ubiquitous networking

25
Case Study On Computer Network Subject Incharge- Mr. Ramesh Shahbade Mrs.Surekha Janrao Submitted by- Shweta Killedar Sakshi Yadav Sayari Mandal Abhinav Wagadre TE - B Department Of Computer Engineering, Terna Engineering College,Nerul.

Upload: abhinav-wagadre

Post on 27-Jun-2015

292 views

Category:

Education


3 download

DESCRIPTION

Computer Network.

TRANSCRIPT

Page 1: Ubiquitous networking

Case Study On Computer Network

Subject Incharge- Mr. Ramesh Shahbade Mrs.Surekha Janrao

Submitted by- Shweta Killedar Sakshi Yadav Sayari Mandal Abhinav Wagadre

TE - BDepartment Of Computer Engineering,

Terna Engineering College,Nerul.

Page 2: Ubiquitous networking

Ubiquitous Ubiquitous NetworkingNetworking

Page 3: Ubiquitous networking

Contents-

Introduction to the term Ubiquity.

What is Ubiquitous Computing and What Ubiquitous Computing isn’t ?

Power Of Ubiquitous Computing.

Major Trends Of Computing.

Introduction to Ubiquitous Networking.

Working of Ubiquitous Networking.

Applications.

Page 4: Ubiquitous networking

“Anytime, anywhere”.

It is total mobility

The concept of using ubiquity in the computing world, beyond the desktop is going to be a new paradigm in the Information Technology.

Page 5: Ubiquitous networking

Ubiquitous Computing Ubiquitous computing

is enhancing computer

use by making many computers available throughout the physical environment but making the effectively invisible to the user.

It is also called

"UBICOMP".

Page 6: Ubiquitous networking

What Ubiquitous Computing Isn't

•  Ubiquitous computing is opposite of virtual reality.

• The difference between ubiquitous computing and virtual reality is that virtual reality puts people inside a computer world but ubiquitous computing forces the computer to live in the world with people. 

Page 7: Ubiquitous networking

Power Of Ubiquitous Computing

Page 8: Ubiquitous networking

History• Mark Weiser coined the phrase "ubiquitous computing" around 1988.Both alone and

with PARC Director and Chief Scientist John Seely Brown, Weiser wrote some of the earliest papers on the subject.

• Dr. Ken Sakamura of University of Tokyo, Japan leads the Ubiquitous Networking Laboratory (UNL), Tokyo as well as the T-Engine Forum. 

• MIT has also contributed significant research in this field .

• Other major contributors include Georgia Tech's College of Computing, NYU's Interactive Telecommunications Program,UC Irvine's Department of Informatics, Microsoft Research, Intel Research and Equator,[13] Ajou University UCRi & CUS.

Page 9: Ubiquitous networking

Major Trends In Computing• These trends are coming from the results

of computing getting smaller, faster, and cheaper.

• The First Wave was many people per computer ( Mainframe Era )

• The Second Wave was one person per computer. ( PC Era )

• The Third Wave will be many computers per person. ( Ubicomp Era )

Page 10: Ubiquitous networking

Major Trends In Computing

Page 11: Ubiquitous networking

Ubiquitous Networking• Ubiquitous networking is

the actual implementation of the ubiquitous computing.

• Ubiquitous networks are an IT paradigm comprising

1. Network infrastructures featuring broadband, mobile and constant Internet access,

2. Diverse information equipment that provides access to internet Protocol version 6(Ipv6), and

3. Seamlessly linked interactive contents.

Page 12: Ubiquitous networking

How Ubiquitous Networking Will Work

• A ubiquitous networking system is that which allows your program applications to follow you wherever you go.

•Following is just a single way that could be used to implement the Ubiquitous Networking.

• There are 3 steps to the working of such a network.

Page 13: Ubiquitous networking

Step 1: Send Out the Bat Signal

• The AT&T researchers came up with the ultrasonic location system.

• This tracking system has three basic parts:

1.Bats - small ultrasonic transmitters worn by users

2.Receivers - ultrasonic signal detectors embedded in ceiling

3.Central controller - coordinates the bats and receiver chains

Page 14: Ubiquitous networking

Step 1: Send Out the Bat Signal

• Users within the system will wear a bat, a small device that transmits a 48-bit code to the receivers in the ceiling. Bats also have an imbedded transmitter, which allows it to communicate with the central controller using a bi-directional 433-MHz radio link.

• A bat will transmit an ultrasonic signal, which will be detected by receivers located in the ceiling approximately feet (1.2 m) apart in a square grid.

• An object’s location is found using trilateration, a position-finding technique that measures the objects distance in relation to three reference points.

Page 15: Ubiquitous networking

Step 1: Send Out the Bat Signal

• Trilateration works by measuring the distance from the bat worn by the user to three sensors in the ceiling. Researchers can locate a user's position to within 1.18 inches or

3 cms.

Page 16: Ubiquitous networking

Step 2: In The Zone• With an ultrasonic location system in

place, it’s possible for any device fitted with a bat to become yours at the push of a button.

• The central controller creates a zone around every person and object within the location system .

• When all the sensors and bats are in place, they are included in a virtual map of the building.

• The computer uses a spatial monitor to detect if a user’s zone overlaps with the zone of a device.

• If the zone’s do overlap, then the user can become the temporary owner of the device.

(This screen shot on the left shows how the users' zones and object zones will overlap. The user

now owns the device).

Page 17: Ubiquitous networking

Step 3: Information Hoopers & Smart Posters

Information Hoopers Once these zones are set up ,the

system will help us store and retrieve data in an "information hopper." This is a timeline of information that keeps track of when data is created. The hopper knows who created it, where they were and whom they were with.

Page 18: Ubiquitous networking

Step 3: Information Hoopers & Smart Posters

Smart Posters• A smart poster will have

buttons printed on to it that can be triggered by a bat.

• Smart posters will be used to control any device that is plugged into the network.

• The poster will know where to send a file and a user’s preferences.

Page 19: Ubiquitous networking

Step 3: Information Hoopers & Smart Posters

Smart Posters• To press a button on a smart poster, a user will

simply place his or her bat on the smart poster button and click the bat.

• The system automatically knows who is pressing the poster’s button. Posters can be created with

several buttons on it.

Page 20: Ubiquitous networking

Applications

The combination of ubiquitous networking, mobility and ubiquitous computing devices will provide new opportunities for e-commerce products and services.

Page 21: Ubiquitous networking

Applications

The network can reach handhelds through a simple serial wire, infrared, or wireless digital radio and turn them into Internet clients and servers .

Page 22: Ubiquitous networking

Applications

Ubiquitous networking will allow connectivity to corporate applications anywhere, anytime. Employees will be able to retrieve and send information easily from their cars, mobile devices, and homes as well as from their offices.

Page 23: Ubiquitous networking

REFERENCES

•www.howstuffworks.com

•www.uk.research.att.com/spirit

•White-papers by Namura Research Institute

•A New Location Technique for the Active Office.IEEE.Personal Communications, Vol. 4, No. 5, October 1997, pp. 42-47.

•Sensor-driven Computing. PhD thesis, University of Cambridge, 1998.

•The Anatomy of a Context-Aware Application. Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM'99, Seattle, Washington, USA, August 1999, pp. 59-68.

Page 24: Ubiquitous networking
Page 25: Ubiquitous networking

QUESTIONS..??