Professional Documents
Culture Documents
Confidential
TECHNICAL PROPOSAL
FOR
Submitted by
Confidential
Disclaimer
ULTS Statement of Confidentiality and Exceptions
The contents of this document shall remain the confidential property of ULTS and may not
be communicated to any other party without the prior written approval of ULTS. This
document must not be reproduced in whole or in part. It must not be used other than for
evaluation purposes only, except with the prior written consent of ULTS and then only on
condition that ULTS and any other copyright notices are included in such reproduction. No
information as to the contents or subject matter of this proposal or any part shall be given
or communicated in any manner whatsoever to any third party without the prior written
consent of ULTS
The furnishing of this document is subject to contract and shall not be construed as an
offer or as constituting a binding agreement on the part of ULTS to enter into any
relationship. ULTS provides this document as guidance only to estimate costs and timescales of the predicted delivery project. This will be subject to confirmation prior to any
contractual or delivery commitment by ULTS.
ULTS warrants that to the best of its knowledge those who prepared this response have
taken all reasonable care in preparing it and believe its contents to be true as at the date
of this document. ULTS cannot however warrant the truth of matters outside of its control
and accordingly does not warrant the truth of all statements set out in this document to
extent that such statements derive from facts and matters supplied by other persons to
ULTS. The statements in this document are qualified accordingly.
Confidential
About ULTS
UL Technology Solutions is a leading IT/ITES Solution provider for both Public and Private
Enterprises. The Company provides support to organizations and help them to solve high
impact challenges in their pursuit to achieve operational excellence. ULTS offers a unique
mix of traditional values and modern technological insights in its services and offers to
formulate and implement comprehensive solutions for its clients. The main focus of the
Company is on delivering IT based solutions for the Health, Transport Sector, Egovernance
and
Utilities.
The
Company
is
also
actively
involved
in
providing
Confidential
Contents
1.
2.
3.
4.
4.1.
4.2.
General Introduction............................................................................................. 8
4.3.
4.4.
4.5.
5.
5.1.
5.2.
5.3.
Tracking ............................................................................................................ 10
5.4.
Web Reports...................................................................................................... 10
5.5.
5.6.
5.7.
Vehicle Management........................................................................................... 10
5.8.
5.9.
5.10.
Geo-Fencing ...................................................................................................... 11
5.11.
5.12.
5.13.
5.14.
5.15.
5.16.
5.17.
5.18.
5.19.
Confidential
5.20.
5.21.
5.22.
5.22.11.
5.22.12.
5.22.13.
5.22.14.
5.23.
Conclusion ........................................................................................................ 26
Confidential
1. General Information
A business transformation program coupled with large scale IT modernization is needed
to alleviate many of the above issues and help an enterprise take its business to the next
level. With the ever increasing speed of commerce, freight forwarders and other
transportation players are rapidly rolling out large business transformation programs to
bring more agility and better control over their business. A significant investment of time
and money is needed and on razor thin margins that logistics companies make, it is
extremely critical that the program doesn't wind up becoming just a money draining
engine. Today's competitive business environment demands higher degree of commitment
from the management towards its stakeholders. Newer and more efficient ways of
conducting business are the key to success and this demands the right strategic direction
and speed of execution. We had developed a world-class business consulting model to
ignite technology-led transformation for enterprises. The ability to adapt to change is what
separates successful transportation and logistics companies from the competition.
Successful providers constantly bring new offerings to market, promptly respond to
customer demand, and quickly adapt IT landscapes to changing business requirements.
Our team is led by senior consultants with extensive experience in business strategy
development. Organized around business verticals, such as banking, retail and telecom,
these consultants and their teams ensure that our solutions are enriched with all the
advantages that deep domain expertise brings.
2. Project Objectives
To improve the capability in managing the entire public transport system more
efficiently, safely with a Commuter-friendly approach by introducing real time
monitoring and tracking of the fleet, information to passengers at bus terminus and
bus-stops.
To provide real time information and dynamic fleet management & Operation
Control Room (OCR) and Datacenter (DC) based in OSRTC central office.
Computer terminals with connectivity are proposed at divisions and depots for
management of system at respective levels.
Integrate ETM machines with Datacenter for one click information on sales (OSRTC
have to give the API of ETM machine)
Confidential
To manage the entire transport buses and their timing schedules, Arrival and
departures in each bus terminals and depots.
Call center.
The approach plan details have been described in succeeding sections with complete
technical description, architecture, application detailing, system block diagram, security
and authentication, implementation plans, milestones and deliverables.
To set up Centralized datacenter connecting all fleets Using GPS and GPRS
based VTS.
Procure and install one VMU Device per bus as per the specifications
required Undertake maintenance, removal, repair, replacement, shifting and
other incidental activities relating to the GPS Devices.
Provide SIM cards and GPRS connectivity between GPS Devices and Data
Centre.
Geofencing of Bus Stops (Up to Super-fast Stops), Depot and other POIs.
Driver Performance.
Web based reports on the GPS devices in terms of continuity, data accuracy,
reliability and completeness
Average/Mileage Calculation.
Confidential
The above activities would require deployment of field staff to co-ordinate between the various
stake holders to ensure availability of system as per an agreed service levels. The field staff would
carry out periodic checks/field surveys of the GPS to monitor performance/record deviations in
performance.
4.1.
The proposed VTMS will primarily consist of the components as detailed below
4.2.
General Introduction
The technology is a combination of GPS, GPRS, GIS and Web. A chip in the GPS Device continuously
computes the Latitude and Longitude position. The Device transmits the Position data via GPRS to the
datacenter (DC).In the datacenter (DC), the data is processed by the VTMS application and
Map Servers display the position accurately on a map. The same application will display the
data at the Operations Control Room (OCR) of OSRTC and provide users with control to manage
the entire fleet
4.3.
We shall, within one two weeks from the signing of the contract, prepare and submit to
OSRTC the System Requirement Specifications (SRS) based on the scope of this project
for OSRTC.
List and Details of Reports (Layout, Fields), Implementation & Training Plan
SRS would be submitted to OSRTC for its review and sign-off. The OSRTC shall review the
SRS submitted and communicate its approval / comments / suggestions. We shall examine
the comments / suggestions if any, and incorporate the same in SRS within 7 days. The
SRS once approved as per process above, shall form the basis for development of the
Confidential
various application/modules. We will provide the training to the identified OSRTC official
on the train the trainer concept for the VTMS solution being implemented.
4.4.
The connectivity will establish to the Centralized Control Room located at ULTS for
monitoring entire fleets and managing the operations. From this main datacenter all the
activities can be monitored and managed using centralized database management system
and real-time monitoring system.
4.5.
Our software supports the responders for quick and efficient emergency care during the
accidental emergency situation. GIS based Emergency Response Management and
Information. System is proposed for trouble free reaching out for ambulances and fire
vehicles during emergencies.
The logical architecture of the proposed application is as depicted below. Its a layered
architecture with application front-end layer on the top.
5.2.
Confidential
Application Front-end
This layer provides the communication channel for the user. User will have two ways of
communicating with the system. As shown in System Functional Diagram above, users
can communicate with system using WEB and Control Centre in OSRTC.
5.3.
Tracking
Live tracking, historical track, route review for single or multiple vehicles on Map give the
location of the vehicle with time stamp and speed parameters. This feature is used to
identify the bunching of buses in particular area.
5.4.
Web Reports
End user can access the relevant reports to identify the route, schedules, vehicles fare and
timings, scheduled timings of trips etc.
5.5.
MAP Engine
While Kerala area Map and overlay data will be provided by us in Shape file, the GIS-API
application is intended to serve following GIS requests by providing MAP / Attribute
Information to the requesting application.
Zooming
Panning
5.6.
User Management
The procedure for creation / activation and deletion of user accounts can only
be done only after approval by appropriate authority.
Direct access to the backend database shall be restricted to only the authorized
administrators.
5.7.
Vehicle Management
Vehicle Master Management module allows the configuration of Vehicle, Tracking device
and ETM. Pass code for communication between ETM and VMD is generated in this module.
10
5.8.
Confidential
Route/Schedule Management
We shall provide routes as part of map overlay data. The application can ensure that routes
are displayed in easy to use manner. Schedule management Module handles scheduling
trips, allocation of Vehicles to trips, Cancellation, Reallocation, Driver assignment etc.
5.9.
MIS Reports
We shall provide the customer specific Drill down reports with graphical reports for
different levels of users. Required reports and formats and levels has to be specified by
OSRTC at the time of system study.
5.10.
Geo-Fencing
Geo-Fencing allows the admin to create, view, edit and delete Geographic Fences by
selecting location of Map for creating notifications and alerts. Location can be geofenced
for a particular radius or as a Polygon area. What the Vehicles enters or exits out of this
region can be alerted and can be used for MIS preparation.
5.11.
Application Backend
The centralized backend application database is used for whole application which is getting
updated 24*7 through online and scheduled applications.
5.12.
Scheduled Reports
Users can schedule a particular report so that the same can be send to his email at
scheduled time. There will be scheduler programs which will take care of all schedules.
5.13.
MIS Generation
Other than the live updating, an MIS generation engine analyze the all data received from
all vehicles and make daily summary records which will form the base of MIS.
5.14.
Application Database
Different types of data tables are segregated into one or multiple databases. All Master
and transactional tables will be stored with proper naming convention.
5.15.
From the VMD data is transmitted to the Server continuously. One or multiple instances
of data processing programs will process the data from VMD and segregate to the relevant
vehicles. All data is updated instantly and will be visible through website almost in real
time. During processing all alerts are handled online. Below is the list of alerts generated
from the system. ETA calculation can be done at this stage which can be used as input for
proposed PIS system.
11
Confidential
5.16.
Vehicle Fitting
One GPS tracking device required for every bus. Vehicle mount device features of the
device are as below.
a)
b)
c)
d)
e)
f)
g)
h)
12
5.17.
Confidential
Communication server
Communication Server will be hosted at ULTS Data Center. There will be backup server
for Communication server which will be at OSRTC. Communication between these servers
should be taken care by OSRTC.
5.18.
5.19.
relating
to
users
of
the
system
shall
be
secured
by devising appropriate level of controls. The data about users shall be stored
on in a RDBMS.
The solution shall restrict access for specific users to only certain resources
in the solution based on their role definition. The system shall provide single
sign-on to all functional areas.
scalable
terms of number of users, user groups, resources, and access control policies.
The solution shall provide a robust and customizable security solution and
shall
be based
on a platform
that
deployment and scales as user traffic grows, while providing the highest level
of reliability is required.
The solution shall provide for load balancing to enable a fully scalable solution.
It shall enable continued service on failure of one or more of component parts.
The solution shall provide the ability to securely store critical data within
user
related databases
so
that
database
administrators
or
any
unauthorized users do not have access to such items as passwords and other
critical documents of any oration.
13
Confidential
The solution shall provide for session settings such as idle or max session
time-outs, concurrent sessions and other session control settings.
The solution shall examine all traffic to all services / pages being protected
by the solution. All access attempts to the web server / application shall be
intercepted and examined for authentication and authorization requirements.
previous
uploaded by
The system shall provide two layers of access control over the creation /
modification of user profiles.
For the first login by a user, the system shall prompt the user to change his
password.
When a user logs-in, the system shall display the date & time of last login. The
System shall restrict user access based on the privileges assigned to the user.
The system shall maintain a log of all the activities carried out by a user along
with a date and time stamp. The system shall maintain a log of all activities
carried out by an administrator.
Any access to the database shall only be via application / portal authorization
At a minimum the following database level security controls shall implemented in order to
ensure appropriate levels of security.
The critical data and the related documents stored in the database shall
be stored in encrypted format.
14
5.20.
Confidential
data pull from an external system such as ERP, MIS, and Database etc.
A player plays the content on the display. These players are capable of
there and this will handle the communication with the central server. Thus,
optimizing the network utilization
5.21.
MIS Reports
with
the
help
resources, access corporate knowledge, and leverage business insight to make betterinformed decisions. An indicative list of reports is as detailed below:
15
Confidential
5.22.
The Project Manager shall be the Project owner and overall responsible for the deliverables
as per the mutually agreed and accepted timelines.
Project Manager shall report to the concerned official(s) from OSRTC, who have been
identified and assigned to form the
5.22.1.
The Project Monitoring Team shall monitor the progress of the Project on regular basis and
keep track of delivery of project-based deliverables as per the planned schedule and
timelines. The Project Manager, and the officials of OSRTC forming a part of the Project
Monitoring Team, shall essentially be the Members of the Project Steering Committee.
The Project Steering Committee shall hold regular meetings and reviews to ensure smooth
running and completion of the Project and also handle and resolve day-to-day issues
between the Project Team and OSRTC. Keeping in view the requirement of the VTMS
project in mind the following teams and structure is proposed.
5.22.2.
16
5.22.3.
5.22.4.
Confidential
17
5.22.5.
Confidential
Operational Environment
User Interface: OSRTC has desired for web-based solution the front end is web
enabled. The Web Browser manages the User Interaction with the Web Server,
which in turn manages the session with the Application Server.
Presentation Logic: The presentation logic defines what the User Interface
displays and how user request are handled.
Business Logic: Models the Application Business rules and interacts with
the Application data layer.
Data Layer: Manages the Application data and interacts with the Relational
Database Management system
Web Browser: Internet Explorer 7.0 & above / Mozilla & above / Google Chrome
Java Design Patterns will be adopted while designing and coding the application.
5.22.6.
User friendliness
Our philosophy is to create software, which is easy to use and with a short learning curve.
We believe that it is the software that should behave as expected by the user,
rather than the other way round. Thus User Friendliness is put at the top of our agenda
right from the start of the design stage rather than adding it as an extra feature at the
end of the development. This allows new users to start using the system very quickly and
at the same time being pleasurable to the user.
5.22.7.
Response Time
Response is very crucial when it comes to Internet environment and challenging when
there are connection problems, low bandwidth etc. With appropriate internet connectivity
and bandwidth availability, the
proposed
system would
maintain
normal
response
Security would be an important component in the entire solution- hence all the
sensitive
5.22.8.
Security
information would be protected by encryption. Users would be defined based on the access
criteria. Access criteria would be defined at each level for having maximum secured usage.
The system would be able to run in the Secure Gateway Environment with comprehensive
security monitoring including managed firewalls, Intrusion Detection devices. Virus
18
Confidential
scanning ensures protection for core information assets and intellectual property. Only
authorized users would be allowed to access the site and the administrator would be given
rights to control the access of the users for the entire system so that no greater part of
the system is be accessed by the user other than required to perform the required task.
Password is stored using one-way encryption. Industry standard encryption algorithm is
used to protect the password. SSL is used to transfer secured data. Digital signature can
be used based on the requirements.
5.22.9.
Technical Support
System. Each and every change and versions would be Tracked and maintained
if in case to revert back to some previous versions.
The system would allow minor upgrades on the components. Technical support
5.22.10.
Success of any project depends on how well the milestones / deliverables of the project
have been detailed out and in reference to the schedule of implementation of the
project. This information is being detailed out in this section. A broad implementation plan
prepared for VTMS and ETM is furnished below.
Sl. No.
Activity/Milestone
A
1
VTMS implementation
Datacenter
Data center facility with Integration and testing
connectivity
2
3
4
5
6
7
Responsibility
ULTS
ULTS
ULTS
ULTS
ULTS
ULTS
ULTS+OSRTC
ULTS
19
Confidential
5.22.11.
ULTS
Monitoring
Software
and
5.22.12.
Key Deliverables
The deliverables of the project at the minimum include but not limited to the following:
User Manuals.
5.22.13.
In case resources are required for project's onsite activities, request would be
initiated by PM.
20
Confidential
Resources are allocated from the pool of available resources either from same
location or from other location that match the skill set, experience level and
role.
5.22.14.
Provision of Resources
To implement and maintain the quality management system and continually improve
its Effectiveness, and To enhance customer satisfaction by meeting customer
requirements.
Instruments & equipment for production, quality control & testing activities,
Infrastructure in terms of fully equipped office & personnel to address customer needs
and Satisfaction.
Means of effective communication like cellular phones, telephones, fax, e-mail and
transport facility
5.23.
of the
system namely system hardware, system software, field devices, desktop computers,
GIS maps and application software.
5.23.1.
21
Confidential
Response to the queries, and provide assistance with setting up profiles, the
back-office connection, and routing.
Correction of errors, which will be consisting for the attention to any error
produced by the application.
Data integrity will be maintained within the system and in relation to other
integrated or interfaced systems.
Checking capacity to deal with the actual peak loadings as encountered and
foreseen
5.23.2.
We will maintain a Central Computer Cell and contact center for any problem resolution
during the period of contract for day-to-day problems solution and handholding. The OCR
will also double up at the central computer cell The OCR professionals address all the
issues pertaining operation support and maintenance, which may arise at all other
centers. In case end users problems are not resolved within a reasonable time, then we
would depute its personnel at the location and provide the necessary help.
5.23.3.
Server data backup Server data shall be backed up as per the defined policies and
procedures to be defined, at scheduled time.
The backup of operating system, application, and system logs, and database
shall be taken as requested by the user and as per requirement system
administration.
22
Confidential
Storage of backup media - Backed up media shall then be stored either onsite
or offsite as per the backup policy with proper identification for quick retrieval.
Backup retention - The administrator shall ensure that the backup are retained
as per the policy / requirement by making the backup media appropriately.
Media Identification and tractability - The backed up media will marked with
a tag giving identification details like date of back up, server name, backup
details like data base name, Operating System name, rev number, application
name, location of storage Onsite OR Offsite and retention period etc.
5.23.4.
Database Administration
Plan and implement backup policies, procedures and tools as per availability
requirements of database. Conduct Backup validation and restoration drills
Support Services
5.23.5.
We will be preparing a detailed Maintenance and Support Plan (covering all scope of works
awarded) for this contract. The Plan shall be covering the following areas:
23
Confidential
As required this plan will be used as a reference when conducting quality audits
and reviews throughout the lifecycle of the systems and will clearly state all
activities to be carried out by each party.
We will designate Team leaders, Support staff and Project Manager who will
have overall
5.23.6.
We will provide the Application Maintenance and Support by ensuring availability and
quality of on-going support. The Help Desk/ support engineer will
Interim solutions in the event while awaiting the corrective measures to correct
any errors.
Manage, support and implement, at the request of HBSE, Service Requests, for
the purpose of operational enhancements and system upgrade.
Assessing the impact of new releases, upgrades or patches of all the system
software under the scope of maintenance.
Ensure that all modifications to the system are properly integrated with
the
degraded.
Maintain all standards and procedures applicable to the systems (e.g. generic
modules or reusable component etc.)
Provide advice, guidance, and training to the HBSE Officers in the use of the
System.
24
Confidential
Attend to user queries and provide assistance to them in the operation of the
System.
5.23.7.
contract
which
will
cover
debugging,
modification
and
updation
in
the
application software for its better performance, which may be required for smooth and
efficient running of the
Software that includes tuning, monitoring, patches minor modifications for smooth
functioning of application.
Correction of errors, which will be consisting for the attention to any error
produced by the application.
Data integrity will be maintained within the system and in relation to other
integrated or interfaced systems.
Checking capacity to deal with the actual peak loadings as encountered and
foreseen
Coordinating
with
staff
if
they
are
following
operational
procedures
Maintenance
for
includes
tuning,
monitoring,
patches
minor
modifications
25
Confidential
6. Conclusion
Management and Monitoring of the assets are the foremost important for the effective
operations of an enterprise. OSRTC is one among those which faces lot of troubles in the
above said areas. The Proposed system will bring a huge changes in both operational and
finance sections of OSRTC. The solutions basically will track all the fleets and its locations
and the performances of the fleets and its Employees by smart way information collection
and MIS reports. This will increase the revenue and moreover will bring huge increase in
operational efficiencies.
Advantages by the Proposed System
26