1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

Location-aware Computing By Bonam Kim. Outline Introduction Motivation Location Determination Techniques Location-aware Services Example for Implementation.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 16 Integrating Wireless Technology in business.
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Agenda Scope of Requirement Security Requirements
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved SECTION 7.1 NETWORKS AND TELECOMMUNICATIONS.
11 Introduction Dr. Miguel A. Labrador Department of Computer Science & Engineering
 The Global Positioning System (GPS) is a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Business Driven Technology Unit 4 Building Innovation Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Zac Chupka Jeff Signore.
Chapter CHAPTER SEVEN OVERVIEW SECTION NETWORKS AND TELECOMMUNICATIONS  Network Basics  Voice over IP  Networking Businesses  Increasing.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin BUSINESS PLUG-IN B20 Mobile Technology.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
What is A-Tracker A-Track is a Palm OS application that allows a company to track its equipment - office equipment, computers, vehicles, automobiles, library,
RFID in the Military Rana, Mohammed,Trandel, Ahmed.
École supérieure privée d'ingénierie et de technologie Prepared By: Boughattas Ahmed Chaieb Amal Année universitaire :
INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC.
Basic Data Communication
CHAPTER 5 : COMMUNICATIONS AND THE INTERNET (PART 1) INFORMATION TECHNOLOGY AND ITS APPLICATIONS SSK3000 Faculty of Computer Science and Information Technology,
Communications & Networks
6-1 Extranet Uses. 6-2 Case 2: Maryland and Colorado Serving their customers without using wires Earth Alert Emergency Management System in Maryland provides.
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
9. Car-Borne Information System
Your Interactive Guide to the Digital World Discovering Computers 2012.
INFORMATION TECHNOLOGY IN BUSINESS AND SOCIETY SESSION 21 – LOCATION-BASED SERVICES SEAN J. TAYLOR.
Chapter 5: Computer Networks
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
CS556 Idris Khames. What is RFID? RFID stands for radio frequency identification. It is one of automated systems which used to collect data The beginning.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
March 2005 MobiDE Research Group Location-Aware Computing (CSE750) Spring SangHyun Park MobiDE (Mobile Data Engineering) Research Group.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-in 5 NETWORKS and TELECOMMUNICATIONS.
Radio Frequency Identification (RFID) Presenter: Victoria Raskovich.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Chapter 7 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Networks, Telecommunications, and Mobile Technology.
Objectives Overview Discuss the purpose of the components required for successful communications and identify various sending and receiving devices Differentiate.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND MOBILE TECHNOLOGY CHAPTER 7 NETWORKS,
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Week 12 (2012) Dr. Ghada Drahem. INTENDED LEARNING OUTCOMES This lecture covers: Networking concepts and terminology Common networking and communications.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 1.
PIMRC 2007 A lightweight approach for providing Location Based Content Retrieval Anastasios Zafeiropoulos, Emmanuel Solidakis, Stavroula Zoi, Nikolaos.
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Contents Introduction What are Location-based services Working of Location-based services Location Tracking Technologies Power profiling a mobile phone.
Questions When have you used GPS? GPS technology uses satellites to pinpoint position on Earth with the aid of a GPS device or unit Have you ever used.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
SPK – 4 Golomazov Artem in my life. Hello! My name is Artem and I’d like to tell you about Information Technology by using Information Technology! It.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
1. 2 Technology The Evolution Of 3 What is RFID Technology? Radio Frequency Identification - A technology that uses electronic tags placed on objects,
English for Advance Learners I
A SEMINAR ON ROVER TECHNOLOGY
Integrating Wireless Technology in business
Radio Frequency Identification (RFID)
GPS-IN MOBILE NETWORKS
Mobile edge computing Report by Weiqing huang.
Data Communication and Networks
Data Communication and Networks
Data Communication and Networks
Data Communication and Networks
Data Communication and Networks
Mobile Commerce and Ubiquitous Computing
CAR PARKING PROBLEM IN MUMBAI.
Presentation transcript:

1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks

Agenda Location aware computing Location tracking Location tracking technologies Architecture Privacy & Security issues Applications Future work

3 What is Location-Aware Computing? The ability to detect the exact location of the device or may be it's relative location, especially a wireless device is called location aware computing system. Devices that are aware of where they are located are location aware devices.

4 Location tracking It is not a single technology. Rather, it’s a combination of several technologies merged together to develop system which tracks the location of objects. Some technologies that are used for location tracking are Geographic Information Systems (GIS) Global Positioning Systems (GPS) Radio Frequency Identification (RFID)

5 Location tracking technologies GIS  Captures, stores, analyze and report geographic information  Ideal for large scale location tracking GPS  Satellites broadcasts their positions  small instrument receives signals of such satellites and calculates its position  Ideal for outdoor positioning such as farming, surveying, military use or transportation

6 Location tracking technologies (2) RFID  A tiny battery-less microchip is attached to commodities and objects that are to be traced  Tags aren’t active all the time  Transmit only if it is prompted by a reader  Tags can be activated when the reader transmits radio waves  When the tag transmits information, it’s captured and sent to the central database  RFID could be used in exchange of UPC bar codes

7 Architecture Positioning Platform Privacy  Location Information  Proximity awareness Security handler Map service Service InfoBase

8 Positioning platform It collects data from all types of modules and combines them into a single position to form a virtual device A software module is implemented in each positioning device within a platform to communicate with the devices The platform calculates the position and makes it available to the applications

9 Privacy Vital to protect the privacy of users Location information, Proximity awareness are two issues that comes along with privacy Push service: Users are sent information even if they don’t request them. Ex: advertisements, informational message It should be protected so that the actual information is not transmitted to the service provider

10 Privacy (2) Devices automatically transfers data when they are nearer to each other – Proximity problems Example : PDA It should be restricted and we should be able to define when we want to do this in what circumstances and when we don’t want to exchange data and on what conditions

11 Security System could be compromised by false positioning sources like Bluetooth beacon with a false position To avoid, categorize sources in to trusted & non- trusted positioning sources Trusted: GPS module with user authentication Non-trusted: Mobile devices with Wave LAN that has no method to authenticate them

12 Map service Map service allows an application to retrieve maps for certain position Relation between objects and tags are maintained in the Location Information Server (LIS) Locator forms an interface between the locating mechanism and LIS LIS locates objects either representing persons or resources inside areas

13 Service InfoBase It finds the published services either by searching the central database or the internet for information that matches the criteria The application would look into the service InfoBase for services that matches with the request Example : When an user need to know the nearest public library, museum, or some restaurant or theatres

14 Applications Some applications follows  In companies  for managing their inventories, vehicles  In hospitals  to track wheel chairs, stretchers, medical equipments and sometimes even patients  Automobile industries deployed this technique in cars  In roadside assistance and in traffic advisories  Even 911 (emergency number in USA) works based on this location tracking technique

15 Future work Wider use of GPS would be useful Database advances would improve the ability to integrate the geospatial data Implementation of more advanced WaveLAN, Bluetooth and IR positioning technique E911 – To locate a call from mobile phones Cyber guide project : The way the portable computers assist in exploring physical and cyber spaces

16 References 1. Waseem Besada, Towards a Single Locationawareness System, 2. James Nord, Kare Synnes, Peter Parnes, An Architecture for Location Aware Applications, pdf pdf 3. Alexander Leonhardi, Device Location and Location Based Services, KuVS Summer School “Mobile Computing”,

17 Questions ? Thank you very much for your attention! Contact: