Академический Документы
Профессиональный Документы
Культура Документы
Topologies while that of Distributed Controls are I) Ring and II) Bus
Topologies.
22. Packet Switching:- The method of operation for the transfer of data over
network is known as Packet Switching..
23. Bus Topology:- Here all devices on the network are connected to a single
continuous cable. Transmission from any station travels the length of the Bus, in
booth directions and can be received by all other stations.
24. Advantage of Bus Topology:- I) It is quite easy to set up. ii) if one station of
the LAN fails, it will not affect the rest of the network.
25. Disadvantages of Bus Topology:- a) it limits the geographic spread and b) it
has limited flexibility for change.
26. Ring Topology:- Devices are connected in a close loop abnd information is
passed from one node to other in series. Data is transmitted in one direction
only. As the packet circulates, the destination recognizes its address and
copies the packet contents onto itself. The main disadvantage is that the
break down of any one one station on the ring can disable the entire LAN.
27. Star Topology:- The central node is often the master. Each of the other nodes
are joined to the master by separate links.
28. Advantage of Star Topology:- a) It has maximum ability to change b) If one
nod fails, it will not affect the network.
29. Disadvantage of Star Topology:- It can not handle large traffic as every
transaction has to pass through the cental nod.
30. Protocols:- The Protocols are the rules for communication between similar
modules of process, usually in different nodes. The network potocol depends on
the adaptars. Some of the commonly used adapters are Ethernet & Token-
Ring. In Ethernet system listen-before-transmit media sharing system called
Carrier-Sense Multiple Access with Collusion Detection(CSMA/DA) is used.
Token-Ring system uses what is termed as Deterministic Media-Access
Control system. In the „token-ring‟ the token circulates when all stations are idle.
A station wants to transmit must wait until it detects a token passing by. It then
Seizes the token and transforms it to a start-of-packet sequence for its data packet.
31. A device called “Multiplexer‟ is used to receive signal from several
communication line and pass on to one communication line and vice-versa. A
Multiplexer takes multiple low speed lines and combines their individual data
transmission capacity needs so that a specific grouping of them can be transmitted
on a single high speed line.
32. The function of network software is to set up some computers as host or servers
and some as clients. Generally the network operating system fall into two
categories:- I) uses DOS as the file system and ii) UNIX as the file system.
33. Advantages of LAN:- I) Resources such as hardware & software can be shared by
several users. Ii) Stored information is available to all users. Therefore no need
for duplication of databases. iii) Since all the terminals are intelligent terminals,
the processing load is shared between the various machines, which avoids
overloading on any single machine.
4
34. Shortcomings of LAN:- I) Complicated Software ii) Security risks are higher,
since each user access the host computer independently, iii) Maintenance cost is
high.
35. WAN(Wide Area Network) :- A large- scale computer network spread over a
span of sizeable geographic area, normally utilizing the telecommunication
network.
36. In WAN transmission speed and capacity are limited and data transfer
speed is low compared to that of LAN.
37. How a WAN works? Separate data line dedicated between two computers
can be used, and such network is called Leased Lines Network.
38. Computers can be linked by using ordinary telephone lines which is called Dial-
up Network.
39. The connectivity can also be established by using satellite links or microwave
links. This could be combination of al these methods also in single network.
40. Satellite Communication Network is an alternative to Wire
Telecommunication. Text, data ,voice and video information are converted to
radio waves at earth stations and are beamed up over a broad band
transmission channel to a satellite.
41. Logically any two computers connected through a telephone line needs
Modem at each end. Modem converts the digital signal into analogue signal
at the transmitting and and reconverts the analogue signal into digital signal
at the receiving end.
42. A Distributed system is an approach to Data Processing(DDP) in which
processing and data storage tend to be located at or near the points where the data
occurs.
43. Rangarajan Committee Report on Computerization(1989) favoured the DDP
Approach for better response time and more security.
44. Use of LAN, client server computing, RDBMS Packages like Oracle Sybase etc
are front end tools like Power builder, Developer 2000, etc.
45. UPS(Uninterruptible Power System):- UPS provides clean, reliable AC power to
computer system protecting them from power blackouts, brownouts, swells, sags,
surges and interface.
46. The general feature of UPS is an inverter and battery charger with automatic
change over of power supply from battery or load.
47. UPS are of two types: I) Online UPS:- the main 230V input current is
converted into 48 V DC and from battery charger cum rectifier it is again
converted to a 230 V AC, even in case of main supply available and the
power is supplied to the computer systems. In case of power failure the 48 V
DC is supplied by the batteries. It comes back automatically to the normal status
when the main supply is recovered. In bank computerization online UPS is used.,
II) Offline UPS: Here battery charger and inverter performs separately and
independently. When the power is available through the main, the charger charges
the battery and inverter is on stand-by. But, in case power off, the batteries are
connected to the inverter through a relay changeover and current is supplied to the
computer system. It supply raw power without regulating the input frequency.
Here the backup time is very low.
5
86. Main features of SWIFT: it is operational throughout the year 24 hours a day.
At present 400 different standard formats are used .Transmission of the messages
to any part of the world is almost immediate. All message formats for transaction
are standardized. All messages are acknowledged. Information is confidential and
is protected against unauthorized disclosure and tampering. Method of
transmission is cost-effective. Free format messages are also permitted.
87. Security in SWIFT: SWIFT does not assume any responsibility of the messages
between the Regional Processor and the banks. Key authentication mechanism:
The SWIFT authentication mechanism is an improved and automated version of
the telegraphic test keys. Encryption: Encryption is a security control to ensure
data confidentially. Checksum: It is a security control to prevent automatic
changes during transmission. It uses as a part of mechanism both the text and the
receiver‟s address. Encryption:- is a security control to ensure data confidentiality
88. Developments in SWIFT: Now SWIFT allows its facilities to non-banking
financial institutions also.
89. Automated Clearing Systems: CHIP(Clearing House Inter-bank Payment
System:: This system is started operational in 1970 by New York Clearing House.
The financial transactions such as Foreign and Domestic trade services,
international loans, syndicate loans, Eurodollar placement, sale of short-term
funds are done through CHIPS.
90. CHIPS(Clearing House Inter-Bank Payment System):- started operation in
1970, run by NY Clearing House. Operational time is claimed to be 99.9 to 100%
It has direct interface with SWIFT system. Domestic EFT payments are also made
on CHIPS. CHIP has dual computers at two different sites with high-speed line
link. To protect forgery full payment-message authentication system has been
implemented.
91. CHAPS(Clearing House Automated Payment Systems: This system was setup
in the UK to provide almost same service for settlement of payments which are
guaranteed on receipt and can not be recalled. Major clearing branches are
equipped with CHAPS terminals. Its format has been deviced from SWIFT and it
allows direct transmission from SWIFT system. Participating banks‟ main system
is connected to the CHAPS, which uses Packet Switched Stream (PSS) for
communication network. It protects the high value payments and the messaging
phasing over it through encryption/authentication techniques.
92. CHATS(Clearing House Automated Transfer Systems: This system provides
inter-bank funds transfer facilities in Hong Kong, which has long been regarded
as the hub of financial activities world over. All the inter-bank entries are
validated at the point of entry before transmission to CHATS central system for
settlement. All POS transacvtions are also settled through this system.
93. Two Level Fund Transfer System:- I) Fedwire & II) Bankwire.
94. Fedwire ( The Federal Reserve Wire System):- It is in operation since 1956
used by the member banks of EFT and is the main fund transfer system in USA.
About 800 banks are linked together. It is primarily used for transferring reserve
account balance of depository institutions and Govt. securities, high value
domestic payments etc. USA has been divided into 12 districts/regions to carry
9
out the function, each served by a Federal Reserve Bank and 25 branches. All the
12 banks put together constitute the Federal Reserve System in USA. Fedware
access is made through three modes:- I) Direct computer-to-computer
connectivity ii) Direct terminal access through leased line for online transaction
iii) Dial-up terminal facility for transmission. The Fedwire is an X.25 protocol
based packet switched network and has large number of alternative routes for
transmission. Fedwire makes use of CHIPS also.
95. Bankwire:- It supports standard message format through telex network and also
allows connectivity to its network to the non-members bank. Both funds &
administrative messages are transferred It has started providing a „Clearing‟
facility known as “CASHWIRE” that also undertakes settlement facility. It is the
pioneer private sector electronic telecommunication network owned by an
association of bank in USA
96. Point Of Sale System(POS):- It allows payments to be made at the point of sales
by way of EFT>It is the EFTPOS system. In POS the retailers‟ terminal is directly
connected to the bank‟s network and transactions can be communicated online.
Where both the retailer & the customer have the account in the same bank, first,
the PIN stored on the magnetic field of the card is verified and passed to the bank
computer which verifies the account balance and transaction is processed.. Where
different financial institutions share POS network, the transaction first travels to a
switching center, which directs it to appropriate bank and the information is
processed. This EFTPOS system is cost-effective to the retailers and instant credit
to their accounts.
97. ECS(Electronic Clearing System) in India:- ECS is the special variant of EFT,
it combines (1) Electronic credit clearing and (2) Electronic debit clearing
98. Electronic Credit Clearing: Launched in 1995 by RBI, it facilitates the
transaction having single debit multiple credits. The outer limit for individual
credit is fixed at Rs.5.00 lakhs .
99. Electronic Debit clearing: Here the principle is multiple debit single credit. In
February 1997 RBI introduced ECS-RAPID(Receipt and payment of document in
Mumbai) for payment of service charges to the service provider from the
consumers.
100. Floppy input clearing: Another mode of electronic clearing introduced by RBI
in 1995. The clearing participating banks submit their Inter Bank claim statements
in floppy. In clearing house data are consolidated and settlement statement
generated. This is more accurate and fast settlement process.
101. EFT System in India: EFT involves inter bank fund settlement at the national
level. It has been introduced in terms of Saraf Committee set up in 1994. Saraf
Committee has suggested a hybrid system comprising paper and electronic media
for message transmission. It recommended for high value institutional fund
transfer should be batched every hour, which has been implemented in 1996. RBI
acts as service provider and system regulator.
102. System of Message transmission under EFT: Messages are converted into
electronic format and are transmitted over network or to the NCC by cut off time
in encrypted form with check sum generation. The messages are classified and
10
consolidated according to bank wise destination and NCC send the report to the
deposits accounts department(DAD) of RBI.
103. RTGS: Real Time Gross Settlement System: It is an electronic payment
environment where payment instructions are processed on continuous or real time
basis and settled on gross or individual basis without netting the debit against
credit for final and irrevocable settlement in the books of RBI. RTGS uses
INFINET and SFMS. Each bank will have a single gateway interface known as
PI(Participant Interface). Where from the message originates and passed on to
IFTP(Inter bank Fund Transfer Processor) which acts as a broker communication
between PI and RTGS through IFTP but not directly. IFTP stores the message and
incase of payment message construct settlement message and it is routed through
the RTGS and RBI. RBI checks the coverage fund of sending bank in its account
and inform the IFTP the status of transfer. IFTP enriches the message by adding
details and send the settlement advice both to the originating and beneficiary
participants or failure advice to the originating participant in case of failed
settlement. Thus neither sending or receiving bank is settlement agent but only
RBI acts as settlement agent.
104. RTGS Business Day: Divided into 4 phases: (1) RTGS open Phase- all normal
transactions are accepted and processed. (2) IDL Shut Phase: Transactions
processed in open phase but no new IDL to be requested. (3) IDL close Phase:
Restriction on fresh IDL continues and no transaction which debits a member
with an outstanding IDL will be settled.. (4) RTGS Close Phase: Transactions
reversing outstanding IDL will only be permitted. Outstanding Multilateral Net
Settlement Batch(MNSB) transaction for settlement, provided member is
designated as clearing entity, and MNSB return transactions are also permitted.
However the existing clearing system will also continue. The phase change
notification will be sent by RBI to the members having participant interface (PI)
along with changes in time, if any.
105. Digital Signature: The Information Technology Act 2000 has brought the
concept of digital signature required in electronic message and payment system
and also for e-commerce. Digital signature is not the replica of manual
signature, but it is the key and must be applied to satisfy the following features of
digitally signed message.
(a) authenticity of source (b) integrity of message (c) none repudiation by bank.
Digital signature is unique to each message and any change to message changes
digital signature. Manner of signing electronically is done with the help of Public
Key cryptography . Cryptography is based on the use of algorithmic function two
different but mathematically related keys using series of mathematical formula
applied to prime numbers. Two parts of keys (1) Public key and (2) Private Key .
Both are issued to the user by designated authority by the government. Before
signing digitally , sender must get Public-Private key pair . Private key is kept
confidential and used only by signer to create the digital signature. Relying party
to verify the digital signature uses the public key. One such key is used for
creating a digital signature or transmitting a data into a unintelligible form and the
other one for verifying the digital signature or converting the message to as
original form. Encryption does not necessarily implied to make any information
11
Module C:Unit-13:
Payment System & Electronic Banking:-
ATM:-
1. Automatic Teller Machine may be located on or off the bank premises. Besides cash
dispensing deposit of cash/cheque, balance statement of few transactions,cheque book
request, payment of card bills and transfer of funds are possible through ATM.
2. Access to ATM is made by using ATM card & Personal Identification Number(PIN)
3. ATM is broadly of two types, (a) Exterior or Off-site ATM and (b) Interior or On-site
ATM. ATM which is directly interactive with the Bank‟s Computer is known as Online
ATM and the other is known as offline ATM. Online ATM requires the support of
effective telecommunication facility.
4. Security aspect of ATM pertains to Access Lock to cover key pads/monitors etc.which
can only be opened with the ATM card. There are video surveillance and recording
system in ATM device.
5. Advantages:-24 hours/ 7days per week & 365 days in a year banking facility,
cardholders can get cash & service at any location, anywhere banking facility,
flexibility in withdrawals, fund transfer etc
6. Installation:- Secured leased line or satellite channel, Hardware like ATM
machine,Switch,Host Computers, Modems & Encryptor, related software like SWITCH
& HOST Software and Netware Management Software, interface with credit cards,
electronic fund transfer arrangement etc are needed.
HWAK( The Intelligent Auto Teller and Netware Management System:-
1. Intelligent Auto Teller System is an advanced device over ATM. HWAK provides
unsurpassed service even without benefit of a reliable communication network.
2. Special Advantages: Online & Off line auto recovery, anytime full banking facility,
enhanced security. As a whole HWAK is„One Stop‟ auto banking.
Personal Identification Number(PIN)
1. A PIN is similar to the password, but in ATM or POS terminals the PIN is a
combination of few numerical digits only without any alphabets as it uses limited
number of keys to operate. The PIN is randomly generated sequence of digits printed
on paper and automatically folded and sealed. None but the card holder opens the seal
Electro Magnetic Cards:-
1. Credit Cards:- A credit card is a small plastic card around 8.5cm by 5.5 cm. The limit
given in a card is called the card- limit. There are different types of cards viz. i) Charge
Card ii) Debit Card iii) Credit Card iv) Smart Card or Chip Card v) Restricted Card or
Member Card.
over a period debited as charged to the which contains memory and of a club or
of time and soon as the account may contains a processor. a chain of
total amount transaction generally once The size, position and utility of hotels.
debited to the is notified to in a month. The the cards are specified by Example,
account. 25 the issuer. If main difference ISO7816 for interacting with Taj Card
to 50 days balance is with charge variety equipments. issued by
credit time is insufficient card is that, in Two main types:- i) Intelligent the
given in case to cover the case of charge Memory Chip and ii) Micro- management
the account is debit, the card the entire processor cards. of Taj
with difference is amount Memory Smart Card is used in Group of
insufficient immediately becomes pay phone, identification, Hotels,
balance. payable or payable access control, voting and Leela Card
Accumulated else a whereas in case other applications. by Leela
transactions service fee credit card there Processor Smart Card is group of
are charged is levied. In is an option to advanced device and most hotels etc,
but not debit card, pay a certain suited to banking applications the first card
debited as such, percentage and where reuse of the card is in the world,
immediately does not the rest in allowed. Dinners
to the have any monthly In this card intelligence is Card was
account. card-limit installment later built-in and protective against issued by
along with fraudulent operations. Dinners
service charge. Protection is based on Data Club
Max. 50 days Encryption Standard (DES)
credit period is which is accepted by the ISO.
generally For Smart Card, while
available but it ISO7816 defines the physical
mainly depends features & the
on the billing communication protocols,
cycle of a ISO 10202 defines the
particular card security features.
issuer. Requirements:-Terminal must
have reader as per ISO
specification to read and write
the card, secure pin, pin pad to
store the secret keys and
confidential memory zone
holding secret information.
First in 1983 NATWEST
Bank launched Mondex
system based Smart Card.
VISA & Master card have
joined with European largest
ATM network Europay to set
standard for smart card based
EFT system
13
3.In Electronic Mode of Acceptance, card is accepted through EDC( Electronic Data
Capture) machine. Validity and credit limit is verified online. Interchange fee is
generally 1.10%. MEs should have telephone line.
Multiple Pins:- A smart card may have unique multiple PINs. Apart from this there are
other security features in a smart card viz.i) Dynamic Signature Verification:- the
dynamic signature tablet automatically verifies the genuinity of signature, ii) Fingerprint
Verification:- to identify the user is genuine or not by electronically scanning fingerprint
ridges, iii) Voice Recording System:- recognizes voices with the help of computer and
compares with that of recorded original, iv) Hand Geometry:- to measures the finger
lengths/skin web opacity and curvature of finger prints through scanning , v) Retinal
Pattern Verification:- the retina is scanned using low intensity infrared beam to see
pattern of blood vessels and thereby ascertain the identity, vi) Vein Recognition:- this
method uses the vein structure known as „vein check‟ system which uses a simple
infrared scanning and encoding technique to locate the number, position and size of
subcutaneous vessels, vii) Visual Recognition:- A process of digitizing picture of a
person and stored in smart card memory.
Electronic Purse:- A variety of smart card which has space for several „electronic
purses‟ each for the storage of a specific amount. These can be used for different types of
accounts of the user. In addition, there is space for user data and even last 30 to 50
transactions.
1. Advantage to bank:-It enables bank to enter into a transaction market complementary
to debit/credit card transaction market. Electronic Purse presents no risk of bad payment.
Revenue is guaranteed from existence of float account
2.Advantages to the Purse Holder:- Cash in an Electronic Purse can not be spent if the
purse is reported stolen or lost. A new purse is can be issued restoring the original
balance.
Bank Card:- European International is Bank Card Service Provider which is having
European Payment System Network-EPS known as ‘Europay’ is a private network
which carries transaction information on personal payment card such as EuroCard and
MasterCard. It has a full range of services viz. Travelers‟ cheques, cheque guarantee,
ATM, Electronic Point-of-Sale, credit card and charge card.
Electronic Cheque:- The smart card can be used during EFTPOS(Electronic Fund
Transfer at the Point-of-Sale. The card is placed on the reader-automatically goes
through authentication sequences-to authorize payment customer types in the PIN and the
cardholder‟s bank account is debited & retailer‟s account is credited and a record of the
transaction is stored in the card.
14
Electronic Cash:- Fund is loaded into a card for use as cash and used for purchase after
authorizing PIN; the retailer presents this information to the bank to get his account
credited.
Electronic Token:- A prepaid area is set aside to store electronic units of time or
electronic tickets, etc., for a specific service or item. Examples: Magnetic stripe card is
used with public telephone/parking meters and vending machines.
Any time Banking:- ATMs in banks has surpassed the limited time banking. Banking
through ATMs is secured too since guards are provided in the ATM location. Moreover,
access is controlled through ATM card & Pin. Hongkong bank has introduced the concept
of remote banking by providing a service called Hexagon which allows the customer from
a PC that is located at his office or home i.e. desktop banking
Anywhere Banking:- ATMs and tele-banking allow the customers to make transaction
from remote locations and basic transactions can be effected outside the bank. Sharing of
ATMs , off-site ATMs as per Rangarajan committee recommendations and facilities of
using credit card in ATMs have made virtually banking in the shape of „Anywhere
Banking‟.
messages are stored and retrieved upon return to the desk‟s person. With the help of
telephone answering system the enquiries are most common in computerized reservation
system in railway.
Up-date Facility:- Up-dating transactions generated in a bank has two approaches viz. i)
Online Updates & ii) Batch Updates.
Online Updates:- Direct linking of an operation or equipment to a computer system so that
any stimulus provided by that operation or equipment is immediately accepted by the
computer system. The first application of online updation in banks is in front-office
mechanization. Online updation is required mainly in a) foreign exchange transaction b)
ATMs.
Batch Updates:- At the end of banking hours, the transactions of the whole day, it is
processed by the computer. This is known as local processing with batch updates.
Mobile Banking:- Mobile Banking comes with the features like 128 bit encryption, open
internet technology i.e. it is not dependent on any specific service provider and the hand set
company. The mobile banking service is free of charge.
Signature Storage and retrieval System Scanner is used to store paper signature to a
digital form in the computer hard disk. Which can be magnified and retrieved in case of
need.
UNIT: 15:
16