Skip to main content

Architecture and System of E-Commerce

  • Chapter
  • First Online:
E-Commerce

Part of the book series: Advanced Studies in E-Commerce ((ASEC))

  • 1195 Accesses

Abstract

In 1998, Liu Qiangdong founded Jingdong in Zhongguancun, and Jingdong’s trading model at that time was offline. Later, Liu realized the development potential of Online Marketing with the popularity of the Internet, and Liu used forums and other platforms to conduct online transactions to expand the scale of Jingdong’s transactions. In June 2006, Jingdong opened its professional blog system, the Jingdong Product Blog System, which was a product-oriented system, and further tried to expand its business on the Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Naur [1].

  2. 2.

    Bosch [2].

  3. 3.

    Gacek [3].

  4. 4.

    Jansen [4].

  5. 5.

    Taylor [5].

  6. 6.

    Shin [6].

  7. 7.

    Dong [7].

  8. 8.

    Jin [8].

  9. 9.

    Zheng [9].

  10. 10.

    Lippman [10].

  11. 11.

    Lieberherr [11].

  12. 12.

    Clark [12].

  13. 13.

    Taylor [13].

  14. 14.

    Schuldt [14].

  15. 15.

    Urgaonkar [15].

  16. 16.

    Bhulai [16].

  17. 17.

    Shu [17].

  18. 18.

    Zhang [18].

  19. 19.

    Sundareswaran [19].

  20. 20.

    Garlan [20].

  21. 21.

    Hong [21].

  22. 22.

    Sun [22].

  23. 23.

    Majidi [23].

  24. 24.

    Galster [24].

  25. 25.

    Qin [25].

  26. 26.

    Kumar [26].

  27. 27.

    Shaw [27].

  28. 28.

    Lu [28].

  29. 29.

    Eickelmann [29].

  30. 30.

    Pahl [30].

  31. 31.

    Banijamali [31].

  32. 32.

    Chen [32].

  33. 33.

    Pautasso [33].

  34. 34.

    Dragoni [34].

  35. 35.

    Nadareishvili [35].

  36. 36.

    Koren [36].

  37. 37.

    Yu [37].

  38. 38.

    Yu [38].

  39. 39.

    He [39].

  40. 40.

    Banijamali [31].

  41. 41.

    Banijamali [40].

  42. 42.

    Harvey [41].

  43. 43.

    Thang [42].

  44. 44.

    Lee [43].

  45. 45.

    Meng [44].

  46. 46.

    Hennessy [45].

  47. 47.

    Rieskamp [46].

  48. 48.

    Krawczyk [47].

  49. 49.

    Whyte [48].

  50. 50.

    Specification S E T S E T [49].

  51. 51.

    Specification S E T S E T [50].

  52. 52.

    Specification S E T S E T [51].

  53. 53.

    Lamport [52].

  54. 54.

    Ongaro [53].

  55. 55.

    Lamping [54].

  56. 56.

    Boyd [55].

  57. 57.

    Chu [56].

  58. 58.

    De Angelis [57].

  59. 59.

    Mingxiao [58]

  60. 60.

    Junqueira [59].

  61. 61.

    Chao [60].

  62. 62.

    Prisco [61].

  63. 63.

    Leslie [62].

  64. 64.

    Diffie [63].

  65. 65.

    Bresson [64].

  66. 66.

    Li [65].

  67. 67.

    Jech [66].

References

  1. Naur P, Randell B (1969) Software engineering: report of a conference sponsored by the Nato Science Committee, Garmisch, Germany, 7th–11th October 1968

    Google Scholar 

  2. Bosch J (2000) Design and use of software architecture: adopting and evolving a product line approach. Addison-Wesley

    Google Scholar 

  3. Gacek C, et al (1995) On the definition of software system architecture. In: Proceeding of the 1st international workshop on architectures for software systems, New York, pp 85–95

    Google Scholar 

  4. Jansen A, Bosch J (2005) Software architecture as a set of architectural design decisions. In: 5th working IEEE/IFIP conference on software architecture (WICSA’05). IEEE, pp 109–120

    Google Scholar 

  5. Taylor JT, Taylor WT (2021) Software architecture. In: Patterns in the machine. Apress, Berkeley, CA, pp 63–82

    Google Scholar 

  6. Shin EH, El-Sheimy N (2005) Navigation Kalman filter design for pipeline pigging. J Navig 58(2):283–295

    Article  Google Scholar 

  7. Dong W, Zhang J, Liu D et al (2013) Pipeline filter algorithm based on movement direction estimation. Acta Photonica Sinica 42(4):471–474

    Article  Google Scholar 

  8. Jin LIU, Hong-bing JI (2007) Detection method for small targets in the IR image based on the variable weighted pipeline filter. J Xidian Univ 34(5):743–747

    Google Scholar 

  9. Zheng Q (2018) Software architecture. Tsinghua University Press

    Google Scholar 

  10. Lippman SB, Lajoie J, Moo BE, Wang G (Translated Feng YJ) (2013) C++ primer. Electronic Industry Press

    Google Scholar 

  11. Lieberherr K, Holland I, Riel A (1988) Object-oriented programming: an objective sense of style. ACM Sigplan Not 23(11):323–334

    Article  Google Scholar 

  12. Clark T, Barn BS (2011) Event driven architecture modeling and simulation. In: Proceedings of 2011 IEEE 6th international symposium on service oriented system (SOSE). IEEE, pp 43–54

    Google Scholar 

  13. Taylor H, Yochem A, Phillips L, et al (2009) Event-driven architecture: how SOA enables the real-time enterprise. Pearson Education

    Google Scholar 

  14. Schuldt H (2009) Multitier architecture

    Google Scholar 

  15. Urgaonkar B, Pacifici G, Shenoy P et al (2005) An analytical model for multitier internet services and its applications. ACM SIGMETRICS Perform Eval Rev 33(1):291–302

    Article  Google Scholar 

  16. Bhulai S, Sivasubramanian S, Van Der Mei R, et al (2007) Modeling and predicting end-to-end response times in multitier internet applications. In: International Teletraffic Congress. Springer, Berlin, Heidelberg, pp 519–532

    Google Scholar 

  17. Shu Y, Zhang JF, Zhou X (2006) A grid-enabled architecture for geospatial data sharing. In: 2006 IEEE Asia-Pacific conference on services computing (APSCC’06). IEEE, pp 369–375

    Google Scholar 

  18. Zhang L, Luo M, Li J et al (2019) Blockchain based secure data sharing system for Internet of vehicles: a position paper. Veh Commun 16:85–93

    Google Scholar 

  19. Sundareswaran S, Squicciarini A, Lin D (2012) Ensuring distributed accountability for data sharing in the cloud. IEEE Trans Dependable Secure Comput 9(4):556–568

    Article  Google Scholar 

  20. Garlan D, Shaw M (1993) An introduction to software architecture

    Google Scholar 

  21. Hong M, Junrong S (2006) Advances in software architecture research. J Softw 06:1257–1275

    MATH  Google Scholar 

  22. Sun C-A, Jin M-Z, Liu C (2002) A review of software architecture research. J Softw (07):1228–1237

    Google Scholar 

  23. Majidi E, Alemi M, Rashidi H (2010) Software architecture: a survey and classification. In: 2010 second international conference on communication software and networks. IEEE, pp 454–460

    Google Scholar 

  24. Galster MEAMM (2010) Systematic selection of software architecture styles. IET Softw 4(5):349–360

    Article  Google Scholar 

  25. Qin Z, Zheng X, Xing J (2008) Architectural styles and patterns. Softw Arch 34–88

    Google Scholar 

  26. Kumar A (2014) Software architecture styles: a survey. Int J Comput Appl 87(9):5–9

    Google Scholar 

  27. Shaw M (1995) Making choices: a comparison of styles for software architecture. IEEE Softw 12(6):27–41

    Article  Google Scholar 

  28. Lu C, Ying L, Abdelzaher TF et al (2006) Feedback control architecture and design methodology for service delay guarantees in web servers. IEEE Trans Parallel Distrib Syst 17(9):1014–1027

    Article  Google Scholar 

  29. Eickelmann N (2018) Software architecture for big data and the cloud. Comput Rev 59(12):638–639

    Google Scholar 

  30. Pahl C, Jamshidi P, Zimmermann O (2018) Architectural principles for cloud software. ACM Trans Internet Technol (TOIT) 18(2):1–23

    Article  Google Scholar 

  31. Banijamali A, Pakanen OP, Kuvaja P et al (2020) Software architectures of the convergence of cloud computing and the Internet of Things: a systematic literature review. Inf Softw Technol 122:106271

    Article  Google Scholar 

  32. Chen L (2018) Microservices: architecting for continuous delivery and DevOps. In: IEEE international conference on software architecture. IEEE, pp 39–397

    Google Scholar 

  33. Pautasso C, Zimmermann O, Amundsen M et al (2017) Microservices in practice, part 1: reality check and service design. IEEE Softw 34(1):91–98

    Article  Google Scholar 

  34. Dragoni N, Lanese I, Larsen ST, et al (2017) Microservices: how to make your application scale. In: International Andrei Ershov memorial conference on perspectives of system informatics. Springer, Cham, pp 95–104

    Google Scholar 

  35. Nadareishvili I, Mitra R, McLarty M, et al (2016) Microservice architecture: aligning principles, practices, and culture. O’Reilly Media, Inc

    Google Scholar 

  36. Koren Y, Bell R (2011) Advances in collaborative filtering. In: Recommender systems handbook. Springer US, pp 145–186

    Google Scholar 

  37. Yu W, Lin X, Liu J, et al (2021) Self-propagation graph neural network for recommendation. IEEE Trans Knowl Data Eng

    Google Scholar 

  38. Yu W, Qin Z (2020) Sampler design for implicit feedback data by noisy-label robust learning. In: Proceedings of the 43rd international ACM SIGIR conference on research and development in information retrieval, pp 861–870

    Google Scholar 

  39. He X, Deng K, Wang X, et al (2020) LightGCN: simplifying and powering graph convolution network for recommendation. In: Proceedings of the 43rd international ACM SIGIR conference on research and development in information retrieval, pp 639–648

    Google Scholar 

  40. Banijamali A, Heisig P, Kristan J, et al (2019) Software architecture design of cloud platforms in automotive domain: an online survey. In: 2019 IEEE 12th conference on service-oriented computing and applications (SOCA). IEEE, pp 168–175

    Google Scholar 

  41. Harvey OJ (1966) System structure, flexibility and creativity. In: Experience structure & adaptability. Springer, Berlin, Heidelberg, pp 39–65

    Google Scholar 

  42. Thang TV, Ahmed A, Kim C et al (2015) Flexible system architecture of stand-alone PV power generation with energy storage device. IEEE Trans Energy Convers 30(4):1386–1396

    Article  Google Scholar 

  43. Lee AC, Chen ST (1994) Collocated sensor/actuator positioning and feedback design in the control of flexible structure system

    Google Scholar 

  44. Meng L, Luna A, Díaz ER et al (2015) Flexible system integration and advanced hierarchical control architectures in the microgrid research laboratory of Aalborg University. IEEE Trans Ind Appl 52(2):1736–1749

    Google Scholar 

  45. Hennessy JL, Patterson DA (2011) Computer architecture: a quantitative approach. Elsevier, Amsterdam

    Google Scholar 

  46. Rieskamp J, Otto PE (2006) SSL: a theory of how people learn to select strategies. J Exp Psychol Gen 135(2):207

    Article  Google Scholar 

  47. Krawczyk H (2001) The order of encryption and authentication for protecting communications (or: How secure is SSL?). In: Annual international cryptology conference. Springer, Berlin, Heidelberg, pp 310–331

    Google Scholar 

  48. Whyte DJ (1997) The development and use of the Secure Electronic Transaction (SET) protocol on the internet

    Google Scholar 

  49. Specification SETSET (1997) Book 1: business description. Mastercard & Visa, Version 1:31

    Google Scholar 

  50. Specification S E T S E T (1997) Book 2: programmer’s guide. Ch 1:39–43

    Google Scholar 

  51. Specification S E T S E T (1997) Book 3: formal protocol definition. Version 1.0

    Google Scholar 

  52. Lamport L (2001) Paxos made simple. ACM SIGACT News 32(4):18–25

    Google Scholar 

  53. Ongaro D, Ousterhout J (2014) In search of an understandable consensus algorithm. In: 2014 {USENIX} annual technical conference ({USENIX}{ATC} 14), pp 305–319

    Google Scholar 

  54. Lamping J, Veach E (2014) A fast, minimal memory, consistent hash algorithm. arXiv preprint arXiv:1406.2294

  55. Boyd S, Ghosh A, Prabhakar B, et al (2005) Gossip algorithms: design, analysis and applications. In: Proceedings IEEE 24th annual joint conference of the IEEE computer and communications societies, vol 3. IEEE, pp 1653–1664

    Google Scholar 

  56. Chu X, Bu T, Li XY (2007) A study of lightpath rerouting schemes in wavelength-routed WDM networks. In: 2007 IEEE international conference on communications. IEEE, pp 2400–2405

    Google Scholar 

  57. De Angelis S, Aniello L, Baldoni R, et al (2018) PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain

    Google Scholar 

  58. Mingxiao D, Xiaofeng M, Zhe Z, et al (2017) A review on consensus algorithm of blockchain. In: 2017 IEEE international conference on systems, man, and cybernetics (SMC). IEEE, pp 2567–2572

    Google Scholar 

  59. Junqueira FP, Reed BC, Serafini M (2011) Zab: high-performance broadcast for primary-backup systems. In: 2011 IEEE/IFIP 41st international conference on dependable systems & networks (DSN). IEEE, pp 245–256

    Google Scholar 

  60. Chao, N (2015) From Paxos to Zookeeper: distributed consistency principles and practices. Electronic Industry Press

    Google Scholar 

  61. Prisco RD (2000) Revisiting the Paxos algorithm. Theoret Comput Sci 243(1–2):35–91

    Article  MathSciNet  MATH  Google Scholar 

  62. Leslie L (1998) The part-time parliament. ACM Trans Comput Syst 16(2):133–169

    Article  Google Scholar 

  63. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  MATH  Google Scholar 

  64. Bresson E, Chevassut O, Pointcheval D (2001) Provably authenticated group Diffie–Hellman key exchange—the dynamic case. In: International conference on the theory and application of cryptology and information security. Springer, Berlin, Heidelberg, pp 290–309

    Google Scholar 

  65. Li N (2010) Research on Diffie–Hellman key exchange protocol. In: 2010 2nd international conference on computer engineering and technology, vol 4. IEEE, pp V4-634–V4-637

    Google Scholar 

  66. Jech TJ, Jech T, Jech TJ et al (2003) Set theory. Springer, Berlin

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Zheng Qin , Qinghong Shuai , Guolong Wang , Pu Zhang , Mengyu Cao or Mingshi Chen .

Appendix

Appendix

Architecture

架构

Cloud architecture

云架构

Pipeline

流程/业务流

Object oriented style

面向对象风格

Workflow

工作流

Event driven style

事件驱动风格

Acceptor

Paxos 算法中的接受者

Proposer

Paxos 算法中的提案者

JD/JingDong

京东公司

Taobao

淘宝公司

Ali

阿里公司

Interpreter style

解释器风格

Feedback control loop style

反馈控制环风格

Cloud architecture styles

云体系结构风格

Microservice architecture style

微服务架构

Easemob

环信

Megvii

旷视科技

Dodoca

点点客

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Xi'an Jiaotong University Press

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Qin, Z., Shuai, Q., Wang, G., Zhang, P., Cao, M., Chen, M. (2022). Architecture and System of E-Commerce. In: E-Commerce. Advanced Studies in E-Commerce. Springer, Singapore. https://doi.org/10.1007/978-981-19-6438-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-6438-1_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-6437-4

  • Online ISBN: 978-981-19-6438-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics