Unit-IV BLR
Unit-IV BLR
Unit-IV BLR
BANKING TECHNOLOGY
INTRODUCTION
Over the years, especially in the later part of the 20th century, the Indian Banking Sector has undergone fast
growth and with the advent of technological changes, Indian banks are adopting to the new environment. The two
successive Committees on Computerization (Rangarajan Committees) were responsible for bank computerization
in India. Over the years led by the initiatives of the Reserve Bank of India, banks in India have witnessed lot of
changes into their banking operations duly supported by IT and communication revolution.
Some important areas where the IT plays important roles are:
Funds Transfer mechanism: ECS, EFT, RTGS, NEFT
Clearing House operations: MICR, CTS
Innovative on line e- banking services: Tele banking, Mobile banking, SMS banking, Credit/ Debit Cards, ATMs,
Internet banking, Core Banking Solutions, etc.
Internet
The internet is a global network of networks. Computers with internet links can allow users to exchange data,
information, messages, files, etc, with other computers across the globe through internet connectivity.
This facility collates internet related resources and makes available the information. The access to this site
assists user to source out a large variety of information.
Banks uses internet and web sites (banks’ own web sites) to market their products and services. These platforms
1
also allow banks to offer online banking facilities and can be used for posting their financial results and information
to customers.
Society for Worldwide Inter-bank Financial Telecommunications (SWIFT) is a co-operative non-profit making
organization established under Belgian law with its head quarters at Brussels. SWIFT is wholly owned by its
member banks. SWIFT is a paperless message transmission system.
SWIFT – important features:
– Operates on 24x7 basis throughout the year
– All messages are transmitted to any part of the world immediately
– Message formats are standardized
– Information is confidential and is protected against unauthorized disclosure
– SWIFT assumes financial responsibility for the accuracy and timely delivery
SWIFT and banks:
– SWIFT has become an integral part of banking system. SWIFT assist member banks
– SWIFT transmit authenticated financial and non-financial messages
– SWIFT with its well-standardized and structured message formats have been offering a reliable system
of message transmission
– Banks use SWIFT platform to for transmission of financial and non-financial messages covering
international finance (settlement of forex deals), international trade (advising of LCs, amendments to
LCs etc,)
2
Electronic Fund Management
IT revolution has paved way for banks to implement different systems to handle funds management in banks.
This methodology is collectively recognized as Electronic Fund Management.
9. It is not only easy method of transfer of funds, but also enables the remitters to have user friendly and
cost effective transfer of funds
Internet Banking
Internet banking one of the popular e-banking modes has changed the banking operations and offer virtual
banking services to the clients on 24 x 7 basis. It is also called as convenient banking, since the customer
(account holder) can have access to his bank account from anywhere at any time, through the bank’s web site.
The customer is allowed online access to account details and payment and funds transfer facilities. Net banking
services of a bank can be accessed through a Personal Identification Number (PIN) and access password as in
the case of ATMs. In net banking the advantage for the bank customer is that funds can be transferred from the
client’s bank account to another account with the same bank or another bank through NEFT/RTGS. Another
method of funds transfer facility is online payment of taxes. Bank customer can pay various taxes like income tax,
service tax, etc.; Net banking can be used as a channel by the customer to pay the utility bills (electricity bills,
telephone bills, etc) on line. Customers can make use of net banking to pay the insurance premiums and similar
other payments.
CBS is a back end system, and it processes daily banking transactions and updates the records accordingly.
CBS helps the clients to operate their accounts from any CBS branch. CBS branch assist customers to handle
their funds transfers in a quick turnaround time. It also assists the client to withdraw and deposit funds in other
branches apart from the parent branch, where he maintains his account.
Data Warehousing- A Data Warehouse or Enterprise Data Warehouse (DWH/EDW) is a database used for
reporting and data analysis. It is a central repository of data which is created by integrating data from one or more
separate sources. DWH store current as well as historical data and are used for creating trending reports for use
by senior management. The data stored in the warehouse are uploaded from the operation systems. The main
source of data is cleaned, transformed, catalogued and made available for use by the managers for data mining,
online analytical processing and decision support.
5
WAN and LAN
LAN, which stands for local area network, and WAN, which stands for wide area network, are two types of
networks that allow for interconnectivity between computers. As the naming conventions suggest, LANs are for
smaller, more localized networking — in a home, business, school, etc. — while WANs cover larger areas, such
as cities, and even allow computers in different nations to connect. LANs are typically faster and more secure
than WANs, but WANs enable more widespread connectivity. And while LANs tend to be owned, controlled and
managed in-house by the organization where they are deployed, WANs typically require two or more of their
constituent LANs to be connected over the public Internet or via a private connection established by a third-party
telecommunications provider.
LAN WAN
Covers Local areas only (e.g., homes, offices, Large geographic areas (e.g., cities, states, nations)
schools)
Definition LAN (Local Area Network) is a computer WAN (Wide Area Network) is a computer network that
network covering a small geographic area, covers a broad area (e.g., any network whose
like a home, office, school, or group of communications links cross metropolitan, regional, or
buildings. national boundaries over a long distance).
Data transfer LANs have a high data transfer rate. WANs have a lower data transfer rate compared to
rates LANs.
Example The network in an office building can be a The Internet is a good example of a WAN
LAN
Technology Tend to use certain connectivity WANs tend to use technologies like MPLS, ATM,
technologies, primarily Ethernet and Frame Relay and X.25 for connectivity over longer
Token Ring distances
Connection One LAN can be connected to other LANs Computers connected to a wide-area network are often
over any distance via telephone lines and connected through public networks, such as the
radio waves. telephone system. They can also be connected through
leased lines or satellites.
Components Layer 2 devices like switcches and Layers 3 devices Routers, Multi-layer Switches and
bridges. Layer 1 devices like hubs and Technology specific devices like ATM or Frame-relay
repeaters. Switches etc.
Fault Tolerance LANs tend to have fewer problems WANs tend to be less fault tolerant as they consist of
associated with them, as there are smaller large number of systems.
number of systems to deal with.
Data Experiences fewer data transmission Experiences more data transmission errors as
Transmission errors compared to LAN
Error
Ownership Typically owned, controlled, and managed WANs (like the Internet) are not owned by any one
by a single person or organization. organization but rather exist under collective or
distributed ownership and management over long
distances.
Set-up costs If there is a need to set-up a couple of For WANs since networks in remote areas have to be
extra devices on the network, it is not very connected the set-up costs are higher. However WANs
expensive to do that. using public networks can be setup very cheaply using
just software (VPN etc).
6
LAN WAN
Geographical Have a small geographical range and do Have a large geographical range generally spreading
Spread not need any leased telecommunication across boundaries and need leased telecommunication
lines lines
Maintenance Because it covers a relatively small Maintaining WAN is difficult because of its wider
costs geographical area, LAN is easier to geographical coverage and higher maintenance costs.
maintain at relatively low costs.
Bandwidth High bandwidth is available for Low bandwidth is available for transmission.
transmission.
A mainframe (also known as "big iron") is a high-performance computer used for large-scale computing
purposes that require greater availability and security than a smaller-scale machine can offer. Historically,
mainframes have been associated with centralized rather than distributed computing, although that distinction is
blurring as smaller computers become more powerful and mainframes become more multi-purpose. Today, IBM
emphasizes that their mainframes can be used to serve distributed users and smaller servers in a computing
network. The original mainframes were housed in room-sized metal frames, which is probably where the name
derives from. In the past, a typical mainframe might have occupied 2,000 - 10,000 square feet. Newer
mainframes are about the same size as a large refrigerator.
Internet marketing:
Internet based marketing is an important segment in e commerce. It plays a vital role in the supply chain
process of exchange of goods between the producer and consumer.
Interconnectivity: Internet is recognized as a network of networks. The search engines assist the user of the
internet to have access to required information. For customers, the interconnectivity offered by the internet
helps him/her to have information/access to large number of diverse markets. One important feature is that it
gives information and access about international markets as well.
Interactivity:
Internet not only allows access but also allows interface and interactivity among users. In view of this interface,
it assists both the producer/manufacturer as well as customers to have better communication and choices. It
allows the marketer to customize and focus even on individual customers in large markets. On the other hand
the customers are also benefitted because of their interface with the marketer, peers and different web sites to
make their selection.
Information:
The availability of large number of websites on the internet enables the customers to decide on price, choice of
products, designs etc., On account of innovative methods of marketing the customers can have access to
information covering wide range of areas.
Individual preference:
The interconnectivity, information and interface provided by the internet network assists the customer with wide
choices. Based on his/her preference and capacity a customer can decide on his preference to choose and
order.
Integrity:
With the changing time and requirements and on account of security issues and also to safe guard the users
from cyber crimes, internet provides tools to check the authenticity of the data and its providers. In view of
many fake offers & advertisements, the internet users should be cautious. They should not provide any
sensitive information like details of PIN, passwords and other information to any unauthorized sites, not only to
safeguard their interests, but also not to allow cyber criminals to have access to this information.
8
Internet and Supply Chain Management
Internet also provides online distribution of digitalized products. This helps in quick turnaround reach to a large
number of customers, and eliminates the lead time between the place of order and delivery. This also enables
a better inventory management and quicker transaction processing. Many enterprises have started using the
new
concept called Enterprise Resource Planning (ERP) systems. e-distribution (cyber distribution) activities when
linked to these ERP systems assist the companies to achieve a greater efficiency in their entire Supply Chain
Management.
Cyber Marketing: Limitations:
Internet marketing is also exposed to quite a few problems. Some of them are in-built and others are external
problems.
1. Digitization: For cyber marketing, the products should be in digitized format. This process requires
manpower, skills and technical knowledge. The digitization is one of the issues faced by e marketing.
2. Shopping experience: Customers especially in India are more used to touch and feel experience as
against click and view mode of shopping.
3. Cyber crimes: Despite the popularity of internet and e commerce and e-marketing, on account of different
cyber crimes users are concerned about e marketing.
4. Security: While shopping on internet, customers are required to furnish sensitive personal data which are
being shared by marketing companies and create inconvenience to the customers and also pose threats
to their privacy.
While customers can have faster access to information and details about the range of products, customers are
cautioned to be careful on account of various issues and risks associated with cyber marketing.
In today’s fast growing e commercial activities, banks’ role is very important for the success of global e- commerce.
e- commerce should be end to end covering various aspects like from the customer’s end, the selection of on line
products, placement of orders, and making and settling payments.
An effective global payment channel should be an integral part of global e commerce. Before setting up a global
payment channel, an organization should consider certain aspects such as
1. Payment Type: Payments can be made through different modes like credit cards, debit cards, or online
transfer. Customers should be allowed to choose any of the method to settle payments. Internal checking
and balancing act should be embedded into the system
2. Legal frame work/Regulatory compliance: The system should satisfy the legal and regulatory requirements
in the centers
3. Taxes: Taxation laws are different in different countries. The payment system should have the capability
to calculate and compute the required taxes, duties as per the local tax laws
4. Banking relationship: Global e commerce involves cross border trade activities and to ensure prompt
settlement of payments, the system should be supported by the banks to process these payments. As
per the rules and procedures applicable at different centers, the payment system should be supported by
well established banks.
5. Risk: Global e commerce is subject to risks. On-line payment risks can be classified into:
9
Credit Risk: The customer may not have sufficient funds to make payment
Fraud: Payments may be made on a misrepresented identify
International Initiatives: Bank for International Settlements (Basel) has taken many international initiatives to
ensure global financial stability. It is also taking actions to strengthen the global financial infrastructure.
According to the Committee on Payments and Settlement Systems (CPSS), the core principles for a controlled
payments and settlement systems are:
1. The system should be based on a clear legal framework under all relevant jurisdictions
2. All participants should be able to clearly understand the system’s rules and procedures. There should
be clarity regarding system’s impact on each of the financial risks
3. Credit and liquidity risks are important risks in an e-commerce environment. Hence banks Payment
systems should cover the area of credit and liquidity risk management
4. Liquidity management depends upon timely settlement of funds. In view of this, banks’ settlement
systems should ensure that settlements take place without fail on the value dates (during the day
and/or definitely at the end of the day. In case of multilateral netting, at the minimum, the system
should be able to complete daily settlements in case the participant of a single big ticket transaction is
unable to make the settlement
5. The system should have an integrated high degree of security and operational reliability
6. The system should have a backup system to handle any contingency situations for timely completion of
daily processing
RBI as the central bank plays a pivotal role in ensuring that a payment and settlement system is established in
conformity with the international standards. Some of the initiatives taken by RBI in introducing different models
RBI has been very active in introducing new systems to take care of changing environment and also to safe
guard the interest of bank customers, banks, financial instiutions,traders, and others. RBI also ensures that the
payment amd settlement systems opreating in India are safe, secure, efficient, accessible and authorised. In
addition to the above, RBI played a key role in the establishment of the Clearing Corporation of India Ltd (CCIL),
a central organisation that settles transactions relating to government securities and foreign exchange
transactions.
Over the years, RBI has introduced the above mentioned payment and settlement systems to ensure that the e
commerce participants are provided with world class system
The success of e-commerce depends upon the efficiency of the support system in timely settlement of funds
(payments and receipts). In this regard, the Indian banks are enhancing their payment system to offer
international standard service to support e commerce activities.
A simple payment processing model involves the following steps:
The buyer’s bank receives money and instructions to remit the funds. Bank uses its payment and settlement
network like RTGS, NEFT and remits the funds to the payee’s (beneficiary – vendor – seller’s account)
(INFINET) INdian FInancial NETwork- INFINET is the communication backbone for the Indian banking and the
financial sectors. All banks in the public sector, private sector, co-operative etc. and the premier FIs in the
country are eligible to become members of INFINET. It is a closed user group network for the exclusive use of
the member banks and FIs and is the communication backbone for the National Payments System which caters
to inter-bank applications like RTGS, Delivery vs. Payment, Automated clearing house, Government
11
Transactions etc. With the availability of better and more reliable technology, INFINET backbone has now been
to large extent migrated to multi protocol label switching (MPLS).
1. Increased automation. There’s no escaping that people costs continue to be a big part of total IT costs.
The use of cloud services will continue to reduce this (with cloud service providers achieving lower costs
through both economies of scale and the use of automation) but there is still a need to reduce human
touch points, and the associated costs, within corporate data centers and operational environments –
with speedier delivery and fewer human errors secondary benefits. 2015 will see even greater
automation adoption by corporate IT organizations under pressure to reduce costs and better
demonstrate business value.
2. Continued cloud adoption. IT organizations will continue to move IT services (whether buying SaaS,
IaaS, or PaaS) to third-party cloud service providers. Security will continue to be a cause for concern,
especially as the media’s breach article frenzy continues. However, the ability to integrate (with existing
on-premise and newer cloud services) – and have always-up service availability – will rise to be two very
practical concerns for enterprise cloud adoption. From an IT management point of view, organizations
will need to continue to seek out people with the ability to manage suppliers and service delivery.
Nonetheless, IT will continue to head to the cloud in 2015.
3. The growth of hybrid cloud. Only the foolish ever thought that large enterprises would move
12
everything from the corporate data center to the cloud. Yes, new companies might be able to rely on
third-party cloud service providers but for those with a long business and data center history, and
sensitivity to storing certain types of information in the public cloud, it was never going to be the case.
The hybrid cloud, defined by global analyst firm Gartner as “a combination of private, public, and
community cloud services,” will continue to rise in popularity during 2015 as organizations look to get the
best from both private and public cloud.
4. The BYO epiphany. This is where corporate IT organizations finally wake up to see that Shadow IT,
BYOD, or BYO-anything is not being driven by consumer IT and cloud service providers but by the
corporate IT organization’s inability to meet stakeholder and user expectations across usability, cost,
service, and agility. The 10 years of Consumerization of IT talk, with a focus on consumer gadgets, has
thus been a red herring – hiding the true root cause of customer discontent with existing IT supply. Post-
epiphany, corporate IT organizations will need to change; and change quickly.
5. Greater focus on IT costs. It’s inevitable. It’s been over 10 years since business colleagues buying
consumer products and services first started to question why they receive lower spec IT equipment at a
higher cost from the corporate IT department. And now as companies require more and more
technology to function, especially those that are transforming to digital enterprises, those IT costs will
continue to rise. The increased use of third-party service providers (cloud or IT services) will reduce the
burden somewhat but it will not be enough for IT organizations to escape the scrutiny of the CFO and
CEO, and the need for greater financial stewardship during 2015.
6. The increased focus on costs will drive a focus on assets. IT asset management has long been a
poor relation to corporate IT service management activities and investment. In some ways, the lack of
business scrutiny as to why IT costs so much, has allowed corporate IT organizations to be lackadaisical
in their asset management. But those days have gone, or are quickly coming to an end, with 2015 finally
seeing corporate IT organizations looking to physical and software assets as ways of reducing and
optimizing costs.
7. IT service management models will trifurcate. The focus on delivering consumer-like service
experiences and the extension of IT service management capabilities to other corporate service
providers such as HR, facilities, and legal through enterprise service management, will cause IT service
management as a discipline to divide into, and to evolve at different speeds within, two different schools
of thinking. There will be traditional IT service management, enterprise service management, and then
both with an emphasis on better meeting customer expectations around not only the consumed service
but also the service experience. 2015 will see many corporate IT organizations at a crossroads as they
chose which of the three service management roads to take.
8. The need to manage more complex IT supplier environments. This need will continue to grow as
enterprises exit outsourcing deals that have failed to deliver against expectations of service
improvement, cost savings, and innovation. In 2015 the need for service integration capabilities, often
called service integration and management (SIAM) or multisourcing services integration (MSI), will come
to the fore. And this will happen not only for larger organizations replacing previously outsourced
scenarios with multiple suppliers but also smaller organizations needing to manage a portfolio of third-
party, often cloud service, providers.
9. Continued mobile pervasiveness. Continued improvements in anytime, anywhere, any device access
to data and services will continue to drive the need for better mobile apps and experiences, and the use
of personal devices for work purposes. Not only will this dictate the need for better service and app
design and delivery, and more intelligent approaches to BYOD, but also the need to consider the
security implications of mobility such as data segregation issues – with personal and business data and
applications isolated from each other on the same device.
10. Wearables and the quantified worker. The Apple iWatch launch in 2015 will no doubt see a greater
potential business use case focus on wearable computing. While employees might like the idea of a new
gadget giving them access to alerts and short messages related to email, social media, schedules, travel
plans, or the weather, the ability of wearables to provide location and productivity-related information
about the employee might not be so appealing. 2015 will provide an exciting technology opportunity, but
one that will need the corporate IT organization and its business partners to fully understand the human
implications of new technology.
11. Big Data. While there will continue to be big talk about Big Data, the real Big Data issue for 2015 will be
the availability of Big Data people and their Big Data skills rather than Big Data technology itself. Not
only from a tail-end analytics and insight perspective, companies will also need the people and skills for
13
building the new data architectures required to handle unstructured data and real-time input, and other
changes required as the increased focus on large data sets continues to disrupt business and IT
operations.
12. The Internet of Things (IoT), or the Internet of Everything (IoE). Most of us are probably bored to
death of hearing about how the IoT will change IT forever. It seems as though it has been a long time
coming – from IP address management through service/fault management to Big Data analytics. Then
there is the security of a whole new breed of network-connected end points. 2015 will see IT
organizations having to look beyond the traditional IT capabilities, such as availability and capacity
management, to work closer with business colleagues on how these now-connected devices do, can,
and will tie in to business operations and business models.
13. Knowledge management will reappear. It’s been around since before the end of the last century but
2015 will see it appear on the IT agenda again – not only because of the replacement of people with
automation and the associated potential for corporate knowledge loss, but also due to the rise in self-
help and self-service. Organizations need to be clear about what they need though. Knowledge
management has previously been held back by its name – knowledge isn’t valuable because it is
managed, the value comes from its use and reuse. So look at knowledge management through a new
lens, one of knowledge mining and knowledge exploitation.
14. Software-defined everything will continue its advancement. You’ve probably already heard the talk
of software-defined data centers or software-defined networks, where the control plane is abstracted
from the hardware. It seems to be in vogue across all data center domains: software-defined servers
now seem old hat; software-defined networking continues to mature; and software-defined storage is
gaining interest. But this is about more than quickly moving from the old to the new state data center,
notwithstanding the fact that the legacy data center might not want to change so quickly. It’s about
increasing your agility, minimizing vendor lock-in, and improving your ability to serve the customers and
consumers of your IT services.
15. Unicorn chasing will continue. Whether it be the use of cloud technologies or DevOps thinking and
operations, in 2015 enterprises will continue their fascination with the operations of technology giants
such as Amazon, Google, and Facebook. Business leaders will also continue to ask why their corporate
IT organizations can’t match these technology giants for unit costs, service levels, service experience,
customer support, and agility. Thus, these technology unicorns will continue to be chased, and I’m not
sure that 2015 or even 2016 or even 2017, for that matter, will be the year that they are caught.
14