Welcome to the w5 Consortium Birds of a Feather Meeting February 13 th 2001.

Slides:



Advertisements
Similar presentations
IATI Technical Advisory Group Technical Proposals Simon Parrish IATI Technical Advisory Group, DIPR March 2010.
Advertisements

INTERNATIONAL INSTITUTE FOR GEO-INFORMATION SCIENCE AND EARTH OBSERVATION Towards quality-aware Infrastructures for Geographic Information Services Richard.
Group #1: Protocols for Wireless Mobile Environments.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
ICT Curriculum Evening – an introduction to Wizkid.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
BUSINESS DRIVEN TECHNOLOGY
THE JOINED UP WORLD OF E-RESEARCH Professor Neil McLean National Technical Standards Adviser to the Department of Education Science and Training (DEST)
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
THE SECOND LIFE OF A SENSOR: INTEGRATING REAL-WORLD EXPERIENCE IN VIRTUAL WORLDS USING MOBILE PHONES Sherrin George & Reena Rajan.
Christian Weyer thinktecture.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
Group Management n Introduction n Internet Group Management Protocol (IGMP) n Multicast Listener Discovery (MLD) protocol.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
© 2003 Two West, Inc. Web-enabled Project Management October 24, 2003 Prepared by Two West, Inc.
EbXML Overview Dick Raman CEO - TIE Holding NV Chairman CEN/ISSS eBES Vice Chair EEMA and HoD in UN/CEFACT Former ebXML Steering Group.
XMPP Extensible Messaging and Presence Protocol. Chat In the beginning there was instant messaging and chat. Lots of binary standards: Unix talk, IRC,
File: 05_RETS_Implementation_Best_Practices.PPT 1 RETS Implementation Practices RETS Implementation Best Practices Business Case Project Start-up Resource.
Company Profile ► Our Expertise Here at SIEMSTECH we have a passion for designing and implementing integrated, network-centric technology solutions across.
IEEE R lmap 23 Feb 2015.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
Evaluation of a Publish/Subscribe System for Collaboration and Mobile Working Collaborative Advertising over Internet with Agents Independent Study: Wireless.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
 An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
Jocelyn Cloutier Michael Kocheisen Jean Tessier Francois McNeil 6/8/99.
Margherita Forcolin (Insiel S.p.A.) Thessaloniki, 13 October 2011.
From Virtual Learning Environments to Pervasive Learning Environments Yvan Peter LIFL – Université Lille 1 - France.
B3AS Joseph Lewthwaite 1 Dec, 2005 ARL Knowledge Fusion COE Program.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
Red Deer College February 8, 2010 William Miles, CISSP.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Peer-to-Peer (P2P) Computing Yi Zhang. Agenda History What is P2P Client/Server and P2P Why P2P Problems and possible solution P2P middleware services.
January 23-26, 2007 Ft. Lauderdale, Florida Who In The Enterprise Needs UC First? The User Perspective By Art Rosenberg, The Unified-View
Department of Electronic Engineering Challenges & Proposals INFSO Information Day e-Infrastructure Grid Initiatives 26/27 May.
XML and Its Applications Ben Y. Zhao, CS294-7 Spring 1999.
An Architecture to Support Context-Aware Applications
File: 05_AEI Implementation Best Practices.PPT 1 RETS Implementation Issues Yogi Schulz RETS Implementation Best Practices Business Case Project Start-up.
Architecture for Context-Aware Services in Gaia Anand Ranganathan.
Transformational Government Workshop 9 th December 2010 Washington DC.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Network Reliability and Interoperability Council VII NRIC Council Meeting Focus Group 1B Network Architectures for Emergency Communications in 2010 September.
Using facilities as a data source to drive business Paul Ehrlich, PE Business Development Leader Trane Global Controls.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
1 Requirement Specification for IoT API layer Company:Tata Consultancy Services Author(s):Avik Ghose Contact
DSLF Subscriber Auth Requirements and IETF PANA Protocol PANA WG Chairs IETF 70 Dec 7, 2007 – Vancouver, Canada.
Slide 1 RFID Network Infrastructure Overview P. Krishna Reva Systems.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Services – a perspective on building applications Richard Swale ETSI TIPHON Wg1 chair VoIP Technologist BTexaCT ITU Workshop on IP Networking and Mediacom.
1 Overview of the Hub Concept & Prototype for Secure Method of Information Exchange (SMIE) April 2013 Prepared by NZ & USA.
® ® copyright © 2013 Open Geospatial Consortium What HTML5 and REST mean to the Geo community Raj Singh, PhD Open Geospatial Consortium
Bulk SMS Gateway
Location Awareness Lancaster Keith Mitchell Computing Department Paul Astle Information Systems Services (ISS)
ZIMBRA ROADMAP. Contains proprietary and confidential information owned by Synacor, Inc. © / 2015 Synacor, Inc. Deliver an advanced, feature rich collaboration.
Overview of SAP Application Services By Accely. Introduction Developed organizations in any business industry will invest in SAP programs to offer progressive.
4WARD Networking of Information 4WARD WP6. © 4WARD Consortium Confidential Networking of Information Telephony Interconnecting wires 4WARD Future Internet.
ASSET - Automotive Software cyber SEcuriTy
Grid Computing.
Introducing Novell IPv6 Stack
Service Discovery Middleware
THREE TIER MOBILE COMPUTING ARCHITECTURE
1/18/2019 Transforming the Way the DoD Manages Data Implementing the Net Centric Data Strategy using Communities of Interest Introduction
2/15/2019 Transforming the Way the DoD Manages Data Implementing the Net Centric Data Strategy using Communities of Interest Introduction
Technology Convergence
Blockchain and Distributed Ledger Technology: Innovation, Operation, and Legal and Regulatory Implications Consumer Protection on the Blockchain Emily.
Presentation transcript:

Welcome to the w5 Consortium Birds of a Feather Meeting February 13 th 2001

Introductions… Dave Marples Telcordia Technologies Inc. Pilgrim Beart activeRF Ltd

…a few thanks to our sponsors;

Today’s Mission is to; Characterize w5 Identify common requirements Review current industry initiatives Network and make contacts Spot business opportunities Make links between Industry and Academia Determine a route forwards

Schedule 9.00Introductions 9.20 Meet your Collaborators 10.10Other industry initiatives (AIM) 10.30Coffee / Tea sponsored by activeRF 11.00A wider perspective for location 11.20Technical Challenges & Issues 12.30Lunch - sponsored by Marconi Communications Inc.

Schedule 14.00Other industry initiatives (WLIA) 14.30Coffee / Tea - sponsored by MTI 15.00The Route Forwards 16.30Close

What is the mission of w5? To define open standards for the real-time exchange of location information between independently specified and developed systems, with concerns of privacy, authentication, timeliness and accuracy explicitly addressed.

With and Without w5… App 1 App 2 App 3 RTLS 1 RTLS 2 RTLS 3 RTLS 4 RTLS 5 App 1 App 2 App 3 RTLS 1 RTLS 2 RTLS 3 RTLS 4 RTLS 5 Common APIs

A few thoughts… The guy sitting next to you is still your competitor. We have to enable applications, because these deliver user value, and infrastructure alone does not. The photocopier is our friend – if we can adopt an existing standard rather than creating one, we should do so. The greatest single risk to success in these markets is user perception – privacy is job 1.

Next… Presentations from two other industry initiatives set up in the location space

What w5 is about A slightly more technical overview Pilgrim Beart CEO, activeRF Ltd

Generic Sensing Infrastructure servertags nodes transmission clients

W5 Who? What? Where? When? Why?

Who, What… Who A user, represented by a device (e.g. ID tag) or attribute (e.g. fingerprint, voiceprint) User has meaning within the context of the applications What An RFID, numeric or textual Typically a serial number, GSM number etc. Maybe sensing infrastructure dependent, made generic via database lookup…

…Where… Location or even micro-location Longitude/latitude may only be appropriate for certain applications… – Could be (x,y) relative to defined point, but – Often more useful to say “Board Room” or “Warehouse 7” – location ID. Will have intrinsic granularity and uncertainty May be nested (i.e. one location can be within another) Location may need to be inferred from transitions, such as when going through doorways

…When… Queries may be real-time with live updates/triggers If history is maintained queries historical queries may be possible (where was x at time y?) Latency, Granularity & Synchronisation are all important – Timezone of event-stamp (capture). UTC. – Timezone of event-query (client) Timestamping techniques can be used to eliminate duplicate captures from the sensing infrastructure.

…Why… Represents context for location actions. Vital to condense mass of data down Turning data into meaningful KPIs Same information may be presented in different contexts (work, home etc.) which may require different actions. The user may have context outside of their current role which must also be captured. “Fedex”, and “wood for the trees”

…and Who wants to know? Privacy – Assets don’t have rights, people do. – If tracking people (directly or indirectly) are they aware, can they control, are they benefiting? Security – Commercial data is sensitive. Encrypt. Anonymise. Context – Users may allow their location information to be released for some reasons, but not for others.

w5 isn’t… Not a low-level physical “tag” standard Not an RFID standard Not tied to a particular location technology – Enables heterogeneity

w5 is… A high-level interface, an “API” Serial data (across physical link or IP socket) XML and other “intelligent data” (w5ML?) Database storage and interrogation Pull (polled) or Push (event-driven, triggers) Publish & Subscribe Agents (“tell me when X & Y are in same place”) Client-centric (peer-to-peer) or Server-centric … and it supports micro-location