SlideShare a Scribd company logo
1 of 11
Download to read offline
25 
International Journal of Computing Academic Research (IJCAR) 
ISSN 2305-9184 Volume 1, Number 1 (October 2012), pp. 25-35 
© MEACSE Publications 
http://www.meacse.org/ijcar 
Impact of Information Technology on Nigeria Banking Industry: a case Study of Skye Bank 
Ibikunle Frank and James Oluwafemi 
Covenant University, Ota, Nigeria 
Abstract 
As Information Technology is vital in banking today, it becomes imperative for banks to realize its impact on operational performance in order to justify capital investments. The objective of this work is to examine how the adoption of Information Technology affects the operations of commercial banks in terms of effectiveness, efficiency, competitiveness, customer base and globalization of the bank. The research methodology involved reviewing the existing network design of the investigating bank and comparing it with the proposed network design solution. The design and simulation results of work revealed that Information Technology led to increase customer satisfaction, improved operational efficiency, reduced transaction time, better competitive edge, reduced the running cost and ushered in swift response in service delivery. 
Keywords- VLAN, VPN, Tunnel, WAN, LAN 
I. INTRODUCTION 
Case studies have shown that effective and efficient use of Information Technology (IT) helps to distinguish between business equivalents. For example, IT was an important distinction between banks that were doing well in the mid-1980s as compared to those that was less profitable [1]. Hence the need to survive, for global relevance, to maintain existing market share and sustainable development has called for the exploitation of IT and its many advantages. In the banking industry, a list of IT products that have been adopted range from teller printers, Automated Teller Machines (ATMs), smart cards, Magnetic Ink Character Reader (MICR). A list of IT services also includes internet banking, mail, telephone banking, and mobile banking. Accounting for a greater percentage of what could be regarded as IT in banks is its internetworking. This internetworking refers to the internet, extranet and intranet and interbank networking. Intranet exists in branches such that transactions taking place in a branch is only accessible in that branch alone. For example, a branch has a VPN of 10.108.108.0 and another has a VPN of 10.103.103.0. A transaction taking place at 108 networks is exclusively for that network, it cannot be seen from the 103 network. Extranet exists such that a customer is not restricted to the branch he opened his account. He could bank anywhere since such information is made securely available within the bank regardless of its network. Internet is the unsecured channel wherein both the secured intranet and extranet exists. Here, every other information aimed for the public is made available since they are not confidential. 
This research work aims at providing Nigerian banks with a better IT solution with respect to its network design, architecture and deployment; to examine how IT affects the operations of banks regarding their effectiveness, efficiency, competitiveness, performance, customer base and globalization; to review the bank’s existing network and provide a workable solutions to the existing network.
International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 
26 
2. LITERATURE REVIEW 
Researchers have evolved from mere reports to more empirically based reports. These include the extensive works [2] and [3]. For instance, a study of selected stores in a fast food industry showed that stores with the technology and large breakfast sales performed significantly better in terms of cutting materials cost [4]. However, it was realized that firms that extensively relied on computers had either a very strong or a weak financial performance [5]. The first stage of information technology in banks started with an attempt to automate the banking process through mechanization. It was by the use of note counters and accounting calculators to speed up basic transactions. Another stage of information technology was in the storage and retrieval of information. Then in the late 1950s and 1960s, business data processing was through punched card equipment. The 1970s saw the introduction of Information Technology Management System (MIS) and Decision Support System (DSS). The 1980s saw the fusion of telecommunications and networking technologies for business deployment. It also saw to the emergence of data processing, Office Information System (OIS) and personal computers. 
The financial sector has been an interesting case for service innovation as it moves towards using the web for commercial purpose through internet banking and IT. The impact of price clarity and consumer empowerment afforded by information technology eventually led to product and price competition. IT has made banks not just being profit-centric but also customer-centric banks [6]. The web based banking operations has made it possible to accommodate functions and processes in other sectors like in government (vehicle license registration) and education (payment of fees). With the aid of information technology, banks are closer to their customers to find out what they really need and deliver such needs. Information technology has made it possible for customers to gain access to their account balance, buy recharge cards and pay bills using their mobile phones anytime from anywhere. Online banking allows customers to get their current account balance at any time. Information technology leads to a reduction in cash transactions which leads to reduction in crime [7]. 
3. CHALLENGES OF IT APPLICATION IN NIGERIAN BANKS 
Nigeria’s poor infrastructures have been identified as the first major challenge in banks. Reports have it that in Nigeria, there are only one computer and four main telephone lines per thousand people. Also, electricity supply is sporadic and inefficient. Most importantly, Nigeria has very low internet penetration with less than one internet service provider per thousand people [8]. Highlighted was the ineffective implementation of information technology [9]. The challenges being faced by Nigerian banks in their attempt to ensure a smooth exchange of electronic data and information are [10]: 
a) The need to build a better infrastructure that will serve as backbone for communication within the banks 
b) The need to collaborate in sourcing for new technological equipment that will provide common standard 
c) The need to get better at information technology system development and operation by bank management 
d) The need to impress by improving the present telecommunications infrastructure 
To combat these challenges, the following were proffered [10]: 
a) There should be government and public awareness to attract long term investments in the telecommunication industry. 
b) Emphasis should be set on the importance of maintaining existing infrastructure and equipment. 
4. NETWORK DESIGN 
Network design is a critical process to network architecture and administration. This section seeks to deliver a comprehensive network design based on two models; the existing network model and a
International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 
27 
proposed network solution for the bank. The design was broken down into 4 categories: The existing 
WAN, proposed WAN, existing LAN and, proposed LAN. 
4.1 Research Methodology 
We obtained the existing network design with emphasis on its topology, link speed, LAN/WAN 
technology. The existing bank network designs are reviewed. We measured the performance 
characteristics being offered by the existing network. Then propose network design solution that will 
give better network performance results and characteristics. 
4.2 Existing Bank WAN 
Basically, the bank leases a circuit (a particular amount of bandwidth) from a service provider. The 
service provider would take care of providing and maintaining the complete circuit from one location 
to other location(s) which includes owning and operating all the passive and active components 
required in maintaining the Wide Area Network. The leased lines cost more with increasing distance 
between locations. And in case of multiple branches, each branch needs to take a separate leased 
circuit to every other location to maintain communications between them. 
INTERNET 
1.1.1.0/30 
1.1.1.4/30 
3.3.3.4/30 
4.4.4.4/30 
5.5.5.4/30 
6.6.6.4/30 
6.6.6..0/30 
5.5.5.0/30 
4.4.4.0/30 
2.2.2.0/30 
3.3.3.0/30 
ISP_3 
ISP_5 ISP_6 
OPEBI_EDGE 
Loopback address: 10.103.103.1/24 
ALLEN_EDGE 
Loopback address: 10.102.102.1/24 
ISP_1 
2.2.2.4/30 
ALAUSA_EDGE 
Loopback address: 10.164.164.1/23 
ISP_2 
ISP_4 
9.9.9.0/30 
8.8.8.0/30 
7.7.7.0/30 
10.10.10.0/30 
7.7.7.4/30 
8.8.8.4/30 
9.9.9.0/30 
10.10.10.4/30 
ISP_7 
ISP_10 
ISP_9 
ISP_8 
TOYINSTR_EDGE 
Loopback address: 10.3.3.3.0/30101.101.1/24 
OGBA_EDGE 
Loopback address: 10.104.104.1/24 
Figure 1: Existing Bank WAN 
Leased lines have been traditionally a popular mode of connectivity between two branches or 
multiple branches in different locations. Leased lines are private, secure, scalable and quite sufficient 
for basic data connectivity between different branches. Basically, the bank leases a circuit from a 
service provider via multiple interfaces including Optic fiber etc. 
4.3 Proposed Bank WAN Solution 
The central office is the headquarters that connects to smaller central offices (regional headquarters) 
by fibre links.
International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 
28 
9.1.0.0/30 
12.0.0.0/30 
13.0.0.0/30 
15.0.0.0/30 
16.0.0.0/30 
17.0.0.0/30 
18.0.0.0/30 
19.0.0.0/30 
20.0.0.0/30 
11.0.0.0/30 
14.0.0.0/30 
INTERNET 
9.0.0.0/30 
9.1.1.0/25 
149.0.0.0/30 
10.1.1.0/30 
9.1.1.0/25 148.0.0.0/30 
150.0.0.0/30 
AGGREGATOR_1 
EDGE ROUTER 2 
EDGE ROUTER 1 
11.0.0.0/30 
12.0.0.0/30 
14.0.0.0/30 
13.0.0.0/30 
15.0.0.0/30 
17.0.0.0/30 
18.0.0.0/30 
19.0.0.0/30 
20.0.0.0/30 
AGGREGATOR_2 
Allen branch 
Loopback: 10.112.112.0/24 
Ogba branch 
Loopback: 10.115.115.0/24 
Opebi branch 
Loopback: 10.113.113.0/24 
Ikorodu main branch 
Loopback: 10.117.117.0/24 
Oregun branch 
Loopback: 10.116.116.0/24 
Obafemi Awolowo branch 
Loopback: 10.114.114.0/24 
Magodo branch 
Loopback: 10.119.119.0/24 
Ketu branch 
Loopback: 10.118.118.0/24 
Alausa branch 
Loopback: 10.164.164.0/24 
ALAUSA_SEC branch 
Loopback: 10.111.111.0/24 
Figure 2: Proposed Bank WAN 
At the hubs, point-to-multipoint links are being used while at the spokes, point-to-point links are 
being used. The star topology reduces the probability of network failure by connecting all of the 
spokes to a hub. The failure of a link between any spoke and the hub will only result in the isolation 
of that spoke from all others, but the remaining will be unaffected. An advantage of the star topology 
is the simplicity of adding extra spokes. It is such that even in any case of expansion, additional 
branches do not affect the existing branches network. 
4.4 Existing Bank LAN 
NETWORK 10.164.164.0/23 
DHCP SERVER 
VLAN1 = 10.164.164.13/23 
Ground floor 1st floor 2nd floor 
3rd floor 
VLAN1 = 10.164.164.5/23 VLAN1 = 10.164.164.8/23 VLAN1 = 10.164.164.11/23 
VLAN1 = 10.164.164.4/23 VLAN1 = 10.164.164.7/23 VLAN1 = 10.164.164.10/23 
VLAN1 = 10.164.164.3/23 VLAN1 = 10.164.164.6/23 VLAN1 = 10.164.164.9/23 
VLAN1 = 10.164.164.12/23 
DISTRIBUTION SWITCH 
10.164.164.2 
EDGE ROUTER 
10.164.164.1/23 
ISP 
198.48.16.0/30 
Figure 3: Existing Bank LAN 
Each of these central offices act as hubs to several other branches (spokes) within their geographical 
area. In general, the topology used is physical star and logical bus. Here, each access layer switch acts 
as a node while the endpoints are the branches. A typical access layer switch acts as a hub to a 
maximum of about 24 branches. The failure of one switch port or link results only in the failure of 
that branch while every other branch remains active. Likewise, between the distribution switch and 
the access layer switches, redundancy is achieved because in star topology, failure of a link/node does 
not result in the failure of the network. 
4.5 Proposed LAN Solution
International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 
29 
The proposed network design guarantees both security and availability, in other words, it guarantees 
segmentation and redundancy. It employs a physical star and logical bus topology. With the use of 
NETWORK 10.164.164.0/23 
DHCP SERVER 
Ground floor 
Switch port Vlan 
2,4,5,6 70 
3,7,8,9 80 
10,11,12 90 
13,14,15 150 
2nd floor 
Switch port Vlan 
4,5,6,7 100 
8,9,10,11 110 
2,3,12,13,14,15 120 
3rd floor 
Switch port Vlan 
2,3,4,5,6,7,8,9 130 
10,11,12,13,14,15 140 
1st floor 
Switch port Vlan 
2,4,5 10 
3,6,7 20 
8,9 30 
10,11 40 
12,13 50 
14,15 60 
DISTRIBUTION SWITCH 
VLANs 70.80.90.150 VLANs 10,20,30,40,50,60 VLANs 100,110,120 VLANs 130,140 
10 RETAIL 
20 RISK 
30 PUBLIC_SECTOR 
40 STORE 
50 ATM_RECONCILIATION 
60 E_CHANNELS 
70 IT 
80 OPERATIONS 
90 CUSTOMER_SERVICE 
100 REVENUE 
110 LEGAL 
120 CPC 
130 INSPECTION 
140 STRATEGIC_PLANNING 
150 RELATIONSHIP_MANAGEMENT 
Figure 4: Proposed Bank LAN 
Virtual Local Area Networks (VLANs), an access switch could segment a network (even without the 
network being geographically separated), and as such reduces bandwidth wastage as well as 
providing some degree of confidentiality. Due to the proper network segmentation, troubleshooting is 
made easier and faster than in a network that is not segmented. In addition, bandwidth allocation and 
optimization is highly achieved by the use of VLANs. 
4. 6 Benefits of Proposed Solution 
The proposed network solution offers the bank significant positive benefits which include cost, 
security, delay, jitter, latency and maintenance. 
Cost: More cost is incurred when intra-bank transactions are done through the internet. More so, each 
branch being provided with internet access directly from an ISP results in more overhead cost. 
Therefore, routing intra-branch transactions without the use of direct internet leads to lower overhead. 
Moreover, workers are restricted from browsing during work hours (i.e., 9am - 5pm), which implies 
money spent not gained. 
Security: The existing network is such that packet traffic is routed through the internet while in the 
proposed network, inter-branch traffic is routed within its own private network. Although intra-bank 
connections using tunnels offer some degree of security, it cannot be as secure as connections that do 
not go through the internet (public network) at all. 
Delay/latency: Latency means any delay or waiting that increases real or perceived response time 
beyond the response time desired. Causes of latency include mismatches in data speed between the 
microprocessor and input/output devices and inadequate data buffers. The more security features 
available in a single connection, the more the delay. Intra-branch transactions were through VPNs 
which implies more security features, and as such more delay than in a network with less security 
features.
International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 
30 
Jitter: Jitter is a direct offshoot of delay. Since, the existing network has been studied to give a higher delay than the proposed network; the jitter also is higher for the existing network than for the proposed network. A relatively high delay implies a high jitter. 
Maintenance: By implementing VLANs on the proposed network, the network is more segmented than the existing network that is not at all segmented. Troubleshooting is greatly easier and faster in a segmented network since every office, link, node can be identified with a unique VLAN or otherwise segment. 
5. NETWORK IMPLEMENTATION AND TESTING 
Virtual Local Area Networks are used to logically segment users. VLANs are created in an enterprise to differentiate jobs done and people using specific networks. Every switch has a default VLAN of 1. By default, VLAN 1 has all switch ports pre-assigned to it. Figure 5 below shows the configured VLANs on DISTR_SW using “show VLAN-switch” 
Figure 5: Assigning switch ports to configured VLANs 
Dynamic Host Configuration Protocol (DHCP) as the name implies is a protocol used in auto- assigning IP addresses hosts within a network. As the network becomes larger, its impact is better felt. However, unless configured otherwise, DHCP leases out every IP address within the allowed network range including “network and broadcast addresses.” 
Figure 6: Configuring DHCP 
Communication at the network layer (layer 3) is only possible using routing protocols. BGP routing protocol was used since the network consists of both internet and extranet. Figure 7 shows BGP configurations on a router.
International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 
31 
Figure 7: Configuring BGP 
The security feature employed is the Generic Routing Encapsulation (GRE) over IPSEC tunnel which provides a secure connection between sites through an unsecure medium. Figure 8 shows tunnel configurations on a router 
Figure 8: Creating tunnels 
Figure 9 shows a Generic Routing Encapsulation (GRE) configuration on a router. 
Figure 9: Encrypting a tunnel interface 
6. VERIFICATION 
The verification shows successful connectivity between hops and appropriate neighbour. It further presents the delay and jitter encountered in branch to branch communication.
International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 
32 
Figure 10: RTT and Jitter for existing network 
From the results shown in Figure 10, the time taken for a branch to communicate with another branch is determined by the sum of delay along each hop for the entire number of hops it takes to reach the destination from the source. Also, the Round Time Trip (RTT) is an increment at each hop = 87ms. The average jitter holds at 48ms (10 + 7 + 12 +19).
International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 
33 
Figure 11: RTT and Jitter for proposed network 
In the proposed network shown in Figure 11, the number of hops has been reduced to 2 between any 2 branches hence better results for RTT and jitter. In this case, RTT = 17ms and the average jitter holds at 16ms for the full connection between end-points. 
Performance Measures comparison 
Existing network 
Proposed Network 
Jitter 
48ms 
4ms 
Round Trip Time 
87ms 
17ms 
Delay 
14ms 
5ms 
Table 1: Performance measures comparison
International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 
34 
0 
20 
40 
60 
80 
100 
JITTER RTT DELAY 
EXISTING NETWORK 
PROPOSED NETWORK 
Figure 12: Comparative analysis between the existing and proposed bank networks 
Table 2: Comparison of Significant Benefits 
7. CONCLUSION 
Banking operations have been made better through the adoption of Information Technology. 
Although, advances in technology bring its own shortcomings, its impact positively cannot be over-emphasized. 
Again, due to the ever evolving IT, security threats also constantly evolved, and as such, 
the need to adopt even better IT solutions. This work proposes a network design solution to 
accommodate for the lapses in the existing bank network. The banking institution is now greatly 
influenced by the strength of its Information Technology. Through networking, banking ceased to be 
only at the branch containing holder’s information. A bank with branches nationwide seems like just 
in a building with internet banking, etc. 
Though, the network design of any financial institution must satisfy- confidentiality, availability and 
redundancy which at present bank networks are in compliance with. This research has shown that 
advances in network design leads to reduced cost, improved security, less network delay and better 
Existing Bank Network Proposed Bank Network 
Cost High cost since each branch 
leases internet link. 
Less cost since internet 
connection is aggregated from 
central office to other 
branches. 
Security High security since each leased 
circuit is a private network even 
though inter-branch connectivity 
is through the internet using 
tunnels 
Higher security since inter 
branch connectivity is purely 
within a private network 
Delay Moderate. More delay is due to 
distance between source branch 
and destination branch. Also, 
due to packet switching 
Less delay. Average source-to-destination 
distance is 2 hops. 
Absence of packet switching 
WAN technology 
Jitter Moderate Less 
Maintenance Not good Good since every link or node, 
source has its source easily 
determinable
International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 
35 
maintenance. From results obtained, the existing network design offers more delay between endpoints than the proposed network assuming constant bandwidth. 
There exists opportunities in further enhancing this research work since Information Technology continually evolves. The ever-evolving IT also leads to an ever-evolving security threat. This implies advances into network design to eliminate any fear of future threats, and as such, the “security” aspect of the design should be researched. 
REFERENCES 
[1] Anandhi S. and Bharadwaj, MIS Quarterly, vol.24, No. 1 (March 2000) Pp 169-196. 
[2] Weil, P. (1992). “The relationship between investment in information technology and firm performance: a case study of Valave manufacturing industry”, Information System Research, Issue 3 (4), pp: 307-333. 
[3] Bruce W. & Gede S. (2000). “Employee perception of impact of information technology investment in organizations: survey of the hotel industry”, Australian Journal of Information Science, 7 (2). pp: 245-278 
[4] Baker, R.D., Kaufman, R.J. and Morey, R.C. (1990). Measuring gains in operational efficiency from information technology: a case study of Positran deployment at Hardees Inc., Journal of MIS, 6 (2). pp:59-81 
[5] Cron W. and Sobol M. (1983). “The relationship between computerization and performance: a strategy of maximizing economic benefit of computerization”, information and management, 6, pp:171-181 
[6] Accad, M (2009). The future of electronic banking in Nigeria, the role of the internet, US embossing sponsored e-week. 
[7] Ovia, J. (2000). From Banking Hall to E-Platform, Financial Standard, January 15 M. Shell. 
[8] Woherem E., Adeogri D. (2000). “The telephone and computer in banking. Constraints and challenges of information technology in Nigerian Banking Industry”, Ibadan, Spectrum Books, pp: 94-97.

More Related Content

What's hot

Adoption of technological innovations on organizational performance, case ...
  Adoption of technological innovations on organizational performance,  case ...  Adoption of technological innovations on organizational performance,  case ...
Adoption of technological innovations on organizational performance, case ...Alexander Decker
 
The Effects of Information and Communication Technology to the Growth and Dev...
The Effects of Information and Communication Technology to the Growth and Dev...The Effects of Information and Communication Technology to the Growth and Dev...
The Effects of Information and Communication Technology to the Growth and Dev...IOSR Journals
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...Ukam John Victor
 
Effect of Electronic Banking on Financial Performance of Deposit Taking Micro...
Effect of Electronic Banking on Financial Performance of Deposit Taking Micro...Effect of Electronic Banking on Financial Performance of Deposit Taking Micro...
Effect of Electronic Banking on Financial Performance of Deposit Taking Micro...iosrjce
 
Impacts of Information Technology on Banking Industry A Case Study of Akure B...
Impacts of Information Technology on Banking Industry A Case Study of Akure B...Impacts of Information Technology on Banking Industry A Case Study of Akure B...
Impacts of Information Technology on Banking Industry A Case Study of Akure B...ijtsrd
 
X efficiency of commercial banks in kenya
X efficiency of commercial banks in kenyaX efficiency of commercial banks in kenya
X efficiency of commercial banks in kenyaAlexander Decker
 
E-BANKING IMPLEMENTATION AND TECHNOLOGY ACCEPTANCE IN THE RAFIDAIN AND RASHEE...
E-BANKING IMPLEMENTATION AND TECHNOLOGY ACCEPTANCE IN THE RAFIDAIN AND RASHEE...E-BANKING IMPLEMENTATION AND TECHNOLOGY ACCEPTANCE IN THE RAFIDAIN AND RASHEE...
E-BANKING IMPLEMENTATION AND TECHNOLOGY ACCEPTANCE IN THE RAFIDAIN AND RASHEE...Hosam alden
 
An evaluation of the efficacy of information technology on the performance of...
An evaluation of the efficacy of information technology on the performance of...An evaluation of the efficacy of information technology on the performance of...
An evaluation of the efficacy of information technology on the performance of...Alexander Decker
 
Problems encountered in e-banking in selected bank in Quezon City
Problems encountered in e-banking in selected bank in Quezon CityProblems encountered in e-banking in selected bank in Quezon City
Problems encountered in e-banking in selected bank in Quezon CityLily Monilla
 
The Role of Technology Acceptance Model in Explaining Effect on E-Commerce Ap...
The Role of Technology Acceptance Model in Explaining Effect on E-Commerce Ap...The Role of Technology Acceptance Model in Explaining Effect on E-Commerce Ap...
The Role of Technology Acceptance Model in Explaining Effect on E-Commerce Ap...IJMIT JOURNAL
 
Digital Technologies in Customs and Prospects for Creating an Electronic Envi...
Digital Technologies in Customs and Prospects for Creating an Electronic Envi...Digital Technologies in Customs and Prospects for Creating an Electronic Envi...
Digital Technologies in Customs and Prospects for Creating an Electronic Envi...ijtsrd
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)inventionjournals
 
A comparative analysis of the application of information technology by foreig...
A comparative analysis of the application of information technology by foreig...A comparative analysis of the application of information technology by foreig...
A comparative analysis of the application of information technology by foreig...Alexander Decker
 
A comparative analysis of cost and benefit of using information technology in...
A comparative analysis of cost and benefit of using information technology in...A comparative analysis of cost and benefit of using information technology in...
A comparative analysis of cost and benefit of using information technology in...Alexander Decker
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)inventionjournals
 

What's hot (20)

Adoption of technological innovations on organizational performance, case ...
  Adoption of technological innovations on organizational performance,  case ...  Adoption of technological innovations on organizational performance,  case ...
Adoption of technological innovations on organizational performance, case ...
 
The Effects of Information and Communication Technology to the Growth and Dev...
The Effects of Information and Communication Technology to the Growth and Dev...The Effects of Information and Communication Technology to the Growth and Dev...
The Effects of Information and Communication Technology to the Growth and Dev...
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...
 
Role of it in finance
Role of it in financeRole of it in finance
Role of it in finance
 
Effect of Electronic Banking on Financial Performance of Deposit Taking Micro...
Effect of Electronic Banking on Financial Performance of Deposit Taking Micro...Effect of Electronic Banking on Financial Performance of Deposit Taking Micro...
Effect of Electronic Banking on Financial Performance of Deposit Taking Micro...
 
Impacts of Information Technology on Banking Industry A Case Study of Akure B...
Impacts of Information Technology on Banking Industry A Case Study of Akure B...Impacts of Information Technology on Banking Industry A Case Study of Akure B...
Impacts of Information Technology on Banking Industry A Case Study of Akure B...
 
X efficiency of commercial banks in kenya
X efficiency of commercial banks in kenyaX efficiency of commercial banks in kenya
X efficiency of commercial banks in kenya
 
E-BANKING IMPLEMENTATION AND TECHNOLOGY ACCEPTANCE IN THE RAFIDAIN AND RASHEE...
E-BANKING IMPLEMENTATION AND TECHNOLOGY ACCEPTANCE IN THE RAFIDAIN AND RASHEE...E-BANKING IMPLEMENTATION AND TECHNOLOGY ACCEPTANCE IN THE RAFIDAIN AND RASHEE...
E-BANKING IMPLEMENTATION AND TECHNOLOGY ACCEPTANCE IN THE RAFIDAIN AND RASHEE...
 
An evaluation of the efficacy of information technology on the performance of...
An evaluation of the efficacy of information technology on the performance of...An evaluation of the efficacy of information technology on the performance of...
An evaluation of the efficacy of information technology on the performance of...
 
Problems encountered in e-banking in selected bank in Quezon City
Problems encountered in e-banking in selected bank in Quezon CityProblems encountered in e-banking in selected bank in Quezon City
Problems encountered in e-banking in selected bank in Quezon City
 
The Role of Technology Acceptance Model in Explaining Effect on E-Commerce Ap...
The Role of Technology Acceptance Model in Explaining Effect on E-Commerce Ap...The Role of Technology Acceptance Model in Explaining Effect on E-Commerce Ap...
The Role of Technology Acceptance Model in Explaining Effect on E-Commerce Ap...
 
Need of information technology in this modern world
Need of information technology in this modern worldNeed of information technology in this modern world
Need of information technology in this modern world
 
Digital Technologies in Customs and Prospects for Creating an Electronic Envi...
Digital Technologies in Customs and Prospects for Creating an Electronic Envi...Digital Technologies in Customs and Prospects for Creating an Electronic Envi...
Digital Technologies in Customs and Prospects for Creating an Electronic Envi...
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)
 
A comparative analysis of the application of information technology by foreig...
A comparative analysis of the application of information technology by foreig...A comparative analysis of the application of information technology by foreig...
A comparative analysis of the application of information technology by foreig...
 
A comparative analysis of cost and benefit of using information technology in...
A comparative analysis of cost and benefit of using information technology in...A comparative analysis of cost and benefit of using information technology in...
A comparative analysis of cost and benefit of using information technology in...
 
E0943744
E0943744E0943744
E0943744
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)
 
Relevance of information technology in the effective management of selected s...
Relevance of information technology in the effective management of selected s...Relevance of information technology in the effective management of selected s...
Relevance of information technology in the effective management of selected s...
 
report
reportreport
report
 

Similar to Impact of Information Technology on Nigeria Banking Industry: a case study for Skye Bank

Impact of Advancement In Technology on UAE banking industry: A case study of ...
Impact of Advancement In Technology on UAE banking industry: A case study of ...Impact of Advancement In Technology on UAE banking industry: A case study of ...
Impact of Advancement In Technology on UAE banking industry: A case study of ...sakifabdallah94
 
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIPerformance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIIRJET Journal
 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksIOSR Journals
 
Information technology in banking system
Information technology in banking systemInformation technology in banking system
Information technology in banking systemPriyangaRajaram
 
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET Journal
 
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...AnthonyOtuonye
 
The Convenience Activity on TQM of Advanced Technology on User Expectation of...
The Convenience Activity on TQM of Advanced Technology on User Expectation of...The Convenience Activity on TQM of Advanced Technology on User Expectation of...
The Convenience Activity on TQM of Advanced Technology on User Expectation of...IJCSIS Research Publications
 
An overview of big data analysis
An overview of big data analysisAn overview of big data analysis
An overview of big data analysisjournalBEEI
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudIRJET Journal
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
 
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...ijmnct
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
 
Performance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedPerformance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedAlison Reed
 
Information technology by Hiresh Ahluwalia
Information technology by Hiresh AhluwaliaInformation technology by Hiresh Ahluwalia
Information technology by Hiresh Ahluwalia333jack333
 
Reducing Wireless Network CAPEX Through Streamlined Planning | Solution br...
Reducing Wireless  Network CAPEX Through  Streamlined Planning  | Solution br...Reducing Wireless  Network CAPEX Through  Streamlined Planning  | Solution br...
Reducing Wireless Network CAPEX Through Streamlined Planning | Solution br...Infovista
 

Similar to Impact of Information Technology on Nigeria Banking Industry: a case study for Skye Bank (20)

Impact of Advancement In Technology on UAE banking industry: A case study of ...
Impact of Advancement In Technology on UAE banking industry: A case study of ...Impact of Advancement In Technology on UAE banking industry: A case study of ...
Impact of Advancement In Technology on UAE banking industry: A case study of ...
 
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIPerformance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
 
C010130917
C010130917C010130917
C010130917
 
Optimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth NetworksOptimization Technologies for Low-Bandwidth Networks
Optimization Technologies for Low-Bandwidth Networks
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 
Information technology in banking system
Information technology in banking systemInformation technology in banking system
Information technology in banking system
 
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
 
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
 
The Convenience Activity on TQM of Advanced Technology on User Expectation of...
The Convenience Activity on TQM of Advanced Technology on User Expectation of...The Convenience Activity on TQM of Advanced Technology on User Expectation of...
The Convenience Activity on TQM of Advanced Technology on User Expectation of...
 
An overview of big data analysis
An overview of big data analysisAn overview of big data analysis
An overview of big data analysis
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure Cloud
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
 
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIOOvum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
 
Essay On ENCE
Essay On ENCEEssay On ENCE
Essay On ENCE
 
Performance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedPerformance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax Testbed
 
Information technology by Hiresh Ahluwalia
Information technology by Hiresh AhluwaliaInformation technology by Hiresh Ahluwalia
Information technology by Hiresh Ahluwalia
 
Reducing Wireless Network CAPEX Through Streamlined Planning | Solution br...
Reducing Wireless  Network CAPEX Through  Streamlined Planning  | Solution br...Reducing Wireless  Network CAPEX Through  Streamlined Planning  | Solution br...
Reducing Wireless Network CAPEX Through Streamlined Planning | Solution br...
 

Recently uploaded

Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Sapana Sha
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Roomdivyansh0kumar0
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
Attachment Of Assets......................
Attachment Of Assets......................Attachment Of Assets......................
Attachment Of Assets......................AmanBajaj36
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Avanish Goel
 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free DeliveryPooja Nehwal
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 

Recently uploaded (20)

Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
Attachment Of Assets......................
Attachment Of Assets......................Attachment Of Assets......................
Attachment Of Assets......................
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...
 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 

Impact of Information Technology on Nigeria Banking Industry: a case study for Skye Bank

  • 1. 25 International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184 Volume 1, Number 1 (October 2012), pp. 25-35 © MEACSE Publications http://www.meacse.org/ijcar Impact of Information Technology on Nigeria Banking Industry: a case Study of Skye Bank Ibikunle Frank and James Oluwafemi Covenant University, Ota, Nigeria Abstract As Information Technology is vital in banking today, it becomes imperative for banks to realize its impact on operational performance in order to justify capital investments. The objective of this work is to examine how the adoption of Information Technology affects the operations of commercial banks in terms of effectiveness, efficiency, competitiveness, customer base and globalization of the bank. The research methodology involved reviewing the existing network design of the investigating bank and comparing it with the proposed network design solution. The design and simulation results of work revealed that Information Technology led to increase customer satisfaction, improved operational efficiency, reduced transaction time, better competitive edge, reduced the running cost and ushered in swift response in service delivery. Keywords- VLAN, VPN, Tunnel, WAN, LAN I. INTRODUCTION Case studies have shown that effective and efficient use of Information Technology (IT) helps to distinguish between business equivalents. For example, IT was an important distinction between banks that were doing well in the mid-1980s as compared to those that was less profitable [1]. Hence the need to survive, for global relevance, to maintain existing market share and sustainable development has called for the exploitation of IT and its many advantages. In the banking industry, a list of IT products that have been adopted range from teller printers, Automated Teller Machines (ATMs), smart cards, Magnetic Ink Character Reader (MICR). A list of IT services also includes internet banking, mail, telephone banking, and mobile banking. Accounting for a greater percentage of what could be regarded as IT in banks is its internetworking. This internetworking refers to the internet, extranet and intranet and interbank networking. Intranet exists in branches such that transactions taking place in a branch is only accessible in that branch alone. For example, a branch has a VPN of 10.108.108.0 and another has a VPN of 10.103.103.0. A transaction taking place at 108 networks is exclusively for that network, it cannot be seen from the 103 network. Extranet exists such that a customer is not restricted to the branch he opened his account. He could bank anywhere since such information is made securely available within the bank regardless of its network. Internet is the unsecured channel wherein both the secured intranet and extranet exists. Here, every other information aimed for the public is made available since they are not confidential. This research work aims at providing Nigerian banks with a better IT solution with respect to its network design, architecture and deployment; to examine how IT affects the operations of banks regarding their effectiveness, efficiency, competitiveness, performance, customer base and globalization; to review the bank’s existing network and provide a workable solutions to the existing network.
  • 2. International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 26 2. LITERATURE REVIEW Researchers have evolved from mere reports to more empirically based reports. These include the extensive works [2] and [3]. For instance, a study of selected stores in a fast food industry showed that stores with the technology and large breakfast sales performed significantly better in terms of cutting materials cost [4]. However, it was realized that firms that extensively relied on computers had either a very strong or a weak financial performance [5]. The first stage of information technology in banks started with an attempt to automate the banking process through mechanization. It was by the use of note counters and accounting calculators to speed up basic transactions. Another stage of information technology was in the storage and retrieval of information. Then in the late 1950s and 1960s, business data processing was through punched card equipment. The 1970s saw the introduction of Information Technology Management System (MIS) and Decision Support System (DSS). The 1980s saw the fusion of telecommunications and networking technologies for business deployment. It also saw to the emergence of data processing, Office Information System (OIS) and personal computers. The financial sector has been an interesting case for service innovation as it moves towards using the web for commercial purpose through internet banking and IT. The impact of price clarity and consumer empowerment afforded by information technology eventually led to product and price competition. IT has made banks not just being profit-centric but also customer-centric banks [6]. The web based banking operations has made it possible to accommodate functions and processes in other sectors like in government (vehicle license registration) and education (payment of fees). With the aid of information technology, banks are closer to their customers to find out what they really need and deliver such needs. Information technology has made it possible for customers to gain access to their account balance, buy recharge cards and pay bills using their mobile phones anytime from anywhere. Online banking allows customers to get their current account balance at any time. Information technology leads to a reduction in cash transactions which leads to reduction in crime [7]. 3. CHALLENGES OF IT APPLICATION IN NIGERIAN BANKS Nigeria’s poor infrastructures have been identified as the first major challenge in banks. Reports have it that in Nigeria, there are only one computer and four main telephone lines per thousand people. Also, electricity supply is sporadic and inefficient. Most importantly, Nigeria has very low internet penetration with less than one internet service provider per thousand people [8]. Highlighted was the ineffective implementation of information technology [9]. The challenges being faced by Nigerian banks in their attempt to ensure a smooth exchange of electronic data and information are [10]: a) The need to build a better infrastructure that will serve as backbone for communication within the banks b) The need to collaborate in sourcing for new technological equipment that will provide common standard c) The need to get better at information technology system development and operation by bank management d) The need to impress by improving the present telecommunications infrastructure To combat these challenges, the following were proffered [10]: a) There should be government and public awareness to attract long term investments in the telecommunication industry. b) Emphasis should be set on the importance of maintaining existing infrastructure and equipment. 4. NETWORK DESIGN Network design is a critical process to network architecture and administration. This section seeks to deliver a comprehensive network design based on two models; the existing network model and a
  • 3. International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 27 proposed network solution for the bank. The design was broken down into 4 categories: The existing WAN, proposed WAN, existing LAN and, proposed LAN. 4.1 Research Methodology We obtained the existing network design with emphasis on its topology, link speed, LAN/WAN technology. The existing bank network designs are reviewed. We measured the performance characteristics being offered by the existing network. Then propose network design solution that will give better network performance results and characteristics. 4.2 Existing Bank WAN Basically, the bank leases a circuit (a particular amount of bandwidth) from a service provider. The service provider would take care of providing and maintaining the complete circuit from one location to other location(s) which includes owning and operating all the passive and active components required in maintaining the Wide Area Network. The leased lines cost more with increasing distance between locations. And in case of multiple branches, each branch needs to take a separate leased circuit to every other location to maintain communications between them. INTERNET 1.1.1.0/30 1.1.1.4/30 3.3.3.4/30 4.4.4.4/30 5.5.5.4/30 6.6.6.4/30 6.6.6..0/30 5.5.5.0/30 4.4.4.0/30 2.2.2.0/30 3.3.3.0/30 ISP_3 ISP_5 ISP_6 OPEBI_EDGE Loopback address: 10.103.103.1/24 ALLEN_EDGE Loopback address: 10.102.102.1/24 ISP_1 2.2.2.4/30 ALAUSA_EDGE Loopback address: 10.164.164.1/23 ISP_2 ISP_4 9.9.9.0/30 8.8.8.0/30 7.7.7.0/30 10.10.10.0/30 7.7.7.4/30 8.8.8.4/30 9.9.9.0/30 10.10.10.4/30 ISP_7 ISP_10 ISP_9 ISP_8 TOYINSTR_EDGE Loopback address: 10.3.3.3.0/30101.101.1/24 OGBA_EDGE Loopback address: 10.104.104.1/24 Figure 1: Existing Bank WAN Leased lines have been traditionally a popular mode of connectivity between two branches or multiple branches in different locations. Leased lines are private, secure, scalable and quite sufficient for basic data connectivity between different branches. Basically, the bank leases a circuit from a service provider via multiple interfaces including Optic fiber etc. 4.3 Proposed Bank WAN Solution The central office is the headquarters that connects to smaller central offices (regional headquarters) by fibre links.
  • 4. International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 28 9.1.0.0/30 12.0.0.0/30 13.0.0.0/30 15.0.0.0/30 16.0.0.0/30 17.0.0.0/30 18.0.0.0/30 19.0.0.0/30 20.0.0.0/30 11.0.0.0/30 14.0.0.0/30 INTERNET 9.0.0.0/30 9.1.1.0/25 149.0.0.0/30 10.1.1.0/30 9.1.1.0/25 148.0.0.0/30 150.0.0.0/30 AGGREGATOR_1 EDGE ROUTER 2 EDGE ROUTER 1 11.0.0.0/30 12.0.0.0/30 14.0.0.0/30 13.0.0.0/30 15.0.0.0/30 17.0.0.0/30 18.0.0.0/30 19.0.0.0/30 20.0.0.0/30 AGGREGATOR_2 Allen branch Loopback: 10.112.112.0/24 Ogba branch Loopback: 10.115.115.0/24 Opebi branch Loopback: 10.113.113.0/24 Ikorodu main branch Loopback: 10.117.117.0/24 Oregun branch Loopback: 10.116.116.0/24 Obafemi Awolowo branch Loopback: 10.114.114.0/24 Magodo branch Loopback: 10.119.119.0/24 Ketu branch Loopback: 10.118.118.0/24 Alausa branch Loopback: 10.164.164.0/24 ALAUSA_SEC branch Loopback: 10.111.111.0/24 Figure 2: Proposed Bank WAN At the hubs, point-to-multipoint links are being used while at the spokes, point-to-point links are being used. The star topology reduces the probability of network failure by connecting all of the spokes to a hub. The failure of a link between any spoke and the hub will only result in the isolation of that spoke from all others, but the remaining will be unaffected. An advantage of the star topology is the simplicity of adding extra spokes. It is such that even in any case of expansion, additional branches do not affect the existing branches network. 4.4 Existing Bank LAN NETWORK 10.164.164.0/23 DHCP SERVER VLAN1 = 10.164.164.13/23 Ground floor 1st floor 2nd floor 3rd floor VLAN1 = 10.164.164.5/23 VLAN1 = 10.164.164.8/23 VLAN1 = 10.164.164.11/23 VLAN1 = 10.164.164.4/23 VLAN1 = 10.164.164.7/23 VLAN1 = 10.164.164.10/23 VLAN1 = 10.164.164.3/23 VLAN1 = 10.164.164.6/23 VLAN1 = 10.164.164.9/23 VLAN1 = 10.164.164.12/23 DISTRIBUTION SWITCH 10.164.164.2 EDGE ROUTER 10.164.164.1/23 ISP 198.48.16.0/30 Figure 3: Existing Bank LAN Each of these central offices act as hubs to several other branches (spokes) within their geographical area. In general, the topology used is physical star and logical bus. Here, each access layer switch acts as a node while the endpoints are the branches. A typical access layer switch acts as a hub to a maximum of about 24 branches. The failure of one switch port or link results only in the failure of that branch while every other branch remains active. Likewise, between the distribution switch and the access layer switches, redundancy is achieved because in star topology, failure of a link/node does not result in the failure of the network. 4.5 Proposed LAN Solution
  • 5. International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 29 The proposed network design guarantees both security and availability, in other words, it guarantees segmentation and redundancy. It employs a physical star and logical bus topology. With the use of NETWORK 10.164.164.0/23 DHCP SERVER Ground floor Switch port Vlan 2,4,5,6 70 3,7,8,9 80 10,11,12 90 13,14,15 150 2nd floor Switch port Vlan 4,5,6,7 100 8,9,10,11 110 2,3,12,13,14,15 120 3rd floor Switch port Vlan 2,3,4,5,6,7,8,9 130 10,11,12,13,14,15 140 1st floor Switch port Vlan 2,4,5 10 3,6,7 20 8,9 30 10,11 40 12,13 50 14,15 60 DISTRIBUTION SWITCH VLANs 70.80.90.150 VLANs 10,20,30,40,50,60 VLANs 100,110,120 VLANs 130,140 10 RETAIL 20 RISK 30 PUBLIC_SECTOR 40 STORE 50 ATM_RECONCILIATION 60 E_CHANNELS 70 IT 80 OPERATIONS 90 CUSTOMER_SERVICE 100 REVENUE 110 LEGAL 120 CPC 130 INSPECTION 140 STRATEGIC_PLANNING 150 RELATIONSHIP_MANAGEMENT Figure 4: Proposed Bank LAN Virtual Local Area Networks (VLANs), an access switch could segment a network (even without the network being geographically separated), and as such reduces bandwidth wastage as well as providing some degree of confidentiality. Due to the proper network segmentation, troubleshooting is made easier and faster than in a network that is not segmented. In addition, bandwidth allocation and optimization is highly achieved by the use of VLANs. 4. 6 Benefits of Proposed Solution The proposed network solution offers the bank significant positive benefits which include cost, security, delay, jitter, latency and maintenance. Cost: More cost is incurred when intra-bank transactions are done through the internet. More so, each branch being provided with internet access directly from an ISP results in more overhead cost. Therefore, routing intra-branch transactions without the use of direct internet leads to lower overhead. Moreover, workers are restricted from browsing during work hours (i.e., 9am - 5pm), which implies money spent not gained. Security: The existing network is such that packet traffic is routed through the internet while in the proposed network, inter-branch traffic is routed within its own private network. Although intra-bank connections using tunnels offer some degree of security, it cannot be as secure as connections that do not go through the internet (public network) at all. Delay/latency: Latency means any delay or waiting that increases real or perceived response time beyond the response time desired. Causes of latency include mismatches in data speed between the microprocessor and input/output devices and inadequate data buffers. The more security features available in a single connection, the more the delay. Intra-branch transactions were through VPNs which implies more security features, and as such more delay than in a network with less security features.
  • 6. International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 30 Jitter: Jitter is a direct offshoot of delay. Since, the existing network has been studied to give a higher delay than the proposed network; the jitter also is higher for the existing network than for the proposed network. A relatively high delay implies a high jitter. Maintenance: By implementing VLANs on the proposed network, the network is more segmented than the existing network that is not at all segmented. Troubleshooting is greatly easier and faster in a segmented network since every office, link, node can be identified with a unique VLAN or otherwise segment. 5. NETWORK IMPLEMENTATION AND TESTING Virtual Local Area Networks are used to logically segment users. VLANs are created in an enterprise to differentiate jobs done and people using specific networks. Every switch has a default VLAN of 1. By default, VLAN 1 has all switch ports pre-assigned to it. Figure 5 below shows the configured VLANs on DISTR_SW using “show VLAN-switch” Figure 5: Assigning switch ports to configured VLANs Dynamic Host Configuration Protocol (DHCP) as the name implies is a protocol used in auto- assigning IP addresses hosts within a network. As the network becomes larger, its impact is better felt. However, unless configured otherwise, DHCP leases out every IP address within the allowed network range including “network and broadcast addresses.” Figure 6: Configuring DHCP Communication at the network layer (layer 3) is only possible using routing protocols. BGP routing protocol was used since the network consists of both internet and extranet. Figure 7 shows BGP configurations on a router.
  • 7. International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 31 Figure 7: Configuring BGP The security feature employed is the Generic Routing Encapsulation (GRE) over IPSEC tunnel which provides a secure connection between sites through an unsecure medium. Figure 8 shows tunnel configurations on a router Figure 8: Creating tunnels Figure 9 shows a Generic Routing Encapsulation (GRE) configuration on a router. Figure 9: Encrypting a tunnel interface 6. VERIFICATION The verification shows successful connectivity between hops and appropriate neighbour. It further presents the delay and jitter encountered in branch to branch communication.
  • 8. International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 32 Figure 10: RTT and Jitter for existing network From the results shown in Figure 10, the time taken for a branch to communicate with another branch is determined by the sum of delay along each hop for the entire number of hops it takes to reach the destination from the source. Also, the Round Time Trip (RTT) is an increment at each hop = 87ms. The average jitter holds at 48ms (10 + 7 + 12 +19).
  • 9. International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 33 Figure 11: RTT and Jitter for proposed network In the proposed network shown in Figure 11, the number of hops has been reduced to 2 between any 2 branches hence better results for RTT and jitter. In this case, RTT = 17ms and the average jitter holds at 16ms for the full connection between end-points. Performance Measures comparison Existing network Proposed Network Jitter 48ms 4ms Round Trip Time 87ms 17ms Delay 14ms 5ms Table 1: Performance measures comparison
  • 10. International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 34 0 20 40 60 80 100 JITTER RTT DELAY EXISTING NETWORK PROPOSED NETWORK Figure 12: Comparative analysis between the existing and proposed bank networks Table 2: Comparison of Significant Benefits 7. CONCLUSION Banking operations have been made better through the adoption of Information Technology. Although, advances in technology bring its own shortcomings, its impact positively cannot be over-emphasized. Again, due to the ever evolving IT, security threats also constantly evolved, and as such, the need to adopt even better IT solutions. This work proposes a network design solution to accommodate for the lapses in the existing bank network. The banking institution is now greatly influenced by the strength of its Information Technology. Through networking, banking ceased to be only at the branch containing holder’s information. A bank with branches nationwide seems like just in a building with internet banking, etc. Though, the network design of any financial institution must satisfy- confidentiality, availability and redundancy which at present bank networks are in compliance with. This research has shown that advances in network design leads to reduced cost, improved security, less network delay and better Existing Bank Network Proposed Bank Network Cost High cost since each branch leases internet link. Less cost since internet connection is aggregated from central office to other branches. Security High security since each leased circuit is a private network even though inter-branch connectivity is through the internet using tunnels Higher security since inter branch connectivity is purely within a private network Delay Moderate. More delay is due to distance between source branch and destination branch. Also, due to packet switching Less delay. Average source-to-destination distance is 2 hops. Absence of packet switching WAN technology Jitter Moderate Less Maintenance Not good Good since every link or node, source has its source easily determinable
  • 11. International Journal of Computing Academic Research (IJCAR), Volume 1, Number 1, October 2012 35 maintenance. From results obtained, the existing network design offers more delay between endpoints than the proposed network assuming constant bandwidth. There exists opportunities in further enhancing this research work since Information Technology continually evolves. The ever-evolving IT also leads to an ever-evolving security threat. This implies advances into network design to eliminate any fear of future threats, and as such, the “security” aspect of the design should be researched. REFERENCES [1] Anandhi S. and Bharadwaj, MIS Quarterly, vol.24, No. 1 (March 2000) Pp 169-196. [2] Weil, P. (1992). “The relationship between investment in information technology and firm performance: a case study of Valave manufacturing industry”, Information System Research, Issue 3 (4), pp: 307-333. [3] Bruce W. & Gede S. (2000). “Employee perception of impact of information technology investment in organizations: survey of the hotel industry”, Australian Journal of Information Science, 7 (2). pp: 245-278 [4] Baker, R.D., Kaufman, R.J. and Morey, R.C. (1990). Measuring gains in operational efficiency from information technology: a case study of Positran deployment at Hardees Inc., Journal of MIS, 6 (2). pp:59-81 [5] Cron W. and Sobol M. (1983). “The relationship between computerization and performance: a strategy of maximizing economic benefit of computerization”, information and management, 6, pp:171-181 [6] Accad, M (2009). The future of electronic banking in Nigeria, the role of the internet, US embossing sponsored e-week. [7] Ovia, J. (2000). From Banking Hall to E-Platform, Financial Standard, January 15 M. Shell. [8] Woherem E., Adeogri D. (2000). “The telephone and computer in banking. Constraints and challenges of information technology in Nigerian Banking Industry”, Ibadan, Spectrum Books, pp: 94-97.