Red Tacton
Red Tacton
Red Tacton
Technology is making many things easier;. So far we have seen LAN MAN, WAN, INTERNET & many more here is new concept of RED TACTON which makes the human body as a communication network by name.... HAN(Human Area Network). Focusing on the naturalness, inevitability and sense of security conveyed by touching which we call Red tacton [Red-Warmth, T-Touch ,Acton-Action]which could let people transfer data to each others handhelds by means of handshake or a slap on the back. Human Area Network is an important over current wireless technologies such as Bluetooth because users can narrowly limit signal recipients rather than broadcasting to all devices within given range. Using Red tacton enable devices music from our digital audio player in your pocket would pass through your clothing and shoot over your body to headphones in your years. Instead of fiddling around with the cable to connect your digital camera to your computer you could transfer pictures just by touching the PC while the camera is around your neck and since data can pass from one body to another you could also exchange electronics business cards by shaking hands etc Red Tacton is a new Human Area Networking technology that uses the surface of the human body as a safe, high speed network transmission path. Red Tacton uses the minute electric field emitted on the surface of the human body. Technically, it is completely distinct from wireless and infrared. A transmission path is formed at the moment a part of the human body comes in contact with a Red Tacton transceiver. Physically separating ends the contact and thus ends communication. Using Red Tacton, communication starts when terminals carried by the user or embedded in devices are linked in various combinations according to the user's natural, physical movements. Communication is possible using anybody surfaces, such as the hands, fingers, arms, feet, face, legs or torso. Red Tacton works through shoes and clothing as well.
Page15
When using a RedTacton device, the human body effectively becomes an Ethernet cable, so the body can use its electrical field to connect devices to networks or the internet. For example, if a person wearing a RedTacton device sat at a table with RedTacton capabilities that was connected to the Internet, the laptop would immediately be connected to the internet. While on the surface this seems similar to a wireless network connection, it is not. There is a physical connection, the person. Also, the connection is more secure and does not slow down if many people are using the same connection, as a wireless connection does. Many areas can benefit from this technology. Initially, RedTacton could target security, the medical field, and the device communication field. The medical field would benefit in many ways. For example, implanted devices could use the technology to transmit information regarding their performance to doctors, patients wearing the device could quickly and securely transmit their medical history, and medicine containers could have chips embedded in them that when touched could send an alarm to the user, if the users device is programmed to know that an allergy to the medicine exists. Device communication is where RedTacton would compete with Bluetooth. Since RedTacton is more secure that Bluetooth, it would excel at connecting cell phones to headsets and transmitting data from one persons PDA to anothers. As mentioned before, RedTacton is already positioning itself to become a human swipe card and become the ultimate security device. One potential application that will be explored in depth is gun control
Page15
The naturally occurring electric field induced on the surface of the human body dissipates into the earth. Therefore, this electric field is exceptionally faint and unstable. The photonic electric field sensor developed by NTT enables weak electric fields to be measured by detecting changes in the optical properties of an electro-optic crystal with a laser beam.
Page15
FUNCTIONAL FEATURES
1. TOUCH:Touching, gripping, sitting, walking, stepping and other human movements can be the triggers for unlocking or locking, starting or stopping equipment, or obtaining data. using Red Tacton, communication starts when terminals carried by the user or embedded in devices are linked in various combinations through physical contact according to the human's natural movements. 2. BROADBAND & INTERACTIVE:Duplex, interactive communication is possible at a maximum speed of 10Mbps. Because the transmission path is on the surface of the body, transmission speed does not deteriorate in congested areas where many people are communicating at the same time .Taking advantage of this speed, device drivers can be downloaded instantly and execute programs can be sent.
Page15
3. ANY MEDIA:In addition to the human body, various conductors and dielectrics can be used as transmission media. Conductors and dielectrics may also be used in combination. A communication environment can be created easily and at low-cost by using items close at hand, such as desks, walls, and metal objects. But there is one limitation on the length of the conductor to be propagated, on installation locations, and on the thickness of the dielectric to be passed through.
Page15
PRACTICAL APPLICATIONS
There are many applications of red tacton in different fields. This technology will widely used in daily working schedule and provide convenience to people.
Enable one-to-one services tailored to the user's situation and tastes. Attribute information recorded in the Red Tacton device is sent to the touched objects. The appropriate service is provided based on the attribute information received by the Red Tacton receiver. Elimination of human error: Red Tacton devices embedded medicine bottles transmit information on the medicines' attributes. If the user touches the wrong medicine, an alarm will trigger on the terminal he is carrying. The alarm sounds only if the user actually touches the medicine bottle, reducing false alarms common with passive wireless ID tags, which can trigger simply by proximity. Alert and contact record at medical, long-term care, and childcare facilities. Avoidance of risk at construction sites (an alarm sounds if special equipment is handled by anyone other than supervisors).
Marketing applications:
When a consumer stands in front of an advertising panel, advertising and information matching his or her attributes is automatically displayed. By touching or standing in front of items they are interested in, consumers can get more in-depth.
Page15
Personalization of mobile phones and automobiles: Digital lifestyle can be instantly personalized with just a touch. A prerecorded configuration script can be embedded in a mobile terminal with built-in Red Tacton transceiver. When another device with Red Tacton capabilities is touched, personalization data and configuration scripts can be downloaded automatically. Your own phone number is allocated and billing commences. Automatic importing of personal address book and call history. The PC is configured to the user's specifications simply by touching the mouse. Room temperature and lighting are customized when a switch in the living room is pressed.
Red Tacton can carry music or video between headsets, mobile devices, mobile phones, etc. Users can listen to music from a Red Tacton player simply by putting on a headset or holding a viewer. Connect to the network by putting u r laptop on the table: An electrically conductive sheet is embedded in the table. A network connection is initiated simply by placing a lap-top on the table. Using different sheet patterns enables segmentation of the table into subnets. Walls and partitions can be used as communication media, eliminating construction to install electrical wiring. Ad hoc networking using conductive liquid sprays is possible. User verification and unlocking with just a touch: Automatic user authentication and log-in with just a touch. ID and privileges are recorded in a mobile Red Tacton device. Corresponding Red Tacton receivers are installed at security check points. The system can provide authentication and record who touched the device, and when.
Page15
Carrying a mobile Red Tacton-capable device in one's pocket, ID is verified and the door unlocked when the user holds the doorknob normally. Secure lock administration is possible by combining personal verification tools such as fingerprint ID or other biometric in the mobile terminal. Automated car door lock/unlock just by touching the handle; unlocking a bicycle just by sitting on it. Automatic access log for confidential document storage: A Red Tacton receiver in a cabinet where important documents are stored enables lock administration and keeps a record of who accessed Seat reservation management by verifying that the right person is in the right seat documents at what time. Log and verification of the person who touched the terminal. Touch a printer to print: Print out where you want just by touching the desired printer with one hand and a PC or digital camera with the other hand to make the link. Complicated configurations are reduced by downloading device drivers "at first touch. Instant private data exchange: By shaking hands, personal profile data can be exchanged between mobile terminals on the users. (Electronic exchange of business cards). Group photos taken with digital cameras are instantly transferred to individual's mobile terminal. Diagrams written on white boards during meetings are transferred to individual's mobile terminals on the spot.
Page15
OTHER APPLICATIONS
Red Tacton has many applications. So, it is not easy to explore all the applications. Some additional applications are: 1. Under Water Communication Red Tacton allows communication in outer space and in water where the speech constraints are very high and thus enables a highly efficient means of expression of speech which is beyond the purvey of human beings. 2. Communication inside body Red Tacton is also used for the treatment. In human body, it is used to detect ailments such as abnormal growths, tumors and excrescences affected tissues and thus helps in curing different diseases.
Page15
PROTOTYPES
A prototype is an early sample or model built to test a concept or process or to act as a thing to be replicated or learned from. NTT has made three types of prototypes:1. PC Card Transceiver (PC Card type) PC Card was originally designed for computer storage expansion, but the existence of a usable general standard for notebook peripherals led to many kinds of devices being made available in this form. Typical devices included network cards, modems, and hard disks. In Red Tacton, we can use PC Card Transceiver having both the capabilities to transmit and receive of communication speed of 10Mbps and communication method used in this is Half-duplex. TCP/IP protocol suite is used in the transceiver and interface is PCMCIA which was developed by Personal Computer Memory Card International Association. 2. Embedded Receiver (Hub Type) Receiver is used with the speed of 10 Mbps. Protocols and communication method is same as that of PC Card Transceiver. RJ 45 is used as an interface in the embedded receiver. 3. USB Transceiver (Box Type) A type of connection between a computer and a peripheral device like a printer or a camera. The original USB could transfer data at a rate of 12Mbps (million bits per second), a new USB2.0 now transfers at a rate of 480 Mbps.
Page15
Page15
But Red Tacton employs a proprietary electric field/photonics method, which surpasses the other methods in terms of communication distance, transfer speed, and interactivity.
FUTURE DEVELOPMENT
Red Tacton has a wide range of unique new functional features and enormous potential as a Human Area Networking technology. Red Tacton is a big achievement given by NTT to people. NTT is committed to quickly identifying and opening up those application areas with the most commercial promise for Red Tacton as shown in figure, a business development process to be coordinated under NTTs Comprehensive Producer Function program.
and a television control that automatically chooses favourite programs. The system also improves security. It ensures that only drivers can open their cars by touching the doors if the keys are in their pockets, not people around them. It uses technology to turn the surface of the human body itself into a means of data transmission. Red Tacton looks remarkably like a big pot of kryptonite is said to allow over 200kbps of data through th10 human hands or feet. Telecom giant Nippon Telegraph and Telephone Corp (NTT) is planning a commercial launch of a system to enter rooms that frees users from the trouble of rummaging in their pockets or handbags for ID cards or keys.Data will travel through the users clothing, handbag or shoes, anyone carrying a special card can unlock the door simply by touching the knob or standing on a particular spot without taking the card out. It will have many future applications such as walkthrough ticket gate, a cabinet that opens only to authorized people.
Page15
Page15
Disadvantages:
It has no compelling applications that arent already available.
Too costly.
Page15
OBSTACLES
While RedTacton may be a superior technology, adoption could be slow since Bluetooth and other radio technologies are already entrenched. Like those products, RedTacton will become more valuable as it is adopted. If there is nothing for a persons RedTacton device to talk to, it is essentially useless. Also, initially, it will be comparatively expensive. If security applications take off, particularly in the military field, it maybe years before the technology becomes available to consumers. It does, however, have to potential to disrupt the Bluetooth market, since it is more secure and works at much higher speeds. On the medical side, however, it may create a new market. As far as security applications are concerned, it could be disruptive because it is such a secure way to communicate. Radio swipe cards are much easier to manipulate than a RedTacton human swipe card. Again, the biggest hurdle will be convincing consumers that the product is worth the premium that will be charged because it seems, on the surface, to be so similar to technologies that are already available. Explaining why it is more secure and more efficient could be a challenge. Management will need to seriously consider how it will be marketed and hire excellent marketing people to promote the product. They will also need to find partners to share in the cost of development.
CONCLUSION
Page15
The performance of Red Tacton is better as compared to other technologies. It is best to connect network within short distances. There is no any type of problem of hackers as our body itself is the transmission media. Today main issue is speed, it is solved by Red Tacton by providing very high speed of 10 Mbps within short distances. The evolution of Red Tacton technology is a big achievement, which will likely be targeted for use in applications such as wireless headset, medical application, security applications, wireless transmission by applying different actions. This could get as simple as two people equipped with Red Tacton devices being able to exchange data such as text files as well as business cards just by shaking hands.
Page15