the network finder project members: emery sanford igor spivak jeremy bishop selorm oklu terry tianyi...

Post on 17-Dec-2015

219 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

The Network Finder ProjectThe Network Finder Project

Members: Emery Sanford

Igor Spivak

Jeremy Bishop

Selorm Oklu

Terry Tianyi Zhu

Goal of ProjectGoal of Project

Location management of Items

Location management of People

Application Scope

• Business• Individuals• Government

Application Scope: Business

ManufacturingCommercial

Application Scope: Individual

Application Scope: Government

Innovative Capabilities

• Easy and cheap way to track items

• User-friendly interface• Remote access

User Benefits

• Never lose anything again

• Save time and worry• Security

• Searchable database of items with Query capabilities

• Find items in that building only

Core CapabilitiesCore Capabilities

• To locate items in the database and display a visual map or a relative location

• As well it will allow for a customizable scale

Customizable interface depending on intended uses. Businesses have different needs from individuals and even from other businesses.

Allows us to integrate into other applications and industries easily and affectively.

Ability to store or record movement over time will be essential.

Statistical data will also be useful for some of our clients.

The nature of business will beChanged completely withLocation management – whichWill influence time managementand asset management.

Security will have newMeaning to the individual,Business, government, and society as a whole.

Government agencies, military, and prison systems will be reshaped and reconfigured for the better.

Using a GPD enables watch, cell phone, PDA or any other tag on a person and connected to the network, the network finder can be used as a security measure. Walking home from campus, you can have friends or family track you to make sure you get home safely.

Safer UniversitySafer University

Cashier-less SupermarketCashier-less Supermarket•Network finder can be used to implement a cashier-less supermarket•Networkable bar codes in the network finder database•Virutal exit gate•Saves time, money, and is more efficient – better security

Smart Tags Replace Bar-CodesSmart Tags Replace Bar-Codes

Professor ……..Professor ……..

Immediate FunctionsImmediate Functions

Deferred functionsDeferred functions

Immediate FunctionsImmediate Functions

Pinpoint the location of an Pinpoint the location of an individual or object individual or object

Issue an alert if person or object Issue an alert if person or object leaves specified zoneleaves specified zone

Deferred functionsDeferred functions Compile and present statistics Compile and present statistics

(ie. average speed, distance (ie. average speed, distance covered, time spent in location, covered, time spent in location, patterns, etc.)patterns, etc.)

Trip mapping to show path of Trip mapping to show path of travel and location history (ie. travel and location history (ie. what roads the car has used)what roads the car has used)

Throughput large and completion time Throughput large and completion time smallsmall

Service will work seamlessly on low Service will work seamlessly on low performance as well as high performance as well as high performance machines to open performance machines to open networked finder capabilities to more networked finder capabilities to more peoplepeople

Pinpoint location being quick is priority Pinpoint location being quick is priority (the core function of the finder)(the core function of the finder)

Minimize network traffic to keep data Minimize network traffic to keep data flowing quickly to users searching for flowing quickly to users searching for objects while still serving a large objects while still serving a large number of people. This would reduce number of people. This would reduce hardware costs and increase revenue.hardware costs and increase revenue.

This would be accomplished by only linking to the This would be accomplished by only linking to the network if a user specifically asks where something is. network if a user specifically asks where something is. Tags would lay idle until the user specifically asks for a Tags would lay idle until the user specifically asks for a location. Obviously, in the case of nuclear weapons and location. Obviously, in the case of nuclear weapons and such, constant network attention would be needed. such, constant network attention would be needed. Finding keys, however, would only require network Finding keys, however, would only require network attention when the user asks for it. attention when the user asks for it.

We would offer different levels of finding to We would offer different levels of finding to involve more people into the network. For involve more people into the network. For example, the most basic finding capability example, the most basic finding capability would be available for very little money, would be available for very little money, but the user would only be allowed 10-20 but the user would only be allowed 10-20 tags. Large companies and wealthy tags. Large companies and wealthy people could invest hundreds if not people could invest hundreds if not thousands of dollars to tag millions of thousands of dollars to tag millions of items and install very accurate locating items and install very accurate locating beacons within their homes or businesses. beacons within their homes or businesses. This would help overcome This would help overcome network network effects.effects.

Given an effective search algorithm, most Given an effective search algorithm, most additional functions (collecting statistics, additional functions (collecting statistics, etc.) can be reduced in order to improve etc.) can be reduced in order to improve network performance. Ideally, these network performance. Ideally, these functions should not be integral to the functions should not be integral to the finder system, but performed by machines finder system, but performed by machines which may interact with the finder system which may interact with the finder system as clients. The main function, once again, as clients. The main function, once again, is performing quick and accurate searches. is performing quick and accurate searches.

Scalability Scalability

250 million user 250 million user capability initially capability initially (~100 million AOL (~100 million AOL Instant Messenger Instant Messenger users. We think more users. We think more people will want to use people will want to use this service than AIM)this service than AIM)

The system should be The system should be highly scalable in highly scalable in order to include order to include billions of users after billions of users after catching oncatching on

Networked finding capabilities might become as Networked finding capabilities might become as standard as a refrigerator in a house, where every standard as a refrigerator in a house, where every individual has to have one to fit in with society individual has to have one to fit in with society and function properly, so we want to be ready for and function properly, so we want to be ready for thisthis

Peer to peer communication would be very useful Peer to peer communication would be very useful when the system grows popular. Less network when the system grows popular. Less network traffic would be needed if my laptop could simply traffic would be needed if my laptop could simply ask your laptop where it is instead of linking up to ask your laptop where it is instead of linking up to a satellite. This would only be possible with many a satellite. This would only be possible with many users in close proximity.users in close proximity.

 

GPS Satellite

Global Server

TAGTAG

TAG

TAG enabledclient browser

First Stage Architecture

TAG

TAG

TAG

TAG

Area Transceiver

Location/Data Server

Client BrowserField Access capabilities

(PDA/Cell Phone)A Location Transmitter systemGPS Satellite, etc.

Second Stage Architecture

Security Overview

• Proprietary, secure protocol allows only for the company’s servers to interface with TAGs and client browsers

• Location Data stored on a secured, audited server; clients have access only to authorized Location Data

• Access for authorized clients only (password or biometric if needed)

• Access channel encrypted with asymmetric tokens

top related