StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Development of Employee Management and Monitoring System - Essay Example

Cite this document
Summary
This essay "Development of Employee Management and Monitoring System" will first look for information, design the product and software based on the collected data, test the prototype and then explore the applicability of the whole project to the industrial and commercial sector. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Development of Employee Management and Monitoring System
Read Text Preview

Extract of sample "Development of Employee Management and Monitoring System"

DEVELOPMENT OF EMPLOYEE MANAGEMENT AND MONITORING SYSTEM USING RFID TAGS Development of EmployeeManagement and Monitoring System Using RFID Tags Abstract Telecommunication and networking are some of the most important areas in the modern day communication systems. Diversification of communication systems to allow the provision of other services has been the focus of most researchers in the telecommunication industry. This paper evaluates the use of RFID tags to monitor employee working in a given company. The researcher will first look for information, design the product and software based on the collected data, test the prototype and then explore the applicability of the whole project to the industrial and commercial sector. TABLE OF CONTENTS Abstract 2 Chapter 1 4 Introduction 4 Background study 5 Structure of telecommunication network 6 The internet 7 THE RFID 7 Hypothesis 9 Problem statement 9 Project aims and objectives 9 Scope of study 10 Chapter 2 10 Literature review 10 Chapter 3 14 Research methods 14 Conducting of a detailed survey of the various employee monitoring systems used in the locality 15 Design of the RFID monitoring system 15 Development of the software 15 Testing the developed product 16 Exploring the practical application of the developed software 16 Appendix 17 Work schedule 17 References 18 Chapter 1 Introduction Telecommunication can be defined as the assisted transmission of information over a distance for the purposes of communication. Communication has evolved overtime from the use of smoke and drums to the use of the modern day telecommunication devices which are sophisticated, fast, efficient, effective and able to transfer with credibility and authenticity huge amounts of information within a relatively short time. Some of the telecommunication devices that have been used in the past and are still in use today include, the telephone, the radio, television, telex, faxing machines, mobile phones, computers and other devices. The use of computers in communication has greatly improved the communication industry. The use of computers have brought about the internet services where data, voice, images and other forms of information can be exchanged with ease. With the advancement in the communication industry, new methods have been identified for enhancing communication technology. Information can now be transmitted remotely from one point to another, this bring about flexibility and reliability in transmission and receiving of information. In line with these developments, commercial and industrial applications are now being coupled with the telecommunication devices and the internet. The primary aim of combining this technology is to aid in the remote monitoring and control of various equipments and facilities located far away from the user or owner. Sensors primarily detect the set conditions and parameters and transmit this information to the authority responsible or cause the computer to take a corrective action. Advanced systems such as the Scada system allow the monitoring and control of the whole industry right from the engineer's computer. In fact the engineer can run the whole factory, control all operations outside the company's premises. Radio Frequency Identification (RFID) tags has been used widely by companies for asset tracking and for security purposes in the commercial sector to enhance security. They also provide security to almost all libraries to prevent book theft. Extensive research is being undertaken to broaden the use of RFID in various fields. Background study Modern telecommunication network comprises of the network of telecommunication nodes and links arranged in such a manner so as to allow for the transmissions of messages from one point to another. The main telecommunication network includes the internet, computer network, public switched telephone network (PSTN), the mobile phone network system (ISDN), the aeronautical ACARS network and the global telex network. A telecommunication network has five major parts, these are; Telecommunication processors; these are a set of terminals used to provide control and support functions in data transmission and reception between the computers and terminals. Telecommunication terminals: these comprises of the inputs and output devices in any telecommunication network. There are primarily used for transmitting or receiving information. Telecommunication control software; it comprises of the software that controls all the network activities and functions. The telecommunication environment; these are the computer and other media that performs telecommunications functions. Telecommunication channels: these are channels through which data is transmitted and received. They may be made of physical wire cables such as the copper wires or the fiber optic cables which transmit information faster. There are various types communication networks, these network include the Wide Area Networks, the Metropolitan Network, Local Area Network, Campus Area Network, Personal Area Network, Virtual Private Networks and Clients Server Network. Structure of telecommunication network There are three main parts in any telecommunication network, the data panel layer which carries the traffic, the management panel which performs operations and administration required for network management and the control panel conveys the control information. Network computing; most of the application software used in the internet are through network computing. In this method, the user of a given application logs in to the website and performs a given task as if he was using his own computer software. The internet The internet comprises of a set of computers that are interlinked and communicate with each other via the internet protocol. The computer sends information to another computer through the use of that computer IP address. The internet allows for a two way communication. Internet protocols control routers and computer and govern the way computers operate. The protocols are layered to form a protocol stark. This allows for the lower layers to communicate with top layers and also allow users to change the lower layers without altering the top layers. The layers are arranged in such a manner to form the OSI model. Some of these layers include; the presentation layer, the session layer, the network layer, the data link layer and the physical layer. The physical and the data link layer are at the bottom and vary considerably. Asynchronous Transfer Mode (ATM) protocol is mostly used for these layers. At the next stage is the network layer where standardized protocols are used. For the transport layer, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) are used. Above the transport layer is the Secure Socket Layer (SSL), used for authentication or the Transport Layer Security (TLS) which is also used for security and was developed after SSL. Above the security layer are the application layers, these are the most familiar and include the HTTP for web browsing, the POP3 for Email, the FTP for file transfer, the IRC for internet chat, OSCAR for instant messages, among others. THE RFID The Radio Frequency Identification (RFID) is an emerging technology that offers solution such as asset tracking, tool and inventory as well as other applications in the industrial field. The RFID technology incorporates the electrostatic and electromagnetic coupling of the radio frequency. The electromagnetic spectrum is used for the identifications of objects, animals and people. The main advantage of the RFID is that it does not require direct contact with the receiver as it is the case with the bar code reader. The RFID has three main parts; these are the antenna, the transceiver and transponder. The antenna and the transceiver are usually comprised of one part and make up the receiver unit while the transponder is made to reassemble a tag. The antenna transmits radio frequencies to the transponder which when activated sends a signal back to the antenna. The data sent is then used to perform some defined operation such as activating a microcontroller, a programmable logic controller or in taking other defined operation. RFID tags can be classified according to ability to transmit for longer distances, low frequency RFID transmits at the range of 30 KHz to 500 KHz and have short transmission ranges. Their transmission range is about 6 feet. The high frequency RFID transmits at 850 MHz to (950MHz) and transmits signals for longer distance (up to 90 feet). RFID has four main properties that greatly affect its operation; these include the range, the tag size, the read rate and the cost. The range is the transmission distance; the range of the RFID depends on the power of the reader, the frequency and the material between the tag and the reader. Metallic objects between the reader and the tag reduce the range. The tag size depends up the frequency, low frequencies require bigger tags as an antenna has to be incorporated in the tag and low frequencies requires bigger tags. Most RFID have tag sizes of 1mm2 but the antenna can be several centimeter long. The read rate is the amount of data being transferred by the tag and the receiver, transmission at higher frequency results to higher read rates. The cost of the RFID increases with the frequency, high frequency tags are expensive, small and very effective in addition to the fact that they can transmit data for long distances. Some of the application for the RFID includes asset tracking and use in security systems, use in libraries where they are used to protect books. RFID are also used in animal identification, contact less payment, access control and in stored value system, in the supply chain management, prevention of product loss in supermarkets, automated toll stations, conveying of data in hostile environment, prevention of counterfeit drugs among other numerous application. Hypothesis The use of the radio frequency tags to monitor workers can improve supervision, reduce supervision costs and result to greater productivity. Problem statement Human labour is employed in most industries for the production of goods and offering of services. Every large organization need to supervise and monitor its employees to reduce idle times that are too expensive to the firm. Various methods are now in use such as the use of a supervisor to monitor the other workers or the use of clocking card and slip cards as well as biometric systems. These systems are however expensive as in the case of biometric identification, while others are too laborious for example, the employing a supervisor. Cards have a limitation that the worker has to keep on clocking the card thus resulting in time wasting and queuing at clocking points. There is need to develop an employee monitoring system that will update the database after every 30 minutes about the location of the employee. Project aims and objectives The main aim of this project is to develop an employee monitoring system using RFID tags, the computer and the internet. The specific objectives include; Development of RFID employee management system Incorporating the RFID system with computers and developing a software to run the management system Using the internet to further enhance the employee management system Scope of study The scope of study is limited to the development of an employee management system using RFID tags of the high frequency range. Chapter 2 Literature review The development of communication systems began long time ago through the use of fire, smoke and other primitive methods of communication. Early communication systems were ineffective and could only transmit data for a very short distance. Communication advanced with time as more and more discoveries were made. Charles Wheatstone made the first telegram in 1839; Samuel Morse independently developed his version of the telegraph in 1837. Alexander bell and Elisa gray invented the first commercial telephone in 1876. The first commercial telephone services were set up in the year 1879. In 1883 small scale radio communication was demonstrated by Nikola Tesla. This discovery shed light to the radio transmission using RF waves. Development of the internet In 1940, George Stibitz was able to transmit teletype complex number calculation and was also able to receive signals back. His configuration involved a computer with remote hubs terminals. In 1960, researchers started to investigate the packet switching that would allow chunks of information to be sent to various computers. In 1969, a four node network was proposed. This network became known as ALPHANET which had 213 nodes in 1981. Later ALPHANET merged with other networks to form the internet and most of the internet protocols use on requests for comment process that was initially used by ALPHANET. In 1981, RFC 791 introduced the internet protocol (IPv4), later RFC introduced the Transmission Control Protocol (TCP). Merging of the protocol created TCP/IP protocol which is used by the current internet system. Other protocols that don't work using requests for comments methods include local area networks (LANs) which was developed in 1971, the Token Ring protocol developed in 1924 and the Ethernet protocol developed in 1976. According to POSTNOTE (2004), the use of RFID emerged in 1940 as a means for identifying aircraft for military purposes. This technology was mostly used in civil aviation. Development of the RFID technology resulted in miniaturization of RFID products and has opened the product to the wider market. RFID tags are currently being used for various purposes, according to POSTNOTE (2004), RFID tags are used for supply chain management, for security purposes, electronic payments, animal tracking and for conveying different kinds of data. The RFID tags Work through the use of radio frequency waves, the RFID reader interrogates the tags to obtain the information stored, the reader then broadcasts radio waves. All the tags within it range must communicate. Software is required to filter and collect the information from these tags (rfidentity, 2003) To promote the usability of the RFID tags, they can be interlinked with the internet. This helps in controlling and monitoring different points and different conditions remotely. This research was done by RFID consultation website for the European commission (CE RFID, 2009) according to the firm, linking the internet and the RFID tags can help in networking tags located in remote places and tags that are far from the control point. However, the firm cautions that complex programming and use of better IP protocols are required. According to a research done by the RFID consultation website, the current IP protocols mainly concentrate on transmitting huge volumes of information and new protocols need to be developed that handle small amount of data but transmit the information fast and also allows for multiplexing so as to allow data from many RFID tags to be read and acted upon. To develop the software for controlling the RFID as well as forming an interface between the computer and the user, Human Computer Interaction principles are required. According to Thomas & David (2008), HCI principles play a pivotal role in enhancing the usability of the software developed or the website developed. Thomas continues to add that HCI enables the formulation of a good and user friendly website or software. The main stages for the development of the software using HCI design are conducting a requirement analysis, establishing the goals to be archived by the developed software , outlining the site design and architecture details, performing task analysis, prototyping, developing the software, testing, making the necessary correction and launching the software. The use of HCI as a software development tool enhances productivity and the cost of producing the software reduces (Dix, et al, 1993). The HCI aspects have been found to incorporate various tools for the overall success of the developed software. According to Jacob (2002), software development must be done in an orderly and organized manner. The development of the software should be dived into tasks and each of these tasks should be archived before going to the next task. These tasks are also refereed to as milestones which aids in formulation of the software. There are several methods proposed for use in the establishment of the software, these include the waterfall model, the spiral model and the Microsoft solution framework. As Royce (1970) asserts, the water fall model involves the division of the software development into distinct milestones. Each of the milestones must be completed before moving to the next milestone; however, Barry (1988) argues that the waterfall model is not a good method for the formulation and development of the software as it is very rigid. Once design details have being formulated they are not altered, Barry argues that there is need for incorporating flexibility in the design of the software. Barry suggest the use of the spiral model, in this model there are no clear transitions and is very flexible as graphics, budget changes and other vital software tools can be modified and altered during the design process. However, the method may not be the best as planning is a vital tool in the software development. Another author, Michael (2006) argues that the best tool for the development of the software is Microsoft Solution Framework (MSF), according to Michael (2006), the MSF is a highly and well integrated software development tool which combines the best aspects of the waterfall model and the best aspects of the spiral model. The MSF model has five major phases. these include envisioning, planning, developing, stabilizing and deploying. In the first stage the overview of the problem is evaluated, in the planning stage the solution Is formulated, this involves preparing logical designs, data layer designs, preparing conceptual design and preparing security details for the software. In the developing stage, the code is written and it is corrected and improved in the fourth stage. At the last stage, the software is launched and tested for practical application. (Michael Turner, 2006) According to Microsoft white paper (2002), the MSF is the most superior tool for developing the software as it brings the customer and the developer together to archive a common goal towards the software being developed. Also, the project can be continually changed in order to make the necessary improvements. The model also advocates for free flow of information and communication openness to ensure the software developed delivers bussiness value to the client. Chapter 3 Research methods The research will involve the following major steps Conducting of a detailed survey of the various employee monitoring systems used in the locality At this stage the researcher will visit various firms to determine the types of employees monitoring system in use. The researcher will also determine the workers and employer attitude towards the monitoring system being used. To conduct this research a questionnaire will be formulated and distributed to various organizations in the locality. Design of the RFID monitoring system The researcher will then formulate a design solution for the employee monitoring system based on a selected land size of 500 meters by 500 meters with ten buildings, 3 of which are administrative, 3 are production centers, 2 are general purpose building, 1 is a mess and 1 is the car pack area. The designer will determine the best places to install the RFID receivers. It is assumed that the workers will be carrying RFID tags in form of a card. When a worker enters the gate, the receiver at the gate takes his number, records it and stores this value in a database. The time of entering is also noted and entered in the database. When he/she goes to his area of work, say, the production area the receiver there takes his number and stores it plus the time he has entered. Based on all the data collected, the developed software produces a summary of the time and place the worker has visited in the firm. Visitors are also given special tags. Development of the software The software for controlling the RFID and also processing the information will be developed. The development procedure will follow the Microsoft Solution Model (MSF), based on this model the process for the development will take five distinct steps, these are; envisioning, planning, developing, stabilizing and deploying Testing the developed product The software developed will be tested by simulating various position of the worker and entering these valuables in the developed software program. The results obtained will be evaluated and analyzed. Any mistakes in coding or any suggested improvement will be made. Exploring the practical application of the developed software The researcher will then highlight different practical application of the employee management system Appendix Work schedule June July August September Proposal preparation x x Data collection x x Data analysis x x x Development of the RFID demonstration system x x x Software design x x Software development x x x Software testing x X Testing the whole system x x Improving the software (redesigning ) x x Writing project report X x x Report presentation x X represent one week References rfindetity, 2003. RFID and the Internet of Things. [Online]. Available at http://magazine.digitalidworld.com/Nov03/Page66.pdf . Accessed 9 August 2009. Thomas E & David W. 2008. HCI Remixed: Reflections on Works that have Influences the HCI Community. Cambridge: MIT Press. Dix, A. Human-Computer Interaction. Hillsdale, New Jersey: Prentice Hall, 1993. Jacob, A. 2002. Rapid Application Development Framework. (1st Ed) Technology Press. Royce, W. 1970. Managing the Development of Large Software Systems, Proceedings of IEEE Wescon. Barry, B. 1988. A Spiral Model of Software Development and Enhancement, IEEE Computer. Microsoft Corporation. 2002. MSF Whitepaper: MSF Team Model v3.1. http://www.microsoft.com/technet/itsolutions/msf/default.mspx. Michael T. 2006. Microsoft Solutions Framework Essentials. New York: Microsoft Press. Aydin, M.N. 2004. An Agile Information Systems Development Method in use. ATAA. 2004. Radio Frequency Identification RFID...Coming of Age. [Online]. Available at http://www.itaa.org/rfid/docs/rfid.pdf accessed 10 August 2009 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Telecommunication and Networks Essay Example | Topics and Well Written Essays - 3250 words”, n.d.)
Telecommunication and Networks Essay Example | Topics and Well Written Essays - 3250 words. Retrieved from https://studentshare.org/technology/1508343-telecommunication-and-networks
(Telecommunication and Networks Essay Example | Topics and Well Written Essays - 3250 Words)
Telecommunication and Networks Essay Example | Topics and Well Written Essays - 3250 Words. https://studentshare.org/technology/1508343-telecommunication-and-networks.
“Telecommunication and Networks Essay Example | Topics and Well Written Essays - 3250 Words”, n.d. https://studentshare.org/technology/1508343-telecommunication-and-networks.
  • Cited: 0 times

CHECK THESE SAMPLES OF Development of Employee Management and Monitoring System

Employee Control and Employee Performance Measure

S-S Technologies faces a problem of employee control.... This form of reward system allows the employees to receive remuneration in relation to their efforts and contribution towards the achievement of organizational goals.... The lack of this bonus system was a major setback for the employees.... Strictness of the bonus system, if implemented by the management would play a major role in solving this problem.... The management, whenever laying down the organizational strategies, keeping in mind that the efforts of the employees would contribute to the achievement of these goals is important....
8 Pages (2000 words) Case Study

Performance and Human Resource Development

bull; DEVELOPING – Entails development of skills of employees to enhance their abilities to perform through education and training in existing areas and acquisition of new skills.... In the paper “Performance and Human Resource Development” the author analyzes HR Development, as a function of management, encompasses all activities ranging from effective recruitment to separation.... hellip; The author states that management of performance of employees is the key to the accomplishment of organizational objectives....
8 Pages (2000 words) Essay

Employer-Employee Relationship

It is more empowerment based, and even the employee in the lower rung of the hierarchy is aware of his importance in the eyes of the management and how to bargain for better prospects.... n the present economic scenario, policies and procedures relating to employee- related issues are the quick fix hire and fire routine, although enlightened management may not arbitrarily use them.... The emphasis is on the fact that the management is willing to lend a ear to an employee, thereby indicating the importance of the employee as an individual in the management's eyes....
6 Pages (1500 words) Coursework

People Development and Performance Management

Performance management is defined as a “strategic and integrated approach of increasing the effectiveness of organizations by improving the performance of the people who work in them and by developing the capabilities of teams and individual contributors,” (Armstrong 2001:… It is important to remember that performance management is not just the evaluation of employee performance; it is a t and uninterrupted process that expands, communicates and facilitates the prospective path, core competencies and principles of an organization, and assists to construct a perspective of understanding....
4 Pages (1000 words) Essay

Privacy of an Employee in the Workplace

Even though America has a well defined legal system, the laws related to privacy of the employees at workplace seems to be weak.... nbsp; … Such monitoring is virtually unregulated.... Legal and ethical rights of the employees have been violated heavily by the corporate management in order to exploit the employees.... This paper "Privacy of an employee in the Workplace" focuses on the new technologies which make it possible for employers to monitor many aspects of their employees' jobs, especially on telephones, computer terminals, through electronic and voice mail, and when employees are using the Internet....
4 Pages (1000 words) Assignment

Performance Management System

Performance management process in this organization is a major process in any organization because it assists the management and their staff to sustain the organization when implementing their business strategies (Marr, 2012, p.... It usually involves frequent interactions between the management and workers concerning the organization.... The author of this paper "Performance Management system" focuses on the system that can be described as all those activities implemented by an organization to ensure that their goals are achieved....
8 Pages (2000 words) Research Paper

Reward Principles and Performance Management in Organisations

According to her, the reward system of the organization needs to be analyzed, and she gives her recommendations as discussed in the essay.... Communication and cooperation must be enhanced in all the departments that are involved in this system.... This is because they are people involved in departments, which are expected to enhance the efficiency of the system in an organization.... All systems within an organization must be harmonized to ensure the success and reliability of this system....
8 Pages (2000 words) Assignment

Electronic Surveillance at Work

This essay is aimed at discussing the electronic surveillance technique of monitoring the activities of employees in their respective workplaces, which is a key technological monitoring system used for surveillance.... the conclusion is of the report is framed by evaluating the need for the electronic surveillance techniques and assessing how the employer groups can use the system in the most value-adding manner.... The electronic surveillance can be employed in real time as well as a record maintaining system....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us