SlideShare a Scribd company logo
WELCOME
TRANSFERJET




          Presented by
          NIKHIL P
INTRODUCTION
 TransferJet is an extremely simple wireless
technology which eliminates the need for
complex setup and operation. For example, just
touching a TV with a digital camera enables
photos to be instantaneously displayed on the TV
screen. Alternatively, downloaded music content
can be easily enjoyed by touching a mobile phone
to a portable audio player. TransferJet can be
used as a Universal Interface among a wide
variety of consumer electronics devices.
TRANSFERJET
• It is a new technology




               SPEED OF     EASE OF
                 UWB          NFC




• Speed of 560 mbps through a simple “touch”
Ultra-Wide Band
• UWB differs substantially from conventional
  narrowband radio frequency and spread
  spectrum technologies , such as Bluetooth
  Technology and WiFi.
• UWB uses an extremely wide band of RF
  spectrum to transmit data.
• UWB is able to transmit more data in a given
  period of time than the more traditional
  technologies.
Near field communication
• NFC is a set of standards for smartphones and
  similar devices to establish radio
  communication with each other by touching
  them together or bringing them into close
  proximity
• usually not more than a few centimetres
• simplified setup of more complex
  communications such as Wi-Fi
Positioning of Transferjet
TARGET LOGO
• The target point logo shall be displayed on all
  TransferJet products.
• The target point logo is used to inform the
  users about the location where the products
  should be touched. Therefore, it should be
  displayed visibly and clearly, and placed where
  it is easy for users to touch.
Use Cases
• File Exchange

• File access and Real-time content consumption

• Print Services
Use Cases
• File Exchange
-It enables high speed transfer of large data files between
    two electronic products
-User can push any data file from his mobile terminal to
    another mobile terminal just by touching
-Alternatively, the user can get any data file from another
    mobile terminal with a similar touch operation.
-In most cases, the data to transfer has been selected by the
    sender and, therefore, the receiver does not have to
    select the file but just touch and receive it.
File Exchange
Use Cases
• File access and realtime content consumption
-A user might access a file system on his mobile terminal by
   placing it on a TransferJet target point connected to a
   host terminal such as a computer, digital TV, projector or
   other device.
-Once connected, one can access, retrieve, manage, and
   execute any files on the mobile terminal in the same way
   as local files.
-A family can display digital photos and movies on their
   living room TV by touching the camera or camcorder to
   the TV itself or placing on a TransferJet pad connected to
   a TV. The user can control the playback with the TV
   remote.
Use Cases
• Print Services
- If a file is transferred to a printer, it should be printed
  in an appropriate manner. In general, there are two
  possible ways of printing. A user may operate her/his
  mobile terminal to select the specific file to print and
  then touch the printer, which will then print in its
  default mode.
- Alternatively, a user may put the mobile terminal on
  a TransferJet pad of the printer, and then select a file
  to print by operating the printer.
Technical Implementation
• It support two major existing protocols
-OBEX(Object Exchange)
-SCSI(Small Computer System Interface)

By adopting these well defined protocols, it is possible
  to incorporate TransferJet into a variety of
  commercial products, services and applications.
OBEX
• OBEX is a communication protocol that facilitates the
  exchange of binary objects between devices. It is
  maintained by the Infrared Data Association but has
  also been adopted by the Bluetooth Special Interest
  Group and the SyncML wing of the Open Mobile
  Alliance (OMA). One of OBEX's earliest popular
  applications was in the Palm III PDA. This PDA and its
  many successors use OBEX to exchange business
  cards, data, even applications.
• Although OBEX was initially designed for infrared, it
  has now been adopted by Bluetooth, and is also used
  over USB, WAP, and in devices such as Livescribe smart-
  pens.
SCSI
• Small Computer System Interface is a set of standards
  for physically connecting and transferring data
  between computers and peripheral devices
• SCSI is most commonly used for hard disks and tape
  drives, but it can connect a wide range of other devices
• In addition to faster data rates, SCSI is more flexible
  than earlier parallel data transfer interfaces. The latest
  SCSI standard, Ultra-2 SCSI for a 16-bit bus can transfer
  data at up to 80 MBps
Technical Implementation
The file exchange is realized by utilizing the OBEX inbox
  service
The OBEX Folder Browsing Service and SCSI support the
  file access functions
Print services can be achieved by using either OBEX or
  SCSI.
Technology Overview
• The maximum range of operation is on the order of a few
  centimeters and the network topology is always point-
  to-point between two active devices.
• The short range makes it possible to operate in the near
  field of the radio signal using very little transmit power –
  at or below -70 dBm/MHz.
• The point-to-point topology simplifies the network setup
  and management procedures.
• And since the near field is a non-polarized field, the two
  devices do not have to be physically oriented to achieve a
  good connection.
Technology Overview
• In addition, TransferJet contains a robust protocol
  which includes error detection and
  correction, packet acknowledgement, and packet
  resend. All of these details work together to
  minimize complexity and interference.
• each TransferJet™ device can detect the presence
  of another device as it comes within range.
  Therefore, it is possible to save power by
  transmitting only when another device is
  detected. This is another advantage of the touch
  model.
Transferjet Security
• Transferjet is a near field, point-to-point
  technology, but it is still a wireless connection.
• WiFi and Bluetooth have extensive and complex
  encryption technology built into the link layer.

• Transferjet is more like a physical cable , so there is
  no encryption built into the link layer.
• For attacking a transferjet device the attacker should
  be too close to the device.
Transferjet Security
• By eliminating link layer protection the
  transferjet saves power and cost, and further
  reduces the complexity for the user.
• It is possible to add encryption at the
  application layer
• Transferjet is perfectly compatible with these
  application layer security measures. Since
  each device has a unique ID
• Transferjet achieves the best of both- the
  simplicity of touch and the security of a cable
Transferjet Connection
• The short range of a few centimeters gives a
    tremendous advantages
 like
-low power consumption
-it eliminates multipath fading or shadowing that
    occurs in long range solutions
-Thus the connection is very reliable without the
    need for complex equalizers or advanced signal
    processing such as OFDM.
-This also helps to minimize cost
Transferjet Connection
• the biggest advantage is the ability for each
  Transferjet device to discover another Transferjet
  device that comes within range.
• As with every other wireless protocol, devices
  must proceed through the necessary stages –
  search, discovery, selection, authentication, conn
  ection, and transfer – in order to complete a
  desired activity.
• But Transferjet is unique because all these steps
  are collapsed into a single motion: the “touch”.
Transferjet Coupler
• newly developed "TransferJet Coupler" is based on
  electric induction field coupling to deliver superior
  propagation performance compared to conventional
  radiation field based antennas.
• It maintains high transmission gain and efficient
  coupling in near-field proximity, while providing sharp
  attenuation over longer distances to avoid interference
  with other wireless systems.
  Furthermore, as there is no antenna polarization it is
  possible to transmit data without any performance
  loss, regardless of the contact angle of the electronic
  devices.
Transferjet Layer Model
          Layer 6, Layer 7
         USER APPLICATION



               Layer 5
     PROTOCOL CONVERSION LAYER



           Layer 2, Layer 4
         CONNECTION LAYER



              Layer 1
           PHYSICAL LAYER
PHYSICAL LAYER
• During transmission, the Physical Layer (PHY)
  receives the digital data stream from the
  upper Connection Layer (CNL)
• and converts to an analog RF signal centered
  at 4.48 GHz,
• During reception, the PHY performs the
  reverse operations to convert the RF signal
  from the coupler into a digital data stream
  that can be handled by the upper CNL.
Frame Format




PHY and CNL packet structure
CONNECTION LAYER
• The main functions of the Connection Layer (CNL)
  consist of establishing, maintaining and releasing the
  connection, or data link, between the two devices, as
  well as ensuring the integrity of the data transfer.
• One CNL Protocol Data Unit (CPDU) contains headers,
  subheaders, CRC bits and either one or two payload,
  each having 1-4096 Bytes of data.
• Since all connections are point-to-point, there is no
  network or IP layer in the protocol stack and the CNL
  exchanges data directly with the upper PCL
CONNECTION LAYER
• In terms of functionality, the device that
  transmits the initial connection request is defined
  as the “initiator” while the device that responds
  and accepts the request is called the “responder”.
• The initiator may send out the request signals
  continuously or in specific moments. The
  responder search state can minimize power
  consumption by means of intermittent operation.
PROTOCOL CONVERSION LAYER
• The Protocol Conversion Layer provides the
  necessary control functions to enable basic
  communications with the upper layer as well
  as the adapter functions to map the lower CNL
  layer to the upper applications and system
  interfaces.
PROTOCOL CONVERSION LAYER
• The PCL Controller offers common services, such as initialization and basic
  communications (connection setup, release, and device authentication) to
  the Upper Layer.

• 1. Connection Management service
  The PCL Controller provides a service that manages the establishment and
  release of a connection between two TransferJet devices. When two
  TransferJet devices enter the communication range, the service
  establishes a CNL connection, unless the Device Modes of both devices
  are Reactive Mode.
• 2. Device Authentication service
  The PCL Controller provides a service for authenticating CNL-connected
  TransferJet devices. This device authentication is mutual.
• 3. Application-Service Control service
  This service provides a framework for CNL-connected TransferJet devices
  to determine the desired Application-Service
Transferjet vs Bluetooth
• Transfer Jet system has the advantage of
  operating at a much higher throughput rate while
  not having the security concerns that can be
  found in a Bluetooth connection.
• For example, with Bluetooth, transfer of data
  takes place over a range of several feet. Since the
  signal is not encrypted, it can be intercepted by
  other Bluetooth devices. A short 3cm
  transmission distance minimizes any risks of data
  theft.
Transferjet vs Bluetooth
• Unlike Bluetooth and other wireless data transfer
  protocols, there is no risk of unauthorized access
  because Transfer Jet can recognize and connect
  to specific devices only.
• In addition, the short transmission distance
  minimizes data leakage without the need for
  complex security measures or setup procedures.
  Users can specify and determine restricted access
  to Transfer Jet capable devices
Some Applications
FUTURE OF TRANSFERJET
• The TransferJet Consortium consists of Sony, Canon,
  Eastman Kodak, Hitachi, Victor Company of Japan, KDDI,
  Kenwood, Matsushita Electric Industrial (Panasonic), Nikon,
  Olympus, Pioneer, Samsung, Seiko Epson, Sony Ericsson
  Mobile Communications, and Toshiba.

• The group will develop specifications and guidelines to
  ensure interoperability between products that incorporate
  the technology. The consortium will also promote the
  advantages of this new technology across industries and
  directly to consumers, hoping, ultimately, to create and
  expand the market for TransferJet products.
TRANSFERJET CONSORTIUM
• The TransferJet Consortium was established by a
  group of international companies in July of 2008.
  The TransferJet Consortium focuses on the
  development of the specifications, compliance
  testing processes, certification program, as well
  as conduct marketing activities to promote the
  TransferJet™ technology, products, applications
  and services across industries and to consumers.
  Through these initiatives, the TransferJet
  Consortium aims to create, support and expand
  the market for TransferJet™ products.
CONCLUSION
• Transferjet is a technology, still in the works by
  Sony and few other Japanese firms, which was
  recently unveiled to great awe. Transferjet have a
  data throughput of 375 Mbps which is far higher
  than existing technologies such as Bluetooth or
  even NFC. “This is definitely a huge advantage but
  Transferjet still has a long way to go in convincing
  the market of its commerical viability, security
  and regulatory restrictions. Currently, even the
  costs associated with transferjet are not known.
REFERENCE
• www.transferjet.org/
• www.engadget.com/tag/transferjet/
• http://en.wikipedia.org/wiki/TransferJet
THANKYOU

More Related Content

What's hot

NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentationAkshat Rohatgi
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Tejasvi Kurusetti
 
5G Presentation
5G Presentation5G Presentation
5G Presentation
Ericsson
 
5 g ran architcture
5 g ran architcture5 g ran architcture
5 g ran architcture
Hemraj Kumar
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
ronak1207
 
IoT Platforms and Architecture
IoT Platforms and ArchitectureIoT Platforms and Architecture
IoT Platforms and Architecture
Lee House
 
5G Technology Seminar Presentation.
5G Technology Seminar Presentation.5G Technology Seminar Presentation.
5G Technology Seminar Presentation.
snehithkumardhammoju
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology ppt
ijaranjani
 
Electronics private automatic branch exchange
Electronics private automatic branch exchangeElectronics private automatic branch exchange
Electronics private automatic branch exchangeNaveen Sihag
 
Part 10: 5G Use cases - 5G for Absolute Beginners
Part 10: 5G Use cases - 5G for Absolute BeginnersPart 10: 5G Use cases - 5G for Absolute Beginners
Part 10: 5G Use cases - 5G for Absolute Beginners
3G4G
 
Expanding the 5G NR (New Radio) ecosystem
Expanding the 5G NR (New Radio) ecosystemExpanding the 5G NR (New Radio) ecosystem
Expanding the 5G NR (New Radio) ecosystem
Qualcomm Research
 
Misc: Non millimeter Wave (mmWave) 5G
Misc: Non millimeter Wave (mmWave) 5GMisc: Non millimeter Wave (mmWave) 5G
Misc: Non millimeter Wave (mmWave) 5G
3G4G
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
Harisankar U K
 
Beginners: Introduction to 5G Reduced Capability (RedCap) Devices
Beginners: Introduction to 5G Reduced Capability (RedCap) DevicesBeginners: Introduction to 5G Reduced Capability (RedCap) Devices
Beginners: Introduction to 5G Reduced Capability (RedCap) Devices
3G4G
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
Seminar Links
 
Architecture of 5G
Architecture of 5GArchitecture of 5G
Architecture of 5G
Udara Sandaruwan
 
Zigbee ppt
Zigbee pptZigbee ppt
Zigbee ppt
Pranjul Rastogi
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology Tutorial
APNIC
 
Making 5G NR a reality
Making 5G NR a realityMaking 5G NR a reality
Making 5G NR a reality
Qualcomm Research
 

What's hot (20)

NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
5G Presentation
5G Presentation5G Presentation
5G Presentation
 
5 g ran architcture
5 g ran architcture5 g ran architcture
5 g ran architcture
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
IoT Platforms and Architecture
IoT Platforms and ArchitectureIoT Platforms and Architecture
IoT Platforms and Architecture
 
5G Technology Seminar Presentation.
5G Technology Seminar Presentation.5G Technology Seminar Presentation.
5G Technology Seminar Presentation.
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology ppt
 
Electronics private automatic branch exchange
Electronics private automatic branch exchangeElectronics private automatic branch exchange
Electronics private automatic branch exchange
 
Part 10: 5G Use cases - 5G for Absolute Beginners
Part 10: 5G Use cases - 5G for Absolute BeginnersPart 10: 5G Use cases - 5G for Absolute Beginners
Part 10: 5G Use cases - 5G for Absolute Beginners
 
Expanding the 5G NR (New Radio) ecosystem
Expanding the 5G NR (New Radio) ecosystemExpanding the 5G NR (New Radio) ecosystem
Expanding the 5G NR (New Radio) ecosystem
 
EPABX new
EPABX newEPABX new
EPABX new
 
Misc: Non millimeter Wave (mmWave) 5G
Misc: Non millimeter Wave (mmWave) 5GMisc: Non millimeter Wave (mmWave) 5G
Misc: Non millimeter Wave (mmWave) 5G
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Beginners: Introduction to 5G Reduced Capability (RedCap) Devices
Beginners: Introduction to 5G Reduced Capability (RedCap) DevicesBeginners: Introduction to 5G Reduced Capability (RedCap) Devices
Beginners: Introduction to 5G Reduced Capability (RedCap) Devices
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Architecture of 5G
Architecture of 5GArchitecture of 5G
Architecture of 5G
 
Zigbee ppt
Zigbee pptZigbee ppt
Zigbee ppt
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology Tutorial
 
Making 5G NR a reality
Making 5G NR a realityMaking 5G NR a reality
Making 5G NR a reality
 

Similar to Transferjet

Bsnl Training Report
Bsnl Training ReportBsnl Training Report
Bsnl Training Report
Nikhil Kumar
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
Suman Bhattacharyya
 
SEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotSEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotKamonasish Hore
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
mv9499596
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
VENNILAV6
 
Bluetooth
BluetoothBluetooth
Bluetooth
Kashyap Shah
 
ETE405-lec4.pdf
ETE405-lec4.pdfETE405-lec4.pdf
ETE405-lec4.pdfmashiur
 
Computer networks
Computer networksComputer networks
Computer networks
Keerty Smile
 
Jayeed 062424056 Ete605 Sec 2
Jayeed 062424056 Ete605 Sec 2Jayeed 062424056 Ete605 Sec 2
Jayeed 062424056 Ete605 Sec 2mashiur
 
Introduction to Computer Network
Introduction to Computer NetworkIntroduction to Computer Network
Introduction to Computer Network
Adetula Bunmi
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
shahinaz Altabbakh
 
Mobile communication &computing
Mobile communication &computingMobile communication &computing
Mobile communication &computing
RUpaliLohar
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
Samit Singh
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Mark Rotondella
 
Data Communication and Network World of Bluetooth
Data Communication and Network World of BluetoothData Communication and Network World of Bluetooth
Data Communication and Network World of Bluetooth
Chandrakant Divate
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
Archana Dwivedi
 

Similar to Transferjet (20)

Bsnl Training Report
Bsnl Training ReportBsnl Training Report
Bsnl Training Report
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
SEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotSEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth Hotspot
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
ETE405-lec4.pdf
ETE405-lec4.pdfETE405-lec4.pdf
ETE405-lec4.pdf
 
Technology Products
Technology ProductsTechnology Products
Technology Products
 
Computer networks
Computer networksComputer networks
Computer networks
 
Jayeed 062424056 Ete605 Sec 2
Jayeed 062424056 Ete605 Sec 2Jayeed 062424056 Ete605 Sec 2
Jayeed 062424056 Ete605 Sec 2
 
Introduction to Computer Network
Introduction to Computer NetworkIntroduction to Computer Network
Introduction to Computer Network
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Itm 4
Itm 4Itm 4
Itm 4
 
Mobile communication &computing
Mobile communication &computingMobile communication &computing
Mobile communication &computing
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
REDTACTON
REDTACTONREDTACTON
REDTACTON
 
Data Communication and Network World of Bluetooth
Data Communication and Network World of BluetoothData Communication and Network World of Bluetooth
Data Communication and Network World of Bluetooth
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Transferjet

  • 2. TRANSFERJET Presented by NIKHIL P
  • 3. INTRODUCTION TransferJet is an extremely simple wireless technology which eliminates the need for complex setup and operation. For example, just touching a TV with a digital camera enables photos to be instantaneously displayed on the TV screen. Alternatively, downloaded music content can be easily enjoyed by touching a mobile phone to a portable audio player. TransferJet can be used as a Universal Interface among a wide variety of consumer electronics devices.
  • 4. TRANSFERJET • It is a new technology SPEED OF EASE OF UWB NFC • Speed of 560 mbps through a simple “touch”
  • 5. Ultra-Wide Band • UWB differs substantially from conventional narrowband radio frequency and spread spectrum technologies , such as Bluetooth Technology and WiFi. • UWB uses an extremely wide band of RF spectrum to transmit data. • UWB is able to transmit more data in a given period of time than the more traditional technologies.
  • 6. Near field communication • NFC is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity • usually not more than a few centimetres • simplified setup of more complex communications such as Wi-Fi
  • 8. TARGET LOGO • The target point logo shall be displayed on all TransferJet products. • The target point logo is used to inform the users about the location where the products should be touched. Therefore, it should be displayed visibly and clearly, and placed where it is easy for users to touch.
  • 9. Use Cases • File Exchange • File access and Real-time content consumption • Print Services
  • 10. Use Cases • File Exchange -It enables high speed transfer of large data files between two electronic products -User can push any data file from his mobile terminal to another mobile terminal just by touching -Alternatively, the user can get any data file from another mobile terminal with a similar touch operation. -In most cases, the data to transfer has been selected by the sender and, therefore, the receiver does not have to select the file but just touch and receive it.
  • 12. Use Cases • File access and realtime content consumption -A user might access a file system on his mobile terminal by placing it on a TransferJet target point connected to a host terminal such as a computer, digital TV, projector or other device. -Once connected, one can access, retrieve, manage, and execute any files on the mobile terminal in the same way as local files. -A family can display digital photos and movies on their living room TV by touching the camera or camcorder to the TV itself or placing on a TransferJet pad connected to a TV. The user can control the playback with the TV remote.
  • 13.
  • 14. Use Cases • Print Services - If a file is transferred to a printer, it should be printed in an appropriate manner. In general, there are two possible ways of printing. A user may operate her/his mobile terminal to select the specific file to print and then touch the printer, which will then print in its default mode. - Alternatively, a user may put the mobile terminal on a TransferJet pad of the printer, and then select a file to print by operating the printer.
  • 15.
  • 16. Technical Implementation • It support two major existing protocols -OBEX(Object Exchange) -SCSI(Small Computer System Interface) By adopting these well defined protocols, it is possible to incorporate TransferJet into a variety of commercial products, services and applications.
  • 17. OBEX • OBEX is a communication protocol that facilitates the exchange of binary objects between devices. It is maintained by the Infrared Data Association but has also been adopted by the Bluetooth Special Interest Group and the SyncML wing of the Open Mobile Alliance (OMA). One of OBEX's earliest popular applications was in the Palm III PDA. This PDA and its many successors use OBEX to exchange business cards, data, even applications. • Although OBEX was initially designed for infrared, it has now been adopted by Bluetooth, and is also used over USB, WAP, and in devices such as Livescribe smart- pens.
  • 18. SCSI • Small Computer System Interface is a set of standards for physically connecting and transferring data between computers and peripheral devices • SCSI is most commonly used for hard disks and tape drives, but it can connect a wide range of other devices • In addition to faster data rates, SCSI is more flexible than earlier parallel data transfer interfaces. The latest SCSI standard, Ultra-2 SCSI for a 16-bit bus can transfer data at up to 80 MBps
  • 19. Technical Implementation The file exchange is realized by utilizing the OBEX inbox service The OBEX Folder Browsing Service and SCSI support the file access functions Print services can be achieved by using either OBEX or SCSI.
  • 20. Technology Overview • The maximum range of operation is on the order of a few centimeters and the network topology is always point- to-point between two active devices. • The short range makes it possible to operate in the near field of the radio signal using very little transmit power – at or below -70 dBm/MHz. • The point-to-point topology simplifies the network setup and management procedures. • And since the near field is a non-polarized field, the two devices do not have to be physically oriented to achieve a good connection.
  • 21. Technology Overview • In addition, TransferJet contains a robust protocol which includes error detection and correction, packet acknowledgement, and packet resend. All of these details work together to minimize complexity and interference. • each TransferJet™ device can detect the presence of another device as it comes within range. Therefore, it is possible to save power by transmitting only when another device is detected. This is another advantage of the touch model.
  • 22. Transferjet Security • Transferjet is a near field, point-to-point technology, but it is still a wireless connection. • WiFi and Bluetooth have extensive and complex encryption technology built into the link layer. • Transferjet is more like a physical cable , so there is no encryption built into the link layer. • For attacking a transferjet device the attacker should be too close to the device.
  • 23. Transferjet Security • By eliminating link layer protection the transferjet saves power and cost, and further reduces the complexity for the user. • It is possible to add encryption at the application layer • Transferjet is perfectly compatible with these application layer security measures. Since each device has a unique ID • Transferjet achieves the best of both- the simplicity of touch and the security of a cable
  • 24. Transferjet Connection • The short range of a few centimeters gives a tremendous advantages like -low power consumption -it eliminates multipath fading or shadowing that occurs in long range solutions -Thus the connection is very reliable without the need for complex equalizers or advanced signal processing such as OFDM. -This also helps to minimize cost
  • 25. Transferjet Connection • the biggest advantage is the ability for each Transferjet device to discover another Transferjet device that comes within range. • As with every other wireless protocol, devices must proceed through the necessary stages – search, discovery, selection, authentication, conn ection, and transfer – in order to complete a desired activity. • But Transferjet is unique because all these steps are collapsed into a single motion: the “touch”.
  • 26. Transferjet Coupler • newly developed "TransferJet Coupler" is based on electric induction field coupling to deliver superior propagation performance compared to conventional radiation field based antennas. • It maintains high transmission gain and efficient coupling in near-field proximity, while providing sharp attenuation over longer distances to avoid interference with other wireless systems. Furthermore, as there is no antenna polarization it is possible to transmit data without any performance loss, regardless of the contact angle of the electronic devices.
  • 27. Transferjet Layer Model Layer 6, Layer 7 USER APPLICATION Layer 5 PROTOCOL CONVERSION LAYER Layer 2, Layer 4 CONNECTION LAYER Layer 1 PHYSICAL LAYER
  • 28. PHYSICAL LAYER • During transmission, the Physical Layer (PHY) receives the digital data stream from the upper Connection Layer (CNL) • and converts to an analog RF signal centered at 4.48 GHz, • During reception, the PHY performs the reverse operations to convert the RF signal from the coupler into a digital data stream that can be handled by the upper CNL.
  • 29. Frame Format PHY and CNL packet structure
  • 30. CONNECTION LAYER • The main functions of the Connection Layer (CNL) consist of establishing, maintaining and releasing the connection, or data link, between the two devices, as well as ensuring the integrity of the data transfer. • One CNL Protocol Data Unit (CPDU) contains headers, subheaders, CRC bits and either one or two payload, each having 1-4096 Bytes of data. • Since all connections are point-to-point, there is no network or IP layer in the protocol stack and the CNL exchanges data directly with the upper PCL
  • 31. CONNECTION LAYER • In terms of functionality, the device that transmits the initial connection request is defined as the “initiator” while the device that responds and accepts the request is called the “responder”. • The initiator may send out the request signals continuously or in specific moments. The responder search state can minimize power consumption by means of intermittent operation.
  • 32. PROTOCOL CONVERSION LAYER • The Protocol Conversion Layer provides the necessary control functions to enable basic communications with the upper layer as well as the adapter functions to map the lower CNL layer to the upper applications and system interfaces.
  • 33. PROTOCOL CONVERSION LAYER • The PCL Controller offers common services, such as initialization and basic communications (connection setup, release, and device authentication) to the Upper Layer. • 1. Connection Management service The PCL Controller provides a service that manages the establishment and release of a connection between two TransferJet devices. When two TransferJet devices enter the communication range, the service establishes a CNL connection, unless the Device Modes of both devices are Reactive Mode. • 2. Device Authentication service The PCL Controller provides a service for authenticating CNL-connected TransferJet devices. This device authentication is mutual. • 3. Application-Service Control service This service provides a framework for CNL-connected TransferJet devices to determine the desired Application-Service
  • 34. Transferjet vs Bluetooth • Transfer Jet system has the advantage of operating at a much higher throughput rate while not having the security concerns that can be found in a Bluetooth connection. • For example, with Bluetooth, transfer of data takes place over a range of several feet. Since the signal is not encrypted, it can be intercepted by other Bluetooth devices. A short 3cm transmission distance minimizes any risks of data theft.
  • 35. Transferjet vs Bluetooth • Unlike Bluetooth and other wireless data transfer protocols, there is no risk of unauthorized access because Transfer Jet can recognize and connect to specific devices only. • In addition, the short transmission distance minimizes data leakage without the need for complex security measures or setup procedures. Users can specify and determine restricted access to Transfer Jet capable devices
  • 37. FUTURE OF TRANSFERJET • The TransferJet Consortium consists of Sony, Canon, Eastman Kodak, Hitachi, Victor Company of Japan, KDDI, Kenwood, Matsushita Electric Industrial (Panasonic), Nikon, Olympus, Pioneer, Samsung, Seiko Epson, Sony Ericsson Mobile Communications, and Toshiba. • The group will develop specifications and guidelines to ensure interoperability between products that incorporate the technology. The consortium will also promote the advantages of this new technology across industries and directly to consumers, hoping, ultimately, to create and expand the market for TransferJet products.
  • 38. TRANSFERJET CONSORTIUM • The TransferJet Consortium was established by a group of international companies in July of 2008. The TransferJet Consortium focuses on the development of the specifications, compliance testing processes, certification program, as well as conduct marketing activities to promote the TransferJet™ technology, products, applications and services across industries and to consumers. Through these initiatives, the TransferJet Consortium aims to create, support and expand the market for TransferJet™ products.
  • 39. CONCLUSION • Transferjet is a technology, still in the works by Sony and few other Japanese firms, which was recently unveiled to great awe. Transferjet have a data throughput of 375 Mbps which is far higher than existing technologies such as Bluetooth or even NFC. “This is definitely a huge advantage but Transferjet still has a long way to go in convincing the market of its commerical viability, security and regulatory restrictions. Currently, even the costs associated with transferjet are not known.