Title: Web Commerce :
1Web Commerce Quick Way To Get Rich, or Another
Set Of Performance Issues
Dr. Thomas E. Bell TBell_at_RVNDL.Com
2(No Transcript)
3Todays Web-Based Commerce?
Orders
Orders
Product Descriptions
4The Reality of the Internet User Space
- 45 of US families have computers
- 33 of US adults use the internet somewhere
- 22 of US adults use the internet at home
- 4.5 hours of internet use on average for adults
with internet access - Source CNBC 9/6/99
5The Reality of Retail e-Commerce Top 5 Problems
Experienced Holiday 1999 Shopping Season
- 64 Item was out of stock
- 40 Product was not delivered on time
- 38 Paid too much for delivery
- 36 Connection or download problem
- 28 Didnt receive confirmation or status
report - on purchase
Source Andersen Consulting cited by CNET
Special Report (2/4/00) The Truth About
Shopping Online
6What people learned is that it costs a lot more
to build a brand from scratch than people
thought, and secondly building an e-commerce
infrastructure is not as cheap as people
thought. Rick Neely, interim CEO, CFO, and Sr.
VP of former e-tailer Beyond.com
Source InfoWorld, 5/26/2000
7Some Not-So-Easy Issues
- Security
- Inventory Status Product Identification
- Credit Verification
- Fulfillment
- Returns
- Voice To Handle User Problems
- Exploiting Multiple Delivery Channels
- Performance
8According To Network Computing
You're entrenched behind your firewall and you
peer across a battlefield strewn with ruined Web
servers. The enemy is out there somewhere,
waiting for the slightest breach in your defenses
to turn you into the next media event "Foo.Com's
Web site was hacked last night. For six hours,
customers were unable to access its electronic
catalog. Foo's spokesperson stated that the
database server was not reached by the hackers,
but that projected sales losses could reach 6
million." The media calls that a hack? Sounds
more like a frontal attack or at least a border
skirmish. We must stop playing with words This
is not just malicious behavior--this is an act of
electronic war. Are you prepared to defend your
domain? Source A HAC Is a Hack Is a
Haq? Network Computing (online), 9/6/99
9Firewall Countermeasure
Firewall
Scans, Invalid Packets, Penetration Attempts
Distributed Denial Of Service
Personal Information
10Countermeasures
FIX TRADE-OFF Filter at router 5
percent to 20 percent performance
hit Intrusion-detection Frequent false alarms
software Load-balancing product Drop slow
connections from legitimate
users Specialized firewalls that 50 percent more
expensive than perform DoS filtering
general-purpose firewalls
Source The Cost of Security Internet Week, p
1, 2/21/00
11Inventory Status Product Identification
Inventory Control
Xact Proc
Inventory Control
Web Serving
12Inventory Status Product Identification Issues
For Web Retailing
- If in-house supplier, need to have comprehensive
identification system for evolving product lines - If outside supplier, need to track any
re-numbering of products (including variants) - If multiple suppliers, need to reconcile between
different identification schemes (SKUs).
Variants may be indicated by unusual schemes. - Returns need to be tracked to correct supplier
- Billing by product must be tracked by supplier
13Credit Verification
Inventory Control
Xact Proc
Credit Card Center
Web Serving
14Credit Verification Challenge
Verifier Times Out
Retailer Must Time Out
Holiday 99 Experience
Frequent
Acceptable
Intuition
20
100
80
60
40
120
140
160
180
0
Seconds After Clicking An Order
15Fulfillment
Fulfillment Center
Inventory Control
Xact Proc
Credit Card Center
Web Serving
16Fulfillment Processes
- Sales Order Processing
- Picking List Creation
- Warehouse Management
- Distribution Management
- Purchase Order Processing
- A/R, A/P, G/L
17Returns
Source CNET Special Reports (2/4/00) The
Truth About Shopping Online using list from
Patricia Seybold Group
18Voice To Handle User Problems
Call Center (ACD)
Fulfillment Center
Inventory Control
Xact Proc
Credit Card Center
Web Serving
19Normal Calling Intensity
Checking DDA Balance
6000 I I
I
. . I
. . I
. . I
. I
. . 5000
.
I .
I .
. I .
. I
. . I
. . I
.
I .
. 4000 .
. I
. .
I .
I
.
I .
. I
. .
. I .
. . .
I .
. 3000
.
. I
.
. I .
.
I
.
I .
. I
.
. I
.
I
.
. 2000
.
. I
.
. I
.
. I
.
I
.
. I
. I
.
. I
.
1000
. I.
. I . . I
. . I .
I I I 0
-------------------------------------
-----------------------------------
0 1 2 3 4 5 6 7 8 9
10 11 12 13 14 15 16 17 18 19 20 21
22 23 24
Checking Fund Balance
20Call Center (ACD)
1-800 Trunk Group
1-800 Trunk Group
- Determine required service level in terms of
probability of blockage - Determine average call duration during busy
hour - Determine effective number of trunks (lines) with
erlang distribution (available on internet as
well as in tables) for each trunk group, add them - Measure switch processing capability (CPU-based)
for call set-up - Determine capacity for handling traffic
21Exploiting Multiple Delivery Channels
Call Center (ACD)
Fulfillment Center
Inventory Control
Xact Proc
Credit Card Center
Print Mail Center
Web Serving
22Print Mail Center
3
LOB Demand Projection
4
Dist. Of Gross Load To Spec. Items
Project Loading Based On History And
Distribution Of Envelope Sizes And Other Chars.
Recent Levels Of Productivity
1
Assumed Schedules
Project Capacity For Each Machine By Appln
Type And Active Time
Rec. Level Of Non- Prod. Time
2
Project Machine Requirements For Loads Capacity
23Performance If Youre At All Serious
Database Servers
Web Servers
Firewalls
InterNet
Browsers
24Core Web Service
- Implement at least 3 times maximum anticipated
capacity, be ready for 10 times. - For firewall, plan for CPU and I/O. More
importantly, plan for total number of outstanding
interactions (not active users). - Determine response to invalid IP addresses,
buffer over-runs, incomplete packets. Plan
capacity for outage cases. (They happen
repeatedly.) - Try to obtain distribution of activity across
users some are far more active than others.
Assume very uneven distribution of users. - Correlate activity with outside (driving) events
and look for chance of overlaps.
25Recommendations
- Start learning about the technologies surrounding
the classical mainframe processing complex
before you find that less quantitative people are
taking over. - Plan for outrageous growth rates in technological
requirements (e.g., 30 to 60 per year). - Deal with the extreme peaks that arise from
ultimate customers unscheduled behavior (like
logging on during a TV advertisement). - Take great care using performance data from new
technologies vendors add features before
ensuring that the data are useful (or even
present). - Determine how performance problems in one area
may lead to overloads (requiring extra capacity)
in other areas.
26Implications
- Many business processes fall outside the
internet, and they need to use Information
Technology too - e-Commerce wont replace conventional commerce,
so integration is critical - Customers will go elsewhere if reliability or
performance is inadequate (another site is just a
click away) - The technology is far more complex than indicated
by IPO advocates on TV - Thorough, long-term planning to minimize excess
capacity is a faulty approach given the rate of
change
27(No Transcript)