Ubiquitous networking

619 views

Published on

Computer Network.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
619
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
47
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ubiquitous networking

  1. 1. Case Study On Computer Network Subject InchargeMr. Ramesh Shahbade Mrs.Surekha Janrao Submitted byShweta Killedar Sakshi Yadav Sayari Mandal Abhinav Wagadre TE - B Department Of Computer Engineering, Terna Engineering College,Nerul.
  2. 2. Ubiquitous Networking
  3. 3. ContentsIntroduction to the term Ubiquity. What is Ubiquitous Computing and What Ubiquitous Computing isn’t ? Power Of Ubiquitous Computing. Major Trends Of Computing. Introduction to Ubiquitous Networking. Working of Ubiquitous Networking. Applications.
  4. 4. “Anytime, anywhere”. It is total mobility The concept of using ubiquity in the computing world, beyond the desktop is going to be a new paradigm in the Information Technology.
  5. 5. Ubiquitous Computing Ubiquitous computing is enhancing computer use by making many computers available throughout the physical environment but making the effectively invisible to the user. It is also called "UBICOMP".
  6. 6. What Ubiquitous Computing Isn't • Ubiquitous computing is opposite of virtual reality. • The difference between ubiquitous computing and virtual reality is that virtual reality puts people inside a computer world but ubiquitous computing forces the computer to live in the world with people. 
  7. 7. Power Of Ubiquitous Computing
  8. 8. History • Mark Weiser coined the phrase "ubiquitous computing" around 1988.Both alone and with PARC Director and Chief Scientist John Seely Brown, Weiser wrote some of the earliest papers on the subject. • Dr. Ken Sakamura of University of Tokyo, Japan leads the Ubiquitous Networking Laboratory (UNL), Tokyo as well as the T-Engine Forum.  • MIT has also contributed significant research in this field . • Other major contributors include Georgia Tech's College of Computing , NYU's Interactive Telecommunications Program,UC Irvine's Department of Informatics, Microsoft Research, Intel Research and Equator,[13] Ajou University UCRi & CUS.
  9. 9. Major Trends In Computing • These trends are coming from the results of computing getting smaller, faster, and cheaper. • The First Wave was many people per computer ( Mainframe Era ) • The Second Wave was one person per computer. ( PC Era ) • The Third Wave will be many computers per person. ( Ubicomp Era )
  10. 10. Major Trends In Computing
  11. 11. Ubiquitous Networking • • 1. 2. 3. Ubiquitous networking is the actual implementation of the ubiquitous computing. Ubiquitous networks are an IT paradigm comprising Network infrastructures featuring broadband, mobile and constant Internet access, Diverse information equipment that provides access to internet Protocol version 6(Ipv6), and Seamlessly linked interactive contents.
  12. 12. How Ubiquitous Networking Will Work • A ubiquitous networking system is that which allows your program applications to follow you wherever you go. • Following is just a single way that could be used to implement the Ubiquitous Networking. • There are 3 steps to the working of such a network.
  13. 13. Step 1: Send Out the Bat Signal • The AT&T researchers came up with the ultrasonic location system. • This tracking system has three basic parts: 1. Bats - small ultrasonic transmitters worn by users 2. Receivers - ultrasonic signal detectors embedded in ceiling 3. Central controller - coordinates the bats and receiver chains
  14. 14. Step 1: Send Out the Bat Signal • Users within the system will wear a bat, a small device that transmits a 48-bit code to the receivers in the ceiling. Bats also have an imbedded transmitter, which allows it to communicate with the central controller using a bidirectional 433-MHz radio link. • A bat will transmit an ultrasonic signal, which will be detected by receivers located in the ceiling approximately feet (1.2 m) apart in a square grid. • An object’s location is found using trilateration, a position-finding technique that measures the objects distance in relation to three reference points.
  15. 15. Step 1: Send Out the Bat Signal • Trilateration works by measuring the distance from the bat worn by the user to three sensors in the ceiling. Researchers can locate a user's position to within 1.18 inches or 3 cms.
  16. 16. Step 2: In The Zone • • • • • With an ultrasonic location system in place, it’s possible for any device fitted with a bat to become yours at the push of a button. The central controller creates a zone around every person and object within the location system . When all the sensors and bats are in place, they are included in a virtual map of the building. The computer uses a spatial monitor to detect if a user’s zone overlaps with the zone of a device. If the zone’s do overlap, then the user can become the temporary owner of the device. (This screen shot on the left shows how the users' zones and object zones will overlap. The user now owns the device).
  17. 17. Step 3: Information Hoopers & Smart Posters Information Hoopers Once these zones are set up ,the system will help us store and retrieve data in an "information hopper." This is a timeline of information that keeps track of when data is created. The hopper knows who created it, where they were and whom they were with.
  18. 18. Step 3: Information Hoopers & Smart Posters  Smart Posters • A smart poster will have buttons printed on to it that can be triggered by a bat. • Smart posters will be used to control any device that is plugged into the network. • The poster will know where to send a file and a user’s preferences.
  19. 19. Step 3: Information Hoopers & Smart Posters Smart Posters • To press a button on a smart poster, a user will simply place his or her bat on the smart poster button and click the bat. • The system automatically knows who is pressing the poster’s button. Posters can be created with several buttons on it.
  20. 20. Applications  The combination of ubiquitous networking, mobility and ubiquitous computing devices will provide new opportunities for ecommerce products and services.
  21. 21. Applications  The network can reach handhelds through a simple serial wire, infrared, or wireless digital radio and turn them into Internet clients and servers .
  22. 22. Applications  Ubiquitous networking will allow connectivity to corporate applications anywhere, anytime. Employees will be able to retrieve and send information easily from their cars, mobile devices, and homes as well as from their offices.
  23. 23. REFERENCES •www.howstuffworks.com •www.uk.research.att.com/spirit •White-papers by Namura Research Institute •A New Location Technique for the Active Office.IEEE.Personal Communications, Vol. 4, No. 5, October 1997, pp. 42-47. •Sensor-driven Computing. PhD thesis, University of Cambridge, 1998. •The Anatomy of a Context-Aware Application. Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM'99, Seattle, Washington, USA, August 1999, pp. 59-68.
  24. 24. QUESTIONS..??

×