Information application of logistics platform based on RFID technology

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

Chapter One Logistics Platform System

1.1.1. Logistics platform management system

Through a unified information platform, integrate various logistics distribution sites independently distributed in the logistics network, so as to realize the large-scale network of logistics nodes to achieve the scale benefits of logistics.

Membership system can be adopted, and members obtain various service information through the online client system;

The various resource information of the logistics platform can be expanded indefinitely, and eventually can be accumulated into an information database and knowledge base shared with other logistics stations.

Member Management
Membership management is divided into individual member management and company member management. It mainly sets basic member information, mobile phone information and resource information service content; company members may have multiple mobile phone user contact information. It mainly includes the functions of querying, adding, modifying, deleting, viewing and importing member information.

Resource management
Mainly include: resource query, add, modify, update, delete, publish, cancel and import functions.

Information management
Including information query, add, modify, delete, publish, cancel and print functions.

Billing management
Mainly record, set, maintain, and query member bills and business lists of members’ membership fees, information service fees, service rates and information service packages;

membership service
Information query
It mainly provides members with functions such as customer order management, delivery, arrival management, receipt and inquiry, real-time logistics allocation data, and real-time tracking of the logistics supply chain.
Resource Query Slightly
Bill query
It mainly provides members with online query and printing functions of membership fees, information service fee bills and invoices, and real-time online query and printing functions of information service business lists.

System Management
Including data resource and function authority management, role setting, operator setting, password modification and log management functions.

1.1.2. Freight Transaction System

Public tally operation management
Order receipt
Platform tally plan generation
Platform tally plan release and update
Simple Transportation Management System
Customer management
Consignment note management
Job order management
Freight transaction service
Driver and vehicle management
Credit management
Standardized contract management
Consignment note management
Settlement management
Public logistics information service
Logistics information release
Logistics transaction management

1.1.3. Customer Relationship Management System

This subsystem is specially used for customer management and customer service. The users of the customer service system generally use the Internet, and can also use the SMS messaging platform to access. Customers, partners (such as contracted fleets) and other users of the logistics platform use the customer service system to perform some high-end management operations. For customers’ general query needs, the system will provide e-commerce functions such as an order tracking system (the customer can track the processing status of the entire order by entering the order number on the web page).

The main functions of this subsystem include:
Online order management: Customers can place orders or orders directly online, and can inquire about the relevant processing conditions after the order is placed.
Online inventory query: Customers can query the inventory of various products online.
Online business volume query: Business customers can directly query the business volume online at any time.
Cargo tracking query: You can track and understand the transportation dynamics of its cargo through the order number, waybill number, business contact number, etc.
Fee query: Customers can directly query related fees and current account information online.
Customer file management: It is dynamically synchronized with the customer files in each subsystem.
Customer Service Analysis
Customer complaints and feedback.

1.1.4. Business settlement management system

Capital flow is as important as logistics and information flow. The operational revenue and expenditure management system of the logistics management information system should be developed based on the actual business operation process of the logistics enterprise and combined with the domestic financial management model and the application level of enterprise financial management software.

The settlement subsystem plays a role in monitoring and managing the flow of funds in the business in the entire logistics enterprise. It manages the various receivables and accounts payable that occur during the entire logistics process to monitor the execution of the business, thereby reviewing the business costs and the economic benefits that the business brings to the business.

Receipt and payment management
Statement management
Statement verification
Statement management
Inquiry of transaction cost details
Customer accounting analysis
Cost management
Actual cost statement
Actual cost statement
Single ticket cost profit analysis
Basic settlement settings

Users can set and define basic financial data such as currency, exchange rate, fee rate, settlement method, expense item, account title, accounting period and voucher template.
Expense item setting (billing unit setting and transaction expense item setting)
Chart of accounts
List of accounting items
Voucher template definition
System accounting period

1.1.5. Management report and information query
1.1.6. Decision Support System
1.1.7. Data exchange and system integration

The main function of this module includes the interface function with other information systems. As the logistics business involves multiple links of an enterprise, there are information exchanges between the logistics information system and multiple information systems, including customs, ports, customers, carriers, and so on.

The realization of the data exchange and system integration module can be realized in the following two ways:
Custom development interface.
It is realized by EAI kit system.

1.2. Application interface
The system adopts B/S user operation interface and C/S client at the same time, which can be accessed by web browser and client.

1.3. The main features of this program
Contains advanced logistics management concepts and models
Practicability: comprehensively consider the needs and characteristics of logistics.
Modularization: Each module can be split, combined and used, and can be flexibly configured and customized development according to different stages and different needs of customers.
Advancement: According to the supply chain management concept, using advanced computer and communication technology, integrating modern logistics technology (EAN/UCC coding technology, automatic identification technology, GPS technology), through the INTERNET /INTRANET / short message platform to connect customers and carriers , Agents, distributors, etc. are connected by business relationship.
Provide Web-Based services: As long as there is Internet, customers can view and manage its goods and flow, capital and profitability, and vehicle and vehicle conditions.
Provide short message platform services, users can dynamically publish and query logistics information through mobile phone short messages.
Adopting the systematic approach of data warehouse structure to form the foundation and information resources of the enterprise information system is a further step for the enterprise. Strengthen system analysis functions and lay the foundation for information value-added services.
Integration and openness: The system provides XML/EDI interface, which can realize seamless connection with other systems. It can perform data input and output operations with other devices (such as bar code readers). Can provide a variety of tools and system interface capabilities, such as: GPS, BARCODE, PDA, EDI, Email, etc.
The system has a friendly user interface, simple and easy-to-use operation, and adopts a full-graphic flow interface.
The system provides a variety of operation modes, such as: it can be operated through client software or through a browser, and the effects of these operation methods are the same (including: printing, barcode recognition, scanning, etc.).
The system has a variety of data transmission methods. Including point-to-point, VPN, email, FTP, real-time transmission, etc., and the effects of these transmission methods are the same.
The on-the-go tracking function provides an interface for seamless connection with the GPS system;
Goods batch tracking;
Support for multiple measurement units, automatic conversion of measurement units;
Open data interface;
E-commerce support;
Powerful system security management

Chapter 2 Technical Solution of Logistics Platform Information System

2.1. Ideas for technical route selection
Establish a stable system core to support the flexibility of the system
Support the construction of enterprise-level software systems
High reliability, safety, scalability
Ensure integration, communication, configuration and compatibility with external systems and modules
Utilize international common and standard technology to ensure the upward scalability of technology
Connect with the industry to ensure the availability and operability of the system
Keep the customer’s existing IT investment
Form alliances with complementary technology companies to absorb cutting-edge technology products from others
In line with future technology development trends

2.2. System architecture solution

According to the above-mentioned technical route selection ideas, this project will apply the world’s first-class technology, integrated Internet technology (WEB), wireless communication technology (WIRELESS/SMS/GPRS/CDMA), satellite positioning and tracking technology (GPS), and geographic information Technology (GIS). The overall structure of the project adopts the industry standard-based and open J2EE platform. The J2EE platform will bring higher flexibility of choice and ease of configuration to the information system. The J2EE multi-layer architecture technology can ensure the flexibility of the system’s future changes and system expansion, etc., and provides a good mechanism for building a business system with scalability, flexibility, and easy maintenance.

The development of the information system will comply with J2EE (Java 2 Platform, Enterprise Edition) specifications, using a three-tier structure of Web layer, EJB (Enterprise JavaBeans) layer and EIS (Enterprise Information Systems) layer. In this way, the software system will adopt the Browser/Server model, multi-layer structure (business logic layer, data layer separated from each other).

2.3. Key technology route selection

1) System software platform: adopt J2EE platform.
Openness and standardization
Maturity and operating system independence
Support WebLogic, WebSphere, JBoss, etc.

2) System database: using RDBMS
Openness and standardization
Suitable for enterprise-level data storage

3) System module: Adopt EJB and Web Services
standardization
Reliability and scalability
Suitable for enterprise-level software construction
Easy to communicate with external systems

4) Data representation: using XML
Standardization and scalability
Suitable for data exchange within and between enterprises

5) Data exchange: adopt EDI, JCA and WebService methods
Identify different formats of data between companies
Realize data exchange with external systems

2.4. System database structure

Based on the characteristics of logistics platform operation, the data requirements of its information system must meet the following points:

Consistency of basic data: Some data that must be shared within the company’s logistics network, such as warehouses, vehicles, customers, cargo codes, and employee names, must be consistent. After inputting a service outlet, all other outlets can share this information.

Database security guarantee.
Data query efficiency: In order to ensure the efficiency of the entire company’s internal work, the data query must be obtained within a specified time range.
Multi-database compatibility (for example, Oracle, SQL Server, DB2): Due to the large number of outlets throughout the company, in order to reduce costs, the system must be compatible with different databases. For example, low-performance and low-cost databases are used in some outlets; while in important data centers, high-performance and high-cost databases are used.
2.4.1. Database structure

Based on the current status of the logistics platform, the system database is planned to adopt a centralized database combined with temporary data files from various locations.
The feature of this solution is to ensure real-time synchronization of data in the entire system and unified management of data. But this kind of scheme requires the communication network to have better communication speed, security and stability, in order to guarantee the safe and stable operation of the system and fast processing data. In the event of network problems, key services can still be carried out through temporary data files.

2.4.2. Multi-database compatibility

In order to solve the problem that the logistics information system is compatible with different databases, it is planned to adopt different database plug-ins for different databases. When implementing, you can make the whole system compatible with different databases by configuring the target plug-in at different outlets according to the needs of users.

2.4.3. Data backup and recovery

A good backup strategy is a prerequisite for the normal operation of the logistics platform. For data backup, in addition to dual-system hot backup, the logistics platform can also use a combination of logical backup and physical backup to ensure the maximum possible mean time between failures and minimum recovery time. All backup data is stored on tape And the remote database server. All backups are implemented by writing automatic backup script files or programs through a pre-customized strategy.

Logical backup: Incremental backup of the data of each database at one o’clock in the morning every day (only the business data that occurred that day is backed up). A full backup is made every Saturday morning, and the monthly full backup is used as historical data archive.

Physical backup: There are two types of physical backup (database closed and not closed), namely cold backup and hot backup. Do a full database backup once a month (all tablespace backups), and do a full backup once a week for data with a large business volume. Do one level of incremental backup once a week, including the generated redo log files. Do a secondary incremental backup once a day, and back up the redo logs generated on that day every day.

Disaster recovery strategy: In order to prevent database damage caused by accidents such as earthquakes and fires, all backup data should be stored away from the production database. If necessary, consider establishing a corresponding remote STANDBY database for each database.

2.5. System operating environment

Considering the openness of the system, the system platform is based on the software and hardware environment of the open system, and has a wide range of computer hardware platform support. It supports the Unix and Windows platforms of the mainstream computer manufacturers on the market, which is convenient for system transplantation and upgrade; it fully supports Chinese interface and Chinese Input; network communication supports TCP/IP protocol. The specific operating environment is as follows:

The client program runs in a browser environment, and the user can run the program as long as a browser (usually included in the operating system) is installed on the client machine. There is no need to install a special client program on the client.

The server-side program can run in Win2000, Window NT, Linux, Unix and other system environments.
The database server can be a database such as Oracle, SQL Server, and DB2.
The network environment is a network that supports the TCP/IP protocol.

2.6. System development environment

The whole system adopts the development mode that combines advanced Browser/Server and traditional Client/Server, and is completely developed based on Java and XML technology. The system adopts the J2EE framework, which is convenient for system expansion. CCCC adopts the following development environment in project development:

Project development management tool-MS Project
Modeling tool for system analysis and system design-Rational Rose
Back-end Java development tool-Eclips4.0
Front page development and website management tool-Dreamware UltraDev
Software version control environment-CVS
Software testing environment includes: performance testing environment, unit testing tool, automated system testing tool-Winrunner, defect tracking software.

2.7. System Security Policy
2.7.1. Three levels of security policy

The security of the network chooses the network version of the firewall, network scanner, system scanner, real-time intrusion monitoring, and Internet antivirus.

The security of the server selects the firewall of the server version, the database scanner, the virus protection of the file server, and the virus protection of the mail server.
Security management selects comprehensive enterprise user management.

2.7.2. Common security strategies

Access Control (Access Control): Measures to restrict unauthorized users from accessing the company’s network and information resources. The access must be applicable to all current services and applications. For example, through Internet services, including Web browsers, e-mail, FTP, Telnet, RPC and UDP, etc. The focus here is on the access control of the server database.

Authentication: In order to provide corporate network resources for local users and various remote users, mobile users, and telecommunications users, in order to protect network and information security, effective authority control and identity recognition must be adopted for accessing connected users. To ensure system security.

User Authentication (User Authentication): Authentication based on the access rights of each user, just like the program of the user LOGIN.

Client Authentication: An authentication method based on the IP address of the client host. The system administrator can decide how to authorize each user, which server resources and applications are allowed to be accessed, and when. How many sessions are allowed to be established, etc.

Session Authentication: Realize client-to-server session authentication through session proxy software.

Encryption: Built-in dedicated encryption and key management methods; fixed key encryption and authentication methods; key management for IP encryption.

Router Security Management: Through a centralized management master, you can configure and manage access control lists on multiple routers. When changing the configuration, you only need to change it in the central management master control, and the system will automatically generate an access control list and distribute the ACL to related routers throughout the enterprise.

Network Address Translation: It mainly prevents the internal IP address of the corporate network from being disclosed. Translate the IP address of the internal network into an IP address that can be used outside, and satisfy that the IP address of the enterprise network can be used and managed on the Internet.

Content Security: Provides data monitoring functions to high-level service protocols to protect users’ network systems and information resources from macro viruses, malicious Java ActiveX applications and Web files containing unnecessary content, and provide the best Improved Internet access.

Connection Control: Server Load Balancing

Record management (Auditing): It can provide a record of users’ activities in the network.

Enterprise-wide Security Management: By providing a centralized security management mechanism, as long as one workstation is used, the network configuration can be controlled in real time while ensuring network security.

2.8. System construction goals

Choose an open system platform and adopt a unified system structure, so that the entire system has good integration, controllability and compatibility, and better adapts to the needs of new business expansion and computer technology development.

The design of the network platform adopts a centralized data center model and uses Internet / Intranet technology to construct a network platform, which mainly includes the following aspects:
All business system data is centralized in the data center;
All logistics outlets are connected to the data center through ADSL for business operations;
Build Internet dedicated line access in the data center to provide Internet “logistics business” services, such as: online logistics information resources, online logistics procedures, online distribution, etc.;
The connection between each customer, each fleet, other logistics provider and the platform can be achieved through telephone, fax, SMS, Internet, etc.;
It can realize online logistics management, use network command and dispatch to optimize logistics and distribution routes.
The system construction plan should meet the current application requirements, and will not lag behind in the next few years, and can be expanded or upgraded according to the development of the business.

2.9. System design principles

1) System advancement
Select industry-leading computer network communication system software and hardware technology, and provide the latest computer technology services for the entire system in accordance with internationally accepted standards and conventions.

2) System reliability
Use mature and widely used technologies to ensure the reliability of hardware and software systems.

3) System scalability
All system hosts and communication devices can support higher-speed processing and communication requirements. While adapting to the configuration required by the network system, the interface is reserved to meet higher performance requirements, so that the system can be upgraded by adding internal modules of the network equipment to ensure the original investment.

4) System manageability
The manageability of the system realizes all-round control and management of network nodes, network equipment and servers through the use of simple network management technology and professional supporting network management software.

5) System openness
The openness of the system is reflected in the interconnectability of the communication system and the compatibility of industry standards. Adopt the Internet communication protocol to implement network connection to ensure the connectivity with other systems now and in the future. Industrial standard hardware equipment is used to ensure long-term technical support from most manufacturers.

6) System security
System security includes ensuring the availability of network services and the integrity of network information. The security of the network operating system complies with international standards. The network management system can report and record any illegal entry and warning information in time.

7) Fully consider cost performance
The equipment selection fully considers the cost performance, and protects the customer’s investment as much as possible when the system function requirements are realized.

2.10. System platform network design
2.10.1. Overall design

The design of the network system structure and hardware platform is based on the characteristics of the logistics platform business structure and the data interaction requirements of the logistics information system, combined with the experience of China Communications Guoke in network design for many years.

According to the principle of system structural design division, it can be divided into the following subsystems:
Data center network system;
Internet secure access system;
The interconnection system between the data center and various companies and outlets;
Each company’s internal local area network system.
The design idea is as follows: build a data center at the headquarters of the logistics platform company, run the logistics information system, and concentrate all business system data in the data center of the headquarters.
All companies and outlets access the data center through ADSL dedicated lines to perform business system operations. Build Internet dedicated line access at the headquarters to provide Internet “logistics business” services.

2.10.2. System platform technology
Gigabit Network Technology
For the backbone of the data center network, it is recommended to use mature Gigabit Ethernet, high-performance full switching, to meet the needs of large-load network operation.
Gigabit Ethernet is a continuation of FastEthernet. It retains Ethernet frame format, flow control and link layer management, and is fully compatible with Ethernet and Fast Ethernet. With the continuous expansion of the market and the expansion of its own business, the flow of information will continue to increase. The business is carried out in real time, requiring rapid and accurate information transmission. At the same time, the system is divided into levels. The higher the level, the faster the real-time response speed is required. . Therefore, this system recommends that the switch backbone adopt Gigabit Ethernet technology to meet the requirements of large amount of information and rapid response, while also considering the need for system expansion in the future several years.

safety technology
The security of the system is ensured by a variety of Internet security technologies. Related security technologies include firewalls, routers, CA certification, ISL encryption, VPN, etc.

2.10.3. Data Center Network System

The data center network is composed of four parts: the functional server group, the network part, the convergence router part and the Internet connection part.
The functional server group is mainly configured according to the needs of the application system, including logistics information system servers, e-commerce back-end servers, etc.
The network is mainly used as a platform for data transmission, and is the only way for the interaction between lower-level nodes and the database. According to the performance and reliability requirements of the data center, it is recommended to configure redundancy for the core network equipment to ensure that the system can still be uninterrupted even if the core network equipment fails for some reason.
The data center is connected to various companies and distribution centers through routers.

The Internet connection is a link that provides services such as information release, e-mail, and e-commerce to the outside world, and needs to be protected by a firewall.
Key business system-logistics information system server It is recommended to use two IBM PC servers to build a dual-computer hot backup form to build a high-availability and reliable storage system.

2.10.4. Internet security access system

The Internet access part is the link between the logistics platform company’s external information release, e-commerce services and internal access to the Internet, including Mail (external mail service)/DNS, e-commerce websites, firewalls, and routers.

Using DMZ to connect to external mail, DNS and e-commerce website servers, etc., on the one hand, these servers can be protected to a certain extent; on the other hand, even if these servers are broken by hackers, they cannot use these servers as attackers to attack other sites on the Internet. The specific implementation of the tool is to use a firewall to restrict the connection established from the DMZ to the Internet or internal network.

Internet information servers such as Mail, DNS, and e-commerce websites that access part of the Internet are public areas that can be accessed by the intranet and the Internet, and the intranet cannot be accessed by the Internet because it is isolated and protected by a firewall. Intranet can transparently pass through the protective layer to access the Internet. The logical structure diagram of the access part is shown in the figure below.

2.10.5. Headquarters, companies, and distribution centers interconnection system

System interconnection also refers to the connection between each company, each distribution center, and each network point and data center.
The characteristics of the logistics information system determine that it must be connected 24 hours a day.
The interconnection system will be constructed using ADSL dedicated lines, and each network point will be accessed through ADSL dedicated lines. Meet the system interconnection requirements of logistics information systems.

2.10.6. The internal local area network system of each regional logistics center and distribution center

It is recommended to build their own local area networks in each company and distribution center to realize network information office.

2.11. System platform equipment selection design

The equipment selection design is mainly aimed at the related equipment required by the logistics information system: the configuration of the data center logistics information system host, storage backup system and related subsystems.

The host system is mainly configured according to the needs of the application system and provides services for the application system. The host system of this system undertakes most of the data storage and processing work, so its performance, reliability and other aspects are very high. It will further expand the performance of the host according to the continuous expansion of system scale and enterprise applications.

2.12. System security design

In view of the requirements of the logistics platform information system: external-Internet or commercial enterprise users provide access interfaces, internally provide internal users of the enterprise use and operation, it is recommended to adopt appropriate measures and means to ensure the safety of the system.

2.12.1. Network Security

The network security strategy mainly focuses on the ISO model network layer and the following layer protocols. Aiming at the methods used by illegal intruders and the loopholes in the network environment, combined with the actual network environment, establish a safe prevention system, fill in the loopholes at various levels in the system, and cut off the intrusion channels of illegal users.

Security measures for Internet networks usually include: firewall, CA certification, intrusion detection, anti-virus and other technologies and measures.

Firewall
IDS intrusion detection
Virus protection
CA certification

2.12.2. Security of the host system

The key business system of the logistics platform company-the host of the logistics information system is constructed in the form of dual-machine hot standby.

2.12.3. Data Security

Hard Disk RAID Technology
data backup
Logistics platform companies can choose backup tools and make backup plans based on actual conditions.

2.12.4. Application system security

The security of the application system will be guaranteed by means of logs, authority management, database authority and operating system authority.

Log
By establishing a log in the application system, it is possible to record which modules and access time each operator who uses the system has accessed. This function has a supervisory effect on the operators of the application system, thereby restraining illegal operations to a certain extent.

authority management
Authority management is a system-level security system to ensure that only authorized users can use authorized functions. Authority management usually adopts: user name + password management, the password storage should be binary encrypted, and the user should control the change.

Rights management includes user definition, role definition and user group definition. User definitions describe user information and set passwords; role definitions describe user permissions; user groups define user classifications.

Permission definition can set the use of system functions and operations on data, such as read, write or query permissions.

Database permissions

The database management system also restricts the access role of the database. The usual permissions include roles such as DB owner, DBA, and ordinary user. Each role has different read and write permissions to the database.

Operating system permissions
The operating system also restricts the role permissions of the application system.
According to the business development of the logistics platform, this project is based on the principle of high starting point and accurate positioning. It needs to be completed on the basis of overall planning and design.

At present, the company intends to provide platform rental services for food logistics and clothing industry.

If you have any questions, please contact

Document production: Ren Gong
Email: [email protected]
QQ: 479017087
Mobile: 13911533725
http://company.rfidworld.com.cn/rfidworld_company_27961.html

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare