E-commerce

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 63

E-commerce

UNIT III
eCommerce architecture is a framework of an online ecommerce platform with all
the design and other technical details and components that help to sell and buy
goods. The term embraces everything, from the front-end user interface to the
back-end server infrastructure.
The architecture model in ecommerce is the way all the technical components and
structures are organized to provide the needed layers, subsystems, and components
of an ecommerce platform and interact between them.

Layers
User Interface (UI) Layer
Presentation Layer
Application Layer
Middleware Layer
Data Layer
Security Layer
Infrastructure Layer
Analytics and Reporting Layer
External Interfaces

Services
1. Application service
Composed of existing and future application
C to B
B to B
Intra organization

2. Brokerage services
 This is used to represent an intermediary which provides services between
customer and information provider and give some constraints such as low
price, fast service, max profit.
 This adds value to the information received.
 Can support data management and transaction services.
 This uses software agent to do the work.
3. Interface support layer
 This will provide interface of e commerce applications such as interactive
catalogs.
 And the customized interface to consumer applications such as home shopping.
Directories on the other hand operate behind the scenes and attempt to organize
the huge amount of information and transactions generated to e commerce.

4. Secure messaging & EDI


 Messaging is software that sits in between the network infrastructure and
clients or e commerce application.
 This offers the solution for communicating in formatted (order, shipping notice
and invoice etc.) and, in the form of formatted data (letters, memo, reports etc.)
 Messaging supports both immediate and delay messaging.

5. Middleware, structured document interchange


 It is a new concept.
 It is a mediator between different software programmers that enables them to
talk with one other.
 It solves all the interface, translation, transformation, and interpretation
problems.
 This is to move from application centric to data centric.
 To achieve data centric, we must follow three elements transparency, security
and objects and document.
6. Network infrastructure and provide communication services
 Protocols such as IP and TCP.

WWW as the Architecture


The World Wide Web (WWW) is not just a collection of websites; it also refers
to the architecture behind its functionality. The architecture of the World Wide
Web is based on several core principles and components that allow it to operate on
a global scale.
1. Client-Server Architecture
Client: This is typically a user's web browser (e.g., Chrome, Firefox), which sends
requests to the server to fetch web resources like HTML, CSS, JavaScript, or
images.
Server: These are web servers that store and serve resources requested by the
client. When a client requests a web page, the server responds by delivering the
requested page and related resources.
2. Uniform Resource Identifier (URI)
Every resource on the web is identified by a unique address known as a URI
(which includes URLs). A URI allows users and systems to locate specific
resources, whether it is a webpage, an image, or a downloadable file.
3. HTTP Protocol
The Hypertext Transfer Protocol (HTTP) is the communication protocol used
between web clients (browsers) and servers. When you enter a URL into your
browser, it sends an HTTP request to the server, which responds with the resource
(such as an HTML file) requested.
HTTPS adds a layer of encryption via SSL/TLS for secure data transmission over
the web.
4. HTML (Hypertext Markup Language)
HTML is the standard language used to create web pages. It structures the content
on a webpage, organizing it into elements like headings, paragraphs, links, and
images. Browsers interpret this markup and display the web page in a readable
format for users.
5. CSS (Cascading Style Sheets)
CSS is used to control the presentation of HTML content. It allows web
developers to separate content (HTML) from design (CSS), making web pages
more visually appealing by adding layouts, colors, and fonts.
6. JavaScript
JavaScript is a scripting language that enables dynamic content on web pages.
While HTML defines the structure and CSS defines the style, JavaScript adds
interactivity, such as form validation, content updates without reloading the page
(AJAX), and animations.
7. Web Servers
Web servers store the files (HTML, CSS, JavaScript, images, etc.) that make up
websites and deliver them to users' browsers when requested.
Popular web server software includes Apache, Nginx, and Microsoft IIS.
8. APIs (Application Programming Interfaces)
APIs allow different software systems to communicate with each other. On the
web, APIs like RESTful or GraphQL APIs enable client applications to retrieve
data from web servers programmatically.
9. DNS (Domain Name System)
The DNS translates human-readable domain names (e.g., www.example.com) into
IP addresses that are used to locate and communicate with web servers.
10. Front-end and Back-end Separation
Modern web architecture often separates the front end (user-facing side) and back
end (server-side) into distinct layers:
a. Front-end: The client-side, which includes HTML, CSS, and JavaScript
that run in the browser.
b. Back-end: The server-side code, which processes requests, interacts with
databases, and sends data to the client.
11. Cookies and Sessions
Cookies store small pieces of data (like login status or user preferences) in the
user's browser for a consistent browsing experience.
Sessions enable servers to maintain state across multiple requests from the same
user.
Technology behind the web
The web is powered by a blend of technologies that enable browsing, data transfer,
interactivity, and more.
1. Protocols and Standards
HTTP/HTTPS (Hypertext Transfer Protocol/Secure): HTTP allows browsers
and servers to communicate by requesting and transferring web pages and
resources. HTTPS is the secure version, encrypting data to protect privacy.
TCP/IP (Transmission Control Protocol/Internet Protocol): This foundational
protocol suite enables reliable data transfer across the internet, handling how data
packets travel from source to destination.
DNS (Domain Name System): DNS translates human-friendly URLs (like
www.example.com) into IP addresses that computers use to find each other.
2. Markup, Styling, and Scripting Languages
HTML (Hypertext Markup Language): HTML is the primary language for
creating web page structure. It defines elements like headings, paragraphs, links,
and images.
CSS (Cascading Style Sheets): CSS is used to style HTML elements. It controls
layout, colors, fonts, and overall page design, helping separate structure (HTML)
from presentation.
JavaScript: JavaScript brings interactivity to web pages. It can create dynamic
content, handle user events (like clicks or input), and communicate with web
servers.
3. Client-Server Architecture
Web Browser: The client-side application that users interact with (like Chrome,
Safari, or Firefox). Browsers render HTML, CSS, and JavaScript into a visual
interface.
Web Server: A server (e.g., Apache, Nginx) hosts web content and serves it to
clients. It handles requests, retrieves files, and may also serve dynamic content.
Databases: Databases (e.g., MySQL, MongoDB) store data that power dynamic
websites, allowing users to interact with information on a website, like profiles,
comments, and more.
4. Frameworks and Libraries
Front-End Frameworks: Libraries like React, Angular, and Vue help developers
build complex UIs by managing state, components, and user interactions.
Back-End Frameworks: Frameworks like Express (for Node.js), Django
(Python), and Ruby on Rails simplify server-side logic, database access, and API
handling.
5. APIs and Web Services
REST and GraphQL APIs: These define how web clients and servers
communicate to exchange data. REST organizes endpoints by resources, while
GraphQL allows more flexible data queries.
SOAP (Simple Object Access Protocol): An older protocol that provides
messaging for distributed environments, often used in enterprise systems.
6. Databases and Storage
Relational Databases: Databases like MySQL and PostgreSQL organize data into
tables and use SQL (Structured Query Language).
NoSQL Databases: Databases like MongoDB and Redis store data more flexibly
(e.g., as documents or key-value pairs), often preferred for scalability.
7. Security
Encryption: Technologies like SSL/TLS protect data in transit, especially
important for HTTPS.
Authentication and Authorization: Techniques like OAuth, JWT, and SAML
ensure users have access only to what they are permitted to.
Firewalls and Anti-DDoS: Tools like Web Application Firewalls (WAFs) protect
web apps from threats by filtering malicious requests and preventing attacks.
Security on the web

Web Security deals with the security of data over the internet/network or web or
while it is being transferred over the internet. Web security is crucial for protecting
web applications, websites, and the underlying servers from malicious attacks and
unauthorized access.
1. Encryption
TLS/SSL: Secure Sockets Layer (SSL) and its successor, Transport Layer
Security (TLS), encrypt data transferred between a user’s browser and a website
server. This is crucial for preventing third parties from intercepting sensitive
information like login credentials or credit card details.
HTTPS: Websites use HTTPS (the secure version of HTTP) to protect data
integrity and confidentiality. HTTPS also helps verify that users are connecting to
the intended website and not a malicious copy.
2. Authentication & Authorization
Authentication: Verifies a user’s identity (e.g., through usernames, passwords,
biometrics, or two-factor authentication).
Authorization: Controls what authenticated users can access and modify. For
instance, role-based access control (RBAC) ensures users only access data and
functionalities necessary for their roles.
3. Data Protection
Data Encryption at Rest: Sensitive data stored on servers should be encrypted,
minimizing risks if servers are compromised.
Data Masking and Hashing: Personal information can be masked or hashed,
protecting sensitive data from unauthorized access while still allowing the site to
function properly.
4. Application Security (OWASP)
Input Validation and Sanitization: Prevents attacks by ensuring that all input
data is verified and filtered before processing.
SQL Injection and Cross-Site Scripting (XSS): Two common vulnerabilities
where attackers manipulate database queries or inject malicious scripts into web
pages. Web applications need secure coding practices to mitigate these risks.
Cross-Site Request Forgery (CSRF): An attacker can trick users into performing
unwanted actions on authenticated websites. CSRF tokens, unique to each session,
help guard against this.
5. Network Security
Firewalls and Intrusion Detection Systems (IDS): Firewalls control incoming
and outgoing network traffic based on security rules. IDS tools monitor traffic to
detect and respond to suspicious activity.
Content Security Policy (CSP): A CSP restricts the sources from which a web
page can load content, helping to prevent XSS attacks.
6. User Education and Awareness
Phishing Awareness: Users should be trained to recognize phishing attempts,
which often aim to steal login credentials or distribute malware.
Social Engineering Awareness: Users should be cautious about sharing personal
information, which can be used by attackers to gain unauthorized access.
7. Security Updates and Patching
Regular Updates: Keeping software, plugins, and systems up to date is crucial to
protect against newly discovered vulnerabilities.
Automated Vulnerability Scanning: Tools can automatically scan web
applications and servers for known security issues and flag outdated or insecure
components.
8. Top Web Security Threats
 Cross-site scripting (XSS)
 SQL Injection
 Phishing
 Ransomware
 Code Injection
 Viruses and worms
 Spyware
 Denial of Service
UNIT V
E-Commerce Catalogs
E-commerce catalogs are the digital equivalents of traditional product catalogs,
displaying all products available on an e-commerce platform in an organized,
accessible format. These catalogs are essential for online stores, as they help
streamline browsing, searching, and purchasing by highlighting product details,
prices, images, and specifications.

Key Elements of E-Commerce Catalogs

1. Product Listings:
a. Each listing typically includes product names, descriptions, prices, and
images. This section should provide all necessary information to help
customers make informed decisions.
2. Product Categories:
a. Categorization is essential for easy navigation. Categories may be
organized by product type, brand, price range, etc., helping users find what
they are looking for without hassle.
3. Search Functionality:
a. A search bar and filters (like color, size, price, etc.) allow users to quickly
find products, improving their shopping experience.
4. Detailed Product Descriptions:
a. These include specifications, dimensions, materials, compatibility, and
other details. Accurate descriptions minimize returns and enhance customer
trust.
5. High-Quality Images and Videos:
a. Images are often the first point of engagement. Multiple views, zoom
features, or even 360-degree videos can provide a more realistic view of the
product.
6. Customer Reviews and Ratings:
a. Reviews offer social proof and can significantly impact purchasing
decisions. Ratings allow users to gauge product quality quickly.
7. Inventory Management:
a. Real-time inventory tracking ensures that only available products are
displayed, reducing instances of canceled orders due to stockouts.
8. Pricing Information:
a. Along with the price, some catalogs display discounts, installment options,
or price comparisons, giving customers a better sense of value.

Types of E-Commerce Catalogs

1. Single-Vendor Catalogs:
a. These are created by businesses that own and manage their inventory. They
are simpler, focusing on the business’s own products.
2. Multi-Vendor Catalogs:
a. Used by marketplaces like Amazon and eBay, these catalogs are extensive,
requiring tools to manage product listings from multiple vendors,
preventing duplication, and ensuring consistency.
3. Service-Based Catalogs:
a. For businesses offering services rather than physical products, the catalog
may list services with descriptions, prices, and booking options.
Information filtering

Information filtering is a process used to manage and refine data or content,


allowing only relevant information to reach the intended user or system. It is
essential for handling large volumes of data effectively, making sure that only
useful or personalized information is accessed. Information filtering systems can
use various techniques, such as:

1. Content-Based Filtering: This approach filters information based on the


characteristics or features of the content itself. It relies on analyzing the actual
content of items and matches these with a user's preferences. For instance, a music
app that suggests songs like what a user has listened to before is using content-
based filtering.
2. Collaborative Filtering: In this method, filtering is based on user behavior and
shared preferences. It identifies patterns among similar users to recommend
content or products. Collaborative filtering is commonly used in recommendation
systems, like those on streaming services or e-commerce platforms.
3. Rule-Based Filtering: In this approach, filters are set according to predefined
rules or criteria. It is often used in email systems, where spam filters operate based
on rules like sender address, keywords, and frequency.
4. Hybrid Filtering: This combines multiple filtering techniques, often content-
based and collaborative methods, to improve accuracy and recommendations. For
example, a movie recommendation system might use both a user's past ratings and
those of other users with similar tastes.
5. Machine Learning and AI-Based Filtering: This involves using algorithms that
learn from data to refine filters over time, especially helpful for complex systems
with dynamic content. Algorithms can predict and personalize recommendations
by analyzing usage patterns and adapting to changing preferences.
Consumer data interface
A Consumer Data Interface (CDI) is a framework or system that enables
consumers to securely access, share, and manage their personal data across
different platforms or services. CDIs are particularly prominent in industries like
finance, healthcare, and digital services, where customer data is sensitive and
needs strong privacy and security protocols.

Key Aspects of a Consumer Data Interface:

1. Data Portability: Allows consumers to move their data between service providers
easily, giving them flexibility and freedom to switch platforms while retaining
control over their personal information.
2. Privacy and Security: Ensures that data is protected from unauthorized access.
Compliance with regulations like GDPR or CCPA is essential, ensuring
consumers’ rights to access, delete, or correct their data.
3. Consent Management: Provides users with transparency and control over how
their data is shared or used, often requiring explicit consent before third parties can
access it.
4. Standardization: Uses standard data formats and APIs to ensure interoperability
across platforms. In finance, for instance, the Open Banking API standards in the
UK and Europe enable CDIs for secure data sharing across different financial
institutions.
5. User Interface (UI): A consumer-friendly UI within a CDI allows users to
manage their data preferences easily. This UI can provide insights into what data
is being shared, for what purposes, and with whom.
6. Data Aggregation: Some CDIs can aggregate data from multiple sources,
allowing consumers to view a comprehensive profile of their data (like
consolidated financial records or medical history) across various service providers.
Software agents
Software agents are autonomous programs that perform tasks on behalf of a user
or other program, often with some level of decision-making and adaptability. They
are designed to handle specific tasks—sometimes in complex environments—by
gathering information, processing data, and taking actions that align with a set of
goals or parameters.

Here are some common types of software agents:

1. Simple Agents: These follow straightforward rules to accomplish a task. They are
typically programmed to react to specific inputs with specific outputs, like
automated customer support agents that respond to keywords.
2. Intelligent Agents: These incorporate artificial intelligence (AI) techniques to
analyze, learn from, and respond to their environment. Examples include
recommendation engines on streaming services or virtual personal assistants like
Siri or Alexa.
3. Mobile Agents: These agents can move across different networked environments.
They carry their own state and can execute tasks on different machines within a
network, such as a web crawler navigating various websites to index data.
4. Multi-Agent Systems (MAS): These involve multiple agents that communicate
and cooperate with each other to achieve a common goal or solve complex
problems. They are commonly used in fields like robotics, traffic management,
and simulations.
5. Collaborative Agents: These work alongside humans or other agents to assist in
decision-making. For instance, in business software, they might help teams
coordinate tasks or track project milestones.

Characteristics

1. Autonomy

 Software agents operate independently of human intervention, making decisions


and taking actions based on pre-set goals, learned behaviors, or defined rules.
2. Reactivity

 Agents sense and respond to changes in their environment. This allows them to
adapt their behavior in real time, responding to new data, altered conditions, or
specific events.

3. Proactivity

 Rather than simply reacting, agents can take the initiative, anticipating actions that
might benefit their goals and performing tasks that push the system toward a
desirable state.

4. Social Ability

 Agents often interact with other agents or humans to collaborate, negotiate, or


share information. Communication is critical in multi-agent systems (MAS),
where agents work together to solve complex problems.

5. Adaptability and Learning

 Intelligent agents can improve their performance by learning from experience,


adapting their behavior over time to optimize outcomes. Machine learning
techniques often enable this characteristic.

6. Mobility

 Some agents, known as mobile agents, can move across different networked
environments, carrying their state and code along. This ability allows them to
execute tasks on multiple systems within a network.

7. Goal-Oriented

 Agents are driven by a set of objectives or goals that guide their behavior and
decision-making processes, allowing them to focus on achieving specific
outcomes efficiently.
8. Persistence

 Software agents run continuously over a period, sometimes indefinitely, until their
goals are achieved, or they are terminated. This is different from regular programs,
which usually execute a specific function and then exit.

9. Coordination and Collaboration

 Agents can coordinate actions with other agents to reach shared goals, especially
in MAS. They might use strategies such as cooperation, negotiation, or
competition, depending on their goals and design.

Properties

1. Belief-Desire-Intention (BDI) Architecture:


a. Some agents are designed using a BDI model, where they are programmed
with "beliefs" (information about their environment), "desires" (objectives
they aim to achieve), and "intentions" (actions they plan to perform).
2. Utility and Optimization:
a. Agents often optimize their actions according to a utility function,
measuring how well they are achieving their goals. This function helps
guide their decision-making.
3. Degree of Intelligence:
a. Depending on their complexity, agents might exhibit varying levels of
intelligence, from simple rule-based behavior to advanced AI-enabled
adaptability and learning.
4. Reliability and Robustness:
a. Agents need to be reliable, especially in critical applications, ensuring
consistent performance and the ability to handle unexpected situations
without crashing or producing incorrect results.
5. Security and Privacy:
a. In applications involving sensitive data, agents must ensure secure handling
and storage of information, protecting against unauthorized access or
malicious interference.
Software agents are integral to AI-driven environments, automating routine tasks,
managing complex systems, and supporting intelligent decision-making across
various domains. Their autonomy, adaptability, and goal-oriented behavior make
them powerful tools for building dynamic, responsive systems.
Technology behind Software Agents

The technology behind software agents combines multiple areas of computer


science, artificial intelligence, and networking. These technologies enable software
agents to autonomously perceive, reason, communicate, and act. Here is a
breakdown of the major technologies used:

1. Artificial Intelligence (AI) and Machine Learning (ML)

 Machine Learning Algorithms: Agents use ML to learn patterns from data and
adapt their actions based on experience. This includes supervised, unsupervised,
and reinforcement learning methods.
 Natural Language Processing (NLP): For agents that interact with humans, NLP
allows them to understand and generate human language, enabling effective
communication in chatbots or virtual assistants.
 Computer Vision: Vision-based agents, such as robots, use computer vision to
interpret visual data, recognize objects, and navigate spaces.
 Knowledge Representation and Reasoning: Technologies like knowledge
graphs and ontologies allow agents to represent and infer the latest information,
making decisions based on stored knowledge.

2. Multi-Agent System (MAS) Frameworks

 Frameworks like JADE (Java Agent Development Framework), FIPA


(Foundation for Intelligent Physical Agents), and TurtleBot for robotics
provide environments where multiple agents can communicate, collaborate, and
coordinate. MAS technologies enable agents to work together to achieve shared
goals or negotiate and compete in cases where goals diverge.

3. Middleware and Agent Platforms

 Middleware technologies, such as CORBA (Common Object Request Broker


Architecture) and Aglets (Java-based mobile agent platform), support agent
communication, movement, and interaction across different systems.
 Cloud-based platforms like Amazon Web Services (AWS), Microsoft Azure, or
Google Cloud Platform (GCP) provide scalable, distributed environments where
agents can perform tasks, store data, and communicate across networks.
4. Communication Protocols

 Agent Communication Languages (ACLs): Specialized languages like KQML


(Knowledge Query and Manipulation Language) and FIPA-ACL (FIPA Agent
Communication Language) enable structured communication among agents.
 Messaging Protocols: Protocols such as MQTT (Message Queuing Telemetry
Transport), AMQP (Advanced Message Queuing Protocol), and REST APIs
facilitate communication in distributed environments, allowing agents to exchange
messages and data.
 Inter-agent Communication Models: Models like blackboard systems (shared
memory) and publish-subscribe systems (message distribution) allow agents to
share information and collaborate.

5. Sensor and IoT Integration

 Many agents in physical environments rely on sensor data from IoT devices to
perceive their environment. IoT platforms like Thing Speak and AWS IoT Core
enable real-time data collection, analysis, and responses from agents.

6. Data Storage and Management

 Agents need data storage solutions to maintain states, learn from historical data,
and retrieve relevant information. Databases, both relational (SQL) and non-
relational (NoSQL, such as MongoDB and Cassandra), are used for structured
data, while distributed file systems (e.g., HDFS) and data lakes (e.g., Amazon S3)
are used for large datasets.
 Knowledge Bases and Ontology-based Systems: These technologies store
structured knowledge about concepts, relationships, and rules, which agents can
use to make informed decisions.

7. Mobile Agent Technologies

 Mobile Code Platforms: Mobile agents, which move across different systems,
rely on technologies that facilitate secure code mobility, like Java’s RMI (Remote
Method Invocation) and Aglets.
 Security Protocols for Mobility: To ensure secure migration and execution,
mobile agents use secure authentication, encryption, and sandboxing techniques to
protect against unauthorized actions.
8. Security and Privacy Technologies

 Encryption and Authentication: Encryption protocols, such as SSL/TLS, help


secure communication between agents. Authentication mechanisms (e.g., OAuth,
Kerberos) are essential for identifying agents and securing their interactions.
 Access Control Mechanisms: Role-based access control (RBAC) and attribute-
based access control (ABAC) systems restrict what agents can do based on their
identity, role, and context.

9. Behavioral and Cognitive Models

 Belief-Desire-Intention (BDI) Architecture: BDI models provide a framework


for agents to reason about their beliefs (perceived knowledge), desires (goals), and
intentions (plans to achieve goals).
 Behavior Trees and Finite State Machines (FSMs): Agents that perform
sequential or conditional actions often use FSMs and behavior trees to model their
responses to different inputs and situations.

10. User Interface (UI) Technologies

 Agents with human interaction capabilities use UI technologies, such as chatbot


frameworks (Dialog flow, Rasa) and virtual avatars (Unreal Engine, Unity), to
create intuitive interfaces for interacting with users.
UNIT IV
Types of payment system
There are many types of electronic payment systems, including:
1. Credit and debit cards: A popular payment method for e-commerce transactions
2. Digital wallets: A convenient way to store payment information and funds, such as
PayPal, Apple Pay, and Google Pay
3. Online bank transfers: A way to move money directly from one bank account to
another
4. Virtual payment cards: A digital version of a physical credit or debit card that can
be assigned unique card numbers and spend categories
5. Electronic fund transfers: A quick and secure way to transfer money between bank
accounts, such as National Electronic Funds Transfer (NEFT) and Real Time
Gross Settlement (RTGS)
6. Automated Clearing House (ACH): An electronic network that moves money
between bank accounts in batches
7. Wire transfer: A way to move funds electronically between financial institutions
8. Real-time payments: A way to facilitate instant transactions between businesses,
such as RTP and Fed Now platforms
9. Contactless payment: A way to conduct transactions by tapping or waving a card
or smartphone near a payment terminal
10. Cryptocurrencies: A payment method that is gaining popularity, but is still
considered risky by many customers
Digital token Electronic Payment Systems

Digital token electronic payment systems are platforms that facilitate transactions
using digital tokens, a type of cryptocurrency or electronic representation of value.
These systems enable secure, quick, and often decentralized payments and
exchanges without relying on traditional banking or centralized systems. Here is a
breakdown of key components and concepts in these systems:

1. Digital Tokens

 Definition: Digital tokens are units of value issued on a blockchain or distributed


ledger technology (DLT). These tokens can represent assets, services, or rights.
 Types:
o Utility Tokens: Used within specific ecosystems or platforms (e.g., access
to software features or services).
o Security Tokens: Represent ownership or investment in real-world assets
like stocks or bonds.
o Stablecoins: Pegged to stable assets like fiat currency (e.g., USD) to reduce
volatility.
o Non-Fungible Tokens (NFTs): Represent unique assets, often used in
digital art or gaming.

2. Electronic Payment Systems (EPS)

 Role in Digital Tokens: EPS enable users to send, receive, and exchange digital
tokens. These systems are typically built on blockchain networks like Ethereum,
Solana, or Binance Smart Chain.
 Examples: PayPal (for certain cryptocurrencies), Cash App, and decentralized
exchanges like Uniswap or Pancake Swap.
 Mechanisms:
o Peer-to-Peer (P2P): Direct transfers between users without intermediaries.
o Smart Contracts: Automated protocols that execute, verify, and enforce
contract terms, often used in decentralized finance (DeFi) applications.
3. Advantages of Digital Token EPS

 Decentralization: Most systems operate on decentralized networks, reducing the


need for intermediaries.
 Speed: Transactions, especially on faster blockchain networks, can be completed
in seconds to minutes.
 Global Reach: Tokens can be sent worldwide with fewer barriers than traditional
banking.
 Lower Costs: Fewer intermediaries often mean lower transaction fees.

4. Security Considerations

 Encryption: Blockchain technology relies on strong encryption to ensure


transaction security.
 User Control: Users often control their private keys, though this requires them to
manage their security responsibly.
 Regulatory Compliance: Some systems, especially those operating within
specific countries, must adhere to KYC (Know Your Customer) and AML (Anti-
Money Laundering) regulations.

5. Challenges

 Scalability: Blockchain networks may face scaling issues, especially during high
demand.
 Volatility: Token values can be volatile, though stablecoins are an exception.
 Security Risks: Hacking, phishing, and smart contract vulnerabilities remain
challenges.
Credit Card Based Electronic Payment Systems

Credit card-based electronic payment systems have revolutionized how


transactions are conducted, enabling quick and secure payments over the internet
and in physical locations. Here is an overview of how they work, their
components, advantages, and challenges:

How They Work

1. Transaction Initiation: A customer initiates a transaction by providing their


credit card information, which may include the card number, expiration date, and
security code (CVV).
2. Authorization: The payment processor forwards the transaction details to the
card-issuing bank for authorization. The bank checks the customer’s account for
sufficient credit and any potential fraud alerts.
3. Transaction Approval/Decline: If the transaction is approved, an authorization
code is generated, allowing the merchant to proceed. If declined, the transaction is
halted.
4. Settlement: Once the transaction is authorized, the merchant submits the
transaction for settlement, where the funds are transferred from the cardholder's
account to the merchant's account. This process may take a few days.
5. Fees: Both merchants and consumers may incur various fees, such as transaction
fees for merchants, annual fees for cardholders, and interest on outstanding
balances.

Components

 Cardholder: The individual using the credit card to make a purchase.


 Merchant: The business or individual selling goods or services.
 Payment Processor: A third-party service that handles the transaction between
the merchant and the cardholder’s bank.
 Card Issuer: The bank or financial institution that provides the credit card to the
consumer.
 Payment Gateway: An online service that authorizes credit card payments for e-
commerce sites, facilitating the communication between the merchant's website
and the payment processor.
Advantages

 Convenience: Enables fast transactions without cash, checks, or physical wallets.


 Security: Many credit cards offer fraud protection and secure transaction
processes, including encryption and tokenization.
 Global Reach: Facilitates international transactions, allowing consumers to shop
from anywhere in the world.
 Record Keeping: Credit card statements provide an easy way to track expenses.

Challenges

 Fraud and Security Risks: Despite security measures, credit card fraud remains a
concern, and consumers may be vulnerable to identity theft.
 Fees: Merchants often bear transaction fees, which can be a burden for small
businesses.
 Disputes and Chargebacks: Customers can dispute transactions, leading to
chargebacks that can impact a merchant's revenue.

Trends and Innovations

 Contactless Payments: The rise of NFC (Near Field Communication) technology


allows for tap-and-go payments, enhancing convenience.
 Mobile Wallets: Integration with mobile payment systems like Apple Pay and
Google Pay offers additional payment options.
 Blockchain and Cryptocurrency: Some systems are exploring the use of
blockchain technology for secure and transparent transactions.
Electronic Payment Systems
Electronic payment systems are methods of conducting financial transactions
electronically, allowing users to pay for goods and services without the need for
cash or physical checks. These systems facilitate secure and efficient transactions
over the internet or through mobile devices. Here are some key components and
types of electronic payment systems:

Key Components

1. Payment Processors: Companies that handle the transaction between the buyer,
seller, and banks, ensuring that payments are completed securely.
2. Payment Gateways: Technology that captures and transfers payment data from
the customer to the merchant's bank.
3. Merchant Accounts: Specialized bank accounts that allow businesses to accept
credit and debit card payments.

Types of Electronic Payment Systems

1. Credit and Debit Cards: Widely used for online and in-store purchases. They
involve a bank issuing a card to the user that can be used for transactions.
2. E-Wallets: Digital wallets (like PayPal, Apple Pay, Google Pay) that store users'
payment information and allow for quick transactions without the need to enter
card details.
3. Bank Transfers: Direct transfer of funds from one bank account to another, often
used for larger transactions or bill payments.
4. Cryptocurrencies: Digital currencies (like Bitcoin, Ethereum) that use blockchain
technology for secure transactions. They can be used for online purchases or
investment.
5. Mobile Payments: Transactions made through mobile devices, often using apps
that allow users to pay via QR codes or NFC technology.
6. Buy Now, Pay Later Services: Financing options that allow customers to make
purchases and pay for them in installments over time (e.g., After pay, Klarna).

Advantages

 Convenience: Easy to make payments anytime and anywhere.


 Speed: Transactions are processed quickly, often in real-time.
 Security: Many systems use encryption and fraud detection measures to protect
user data.
 Record Keeping: Electronic payments provide a digital record of transactions,
making it easier for users to track spending.

Disadvantages

 Security Risks: Potential for fraud and data breaches.


 Fees: Transaction fees can be imposed on businesses and sometimes on
consumers.
 Technical Issues: Dependence on technology means that system outages can
disrupt payments.
Electronic Data Interchange

Electronic Data Interchange (EDI) is the electronic exchange of business


documents and information between organizations in a standardized format. EDI
replaces traditional paper-based communication methods, allowing businesses to
transmit documents like purchase orders, invoices, shipping notices, and other
important information directly from one computer system to another.

Key Features of EDI:

1. Standardization: EDI uses standardized formats, such as ANSI X12 (commonly


used in North America) and EDIFACT (used internationally), which help ensure
that data is consistently interpreted by different systems.
2. Automation: EDI facilitates automated data entry, reducing human error and
speeding up processing times.
3. Cost Efficiency: By eliminating paper, printing, and postage costs, EDI can
significantly lower operational costs for businesses.
4. Improved Accuracy: The automation of data entry and standardized formats
reduces the likelihood of errors that can occur with manual data handling.
5. Faster Transactions: EDI enables quicker processing of transactions, which can
lead to improved business relationships and better supply chain management.

Common EDI Documents:

 Purchase Orders (PO): Orders sent from buyers to suppliers.


 Invoices: Bills sent from suppliers to buyers.
 Advance Shipping Notices (ASN): Notifications about incoming shipments.
 Payment Orders: Instructions for payment transfers.

Implementation of EDI:

To implement EDI, businesses typically need:

 EDI Software: Solutions that facilitate the creation, transmission, and receipt of
EDI documents.
 Trading Partner Agreements: Contracts that define the EDI processes between
business partners.
 Compliance with Standards: Adhering to the relevant EDI standards for
formatting and transmission.

EDI in Different Industries:

EDI is widely used across various sectors, including:

 Retail: For order processing and inventory management.


 Manufacturing: To coordinate supply chains and production schedules.
 Healthcare: For patient records and billing.
 Transportation: For shipment tracking and logistics.

Legal Issues

1. Contractual Obligations: EDI transactions may involve legally binding


agreements between trading partners. It is crucial to clearly define the terms,
conditions, and responsibilities in these agreements to avoid disputes.
2. Regulatory Compliance: Different industries are subject to specific regulations
(e.g., HIPAA in healthcare, PCI DSS for payment data). EDI systems must
comply with these regulations to avoid legal penalties.
3. Recordkeeping Requirements: Businesses may be required by law to retain EDI
documents for a certain period. Establishing a proper document retention policy is
essential for compliance.
4. Dispute Resolution: EDI agreements should include clauses for resolving
disputes that arise from electronic transactions, outlining how issues will be
handled and what legal jurisdictions apply.

Security Issues

1. Data Breaches: EDI systems are susceptible to cyberattacks that can compromise
sensitive information. Organizations must implement robust security measures to
protect data in transit and at rest.
2. Encryption: To safeguard data during transmission, businesses should use
encryption protocols (such as SSL/TLS) to ensure that sensitive information
cannot be intercepted or read by unauthorized parties.
3. Access Controls: Strict access controls must be in place to limit who can access
EDI systems and sensitive data. This may include user authentication, role-based
access controls, and regular audits of access logs.
4. Incident Response Plans: Organizations should have a comprehensive incident
response plan in place to quickly address and mitigate the effects of any security
breaches or data loss incidents.

Privacy Issues

1. Personal Data Protection: EDI transactions may involve the exchange of


personal data. Organizations must ensure that they comply with data protection
laws, such as GDPR in Europe, which imposes strict rules on handling personal
information.
2. Consent Management: For industries that handle personal data, obtaining explicit
consent from individuals before processing their data through EDI systems is often
a legal requirement.
3. Data Minimization: Organizations should only collect and transmit the minimum
amount of personal data necessary for the EDI transaction, reducing the risk of
exposure.
4. Third-Party Risks: When partnering with third-party service providers for EDI
solutions, businesses must ensure that these partners also adhere to privacy
standards and security protocols to protect shared data.
UNIT I
E-commerce Framework
The e commerce framework is related to software frameworks for e commerce
applications. They offer an environment to build an e commerce application quickly.
They are flexible enough to adapt them to user specific requirements.
An e commerce framework should,
1. Allow replacing all parts of the framework.
2. Changes should code itself.
3. Contain code to start the application.
4. Extensible by the user.
5. Define the flow of the program
6. Have a functional domain.
Types
1. Open source
2. Property framework
3. Custom build framework

Core Features

 Product Management: Tools to manage product listings, categories, pricing, and


inventory.
 Shopping Cart and Checkout: Secure and user-friendly systems for adding
products to a cart, managing orders, and processing payments.
 Payment Gateway Integration: Support for various payment methods such as
credit cards, PayPal, and other payment processors.
 User Management: Features for customer accounts, profiles, and permissions.
 SEO and Marketing Tools: Built-in tools or integrations for search engine
optimization, email marketing, and promotional activities.
 Analytics and Reporting: Dashboards and reports to monitor sales, traffic, and
customer behavior.
 Security Features: Protection against fraud, data breaches, and other security
threats, often including SSL support and PCI compliance.
 Scalability: Ability to handle growing numbers of users, products, and
transactions without performance issues.
Benefits
1. Faster in time to manage or market
2. Cost effective
3. Flexibility and customizable
4. Community support

Popular E-Commerce Frameworks

 Magento: Known for its flexibility and scalability, Magento is suitable for both
small businesses and large enterprises.
 Shopify: A hosted solution ideal for businesses that want an easy-to-use platform
with a variety of themes and apps.
 WooCommerce: A WordPress plugin that turns a WordPress site into a fully
functional e-commerce store, popular for its simplicity and flexibility.
 Presta Shop: An open-source platform with a wide range of features and a large
community.
 BigCommerce: A SaaS platform that offers robust features with easy
customization and scalability.
E-Commerce and Media Convergence

E-commerce and media convergence refer to the integration of different media platforms
(such as social media, traditional media, and digital content) with e-commerce, creating a
seamless experience where consumers can engage with content and make purchases
simultaneously. This convergence has transformed businesses market products and
services, consumers shop, and content is monetized.

Key Aspects of E-Commerce and Media Convergence

1. Shoppable Content

 Definition: Shoppable content is media that includes direct links to products,


allowing consumers to purchase items featured in videos, images, or articles
without leaving the content.
 Examples: Instagram's shoppable posts, YouTube's product links in videos, and
Pinterest's buyable pins.
 Impact: This makes the purchasing process more intuitive and seamless, reducing
friction between discovery and purchase.

2. Social Commerce

 Definition: Social commerce involves selling products directly through social


media platforms. It combines social media's interactive nature with the
transactional aspect of e-commerce.
 Examples: Facebook Marketplace, Instagram Shopping, and TikTok's in-app
shopping features.
 Impact: Brands can engage with customers where they spend a lot of time,
leveraging social proof, user-generated content, and influencers to drive sales.

3. Content-Driven Commerce

 Definition: This refers to the integration of e-commerce with content platforms,


where media companies create content specifically designed to drive e-commerce
transactions.
 Examples: Blogs with affiliate links, lifestyle websites with integrated product
recommendations, and media companies launching their own product lines.
 Impact: Content-driven commerce blurs the lines between content consumption
and shopping, making it easier for consumers to purchase products they see in
articles, videos, or other content forms.

4. Influencer Marketing and Affiliate Programs

 Definition: Influencer marketing involves collaborations between brands and


influencers to promote products through social media, blogs, or other content
platforms. Affiliate programs allow content creators to earn commissions by
driving sales through unique referral links.
 Examples: YouTube influencers unboxing products with affiliate links in
descriptions, Instagram influencers promoting brands in stories with swipe-up
links.
 Impact: Influencers can drive significant traffic and sales, particularly among
niche audiences, while affiliate programs offer a measurable ROI for brands.

5. Interactive and Live Streaming Commerce

 Definition: Live streaming commerce involves selling products through real-time


video streams where viewers can interact with hosts and make purchases directly
during the stream.
 Examples: Amazon Live, Instagram Live Shopping, and platforms like Taobao
Live in China.
 Impact: Live streaming commerce creates a sense of urgency and authenticity,
often leading to higher engagement and conversion rates.

6. Omni-Channel Experiences

 Definition: Omni-channel strategies involve creating a unified and seamless


experience across all customer touchpoints, including physical stores, websites,
mobile apps, and social media.
 Examples: A customer viewing a product on Instagram and purchasing it later in
a physical store or receiving personalized recommendations across multiple
channels.
 Impact: Omni-channel experiences enhance customer satisfaction by providing
consistent and personalized interactions, regardless of the platform or device.
Benefits of Media Convergence in E-Commerce

 Enhanced Customer Engagement: Media convergence allows brands to engage


with customers in more interactive and personalized ways, increasing brand
loyalty.
 Increased Sales Opportunities: By integrating shopping into various forms of
media, businesses can reach customers at multiple touchpoints, leading to more
frequent purchases.
 Better Data Insights: Converging media and e-commerce enable businesses to
collect comprehensive data on consumer behavior, improving targeted marketing
efforts.
 Cost Efficiency: Media convergence often allows for more effective use of
marketing budgets, as content and commerce are merged, reducing the need for
separate campaigns.

Challenges

 Complexity of Integration: Combining different media platforms with e-


commerce requires sophisticated technology and a deep understanding of customer
journeys.
 Privacy Concerns: As media and e-commerce converge, there is an increased risk
of privacy issues, particularly around the collection and use of consumer data.
 Content Authenticity: There is a fine line between engaging content and overly
commercialized content, which can alienate audiences if not managed carefully.
The anatomy of E-commerce applications
•Multimedia Content for E-Commerce Applications
•Multimedia Storage Servers & E-Commerce Applications
i. Client-Server Architecture in Electronic Commerce
ii. Internal Processes of Multimedia Servers
iii. Video Servers & E-Commerce
•Information Delivery/Transport & E-Commerce Applications
•Consumer Access Devices

Multimedia Content for E-Commerce Applications


•Multimedia content can be considered both fuel and traffic for electronic commerce
applications.
•The technical definition of multimedia is the use of digital data in more than one format,
such as the combination of text, audio, video, images, graphics, numerical data,
holograms, and animations in a computer file/document. See in Fig.
•Multimedia is associated with Hardware components in different networks.
•The Accessing of multimedia content depends on the hardware capabilities of the
customer.

Multimedia Storage Servers & E-Commerce Applications


•E-Commerce requires robust servers to store and distribute large amounts of digital
content to consumers.

•These Multimedia storage servers are large information warehouses capable of handling
various content, ranging from books, newspapers, advertisement catalogs, movies,
games, & X-ray images.
•These servers, deriving their name because they serve information upon request, must
handle large-scale distribution, guarantee security, & complete reliability

i. Client-Server Architecture in Electronic Commerce


•All e-commerce applications follow the client-server model
•Clients are devices plus software that request information from servers or interact known
as message passing
•Mainframe computing, which meant for “dump”
•The client server model allows clients to interact with server through request-reply
sequence governed by a paradigm known as message passing.
•The server manages application tasks, storage & security & provides scalability-ability
to add more clients and client devices (like Personal digital assistants to Pc’s. See in fig.

ii. Internal Processes of Multimedia Servers


•The internal processes involved in the storage; retrieval & management of multimedia
data objects are integral to e-commerce applications.

•A multimedia server is a hardware & software combination that converts raw data into
usable information & then dishes out.

•It captures, processes, manages, & delivers text, images, audio & video.

•It must be done to handle thousands of simultaneous users.


•Include high-end symmetric multiprocessors, clustered architecture, and massive parallel
systems.

iii. Video Servers & E-Commerce


The electronic commerce applications related to digital video will include
1. Telecommunicating and video conferencing
2. Geographical information systems that require storage &
navigation over maps
3. Corporate multimedia servers
4. Postproduction studios
5. shopping kiosks.
•Consumer applications will include video-on-demand.
•The figure which is of video–on demand consist of video servers, is a link between the
content providers (media) & transport providers (cable operators)
E-commerce consumer applications

E-commerce consumer applications are software solutions designed to facilitate online


shopping and other consumer-related activities. These applications provide consumers
with a platform to browse, purchase, and interact with products and services from the
convenience of their devices. Below are key aspects of e-commerce consumer
applications:

1. Types of E-Commerce Consumer Applications

1.1 Web-Based Applications

 Description: These are e-commerce platforms accessed through web browsers on


desktops, laptops, or mobile devices.
 Examples: Amazon.com, eBay.com, and Walmart.com.
 Features:
o Responsive design for various screen sizes.
o Secure payment gateways.
o User accounts with order history and tracking.
o Search and filter options for product discovery.

1.2 Mobile Applications

 Description: Native or hybrid apps specifically designed for mobile devices like
smartphones and tablets.
 Examples: Amazon app, Alibaba app, and Etsy app.
 Features:
o Push notifications for promotions and order updates.
o One-click purchasing options.
o Mobile-specific payment methods like Apple Pay or Google Pay.
o Augmented reality (AR) features for virtual try-ons or product placement.

1.3 Social Commerce Applications

 Description: Apps or platforms that integrate social networking with e-commerce,


allowing users to shop directly from social media.
 Examples: Instagram Shopping, Facebook Marketplace, and TikTok Shopping.
 Features:
o Shoppable posts and stories.
o Influencer partnerships and sponsored content.
o Community-driven reviews and recommendations.
o In-app purchasing without leaving the social platform.

1.4 Marketplaces

 Description: Online platforms that aggregate products from multiple sellers,


offering consumers a wide variety of choices in one place.
 Examples: Amazon, eBay, and Rakuten.
 Features:
o Seller ratings and reviews.
o Price comparison tools.
o Diverse payment and shipping options.
o Buyer protection programs.

1.5 Subscription Services

 Description: Apps or websites offering products or services on a recurring basis,


such as monthly subscription boxes or media streaming services.
 Examples: Birchbox, Netflix, and Dollar Shave Club.
 Features:
o Personalized product recommendations.
o Flexible subscription management.
o Exclusive content or products for subscribers.
o Seamless recurring billing systems.

2. Key Features of E-Commerce Consumer Applications

2.1 User-Friendly Interface

 Intuitive navigation and design are crucial to providing a smooth shopping


experience, especially for mobile users.
2.2 Secure Payment Processing

 Integration with multiple secure payment gateways, support for various currencies,
and ensuring PCI compliance are vital for consumer trust.

2.3 Personalized Shopping Experience

 Use of AI and machine learning to offer personalized product recommendations,


targeted offers, and content tailored to individual preferences.

2.4 Customer Reviews and Ratings

 Incorporating user-generated content such as reviews and ratings to build trust and
assist other consumers in their purchasing decisions.

2.5 Search and Filter Options

 Advanced search functionality, including filters by category, price, brand, and


other attributes, to help consumers quickly find the products they want.

2.6 Seamless Checkout Process

 Streamlined checkout processes with options like guest checkout, multiple


payment methods, and auto-fill for faster transactions.

2.7 Order Tracking and Customer Support

 Features for real-time order tracking, easy access to customer service, and
handling returns and exchanges efficiently.

3. Benefits for Consumers

 Convenience: Shop anytime, anywhere with the flexibility of mobile and web
applications.
 Variety: Access a vast selection of products from multiple sellers in one platform.
 Personalization: Enjoy tailored shopping experiences based on browsing history,
preferences, and behavior.
 Security: Benefit from secure transactions and buyer protection policies that
increase trust in online shopping.
 Efficiency: Save time with advanced search features, personalized
recommendations, and fast checkout options.

4. Challenges and Considerations

 Security and Privacy: Protecting consumer data and ensuring secure transactions
are top priorities.
 User Experience: Balancing feature richness with simplicity to avoid
overwhelming users, particularly on mobile devices.
 Integration with Other Systems: Ensuring seamless integration with inventory
management, payment processing, and customer support systems.
 Scalability: The ability to handle large volumes of users and transactions,
particularly during peak shopping times like holidays.
E- Commerce Organization Applications.

E-commerce organizations utilize a range of applications to support various aspects of


their operations. These applications fall into multiple categories, including website
management, customer service, sales and marketing, supply chain, data analytics, and
financial management. Here’s an overview of key applications that e-commerce
organizations commonly use:

1. E-commerce Platforms

 Shopify, Magento, WooCommerce, BigCommerce: Provide storefront solutions


for online sales, including website templates, inventory management, and payment
processing.

2. Payment Gateways and Processors

 PayPal, Stripe, Square, Authorize.Net: Facilitate secure online payments,


supporting various payment methods such as credit cards, bank transfers, and
digital wallets.

3. Customer Relationship Management (CRM)

 Salesforce, HubSpot, Zoho CRM, Zendesk: Manage customer data, interactions,


and communication to enhance customer service and increase customer retention.

4. Inventory and Order Management Systems

 NetSuite, TradeGecko, Odoo, Cin7: Track stock levels, manage order


fulfillment, and synchronize inventory across multiple sales channels to ensure
efficient supply chain operations.

5. Marketing Automation and Personalization

 Klaviyo, Mailchimp, ActiveCampaign, Optimizely: Automate email marketing,


retargeting, and personalized content delivery based on customer behavior and
preferences.
6. Search Engine Optimization (SEO) and Analytics

 Google Analytics, Ahrefs, SEMrush, Moz: Provide tools to analyze site traffic,
keyword performance, and customer behavior, aiding in the optimization of online
content and advertisements.

7. Product Information Management (PIM)

 Akeneo, Pimcore, Salsify: Manage product data to maintain accuracy across all
digital touchpoints, improving consistency and quality of product listings.

8. Logistics and Shipping

 ShipStation, Shippo, Easyship, UPS WorldShip: Support order packaging,


shipment tracking, carrier rate comparison, and return processing.

9. Customer Service and Support Tools

 Zendesk, Freshdesk, LiveChat, Intercom: Facilitate customer interactions via


live chat, help desks, ticketing systems, and AI-driven support bots.

10. Enterprise Resource Planning (ERP) Systems

 SAP ERP, Microsoft Dynamics 365, Oracle ERP: Integrate various business
functions like finance, HR, and inventory to ensure streamlined workflows and
real-time data access.

11. Data Analytics and Business Intelligence

 Tableau, Google Data Studio, Power BI: Offer insights into business
performance and customer behavior through data visualization and reporting.

12. Fraud Prevention and Security

 Riskified, Signifyd, Kount: Help protect against fraudulent transactions, ensure


data security, and provide secure customer authentication methods.
13. Content Management Systems (CMS)

 WordPress, Drupal, Contentful: Enable dynamic content management, such as


product descriptions and blogs, while allowing easy updates and publishing.

14. Social Media and Influencer Marketing Tools

 Hootsuite, Buffer, Sprout Social, BuzzSumo: Manage social media presence,


schedule posts, and collaborate with influencers to drive brand awareness.
UNIT II
The Internet Terminology

In e-commerce, various internet and digital marketing terminologies are essential for
understanding online business operations, customer interactions, and strategies. Here are some
key terms:

1. SEO (Search Engine Optimization)

 Techniques used to improve a website's ranking on search engines (e.g., Google) to drive
organic (non-paid) traffic. SEO includes keyword optimization, content creation, and
technical improvements to the website.

2. CPC (Cost Per Click)

 The amount advertisers pay for each click in a pay-per-click (PPC) ad campaign. It
measures the cost-effectiveness of advertising campaigns by analyzing the cost of each
user click.

3. Conversion Rate

 The percentage of users who take a desired action (e.g., purchasing a product, signing up
for a newsletter) compared to the total number of visitors. It's a key metric for gauging
the effectiveness of marketing efforts.

4. Cart Abandonment Rate

 The percentage of users who add items to their shopping cart but leave the site without
completing the purchase. High cart abandonment rates can highlight issues in the
checkout process.

5. Bounce Rate

 The percentage of users who visit a webpage and leave without interacting with other
pages. A high bounce rate may indicate issues with content relevance or page load speed.
6. A/B Testing

 A method of comparing two versions of a web page, app, or ad to see which one
performs better. This helps businesses optimize their sites and marketing campaigns
based on real user data.

7. Affiliate Marketing

 A performance-based marketing strategy where businesses pay affiliates (partners or


influencers) a commission for generating traffic or sales through their referral links.

8. Customer Lifetime Value (CLV)

 An estimate of the total revenue a business can expect from a customer over the course of
their relationship. CLV helps businesses understand long-term profitability.

9. Remarketing / Retargeting

 Techniques used to show targeted ads to users who have previously visited a site but
didn't complete a conversion. These ads appear on other websites, aiming to re-engage
and convert potential customers.

10. Email Drip Campaign

 A series of pre-scheduled, automated emails sent to leads or customers to nurture them


towards a purchase or engagement, based on their behavior or interests.

11. User Experience (UX)

 Refers to the overall experience of a user when interacting with a website or app. Good
UX design focuses on making navigation and interactions smooth, intuitive, and
enjoyable.

12. Omnichannel Marketing

 A strategy that integrates various channels (online, social media, email, in-store) to
provide a seamless customer experience. It allows customers to interact with a brand
consistently across different platforms.
13. CAC (Customer Acquisition Cost)

 The total cost spent on acquiring a new customer. It includes advertising, marketing, and
sales costs and helps businesses measure the efficiency of their customer acquisition
strategies.

14. Fulfillment by Amazon (FBA)

 A service where sellers store their products in Amazon’s warehouses, and Amazon
manages the storage, packaging, and shipping. It’s popular among e-commerce
businesses looking for streamlined logistics.

15. Cross-Selling and Upselling

 Cross-selling involves suggesting complementary products, while upselling encourages


customers to purchase a higher-end version of a product. Both strategies aim to increase
average order value.

16. Payment Gateway

 A service that securely authorizes and processes online transactions for e-commerce sites,
such as PayPal, Stripe, or Square.

17. SSL (Secure Sockets Layer)

 A security protocol for establishing encrypted links between a web server and a browser.
In e-commerce, SSL ensures customer data security during transactions.
NSFNET

The National Science Foundation Network (NSFNET) was a program that connected academic
and research institutions across the United States from 1985 to 1995. It was a key link between
ARPANET and the early public internet, and helped to develop the technical underpinnings of
modern networks.

NSFNET was a program to promote advanced research and education networking in the United
States. It was a crucial link between ARPANET and the commercial networks that served as the
early public internet's foundation.

NSFNET (National Science Foundation Network) was a major part of the early Internet
architecture, established in the late 1980s to promote high-speed communication between
research institutions. It served as a backbone that connected various regional and university
networks across the United States. Here is an overview of its architecture and components:

1. Backbone Network

 Function: The core of NSFNET was a high-speed national backbone network, designed
to handle vast amounts of data traffic. It connected regional networks to each other and
provided access to supercomputing centers.
 Speed: Initially, the NSFNET backbone operated at 56 Kbps, but later upgrades
increased its speed to T1 (1.5 Mbps) and eventually to T3 (45 Mbps) by the early 1990s.

2. Regional Networks

 Function: NSFNET connected several regional networks that served as hubs for
universities, research institutions, and smaller networks. Each regional network managed
traffic within its area and routed data to the national backbone.
 Key Regions: Some key regional networks included SURAnet, BARRNet, and MIDnet,
which served different geographic regions of the U.S.

3. Supercomputer Centers

 Function: NSFNET provided connectivity to supercomputing centers, which offered


access to advanced computational resources for research. These centers played a critical
role in fields like physics, engineering, and biological sciences.
 Examples: Centers included institutions like the San Diego Supercomputer Center
(SDSC), Cornell Theory Center, and Pittsburgh Supercomputing Center.
4. Routers and Packet Switching

 Function: Routers in the NSFNET infrastructure handled packet-switching, directing


data packets between the backbone and regional networks. This allowed efficient data
transmission and redundancy in case of network failures.
 Architecture: Routers at the network nodes used TCP/IP protocols, the standard for
communication over the Internet.

5. Network Operations Center (NOC)

 Function: The NOC was responsible for monitoring the NSFNET backbone to ensure it
ran smoothly, handled traffic efficiently, and responded to any operational issues.
 Management: Merit Network Inc., in partnership with IBM and MCI, managed the NOC
and the day-to-day operations of NSFNET.

6. International Gateways

 Function: NSFNET also supported connections to networks outside the U.S., facilitating
global scientific collaboration. These international gateways allowed researchers from
other countries to access NSFNET and exchange data with U.S. institutions.

7. Transition to Commercial Internet

 Function: In the early 1990s, NSFNET played a key role in transitioning to a more
commercialized Internet infrastructure. As private ISPs began to take over, NSFNET was
decommissioned in 1995, giving way to a decentralized, commercial Internet.

NSFNET Components:

1. Routers:
a. Routers played a critical role in the NSFNET architecture by directing data
between the backbone, regional networks, and institutional networks.
b. They performed packet switching and forwarding based on IP addresses, ensuring
data moved across the network efficiently.
c. Early routers were primarily from companies like Cisco and Proteon.
2. Backbone Nodes:
a. These were the key interconnection points in the backbone network, located at
supercomputer centers and major institutions.
b. Each node hosted multiple routers and other networking equipment to ensure
high-speed data transmission.
c. The backbone nodes were strategically distributed across the U.S., providing
robust and reliable network coverage.
3. Leased Communication Lines:
a. The backbone and regional networks were interconnected using leased lines from
telecommunications providers.
b. These lines were initially slow (56 Kbps) but were upgraded to T1 and later T3
connections to handle increasing traffic.
c. The leased lines ensured reliable, dedicated communication channels between
nodes and across regions.
4. Supercomputing Centers:
a. NSFNET connected various supercomputing centers around the U.S., which were
used for advanced research projects.
b. These centers included facilities like the National Center for Supercomputing
Applications (NCSA) at the University of Illinois.
5. Network Operations Center (NOC):
a. The NOC was responsible for monitoring and maintaining the NSFNET
infrastructure.
b. It ensured the network's stability, identified faults, and coordinated
troubleshooting efforts across the network.
6. Domain Name System (DNS):
a. NSFNET used the DNS to translate human-readable domain names into IP
addresses, allowing users to access resources on the network.
b. This system played a key role in making NSFNET easier to use and navigate.

Evolution of NSFNET:

 NSFNET began as a research network but eventually evolved into the backbone of the
early internet.
 In 1995, NSFNET was officially decommissioned, and its infrastructure was privatized,
leading to the commercial internet we know today.
National Research and Education Network
A NREN specializes, on a national level, in fulfilling the data communications, networking, application
and e-services needs of the host country’s research and education community. NRENs are usually
distinguished by their support of a very-high speed network both at the core and access levels with the
possibility of offering dedicated channels for individual research projects.
Despite the development and proliferation of commercial networks and internet service providers,
NRENs still continue to be launched all over the world. This is due to the fact that the Research and
Education communities often have specific needs in terms of high bandwidth, quality of service, security,
reliability, and availability, that commercial providers can only achieve by means of high investment
levels that are not justified by their commercial business models.

A National Research and Education Network (NREN) is a specialized internet infrastructure


designed specifically to meet the needs of the research and education community within a
country or region. These networks provide high-speed connectivity, advanced digital services,
and resources that support collaborative research, education, and innovation. Here are key
characteristics and functions of NRENs:

1. High-Speed Connectivity

NRENs typically offer ultra-high-speed connections, often much faster than commercial ISPs.
This connectivity is essential for handling large data transfers associated with scientific research,
simulations, and other data-intensive academic applications.

2. Collaboration and Resource Sharing

NRENs enable researchers, educators, and students from different institutions to collaborate
seamlessly. They support joint projects by providing access to cloud resources, shared research
tools, and digital libraries.

3. Network Infrastructure and Services

NRENs offer specialized services, like dedicated high-performance computing (HPC) resources,
virtual learning environments, digital repositories, identity and access management, and security
protocols tailored to academic needs.

4. Regional and International Connectivity

Many NRENs interconnect with other national and regional research networks around the world,
fostering global academic collaboration. Networks like GÉANT in Europe, Internet2 in the U.S.,
and Red CLARA in Latin America are examples of regional NRENs that facilitate cross-border
research partnerships.
5. Funding and Governance

NRENs are often publicly funded, with support from governments, educational institutions, and
research agencies. Governance usually involves representatives from the member institutions,
ensuring that the network’s services align with the needs of its users.

NRENs play a crucial role in advancing research by ensuring that institutions have the digital
infrastructure and support necessary for academic and scientific progress.
Internet Governance

Internet governance refers to the systems, policies, and practices that guide how the internet is
managed, used, and regulated worldwide. It encompasses everything from managing domain
names to setting privacy standards, ensuring data security, and balancing the interests of various
stakeholders, including governments, private companies, non-profits, and individual users.

Key elements of internet governance include:

1. Domain Name System (DNS) Management

 ICANN (Internet Corporation for Assigned Names and Numbers): This non-profit
organization oversees domain name allocations and IP address assignments, ensuring
every device on the internet has a unique identifier. Its policies impact access,
competition, and freedom of expression online.

2. Standards and Protocols

 IETF (Internet Engineering Task Force) and W3C (World Wide Web Consortium):
These organizations establish technical standards to ensure compatibility and
interoperability across devices and networks. This includes protocols like HTTP, TCP/IP,
and web standards such as HTML.

3. Cybersecurity

 Internet governance also involves addressing cybersecurity risks, including cybercrime,


data breaches, and the protection of infrastructure from cyberattacks. Many
organizations, like CERT (Computer Emergency Response Team) groups and the ITU
(International Telecommunication Union), play roles in responding to security threats.

4. Content Regulation and Intellectual Property

 Governance also includes creating frameworks for content regulation, balancing freedom
of expression with concerns over harmful content. Intellectual property laws, including
those overseen by the World Intellectual Property Organization (WIPO), protect
copyrights and patents on digital platforms.
5. Data Privacy and User Rights

 With the massive amount of personal data online, privacy laws like GDPR (General
Data Protection Regulation) in the EU are essential to internet governance. Such laws
aim to protect user privacy and establish user rights over their data.

6. Multistakeholder Model

 Internet governance has traditionally followed a multistakeholder model, where


governments, corporations, civil society, academia, and technical experts collaborate.
This approach aims to be more inclusive, adaptable, and democratic than traditional
models controlled by a single authority.

7. Digital Inclusion and Access

 Ensuring equitable access to the internet, particularly in underserved regions, is a key


governance issue. This includes efforts by global organizations like the United Nations
to promote affordable and accessible internet for all.

Challenges in Internet Governance

 Jurisdictional Issues: Different laws across countries create conflicts regarding what
content is permissible and who controls user data.
 Censorship vs. Freedom of Speech: Balancing national security and freedom of
expression can lead to censorship concerns.
 Power Dynamics: The dominance of large technology companies raises questions about
fair competition and corporate influence on policy.
 Global vs. National Interests: Countries often have different priorities (e.g., censorship,
user privacy), making it challenging to establish globally consistent policies.
An overview of Internet Applications

Internet applications are programs and services that use the internet to provide users with various
forms of communication, information access, and interaction. They enable activities such as
browsing websites, streaming media, social networking, and online shopping. Here's an overview
of major types of internet applications and how they work:

1. Web Browsing Applications

 Examples: Chrome, Firefox, Safari, Edge


 Functionality: Web browsers allow users to access and navigate websites. They interpret
HTML, CSS, and JavaScript to display web pages, enabling users to interact with
content, submit forms, and follow links.
 Protocols: HTTP (Hypertext Transfer Protocol) and HTTPS (secure version of HTTP).

2. Email and Messaging Applications

 Examples: Gmail, Outlook, WhatsApp, Signal


 Functionality: Email and messaging apps allow users to send and receive text,
attachments, and multimedia messages over the internet.
 Protocols: SMTP (Simple Mail Transfer Protocol) for sending, and IMAP or POP3 for
receiving emails; messaging apps often use proprietary protocols over secure, encrypted
connections.

3. Social Media Platforms

 Examples: Facebook, Twitter, Instagram, LinkedIn


 Functionality: Social media platforms enable users to create profiles, connect with
others, share multimedia content, and participate in online communities.
 Protocols: Often HTTPS-based, with data stored in cloud-based databases. Many also
use APIs for third-party integrations.

4. Streaming Media Applications

 Examples: YouTube, Netflix, Spotify


 Functionality: Streaming apps allow users to watch videos or listen to music in real-time
over the internet without needing to download the content.
 Protocols: RTSP (Real-Time Streaming Protocol), HLS (HTTP Live Streaming), and
DASH (Dynamic Adaptive Streaming over HTTP).
5. E-Commerce and Payment Applications

 Examples: Amazon, eBay, PayPal


 Functionality: These platforms allow users to purchase goods and services online.
Payment applications provide secure ways to transfer money.
 Protocols: HTTPS for secure transactions, often integrating with payment gateways and
using tokenization and encryption to protect sensitive information.

6. Cloud Storage and File-Sharing Applications

 Examples: Google Drive, Dropbox, OneDrive


 Functionality: Cloud storage allows users to save files online, access them from different
devices, and share them with others.
 Protocols: HTTPS for secure file transfer and proprietary protocols for storage
management. Often rely on APIs for third-party integrations.

7. Remote Collaboration and Communication Tools

 Examples: Zoom, Microsoft Teams, Slack


 Functionality: These tools enable real-time communication through chat, voice, and
video calls, often supporting file sharing, project management, and integration with other
productivity tools.
 Protocols: WebRTC (Web Real-Time Communication) for voice and video, HTTPS for
chat and file-sharing.

8. Internet of Things (IoT) Applications

 Examples: Smart home apps, wearable health monitors, industrial IoT systems
 Functionality: IoT apps allow remote control and monitoring of connected devices, like
smart thermostats, lights, and health devices.
 Protocols: MQTT (Message Queuing Telemetry Transport), CoAP (Constrained
Application Protocol), and HTTPS.

9. Virtual Reality (VR) and Augmented Reality (AR) Applications

 Examples: Google Earth VR, Pokémon GO, Oculus Rift applications


 Functionality: VR/AR applications provide immersive experiences by overlaying digital
content onto the real world or creating entirely virtual environments.
 Protocols: High-bandwidth streaming protocols, often WebRTC for low-latency
communication and proprietary protocols for handling 3D data and rendering.
10. Search Engines and Information Retrieval Services

 Examples: Google Search, Bing, Yahoo!


 Functionality: Search engines index and rank web pages, providing users with relevant
results for their queries.
 Protocols: Primarily HTTP/HTTPS with proprietary algorithms for data ranking and
indexing.

Key Components in Internet Applications:

 Front-end: User interface elements, often developed using HTML, CSS, and JavaScript
frameworks.
 Back-end: Servers, databases, and application logic, often developed in languages like
Python, Java, or PHP.
 APIs: Facilitate integration with third-party services, allowing different applications to
share data and functionality.
Business of Internet Commercialization: Telco/Cable/OnIine companies

The business of internet commercialization involves a complex ecosystem where


telecommunications (telco) companies, cable providers, and online platforms interact and
compete to deliver internet access, services, and content. Each sector contributes to internet
commercialization but also faces unique challenges and opportunities in the digital economy.
Here's a breakdown of how telcos, cable providers, and online companies approach this business:

1. Telecommunications Companies

 Core Business: Telcos initially focused on telephony but have expanded into internet
services, mobile data, and broadband.
 Infrastructure: They build and maintain extensive fiber optic and cellular networks,
including 4G, 5G, and eventually, 6G infrastructure.
 Revenue Models: Primarily subscription-based for mobile and broadband services.
Additional revenue streams include leasing infrastructure and bundling internet with
other telecom services like TV and VoIP.
 Challenges:
o High capital expenditures (CAPEX) for infrastructure development.
o Regulatory requirements, particularly regarding net neutrality and data privacy.
o Competition from tech companies entering the telecommunications space (e.g.,
Google Fiber, SpaceX’s Starlink).
 Opportunities:
o Emerging technologies like 5G enable low-latency services, opening doors to new
applications such as IoT, autonomous vehicles, and smart cities.
o Digital transformation of enterprises, where telcos provide critical infrastructure
for cloud computing and edge computing.

2. Cable Providers

 Core Business: Traditionally focused on TV services but now also deliver internet and
telephone services, often through coaxial and fiber networks.
 Revenue Models: Subscription packages bundling cable TV, broadband, and sometimes
phone services.
 Challenges:
o "Cord-cutting," where consumers shift from cable TV to online streaming
services.
o Infrastructure limitations, especially in rural areas where fiber installation is
challenging.
o Pressure from streaming companies that bypass cable for direct-to-consumer
models.
 Opportunities:
o Upgrading to hybrid fiber-coaxial (HFC) networks and fiber-to-the-home (FTTH)
for faster internet services.
o Diversifying offerings with on-demand and streaming options to retain customers.
o Partnering with streaming services to integrate content into cable packages.

3. Online Companies

 Core Business: Companies like Google, Facebook (Meta), Amazon, and Netflix focus on
delivering digital content, e-commerce, social media, and cloud services, leveraging the
internet infrastructure established by telcos and cable providers.
 Revenue Models:
o Ad-based models (e.g., Google, Facebook).
o Subscription-based models (e.g., Netflix, Amazon Prime).
o Data monetization and targeted advertising based on user behavior and
preferences.
 Challenges:
o Increasing scrutiny on data privacy, anti-trust concerns, and content moderation.
o Balancing bandwidth use with infrastructure costs (e.g., Netflix consuming high
bandwidth).
o Dependence on the infrastructure controlled by telcos and cable companies,
potentially leading to conflicts over network neutrality.
 Opportunities:
o Expanding into cloud computing and AI-driven services (e.g., Google Cloud,
Amazon Web Services).
o Investing in proprietary infrastructure (e.g., Google’s subsea cables, Facebook’s
data centers) to reduce dependency on telcos.
o Developing more personalized and immersive content, such as VR/AR
experiences, social media integrations, and e-commerce enhancements.

Convergence and Collaboration

 Joint Ventures and Partnerships: Telcos and cable companies often partner with online
platforms to offer exclusive content (e.g., telcos partnering with Netflix or Disney+).
 Network Neutrality: This remains a pivotal issue as it determines whether online
companies can pay for preferential treatment on networks owned by telcos and cable
providers.
 5G and Edge Computing: Online companies increasingly rely on edge computing and
5G from telcos to improve the latency of services, especially for IoT and immersive
media.
National Independent ISPs

National Independent Internet Service Providers (ISPs) are internet providers that operate
independently, rather than as part of large telecommunications corporations. These ISPs often
focus on local or regional areas, prioritizing customer service, competitive pricing, and diverse
service offerings. Independent ISPs can play a vital role in providing internet access in
underserved areas, including rural and remote regions where larger ISPs might not have
sufficient coverage.

Here are some notable aspects of independent ISPs:

1. Customer-Centric Service: Independent ISPs often emphasize customer satisfaction,


offering more personalized support and flexibility in packages compared to larger ISPs.
2. Coverage in Underserved Areas: Many independent ISPs focus on reaching rural,
suburban, or underserved urban areas, where large ISPs may lack infrastructure or
interest.
3. Competitive Pricing and Plans: Smaller ISPs often provide competitive prices and
plans without long-term contracts or data caps, catering to different usage needs.
4. Support for Net Neutrality: Many independent ISPs advocate for net neutrality and
unrestricted internet access, aiming to provide an open and fair online experience without
throttling or prioritizing certain content.
5. Technological Innovation: Independent ISPs often experiment with innovative
solutions, like fixed wireless internet or community-based networks, which can lower
infrastructure costs and provide connectivity in challenging areas.
6. Local Economic Impact: By operating locally, these ISPs contribute to local economies,
providing jobs and supporting community development projects.

Internet Service Providers (ISPs) are categorized into different levels, often referred to as tiers,
based on their role in the internet infrastructure, the scope of their operations, and how they
interconnect with other networks. Here are the different levels of ISPs:

1. Tier 1 ISPs:

 Definition: Tier 1 ISPs are the backbone of the internet. They own and operate the largest
networks with global coverage and connect directly to other Tier 1 ISPs without needing
to pay for internet transit, thanks to mutual peering agreements.
 Role: They provide connectivity to Tier 2 and Tier 3 ISPs, large organizations, and
sometimes direct end-users.
 Peering Relationships: Tier 1 ISPs interconnect with each other through peering, where
they exchange traffic freely.
 Network Ownership: They typically own or lease large sections of the internet backbone
infrastructure, including submarine cables and high-capacity fiber networks.
 Examples: AT&T, CenturyLink, NTT Communications, TeliaSonera, and Tata
Communications.

2. Tier 2 ISPs:

 Definition: Tier 2 ISPs buy internet transit from Tier 1 ISPs but also engage in peering
agreements with other ISPs, often including Tier 2s or regional networks, to reduce
transit costs.
 Role: They provide connectivity to Tier 3 ISPs, businesses, and smaller organizations.
They usually have a regional or national presence rather than global.
 Peering and Transit: Tier 2 ISPs try to peer with as many networks as possible to limit
the amount of traffic they need to send through paid transit to Tier 1 ISPs.
 Examples: Comcast, Vodafone, Cox Communications, and Windstream.

3. Tier 3 ISPs:

 Definition: Tier 3 ISPs primarily purchase internet transit from Tier 1 or Tier 2 ISPs to
deliver services to local end-users (individuals, small businesses, etc.).
 Role: These ISPs provide the "last mile" of connectivity, delivering internet access to
homes, offices, and smaller businesses.
 Limited Peering: Tier 3 ISPs typically don't engage in peering agreements and rely on
upstream providers for global connectivity.
 Network Size: Their network infrastructure is often localized, focusing on specific cities,
regions, or neighborhoods.
 Examples: Local and regional ISPs like Sonic (California), Frontier, and small municipal
ISPs.

You might also like