Professional Documents
Culture Documents
S c o p e o f t h e P r o je c t
Page 1 of 56
Vehicle Tracking and Ticketing System Using RFID
The project Vehicle Tracking & Ticketing System (VTTS) mainly deals with identification
of vehicles and ticketing the passengers using these vehicles. The project is implemented with the
help of Radio Frequency Identificati on (RFID) Technology. The major area of implementation of
our project is for ticketing bus passengers in college bus electronically and obtain identification of
buses. The project on implementation will fetch added features like speed in transaction, cost
efficiency, low frequency of errors etc. Another added feature will be the accuracy in data recorded.
Human errors will be rectified to the maximum thereby enhancing the efficiency of the system.
The obsolete system of manual entry and calculation can be r emoved and this method could
be adopted to bring into action a more efficient system. This VTTS application identifies a
particular vehicle by the RFID tag fixed on them. In case of passenger boarding or getting down the
bus is identified and ticketed on t he basis of ID card they posses.
The system could be more elaborately established for all vehicles and passengers and a
complete digital network could be established with the least of its possible errors. The tags are cost
efficient and the whole equipmen t once installed can work without any particular attention. The
area of application of RFID is very wide and the technology has already proved its value. Thus the
implementation and practice of such a digital system would always be worth.
Page 2 of 56
Vehicle Tracking and Ticketing System Using RFID
D escri p tio n o f th e
Conce pt
a.
Page 3 of 56
Vehicle Tracking and Ticketing System Using RFID
Let us see the data flow of RFID in Diagram 1., which shows handling of data in RFID System .
Page 4 of 56
Vehicle Tracking and Ticketing System Using RFID
Page 5 of 56
Vehicle Tracking and Ticketing System Using RFID
An Agile Reader
An agile reader is one that can read tags operating at different frequencies or using different
methods of communication between the tags and readers.
Intelligent and Dumb Readers
These terms are not precise, but many people use "intelligent reader" to describe one that
has the ability not just to run differ ent protocols, but also to filter data and even run applications.
Essentially, it is a computer that communicates with the tags. A "dumb" reader, by contrast, is a
simple device that might read only one type of tag using one frequency and one protocol. Thi s type
typically has very little computing power, so it can't filter reads, store tag data and so on.
Writing Data
Many applications of RFID labels include thermal direct or thermal transfer human -
readable printing and bar codes on the face of the label. Therefore, the logical place for data to be
written to RFID labels is at the bar code printer. Printer vendors suc h as Zebra technologies,
Datamax, and Intermec have developed RFID writers that are built into their printers.
Page 6 of 56
Vehicle Tracking and Ticketing System Using RFID
RFID Tags
There are 3 types of tags available.
Active Tags
Passive Tags
Semi-passive Tags
Active Tags
Active RFID tags have a transmitter and their own power source (typically a battery). The
power source is used to run the microchip's circuitry and to broadcast a signal to a reader.
Passive Tags
Passive tags have no battery. Instead, they draw power from the rea der, which sends out
electromagnetic waves that induce a current in the tag's antenna.
Page 7 of 56
Vehicle Tracking and Ticketing System Using RFID
Semipassive Tags
Semi-passive tags use a battery to run the chip's circuitry, but communicate by drawing
power from the reader.
Active and semi-passive tags are useful for tracking high -value goods that need to be
scanned over long ranges, such as vehicles on a track, but they cost more than passive tags, which
means they can't be used on low -cost items. Now End-users are focusing on passive UHF tags,
which cost less than INR 18.00 today in volumes of 1 million tags or more. Their read range isn't as
far—typically less than 20 feet vs. 100 feet or more for active tags —but they are far less expensive
than active tags and can be disposed of with the product packaging.
It depends on the vendor and the application, but typically a tag carries no more than 2KB
of data—enough to store some basic information about the item it is on. Companies are now
looking at using a simple "license plate" tag that contains only a 96 -bit serial number. The simple
tags are cheaper to manufacture and are more useful for applications where the tag will be disposed
of with the product packaging.
Page 8 of 56
Vehicle Tracking and Ticketing System Using RFID
manufacturing process. The information on such chips can never be changed. WORM tags can
have a serial number written to them once, and that information cannot be overwritten later.
WORKING SCENARIO
Schematic representation of RFID technology used in VTTS is given below in Figu re 4.
with a sequential indications to the various features used by the system. The antenna senses the tag
and the information are fed into the reader. The reader then decodes these data and sends it to the
host system through requires means.
Once the reader has activated the transponder, the transponder responds by emitting
a signal to the reader’s antenna, which is converted to an electrical signal in the radiofrequen cy
module. This signal, in turn, is sent for further processing to the host computer by the control
module.
Page 9 of 56
Vehicle Tracking and Ticketing System Using RFID
Inductive coupling
A method of transmitting data between tags and readers in which the antenna from the reader picks
up changes in the tag’s antenna.
Backscatter
A method of communication between passive tags and readers. RFID tags using backscatter
technology reflect back to the reader radio waves from a reader, usually at the same carrier
frequency. The reflected signal is modulated to transm it data.
Page 10 of 56
Vehicle Tracking and Ticketing System Using RFID
Frequencies in RFID
RFID systems generate and radiate electromagnetic waves, they are justifiably classified as
radio systems. It is particularly important to ensure that RFID systems do not interfere with nearby
radio and television, mobile radio services (police, security services, industry), marine and
aeronautical radio services and mobile telephones.
Low-frequency tags are used for small -scale applications requiring shorter read ranges.
High-frequency systems are used for large-scale applications requiring longer read ranges, such as
vehicle tracking and ticketing in toll collection etc. Generally speaking, higher frequencies have
greater reading ranges and are less sensitive to noise than the lower frequency tags. While high
frequency tags transmit data faster and can be read from further away, they also consume more
power and are more expensive than low -frequency tags.
Currently, the trend is towards UHF because of the greater read distances and lower cost per
tag in the future. UHF tags are more sensitive to environmental factors like water, which absorb the
tag’s energy and thus block its ability to communicate with a reader. However, this is a crowded
frequency spectrum because mobile and cordless phones, Wi -Fi and Bluetooth devices also operate
in this range of frequencies.
Conversely, RFID tags with microwave frequency do have greater read ranges and higher
reading speeds than lower frequency tags, but they tend to be line of sight dependent, orientation
sensitive, and require more power.
Page 11 of 56
Vehicle Tracking and Ticketing System Using RFID
* LF HF UHF μF
R ea d R a n g e 10 c m 1M 2 -7 M 1M
M a g n e ti c M a g n e ti c E l e c tr o E l e c tr o
Coupling M a g n e ti c magnetic
18000-3.1,
Existing 11784/85, 15693, 14443 A, EPC C0, C1, 1 8 0 0 0 -4
Standards 14223 B and C C1G2, 18000-6
Transportation Transportation
Application Smart Card, vehicle ID
vehicle ID,
T i c k e ti n g T r a n s p o r ta ti o n Access/Security (Road toll)
Page 12 of 56
Vehicle Tracking and Ticketing System Using RFID
U n iq u e F ea tu res o f th e
P r o p o s e d P r o je c t
Page 13 of 56
Vehicle Tracking and Ticketing System Using RFID
RFID Today
RFID systems are used for a variety of industrial and enduser applications. Electronic toll
collection and vehicle tracking are a typical use of active and semi -active tags. Automobiles are
equipped with an active tag that can be read as the vehicle moves through a toll booth or drives
along the road. Each tag has a unique serial number; a database correlates the serial number with an
account number that is automatically monitored each time the tag is read.
RFID Tomorrow
It is widely believed that RFID tags will migrate int o consumer items as the price of tags
drops to INR 2.28.
Scanner, the next generation RFID Technology will be based on electronic tags that are
“read” using a wireless transceiver. These systems, collectively known as Radio Frequency
Identification (RFID), have been increasingly used throughout the world in recent years.
The implementation of RFID for vehicle identification and ticketing was executed to
overcome the various shortcomings in the existing system. Some of the added features in this
system are listed below:
Generally, the BARCODE technology uses the ‘line of sight’ technology. That is, a
scanner has to “see” the bar code to read it, which means people usually have to orient the
bar code towards a scanner for it to be read. Radio freque ncy identification, by contrast,
doesn’t require line of sight. RFID tags can be read as long as they are within range of a
reader.
Actually, the RFID uses the low -end of the electromagnetic spectrum. Thus waves coming
from readers are not dangerous and ar e similar to those waves coming from our car radio.
Just as our radio tunes into different frequency to hear different channels, RFID tags and
readers are tuned to the same frequency to communicate.
Radio waves travel through most non -metallic materials, so they can be embedded in
packaging or encased in protective plastic for weatherproofing and greater durability.
Page 14 of 56
Vehicle Tracking and Ticketing System Using RFID
Over the next 5 years, end -user awareness of RFID technology and benefits may foster
wider adoption and increased demand. Respondents curren tly using RFID are concentrated in
Transportation ticketing and vehicle monitoring. End users indicate limitless possibilities for RFID
applications. End users believe in accelerated adoption as RFID technology develops, standards
emerge and tag prices get cheaper. The Chart 1. Portrays Current RFID End Users based on the
Real Time Application Strategy. It is crystal clear that end user voted 58.8% for transportation
segment.
Chart 1.
Current RFID End users Segmented by Application
Page 15 of 56
Vehicle Tracking and Ticketing System Using RFID
Closed Loop or Tightly Coupled – Systems under the control of a single owner or
authority as a standalone solution. Closed loop systems are used in medium scale
organizations and the retail industry sectors.
Open Systems – Systems with multiple, disparate stakeholders – ie) separate tracking,
transportation, utilizing a common system. Because a single universal set of standards and
protocols for RFID technology does not yet exist, open systems are not currently in use.
However, their potential is tremendous.
Features
Automatic and Manual Operational logs.
Vehicle Profile Analysis.
Traffic Density Analysis.
Customized Management Reports.
Advantages
Faster Through put of vehicles.
Easy Administration and Planning.
Shorter vehicle delivery time due to locating vehicles faster.
Improved processing and speed even when re -work is needed - required repairs are tracked
electronically and automatically updated when work is completed.
Improved quality control due to real-time physical tracking of vehicles throughout the
delivery process.
Page 16 of 56
Vehicle Tracking and Ticketing System Using RFID
A ltern a tiv es T h o u g h t o f
W h ile D esig n in g th e
P r o je c t
b.
Page 17 of 56
Vehicle Tracking and Ticketing System Using RFID
Manual Ticketing and vehicle identification was the obsolete method available but the
frequency of getting errors and mismatch in entri es was a serious problem.
An interesting area applicable in a similar situation was the BARCODES. But this had the
major problem of line of sight that is the coded card had to be taken to the reader to validate an
entry. Even though the method is bit less expensive the security that could be offered was very less.
Another technique for implementing such a request is by using Biometric devices. But the
comparative cost of implementation is very high and the system being dependent on physiological
characteristics will not function effectively as expected if there is an unexpected change in the
physiological characters of the client.
The Figure 5. shows Smart La bel has an advantage of the thinner smart labels over
conventional smart tags is that they can be manufactured in bulk by special printers. Current costs
of these are in the INR 13.50 to INR 22.50 range. These can be produced in high volumes, are thin
and flexible, can be read/write, and can easily be integrated into the barcode infrastructure. But the
security is less compared to the RFID.
Page 18 of 56
Vehicle Tracking and Ticketing System Using RFID
c.
Page 19 of 56
Vehicle Tracking and Ticketing System Using RFID
One of the largest obstacles to widespread adoption is the cost of an RFID system. The
threshold of what end users are a ctually willing to pay for RFID system components (tags, readers,
Page 20 of 56
Vehicle Tracking and Ticketing System Using RFID
software, services) remains a mystery. Cost per tag is dropping and less expensive readers with
greater functionality may be soon available. End users prefer that prices drop further.
Consumers usually welcome price reduction. For that to be enduring, the supplier and
retailer must reduce costs. RFID on buses, cars are achieving this in many ways but the tagging of
individual items is revealing yet richer rewards, even though it is at a much earlier stage.
Automation is the key, but it comes alongside crime reduction, reducing excess stocks and work in
progress and reducing the time taken from raw materials to finished item on the retailer’s shelf
(“time to market”) and other benefits that di rectly impact costs. The estimated cost for the
implementation of the project mentioned will figure out around INR 10,000.00 -15,000.00.
It will have a considerable contribution towards saving the manual scanning, administrative
errors, etc. It will increase the rate of efficiency by introduction of a common conduct of operation
that will enable the administrators to fabricate a less crime -sensed system. The number of
trespassers and other unidentified persons could easily be tracked using the system.
Benefits of VTTS
The various benefits expected could be summed up as
Speed of transaction.
Increased safety.
Cost reduction.
Fewer queues.
Easier evacuation.
More reliable equipment.
Less frustration.
Less violent crime.
Faster processing of passengers.
Reduces fraud.
Greater reliability of equipment.
Page 21 of 56
Vehicle Tracking and Ticketing System Using RFID
Benefits of RFID
Non-contact, Non-line of sight nature of technology .
Tag can be read from variety of substances such as snow, fog, ice, paint, crusted grime etc.
Faster read rates as high as 100 millisecond s.
Multiple tags can be read in single pass across the reader .
Paper less tracking of equipment and personnel .
High degree of scalability.
Page 22 of 56
Vehicle Tracking and Ticketing System Using RFID
These very strengths of RFID are the Achilles’ heel of traditional barcoding technology.
The limitations of label size mean that barcoding holds much less data. In environments where item
data needs to be changed regularly, barcoding is unfeasible. Furthermore, printed bar codes are
vulnerable to scratching and harsh environmental conditions. An uneve n label surface can affect
print quality and consequently, compromise the integrity of the printed barcode.
In addition, the read range of the barcode is limited by the capability of the scanning device.
This is worsened by the ‘line -of-sight’ requirement: that is, the barcode must be directly in front of
a scanner’s beam. Consequently, bar -coded items will need to be scanned manually (incurring labor
costs), or extra costs must be incurred to automate the process to satisfy the line -of-sight
requirement. Where manual labor is employed for scanning, the possibility of human error adds to
the operational costs.
Finally, barcodes are designed to be read one at a time. Multiple items cannot be read at one
time. This limits the speed of data collection. With R FID technology, all the above barcoding
problems can be overcome. RFID offers extended storage capacity, a longer read range, and a “one
time scanning” feature. A typical of RFID chip can have storage capability, and does not require
line-of-sight for reading. And it is possible to automatically read hundreds of tags in a second.
Page 23 of 56
Vehicle Tracking and Ticketing System Using RFID
Research on RFID
It is evident that RFID privacy and security are challenging areas of research. There are a
number of specific areas of research which will g reatly benefit RFID security and privacy and the
outcome of this research will be the wide spread adoption of this technology.
Cost effective and efficient hardware implementations on specialized nature of low cost
RFID Labels.
Development of new hardware efficient systems suitable for low cost RFID systems.
Development of protocols with the flexibility to incorporate different security measures and
safeguards to prevent rendering labels vulnerable during sudden communication
interruptions.
Improve and optimise coupling between readers and labels. This may involve developing
new concepts for formulating coupling between antennas, new antenna design, and analysis
so that the available source power to the IC is maximised.
Page 24 of 56
Vehicle Tracking and Ticketing System Using RFID
R ela te d S ta te o f A rt
R efere n ces In th e A r ea of
P r o p o s e d P r o je c t
d.
Page 25 of 56
Vehicle Tracking and Ticketing System Using RFID
We have underwent a detailed study about the RFID application and implementation and
found it applicable to the upcoming industries and IT sectors. Vehicle tracking and ticketing is just
a low level application to imprint the wide level of application po ssible in this field. The
implementation in college or enterprise transport section would make it easy for the detailed study
of various aspects of the project. Some of the references that guided us and helped in designing the
project are listed below:
Websites:
1. www.rfid-journal.com
2. www.oclinfo.com
3. www.tutorial-reports.com
4. www.idtechex.com
5. www.usingrfid.com
6. www.rfidupdate.com
7. www.ansi.org
8. www.rfid-weblog.com
9. www.whitepapers.frontlinetoday.com
10. www.rfidtoday.co.uk
11. www.rfid.bluestarinc.com
12. www.rfid-world.com
13. www.informationweek.com
14. www.accuracybook.com
15. www.rfid.zebra.com
Forums:
1. www.insightu.org/proforums/
2. www.rfidexchange.com/forum/default.asp
3. www.globalaviationrfidforum.com/2005 -agenda.html
Page 26 of 56
Vehicle Tracking and Ticketing System Using RFID
Blogs:
1. www.rfid.weblogsinc.com/
2. www.rfid-weblog.com/
Group contacts:
1. http://groups.yahoo.com/group/sdforum_rfid/
2. http://groups.yahoo.com/group/rfidtribe-westmichigan/
3. http://groups.yahoo.com/group/SV_RFID/
4. http://groups.yahoo.com/group/rfidtribe/
5. http://groups.yahoo.com/group/indusrfid/
6. http://groups.yahoo.com/group/rfidtribe -software/
7. http://groups.yahoo.com/group/rfidtribe -security/
8. http://groups.yahoo.com/group/RFID_TECHNOLOGY/
9. http://groups.yahoo.com/group/rfidtribe -chennai/
Page 27 of 56
Vehicle Tracking and Ticketing System Using RFID
1. RFID Applications for Owners and Contractors , CII Research Team 151, ADCIC,
April 2003, PowerPoint Presentation (PPT).
2. Radio Frequency Identification Opportunities and Challenges in Implementation ,
Department of Commerce, Washington D.C., April 2005 (PDF).
3. Radio Frequency Identification Applications and Implications for Consume rs, A
Workshop Report from the Staff of the Federal Trade Commission March 2005 (PDF).
4. The history of RFID, An AIM Publication, Pittsburgh, October 2001 , W hite Paper
(PDF).
5. Radio Frequency Identification (RFID) Technology and its Applications in the
Commercial Construction Industry, University of Kentucky, April 2003 (PDF).
Page 28 of 56
Vehicle Tracking and Ticketing System Using RFID
A p p ro a ch to
I m p le m en ta tio n
e.
Page 29 of 56
Vehicle Tracking and Ticketing System Using RFID
The vehicle ticketing and tracking system is applicable under normal environmental
conditions. The users/clients are provided with a RFI D tag enabled card having their details printed
as usual. The RFID tag will be saved with information regarding the user previously. This forms
basically forms the input for the system.
The passengers while boarding or getting down the bus are made to pass by a RFID reader
fixed somewhere on the way. The readers read the cards with the passengers and the data is fed into
the local terminal. The details of the client are matched with the database in the server and later the
observations are recorded accordin gly. A user/client who pays an initial amount is given a
minimum permit to use the bus. This is accounted in terms of chances he uses the bus. He can use
the account until he finishes his quota that has been allotted to him. A diagrammatic representation
of the proposed system to be implemented is given in Diagram 5.
USER WITH
TAG
READER
COMPUTER
TERMINAL
Diagram 5. Proposed System to be implemented
SERVER
Page 30 of 56
Vehicle Tracking and Ticketing System Using RFID
The Project VTTS system based on RFID , implements with the following counter parts
Page 31 of 56
Vehicle Tracking and Ticketing System Using RFID
Issu es to be
con fro n ted
Page 32 of 56
Vehicle Tracking and Ticketing System Using RFID
Reader Collision
One problem encountered with RFID is that the signal from one reader can interfere with
the signal from another where coverage overlap s. This is called reader collision. One way to avoid
the problem is to use a technique called time division multiple access, or TDMA. In simple terms,
the readers are instructed to read at different times, rather than both trying to read at the same time.
This ensures that they don't interfere with each other. But it also means any RFID tag in an area
where two readers overlap will be read twice. So the system has to be set up so that if one reader
reads a tag, another reader does not read it again.
Page 33 of 56
Vehicle Tracking and Ticketing System Using RFID
another reader using that channel, they go to another channel to avoid interfering with the reader on
that channel.
Drawbacks of RFID
The main drawback of RFID technology is the higher costs. A typical barcode label costs
about 1.07 INR, whereas an RFID tag label can costs upwards of 53.55 INR. The initial
implementation of RFID is also hi gher, depending on requirements and equipment specifications.
Although initial RFID implementation may cost more at this time, researchers predict that within
five years, smart RFID tags will become pervasive in Industry.
RFID Threats
Security Threats
Jamming.
Replay attacks.
Covert reading.
Privacy Threats
Covert reading.
Tracking over time.
Individual profiling.
Page 34 of 56
Vehicle Tracking and Ticketing System Using RFID
Page 35 of 56
Vehicle Tracking and Ticketing System Using RFID
Privacy Issues
Deployment of RFID tags in vehicles could pose several challenges to end user privacy
Tags could be read by unauthorized readers. (Although 13.56 MHz tags cannot be read from
more than a meter away, unshielded passive 915 MHz tags can be read from many meters.).
Since human beings are not sensitive to radio signals, RFID tags could be read covertly.
A database could be used to build long -term tracking associations between tags and h olders.
Alternatively, such a database could simply be created at the checkout counter by
correlating RFID tags with payment information.
The communication between the reader and the tag could be covertly monitored.
Technological Challenges
There are challenges in integrating the components for RFID -based systems and making
them actually work. Tags and readers perform differently under varied configurations and different
environments. Which tag is used, where it is placed on vehicle in the case all have a major impact
on the performance of the system. There are real challenges around interference and wave collision
that need to be addressed, in addition to the yield rates in the production of the tiny chips used and
ultimately the converted tags and label s. There is also the pressing issue of cost for the technology,
which is largely brushed aside at this point by the industry as a problem that will go away when the
volumes go up. But unfortunately at this point the volumes are still low, and thus the pric es are still
high.
Page 36 of 56
Vehicle Tracking and Ticketing System Using RFID
R esou rce
R eq u ir em en ts
Page 37 of 56
Vehicle Tracking and Ticketing System Using RFID
The Resource Requirement for the project could be charted under three sections. They are
RFID SECTION
COMPUTER SECTION
SOFTWARES AND DEVELOPMENT TOOLS
RFID SECTION
This section is mainly focusing on the tools required for tracking the various tags used
in the VTTS. They are mainly three categories.
RFID Tag enabled ID card
RFID Writer
RFID Reader
COMPUTER SECTION
This section mainly deals with the computer systems required for the implementation of
the VTTS. They could be classified as:
Computer Terminals
LAN connectivity
Computer Server
Page 38 of 56
Vehicle Tracking and Ticketing System Using RFID
Computer Terminals
Overview
A Computer terminal is an electronic or electromechan ical hardware device used for
entering data into, and displaying data from, a computer or a computing system. A device that
enables a computer to receive or deliver data. The computer terminals are the computer systems
used for operating the VTTS. Computer terminals vary greatly depending on the format of the data
they handle.
LAN connectivity
What's a LAN?
A LAN, or Local Area Network is a group of two or more computers, physically close
together (usually in the same building), that are linked to each o ther. LANs can contain devices
other than computers. It establishes Proper connecting devices between the terminals and server.
Connection Method
The various types of Connection method to use for networks are
Ethernet
Wireless
Direct Cable Connection (only for two computers)
Security concerns should be carefully integrated into every step of the network design and
Planning. Security is becoming more important as enterprises keep connecting their private
internetworks to the Internet as well as their organizations and remote workers.
Page 39 of 56
Vehicle Tracking and Ticketing System Using RFID
LAN security risks come in different forms. Here is some information on the most common
ones.
Viruses
Viruses are generally not a "security" threat to the computers on LAN . The main effect of
viruses can be erratic operation of your computers, possible data loss, and the ability to pass on the
virus to other network users.
Floppy disks or other removable media that are used to transfer files from one computer to
another.
E-mail attachments.
Probes
Probes or port scanners check for improperly secured servers or services that may be
running on computers on your LAN. These checks are usually performed by programs that take a
range of IP addresses selected by the person running the program, and look for common services
like Web, mail, FTP, Telnet, proxy servers.
Page 40 of 56
Vehicle Tracking and Ticketing System Using RFID
Trojan Horses
In LAN "Trojan Horses", are programs that are somehow downloaded an d installed on
computers. Although physical access to the target computer is a common method of
installation, these programs can be installed via network access to an unprotected shared network
drive.
Worms
These troublemakers are self-replicating, self-propagating programs that are spread through
the Internet and generally don't require any action on the part of the computer owner to be
activated. All they need is an unprotected connection to the Internet.
Security Tools
There are many resources available to help secure your LAN. They fall into four main
categories
Page 41 of 56
Vehicle Tracking and Ticketing System Using RFID
Computer Server
.
A note on Terminology of Server
The term "Server" is used in this module to mean the combination of the hardware,
operating system, network service, application software, and network conne ction. The server is a
computer system used for maintaining the database.
Servers are often dedicated, meaning that they perform no other tasks besides their server
tasks. On multiprocessing operating systems, however, a single computer can execute several
programs at once. A server in this case could refer to the program that is managing resources rather
than the entire computer.
Server Hardware
A server computer shares its resources, such as peripherals (i.e printer: print server) and file
storage (i.e. disk: file server), with the users' computers, called clients, on a network. Thus, it is
possible for a computer to be a client and a server simultaneously, by connecting to itself in the
same way a separate computer would. Servers are normally specialist machines to provide the
reliability expected by the end users.
Page 42 of 56
Vehicle Tracking and Ticketing System Using RFID
Securing Servers
The primary purpose of these machines is to provide services, including both computational
and data services, to other computers on the network.
Security breaches on a server can result in the disclosure of critical information or the loss
of a capability that can affect the entire organization. Therefore, securing servers should be a
significant part of your network and information security strategy.
Many security problems can be avoided if servers and networks are a ccurately configured.
The practices recommended here are designed to help for configure and deploy servers that satisfy
the organization's security requirements. The practices may also be useful in examining the
configuration of previously deployed servers.
Plan to operate a networked system of workstations that depend on servers for information
or computation services.
Plan to operate a public network server connected to an external network such as the
Internet.
Page 43 of 56
Vehicle Tracking and Ticketing System Using RFID
These are the security requirements for information resources stored on servers :
These are security requirements for the capabili ties provided by those servers :
Only authorized and properly authenticated users may use these capabilities.
Users must be able to access these capabilities quickly.
Ensuring that only authorized users can access the services and information.
Ensuring that authorized users can access onl y the services for which they are
authorized.
Integrity - Maintaining the integrity of information stored on the servers. This includes ,
Page 44 of 56
Vehicle Tracking and Ticketing System Using RFID
Ensuring that services are uninterrupted even when there are hardware or software
failures or during routine system maintenance.
Ensuring that you can recognize and recover from security incidents in a timely
manner.
There are other aspects of servers that can make them tempting targets for intruders :
Public servers often have publicly known host names and IP (Internet Protocol) addresses.
Servers usually actively listen for requests for services on known ports, and they try to
process such requests.
Servers are often remotely administered, so they willingly accept connections from
privileged accounts.
Servers often are configured to reboot automatically after some kinds of failures, which can
offer opportunities for intruders.
Page 45 of 56
Vehicle Tracking and Ticketing System Using RFID
Host security is also a first -line of defense against internal threats, which generally have a
higher probability of occurrence than external threats.
They prepare us to better recognize and recover from security breaches.
Monitoring
All security-related events on critical or sensitive systems must be logged and audit trails
saved as follows:
All security related logs will be kept online for a minimum of 1 week.
Security-related events will be reported to admin, who will review logs and report incidents
to management. Corrective measures will be prescribed as needed.
Page 46 of 56
Vehicle Tracking and Ticketing System Using RFID
Page 47 of 56
Vehicle Tracking and Ticketing System Using RFID
The client part of a client/server application that request services across a network from a
server, or back end. It typically provides an inte ractive interface to the user, For example, a data
entry front end, allowing data to be entered into a server through the use of SQL (Structured Query
Language).
Introduction
Visual Basic (VB) is an event driven programming language and associated develop ment
environment created by Microsoft. It’s an Event driven programming language used for designing
the interface and connecting the various sections. Visual Basic (VB) is a programming environment
from Microsoft in which a programmer uses a graphical user interface to choose and modify
preselected sections of code written in the BASIC programming language.
Page 48 of 56
Vehicle Tracking and Ticketing System Using RFID
for more functionality. Since defau lt attributes and actions are defined for the components, a simple
program can be created without the programmer having to write many lines of code.
Form Creation
Forms are created using drag and drop techniques. A tools palette is used to place contro ls
(e.g., text boxes, buttons, etc.) on the form (window). Controls have attributes and event handlers
associated with them. Default values are provided when the control is created, but may be changed
by the programmer. Many attribute values can be modifi ed during run time based on user actions or
changes in the environment, providing a dynamic application.
Page 49 of 56
Vehicle Tracking and Ticketing System Using RFID
In VB6 and prior versions, the use of many core OS functions required directly calling the
Windows API. Due to the poor integration of VB with the native Windows API, this many times
led to need for conversion code and low level memory "tricks" that were more complex than lower
level programming languages like C.
Another point concerns the communication of the toolkit and the computer. At the moment
it is all wire-based whereas for many real -world applications it would be much more con venient if
it was wireless.
The server part of a client/server application. It provides across the network that have been
requested by the client. For example, a back may be a database server that responds to SQL
requests from a workstation runnin g a front end application.
Introduction
Microsoft Access is one of the Back end software to keep record of the database. It’s a
Database management system (DBMS) that functions in the Windows environment and allows to
create and process data in a database .
SQL is a highly used and reliably secure database server. The reasons for its popularity and
high regard are numerous, but the fact that it is a database server designed to be accessed securely
over the Intranet is the leading reason why it is the database of choice.
Page 50 of 56
Vehicle Tracking and Ticketing System Using RFID
However, this is not to say that Microsoft Access cannot be a great database application.
Because MS Access is not designed to be a database server, it does not do as proficient of a job as
SQL in providing clients with access to database information in a secure and reliable fashion.
Nevertheless, many organizations elect to use Microsoft Access instead of a program like
SQL Server as the back-end database for their Active Server Page Applications (ASP).Creating and
setting up a database in Access is much easier than in SQL Server. Most end users can afford
Microsoft Access but the requirements for SQL Server beyond just the software itself can be a
problematic one.
Security Issues
Security in Access works through the "data database" and a "user database". The "data
database" is the database with tables, queries, forms, reports, macros and modules. The "user
database" stores user name, password, identifiers, groups and grou p membership information. All
the "user database" does is validate a user and a password and provides the specific "permission"
within itself.
Database – A collection of data organized in a manner that allows access, retrieval, and use
of that data.
Database Management System – Software package that allows to use a computer to create
a database; add, change, and delete data in the database; sort the data in the database;
retrieve data in the database; and create forms and reports using the data in the database.
Record – Information about a single person, product, or event.
Page 51 of 56
Vehicle Tracking and Ticketing System Using RFID
Process of Database
Table Structure
Datasheet View – All the data is displayed as a table; may not see all the fields at the same
time.
Form View – A single record of all its fields is displayed.
Page 52 of 56
Vehicle Tracking and Ticketing System Using RFID
CRYSTAL REPORTS
Introduction
It’s Report generating software for creating reports. Crystal Reports is an intuitive reporting
solution that helps users rapidly create flexible, feature -rich, high-fidelity reports and tightly
integrate them into web and windows, other platform applications.
Powerful Report Design: Enduser can design highly formatted, interactive, and
professional looking reports.
Flexible Application Development: Developers can leverage cross -platform support for
Java, .NET, and COM development technologies. Easily access, format, and integrate
dynamic data into web and windows applications while maintaining tight con trol over end
user interactivity.
Report Management and Delivery: Reports can be exported and repurposed to the
electronic formats used by most end users (e.g. PDF and Excel).
Crystal Reports is an intuitive reporting toolkit that helps solve the challenges associated
with presenting formatted data in web and Windows applications. It provides a fast, flexible way to
access, format, and integrate dynamic data into J2EE and .NET applications for an i nteractive end
user experience.
Page 53 of 56
Vehicle Tracking and Ticketing System Using RFID
Crystal Reports is a powerful reporting toolkit that helps you design flexible, feature -rich
reports, use extensive formatting and interactivity options to empower end users. Its proven query
technology gives you access t o virtually any data source, including XML, OLAP and organization
data sources.
Crystal Reports can be also customized and is available as a tightly integrated feature in
leading Java and .NET IDEs.
Page 54 of 56
Vehicle Tracking and Ticketing System Using RFID
g.
Page 55 of 56
Vehicle Tracking and Ticketing System Using RFID
Page 56 of 56