RED TACTON

PRESENTED BY:ASHUTOSH HEMA KASHYAP NEETI BISHT

INTRODUCTION 
Human Area Networking technology  Technology that transfers data through body to a computer.  Red Tacton uses the ultra weak electric field naturally emitted on your body s surface to transfer data.

BASIC PRINCIPLE 
Achieve duplex communication over the human body .  Speed 10 Mbps.

MECHANISM 
RedTact ill ena le ubiquit us services based on human-centered interactions  more intimate and easier for eople to use.  sensitive electric field sensing technology.

HUMAN AREA NETWORK
‡ Human society is entering an era of ubi uitous computing, where everything is networked. ‡ By making Human Area Networks feasible

FEATURES 
Duplex communication. With one touch communication is possible.  Data transfer at a maximum speed of 10Mbps in any media. The transmission path is on the surface of the body, transmission speed does not deteriorate in congested areas.

COMPARISION WITH OTHER TECHNOLOGIES 
Used for ultimate close range communication .  Allow communication without connectors.  More secure than Bluetooth.  Superior than infrared technology and wi-Fi.  Difficult to intercept.

PROTOTYPES
1. Security Devices
Portable Card-Size Transmitter

Transmission rate: 230Kbps Protocol: Proprietary protocol Transmission method: Unidirectional
Embedded Receiver

Transmission rate: 230Kbps Protocol: Proprietary protocol Transmission method: Unidirectional

2.Data Transmission Devices
1.PC Card Transceiver

2.Embedded Receiver

Transmission rate: 10Mbp Protocol: TCP/IP Transmission method: Halfduplex

Transmission rate: 10Mbp Protocol: TCP/IP Transmission method: Half-duplex
3.USB Transceiver

Transmission rate not yet determined (in testing stage)

APPLICATIONS-one to one service
‡

ELIMINATION OF HUMAN ERROR. 

Marketing application (content awareness)

-Intuitive action

-Personalisation

Instant private data exchange

Personalisation of mobile phone

Touch a printer to print

Personalisation of automobiles

-New behavior pattern

-Security applications

Conferencing system

User verification and lock managament at entrance

wearable

Confidential document management

Sign up to vote on this title
UsefulNot useful