SlideShare a Scribd company logo
SESSION 2011-2012

              SEMINAR
                   on
    ‘Red Tacton Technology’
              Submitted by:
              Vivesh Rathore
              Btech 3 rd year
Department of electronics & Communication
Red Tacton
 Developed by NTT from Japan.

Red Tacton is a new Human Area
Networking technology.

 Claims to send data over the surface of skin.

  Attains a speed up to 10 Mbps --- equivalent
to a fast broadband connection.

 Uses weak electric fields on the surface of
human body instead of relying on EM waves
or light waves.
Human Area Network
PRINCIPLE AND MECHANISM
Red Tacton relies upon the principle that the optical properties of
an electro-optic crystal can vary according to the changes of a
weak electric field.
PROTOTYPES
       Red Tacton Transceiver(PC card
           type)
          Communicationspeed:10Mbps
          Protocols: TCP/IP
          Communication method: Half-duplex.
          Interface: PCMCIA


       •       Red Tacton Transceiver(Hub type)
       •       Communicationspeed:10Mbps
       •       Protocols :TCP/IP
       •       Communication method : Half- duplex
       •       Interface: RJ45


           •   Red Tacton Transceiver(Box type)
           •   (under constructions)
How Red Tacton works?
Block Diagram of RedTacton
        Transceiver
Advantages
Communication by just a Simple Touch thus
 eliminating use of hectic arrangements of wires.
Red Tacton provides high speed and accuracy .
 Red Tacton transceiver electrodes are covered with
 an insulating film, so there is no way current can flow
 into users body.
Very secure Data Transmission i.e., there is no
 problem of hacking since medium is our individual
 body.
No need to insert smart cards, connect cables, tune
 frequencies, or any of the other inconveniences
 usually associated with today's electronic devices.
Complex in Design.

It is expensive as compared to other
mechanism.

Widespread marketing campaigns and
education.
Security applications

                User verification
                and unlocking
                with just a touch




                Automatic access
                log for
                confidential
                document storage
Conclusion
  The performance of Red Tacton is better as
compared to other technologies within short distance.

   There is no any type of problem of hackers as our
body itself is the transmission media.

   Today main issue is speed which is solved by Red
Tacton by providing very high speed of 10 Mbps within
short distances.

   The evolution of this technology is a big achievement
which would likely to be targeted for use in applications
such as wireless headset ,medical application ,security
applications and wireless transmission.
References
[1]www.oppapers.com/course/Communications-
  Networking/44/
[2]www.masternewmedia.org/2003/10/19/wireless_body
  _networkingat10.htm
[3] www.circuitstoday.com
[4] en.wikipedia.org/wiki/Red Tacton
[5] http://www.spectrum.ieee.org/print/2596 Digit
  Magazine
Red tacton
Red tacton

More Related Content

What's hot

Human Area Network
Human Area NetworkHuman Area Network
Human Area Network
Sheel Shah
 
Red tacton
Red tactonRed tacton
Red tacton
Nikhil Eg
 
Redtacton
Redtacton Redtacton
Redtacton
Ekta Mohapatra
 
Redtacton final
Redtacton finalRedtacton final
Redtacton final
PREMKUMAR
 
Red tacton
Red tactonRed tacton
Red tacton
rdeepali92
 
Red tacton (1)
Red tacton (1)Red tacton (1)
Red tacton (1)
selvalakshmi24
 
red tacton
red tactonred tacton
red tacton
Akhil Kumar
 
Redtacton
RedtactonRedtacton
Redtacton
ajeesh n
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
Vinayak Hegde
 
Red tacton
Red tacton Red tacton
Red tacton
Keerthi Thomas
 
Red Tacton
Red TactonRed Tacton
Red Tacton
Subhashree Mishra
 
E skin.pptx
E skin.pptxE skin.pptx
E skin.pptx
foysalmd
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
karthikaramkumar1
 
Redtacton
RedtactonRedtacton
Redtacton
swatikamat
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
Мохаммад Азим
 
Electronic' skin monitors heart, brain function
Electronic' skin monitors heart, brain functionElectronic' skin monitors heart, brain function
Electronic' skin monitors heart, brain function
cmr cet
 
Redtacton
RedtactonRedtacton
Redtacton
Gopu s
 
Report File On RedTacton
Report File On RedTactonReport File On RedTacton
Report File On RedTacton
Rajendra Dangwal
 
Wearable electronics
Wearable electronicsWearable electronics
Wearable electronics
Arya Ls
 
Flexible e skin
Flexible e skinFlexible e skin
Flexible e skin
Rashmi Jeya Kumar
 

What's hot (20)

Human Area Network
Human Area NetworkHuman Area Network
Human Area Network
 
Red tacton
Red tactonRed tacton
Red tacton
 
Redtacton
Redtacton Redtacton
Redtacton
 
Redtacton final
Redtacton finalRedtacton final
Redtacton final
 
Red tacton
Red tactonRed tacton
Red tacton
 
Red tacton (1)
Red tacton (1)Red tacton (1)
Red tacton (1)
 
red tacton
red tactonred tacton
red tacton
 
Redtacton
RedtactonRedtacton
Redtacton
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
 
Red tacton
Red tacton Red tacton
Red tacton
 
Red Tacton
Red TactonRed Tacton
Red Tacton
 
E skin.pptx
E skin.pptxE skin.pptx
E skin.pptx
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
 
Redtacton
RedtactonRedtacton
Redtacton
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
 
Electronic' skin monitors heart, brain function
Electronic' skin monitors heart, brain functionElectronic' skin monitors heart, brain function
Electronic' skin monitors heart, brain function
 
Redtacton
RedtactonRedtacton
Redtacton
 
Report File On RedTacton
Report File On RedTactonReport File On RedTacton
Report File On RedTacton
 
Wearable electronics
Wearable electronicsWearable electronics
Wearable electronics
 
Flexible e skin
Flexible e skinFlexible e skin
Flexible e skin
 

Viewers also liked

Red Tacton
Red TactonRed Tacton
Red Tacton
ankitjain86
 
Red Tacton Final
Red Tacton FinalRed Tacton Final
Red Tacton Final
Akash Gajjar
 
RED TACTON
RED TACTONRED TACTON
RED TACTON
HITESH Kumawat
 
Red tacton
Red tactonRed tacton
Red tacton
namrathakommuri
 
Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless Communication
Dipaloke Arunodoy
 
Red tacton
Red tactonRed tacton
Red tacton
rdeepali92
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
Nisha Menon K
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
asharanick
 
under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communication
Dheeresh Kumar
 
“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2
Naveena N
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
Shubham Srivastava
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
jaisica
 
RedTacton
RedTactonRedTacton
RedTacton
Arun Raj
 

Viewers also liked (13)

Red Tacton
Red TactonRed Tacton
Red Tacton
 
Red Tacton Final
Red Tacton FinalRed Tacton Final
Red Tacton Final
 
RED TACTON
RED TACTONRED TACTON
RED TACTON
 
Red tacton
Red tactonRed tacton
Red tacton
 
Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless Communication
 
Red tacton
Red tactonRed tacton
Red tacton
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
 
under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communication
 
“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
RedTacton
RedTactonRedTacton
RedTacton
 

Similar to Red tacton

RedTacton Technology
RedTacton TechnologyRedTacton Technology
RedTacton Technology
Akshita Gupta
 
Red tacton
Red tactonRed tacton
Red tacton
Karthik Kumar
 
Redtacton
RedtactonRedtacton
redtactonfinal
redtactonfinalredtactonfinal
redtactonfinal
KannanKannan580928
 
Red tecton
Red tectonRed tecton
Red tecton
Ritanshu Goel
 
Red tacton
Red tactonRed tacton
Red tacton
Nikhil Prathapani
 
Redtacton
RedtactonRedtacton
Redtacton
RedtactonRedtacton
Redtacton
ravpha143
 
REDTACTON
REDTACTONREDTACTON
REDTACTON
shaikalu
 
RED TACTON
RED TACTONRED TACTON
RED TACTON
ashkar asr
 
Redtacton
Redtacton Redtacton
Redtacton
gobiga sundar
 
Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93
Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93
Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93
Internet Technology Matters (Internet Society)
 
Redtacton
RedtactonRedtacton
Redtacton
ajeesh n
 
IRJET- Redtacton
IRJET- RedtactonIRJET- Redtacton
IRJET- Redtacton
IRJET Journal
 
Redtacton
RedtactonRedtacton
Redtacton
Deevena Dayaal
 
Redtacton Technology Intro
Redtacton Technology IntroRedtacton Technology Intro
Redtacton Technology Intro
Akash Bhokare
 
Red Tacton(nsp1)
Red Tacton(nsp1)Red Tacton(nsp1)
Red Tacton(nsp1)
Sai Nukala
 
Ethernet and LIFI
Ethernet and LIFIEthernet and LIFI
Ethernet and LIFI
ROHIT JADHAV
 
Sem
SemSem

Similar to Red tacton (20)

RedTacton Technology
RedTacton TechnologyRedTacton Technology
RedTacton Technology
 
Red tacton
Red tactonRed tacton
Red tacton
 
Redtacton
RedtactonRedtacton
Redtacton
 
Myredtacton
MyredtactonMyredtacton
Myredtacton
 
redtactonfinal
redtactonfinalredtactonfinal
redtactonfinal
 
Red tecton
Red tectonRed tecton
Red tecton
 
Red tacton
Red tactonRed tacton
Red tacton
 
Redtacton
RedtactonRedtacton
Redtacton
 
Redtacton
RedtactonRedtacton
Redtacton
 
REDTACTON
REDTACTONREDTACTON
REDTACTON
 
RED TACTON
RED TACTONRED TACTON
RED TACTON
 
Redtacton
Redtacton Redtacton
Redtacton
 
Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93
Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93
Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93
 
Redtacton
RedtactonRedtacton
Redtacton
 
IRJET- Redtacton
IRJET- RedtactonIRJET- Redtacton
IRJET- Redtacton
 
Redtacton
RedtactonRedtacton
Redtacton
 
Redtacton Technology Intro
Redtacton Technology IntroRedtacton Technology Intro
Redtacton Technology Intro
 
Red Tacton(nsp1)
Red Tacton(nsp1)Red Tacton(nsp1)
Red Tacton(nsp1)
 
Ethernet and LIFI
Ethernet and LIFIEthernet and LIFI
Ethernet and LIFI
 
Sem
SemSem
Sem
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

Red tacton

  • 1. SESSION 2011-2012 SEMINAR on ‘Red Tacton Technology’ Submitted by: Vivesh Rathore Btech 3 rd year Department of electronics & Communication
  • 2. Red Tacton Developed by NTT from Japan. Red Tacton is a new Human Area Networking technology. Claims to send data over the surface of skin. Attains a speed up to 10 Mbps --- equivalent to a fast broadband connection. Uses weak electric fields on the surface of human body instead of relying on EM waves or light waves.
  • 4. PRINCIPLE AND MECHANISM Red Tacton relies upon the principle that the optical properties of an electro-optic crystal can vary according to the changes of a weak electric field.
  • 5. PROTOTYPES  Red Tacton Transceiver(PC card type)  Communicationspeed:10Mbps  Protocols: TCP/IP  Communication method: Half-duplex.  Interface: PCMCIA • Red Tacton Transceiver(Hub type) • Communicationspeed:10Mbps • Protocols :TCP/IP • Communication method : Half- duplex • Interface: RJ45 • Red Tacton Transceiver(Box type) • (under constructions)
  • 6. How Red Tacton works?
  • 7. Block Diagram of RedTacton Transceiver
  • 8.
  • 9. Advantages Communication by just a Simple Touch thus eliminating use of hectic arrangements of wires. Red Tacton provides high speed and accuracy .  Red Tacton transceiver electrodes are covered with an insulating film, so there is no way current can flow into users body. Very secure Data Transmission i.e., there is no problem of hacking since medium is our individual body. No need to insert smart cards, connect cables, tune frequencies, or any of the other inconveniences usually associated with today's electronic devices.
  • 10. Complex in Design. It is expensive as compared to other mechanism. Widespread marketing campaigns and education.
  • 11. Security applications User verification and unlocking with just a touch Automatic access log for confidential document storage
  • 12. Conclusion The performance of Red Tacton is better as compared to other technologies within short distance. There is no any type of problem of hackers as our body itself is the transmission media. Today main issue is speed which is solved by Red Tacton by providing very high speed of 10 Mbps within short distances. The evolution of this technology is a big achievement which would likely to be targeted for use in applications such as wireless headset ,medical application ,security applications and wireless transmission.
  • 13. References [1]www.oppapers.com/course/Communications- Networking/44/ [2]www.masternewmedia.org/2003/10/19/wireless_body _networkingat10.htm [3] www.circuitstoday.com [4] en.wikipedia.org/wiki/Red Tacton [5] http://www.spectrum.ieee.org/print/2596 Digit Magazine