Docstoc

Implementation Of An RFID System For Stock Control

Document Sample
Implementation Of An RFID System For Stock Control Powered By Docstoc
					2009
University of Technology, Mauritius MSc Computer Security and forensics Module: Professional Development and System Project Development

[IMPLEMANTATION
Assignment 1

OF AN RFID SYSTEM

FOR STOCK CONTROL]

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________ Project Charter  Overview of project Hypermarket X deals with thousands of goods entering and leaving its warehouse to be distributed over 20 outlets throughout the country. The goods enter the warehouse at one major access point where it is checked, entry recorded by means of a barcode reader before they are stacked in the warehouse. A record is created for the incoming goods. The record includes the product name, its date of manufacture, date of expiry and quantity. When the goods leave the warehouse for outlets they are again scanned with the help of a barcode reader and a record of goods leaving the warehouse is created. Both records help the company maintain its stock control. The problem with the actual system is that there are thousands of goods entering and leaving the warehouse every day. The company has assigned two workers at the entry of the warehouse to scan the goods entering and one computer operator to record all the entries. There are again two operators with scanners and one data record operator at the exit of the warehouse to complete the job. There is also one supervisor who is responsible for the smooth running of the operations at both ends.

________________________________________________________________________ CCD Mauritius Page 2 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________ Goods entering and leaving the warehouse are often stacked in huge piles and the scanning operators have to climb up the piles to scan the products to provide a complete and reliable record. The management has also noted that due to usual absences of the operators the process takes long and many complaints are recorded from the main parties at both ends. The operators have also recorded several complaints to the management concerning the huge piles of goods entering the warehouse and the difficulty in scanning all the goods at both ends. Many accidents in the past have also been noted and the management had to cover financial charges for the concerned personnel. In some cases the supervisor has also noticed that some goods are not scanned purposely by the operators and this do cost the company a lot. The company in its future plan has decided to open 5 more outlets in different parts of the country and this means that the warehouse will have to deal with an additional of around 25% more goods entering and leaving every day. To deal with the problem, the IT section has proposed the management a possible solution that would consist of the following:

________________________________________________________________________ CCD Mauritius Page 3 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________ 1. Provide the warehouse with a RFID scanning device at both ends to scan the goods entering and leaving the premises. 2. Record the scanning details automatically and provide printouts for the management This solution will at first reduce the lag-time caused by the actual system and will be also be consequent in reducing excess labor. The company has a pool of qualified personnel but intent to call upon our company to implement the project.

 Goal 1. Facilitate the warehouse operators scan the goods entering and leaving the warehouses. 2. Improve the current stock control, monitoring and management of the goods in the warehouses using the RFID technology. 3. Provide for better and quicker reporting mechanism. 4. Reduce cost in terms of man power on the long run. 5. Decrease risk of loss and theft in the stock in the warehouses

________________________________________________________________________ CCD Mauritius Page 4 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________ 6. Provide for better tracking of the goods within the warehouse example positioning etc. 7. Cater for the management of the forthcoming increase in volume of the stock for Hypermarket X with the 5 new warehouses being built. 8. Reduce processing time for input of goods in the system and creation of in/out-flows data.  Scope The project consist of providing Hypermarket X with a RFID scanning system so that all goods entering and leaving its warehouses are easily stock report sent to management. The project is meant to facilitate the warehouse operators scan the goods entering at one point and leaving at another, thus reducing the difficulties they undergo in providing a sound and reliable report to the management  Project Deliverables 1. Installation of 2 RFID readers (with antenna) at all gates -on both sides of the entrance to be able to record all goods entering or leaving the gates- of the different warehouses of Hypermarket X. 2. Tags to be put on all the items before they stored in the warehouse.

________________________________________________________________________ CCD Mauritius Page 5 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________ 3. A host computer system with the application software to be able to understand, translate and manipulate the frequency data from read by the readers. 4. A network relating the various host computers to a server for a centralized storage of data about the stock.  Major Stakeholders 1. Hypermarket X investors’ panel. 2. Operators of warehouses. 3. Management Team .  General Timeframe 9 months (Based on calculated duration -maybe should be changed)  Estimated Budget 3 Million MRU (Based on calculated cost -maybe should be changed)  Estimate of resources and cost Resource Quantity Cost Estimate per day in MUR Cost Estimate in MUR

Business Analyst 1 3,000 320,000 (PM) Senior Network 1 3,000 300,000 Engineer ________________________________________________________________________ CCD Mauritius Page 6 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________ Expert Consultant 1 3,900 400,000 HW and Electrical 1 2,000 200,000 Engineer HW technicians 5 800 600,000 Programmer 1 1,700 280,000 Analyst Security Analyst 1 2,200 250,000 SW Engineers 2 1,500 400,000 Trainers 2 900 150,000 Total 12 19,000 2,900,000

Project Scope Statement 1. Work Breakdown Structure (WBS)

RFID SYSTEM

PROJECT MGT

IMPLEMENTATION

POLICIES

DEVELOPMENT

PLANNING

HARDWARE

ACCESS CONTROL

TESTING

EXECUTION

CABLING

INFORMATION SECURITY

TRAINING

LAN

ROLES & RESPOSIBILITIES

________________________________________________________________________ HEALTH & SOFTWARE SAFETY CCD Mauritius Page 7 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________

2. WBS Dictionary  Project Management

This process concerns in producing a written document which contains the basis of the project. A lead manager is identified; as well a list of specific duties in relation to the project is assigned.



Planning

The planning process provides the time framework of achieving definite tasks. Stakeholders are suitably selected depending on specific criteria.  Execution

The execution phase relies to the start of the project in an optimum way to attain specific deadlines.  Implementation

During this phase, accomplishment of previous tasks is monitored and any failure is reported for corrective measures.  Hardware

An analysis of existing and future requirements of technology is established.  Cabling

An evaluation of present infrastructure and any possibility for upgrading or acquiring is prepared.  LAN

________________________________________________________________________ CCD Mauritius Page 8 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________ A monitoring of present network is effectuated and the possibility for upgrading or acquiring is done.  Software

A study of the essential software is performed and its selection done.  Policies

A draft on security issues is prepared and clear objectives are identified for future development.  Access Control

Physical and technological barriers are established in order to safeguard absolute security.  Information Security

Implementation of prerequisites of information security (ISO 2007) in order to achieve high level of integrity.  Roles & Responsibilities

A policy stating the various roles and responsibilities of each and everyone, (administrator, end-user, clients) in conjunction with AAA model.  Health & Safety

Protocols governing the safe use of products and arousing health & safety issues regarding faultily use of equipment.  Development

A draft which caters for the future development of the human resource factor, as well, for the infrastructure and technology.  Testing

This phase tend to make provision of the actual status of the project. All flaws, if any are earmarked for corrective measures. ________________________________________________________________________ CCD Mauritius Page 9 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________  Training In the training phase, individuals involved in this project are identified and accrued training provided for future development and assessment.

Project Time Management 1. Activity list Project Phase 1.0 - Project Planning Detailed Activities Deliverables

1.1- Requirements collection – Business Case Analysis Identify the actual operational Document processes involved in Stock inventory management Project Risk Assessment & Management Plan 1.2 - Site Survey – Interviews, Meetings, inspections of physical & Project Configuration operations environment Management Document 1.3 - Business case Analysis RFID system Feasibility 1.4 - RFID system Feasibility – Report Financial, Operational, technical & Time schedule Preliminary Project Financial Report/quotation document 1.5 - Risk Assessment & Management Project HR Training & Evaluation Document 1.6 - Project Planning & initiation Documentations 1.7 – Project human resource management

2.0 – Project Design

2.1 – Design RFID operational Processes & business objectives

RFID system Architecture Design Document

2.2 – Design RFID system Hardware System Integration & Testing ________________________________________________________________________ CCD Mauritius Page 10 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________ Architecture Document 2.3 – Design RFID Network Architecture 2.4 – Design RFID Software Architecture Components & interfaces 2.5 – Design Health &safety, IT Security, System Integration & Testing policies/guidelines 3.0 - Implementation 3.1 - Implement RFID Operational processes 3.2 - Implement Hardware & Networking components installation 3.3 - Software Components installation 3.4 - Implement system Integration & processes 3.5 - Implementation Documentations 4.0 – Testing 4.1 - Perform RFID System operational business Processes 4.2 - Test & modify/configure Hardware & network architecture 4.3 - Test & modify/configure software architecture components & interfaces 4.4 - review & perform System integration & testing procedures 5.0 - Deployment 5.1 - On-site Periodic Maintenance & System live logistics assistance/support System integration & Testing Plan Review Software & Hardware Architecture RFID System Architecture installation Reports

________________________________________________________________________ CCD Mauritius Page 11 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________ 5.2 - In-house Training for RFID system 5.3 - Documentation & system manuals

Project Cost Management <Kaul will send you all his work on this and all additions to time mgt as well> Project Quality Management Project Human Resource Management 1. Organizational Breakdown Structure (OBS) NA 2. RACI Chart

Person HW and Electrical Engineer (Team Leader)

Activity

Business Analyst (Project Manager)

Expert Consultant

Senior Network Engineer

HW Technicia ns

Program mer Analyst

Security Analyst

SW Engineer s

Trainer s

Project Plannin g Hardw are Installa tion Softwar e Deploy ment

R, A

C, A

C

I

I

C

C

I

I

C

C

R.A,C

R, A

R

I

C,A

I

I

C

C

A,C

I

I

R,A

A,C

A

I

________________________________________________________________________ CCD Mauritius Page 12 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________
System Testing /Revie w Policie s Creatio n /Updat e Trainin g

R

C

A,C

A

A

R,A

A

A

I

R, A C

R, A C

R,C I

C I

I I

R,C I,C

R,C I,C

C I

I R, A

Key:  R = Responsible  A = Accountable  C = Consult (people who provide input to help perform the task)  I = Inform 3. Text-Oriented Description This section contains more detail description about the responsibilities, authority and competency of the main roles as below:
Roles Responsibilities Competency Authority Report to

________________________________________________________________________ CCD Mauritius Page 13 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________
Business Analyst (Project Manager) a. Create the plan for the whole project. b. Direct and manage the project team to perform the project execution. c. Monitor and control the project work throughout the execution, testing phase, ensure correct delivery of product as well as the training. d. Create and update the different policies relevant to the implementation of the project. e. Integrate change control (if any). f. Close the project. a. Help in the building of the project plan by providing an expert point of view about estimations b. Consultant throughout the other activities to give expert advice or judgement concerning the implementation of the whole RFID system c. Accountable for the creation of policies d. Help in the testing phase a. Help in the building of the project plan by providing an expert point of view about estimations b. Consultant throughout the other activities to give expert advice for the design and implementation of the network required for the RFID system c. Accountable for the creation of policies d. Help in the testing phase a. Expert Knowledge about the RFID system b. Expert in management of various different projects including that of the RFID system in various other projects. a. Full authority to perform the project and will be responsible and accountable for the correct implementation of the project. a. The Client (about how the status of the project) b. The Higher Management of our company (to give updates of the project running or in case of issues he cannot handle.)

Expert Consultant

a. Expert Knowledge about the RFID system

NA

Business Analyst (Project Manager)

Senior Network Engineer

a. Expert knowledge in network designing, analysis and implementation.

a. Full authority to bring forward any analysis and changes that are required in the design, and implementation of the network system

Business Analyst (Project Manager)

________________________________________________________________________ CCD Mauritius Page 14 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________
HW and Electrical Engineer (Team

Leader)

HW Technicians

Programmer Analyst

Security Analyst

a. Direct and manage the HW technician team during the HW installation at the various warehouses. b. Direct and manage the HW technician team to ensure schedule and quality are respected during the HW installation phase. c. Perform the testing for all the HW installation d. Report to the project manager(for status update of HW installation or in case of any issues present) a. Perform installation of all hardware needed to implementation of the RFID system b. Ensure proper HW installation is done a. Manage team and perform installation of software needed to implementation of the RFID system b. Ensure proper SW installation is done c. Help in the preparation of policies on how to use the software. d. Help in the training plan a. Ensure security issues are well tackled during installation of the RFID system – both HW and SW b. Creation of security policies

a. Proven good Team leading and management skills in terms of HW installation. b. Expert knowledge about installation of HW for the RFID system

a. Be the responsible person during the HW installation phase b. Almost full authority in terms of anything related to HW installation phase (Will just have to report to the Project Manager and obtain approval in case of delicate issues).

a. Business Analyst (Project Manager) b. Senior Network Engineer c. Security Analyst

a. Proven experience in HW installation for the RFID system

NA

HW and Electrical Engineer (Team

Leader)

a. Proven experience in SW creation/ analysis/ implementation and Team lead

a. Full authority for the analysis and implementation of the software for the RFID system.

a. Business Analyst (Project Manager) b. Senior Network Engineer

a. Expert knowledge in security issues concerning software to be implemented.

SW Engineers

a. Deploy the software to be used to control the RFID and provide reports. b. Ensure proper deployment and testing of the software. a. Ensure trainign of all personals who will use the RFID system b. Ensure training about the policies pertaining to the RFID system put in place

a. Expert programmer and users of the RFID software system. a. Expert knowledge about how to use the RFID system b. Proven teaching records

a. Authority over the HW and SW engineers to ensure proper implementation of security during the setting up of the software system for the RFID NA

a. Business Analyst (Project Manager) b. Senior Network Engineer a. Programmer Analyst. b. Security Analyst Business Analyst (Project Manager)

Trainers

NA

________________________________________________________________________ CCD Mauritius Page 15 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________

4. Staffing Management Plan Staffing Timetable Release Criteria Training needs Rewards & Complian Recognition ce 1. Safety Safety

1. Staff will As per the As per the No additional This project NA come from Schedule/G within the ant defined the Each will plan. Schedule/G training will will be on

rules according to the

chart ant chart – be required as each in staff will be the personnel employee’s PM release from have hands-on involved project once experience for CV their assigned tasks the for

organization itself. 2. team

organizati on safety and security policy will be applied. (Section ‘safety measures to follow during

consideratio during

have to go and do the implementat ion at the various warehouses of the

implementatio n

are n of the RFID performance system. appraisal.

completed accordingly.

Hypermarke

________________________________________________________________________ CCD Mauritius Page 16 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________ handling t X. 3. Cost of resources are as per the cost of hardware, heavy materials and installatio n 4. HR will provide full assistance to project management team in case of need for extra resources. 2. Security policies also will procedure s.)

management plan.

be created for use of the RFID system.

Project Communications Management

________________________________________________________________________ CCD Mauritius Page 17 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________ Project Risk Management Risk is defined as an uncertain event that if it occurs, has a positive or negative impact on the project. It comprises mainly of two components: (i) Probability that the risk will occur and (ii) Impact of risk on the project if it occurs (can be + or -). Risk can be from internal or external sources. It is also closely relevant to the human and technological factors. Constraints like time, cost, quality and scope may also lead to risks in an organization. However to cater for these shortcomings, a risk management plan and a risk register need to be established and the plausible course of actions are carried out as hereunder;   Avoidance : eliminate the threat by eliminating the cause Mitigation: reduce the probability or consequences of an adverse risk or increase them for an opportunity    Transference – make another party responsible Contingent response – prepare a plan to be executed only if risk materialises Acceptance: do nothing but stay informed

1. Risk management plan Risk Factor Possible cause Actions taken Human Resource -Resistance change to A/avoid T/transfer Arouse awareness, financial Mitigate leverage, training and Agreed upon solutions Review

-Apprehension of M/mitigate being redundant

education, transfer to other departments

________________________________________________________________________ CCD Mauritius Page 18 11/15/2009

MSc Computer security and forensics

Professional Development & System Project Development

UTM Assignment 1 ________________________________________________________________________ Technological -Lack of A Third parties to provide, Transfer availability -Spare parts N/A T M manage as previously

Time

Project delayed

A T M

To

manage

by

making Mitigate of

inclusive

speculation

delay from the start General cost cutting, Mitigate

Financial

Budget exceeded

A T M

acquire loans

Quality

Value of product not to the level

A T M

Subcontracting for products Transfer quality, Quality control

Scope

Scope change

A T M

Generate

acceptance Mitigate

policies, quality assurance

________________________________________________________________________ CCD Mauritius Page 19 11/15/2009


				
Kevin  Soopramanien Kevin Soopramanien Mr www.google.com
About Hello. I am Kevin. I am interested in the security aspect of information systems. I have been doing some research papers which i will be posting here. I hope it helps :) Cars are also of great interest to me. So you can also find reviews here :)