Solve Puzzles
Publish Articles
Ask Question

Connect to us Using

    Facebook Login
    Site Registration Why to Join

    Get Free Article Updates


E-Commerce and It's Working

+5 votes
226 views

E-Commerce:
Electronic commerce
, commonly known as e-commerce or eCommerce, is a type of industry where the buying and selling of products or services is conducted over electronic systems such as the Internet and other computer networks. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI),inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at one point in the transaction's life-cycle, although it may encompass a wider range of technologies such as e-mail, mobile devices, social media, and telephones as well.
Block Diagram Of E-Commerece :
enter image description here
Working Of E-Commerce:
Step 1:
A customer enters an order on a merchant's website. The transaction information is instantly encrypted and transmitted to the e-Commerce secure server, which is linked via a dedicated, leased data line to the credit card authorization network. A dedicated data line means faster transaction times.

Step 2: The transaction information is sent by the e-Commerce secure server via leased data line to the credit card authorization network where the validity of the card is checked and the availability of funds on that account is verified. An authorization code is returned via leased data line to the e-Commerce secure server. The authorization is encrypted by the e-Commerce server and transmitted in encrypted form back to the web server of the merchant which in turn triggers the fulfillment process of the order.

Step 3: An e-mail receipt is sent to the customer and the merchant (either or both can be disabled at merchant's option). Within 48 - 72 hours the merchant receives the money.

posted Mar 25 by Manish Tiwari

  Promote This Article
Facebook Share Button Twitter Share Button Google+ Share Button LinkedIn Share Button Multiple Social Share Button


Related Articles

NFC i.e. Near Field Communication as name suggest that it is the communication technology which works between two instrument who are only few inch away. NFC builds upon RFID systems by allowing two-way communication between endpoints, where earlier systems such as contactless smart cards were one-way only.

Its major use is in contact-less payment systems and can replace many payment system like smart card, credit card and smart ticket etc. Most of the smart phone in the market have the NFC support and hence it can replace the existing payment and sattlement system.

NFC Chip

Why NFC is not moving
There are two reason for NFC is growing slow, one is credit, debit, and identification cards are already a normal part of life and work well for most people. Smartcards are a directly competing technology, as they allow the same ease of use in some cases as the NFC-equipped phone. Should this technology in traditional cards see widespread acceptance, it may reduce the demand for similar, and more expensive, technology in the smartphone. Obviously, consumers are going to drive this market to a great extent. As mentioned in Weaknesses, most consumers do not have NFC-equipped phones, and even if some organizations adopt the technology, there may not be a market. Consumers must decide that the cost to purchase the phone, transfer data, and learn the new phone’s controls is worthwhile . If the infrastructure is not created because there are too few customers, customers will not purchase the device due to a lack of infrastructure. This could perpetually prevent adoption of the technology.

Consumers may also be leery of the security of the new technology: the more computerized the system, the more vulnerable it may be to malware and other attacks. These factors, in addition to the ordinary reluctance to change, may keep consumers from adopting the technology, making it useless to the service providers. Even if the technology is ultimately accepted, there is always the possibility of changing laws increasing its cost or otherwise making it more difficult to use. Since information about banking and finance would be exchanged through NFC, there will be legal requirements for its security and recordkeeping.

Comments are welcome....

READ MORE

RIP (Routing Information Protocol)
is a distance-vector routing protocol. It's been around for years and is no longer used very much. It's a protocol used by routing nodes to exchange network information. Each node that supports RIP advertises all the networks it knows about, typically every 30 seconds, using one or more broadcast packets. RIP can be used to route IP, IPX, and other protocols.

Routing tables are stored by each node supporting RIP. As advertisements from other RIP nodes are received, the routes to networks are added to the table. The route that gets stored is via the router that is closest, based on the number of hops away it is (the distance). It's simplest to think of a hop as another RIP router.

Routes can appear and disappear in a network as outages invariably happen. A RIP router will age out a route if it stops receiving advertisements for it from other RIP routers. This process can take several minutes, depending on the configuration, so RIP is not the most desirable routing protocol to use. High availability is not in it's vocabulary!

READ MORE

Web browser is an application that enables a user to display and interact with text, images, and other information typically located on a Web page at a website on the World Wide Web or a local area network.
Structure of a web page is actually not the way it is displayed in a Web browser. A web page is written in a coded form in HTML, PHP or any other language.

Browser Components:

The user interface - this includes the address bar, back/forward button, bookmarking menu etc.

The browser engine - the interface for querying and manipulating the rendering engine.

The rendering engine - responsible for displaying the requested content. For example if the requested content is HTML, it is responsible for parsing the HTML and CSS and displaying the parsed content on the screen.

Networking - used for network calls, like HTTP requests. It has platform independent interface and underneath implementations for each platform.

UI backend - used for drawing basic widgets like combo boxes and windows. It exposes a generic interface that is not platform specific. Underneath it uses the operating system user interface methods.

JavaScript interpreter - Used to parse and execute the JavaScript code.

Data storage - This is a persistence layer. The browser needs to save all sorts of data on the hard disk, for examples, cookies.
The below figure shows the Block Diagram of Web browser components.

enter image description here

Web browser gets this information and formats into the display which we usually see when we visit a webpage. Because of inherent differences in browsers the displayed page might appear slightly different in different browsers.Web browsers communicate with Web servers primarily using HTTP (hypertext transfer protocol) to fetch webpages. HTTP allows Web browsers to submit information to Web servers as well as fetch Web pages from them.Web pages are located by means of a URL (uniform resource locator) which is treated as an address, beginning with http: for HTTP access. Many browsers also support a variety of other protocols, such as ftp: for FTP (file transfer protocol), rtsp: for RTSP (real-time streaming protocol- A protocol for use in streaming media systems), and https: for HTTPS (an SSL encrypted version of HTTP- used to indicate a secure HTTP connection).In addition to HTML, PHP and other languages, the Web browser also supports various image formats like JPEG, PNG and GIF. The combination of HTTP content type and URL protocol specification allows Web page designers to embed images, animations, video, sound, and streaming media into a Web page, or to make them accessible through the Web page.

READ MORE

Flash memory is a type of electrically erasable programmable read-only memory [EEPROM] chip that can be used for the transfer and permanent storage of digital data. It is actually a long-term persistent storage computer storage device that can be electrically erased and reprogrammed.
In this device, the information is stored as an array of floating gate transistors called cells. Each of these cells can store only one bit of information at a time. The design of each memory cell is somewhat similar to that of a MOSFET. The only difference is that this cell has two gates. The gate on top is called the control gate [CG], and the bottom one is called the floating gate [FG]. FG may be made of conductive materials like poly silicon or can also be non-conductive. These two gates are separated from each other by a thin oxide layer. To know the exact representation, take a look the figure given below.

enter image description here

The FG can come in contact with the word line only through CG. When that particular link is closed, the cell will have a value ’1′. In order to change the value to ’0′, a process called tunneling has to be done. This charge cancels the electric field from CG, and thus causes to modify the threshold voltage [V] of the cell.
During the read process, a voltage that is below V is applied to CG. This V depends whether the channel should be conducting or insulating, which is in turn controlled by the FG charge. This causes the channel to know the current flow and hence the binary code is formed. This is the method of reproducing the stored data. As told earlier, the flash memory can be read only with one byte at a time. But while erasing it, it must be erased as a block. In a block there are a lot of bytes. If you program any of these bytes and later want to erase it, you will have to erase the whole block. So, in short, the device can offer you random access read and programming operations, it cannot offer you random access rewriting or erasing operations.

READ MORE
...