The Network Finder Project Members: Emery Sanford Igor Spivak Jeremy Bishop Selorm Oklu Terry Tianyi Zhu.

Slides:



Advertisements
Similar presentations
California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
Advertisements

AMS Time-Minder Comprehensive, payroll-integrated time and attendance systems for all industry groups and for all sizes of enterprise. Please click to.
Status Enterprise System Overview. What is Status Enterprise? Status is an HMI/SCADA system with live and historical data, trending, alarming, web and.
XProtect ® Professional Efficient solutions for mid-sized installations.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
Guard4Life Advanced GPS
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
Introducing new GPS based Vehicle Tracking System DG-Tracker Digilog Systems is now Nelso Technology Pvt. Ltd.
Sagecrm.com/7.2 Introducing Sage CRM 7.2 Mark Green Business Consultant Pinnacle.
Accurate Monitoring and Real Time Tracking of Visits Complete Visitor Management Solutions A Product of Copyright © ANGLER Technologieswww.angleritech.com.
Telemetry system datavend.
Maninder Kaur COMPUTER NETWORKS Maninder Kaur 14/10/2010
Social Media: FACEBOOK Kristin Martin Professional Development.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
 Why should it be mobile?  What content should I make mobile?  What need do I serve by making my content available to mobile users?  What value does.
__________________________________HDPL Believes in …_____________________________ Monitor - your company from anywhere in the world View - instant reports.
Chapter 15 The Third Component: Powerful Networks.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Principles of Information Technology
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Business Driven Technology Unit 4 Building Innovation Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
WHAT’S A TECHNOLOGY SYSTEM? A technology system is a machine that processes digital data. A computer is a technology system. A computer installation is.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Cute Trac Vehicle Tracking System
Logitrac Advanced GPS THE FUTURE OF GPS TECHNOLOGY.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Finding Nearby Wireless Hotspots CSE 403 LCA Presentation Team Members: Chris Scoville Tessa MacDuff Matt Mohebbi Aiman Erbad Khalil El Haitami.
Improving productivity with online collaboration © 2015 albert-learning.com Improving productivity with online collaboration.
“web to wireless” Technology. A LEADER IN web to wireless ASSET MANAGEMENT ROM Communications Inc.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
The Future of gps technology
Invitation to Computer Science 5th Edition
Using the SAS® Information Delivery Portal
Using the Powerful Microsoft Azure Platform, e-SUAP Properly and Securely Manages All Steps for Customizable Business Activities Permissions MICROSOFT.
THE EASY WAY TO STAGE ZEBRA’S ANDROID MOBILE COMPUTERS
Web Services Igor Wasinski Olumide Asojo Scott Hannan.
A Military Logistics and Transportation Security Application.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Prescryption DrugSafe “Imagine a world where technology enables us to live healthier lives” CSE403 – LCO Proposal Team DrugSafe: Brian Ma Jenny Yuen Jon.
GEOREMINDERS ANDROID APPLICATION BY: ADRIENNE KECK.
Smart Forms 2010 CAMIS Conference July 29,  Session Overview  Smart Form Process Flow  Understanding the Initial Procedures  Scan Process in.
Decade Presentation Present Day Raymond Tong Steven Rosenstark Tyler Young.
Trackstar Navigations Pvt. Ltd. Presenting New Generation GPS Tracking System.
Complete Visitor Management Solutions A Product of Accurate Monitoring and Real Time Tracking of Visits Complete Visitor Management Solutions.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Has Agent Scripting Got You FRUSTRATED?. Agent Scripting Simplified!
RTS ROAD TRACKING SYSTEM Facebook.com/rtslb POWER IN GPS TRACKING.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Network Security & Accounting
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Discount Tracking Solutions THE FUTURE OF GPS TRACKING IS HERE!
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Introducing… Conferencing Manager. Agenda Citrix MetaFrame Conferencing Manager Solving business challenges Value to our channel Citrix MetaFrame Conferencing.
FollowMe Kunal Chawla Shantanu Gupta Dinesh Joshi Radhika Shivapurkar.
CRUCIAL INFORMATION DISSEMINATION ON MODERN VEHICLES Wei Yan, Thomas Edwards Griffith.
The types of computers and their functionalities.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
START Application Spencer Johnson Jonathan Barella Cohner Marker.
Tools and equipment are an essential part of many industries, providing the means for individuals to do their jobs accurately and proficiently across.
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
Lecture 6: Cloud Computing
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Mobile Commerce and Ubiquitous Computing
Principles of Information Technology
Presentation transcript:

The Network Finder Project Members: Emery Sanford Igor Spivak Jeremy Bishop Selorm Oklu Terry Tianyi Zhu

Goal of Project Location management of Items Location management of People

Application Scope Business Individuals Government

Application Scope: Business Manufacturing Commercial

Application Scope: Individual

Application Scope: Government

Innovative Capabilities Easy and cheap way to track items User-friendly interface Remote access

User Benefits Never lose anything again Save time and worry Security

Searchable database of items with Query capabilities Find items in that building only Core Capabilities

To locate items in the database and display a visual map or a relative location As well it will allow for a customizable scale

Customizable interface depending on intended uses. Businesses have different needs from individuals and even from other businesses. Allows us to integrate into other applications and industries easily and affectively. Ability to store or record movement over time will be essential. Statistical data will also be useful for some of our clients.

The nature of business will be Changed completely with Location management – which Will influence time management and asset management. Security will have new Meaning to the individual, Business, government, and society as a whole. Government agencies, military, and prison systems will be reshaped and reconfigured for the better.

Using a GPD enables watch, cell phone, PDA or any other tag on a person and connected to the network, the network finder can be used as a security measure. Walking home from campus, you can have friends or family track you to make sure you get home safely. Safer University

Cashier-less Supermarket Network finder can be used to implement a cashier-less supermarket Networkable bar codes in the network finder database Virutal exit gate Saves time, money, and is more efficient – better security

Smart Tags Replace Bar-Codes Professor …….. Professor ……..

Immediate Functions Deferred functions

Immediate Functions Pinpoint the location of an individual or object Pinpoint the location of an individual or object Issue an alert if person or object leaves specified zone Issue an alert if person or object leaves specified zone

Deferred functions Compile and present statistics (ie. average speed, distance covered, time spent in location, patterns, etc.) Compile and present statistics (ie. average speed, distance covered, time spent in location, patterns, etc.) Trip mapping to show path of travel and location history (ie. what roads the car has used) Trip mapping to show path of travel and location history (ie. what roads the car has used)

Throughput large and completion time small Throughput large and completion time small Service will work seamlessly on low performance as well as high performance machines to open networked finder capabilities to more people Service will work seamlessly on low performance as well as high performance machines to open networked finder capabilities to more people Pinpoint location being quick is priority (the core function of the finder) Pinpoint location being quick is priority (the core function of the finder)

Minimize network traffic to keep data flowing quickly to users searching for objects while still serving a large number of people. This would reduce hardware costs and increase revenue. Minimize network traffic to keep data flowing quickly to users searching for objects while still serving a large number of people. This would reduce hardware costs and increase revenue. This would be accomplished by only linking to the network if a user specifically asks where something is. Tags would lay idle until the user specifically asks for a location. Obviously, in the case of nuclear weapons and such, constant network attention would be needed. Finding keys, however, would only require network attention when the user asks for it. This would be accomplished by only linking to the network if a user specifically asks where something is. Tags would lay idle until the user specifically asks for a location. Obviously, in the case of nuclear weapons and such, constant network attention would be needed. Finding keys, however, would only require network attention when the user asks for it.

We would offer different levels of finding to involve more people into the network. For example, the most basic finding capability would be available for very little money, but the user would only be allowed tags. Large companies and wealthy people could invest hundreds if not thousands of dollars to tag millions of items and install very accurate locating beacons within their homes or businesses. This would help overcome network effects. We would offer different levels of finding to involve more people into the network. For example, the most basic finding capability would be available for very little money, but the user would only be allowed tags. Large companies and wealthy people could invest hundreds if not thousands of dollars to tag millions of items and install very accurate locating beacons within their homes or businesses. This would help overcome network effects.

 Given an effective search algorithm, most additional functions (collecting statistics, etc.) can be reduced in order to improve network performance. Ideally, these functions should not be integral to the finder system, but performed by machines which may interact with the finder system as clients. The main function, once again, is performing quick and accurate searches.

Scalability

 250 million user capability initially (~100 million AOL Instant Messenger users. We think more people will want to use this service than AIM)  The system should be highly scalable in order to include billions of users after catching on

 Networked finding capabilities might become as standard as a refrigerator in a house, where every individual has to have one to fit in with society and function properly, so we want to be ready for this  Peer to peer communication would be very useful when the system grows popular. Less network traffic would be needed if my laptop could simply ask your laptop where it is instead of linking up to a satellite. This would only be possible with many users in close proximity.

GPS Satellite Global Server TAG TAG enabled client browser First Stage Architecture

TAG Area Transceiver Location/Data Server Client Browser Field Access capabilities (PDA/Cell Phone) A Location Transmitter system GPS Satellite, etc. Second Stage Architecture

Security Overview Proprietary, secure protocol allows only for the company’s servers to interface with TAGs and client browsers Location Data stored on a secured, audited server; clients have access only to authorized Location Data Access for authorized clients only (password or biometric if needed) Access channel encrypted with asymmetric tokens