BY P.V.RAJA SHEKAR 06S11F0031 MCA FINAL YEAR
CONTENTS WHAT IS VIRTUAL REALITY WHAT IS HOLOGRAMIC IMAGE WHAT IS TELE IMMERSION APPLICATIONS ADVANTAGES DISADVANTAGES CONCLUSION REFERENCES
Virtual Reality Definition:
A computer generated, ‘immersive’ (or wide field), multi-sensory information program which tracks a user in real time.
TELE IMMERSION Tele-Immersion
is the synthesis of Virtual Reality, video conferencing, and advanced computation
TI setup
Hardware and software technologies needed: -
3D real-time system for acquisition of dynamic, real objects (Upenn) static scene acquisition (UNC) rendering and stereo display architecture (UNC) high precision headtracking system (UNC) modeling and manipulation with virtual objects (Brown) multi-person interaction and collaborative architecture (Brown)
Camera arrangement
C dCa2 3 da ta ta
PC1
C 2 C 1
C 3
PC3
C 4
C5 data C4 data
PC4
6 C 5ta C a da at d
PC2
C4 data C3 data
C 5
PC5
C 6 C 7
Characteristics of Tele-Immersion Flows BW
Latency Sensitive
Jitter Sensitive
Reliability Reqrmnt
Burstiness
Packet Size
Protocol
Avatar (virtual representation)
Low
Y
Y
Low
Constant
Small
RTP / UDP
Audio conference
Med
Y
Y
Low
Constant
Med
RTP / UDP
Video conference
High
Y
Y
Low
Constant
Large
RTP / UDP
Realtime state updates
Low
Y
Y
Med
Short bursts
Small
FEC
Non-realtime state updates
Low
N
N
High
App dependent
Small
TCP
Small bulk data (image files)
Med
N
N
High
Medium bursts
Large
TCP/CPTCP
Large bulk data (raw data sets)
High
N
N
High
Very long bursts
Large
PTCP / RBUDP
Streaming bulk data (high quality audio/video/bit map/polygons)
High
Y
N
High
Long bursts
Large
SRBUDP / AFEC
Applications: - preoperative planning - tele-diagnostics - tele-assisted surgery - advanced surgical training
Other: - tele-meetings - tele-collaborative design - computer supported training and education - 3D interactive video
- entertainment
Advantages Eliminates
time.
the barriers of space and
Conclusion
In order to encourage applications, a better level of communication among network engineers, application programmers, and scientists needs to be supported. The nomenclature and styles of networking access and engineering are essentially totally disjoint from the way application programmers and computational scientists write programs and use computers. Security and Acceptable Use Policy (AUP) considerations are typically idiosyncratic at computer sites, yet need to be uniform, or at least interoperable, for networks to support applications.