the device called Modem(Short for modulator or demodulator) that converts the digital data coming from a computer into analog voice form. This converted voice form is transmitted to the local Internet Service Provider through telephone links where a modem converts it back into digital form. At work, you may be part of a local area network (LAN), but you most likely still connect to the Internet using an ISP that your company has contracted with. When you connect to your ISP, you become part of their network. The ISP may then connect to a larger network and become part of their network. The Internet is simply a network of networks. Internet Service Provider is the Organization ,which allows consumers to access internet services. The ISP is equipped with all the tools and the technology to provide you the internet services. Most large communications companies have their own dedicated backbones connecting various regions. In each region, the company has a Point of Presence (POP). The POP is a place for local users to access the company's network, often through a local phone number or dedicated line. The amazing thing here is that there is no overall controlling network. Instead, there are several high-level networks connecting to each other through Network Access Points or NAPs.

Advantages of Internet
Following are the advantages provided by the Internet: 1) Information The biggest benefit offered by the Internet is information. It functions as a valuable resource of information. You can find any type of information on any subject with the help of the search engines like Yahoo and Google. 2) Communication The primary goal of the Internet is communication. It has done extremely well in this field, however the development process is still going on to make it more dependable and quick. By sending an e-mail, we can contact a person who is physically present thousand miles away within the fraction of a seconds time. 3) Entertainment Internet functions as a popular medium of entertainment. A wide variety of entertainment including video games, music, movies, chat room, news and others can be accessed through the Internet. 4) E-commerce E-commerce is the idea that is implemented for any form of commercial strategy or business transactions that entails transmission of data from one corner of the world to another. Ecommerce has become a fantastic option through which you can shop anything. 5) Formation of communities Internet helps in formation of communities or forums. Here a number of people can participate in different types of debates and discussions, express their views and gather valuable knowledge. 6) Services A variety of services are offered via Internet, for example job searching, online banking, buying movie tickets, hotel reservations and consultation services etc. When you avail these services offline, they become more expensive.

Disadvantages of Internet
1) Spamming: Spamming denotes distribution of unsolicited e-mails in large numbers. They are meaningless and they unnecessarily block the whole system. These activities are treated as illegal. 2) Theft of personal details While using the Internet, there is high probability that your personal details like name, address and credit card number may be accessed by con artists and used for fraudulent purposes. 3) Virus threat Virus is a program that interrupts the usual operation of your personal computer system. PCs linked to the Internet have high probability of virus attacks and as a result of this your hard disk can crash, giving you a lot of trouble.

Internet Services
Email E-Chatting Video Conferencing E-Government E-Commerce E-News E-Recruitment E-Education

Intranets
Intranet is kind of computer network which is used by the businesses to work effectively and efficiently by using the internet protocols. Some time the Intranet is used in contrast to the internet because Intranet network use the internet, but it is only accessible to the inside the members of organizations. The Intranet network is private network which is highly secured and safe; it has the firewall so it cannot be accessed by the external people. An intranet is a network inside an organization that uses Internet technologies to provide an Internet-like environment within the enterprise for information sharing, communications, collaboration and the support of business process. An intranet is protected by security measures such as passwords, encryption and firewalls and thus can be accessed by authorized users through the Internet. An intranet is an information portal designed specifically for the internal communications of small, medium or large businesses, enterprises, governments, industries or financial institutions of any size or complexity. Intranets can be customdesigned to fit the exact needs of businesses no matter where they are situated. Users of intranets consists mainly of Members of the executive team, Accounting and order billing. Managers and directors, Sales people and support staff Customer service, help desk, etc..

Role of Intranet
Communication and Collaboration

Existing E-mail, voiceMail Systems

Communicate and collaborate with e-mail, discussion forums, chat and conferencing. Business Operations and management Secure , universal access to view and use corporate and external data. Web Publishing

Existing Databases And Enterprise Applications

Intranet Enterprise Information Portal

F I R E W A L L

Internet

Extranet

HTML, MS Office XML, Java and Other Document Types

Author, publish and Share hypermedia documents

Employees

Intranet Portal Management Existing Hardware And Networks Centrally administer Clients , servers, Security, directory And traffic

Customers, Suppliers, And Partners

Characteristics of Intranet
1. An open, multi-way communication vehicle: Top Down, Bottom Up, Peer-to-Peer An enterprise has a host of communication channels available, but the intranet is a critical one. A great intranet must facilitate all communication routes: Top Down, Bottom Up, Peer-to-Peer. An
2.Executor of business transactions A great intranet is a place of action and should be a part of business processes. 3. Transparent governance, management and strategy Its all well and good having this great intranet, but if no one knows the strategy, who governs and controls this space and what the rules of engagement are, then theres still clear space for improvement. 4. Communication The intranet must support various communication channels, such as information from the management team concerning strategic aspects of their organisation or collaboration amongst project teams and departments. These formal and informal methods of communication are equally important. Therefore essential to have an in-depth look at the communication tools on offer. 5. Search An effective search function is important in building and maintaining trust with the corporate intranet. Hopeless search queries which do not render anything helpful can be both frustrating and inefficient. 6. Access flexibility Accessibility by either a laptop or desktop is no longer acceptable, as not all employees perform tasks and activities at their desks. Certain job roles require employees to visit clients, and regular off-site meetings are becoming more common. Therefore flexibility in accessing their intranet on mobile devices and tablets should facilitate and not compromise their ability to perform tasks on their intranet.

Advantages of Intranet
Easy and Economical System of communication--Intranet is an easy, economical and fast system of communication within the enterprise. It offers opportunities to keep every concerned individual informed irrespective of the location. It also helps in reducing travel time as the communication between people in the business enterprise can be more frequent and less expensive, particularly when the persons desiring to communicate are located far away from each other. Replaces Grapevine-Intranet replaces grapevine as it permits inter employee communication with more transparency and free expression of views. It enables employees at various levels to pose problems/questions, participate in discussions and contribute answers to thorny problems of the company. The concept of collective expertise can be given a concrete shape with the help of Intranet. Improves Productivity- It improves productivity of the manager. With Intranet, the manager can spend more time in analysing information and not in seeking information and waiting for its delivery. Eliminates latency of information- Intranet helps in eliminating the latency of information in the enterprise and makes the flow of information need-driven than availability-driven.

Disadvantages of Intranet
Security-One of the major disadvantages is the risk of security to the corporate information resource. The intranet exposes the corporate information resource to the risk of loss of privacy and even unauthorised alteration. The Intranet technology is still quite fragile and the risk of security and privacy of information on Intranet is higher. Less Face to Face Interaction - Another fear that is being talked about these days is the danger of reduced face-to-face interaction between employees leading to impersonalisation of the enterprise. Training- proper training is required for the staff or personnel to operate the systems with intranet .Ineffective use of the system can create the serious problems. Other Disadvantages-

Extranet
Extranet is an Intranet for outside authorized users using same internet technology. Inter-organizational information system. enable outsiders to work together with companys employees.
open to selected suppliers, customers & other business partners

An extranet is somewhat very similar to an intranet. Extranets are designed specifically to give external, limited access to certain files of your computer systems to Certain large or priviledged customers, Selected industry partners, Suppliers and subcontractors... etc.

Extranets connect the interconnected enterprises to consumers, business customers, suppliers and other business partners (Role of Extranet)
Consumers Partners Consultants Contractors Joint design Outsourcing Customer Self-Service Online Sales and Marketing Sales Force Automation Build-to-Order products Just-in-Time Ordering

Internetworked Enterprise

Suppliers and Distributers

Distributer management SCM Procurement

Business Customers

Advantages of Extranet
Improves Efficiency-Extranet helps in improve company efficiency and output by automating procedures that were done manually in the past. Automation can also decrease the scope of mistake. Fast and Quick Working-- Work is done quickly as compared to past manual systems. Timely access of the Required Information- Extranets permit company information to be analyzed at period suitable for business customers, partners, suppliers, employees, and other stake-holders. This helps in cutting down the conference/meeting times and is also helpful when doing multinational business having with partners located in different countries and in different time zones. Updated Information- Information can be modified, updated and changed immediately on anextranet. All approved members thus have instant access to the most advanced information. Improved Relationship with business stakeholders- Extranets can help in improving relationships with main or potential customers by giving them correct, precise and efficient information.

Disadvantages of Extranet
Costly-Extranets can be costly to apply and maintain within an organization. Security- One of big problem is the protection of extranets when dealing with precious information. System access should be controlled and checkedproperly to protect the system and information going into the incorrect hands. Reduce face to face interaction with clients and business partners- Extranets can decrease personal face-to-face contact with clients and business partners. This can cause a lack of communication between employees, clients and organization.

Difference between Intranet and Extranet


Point of Difference Definition Intranet An intranet is an information portal designed specifically for the internal communications of small, medium or large businesses, enterprises, governments, industries or financial institutions of any size or complexity Intranets can be custom-designed to fit the exact needs of businesses no matter where they are situated. Extranet Extranet is an Intranet for outside authorized users using same internet technology.

Design

Extranets are designed specifically to give external, limited access to certain files of your computer systems to Certain large or priviledged customers, Selected industry partners, Suppliers and subcontractors... etc. Between an organization and a supplier

Geographical Distance

Within an organization

Entities Security Communication Users

Employees Internal Risk Intra-Firm Users of intranets consists mainly of Members of the executive team, Accounting and order billing. Managers and directors, Sales people

Clients, Suppliers, contractors,subcontractors Risk from the parties involved Inter-Firm Certain large or priviledged customers, Selected industry partners, Suppliers and subcontractors... etc.

What is Network
A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites. Telecommunication Network Generally a communication network is an arrangement in which a sender transmits a message to a receiver over a channel consisting of some type of medium. Figure given below shows a simple conceptual model of a telecommunication network ,which shows that it consists of five basic categories of components:

Key Telecommunications Network Component categories and examples

Types of Telecommunications networks.

There are many different types of telecommunications networks. However, from an end user point of view, there are only a few basic types, such as: 1.Wide area networks 2.Local area networks 3.Interconnected networks like the Internet, Internets, and extranets 4.Client/server and interorganizational networks

Types of Telecommunications networks.


Local Area Network A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building. A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring. Wide Area Network Wide Area Networks (WANs) connect networks in larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of global network. Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of seconds, without paying enormous phone bills. Two users a half-world apart with workstations equipped with microphones and a webcams might teleconference in real time. A WAN is complicated. It uses multiplexers, bridges, and routers to connect local and metropolitan networks to global communications networks like the Internet. To users, however, a WAN will not appear to be much different than a LAN.

Types of Telecommunications networks.


Metropolitan Area Network A network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A MAN is typically owned an operated by a single entity such as a government body or large corporation. A metropolitan area network (MAN) is a computer network in which two or more computers or communicating devices or networks which are geographically separated but in same metropolitan city and are connected to each other are said to be connected on MAN. Metropolitan limits are determined by local municipal corporations; the larger the city, the bigger the MAN, the smaller a metro city, smaller the MAN. Kenneth C. Laudan and Jane P. Laudon define a metropolitan area network as: A Metropolitan Area Network (MAN) is a large computer network that spans a metropolitan area or campus. Its geographic scope falls between a WAN and LAN. MANs provide Internet connectivity for LANs in a metropolitan region, and connect them to wider area networks like the Internet. Campus Area Network A network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus. A campus network, campus area network, corporate area network or CAN is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. The networking equipments (switches, routers) and transmission media (optical fiber,.) are almost entirely owned by the campus tenant / owner: an enterprise, university, government etc

Client/server networks

Client/server networks have become the predominate information architecture of enterprise computing. Computing power has rapidly become distributed and interconnected throughout many organizations by networked computer systems that take the form of client/server networks.

Characteristics of a client/server network are: 1.End user PC or NC workstations are the clients. 2.Clients are interconnected by local area networks and share application processing with network servers, which also manage the networks. 3.LANs may be interconnected to other LANs and wide area networks of client workstations and servers.

Many organizations use Virtual Private Network to establish secure intranets and extranets.A virtual Private network is a secure network that uses the Internet as its main backbone network but relies on network firewalls, encryption,and other security features of its Internet and intranet connections Thus, for example, VPNs would enable a company to use the Internet to establish secure intranets between its distant branch offices and the manufacturing plants, and secure extranets between itself and its customers and suppliers. Virtual private networks (VPN) provide an encrypted connection between a user's distributed sites over a public network (e.g., the Internet). By contrast, a private network uses dedicated circuits and possibly encryption. For the time being ,we can think of a VPN as a pipe travelling through the Internet. Through this pipe ,we can send and receive our data without anyone outside the pipe being able to see or access our transmissions . Using this approach we can create a private network without incurring the high cost of a separate proprietory connection scheme. An example of a Virtual Private Network protected by network firewalls.

Virtual Private Network

Peer to Peer Networks


In a P2P network it creates a computing environment where end users computers connect, communicate, and collaborate directly with each other via Internet or other telecommunications network links. The emergence of peer-to-peer (P2P) networking technologies and applications is being hailed as a development that will revolutionize e-business and e-commerce and the Internet itself. Peer-to-peer network is a powerful telecommunications networking tool for many business applications . There can be two major models of peer to peer networking In the central server architecture ,P2P file sharing software connects your PC to a central server that contains a directory of all other users(peers) in the network . When you request a file ,the software searches the directory for any other users who have that file and are online at that moment . It then sends you alist of usernames that are activelinks to all such users.Clicking on one of these user mames prompts the software to connect your PC to that users PC (making a peer to peer connection)and automatically transfers the file you want from his or her hard drive to yours. The Pure peer to peer networks architecture has no central directory or server .First the file sharing software in the P2P network connects your PC with one of the online users in the network .Then an active link to your user name is transmitted from peer to peer to all the online users in the network that the first user (and the other online users ) encountered in previous sessions.In this way ,active links to more and more peers spread throughout the network the more it is used.When you request a file ,the software searches every online user and sends you a list of active file names related to your request .Clicking on one of these automatically transfers the file from that users hard drive to yours.

The two major forms of Peer to Peer Network.

a. Twisted Pair wire a.

b. Coaxial Cable

c. Fiber-optic cable

b.

Fiber Optics: Fiber optics- These cables are made up of plastic or glass fibre core covered by a cladding of lower refractive index. The signals in these cables are carried in the form of light . use cables consisting of one or more hair-thin filaments of glass fiber wrapped in a protective jacket. 1.Relatively low cost 2.Can carry digital signals, as well as analog thus increase communications and capability. 3..Provide substantial size and weight reductions 4.Provide increased speed and greater carrying capacity than coaxial cable and twisted-pair lines. 5..Speed of communications is 10,000 times faster than that of microwave and satellite systems. 6.Message security as fiber optics communications is very resistant to illegal data theft, taps can be easily detected.

Telecommunications Processors
Telecommunications Processors such as modems ,multiplexers ,switches and routers perform a variety of support functions between the computers and other devices in a telecommunications network. Modems A special device called modem (modulator/demodulator ) is used to carry out the process of modulation and demodulation(conversion of digital data to analog form and vice versa ). Hence when an analog facility is used for data communication between two digital devices (say two computers interconnected by a telephone line ),two modems are required ,one near each device .Digital signal generated at sender computers end is converted to analog form by modulator of the modem placed near it.The analog signal is transmitted through telephone line and is converted to digital form by demodulator of the modem placed near receiver computer.The receiver computer processes the data,and thjen the modem near it modulates the processed data to analog form .the analog data is returned via telephone line to the sender computer end ,where analog signals are demodulated to digital form first by the modem there ,and then the digital data is passed on to the sender computer.

Multiplexer-A mutiplexer takes several data communication lines or signals ,and converts them into one data communication line or signal at the sending end .For example ,the multiplexer takes the signals from the four terminals and converts them into one large signal that is transmitted over one communication line.Then,at the receiving end ,another multiplexer breaks the single large signal into the four original signals .Without multiplexers ,four separate communication lines would be required. A multiplexer is a communication process or that allows a single communication channel to carry simultaneous data transmission from many terminals. For example if we need to have eight telephone numbers for a small business,we could have eight individual lines come into the building one for each telephone number .using a digital multiplexer however,we can have one line handle all eight telephone numbers (assuming we have an eight channel multiplexer).

ROUTER- A router is a device that forwards data packets between computer networks. This creates an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node

Digital And Analog Signals


Analog and digital signals are used to transmit information, usually through electric signals. In both these technologies, the information, such as any audio or video, is transformed into electric signals. When data is propagated by means of electrical signals ,the signals may be either in digital or analog form Analog signal : Transmitted power varies over a continuous range .Example sound,light and radio waves. Digital signal: Sequence of voltage pulses represented in binary form Computer generated data signal is digital, whereas telephone line carry analog signals.

Communication Protocols
A protocol is a set of formal operating rules ,procedures ,or conventions that govern a given process. A communication or network protocol, therefore describes rules that govern transmission of data over communication networks.These rules provide a method for orderly and efficient exchange of data between sender and receiver.These rules are embedded in data communication software. Roles of A communication Protocol 1.Data Sequencing- It refers to breaking a long message into small packets of fixed size 2. Data Routing- Routing is designed to find the most efficient path between source and destinations nodes of a message. 3. Data Formatting- These rules define which bits or characters within a packet constitutes data ,control,addressing ,or other information 4. Flow Control- A communication protocol also prevents a fast sender from flooding a slow receiver with data 5. Error Control- These rules are designed to detecty error in messages and to ensure transmission of correct messages. 6.Precedence and order of transmission- these rules ensures that all nodes get a chance to use communication lines and other resources of a network based on priorities assigned to them. 7. Connection establishment and termination- These rules define how connections are established ,maintained and terminated when two nodes of a network want to communicate with each other. 8.Data Security- Providing data security and privacy is also built into most communication software packages .It prevents access of data by unauthorized users.

The OSI Model


OSI (Open Systems Interconnection) is a standard description or "reference model" for how messages should be transmitted between any two points in a telecommunication network. Its purpose is to guide product implementors so that their products will consistently work with other products. The reference model defines seven layers of functions that take place at each end of a communication. The main idea in OSI is that the process of communication between two end points in a telecommunication network can be divided into layers, with each layer adding its own set of special, related functions. Each communicating user or program is at a computer equipped with these seven layers of function. So, in a given message between users, there will be a flow of data through each layer at one end down through the layers in that computer and, at the other end, when the message arrives, another flow of data up through the layers in the receiving computer and ultimately to the end user or program. OSI divides telecommunication into seven layers. The layers are in two groups. The upper four layers are used whenever a message passes from or to a user. The lower three layers (up to the network layer) are used when any message passes through the host computer. Messages intended for this computer pass to the upper layers

The OSI Model


The seven layers are: Layer 7: The application layer...This is the layer at which communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. (This layer is not the application itself, although some applications may perform application layer functions.) Layer 6: The presentation layer...This is a layer, usually part of an operating system, that converts incoming and outgoing data from one presentation format to another. Layer 5: The session layer...This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the applications at each end. It deals with session and connection coordination. Layer 4: The transport layer...This layer manages the end-to-end control (for example, determining whether all packets have arrived) and error-checking. It ensures complete data transfer. Layer 3: The network layer...This layer handles the routing of the data (sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does routing and forwarding. Layer 2: The data-link layer...This layer provides synchronization for the physical level and does bitstuffing for strings of 1's in excess of 5. It furnishes transmission protocol knowledge and management. Layer 1: The physical layer...This layer conveys the bit stream through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier.

Use of Extranet to streamline supply chain management


The supply chain according to Laudon and Laudon is a collection of physical entities linked together into processes that supply goods or services from source through consumption (2000). The physical entities in the supply chain consist of suppliers, manufacturers, distributors, retail outlets, and consumers. The following diagram demonstrates the flow of goods through the supply chain starting with the supplier and ending with the consumer.

Explain Malware, Adware and Spyware


Spyware is software that gathers information about you, your browsing and Internet usage habits, as well as other data. Adware is software that displays advertising banners, re-directs you to websites, and otherwise conducts advertising on your computer (not to be confused with popup ads, which come from the websites that you visit). Malware is malicious software that is intended to do harm to your computer or software. Malware includes viruses, Trojans, and worms. Many users inadvertently download spyware or adware when downloading other programs. Many popular peer to peer applications and other software packages include adware or spyware packages. Even seemingly innocuous programs such as special cursors can contain spyware.

What do you mean by e commerce ? Differentiate it with ebusiness giving practical examples
Electronic commerce or e-commerce has been defined as the ability to perform transactions involving the exchange of goods or services between two or more parties using electronic tools and technique. The explosion of E-commerce has created new phenomena in our lifestyle especially in shopping activities. Consumers can easily buy products or services like magazines and airlines tickets via Internet. Kalakota and Whintons in 1997 defined the term E-commerce from different perspectives. These perspectives are: Communication Perspective: According to this perspective, E-commerce is the delivery of information, product/services or payments over tele-communication channels, computer networks or any other electronic mode of communication. Business Process Perspective: This says that E-commerce is the application of technology towards the automation of business transactions and work flow. Service Perspective: E-commerce is defines as a tool that addresses the desire of firms, consumers and management to cut service cost while improving the quality of goods/services and increasing the speed of service delivery. Online Perspective: E-commerce provides the capability of buying and selling products and information on the internet and other online services.

Types of E-Commerce There are five major segments under the broader category of e-business. However, the following are some popular e-commerce models used by companies engaged in ecommerce:Business to Business E-commerce (B2B) Business to business e-commerce is smart business. The opportunity for business to business e-commerce is even greater. In a B2B transaction, the interaction is between businesses. For example, a website that is catching for the steel industry might have facility for buyers and sellers to list their requirements and post their products. It helps them in quickly closing the transactions and the buyer can get quality, material and can choose from different suppliers. Business to Consumers E-commerce (B2C) It is for the customers to buy stores from the web. The problem to be recognized in this is to secure payment, using encryption, transaction integrity, quick response, time and reliability. B2C e-commerce involves selling of goods and services to consumers or end users. It allows them to browse the product catalogue, select products or services and complete the order online. In a B2C transaction, the interaction is between a consumer and the preferred business. For example, the most popular site is amazon.com, which is the first online bookseller which has proved a potential competitor to the traditional bricks and mortar booksellers such as Barrens and Noble. Consumer to Consumer E-commerce (C2C) Here interaction is between consumer to consumer. For example, in sites like e-Buy Bid or Buy.com, Baazi.com which are auction sites, one can virtually sell and buy any goods (either used or new ones). This form of ecommerce is nothing but the cyber version of the good old auction houses. If anyone wants to sell anything, all one has to do is post a message on the site, giving details of the product and the expected price and wait for an interested customer to turn up and buy it. The buyer gets in touch with the seller through the Internet and the deal is crossed once the amount is finalised.

Consumer-to-Business E-commerce (C2B) E-commerce, by empowering the customer, has been strategically redefining business. An example of C2B model of e-commerce is the site Price line.Com, which allows prospective airline travellers, tourists in need of hotel reservations etc. to visit its websites and indicate their preferred price for travel between any two cities. If an airline is willing to issue a ticket on the customers offered price, the consumer can then travel to the mentioned destination at his terms. Business to Employees E-commerce (B2E) This is concerned more with marketing a corporation's internal processes more efficiently. Customer care and support activities also hold ground. The requirement is that are all self-service with applications on the web that the employees can use themselves.

Difference Between E commerce And E Business


The terms e-business and e-commerce are now often seen and used interchangeably. However, though related, they have different meanings. The e prefix means electronic which connotes any activity or transaction done without any physical exchanges or contact. E-commerce implies business transactions over the internet where the parties involve are either selling or buying. The transactions conducted in e-commerce basically involve the transfer or handing over ownership and rights to products or services. E-commerce principally involves money exchanges in the transactions. In e-business, as it is broader, it is not limited to monetary transactions. All aspects in business are included like marketing, product design, supply management, etc. E-business is more about making great products, brainstorming and giving quality service, planning about product exposure and executing it. Many companies have an eCommerce site but are not yet an eBusiness. eCommerce is the online selling component of a web site. eBusiness is the integration of a company's activities including products, procedures, and services with the Internet. You turn your company from a business into an eBusiness when you integrate your sales, marketing, accounting, manufacturing, and operations with your web site activities. An eBusiness uses the Internet as fully integrated channel for all business activities. The following is an example of a company that has not yet become an eBusiness: You visit a retailer's web site and buy a shirt. When the shirt arrives it is in the wrong size. You decide to return the shirt at the store's retail outlet instead of mailing it back to the vendor. However, when you go to the store you are told that they cannot take returns from their web site. Since the web site is not integrated with the rest of their business activities this company is not yet an eBusiness. If the company had integrated their web site with their stores by providing access to their web site from within the store, by accepting exchanges for sales made online, and by training their people to support customers from/with their web site, they would be an eBusiness. eBusinesses do not consider the web site as a separate activity from their core businesses: The web site is integral to all activities at an eBusiness.

What do you mean by software Packages? Describe six software packages in brief.
. A software package is a group of programs which are bundled together to serve a common purpose. Often, a software package will also include the source code that built the executable programs as well as a variety of documentation for the programs themselves. Some software packages will also include example files that can further illustrate how the other components of the package work. The components of a software package can do significantly different things, but all the components of the package come together in a unified whole. Some software packages have one main program that encapsulates all the smaller programs, while others take a more fragmented approach and have multiple small, specialized executables for different purposes. There are advantages and disadvantages to each approach, as well as specific audiences that benefit from each. Packages that encapsulate all their functionality into one large program are useful for most computer users. They are usually easy to install, relatively easy to understand, and fairly easy to run. At times, a user can download add-ons for them, but this is all done behind the scenes with minimal interaction and effort from that user. All-in-one software packages like these are available for many purposes, from document management to 3D modeling and image rendering. Software package may refer to: Package (package management system), A piece of application software or utility software A software suite or collection of related application or utility software.

Types of Software Packages 1.Word processor -Word processing is usually what leads people to using a computer for their work. Word processors will normally have the following capabilities built into them: Spell checking Standard layouts for normal documents Have some characters appear in bold print, italics, or underlined Center lines, make text line up on the left side of the paper, or the right side of the paper Save the document so it can be used again print the document. Two of the most common word processing programs are WordPerfect and Microsoft Word. 2.Spreadsheets- The spreadsheet packages are designed to use numbers and formulas to do calculations with ease. Examples of spreadsheets include: Budgets Payrolls Grade Calculations Address Lists The most commonly used spreadsheet programs are Microsoft Excel and Lotus 123. 3.Databases- Database programs are designed for these types of applications: Membership lists Student lists Grade reports Instructor schedules All of these have to be maintained so you can find what you need quickly and accurately. Some of the most commonly used database programs are Microsoft Access and dBASE.

4.Graphic presentations-The presentation programs can make giving presentations and using overheads easier. Other uses include: Slide Shows Repeating Computer Presentations on a computer monitor Using Sound and animation in slide shows The most recognized graphic presentation programs are Microsoft PowerPoint and Harvard Graphics. 5.Web Browsers -Web Browsers provide an easy to surf the Internet. Use search engines to find people, places, and things world-wide. Create your own web page to tell the world about you and your job. Advertise your company and special activities. To date, no other planet has placed web pages on the web but nothing should surprise you!The two most popular web browsers are Netscape and Microsoft Internet Explorer. 6.Groupware- Groupware is a software that helps workgroups and teams collaborate to accomplish group assignments.Groupware is a category of general purpose application software that combines a variety of software features and functions to facilitate collaboration.Groupware products rely on the internet and corporate intranets and extranets to make collaboration possible on a global scale by virtual teams located anywhere in the world.For example team members might use the Internet for global email,project discussion forums and joint web page development

What do you mean by operating system? Describe three

operating systems in detail

The most important system software package for any computer is its operating system. An operating system is an integrated system of programs that manages the operations of the CPU, controls the input/output and storage resources and activities of the computer system, and provides various support services as the computer executes the application programs of users. The primary purpose of an operating system is to maximize the productivity of a computer system by operating it in the most efficient manner. An operating system minimizes the amount of human intervention required during processing. It helps your application programs perform common operations such as accessing a network,entering data, saving and retrieving files, and printing or displaying output. If you have any hands-on experience on a computer, you know that the operating system must be loaded and activated before you can accomplish other tasks. This emphasizes the fact that operating systems are the most indispensable components of the software interface between users and the hardware of their computer systems.

Three Operating Systems


UNIX Originally developed by AT&T, UNIX now is also offered by other vendors, including Solaris by Sun Microsystems and AIX by IBM. UNIX is a multitasking, multiuser, network-managing operating system whose portability allows it to run on mainframes, midrange computers, and microcomputers. UNIX is still a popular choice for Web and other network servers. LINUX Linux is a low-cost, powerful, and reliable UNIX-like operating system that is rapidly gaining market share from UNIX and Windows servers as a high-performance operating system for network servers and Web servers in both small and large networks. Linux was developed as free or low-cost shareware or open-source software over the Internet in the 1990s by Linus Torvald of Finland and millions of programmers around the world. Linux is still being enhanced in this way, but is sold with extra features and support services by software vendors such as Red Hat, Caldera, and SUSE Linux. PC versions, which support office software suites, Web browsers, and other application software, are also available. Mac OS X Actually based on a form of UNIX, the Mac OS X is the latest operating system from Apple for the iMac and other Macintosh microcomputers. The Mac OS X version 10.2 Jaguar has an advanced graphical user interface and multitasking and multimedia capabilities, along with an integrated Web browser, email, instant messaging, search engine, digital media player, and many other features.

Assignment
What do you mean by Microsoft office? Define its attributes in detail with its use and importance. Define contemporary issues of e-commerce in India with its counterparts in ASIA.

S-ar putea să vă placă și