Teleimmersion Main Ppt

Post on 12-Nov-2014

9,139 views 0 download

transcript

BYP.V.RAJA SHEKAR06S11F0031MCA FINAL YEAR

WHAT IS VIRTUAL REALITY WHAT IS HOLOGRAMIC IMAGE WHAT IS TELE IMMERSION APPLICATIONS ADVANTAGES DISADVANTAGES CONCLUSION REFERENCES

CONTENTS

Virtual Reality Definition:

A computer generated,‘immersive’ (or wide field),multi-sensory informationprogram which tracks a user in real time.

TELE IMMERSION

Tele-Immersion is the synthesis of Virtual Reality, video conferencing, and advanced computation

TI setup

Hardware and software technologies needed:- 3D real-time system for acquisition of

dynamic, real objects (Upenn)- static scene acquisition (UNC)- rendering and stereo display architecture

(UNC)- high precision headtracking system

(UNC) - modeling and manipulation with virtual

objects (Brown)- multi-person interaction and collaborative

architecture (Brown)

Camera arrangement

PC1

PC2PC3

PC4

PC5

C1

C2

C3

C4 C

5

C6

C7

C4 data

C3 data C5 data C4 data

C3

data

C2

data

C6 data C5 data

BW Latency Sensitive

Jitter Sensitive

Reliability Reqrmnt

Burstiness Packet Size

Protocol

Avatar (virtual representation)

Low Y Y Low Constant Small RTP / UDP

Audio conference

Med Y Y Low Constant Med RTP / UDP

Video conference

High Y Y Low Constant Large RTP / UDP

Realtime state updates

Low Y Y Med Short bursts

Small FEC

Non-realtime state updates

Low N N High App dependent

Small TCP

Small bulk data

(image files)

Med N N High Medium bursts

Large TCP/CPTCP

Large bulk data(raw data sets)

High N N High Very long bursts

Large PTCP / RBUDP

Streaming bulk data

(high quality audio/video/bitmap/polygons)

High Y N High Long bursts

Large SRBUDP / AFEC

Characteristics of Tele-Immersion Flows

Applications:

- tele-diagnostics- tele-assisted surgery- advanced surgical training

- preoperative planning

Other:- tele-meetings- tele-collaborative design- computer supported training and education- 3D interactive video- entertainment

Advantages

Eliminates the barriers of space and time.

Conclusion In order to encourage applications, a better

level of communication among network engineers, application programmers, and scientists needs to be supported. The nomenclature and styles of networking access and engineering are essentially totally disjoint from the way application programmers and computational scientists write programs and use computers. Security and Acceptable Use Policy (AUP) considerations are typically idiosyncratic at computer sites, yet need to be uniform, or at least interoperable, for networks to support applications.