Download - Teleimmersion Main Ppt
BYP.V.RAJA SHEKAR06S11F0031MCA FINAL YEAR
WHAT IS VIRTUAL REALITY WHAT IS HOLOGRAMIC IMAGE WHAT IS TELE IMMERSION APPLICATIONS ADVANTAGES DISADVANTAGES CONCLUSION REFERENCES
CONTENTS
Virtual Reality Definition:
A computer generated,‘immersive’ (or wide field),multi-sensory informationprogram which tracks a user in real time.
TELE IMMERSION
Tele-Immersion is the synthesis of Virtual Reality, video conferencing, and advanced computation
TI setup
Hardware and software technologies needed:- 3D real-time system for acquisition of
dynamic, real objects (Upenn)- static scene acquisition (UNC)- rendering and stereo display architecture
(UNC)- high precision headtracking system
(UNC) - modeling and manipulation with virtual
objects (Brown)- multi-person interaction and collaborative
architecture (Brown)
Camera arrangement
PC1
PC2PC3
PC4
PC5
C1
C2
C3
C4 C
5
C6
C7
C4 data
C3 data C5 data C4 data
C3
data
C2
data
C6 data C5 data
BW Latency Sensitive
Jitter Sensitive
Reliability Reqrmnt
Burstiness Packet Size
Protocol
Avatar (virtual representation)
Low Y Y Low Constant Small RTP / UDP
Audio conference
Med Y Y Low Constant Med RTP / UDP
Video conference
High Y Y Low Constant Large RTP / UDP
Realtime state updates
Low Y Y Med Short bursts
Small FEC
Non-realtime state updates
Low N N High App dependent
Small TCP
Small bulk data
(image files)
Med N N High Medium bursts
Large TCP/CPTCP
Large bulk data(raw data sets)
High N N High Very long bursts
Large PTCP / RBUDP
Streaming bulk data
(high quality audio/video/bitmap/polygons)
High Y N High Long bursts
Large SRBUDP / AFEC
Characteristics of Tele-Immersion Flows
Applications:
- tele-diagnostics- tele-assisted surgery- advanced surgical training
- preoperative planning
Other:- tele-meetings- tele-collaborative design- computer supported training and education- 3D interactive video- entertainment
Advantages
Eliminates the barriers of space and time.
Conclusion In order to encourage applications, a better
level of communication among network engineers, application programmers, and scientists needs to be supported. The nomenclature and styles of networking access and engineering are essentially totally disjoint from the way application programmers and computational scientists write programs and use computers. Security and Acceptable Use Policy (AUP) considerations are typically idiosyncratic at computer sites, yet need to be uniform, or at least interoperable, for networks to support applications.