UBIQUITOUS NETWORKING

Posted by mady | Posted in | Posted on 6:02 AM

UBIQUITOUS NETWORKS


CONTYENTS

Chapter 1.Introduction
->Ubiquity.
->Ubiquitous computing.
->Ubiquitous networks.

Chapter 2. àThe Evolution of IT Paradigm
->Early Days.
->Web Computing.

Chapter 3. Ubiquitous Networking
->Traditional Networks.
->Exotic Networks.
->Intermediate State.
Chapter 4. How Ubiquitous Networks will work
->Send Out Bat Signal.
->In The Zone.
->Information Hoppers and Smart Posters.
Chapter 5. Multi-modal Broadband Networks
->Broadband.
>Aims and Views.
>Goals.
->Multi-modal.
>What is it?
> Protocol for Multi-modal

Chapter 6. Total Mobility
->Information Devices With Borderless Connectivity.
->Seamless Portable Content.

Chapter 7. Applications


1.Introduction

1.1 What is Ubiquity?

Ubiquity means “Anytime, anywhere”. It is total mobility. One can use this ubiquity in technical aspects, say computing. While concerning computing we have to consider networking area. With the help of ubiquity life is going to be very much easier than before and much more comfortable.
We can say that concept of using ubiquity in the computing world, beyond the desktop is going to be a new paradigm in the Information Technology.

1.2 The power of ubiquitous computing

Computers in the workplace can be as effortless, and ubiquitous, as that. Long-term the PC and workstation will wither because computing access will be everywhere: in the walls, on wrists, and in "scrap computers" (like scrap paper) lying about to be grabbed as needed. This is called "ubiquitous computing", or "ubicomp".
Ubiquitous computing has as its goal the enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user. A number of researchers around the world have worked in the ubiquitous computing framework. Their work had impacted all areas of computer science, including hardware components (e.g. chips), network protocols, interaction substrates (e.g. software for screens and pens), applications, privacy, and computational methods.
Ubiquitous computing is not virtual reality, it is not a Personal Digital Assistant (PDA) such as Apple's Newton, it is not a personal or intimate computer with agents doing your bidding. Unlike virtual reality, ubiquitous computing endeavors to integrate information displays into the everyday physical world. It considers the nuances of the real world to be wonderful, and aims only to

augment them. Unlike PDA's, ubiquitous computing envisions a world of fully connected devices, with cheap wireless networks everywhere; unlike PDA's, it postulates that you need not carry anything with you, since information will be accessible everywhere. Unlike the intimate agent computer that responds to one's voice and is a personal friend and assistant, ubiquitous computing envisions computation primarily in the background where it may not even be noticed. Whereas the intimate computer does your bidding, the ubiquitous computer leaves you feeling as though you did it yourself.
Because ubiquitous computing envisions hundreds of wireless computers in every office, its need for wireless bandwidth was prodigious. For instance, in a not-very-large building with 300 other people. If each had 100 wireless devices in offices, each demanding 256kbits/sec, using 7.5 gigabits of aggregate bandwidth in a single building.
A second challenge of the mobile infrastructure was handling mobility. Networking developed over the past twenty years with the assumption that a machine's name, and its network address, were unvarying. However, once a computer can move from network to network this assumption was false. Existing protocols such as TCP/IP and OSI were unprepared for to handle machine mobility without change. A number of committees and researchers worked on methods of augmenting or replacing existing protocols to handle mobility.
Third challenge of the mobile infrastructure was window systems. Most window systems, such as those for the Macintosh and for DOS, were not able to open remote windows over a network. Even window systems designed for networking, such as X, had built into them assumptions about the mobility of people. The X window system protocol, for instance, made it very difficult to migrate the window of a running application from one screen to another, although this was just what a person traveling from their office to a meeting might want. Ubiquitous computing, whereby Internet appliances automatically satisfy almost any need could improve the way companies conduct business. Corporations could use it to automate their flow of information and dynamically

adjust operations to fit the environment.
"Today networking is not at all transparent,"
Ubiquitous networking will allow connectivity to corporate applications anywhere, anytime. Employees will be able to retrieve and send information easily from their cars, mobile devices, and homes as well as from their offices. Creating an architecture methodology provides the key to developing these new solutions.
1.3 Ubiquitous Networking
Ubiquitous networking is the actual implementation of the ubiquitous computing. The utilization of information technology by businesses had shifted from the era of mainframe to one of the client server systems in the second half of the 1980s.Then from mid-1990s onwards, the Web computing paradigm has been taking root against the backdrop of the rapid spread of the Internet. Nevertheless, it is unlikely that the IT paradigm, which had evolved through these stages, would leap in one step to the world of exotic networks, which rely on the full utilization of the wearable computers or paper computers. There is bound to be an interim IT paradigm before we reach exotic networks. Ubiquitous networks might be such an interim paradigm.
Ubiquitous networks are an IT paradigm comprising
1) Network infrastructures featuring broadband, mobile and constant Internet access,
2) Diverse information equipment that provides access to internet Protocol version 6(Ipv6), and
3) Seamlessly linked interactive contents.

NOTE: Japan is about to embark on the implementation of an ambitious e-Japan strategy, which aims to make it possible for the 10 million Japanese households to use broadband networks of 30-100Mbps b6y 2005. This is thought to be an attempt to create a new IT paradigm, and ubiquitous networks can become a strong candidate for this new IT paradigm.


2.The evolution of IT paradigm.
2.1 Early days
In order to find a new direction for the new paradigm of the economy, it is necessary to find a new direction for the information technology. The first wave of the information technology revolution started with the explosive diffusion of the innovative MOSIAC browser in 1993. Information technology paradigm of each era strongly influences the growth and evolution of the information industry. In early days, the utilization of computers had been equivalent to the use of mainframe computer. The lengthy period when the information industry exclusively organized systems and operation around mainframe computers started to come to an end in the 1980s. Client-server system began to spread quickly during the early 1990s, and system that greatly reduced cost through combinations of workstations (WSs) and personal computers (PCs) rapidly replaced the systems then in use. The world of Internet began with the start of the commercial use of the Internet in 1991 and the explosive spread of MOSIAC browser software in 1993.Web technology continues to rewrite the computing paradigm.
Figure 1. Change in IT paradigm.

2.2 Web Computing
The web-computing paradigm is currently spreading by taking a form that can link PCs, WSs and even mainframe computers using an Ipv4 network. Because the various systems now in place throughout the world can easily ride the IP protocol, users have greatly begun connecting them to IP networks. These IP networks are spreading to every corner of the world, every corner of our society and even every corner of our lives at a staggering speed. With slight time lags and differences arising from the digital divide, this phenomenon is quickly spreading throughout the world and into various facets of social system.
As we continue for the foreseeable future to use the Web computing paradigm that forms the core of the present Internet? Or will the shift to the next paradigm be just as swift as the speed at which today’s PC-centered Web computing has spread?
The future evolution of information technology depends on advanced research laboratories where research continues.
It is impossible today to even imagine that researchers can create paper computers and wearable computers that will soon be able to use in our daily lives. But researchers are already working on such devices for the future computing. These devices will certainly be connected to networks. We may call this type of IT paradigm exotic networks.

3.Ubiquitous Networking.

3.1 Traditional Networks.
Since Internet has become popular, it has been used vastly. Traditional networks including LANs in the small organizations, following different topologies as well as architectures like client-server have got connected to the Internet. Use of Internet in the desktop computers is increasing rapidly. Very soon it is going to occupy the whole world, which is not connected yet. This is the current scenario of the networking. But the experts from the industry have tremendous ideas about the future world of the networking.
)

3.2 Exotic Networks.
Present information technology is at the stage in which it enhances the PC-centered web-computing world created on the Internet. An extension of this line of the development is the world of Exotic networks. It is difficult to imagine, however, that users will move in one leap from web computing to a world of exotic networks, where everything becomes an object of computing and is connected to networks.



It is expected that there will be an intermediate IT evolution paradigm between these two worlds. That stage is ubiquitous network paradigm.

3.3 Intermediate stage.
In the Ubiquitous-networking paradigm, users do not rely on devices such as paper or wearable computers or exotic networks that do not yet exist. Instead the desktop PCs or mobile PCs, they will use existing information devices that are not yet fully connected to the internet, such as cellular telephones, PDAs (Personal Digital Assistants), video game consoles, set top boxes, digital television, multimedia kiosks, car navigation devices and forthcoming


information appliances.
All of these devices will be connected to much broader band (chapter5) networks than the present fixed telephone lines of today’s Internet. At the same time the network must have multi-modal (chapter6) access to the internet, perhaps by Ipv6 protocol, from not only fixed telephone lines but also by mobile phone, xDSL, CATV, Fixed wireless access and, of course, fiber optic network. Network will enable users to watch movies and listen to music as well as create and transmit their own works. The IT paradigm under such an environment will be ubiquitous networks.
The word “Ubiquitous” comes from the Latin word meaning “existing everywhere simultaneously.” Ubiquitous networks enable consumers to access the Internet from anywhere and at anytime.
When we use this word, we are referring to the ability of individuals to take advantage of high quality digital media from any location, and to obtain greater power of expression. Users will be able not only to receive large volume digital contents such as music, images and even motion pictures on demand and without trouble, but also to edit and send long speeches, music and motion pictures they create on their own.
Adding the constant access function to this will fundamentally change our existing concepts of Internet use. It will also change how we use telecommunications and broadcasting, how business operates, as well as styles of environment.
The ubiquitous networks we discuss here are a concept for the IT paradigm that should be executed in the proposed form by around 2005.


4.How Ubiquitous Networking Will Work

Mobile computing devices have changed the way we look at computing. Laptops and personal digital assistants (PDAs) have unchained us from our desktop computers. A group of researchers at AT&T Laboratories Cambridge are preparing to put a new spin on mobile computing. In addition to taking the hardware with you, they are designing a ubiquitous networking system that allows your program applications to follow you wherever you go.
By using a small radio transmitter and a building full of special sensors, your desktop can be anywhere you are, not just at your workstation. At the press of a button, the computer closest to you in any room becomes your computer for as long as you need it. In addition to computers, the Cambridge researchers have designed the system to work for other devices, including phones and digital cameras.
As we move closer to intelligent computers, they may begin to follow our every move. In this we will look at the parts of such a system and how they allow our data and information to move with us. (Following is just a single way that could be used to implement the Ubiquitous Networking.)
4.1Send Out the Bat Signal
In order for a computer program to track its user, researchers had to develop a system that could locate both people and devices. The AT&T researchers came up with the ultrasonic location system. This location
tracking system has three basic parts:
Bats - small ultrasonic transmitters worn by users
Receivers - ultrasonic signal detectors embedded in ceiling
Central controller - coordinates the bats and receiver chains
Users within the system will wear a bat, a small device that transmits a 48-bit code to the receivers in the ceiling. Bats also have an imbedded transmitter, which allows it to
433-MHz radio link.
Bats are 3 inches long (7.5 cm) by 1.4 inches wide (3.5 cm) by .6 inches thick (1.5 cm), or about the size of a pager. These small devices are powered by a single 3.6-volt lithium thionyl chloride battery, which has a lifetime of six months. The devices also contain two buttons, two light-emitting diodes (LEDs) and a piezoelectric speaker, allowing them to be used as ubiquitous input and output devices, and a voltage monitor to check the battery status.
A bat will transmit an ultrasonic signal, which will be detected by receivers located in the ceiling approximately feet (1.2 m) apart in a square grid. There are about 720 of these receivers in the 10,000-square-foot building (929 m2) at the AT&T Labs in Cambridge. An object’s location is found using trilateration, a position-finding technique that measures the objects distance in relation to three reference points.

Trilateration works by measuring the distance from the bat worn by the user to three sensors in the ceiling. Researchers can locate a user's position to within 1.18 inches (3 cm).

If a bat needs to be located, the central controller sends the bat’s ID over a radio link to the bat. The bat will detect its ID and send out an ultrasonic pulse. The central controller measures the time it took for that pulse to reach the receiver. Since the speed of sound through air is known, the position of the bat is


calculated by measuring the speed at which the ultrasonic pulse reached three other sensors. This system provides a location accuracy of 1.18 inches (3 cm) throughout the Cambridge building.
By finding the position of two or more bats, the system can determine the orientation of a bat. The central controller can also determine which way a person is facing by analyzing the pattern of receivers that detected the ultrasonic signal and the strength of the signal.
4.2 In the Zone
With an ultrasonic location system in place, it’s possible for any device fitted with a bat to become yours at the push of a button. Let’s say the user leaves his workstation and enters another room. There’s a phone in this room sitting on an unoccupied desk. That phone is now the user’s phone, and all of the user’s
phone calls are immediately redirected to that phone. If there is already someone using that phone, the central controller recognizes that and the person using the phone maintains possession of the phone.
The central controller creates a zone around every person and object within the location system. For example, if several cameras are place in a room for videoconferences, the location system would activate the appropriate camera so that the user could be seen and move freely around the room. When all the sensors and bats are in place, they are included in a virtual map of the building. The computer uses a spatial monitor to detect if a user’s zone overlaps with the zone of a device. If the zones do overlap, then the user can become the temporary owner of the device. If the ultrasonic location system is working with virtual network computing (VNC) software, there are some additional capabilities. Computer desktops can be created that actually follow their owners anywhere with in the system. Just by approaching any computer display in the building, the bat can enable the VNC desktop to appear on that display. This is handy if you want to leave your computer to show a coworker what you’ve been working on. Your desktop is simply teleported from your computer to your co-worker’s computer.


4.3 Information Hoppers and Smart Posters
Once these zones are set up, computers on the network will have some interesting capabilities. The system will help us store and retrieve data in an "information hopper." This is a timeline of information that keeps track of when data is created. The hopper knows who created it, where they were and whom they were with.
Think of the hopper as a ubiquitous filing clerk. It will change how we think of our computer filing systems. By using a digital camera that is connected to the network, a user’s photographs are immediately stored in his or her timeline. Tape recorders could also send audio memos to the information hopper.
Two items of information created at the same time will be found at the
same place on the timeline. The system knows whom the user was with when he created the data, and the various timelines of the users working together. This way another timeline can be created to keep track of particular projects.
Another application that will come out of this ultrasonic location system is the smart poster. A conventional computer interface requires us to click on a button on our computer screen. In this new system, a button can be placed anywhere in your workplace, not just on the computer display. The idea behind smart posters is that A smart poster will have buttons printed on to it that can be triggered by a bat.
Smart posters will be used to control any device that is plugged into the network. The poster will know where to send a file and a user’s preferences. Smart posters could also be used in advertising new services. To press a button on a smart poster, a user will simply place his or her bat on the smart poster button and click the bat.
The system automatically knows who is pressing the poster’s button. Posters can be created with several buttons on it. Ultrasonic location systems will require us to think outside of the box. Traditionally, we have used our one


computer at work to store all of our files, and we may back up these files on a network server. This new ubiquitous network will enable all computers in a building to transfer ownership and store all of our files in a central timeline.



5.Multi-Modal Broadband Networks

5.1 Broadband
5.1.1 Aims and views
Although the ubiquitous network concept should not be discussed only in terms of bandwidth, the nature of broadband networks is nevertheless the starting point of discussion. The telecommunication infrastructure intended for final users inn 2005 will undoubtedly involve a wider bandwidth than that currently available. But there are arguments over what specific Mbps level will or should be achieved. There is a wide variety of views, ranging from one that says speed will not go above the same64Kbps used in today’s ISDN even in 2005,to one that evisions 30-100Mbps as called for in the e-Japan strategy. Much remains unclear, such as whether the bandwidth is one that will be usable at the household or single building level, or whether the figure represents the high-end capability that ordinary households can use only by paying exorbitant prices.
5.1.2 Goals.
For this ubiquitous network concept for 2005,bandwidth goals should be set from user’s side.
1à We should make individuals the user unit. While the Internet has brought many innovations to the environment for information use, the largest single change has been that individuals with desktop PCs or mobile PCs have become the unit for receiving or sending information. Before the Internet brought this change, computer terminals had been installed at the organization or the facility level. Our way of using computers involved one computer per department or division, or perhaps 10 terminals per building. The internet or intranets have changed this, so today a ten-person organization probably has come to mean a ten-PC network. Similarly, in the future a four-person family will come to mean a unit of four individuals, each with a ubiquitous terminal. This means the capacity


when everyone in the groups uses the terminals simultaneously should be
discussed.
2à On the point of constant access or on-demand access, constant access is indispensable for basic daily communications. Because of high telephone charges, users have been accessing only at late night in a poorly connected environment and are worried about their monthly telephone bills. These experiences may influence the future use of the network, especially while developing ubiquitous networks.
3à While the greater the better would seem obvious in terms of bandwidth, this should also be determined by taking into consideration the cost and speed of diffusion. Quality will vary even if the bandwidth can handle music and animation without difficulty. Bandwidths from several dozen Mbps to several hundred Mbps per person will be required to enable users to download television broadcasting content and movies from the network instantaneously with absolutely no trouble so that they can view the files immediately.
As the goal for the concept of ubiquitous networks envisioned for 2005,a recommending benchmark is of 6Mbps per person. At 6 Mbps, users will be able to enjoy motion picture content with the quality of current television broadcasts or MPEG2-level content by using streaming type software.
But this is strictly 6Mbps per person. To enable a family of four to simultaneously use the network without quality deterioration even when the father is enjoying an information-rich, interactive-type professional cricket network broadcast, the mother is using an online educational gardening program, the daughter is chatting on the videophone and the son is playing network game, a total bandwidth of 24 Mbps or more per household would be required. Moreover, a family unit watching motion pictures will require as much as 20 to 30 Mbps to handle HDTV quality data. It is probably unrealistic to expect an environment in which four people can simultaneously enjoy high-definition television by the year 2005.


With a bandwidth of 50 Mbps, users can download a 70-minute long CD with MP3-class music quality in about 10 seconds. At this speed it is possible to
download two-hour DVD movie in approximately 11 minutes. At 50 Mbps, users can independently and comfortably handle images and music through the network, whether the information adopts a streaming type or accumulation type format.
4à Views are divided with regard to whether the cost to users must be Yen2000 or less per month, or whether a fee up to about Yen10, 000 is acceptable. In the ubiquitous network environment this is a fee per person, so the cost of Yen2000 per month will come to Yen8000 for per family of four. Moreover, when we add charges related to each telecommunication system, broadcasting system, cable system, and wireless system, the expenses quickly amount to a considerable sum.

5.2 Multi-modal
5.2.1 What is it?
Ubiquitous networks should be broadband, and at the same time, multi-modal. The goal should be to make it possible to receive information at 6 Mbps not only over cable and fixed-point networks but also with portable terminals that permit mobile telecommunication via wireless systems that work even from automobiles. Moreover, even when completely interactive capabilities are impossible because of differences in the levels of information handled, we should design ubiquitous networks so that users can exchange information in various ways routinely by using storage media or devices that degrade information, whether it arrives via surface waves or satellite broadcasts. In other words, ubiquitous networks are multi-modal networks that can switch between fixed point and mobile locations, cable and wireless, and telecommunication and broadcast network modes without undue difficulty.



5.2.2 Protocol for Multi-modal
The IP protocol for this multi-modal network should naturally be Ipv6.As an IP address is required for each information appliance or automobile in
ubiquitous-network configuration, we cannot rely upon Ipv4, which is expected to face a shortage of addresses in a foreseeable future even for the networks currently in place.
Users can also take advantage of services using ADSL with the powerful broadband services now in place. ADSL is a technology that makes it possible to use existing telephone circuits to offer broadband services on one line at a maximum of 640 kbps for the uplink an about 9Mbps for the downlink.
Satellite Internet has begun high speed Internet services for consumers. But the increase in the needs for constant access has led to financial problems for operators and efforts by providing to specialize in business uses.
In wireless systems, NTT DoCoMo’s I-mode has started a cellular telephone Internet boom. The start of third generation IMT-2000 mobile telecommunications service in 2001 is about to give this service another large boost. NTT DoCoMo will initially begin IMT-2000 with 384Kbps service. This would become an ideal ubiquitous network and terminal if NTT DoCoMo upgrades the service in the future to the Mbps level at a moderate price.
Another development is Bluetooth technology, which can connect all devices within ten-meter radius at speeds up to maximum of 1Mbps.It could greatly expand PDA and Cellular telephone capabilities.
Companies are also proceeding with research and development on other possible candidates for broadband networks. These include FWA (Fixed Wireless Access) networks or the wireless LAN type access systems.
An other alternative is electric power distribution networks that directly use electric power lines instead of telephone or cable lines to form a network that connects information appliances.
Of these, however, the most likely candidate for broadband service for

household ubiquitous network is an optical fiber FTTH (fiber-to-the-home) network. The potential for FTTH, which appeared to have been forgotten for a period, continues to increase. While FTTH has various problems, including its
high cost structure and immense time and costs required for the construction and placement of terminals, it undoubtedly holds the key to realizing ubiquitous networks.



6.Total Mobility

6.1 Information devices with borderless connectivity.
In ubiquitous network, consumers will possess an environment connected to the Internet whatever they are. This means users will require information devices connected to the Internet in whatever circumstances they find themselves.
The most basic information devices will probably still be desktop PCs, mobile PCs and PDAs. These tools provide the input devices, processing units, memory, display and other output components to utilize the Internet, and this situation is unlikely to change. It is also certain that mobile telephones are taking on a new role as a terminal for Internet use.
As described earlier, as bluetooth’s technology spreads, users will begin to directly connect information appliances with cellular telephones. Even without a cellular phone, they will be able to connect information appliances into a domestic wireless LAN system as well as to link them with PCs via connectors which use the IEEE 1394 standard that can simultaneously transmit voice and images at a super high speed of 100Mbps or more.
By connecting an MP3 player to the Internet for music or personal video recorder for images, users will be able to use program guide services and automatically record music and images.
Propelled by the diffusion of network games and downloading need of game software, it is hoped that the technology to connect video game consoles to the Internet will be developed and spread quickly. This includes not only stationary consoles, but also mobile game consoles linked to the Internet via mobile phones.
Providers and users may connect digital broadcasts from broadcasting systems to the Internet through television set-top boxes for electronic commerce users called T business.
Moreover, by also connecting the multimedia kiosk and POS terminals in

convenience stores, gasoline stations, train stations and other location to the Internet to create click-and-mortar outlets, companies will change the distribution industry itself.
Not only will we increase the connection of people to the Internet, we will also deepen the connection between automobile and Internet.
It is still uncertain whether such information devices will evolve into location-specific devices, such as “office formats” for the office, “living room format” for the living room and “car formats” for the car, or whether they will evolve so that the function of different information and telecommunication devices will be unbundled and re-bundled. What is certain is that they will take a format that enables us to be unaware of the borders between our various environments.
6.2 Seamless Portable Content
With ubiquitous networks, users will be able to move rich contents, such as voice or motion picture information, seamlessly between various network modes and information devices. This will not be a complete environment that will enable perfect real-time, one-source, multi-use access, but it will be possible to create a condition that is near enough to this goal.
We must develop ubiquitous networks that enable users to seamlessly use large quantities of electronic commerce content on the web via information appliances, video games, or even on-board LANs for automobiles. Such networks will overcome many obstacles and limitations that consumers presently face in the existing EC or e-business systems. Ubiquitous networks will lead entirely new type of electronic commerce in which consumers can enjoy more freedom and comfort that could be called ubiquitous business or “u-business” instead of e-business. While web-based product catalogs for e-business contain color photographs, u-business product catalog are likely to be centered on motion of products and services will become far effective than at present.
It is likely that with ubiquitous networks we will change our concept of website homepage as well. We will transfer them from homepage to some form of
“home video clips,” starting with motion picture commercials or videos, which are short and can directly appeal to our senses. We will also change our concept of information seasrches. New search engines that seek voice, picture or images will also be required.
As we develop new forms of content, one large problem will be what to do with the still photographic content aimed at e-business that has accumulated on the web. The emergence of u-business with its focus on video clips and motion picture content may well shorten the shelf life of the voluminous still-image contents in the e-business market. The current premise for TV-related digital broadcast content is to use the content only once. Providers will quickly have to change so that they can use content repeatedly. Under an environment that can handle motion picture content without difficulty, such resources will become valuable source of content for ubiquitous network communication system.
But if this happen without a proper copyright management system, content providers and creators will face a nightmarish situation. Therefore it is necessary to establish a system for intellectual property rights that allows for seamless portability in the use of the content of the Internet created by ubiquitous networks in the future, and this may become a system for using ubiquitous networks to obtain permissions to books. This may cover not only text material but also music contents. Moreover, one may create a business model wherein written or music content is offered for multiple uses, perhaps increasing the frequency of exposure by making the content free of charge and earning profits for advertising.
The linking of ubiquitous networks with bluetooth or RFID (Radio Frequency IDentification) technologies could radically change the structure of work at the outlets of the distribution or financial establishments. Retail outlets changed dynamatically with introduction of the supermarket system, and they may once again go through revolutionary changes with ubiquitous networks. If the technology to instantly read a group of RFIDs attached to merchandise and a system that links mobile terminals equipped with personal identification function with a payment settlement systems are developed, completely unmanned checkout

counters are possibility. Although it is not yet clear to what extent this would reduce the costs of operating store, it is certain that the system would allow store employees to spend more time with customers to engage in more sophisticated interactions than day today.
An environment with a multi-modal broadband network of ubiquitous networks, borderless connectivity of devices and seamless portability of content has the possibility of fundamentally altering the relationships among users, the creators of content, and the firms operating between users and creators.










7. Applications
1-> The combination of ubiquitous networking, mobility and ubiquitous computing devices will provide new opportunities for e-commerce products and services
2-> Ubiquitous networking will allow connectivity to corporate applications anywhere, anytime. Employees will be able to retrieve and send information easily from their cars, mobile devices, and homes as well as from their offices
3-> The network can reach handhelds through a simple serial wire, infrared, or wireless digital radio and turn them into Internet clients and servers. With this capacity, a student can hold the entire cyberspace infosphere. There is no need to possess hard drives for on-board personal files, no need to squeeze in an encyclopedia or huge databases, no need to have computational muscle; these capacities can exist at a remote server. The handheld need only be large enough to run a browser (which, granted, will be large).

Comments (5)

I assure this would be beneficial for most of the people. Digital Signature Certificate

I am very grateful you did share your knowledge here. It is an excellent post.sharing this sort of educational posts. Class 2 Digital Signature Certificate

Thanks for sharing this useful piece of information about. Class 3 Digital Signature Certificate

I highly admire your post. Thanks for sharing such wonderful information, I see your post very often and share them on all social media channels.
Digital Signature Certificate in Delhi

Great Knowledge conveyed in this article continue blogging.Thanks for this awesome article.
Digital Signature mart

Post a Comment