1 / 10

Key QoS Requirements and Challenges for Non-Medical Applications

This submission explores the Quality of Service needs and challenges for non-medical applications, including Body Area Networks. It covers technical requirements, reliability, energy efficiency, and security protocols.

bridgett
Download Presentation

Key QoS Requirements and Challenges for Non-Medical Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. March 2008 doc.:IEEE802.15-08-0153-00-0006 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Technical requirements of non-medical applications Date Submitted: November 20, 2007 Source:Ranjeet Kumar Patro, KiranBynam, GirirajGoyal Contact: Ranjeet Kumar Patro Voice: +91- 80 - 4181 9999, E-Mail: rkp.atd@samsung.com, ranjeet.patro@gmail.com Re: Abstract: The document observes the key QoS requirement of non-medical applications and captures Body Area Network specific challenges and issues in attaining the Key QoS. It also mentions another class of applications called implant but non-medical and captures its requirements. Purpose: To capture and add new technical requirements to TR document of TG6 Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and maybe made publicly available by P802.15. Slide 1 Submission Ranjeet K. Patro

  2. doc.:IEEE802.15-08-0153-00-0006 March 2008 Non-medical applications • Interactive Gaming • Social network • Body posture detection • Video Glasses • Tracking/Monitoring Application • Headset • E-charm • Motion/Gesture capture • Sports/Fitness Slide 2 Ranjeet K. Patro Submission

  3. doc.:IEEE802.15-08-0153-00-0006 March 2008 Implant But Non-medical • Sub-dermal RF devices – VeriChipTM [1] • Smartcard for clubs in Spain and Netherland • Secondary ID for financial purposes • Human-Tracking - Digital AngelTM [2] • E-commerce security • Rescue beacon for kidnapped beacon and missing persons • Mexican official gets chipped [3] • Human-Computer interaction - Professor Kevin Warwick’s experiment [4] Slide 3 Ranjeet K. Patro Submission

  4. doc.:IEEE802.15-08-0153-00-0006 March 2008 Services Slide 4 Ranjeet K. Patro Submission

  5. doc.:IEEE802.15-08-0153-00-0006 March 2008 Timeliness [3] & [4] Slide 5 Ranjeet K. Patro Submission

  6. Challenges: • Overcoming delay variation requirement doc.:IEEE802.15-08-0153-00-0006 March 2008 Timeliness Cont’d Slide 6 Ranjeet K. Patro Submission

  7. Requirement: • Information loss should be as low as possible (towards zero) Challenges: • Continuous change in channel conditions • Interference from other networks • Achieving high reliability with low power consumption is a design challenge doc.:IEEE802.15-08-0153-00-0006 March 2008 Reliability Slide 7 Ranjeet K. Patro Submission

  8. Requirement: • Processing + Reception + Transmission power should be minimum Challenges: • Maintaining energy efficiency with medium/high data rate • Design of single MAC for medical and non-medical applications doc.:IEEE802.15-08-0153-00-0006 March 2008 Energy Efficiency Slide 8 Ranjeet K. Patro Submission

  9. Requirement: Strong security protocols for • Confidentiality • Authentication • Integrity and replay protection Challenges: Strong security protocols require • High computation • More communication: Extra roundtrips means more power consumption doc.:IEEE802.15-08-0153-00-0006 March 2008 Security and Privacy Slide 9 Ranjeet K. Patro Submission

  10. http://www.verichipcorp.com/ • http://www.digitalangel.com/ • http://www.wired.com/science/discoveries/news/2004/07/64194 • http://www.kevinwarwick.com/ • ITU-T Recommendation G.114 “One-way transmission time”, 1996 • “Human perception of jitter and media synchronisation”, R. Steinmetz, IEEE JSAC Vol 14, No. 1, Jan 1996 doc.:IEEE802.15-08-0153-00-0006 March 2008 References Slide 10 Ranjeet K. Patro Submission

More Related