Online Internet Shopping
Online Internet Shopping
INTRODUCTION
Data communication is then necessary for the exchange to take place. It is the
technologies.
permit business forms that would have been exchanged using paper in the
commerce (EC) today causing some to view EDI and EC as one and the same.
from adding basic functions to navigate through the application, we will also add
product online, purchase product online by filling a transaction form and should
This project (EDI) will also serve as a resource, a guide and an advocate
that can transact business electrically avoiding the need to either physically
take the document from one office to another or keying in data again and again
organizations and firms, and also to examine the nature of EDI operations in
the business world. The scope of this research covers from the existence or
This project work is only concerned with the design and implementation of
course of this project I was constraint and faced with some problems such as:
is not available on hardcopy and those on the internet are not structured. Due
to this constraint there was difficulty in designing a system to match the existing
Interchange online is very high and also to get visual basic. Net programming
language software to design the interface was not available, so I used visual
(c) Lack of the technical know-how on the administrator who will use the
entities.
INTERFACE: A program where two things meet and interact, e.g enabling a
DESIGN: This is a plan or drawing produced to show the look and function of
computer.
organization.
4
CHAPTER TWO
LITERATURE REVIEW
organizations. EDI is the common “language” used to get information from one
commerce possible and delivers the cost savings businesses seek. Electronic
data interchange has traditionally been concerned with products and services
that have a short shelf life but a high unit cost. Early adopters of the use of
electronic data interchange has been traced back to the 1970s. In 1975, there
were 45 transactions sets established for the transportation industry. Today, the
Committee) X.12 has over 200 transaction sets associated with it covering a
wide variety of industries and businesses. By the mid 1980s, two general
Commerce and Transport (EDIFACT) took shape while the ANSI X.12 in the
and for the data to be acted upon using automatic processing which reduces
the need for human intervention in the process. Traditionally, it has been the
electronic data interchange activity for themselves and many times for their
suppliers or trading partners. Use of EDI has grown. The reduction of costs of
the use of electronic data interchange extends to all trade and trade related
estimated that there are tens of thousands of EDI users in North America as
well as many users in the Pacific Rim and Europe. Because of the varied
6
“Electronic data interchange is the interchange of standard formatted data
Although the definitions vary, four components of EDI remain the same.
level service such as purchasing or inventory of the data, EDI uses some
world wide web tools, and EDI uses a communication method such as the
Internet of dial up lines to move the data from one computer to another
computer.
be seen throughout the operations of the business and its trading partner
activities that are initiated by these transactions can begin to occur immediately.
communicated electronically.
of error caused by re-entry of data and handling paper involved in order. This
effectively eliminates the introduction of errors into the initial business process
electronic processes using EDI, they will realize significant cost savings. Some
of these savings are a direct result of increased speed. For example correcting
errors cost an organization both time and money; so the reduction of errors
EDI, its cash flow will improve due to overall efficiencies that EDI provides. For
costs involved with paper filing systems, costs for paper, envelopes, and
8
mailing materials decrease as well as those for telephone and courier services
document handling activity. This provides the ability to track status and
enhances the image of the company and increase the company ability to
provide faster and better customer service. (Kumar, Ram and Connie W.C
(1996).
process change. Existing business processes built around slow paper handling
may not be suited for EDI and would require changes to accommodate
Another significant barrier is the cost in time and money in the initial set-
up. The preliminary expenses and time that arise from the implementation,
customization and training can be costly and therefore may discourage some
businesses.
9
The Key hindrance to a successful implementation of EDI is the
perception many businesses have of the nature of EDI. Many view EDI from
the technical perspective that EDI is a data format; it would be more accurate
to take the business view that EDI is a system for exchanging business
payment systems, network security, value added networks, and the Internet.
This project is intended to focus on Electronic Data Interchange and will also
discus Value Added Networks (VANs), network security issues, and the
conduct of business on the internet, not only buying and selling but also
servicing customers and collaborating with business partners. One of the first
to use the term was IBM, in October 1977; it launched a thematic campaign
built around the terms of the internet and its new culture and capabilities.
Companies are using the web to buy parts and supplies from other companies,
business, this can be said to include e-service, the provision of service and
Direct EDI as this implies, is a direct link between two computers. Direct
and own its site EDI translator computer. These EDI translator computers are
then connected directly to each other using modems and dial-up telephone
lines or dedicated leased lines. The dial-up option becomes troublesome when
customers or vendors are located in different time zones and transaction are
time-sensitive over high in volume. The dedicated leased line option can
become very expensive for business that must maintain many connections
protocols can make both direct connection option different to implement. Below
Spare parts
manufacture
r
trading partners. The most common method is the use of a value added
banks, distributors, suppliers, and everyone involved in the trade cycle gave
rise to the idea of creating networks of service providers that would offer a
company joins a VAN, it places its focus on its hardware equipment and the
links it needs to put into place to connect to the VAN, letting the VAN to be
concerned with all of the other links to the other ends and all of the issues in
between. It is cost effective for all to use the same VAN. If your trading
partners belonged to a VAN different from yours, you had no choice but to
12
belong to more than one VAN. The diagram below shows an indirect
Retailer
Finished goods
manufacture
Distributor Wholesaler
Additional services are provided by VANs as well. They include mail boxing
which is the equipment of the electronic post office box. Security is provided to
protect the sensitivity of your business order and trade relationships. Various
The VAN is responsible for routing, storing and delivering EDI messages.
13
Depending on the VAN type, messages may need extra envelopes or
may be routed using intelligent VANs which are able to read the EDI
message itself.
o Telecom companies;
trading partners who had been using EDI began to view, the internet as a
potential replacement for the expensive leased lines and dial-up connection
they had been using to support both direct and VAN added EDI. Companies
that had been unable to afford EDI began to look at the internet as an enabling
technology that might get them back in the game of selling to large customers
The major road blocks to conducting EDI over internet initially were
general concerned with security and the internet’s general inability to provide
The lack of the third party verification continues to be an issue, since the
internet has no in-built facility for that. EDI transactions are business contracts
14
significant. The non repudiation function was provided either by a VAN’S audit
application files that are used to manipulate their data in ways that are familiar
to the business. The EDI standard says which pieces of information are
mandatory for a particular document, which pieces are optional and giver rules
for the structure of the document, two EDI documents can follow the same
1991).
The problem is that most businesses, though using the same types of
data, do not use the same application programs or hardware and software
another, they must have a common ground to meet and to allow the exchange
of the information. Standards are the solutions to this problem. All business
that conforms to specific standards can share data in the formats delineated by
America.
15
The TRADACOMS standard development by the ANA (Article
All of these standards first appeared in the early to mid 1980s. The
(EDIFACT) is the UN (United Nation) standards that the whole has agreed to
very helpful; their benefits were limited to members of the industries that
formats are said to be EDI – compatible, the full realization of electronic data
of the internet was enhanced with secured protocols such as HTTP and
produced which offer various methods of control. Some of the methods use to
smart cards, biometrics, and firewalls etc. Security issues are grouped into four
16
Privacy concerns
Access control concerns
Concerns about integrity and authentication.
Security issues seem to be the paramount concern with “EDU”, the value
added network service provider has been able to serve as the security enforcer
in the cycle using a closed circuit limited, circle of subscribers who pay the
price for the added value. New security techniques which give businesses the
confidence they need concerning the security needed for their electronic
that the privacy and confidentiality as well as authenticity of the messages are
good. Without strong security in place, EDI would not move forward. (Cavalli,
Dr. Alexander, 1995) The security modules are as shown below in figure 3.
X12 X12
File File
Security Security
software software
Verify
Apply
Signature
Authenticatio
n Apply
Apply
Encryption
Apply
Authentication
17
Encryption
Authenticatio
Signature
n
Fig. CONFIDENTIALITY
2.08 3 security modules
other preying eyes from viewing data that are transmitted over
have the same private-encryption keys. The sender encrypts the data using
his key. The receiver then decrypts the message using his identical key. There
secured, the keys must be changed periodically and the users must be in
18
recipient generates a matched set of keys, one public key and one private
key. The recipient broadcasts the public key to all senders or to a public
location where the key can be easily retrieved. The message users who need
to send the receiver an encrypted message use the recipient’s key to encrypt
the message. The private key, which is held in private by the recipient, is the
key that can decrypt messages encrypted with the matched public key.
One of the positive features of this method is that only one key needs to
be managed because only one key is secret; the security concerns for privacy,
communicating with the party with whom they think they are doing business. A
integrity is a guarantee that what was sent by the sender is actually what is
received by the receiver. This is necessary if there is a need to ensure that the
providing data integrity is cumbersome and not used unless one of the trading
partners requires it. The normal mechanism for acquiring data integrity is for
19
the sender to run algorithms against the data that is being transmitted and
transmit the result of the algorithm separately from the transmission. Upon
receipt of the transmission, the receiver runs the identical algorithm and then
compares the results. If the results are identical, then the data have not been
modified.
a transaction after the fact. The current technology ensures this through the
The financial benefits which accrue from using these methods are
of these securities.
20
CHAPTER THREE
System analysis and design mainly encompass the processes or steps involve
For the purpose of designing a new system the analysis steps often
require looking at the current and proposed system and refining the estimates
of benefits and cost. Data gathering and sources of information were both on
primary and secondary methods of data collection; proper data scrutiny was
business document like order list, customer detail list, receipt etc. between two
21
software will act as an advocate for the owner of the business. In this project,
another person enter the data into a trading partner’s computer was slow,
interchange like receipt order list, customer detailed list, etc. between two
persons that is the producer and the customer or the seller and the buyer.
concede picture of how these component function in relation to one another and
22
There are two main type of Electronic Data Interchange, the web based
EDI, where Value Added Network (VAN) are used to transmit document over
the internet and local base EDI where software are performing the duties of
Customer Interface
where the customers interact with EID software during the process of
forms:
to log in to the secure server for proper verification before they can
23
order for products. In this form, customer’s company name and their
register with the company for proper identification, so that they can
iii. Order form: This form contains products that you can order and it
etc. In the proposed EDI system, it is the logic behind the EDI interface.
the secure SQL database and the store procedure that process the
i. Customer table
ii. Order Table: The order table will store information about
iii. Product Table: This table stores information about the product
language (SQL) to query the database and send report to the customer.
The new system should be able to meet the standard outlined below to
employed. The problem is broken down into sub-problems and each sub-
26
CHAPTER FOUR
PROGRAM IMPLEMENTATON
(IDE) for designing a very interactive graphic user interface (GUI), Most
learn. To start using Visual Basic, Effective programming skills is not necessary
because it drags and drops window, controls when designing an interface for
27
4.01 PROGRAM SPECIFICATION
requirement in chapter three to develop the structure and logic of the program
This is printing out business document for the customers and accepting
business data from customers etc. the question is how would this program be
implemented in situation?
system includes:-
situation.
above, the efficacy and smooth running of the program will be guarantee.
28
Thus, program is set out to transact business with customers and
is feasible and if it will produce the desire result. If the design is correct logically
29
USER FLOWCHART
START
USER FOUND
ORDER ITEMS
PRINT ORDER
SUCCESSFUL
STOP
30
Figure 4.2.1 User Flowchart
ADMIN FLOWCHART
START
PROCESS USERNAME
AND PASSWORD
YES NO
PASSWORD
VALID
GRANT
ACCESS
STOP
There are four Graphic user interface forms (GUI) within this program.
Main form user interface: This interface is called the main form because this
is the form interface that will lead you to all other interface in the program or
software. The main interface consists of one menu called the file menu and a
button that triggers the login form interface when clicked. The file menu
Print submenu which is use to trigger the print dialog box if customer want
Exit sub menu which close the software, or terminate the software
Login form interface: The main function of this interface is to restrict customer
who did not register to order for products. This is because all customers must
register before they can order for product using this software.
The login form interface consists of two text boxes where establishment
can enter their customer’s name and password and two buttons where you can
Order Form Interface: This interface is a form which customers fill to specify
their order requirement. It consists of text boxes, combo boxes, and buttons for
the customers to interact with the database. The main function of this form is to
32
Register Form Interface: All new customers must register first before they can
place order for products in stock. The register form interface is like a form
where you supply your data to the database for recognition in case you want to
Print Dialog Box: This is a dialog box that is used to specify the type of
documents you want to print using the default print. It is like every other window
textboxes, label combo boxes e.t.c. have their own program segment or
module and trigger the respective event. Examples of Event handler in VB are:
1. Click;
2. Mouse over;
3. Double click;
These entire event handlers have a code behind their window controls that
33
In this project work, some of the window controls like button event handler
a. Button Click Event: This event triggers the login form when clicked.
b. Menu Item 3 Click: This event triggers the register form when
clicked.
c. Menu Item 4: This event triggers the order form interface when
clicked.
d. Menu item 10 clicks: this event calls an end method to terminate the
entire program.
2. Register form sub program event button: This event triggers the
method that enables you to connect to the SQL Database for processing
of customer registration.
a. Button 3 click Event: This event calls the method that close the
database.
the database.
b. Button 3 Click Event: This event cancels the order made by the
customer.
34
c. Textbox 3. Click Event: This event display the unit price to the
a. Button 3 click Event: This event trigger the order form of your
b. Button 1. click Event: This event calls the close method to close the
organization require that all customer or client that will use the software will
have to fill out necessary online form via their web portal before sending the
required documents. Utilizing more complex system often requires that EDI
integration with your company’s back-end office systems. As you begin trading
with more partners and you will experience business growth, your EDI system
35
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATION
5.00 SUMMARY
Electronic data interchange is a tool which is at the heart of electronic
commerce activity. Using the carefully constructed standards which have been
business transactions. The financial benefits which accrue from using these
methods are substantial. Many companies have pioneered and perfected the
computers and many have elected to use the services of the value added
5.01 CONCLUSION
improve the business process that flow between organizations. It reduces cost,
5.02 RECOMMENDATION
36
The amount of experience you need in order to be able to do EDI directly
correlates to the type of EDI solution you choose for your business. Generally,
specific experience is not needed. With Internet – based EDI, solutions are
typically “hosted” by a company. All that is needed to access this type of EDI
system is an internet connection and a web browser. Web – based EDI is the
training is often recommended for your employees. Your EDI vendor can
EDI is highly recommended due to the above reasons. The chief benefits
of using electronic data interchange will be accomplished as:
postage bills, and manual processing costs involved with paper filing
systems.
Shortening the lead time between receipt and fulfillment of orders as well
edge.
5.03 SUGGESTIONS
37
During the course of this project work some data and authentication
certificate, type of payment. The foundation has already been laid for EDI
standard format and data encryption of password. For further researchers I will
38
REFERENCES
Cain, R.J. (2000) Value-added networks: What to look for now and in the future.
Conference Proceedings EDI: EDI, Electronic Commerce, and You; (pp. 141 -
157).
Cavalli. A. (1995) “Electronic Commerce over the Internet and the Increasing Need
for Security” December 8,
http://www.galaxy.einet.net/tradewave/products/vpiwp.html.
Gary .P, Schneider .J, Perry .T: (1979) Electronic Commerce University of san diego
Haynes T. (1995): The Electronic Commerce Dictonary: The Definitive Terms for
Doing Business on the Information Highway. California: Robleda Company. (2 nd
Edition).
Kumar, Ram and Connie W.C (1996): “Educating Senior Management on the
Strategic Benefits of Electronic Data Interchange. “ Journal of Systems
Management, March-April, Pg42-48.
Philipus .G, Michael D. (April 1998): “Applying Electronic Data Interchange”. Risk
management
39
Sawabini, S. (1995). Introduction to EDI. Conference Proceeding EDI 2000:EDI, EC
and You, (pp. 1-36).
Sokol, P. K. (1995). From EDI to EC: A business Initiative. New York: McGraw-Hill.
APPENDIX I
40
SPLASH SCREEN
CONTACT PAGE
41
PRODUCT PAGE
LOGIN PAGE
42
REGISTRATION PAGE
43
ORDER PAGE
44
CUSTOMERS ORDER PAGE
45
VIEW PRODUCT PAGE
46
ADMIN PAGE
47
APPENDIX II
48
//ADD PRODUCT PAGE
Imports System.Data.OleDb
Try
Dim InsertCommand As String
InsertCommand = "INSERT INTO [Products]
(ProductCategory,ProductName,ProductDescription,UnitPrice) VALUES('" +
dpdProductCategory.SelectedValue + "','" + txtProductName.Text + "','" + txtProductDescription.Text
+ "','" + txtUnitPrice.Text + "')"
Dim cmd As OleDbCommand
cmd = New OleDbCommand(InsertCommand, conn)
conn.Open()
cmd.ExecuteNonQuery()
lblStatus.Text = "Product Added Successfully..."
conn.Close()
Catch ex As Exception
lblStatus.Text = ex.Message
End Try
End Sub
Me.Hide()
End Sub
End Sub
End Class
Me.Hide()
End Sub
49
Private Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click
AddProducts.Show()
Me.Hide()
End Sub
Me.Hide()
End Sub
End Sub
Private Sub Button5_Click(ByVal sender As System.Object, ByVal e As System.EventArgs)
Handles Button5.Click
viewProducts.Show()
Me.Hide()
End Sub
End Sub
End Class
//DEFAULT PAGE
End Sub
Me.Hide()
50
End Sub
Me.Hide()
End Sub
Me.Hide()
End Sub
Me.Hide()
End Sub
Me.Hide()
End Sub
End Sub
End Sub
End Class
51
InsertCommand = "INSERT INTO [Users]
(UFirstName,UOtherNames,USex,UDob,UState,UNationality,UPhone,UEmail,UPHomeAddress,UUs
erName,UPassword) VALUES('" + txtFirstName.Text + "','" + txtOtherNames.Text + "','" +
dpdSex.SelectedValue + "','" + txtDOB.Text + "','" + dpdState.SelectedValue + "','" +
txtNationality.Text + "','" + txtPhone.Text + "','" + txtEmailAddress.Text + "','" + txtHomeAddress.Text
+ "','" + txtUserName.Text + "','" + txtPassword.Text + "')"
Dim cmd As OleDbCommand
cmd = New OleDbCommand(InsertCommand, conn)
conn.Open()
If txtPassword.Text <> txtConfirmPassword.Text Then
MessageBox.Show("Both Password Must Match!")
txtConfirmPassword.Text = String.Empty
txtPassword.Text = String.Empty
txtPassword.Focus()
Return
Else
cmd.ExecuteNonQuery()
lblStatus.Text = "Registration Successful! Please Log In to Continue"
conn.Close()
End If
Catch ex As Exception
lblStatus.Text = ex.Message
End Try
End Sub
End Sub
Me.Hide()
End Sub
End Sub
End Class
//ORDERS PAGE
52
Imports System.Data.OleDb
Try
Dim INsertCommand As String
INsertCommand = "INSERT INTO [ORDERS]
(UserName,ProductName,ODescription,OQty,ShipAddress,Country,City,OState,ZipCode,AreaCode)
VALUES('" + txtUserName.Text + "','" + txtProduct.Text + "','" + txtProductDescription.Text + "','" +
txtQuantity.Text + "','" + txtShipAddress.Text + "','" + txtCountry.Text + "','" + txtCity.Text + "','" +
dpdState.SelectedItem + "','" + txtZipCode.Text + "','" + txtAreaCode.Text + "')"
Dim cmd As OleDbCommand
cmd = New OleDbCommand(INsertCommand, conn)
conn.Open()
cmd.ExecuteNonQuery()
lblStatus.Text = "Order Has Been Submitted, And Will Be Delivered Within 72 Hours. Thank
You!"
conn.Close()
Catch ex As Exception
lblStatus.Text = ex.Message
End Try
End Sub
End Sub
Me.Hide()
End Sub
End Sub
Else
lblStatus.Text = "Invalid Log In Parameter"
txtPassword.Text = ""
txtUserName.Text = ""
txtUserName.Focus()
End If
Catch ex As Exception
lblStatus.Text = ex.Message
End Try
End Sub
End Sub
Private Sub btnExit_Click(sender As Object, e As EventArgs) Handles btnExit.Click
Form1.Show()
54
Me.Hide()
End Sub
Private Sub AdminLogIN_Load(ByVal sender As System.Object, ByVal e As System.EventArgs)
Handles MyBase.Load
End Sub
End Class
Catch ex As Exception
lblStatus.Text = ex.Message
End Try
End Sub
Me.Hide()
End Sub
End Sub
End Class
End Sub
Me.Hide()
End Sub
End Class
//CONTACT US PAGE
Public Class ContactUs
Me.Hide()
End Sub
End Sub
End Class
End Sub
End Class
//USER HOME PAGE
Public Class UsersHomePage
Private Sub Button2_Click(sender As Object, e As EventArgs)
End Sub
Private Sub btnPlaceOrder_Click(sender As Object, e As EventArgs) Handles btnPlaceOrder.Click
OrdersPage.Show()
Me.Hide()
End Sub
56
Private Sub btnLogOut_Click(sender As Object, e As EventArgs) Handles btnLogOut.Click
UsersLogIn.Show()
Me.Hide()
End Sub
End Sub
End Sub
End Class
Else
lblStatus.Text = "Invalid Log In Parameter"
txtPassword.Text = ""
txtUserName.Text = ""
txtUserName.Focus()
End If
Catch ex As Exception
lblStatus.Text = ex.Message
End Try
57
End Sub
Private Sub btnClose_Click(sender As Object, e As EventArgs) Handles btnClose.Click
Form1.Show()
Me.Hide()
End Sub
58