CA2518974A1 - Network and inventory management system - Google Patents

Network and inventory management system Download PDF

Info

Publication number
CA2518974A1
CA2518974A1 CA 2518974 CA2518974A CA2518974A1 CA 2518974 A1 CA2518974 A1 CA 2518974A1 CA 2518974 CA2518974 CA 2518974 CA 2518974 A CA2518974 A CA 2518974A CA 2518974 A1 CA2518974 A1 CA 2518974A1
Authority
CA
Canada
Prior art keywords
base station
network
information
location
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA 2518974
Other languages
French (fr)
Inventor
Jason Gallovich
Andre Boulay
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
2DOT4 Inc
Original Assignee
2DOT4 Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 2DOT4 Inc filed Critical 2DOT4 Inc
Priority to CA 2518974 priority Critical patent/CA2518974A1/en
Publication of CA2518974A1 publication Critical patent/CA2518974A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders

Landscapes

  • Business, Economics & Management (AREA)
  • Economics (AREA)
  • Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Quality & Reliability (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Accounting & Taxation (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

NETWORK AND INVENTORY MANAGEMENT SYSTEM
The network is comprised of wireless and wired infrastructure and communicates primarily using 2.4GHz ISM band DSSS (Direct Sequence Spread Spectrum) radio technology. The wireless portion of the network is comprised of several different types of base stations as well as central office locations used to communicate, transport and relay information as well as information received by end points.
The base stations and central office locations can also communicate using other types of wireless and wired technologies. Wireless links can include GSM/CDMA/GPRS
cellular radios, microwave repeaters and UHF or VHF radios. Wired links can include cable access points and land line networks. End points are wireless devices used to collect, transmit receive and relay data from customer points of service. The need for a low cost alternative to the higher bandwidth networks being used to collect and transport small amounts of data such as meter reading is great. This type of network provides for ultra low cost customizable hardware (end points), infrastructure and services for a virtually unlimited number of low data applications and services.
PRODUCTS AND SERVICES BY CATEGORY
SECURITY
People track (handheld sniffer w/rssi) Data link backup Security system monitoring and backup Geo fencing (car rentals, generators etc... ) Valuable asset monitoring Home monitoring (in home patient) SAAQ Registrations expiry (criminal record etc... )
2 Short range tracking (school bag, laptop, keys) Hydro electric pole monitoring (hot spots, transformers, pinpoint failures...
) Mobile locating services (avalanche victim, lost individual, kidnapping, special event) Throw away data collection (volcano temperature, life threatening toxic air conditions) Tamper warning (overnight container facility, construction site tool shed... ) Remote monitoring for 3rd party security companies (industrial park surveillance) SAFETY
Traffic sign monitoring Automated lighting (replace photo sensors) Air quality monitoring (C02 levels/Propane leaks/construction site) Seismic activity monitoring Throw away sensing for toxic emission measurements in a fire COMMERCIAL AND CONSUMER SERVICES
Credit TAG (monitor short term financed inventory) Hotel (weather/clock reset) Bell Boy Weather monitoring Special package tracking in real time Fleet management Favorite songs/shows Truck idle monitoring (Freightliner, UPS) Courier velocity monitoring (high acceleration followed by fast breaking) Humidity sensors for lawn care (golf courses, city parks, etc.)
3 Satellite TV
DVD Return (beep... ) Temperature monitoring (Food/pharmaceutical) AUTOMATION
Automatic meter reading Inventory management (pallet) Stock level monitoring and replenishment (vending machine) Mail box notification Garbage container level notification Automated sprinkler (Farmers etc... ) MARKETING
Geo marketing (where are products moving, trends... ) Piggyback cell phone battery pack Flight time data & Information PRODUCTS
Low cost text pager Kit cadeau Network vehicle/equipment starter (irrigation pumps) Wireless pool temperature and chemical monitor (includes add quantities...) Wireless OBD2 data information
4 Base Stations (see diactram) 1: Master base station The master base station is used to communicate information via wireless and or wired links back to the central. The information is collected from slave and or lower tier base stations as well as end-points. The time at which the information will be communicated to the central is based on its priority level. Information that is not time sensitive can be buffered and sent at a time when data traffic levels are lower thus maximizing network bandwidth. The master base stations will also be responsible for network channel assignments (control channel) as well as various information updates to other base stations and end points.
2: 2"d tier base station The second tier base station is used to communicate with master base stations. This base station will communicate with the master base station based on the priority level of the information received from end points.
Information that is not time sensitive can also be buffered and sent at a time when data traffic levels are lower thus maximizing network bandwidth. This type of base station will operate using channel assignments received from master base stations.
3: Combination base station The combination base station can communicate with central offices, master base stations and 2"d tier base stations via wireless and or wired links. It can also operate as a standalone unit not requiring information and or instructions from either a central office or other base stations (customer/application site specific base station). This type of base station could be used in an application requiring limited geographical area coverage and no network support.
5 4. Mobile base station The mobile base station can communicate with master, 2nd tier and combination base stations as well as with a central office once setup. This type of base station can be used in a temporary application such as special events and special tracking applications. Mobile base stations can also be used in vehicles such as service and repair or monitoring vehicles for remote data collection and processing. The mobile base station can also operate as a standalone unit.
Central office The central office is used to provide main operational support to the network.
It can communicate with the base stations via wireless and wired links. The central office can also be used to communicate information serviced by the network directly to customers and or various service providers. The central office can communicate directly with 3rd parties and can also be used as a dispatching service provider for applications requiring such services. The central office will also handle miscellaneous task such as automated billing services and so on.
6 End Point The "end-point" is a wireless device used to collect, communicate, receive and relay data to the network. The data is collected from the host to which it is interfaced. An end point can be fully customized based on its intended use.
Depending on the application the device interface will be customized to the host specifications. The end point can be made to operate using AC or DC power sources. The data transmitted by an end-point can be given a priority setting that will determine when where and how the data will be carried and routed by the network. A high priority message would include alarm monitoring data where as a low level priority message could include weather or vending machine data. The end-point device can also be comprised of several radio modules, larger memory blocs and different sensors. The housing can also be customized in order to withstand harsh operating conditions.
Protocol items Data transfer (routing and destination info) Packet structure and build Base station types and their functionalities TAG/End point functionality Priority level Priority handling/routing Channel assignment table Star/Mesh and (Distress or Critical) Topology Jam sensing Environment learning / Dynamic networking
7 Architecture items to define further Base station types - Descriptions+locations+coverage+functionality Central - Description+functionality High level network protocol and architecture points - Alarm monitoring data can be verified at different intervals based on network traffic. The verifications can also be sporadic.
- Data routing can be customized based on message priority. A critical message will be sent via a more direct route, etc.
- End points will send "distress" message to "all" within its vicinity if it has not heard from its local base station in a set amount of time.
- End points will also accelerate and increase the number of transmissions.
- End point can move from a networked scenario (relay it's information via a base station and so on) to a point to point scenario (relay info via other end points within range). Selection of which end point to send to will be based on the RSSI.
- Communication between 2 end points can be done in several different manners based on RSSI levels Tower IDs and destination ID.
- Ex: The 2 end points will communicate to each other without sending through a base station if RSSI level is high = Point to point.
8 - Ex: 2 end points will communicate with each other via a base station if Rssi level is to low and the tower IDs contained in the messages match. = Point to Base station to point.
- Ex: 2 end points will communicate with each other via the full network if the messages have different tower iDs = Point to base station to central to point.
- Packets can contain the following:
Header/Priority level/Tower id/Endpoint id/DATA/status/RSSI
info/1/oltage/Destination ID
- Endpoints can move from STAR to MESH topology based on RSSI
levels/message priority/specific routing instructions/jamming sensor, etc.
- End points have "ENVIRONMENT SENSING & LEARNING" or "DYNAMIC
NETWORKING" capability. An endpoint learns "acquires the location or IDs of other end points and base stations within range. This is done in order to establish the most efficient mode of information routing. It is also done in order to establish an emergency routing scenario "in case"...The end point can also send its "acquired knowledge" back to the central.
- JAM Sensing: An end point or ANY network element can sense jamming equipment based on RSSI level fluctuations. These elements can react by selecting alternate channels/using back up routing and call also accelerate and increase the transmissions. These elements can also power up or down the output power of the radio.
9 - (Preliminary) End points will be controlled using 3 main control channels:
Timing info (yr/mm/dd/hr/mn/sec/ms) and traffic/weather (used to give battery powered end points a time slot to transmit and receive so as to save battery life and avoid network and spatial saturation.
Special commands to individual and or groups (all quiet/all power up-down, etc.
Locating IDs=low power endpoint to base station (sent to end point and end point re-transmit to base station on command or automatically) This invention also pertains to an inventory management system (IMS). The IMS
is comprised of numerous transmitters and or transceivers, fixed and or mobile electronic readers (base stations) linked to a network/server and database. An item is outfitted with one or more identifying tags (ID tags) which are registered in the database. These ID tags are used to remotely identify the item to which it is attached as well as its location.
An area is outfitted with location beacons that transmit location numbers or IDs which correlate to a specific area or location and that are received by the ID
tags and then transmitted by the ID tags back to a base station and or central for data logging, locating and or identification purposes. In order to determine the exact coverage size and location for the location beacon, a location beacon can operate at different output power levels and can be outfitted with different types of antennae such as directional or omni-directional antennae.
The system also includes remote data collectors or mobile base stations. These devices are used when inventory or assets are moved from one location (building ,etc.) to another. These devices constantly listen for ID tag transmissions and keep them in a buffer in order to upload the received information to a central or master base station. The mobile base stations can be used by service and repair personnel, warehouse personnel, production personnel and so on.

System components detailed ID Tag (Typically a battery operated transceiver): The ID Tag is a transceiver that transmits a unique ID along with several other pieces of information.
This
10 information can include location number (number received from a location beacon), status information, hour meter, temperature, etc. The type of information transmitted by the ID Tag is dependant upon what type of object that it is either installed on or interfaced to.
Ex: Pallet of food: This type of application would require the use of an ID
Tag capable of measuring the temperature of the goods on the pallet and transmitting the information.
Ex: Rental equipment (lift truck): This type of application would require the use of an ID Tag capable of counting the number of (in use) hours and transmitting the information for billing purposes.
Location Beacon (Typically a battery operated transmitter): The location beacon is a transmitter that constantly transmits a unique ID number on a "reserved" channel. This ID correlates to a specific area or location. The ID
is received and then re-transmitted by the ID Tag to a base station and or central in order to identify and be able to locate the item to which a particular ID Tag is affixed. In order to control the coverage area of a location beacon, the beacon can operate at different output power levels thus increasing or reducing the range at which the beacon ID can be received by an ID Tag. The location beacon can also
11 be equipped with various types of antennae including directional, semi-directional and omni-directional in order to establish a coverage area with greater precision.
Fixed Base Station (Master transceiver): The Base station is a master transceiver used to communicate with the mobile base stations, the ID Tags as well as any location beacons that have receive capability. The base station is interfaced to a pc via an RS232 or USB port and is controlled by a proprietary GUl/program. The base station can request updated/real time location information from an ID Tag. It can also request an upload of information stored in a mobile base station (detailed further in this document). The base station can also be used in order to perform coverage tests and so on.
Mobile Base Station (mobile transceiver): The mobile transceiver is a device used in order to receive and communicate with ID Tags and location beacons found in remote locations (location other than the "home" location of an ID
Tag and the mobile base station). When a mobile base station no longer hears its home beacon it begins to listen for ID Tag transmissions and logs the data in its memory until it returns to its home area or location and hears an upload request from a master base station. It will then upload all of the ID Tag information stored in its memory to the master base station for system updating.
Ex: A Lift truck is rented to a warehouse. The rental service truck is outfitted with a mobile base station and is used to collect the remote information. As the truck leaves its home area and no longer hears its home locator beacon, it will begin to listen for ID Tags and will log any such transmissions in its memory. As the truck approaches the warehouse where the lift truck has been rented to, the mobile base station will log the information sent by the ID Tag (ID number, Location ID, Hour counter "for billing", Tag status and so on) and will upload this information when it return to it's home location and hears the upload request.
12 Although the present invention has been explained hereinabove by way of a preferred embodiment thereof, it should be pointed out that any modifications to this preferred embodiment within the scope of the appended claims is not deemed to alter or change the nature and scope of the present invention.

Claims

CA 2518974 2005-09-09 2005-09-09 Network and inventory management system Abandoned CA2518974A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA 2518974 CA2518974A1 (en) 2005-09-09 2005-09-09 Network and inventory management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA 2518974 CA2518974A1 (en) 2005-09-09 2005-09-09 Network and inventory management system

Publications (1)

Publication Number Publication Date
CA2518974A1 true CA2518974A1 (en) 2007-03-09

Family

ID=37871979

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2518974 Abandoned CA2518974A1 (en) 2005-09-09 2005-09-09 Network and inventory management system

Country Status (1)

Country Link
CA (1) CA2518974A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446289A (en) * 2016-11-11 2017-02-22 无锡雅座在线科技发展有限公司 Information inquiry method and device based on Pinpoint
CN111638487A (en) * 2020-05-07 2020-09-08 中国第一汽车股份有限公司 Automatic parking test equipment and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446289A (en) * 2016-11-11 2017-02-22 无锡雅座在线科技发展有限公司 Information inquiry method and device based on Pinpoint
CN106446289B (en) * 2016-11-11 2019-10-01 无锡雅座在线科技股份有限公司 Information query method and device based on Pinpoint
CN111638487A (en) * 2020-05-07 2020-09-08 中国第一汽车股份有限公司 Automatic parking test equipment and method
CN111638487B (en) * 2020-05-07 2022-07-22 中国第一汽车股份有限公司 Automatic parking test equipment and method

Similar Documents

Publication Publication Date Title
CN101112077B (en) Method and system to monitor a person using wireless media
US11868102B2 (en) Monitoring apparatus and system
KR101812527B1 (en) Smart port system for BLE beacon-based port incoming and outgoing vehicle management
US10580276B2 (en) System and method for automatic tool tracking, monitoring, and inventory management
US8816850B2 (en) Tracking and monitoring system for opencast mines
US8587414B2 (en) Wireless information and safety system for mines
US20120116931A1 (en) Method for establishing an impromtu geofenced area to organize and analyze shipments
CN100387030C (en) Wireless transceiver network employing node-to-node data messaging
JP5010404B2 (en) How to collect data on cargo containers
CN100450269C (en) Monitoring changeable locations of client devices in wireless networks
US20040217864A1 (en) Tagging and tracking system for assets and personnel of a commercial enterprise
CN101848419A (en) Positioning and tracking system of underground/roadway moving object
CN101725370A (en) Underground locating and monitoring system
CN109791646A (en) Article tracking system
US20090309731A1 (en) Method and system for tracking objects using Global Positioning System (GPS) receiver built in the Active Radio Frequency ID (RFID) receiver
CN102185745A (en) IOT (internet of things) service system
CN109146023A (en) Shipping mass monitoring method based on assets material object ID intelligent recognition
CN101923779A (en) Sensor network-based intelligent public traffic scheduling and monitoring system
CA2518974A1 (en) Network and inventory management system
KR20110061191A (en) Management system on underground city-gas facility
CN103016061A (en) Underground locating and monitoring communication system
US20090040051A1 (en) System and Method for Identifying First Responders in a Hazardous Environment
CN201698022U (en) System for locating and tracking moving target in pit/tunnel
CN215010726U (en) Flow guide equipment positioning management system of rail transit station
CN108491746A (en) A kind of piping lane intellectualized management system and method

Legal Events

Date Code Title Description
FZDE Dead