Proposal for a Vehicle Tracking System (VTS)

Similar documents
Automobile industry major implements RFID-based PALLET AND INVENTORY MANAGEMENT SYSTEM

Passive RFID Solutions for Asset Tracking and Inventory Management

Designing and Developing Microsoft SharePoint Server 2010 Applications (MS10232)

Design Document. Offline Charging Server (Offline CS ) Version i -

Prominent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM

Best Practices: Extending Enterprise Applications to Mobile Devices

API Management Introduction and Principles

Oracle Technical Cloud Consulting Services Descriptions. July 23, 2015

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

Document Capture and Distribution

11A. CORPORATE INFRASTRUCTURE

Filestor Digital Asset Management. The way it works

Global Asset Tracking & Identification System

What Is the Java TM 2 Platform, Enterprise Edition?

The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform

Course 10232: Designing and Developing Microsoft SharePoint Server 2010 Applications

Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability

SOA REFERENCE ARCHITECTURE: WEB TIER

Cisco Unified Expert Advisor

Dream Report vs MS SQL Reporting. 10 Key Advantages for Dream Report

Our Technology.NET Development services by Portweb Inc.

RFID Asset Management Solutions. Distributed globally by

Chapter 4. Architecture. Table of Contents. J2EE Technology Application Servers. Application Models

RFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd.

COURSE NAME: Database Management. TOPIC: Database Design LECTURE 3. The Database System Life Cycle (DBLC) The database life cycle contains six phases;

TORNADO Solution for Telecom Vertical

Lab Management, Device Provisioning and Test Automation Software

Vehicle Tracking Solution

The ebbits project: from the Internet of Things to Food Traceability

Category: Business Process and Integration Solution for Small Business and the Enterprise

Integration Technologies Group (ITG) ITIL V3 Service Asset and Configuration Management Assessment Robert R. Vespe Page 1 of 19

Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc

Decoding the Big Data Deluge a Virtual Approach. Dan Luongo, Global Lead, Field Solution Engineering Data Virtualization Business Unit, Cisco

Embedded BI made easy

Building Open-Source Based Architecture of Enterprise Applications for Business Intelligence

Oracle SOA Suite Then and Now:

Job Scheduler Oracle FLEXCUBE Universal Banking Release [April] [2014] Oracle Part Number E

mtracking Ajay Sharma NUS, Singapore Chin, Hong Hua SAP Singapore

Applying 4+1 View Architecture with UML 2. White Paper

Final Report - HydrometDB Belize s Climatic Database Management System. Executive Summary

This course will also teach how to create various kinds of dashboards using Reporting Services.

Alliance Key Manager A Solution Brief for Technical Implementers

ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0

CONDIS. IT Service Management and CMDB

Performance Management Platform

João Diogo Almeida Premier Field Engineer Microsoft Corporation

GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS

This three-day instructor-led course provides students with the tools to extend Microsoft Dynamics CRM 4.0.

Database FAQs - SQL Server

A standards-based approach to application integration

BMC ProactiveNet Performance Management Application Diagnostics

Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.

USING JE THE BE NNIFE FITS Integrated Performance Monitoring Service Availability Fast Problem Troubleshooting Improved Customer Satisfaction

Quareo ICM Server Software

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

RS MDM. Integration Guide. Riversand

CA IT Client Manager Asset Inventory and Discovery

SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT. Imaging & Enterprise Content Management

Resource Utilization of Middleware Components in Embedded Systems

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

CATALOG OF CLASSES IT and Technical Courses

Oracle Reference Architecture and Oracle Cloud

Public Works Authority in Qatar adopts RFID-enabled ASSET TRACKING SYSTEM

VCE Vision Intelligent Operations Version 2.5 Technical Overview

Enterprise Service Bus

Software Development Kit

Integration of DB oriented CAD systems with Product Lifecycle Management

Unlocking the Power of SOA with Business Process Modeling

2 Enterprise. CounThru TM. Managed Print Solution. CounThru TM 2 Enterprise Managed Print Solution WHITE PAPER. Introduction. What is CounThru TM

Chapter 3: Operating-System Structures. Common System Components

Large residential complex adopts RFID-based VEHICLE TRACKING SYSTEM

A Near Real-Time Personalization for ecommerce Platform Amit Rustagi

Intland s Medical Template

System Integration Software

Sage ERP Accpac Online

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

How to Build an E-Commerce Application using J2EE. Carol McDonald Code Camp Engineer

National coal mining giant implements RFID-based VEHICLE TRACKING SYSTEM

Netwrix Auditor for Active Directory

JAVA Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Seattle Police Department Handheld Ticketing System

NCS. EMS/NMS Platforms for Network Equipment Providers

LEARNING SOLUTIONS website milner.com/learning phone

Continuous Integration (CI)

EXPRESSION OF INTEREST (EOI) Citizenship Information Management System (CIMS) Ministry of Home Affairs Singh Durbar, Kathmandu, Nepal

Steps to Migrating to a Private Cloud

Application Performance Management for Enterprise Applications

Oracle Fixed Scope Services Definitions Effective Date: October 14, 2011

Large mining company implements RFID-based IRON ORE VEHICLE TRACKING SYSTEM

CDW Standard Image Deployment Service Customer Guide

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus

Transcription:

Proposal for a Vehicle Tracking System (VTS)

2 Executive Summary Intelligent Instructions is an IT product development and consulting company. At Intelligent Instructions, we focus on the needs of the client by applying consulting principles adopted by reputed organizations. Our offerings are end to end solutions for web related applications of all complexities from simple to enterprise levels. For maintaining our focus on core competencies, we function as two entities within the single organization. Our development team is called Accudata group placed in Cochin, India. The sales and consulting function is done under the brand of intelligent Instructions. In Accudata, we have dedicated team of 40 members working on core applications. Through this team we provide services like domain registration, server space and management, website development and maintenance of all levels. You could visit us at accudatagroup.com. The team of Intelligent Instructions is a 3 member consulting and 3 member sales team performing activities from three separate locations. The two sales offices in India is located in New Delhi and Bangalore. The other overseas sales office is at Wyoming State US. The consulting practice for web related application is at Bangalore. We have a 10 member team dedicated to RFID core development and deployment. We have expertise in.net and Java Technologies and have a proven track record. We have also associated with known brand names in the world. Some of our associates for knowledge and technology transfer are bielomatik, Germany ( we represent bielomatik in India), Printronix, Singapore ( we have a strong working relationship for RFID printers) etc. We are grateful for this opportunity to submit a proposal for your RFID based vehicle tracking system solution and maintenance to. 1. The Vehicle Tracking System Business View Tracking many numbers of vehicles over a boundary or premises is possible only when we have uniquely identified vehicles and their verification at a very fast speed. Unique vehicle identification number should be any widely accepted. The solution should be widely accepted, easily trace able, various technological supports should

be there. Vehicle readers can be used at the entry/exit points. Each movement through the should update the Data Base for any future reference in case of theft or any unwanted incident. Any unwanted intrusion should also be tracked. The system should be fast enough to inform any unwanted vehicle. The business logic must produce vehicle reports, their movement through all security checks. All necessary information can also be stored with the vehicle data. So that when requested vehicle owners can be verified with the mapped information. This will help in avoiding vehicles theft etc. Future vehicle movements can also be configured in the system e.g. any event where only few vehicles are authorized to enter only 2 or 3 times. Vehicle authentication can also limit to a specific group of persons only. Any unwanted person can not drive the vehicle. In this case license information can also be stored with vehicle data. Any third party system can be attached to the system so components should be adaptive enough. 3 Based on the brief description of project, we held discussions with our technical team. We decided to present a proposal and rework the functionalities based on your feedback. Based on the discussion we arrived at the following framework 2.1 Purpose of VTS document This document is produced by the Engineering to define the software design for VTS system.vts is a RFID based Vehicle Tracking System, for managing the security of vehicles in a premesis or boundries.on road vehicles can also be tracked through mobile tracking devices. RFID tags are widely acceptable Electronic Product Code based (EPC) based tags which are stickable to any product. Uniquely stored information in tags can be read using RFID tag readers. Static pole readers as well as hand held readers can be used for querying the EPC code of the vehicle.any unwanted vehicle will result in a RFID check fail. That can help security in avoiding any unwanted activity. VTS will contain a web GUI for the reference of senior managers as well as normal users.time wise reports for each vehicles, Employees work scheduling, Instructions and Time alerts etc are few business activites which can be achieved through the GUI. GUI will be exposed to every user of the system. Authorization mechanism will be used for allowing users for all operations.any bulk updation of data in system will be possible through GUI.Relevent informaion of vehicle can also be found using GUI. e.g Owner information, Vehicle registration etc. Individual vehicle owners can also get system access to view their vehicle information. VTS is a distributed system with single data base and multiple clients.various client will update centralised DB. The main solution is to trace vehicles at various check

posts and store the track in DB for future reference and if found any unauthorized vehicle inform the secutiry. Exhibit 1 : Multilevel RFID Based Business Model 4 Audience The audience for this document includes Engineering team and client. Assumptions Serial # Assumption Open Issues Serial # Issue Resolution Status (Owner) 1. Terms and Abbreviations Term Description

3.0 Vehicle Tracking System Architecture There are two possible architectures for the solution of VTS. One is c/c++ runtime based solution, and second is SUN solution based. 3.1 Solution First: C/C++ Runtime based Solution Exhibit 2: Various Module Interaction Diagram 5 3.1.1 The EPC Reader System This module acts as an interface between RFID reader hardware and data base Driver must expose methods (probably combinations of read/ioctl calls) to the driver library. These methods must be called by Application through driver library interface and not directly. This way application is not dependent on driver and the hardware for reading EPC. The system should be flexible enough to scale to any hardware. The Driver Library is responsible for exposing APIs which can be used directly by the application to read EPC. The driver library must take care of platform independent functionality.

Exhibit 3: RFID Reader and middleware Interaction Diagram 3.1.2 The Security Alarms System. Security Alarm systems are required for making check on any unwanted theft. For the provision of this service in memory cache is required for carrying EPC data. Immediate check can be made with the help of In Memory cache. In memory cache is required for prompt response. Security checks are required at various check points as well as with security guards. Every new vehicle movement should update the in memory cache immediately for updating the in memory product inventory. A high level accuracy is required in maintaining this in memory cache. An interface must be exposed which can be used by driver library APIs to raise/stop an ALARM. If supported by the hardware, we should be able to configure the alarm time. An in memory cache is going to be utilized by this part so that a real time check can be made when a vehicle is passing. 3.1.3 Security Center GUI Following are few points to be considered while developing the GUI system, Query/Response System to get status of a product by EPC (High Response System with ideally not more than few milliseconds of delay). GUI must work with EPC reader System for user friendly, RFID centralized management system GUI system can be enhanced to any other systems like interactive response system for the self service. 6 At the hit of final sanction or submit at GUI. Immediate affect should be reflected in memory cache.

Higher level transaction management is required at this level for avoiding any EPC conflict. Solution should be platform independent. Authentication and Authorization is required for managing security. 3.2 Solution Second: SUN RFID Solution SUN is a big player in Enterprise Solutions Industry. SUN provides its solutions for RFID industry, RFID event manager and EPC information servers. JMS based communications is used for integrating business logic with Event managers. This is solution is very helpful for integrating with other preexisting or future components. Enterprise servers like web logic can be used for holding the business logic and SUN event managers communicate as mediator between RFID reader and Application Server. It also provides JAVA library for accommodating any new RFID readers. Following is the System level View of the SUN RFID Solution, Exhibit 4: architecture based on sun technologies (Courtesy sun technologies)

7 3.3 Business Layer This module is responsible for the following Maintaining EPC data over various Security Checks in flexible way. Reporting System for generating the vehicle tracking report. The whole business logic for Vehicle Tracking system. High Level GUI will interact with this business logic for management level view. The initial idea is to keep the business logic separate from access mechanisms. SOAP based Web services would be used for this purpose. Web services can be accessed from any type client. This would help in maintaining in less hardware dependency. The further additions can be made on this section on mutual discussions. 3.4 Distributed web 2.0 GUI GUI will be the common solution for both JAVA based solution and c/c++ based solution. The main task of GUI is to provide Enterprise Level View of the System. Every individual entity of the system should be manageable through the GUI. Either its manpower or raw apparel GUI should show the status of every related data stored in system. GUI is the central port of every system for coordinating between various departments of apparel business. Web 2.0 is a submit less web technology, following are few qualities of web 2.0, The web as a platform Data as the driving force Network effects created by an architecture of participation Innovation in assembly of systems and sites composed by pulling together features from distributed, independent developers (a kind of "open source" development) Lightweight business models enabled by content and service syndication In less it can be said web 2.0 is submit less data centric technology where instead of whole page only data flows in network; comparatively faster to contemporary web 1.0. GUI will help people to manage all high level tasks as well as individual level efforts. Various level activities e.g. Document generation (CSV, XML, DOC, PDF etc). Bulk Vehicle Information Upload. Bulk Vehicle Information download. Role-based information display. Role-based user rights (like editing /deleting /inserting) for providing users centralized view of the whole system.

Vehicle Status (Date wise, Day Wise etc. Manpower Management (Activity, Scheduling etc) 8 EPC Tracking. Event and Performance Alerts to respective users for maintaining schedules. Business Process Management. Rule Based Solutions. 4. The time line of completion and Resource Charts The time line outline the entire SDLC life cycle with the weekly reports send across to the client. Activity / Week 1 2 3 4 5 6 7 8 9 10 11 12 13 15 16 Detailed System Study Preliminary Design Logic Implementation Final Visual design Integration & Testing Role functions Team Size IT Architect 1 Senior Programmers 2 Junior Programmers 2 Visual designers 1 Testing professionals 2 4.0 Professional Fees

The professional fees and the details of the hardware requirements can be discussed based on the level of implementation and its scope. 5. Delivery Lifecycle and schedules The acceptance of the final proposal with the initial advance of 30% of the project value will commence the project. On the week 10, we provide with a pre acceptance run for the client representation in our facility in India. With the successful completion of the pre acceptance test, a 15% of the project value should be advanced and we will be testing the application extensively till the final two weeks. 9 All the modifications if any will be incorporated into the system and will me made ready for deployment. A 15% of the total project value should be provided and we will be deploying our team to the premises of the client for a final test run and implementation. The knowledge transfer will be done with subsequent workshops at your premises for the chosen employees for the project. The remaining payment of 40% should be transferred after the successful knowledge transfer. 6.0 Why Intelligent Instructions We could offer you the complete solution or service related to your requirements. Hence we provide one point solution we could integrate all the functionalities more effectively. We have strong partner networks like bielomatik Germany (RFID conversion machinery) etc. With these associations, we could provide with quality solutions which our partners ensure to the customers across the world.