Tolling System Architecures RTIC Conference 2008

22
Tolling System Architectures Rupert Brown ETTM, ConnectEast Melbourne, Victoria, Australia

description

A presentation on how to develop the architecture for a road tolling system. Includes the use of a rich picture and various architectural models. Presented at the RTIC 2008 conference.

Transcript of Tolling System Architecures RTIC Conference 2008

Page 1: Tolling System Architecures RTIC Conference 2008

Tolling System Architectures

Rupert BrownETTM, ConnectEast

Melbourne, Victoria, Australia

Page 2: Tolling System Architecures RTIC Conference 2008

2

Introduction

Changing relationships, changing environment

Page 3: Tolling System Architecures RTIC Conference 2008

3

Changing relationships, environment We no longer have tolls – we have “customers”

with accounts – can we leverage value? No lessening in the need to travel Climate change – restricting the car and

emphasising public transport – “blended solution” Convergence of utility – the tolling system and the

mass ticketing system

Charging System for Infrastructure Usage

CSIU

Page 4: Tolling System Architecures RTIC Conference 2008

4

Architecture development

What is a CSIU?

Page 5: Tolling System Architecures RTIC Conference 2008

5

Use a method – Soft Systems MethodologyProblemsituation

unstructured

Problemsituationexpressed

Root Definitionof relevant systems Conceptual

models

Other systemsthinking

Formal systemsmodel

Real world/Systemsworld comparison

Feasible/DesirableChanges

Actions toImprove

Real World

Systems World

SE Architecture

Rich Picture

CATWOE

Page 6: Tolling System Architecures RTIC Conference 2008

6

Streetparking

Car parks

Congestion charging

Bridges

Roads

Tunnels

Railways

Airports

Sea Ports

Tolling

Public TransportTicketing

DSRC Tags

Phones

GNSS Constellation

Smart CardsGPS OBU

Video

Gantries

Picture

Each

in

frast

ruct

ure

typ

e h

as

its

ow

n b

est

way o

f bein

g f

un

ded a

nd g

en

era

ting

reven

ue.

Tech

nolo

gy h

as

to b

e a

pp

ropri

ate

for

the a

pp

licati

on a

nd

cost

.

RFID Tags

Th

e n

atu

re o

f th

e a

sset,

tech

nolo

gy a

nd

th

eb

usi

ness

case

dri

ves

the f

orm

of

the s

olu

tion

.

Get

the p

eop

le w

ho u

se t

he a

sset

but

don’t

pay –

no a

rran

gem

en

t.

?Other infrastructureoperators

Do we have aclearing house?

Our customers accessingall our channels

Our bank

Calculate how muchusers have to pay.

Recover money frombad customers

Interoperabilityagreements.

Shareholders wanttheir cut of money

Charge that to ourcustomer’s account.

Usage

eve

nt in

form

atio

n,

Info

rmat

ion

to id

entif

y th

e us

er,

Evid

ence

of u

se,

Government Authoritieswho control the concessionsand have audit powers.

Who is this?Do they have an arrangement with us,or somebody else?

We send you –

a device, ta

g maybe,

A statement/in

voice, o

n a regular b

asis,

Informatio

n we th

ink you’ll want.

You send us m

oney.

We exchange customer information,Information on our customer’s usage,The money that we owe each other.

Manage all ourmoney.

Money to/fromthe bank.

Payday forshareholders.

Money for theGovernment

Mobilemonitoring

Recover money owed to us.Use the courts if necessary.

Process andconfirm pictures

HOTLANE

Rich Picture of a Charging Systemfor Infrastructure Usage (CSIU)

To show, in an unstructured way, most of the significantelements that come into play when thinking aboutdeveloping a charging system for infrastructure usage.

Rupert Brown 2007

Infrared

[Stage 2 – “Problem situation expressed” from the SSM]

Page 7: Tolling System Architecures RTIC Conference 2008

7

CSIU Root Definition

A system that detects when and helps to identify who is using an infrastructure asset, calculates a charge for that usage and enables an operator to maintain a relationship with a customer and a valid arrangement to pay, such that usage charges are paid by the customer to the operator.

The system enables an operator to collect money from users of the asset that do not have valid arrangements to pay.

Page 8: Tolling System Architecures RTIC Conference 2008

8

Streetparking

Car parks

Congestion charging

Bridges

Roads

Tunnels

Railways

Airports

Sea Ports

Tolling

Public TransportTicketing

DSRC Tags

Phones

GNSS Constellation

Smart CardsGPS OBU

Video

Gantries

Picture

Each

in

frast

ruct

ure

typ

e h

as

its

ow

n b

est

way o

f bein

g f

un

ded a

nd g

en

era

ting

reven

ue.

Tech

nolo

gy h

as

to b

e a

pp

ropri

ate

for

the a

pp

licati

on a

nd

cost

.

RFID Tags

Th

e n

atu

re o

f th

e a

sset,

tech

nolo

gy a

nd

th

eb

usi

ness

case

dri

ves

the f

orm

of

the s

olu

tion

.

Get

the p

eop

le w

ho u

se t

he a

sset

but

don’t

pay –

no a

rran

gem

en

t.

?Other infrastructureoperators

Do we have aclearing house?

Our customers accessingall our channels

Our bank

Calculate how muchusers have to pay.

Recover money frombad customers

Interoperabilityagreements.

Shareholders wanttheir cut of money

Charge that to ourcustomer’s account.

Usage

eve

nt in

form

atio

n,

Info

rmat

ion

to id

entif

y th

e us

er,

Evid

ence

of u

se,

Government Authoritieswho control the concessionsand have audit powers.

Who is this?Do they have an arrangement with us,or somebody else?

We send you –

a device, ta

g maybe,

A statement/in

voice, o

n a regular b

asis,

Informatio

n we th

ink you’ll want.

You send us m

oney.

We exchange customer information,Information on our customer’s usage,The money that we owe each other.

Manage all ourmoney.

Money to/fromthe bank.

Payday forshareholders.

Money for theGovernment

Mobilemonitoring

Recover money owed to us.Use the courts if necessary.

Process andconfirm pictures

HOTLANE

Rupert Brown 2007

InfraredDetecting usage of the asset

Reconstructing how theasset was used

Calculating a charge forthe asset’s use

Identifying who to chargefor the asset usage

Exchangingdata and money with other

asset operators

Servicing the needsof our customers

Getting money fromour customers

Enforcing the needto pay to use the asset

Collecting money owedManaging the money

Managing theCSIU systems

Using the Rich Picture to draw outthe main functional elements of CSIU

The start of the process to bring structure to themass of unstructured elements within the Rich Picture.

Gatheringevidence of use

Page 9: Tolling System Architecures RTIC Conference 2008

9

Streetparking

Car parks

Congestion charging

Bridges

Roads

Tunnels

Railways

Airports

Sea Ports

Tolling

Public TransportTicketing

DSRC Tags

Phones

GNSS Constellation

Smart CardsGPS OBU

Video

Gantries

Picture

Each

in

frast

ruct

ure

typ

e h

as

its

ow

n b

est

way o

f bein

g f

un

ded a

nd g

en

era

ting

reven

ue.

Tech

nolo

gy h

as

to b

e a

pp

ropri

ate

for

the a

pp

licati

on a

nd

cost

.

RFID Tags

Th

e n

atu

re o

f th

e a

sset,

tech

nolo

gy a

nd

th

eb

usi

ness

case

dri

ves

the f

orm

of

the s

olu

tion

.

Get

the p

eop

le w

ho u

se t

he a

sset

but

don’t

pay –

no a

rran

gem

en

t.

?Other infrastructureoperators

Do we have aclearing house?

Our customers accessingall our channels

Our bank

Calculate how muchusers have to pay.

Recover money frombad customers

Interoperabilityagreements.

Shareholders wanttheir cut of money

Charge that to ourcustomer’s account.

Usage

eve

nt in

form

atio

n,

Info

rmat

ion

to id

entif

y th

e us

er,

Evid

ence

of u

se,

Government Authoritieswho control the concessionsand have audit powers.

Who is this?Do they have an arrangement with us,or somebody else?

We send you –

a device, ta

g maybe,

A statement/in

voice, o

n a regular b

asis,

Informatio

n we th

ink you’ll want.

You send us m

oney.

We exchange customer information,Information on our customer’s usage,The money that we owe each other.

Manage all ourmoney.

Money to/fromthe bank.

Payday forshareholders.

Money for theGovernment

Mobilemonitoring

Recover money owed to us.Use the courts if necessary.

Process andconfirm pictures

HOTLANE

Rupert Brown 2007

Infrared

Using the Rich Picture to draw outthe main functional elements of CSIU

The start of the process to bring structure to themass of unstructured elements within the Rich Picture.

Detecting usage of the asset

Reconstructing how theasset was used

Calculating a charge forthe asset’s use

Identifying who to chargefor the asset usage

Exchangingdata and money with other

asset operators

Servicing the needsof our customers

Getting money fromour customers

Enforcing the needto pay to use the asset

Collecting money owedManaging the money

Managing theCSIU systems

Gatheringevidence of use

Page 10: Tolling System Architecures RTIC Conference 2008

10

Asset UsageDetection FA

Function: to detectand gatheridentifying tokendata on peopleusing the asset.

Tie

d t

o t

he a

sset.

Manage the CSIUSystem FA

Function: to monitor,manage and maintainthe CSIU System.

ManagementCommands

StatusReports

Asset UsageReconstruction FA

Function: to reconstruct,based on the detectedusage, a complete usageevent.

InteroperableArrangements to Pay

FAFunction: to manage theexchange of informationand money with other assetoperators so as to enablepeople with arrangementsto pay to use our assetand vice versa.

Other asset operators.

Asset UsageRating FA

Function: to determinehow a complete usageevent should be rated,i.e. the charge for use.

Evidence of useGathering FA

Function: to gatherevidence that theasset was used ata determined dateand time.

Usage & TokenCorrelation FA

Function: to associaterated user events withthe tokens that willallow the asset userto be identified.

Pay for UsageEnforcement FA

Function: to manage thecollection of money frompeople who have used theasset but not madearrangements to pay.

Channels to our“would be” customers.

Serving ourCustomers FA

Function: to keep up todate all the informationwe need on people witharrangements to pay andrespond to other queries.

Channels to ourCustomers.

Corporate MoneyManagement FA

Function: to manage allthe money coming in to and going out from theCSIU.

Interface with Banks,Financial Institutions,

Government and individuals.

Debt CollectionFA

Function: to manage thecollection of money frompeople who have used theasset and have madearrangements to pay, butfor whatever reasonhaven’t.

Our Customers.

User ChargingFA

Function: to manage thecollection of money frompeople who have used theasset and have madearrangements to pay, andto hand off for thosethat haven’t.

Identification of CSIU FunctionalAreas (FA) their basic DescriptionsUsing the functional elements drawn out from the analysis ofthe Rich Picture to create a first pass at a system blockdiagram for the CSIU, including basic data flows.

© Rupert Brown 2008

Usagedetections

Complete usageevents

Rated usageevents

Tokenidentificationdata

Evidence of use

Rated usageevents withtokenidentifiers

Details of peoplewith arrangements

to pay.

Details of usageand othernotifications.

Details of people with arrangements to pay with otheroperators, and data on our customers using other assets.

Details of people with arrangements to pay with us,and data on other customers using our assets.

Request for evidence

Œ

Œ

Ž

Ž

Information identifying our customers who are notpaying the money they owe us.

Outcome of a debtrecovery process.

Financial reconciliationinformation.

Financial reconciliationinformation.

[FA – Functional Area]

Usagedetections

Detecting usage of the asset

Reconstructing how theasset was used

Calculating a charge forthe asset’s use

Identifying who to chargefor the asset usage

Exchangingdata and money with other

asset operators

Servicing the needsof our customers

Getting money fromour customers

Enforcing the needto pay to use the asset

Collecting money owedManaging the money

Managing theCSIU systems

Gatheringevidence of use

Page 11: Tolling System Architecures RTIC Conference 2008

11

Asset UsageDetection FA

Function: to detectand gatheridentifying tokendata on peopleusing the asset.

Tie

d t

o t

he a

sset.

Manage the CSIUSystem FA

Function: to monitor,manage and maintainthe CSIU System.

ManagementCommands

StatusReports

Asset UsageReconstruction FA

Function: to reconstruct,based on the detectedusage, a complete usageevent.

InteroperableArrangements to Pay

FAFunction: to manage theexchange of informationand money with other assetoperators so as to enablepeople with arrangementsto pay to use our assetand vice versa.

Other asset operators.

Asset UsageRating FA

Function: to determinehow a complete usageevent should be rated,i.e. the charge for use.

Evidence of useGathering FA

Function: to gatherevidence that theasset was used ata determined dateand time.

Usage & TokenCorrelation FA

Function: to associaterated user events withthe tokens that willallow the asset userto be identified.

Pay for UsageEnforcement FA

Function: to manage thecollection of money frompeople who have used theasset but not madearrangements to pay.

Channels to our“would be” customers.

Serving ourCustomers FA

Function: to keep up todate all the informationwe need on people witharrangements to pay andrespond to other queries.

Channels to ourCustomers.

Corporate MoneyManagement FA

Function: to manage allthe money coming in to and going out from theCSIU.

Interface with Banks,Financial Institutions,

Government and individuals.

Debt CollectionFA

Function: to manage thecollection of money frompeople who have used theasset and have madearrangements to pay, butfor whatever reasonhaven’t.

Our Customers.

User ChargingFA

Function: to manage thecollection of money frompeople who have used theasset and have madearrangements to pay, andto hand off for thosethat haven’t.

Identification of CSIU FunctionalAreas (FA) their basic DescriptionsUsing the functional elements drawn out from the analysis ofthe Rich Picture to create a first pass at a system blockdiagram for the CSIU, including basic data flows.

© Rupert Brown 2008

Usagedetections

Complete usageevents

Rated usageevents

Tokenidentificationdata

Evidence of use

Rated usageevents withtokenidentifiers

Details of peoplewith arrangements

to pay.

Details of usageand othernotifications.

Details of people with arrangements to pay with otheroperators, and data on our customers using other assets.

Details of people with arrangements to pay with us,and data on other customers using our assets.

Request for evidence

Œ

Œ

Ž

Ž

Information identifying our customers who are notpaying the money they owe us.

Outcome of a debtrecovery process.

Financial reconciliationinformation.

Financial reconciliationinformation.

[FA – Functional Area]

Usagedetections

Manage the CSIU System FA

Monitor system componenthealth

Report system alerts, alarms andfailures

Maintain service schedules andhistories

Maintain technical information

Maintain warranty, licence andservice organisation details

Asset Usage Detection FA

Manage detection and accesssystems

Manage detection events in timeand space

Capture detection event record(video, TRX, biometrics)

Manage real time authorisation/access request

Evidence of use Gathering FA

Convert detection event recordsinto machine readable form

Identify tokens from event records

Correlate & consolidate multiplerecords into single compound record

Encapsulate and encrypt compoundrecord data in repository

Manage the record repository

Asset Usage Reconstruction FA

Maintain the detection system(asset) topology

Maintain the timeliness of usagedetections

Create usage events based ontoken identifications

Adjust usage events

Determine user class orcharacteristics

Asset Usage Rating FA

Maintain the timeliness of usageevents

Maintain the set of chargingschemes and rate tables

Determine and assign the chargeto the usage event

Adjust charges as the usage eventchanges

Usage & Token Correlation FA

Assess tokens and create a tokenpattern for a usage event

Determine “best fit” tokens toapply to the usage event

Mark usage event with the “bestfit” tokens

Add token pattern to the patternsrepository

Adjust tokens assigned to usageevents

Pay for Usage Enforcement FAManage the identification of

the asset user

Manage the “post use” invoiceprocess

Manage statutory declarations

Produce the “evidence of use”package

Manage the relationship withthe civil courts

Receipt money

User Charging FAMaintain accounts and account

hierarchies (arrangements to pay)

Allocate usage charges to accountsbased on token identification

Calculate and apply fees, chargesand discounts to accounts

Manage adjustments to accounts

Manage exempt and un-chargeableusage events

Prepare statements and invoices andissue across channels

Manage real-time accessauthorisation requests

Manage events with users withoutarrangements to pay

Serving our Customers FAGather intelligence on and profile

our customers

Develop new infrastructure accessand related services products

Sell and cross-sell access andservice products

Maintain customer accountdetails

Manage customer queries, issuesand complaints

Manage payments, refunds andadjustments

Manage information and servicelevels across all channels

Manage ordering of physical tokendevices

Corporate Money Management FA

Manage automatic paymentarrangements across channels

Manage all financial channeltransactions

Manage the General Ledger

Undertake accounts and bankreconciliation

Undertake financial reporting

Manage all financial auditactivities

Debt Collection FA

Identify debts, review and confirm/reject debt based on evidence

Review debt history and existingcollection arrangements

Manage and operate in-housedebt collection processes

Manage outsourceddebt collection processes

Manage legal processes associatedwith debt collection

InteroperableArrangements to Pay FA

Receive and process “Arrangementsto pay” lists

Create and send “Arrangementsto pay” lists

Receive and process rated andidentified home usage events

Create and send rated andidentified FO usage events

Manage disputed usage events

Development of the CSIU’s functionalareas (FA) into a functional architecture

Using the functional areas (FA) as the basis, this diagram developsthe concept to produce a basic functional architecture for theCSIU.

© Rupert Brown 2008

Token Logistics FA

Order token devices and managegood inwards

Manage warehouse inventories

Manage dispatch to customers

Manage returns for reissue, repairand retirement

Page 12: Tolling System Architecures RTIC Conference 2008

12

Manage the CSIU System FA

Monitor system componenthealth

Report system alerts, alarms andfailures

Maintain service schedules andhistories

Maintain technical information

Maintain warranty, licence andservice organisation details

Asset Usage Detection FA

Manage detection and accesssystems

Manage detection events in timeand space

Capture detection event record(video, TRX, biometrics)

Manage real time authorisation/access request

Evidence of use Gathering FA

Convert detection event recordsinto machine readable form

Identify tokens from event records

Correlate & consolidate multiplerecords into single compound record

Encapsulate and encrypt compoundrecord data in repository

Manage the record repository

Asset Usage Reconstruction FA

Maintain the detection system(asset) topology

Maintain the timeliness of usagedetections

Create usage events based ontoken identifications

Adjust usage events

Determine user class orcharacteristics

Asset Usage Rating FA

Maintain the timeliness of usageevents

Maintain the set of chargingschemes and rate tables

Determine and assign the chargeto the usage event

Adjust charges as the usage eventchanges

Usage & Token Correlation FA

Assess tokens and create a tokenpattern for a usage event

Determine “best fit” tokens toapply to the usage event

Mark usage event with the “bestfit” tokens

Add token pattern to the patternsrepository

Adjust tokens assigned to usageevents

Pay for Usage Enforcement FAManage the identification of

the asset user

Manage the “post use” invoiceprocess

Manage statutory declarations

Produce the “evidence of use”package

Manage the relationship withthe civil courts

Receipt money

User Charging FAMaintain accounts and account

hierarchies (arrangements to pay)

Allocate usage charges to accountsbased on token identification

Calculate and apply fees, chargesand discounts to accounts

Manage adjustments to accounts

Manage exempt and un-chargeableusage events

Prepare statements and invoices andissue across channels

Manage real-time accessauthorisation requests

Manage events with users withoutarrangements to pay

Serving our Customers FAGather intelligence on and profile

our customers

Develop new infrastructure accessand related services products

Sell and cross-sell access andservice products

Maintain customer accountdetails

Manage customer queries, issuesand complaints

Manage payments, refunds andadjustments

Manage information and servicelevels across all channels

Manage ordering of physical tokendevices

Corporate Money Management FA

Manage automatic paymentarrangements across channels

Manage all financial channeltransactions

Manage the General Ledger

Undertake accounts and bankreconciliation

Undertake financial reporting

Manage all financial auditactivities

Debt Collection FA

Identify debts, review and confirm/reject debt based on evidence

Review debt history and existingcollection arrangements

Manage and operate in-housedebt collection processes

Manage outsourceddebt collection processes

Manage legal processes associatedwith debt collection

InteroperableArrangements to Pay FA

Receive and process “Arrangementsto pay” lists

Create and send “Arrangementsto pay” lists

Receive and process rated andidentified home usage events

Create and send rated andidentified FO usage events

Manage disputed usage events

Development of the CSIU’s functionalareas (FA) into a functional architecture

Using the functional areas (FA) as the basis, this diagram developsthe concept to produce a basic functional architecture for theCSIU.

© Rupert Brown 2008

Token Logistics FA

Order token devices and managegood inwards

Manage warehouse inventories

Manage dispatch to customers

Manage returns for reissue, repairand retirement

Back OfficeSystem

UsageDetection

SystemManagement

Usag

e E

vid

en

ce

Man

ag

em

en

t

UsageReconstruction

& Rating

EnforcementSystemAllocation of the functional architecture

to create the system architectureUsing the functional architecture as the basis, this diagram appliesthe COTS vs “purpose build” test to derive system architecturecomponents.

© Rupert Brown 2008

COTS Purpose built

InteroperabilitySystem

Page 13: Tolling System Architecures RTIC Conference 2008

13

Back OfficeSystem

UsageDetection

SystemManagement

Usag

e E

vid

en

ce

Man

ag

em

en

t

UsageReconstruction

& Rating

EnforcementSystem Interoperability

System

UsageDetection

UsageDetection

UsageDetection

UsageDetection

UsageDetection

UsageDetection

Usage detectionis linked to theasset.

SystemManagement

UsageEvidence

Management

UsageReconstruction

& Rating

Back OfficeSystem

EnforcementSystem

InteroperabilitySystem

Web

IVR

SMSCustomerChannels

Bank POS DCA MH

Services

Other assetoperators

Legal system

COTS Product

“Purpose Built” Product

POS – Point of Sale e.g. Post OfficeDCA – Debt Collection AgencyMH – Mailing House

IVR – Interactive Voice RecognitionSMS – Short Message Service (phone)

CSIU Basic System Architecture

© Rupert Brown 2008

External (world) interface TS

TS – Token Supplier(s)

Interface numbering

Page 14: Tolling System Architecures RTIC Conference 2008

14

Questions

Is this the right model? Is this the right set of interfaces? Is there value in expending effort to define these

interfaces? Is there benefit for operators in requiring suppliers

to conform to interface standards?

Page 15: Tolling System Architecures RTIC Conference 2008

15

Comparisons

Stockholm Congestion Charging System (Trial)Eastlink Tolling System

Queensland Motorways Tolling System

Page 16: Tolling System Architecures RTIC Conference 2008

16

Page 17: Tolling System Architecures RTIC Conference 2008

17

XCH

CRM

Financials

Data Warehouse

Toll OperatingSystem

TSMC

ALC

IVR

EFTPOS

Web

Post Office

Bank

Enforcement

Look up

DCA

Mail House

Tag distributor

Interoperability

Customer ServiceSystem

SMS/e-mail

ALC

TSMC

ALC

ALC

TSMC

ALC

ALC

Tolling System Architecture for ConnectEast’s new EastLink Road

Page 18: Tolling System Architecures RTIC Conference 2008

18

Copyright © Queensland Motorways 2008

Page 19: Tolling System Architecures RTIC Conference 2008

19

UsageDetection

UsageDetection

UsageDetection

UsageDetection

UsageDetection

UsageDetection

Usage detectionis linked to theasset.

UsageEvidence

Management

SystemManagement

UsageReconstruction

& Rating

Back OfficeSystem

EnforcementSystem

InteroperabilitySystem

Web

IVR

SMSCustomerChannels

Bank POS DCA MH

Services

Other assetoperators

Legal system

COTS Product

“Purpose Built” Product

POS – Point of Sale e.g. Post OfficeDCA – Debt Collection AgencyMH – Mailing House

IVR – Interactive Voice RecognitionSMS – Short Message Service (phone)

CSIU Basic System Architecture

© Rupert Brown 2008

External (world) interface TS

TS – Token Supplier(s)

Interface numbering

Page 20: Tolling System Architecures RTIC Conference 2008

20

Conclusions

Where we’ve been, where to go

Page 21: Tolling System Architecures RTIC Conference 2008

21

Conclusion

To develop the Architecture: The development of a Rich Picture, Analysing the Rich Picture to identify Functional Areas, The development of Functional Areas into a Functional Architecture, The translation of the Functional Architecture into system components

based on the availability of COTS or purpose built applications. The development of a System Architecture complete with components

and key interfaces. The system architecture was successfully compared with the

architecture of three real world systems.Future work To validate the CSIU system architecture against other real world

systems especially mass ticketing systems, and to develop in detail the specification of the key interfaces.

Page 22: Tolling System Architecures RTIC Conference 2008

22

Rupert Brown, ETTM, ConnectEast

Questions