RED Tacton: Presented By

You might also like

You are on page 1of 13

RED TACTON

Presented by:Ashutosh Hema kashyap neeti bisht

INTRODUCTION
Human Area Networking technology Technology that transfers data through body to a computer. Red Tacton uses the ultra weak electric field naturally emitted on your bodys surface to transfer data.

BASIC PRINCIPLE
Achieve duplex communication over the human body . Speed 10 Mbps.

MECHANISM
RedTacton will enable ubiquitous services based on human-centered interactions more intimate and easier for people to use. sensitive electric field sensing technology.

HUMAN AREA NETWORK


Human society is entering an era of ubiquitous computing, where everything is networked. By making Human Area Networks feasible

FEATURES
Duplex communication.
With one touch communication is possible. Data transfer at a maximum speed of 10Mbps in any media.

The transmission path is on the surface of the body, transmission speed does not deteriorate in congested areas.

COMPARISION WITH OTHER TECHNOLOGIES


Used for ultimate close range communication . Allow communication without connectors. More secure than Bluetooth. Superior than infrared technology and wi-Fi. Difficult to intercept.

PROTOTYPES
1. Security Devices
Portable Card-Size Transmitter

Transmission rate: 230Kbps Protocol: Proprietary protocol Transmission method: Unidirectional


Embedded Receiver

Transmission rate: 230Kbps Protocol: Proprietary protocol Transmission method: Unidirectional

2.Data Transmission Devices


1.PC Card Transceiver

Transmission rate: 10Mbp


2.Embedded Receiver

Protocol: TCP/IP Transmission method: Halfduplex

Transmission rate: 10Mbp Protocol: TCP/IP Transmission method: Half-duplex


3.USB Transceiver

Transmission rate not


yet determined (in testing stage)

APPLICATIONS-one to one service


ELIMINATION OF HUMAN ERROR.

Marketing application (content awareness)

-Intuitive action

-Personalisation

Instant private data exchange

Personalisation of mobile phone

Touch a printer to print

Personalisation of automobiles

-New behavior pattern

-Security applications

Conferencing system

User verification and lock managament at entrance

wearable

Confidential document management

You might also like