No Slide Title

Download Report

Transcript No Slide Title

Bluetooth and Wireless LAN Technology Primer and Mobile Products

September 2001 David Conway-Jones Technology Consultant, IBM EMEA Pervasive Computing email: [email protected]

IBM Wireless e-business

Introduction

Positioning of PAN/LAN/WAN

Wireless Local Area Network (WLAN) and 802.11

Personal Area Networks (PAN) and Bluetooth

Future Wireless Technologies

IBM Mobile Wireless Technology

IBM Wireless e-business

Penetration of Technology Opportunities for Connection

Servers PCs and Desktops Mobiles 60% penetration in UK TV - approx 1 per home White Goods, Entertainment Systems, Toys, Cars, Infrastructure, etc - multiple per home

Connected to Internet

IBM Wireless e-business

Geography Off-campus (Open areas) On-campus (Office, School, Airport, Hotel) Person Space (office, briefcase, person) Nomenclature WAN LAN PAN Wireless Technology Cellular (Kilometers) 802.11b (10’s-100’s of meters) Bluetooth (meters to 10’s of meters) IBM Wireless e-business

Augment Wired LANs

Peer-to-peer collaboration Ad hoc Infrastructure LAN Access Point

1. Wireless Local Area Networks (WLAN)

2. WLAN Components

3. IEEE 802.11 ?

4. Mixing Vendor Equipment

5. Wireless and wired LAN interoperability

6. WLAN Range

7. Access Points

8. Roaming

9. Using a WLAN to Interconnect two LANs

10. WLAN Scenarios

11. Security

12. Technology Comparisons

IBM Wireless e-business

Worldwide WLAN Sales ($ in Millions)

IBM Wireless e-business

• Two or more computers connected

wirelessly using standard network protocols

• The current buzzword however generally refers to wireless LANs

(WLAN).

• Controlled by a standards committee

(IEEE 802.11)

• WLAN solutions for: • Business • Education • Applications where network wiring is impossible • Warehousing • Point-of-sale handheld equipment.

IBM Wireless e-business

There are two kinds of wireless networks:

1) An ad-hoc,

or peer-to-peer wireless networks •Each computer

communicates directly

with each other to: send files, share printers, work collaboratively •They may not be able to access wired LAN resources, unless one of the computers acts as a bridge to the wired LAN using special software.

2) Infrastructure

wireless networks (access points, hardware or software) •

Access point

acts like a hub, providing connectivity for the wireless computers. It can connect (or "bridge") the wireless LAN to a wired LAN, allowing wireless computer access to LAN resources, such as file servers or the Internet.

IBM Wireless e-business

Dedicated hardware access points (HAP)

Wired Client

Wired Network

Wireless Clients Access Point

Wireless Network

Server

IBM Wireless e-business

Software Access Points which run on a computer equipped with a wireless network interface card as used in an ad-hoc or peer-to-peer wireless network

Wired Client Wireless Client Software Access Point

Wired Network Wireless Network

Server Wireless Client

IBM Wireless e-business

•Wireless networking hardware requires the use of underlying technology that deals with

radio frequencies

as well as

data transmission

. •The most

widely used standard is 802.11

produced by the Institute of Electrical and Electronic Engineers (IEEE). •This is a standard

defining all aspects

of Radio Frequency Wireless networking.

•802.11 was ratified in

1997 at speeds of 1- 2 Mb/s

•The

802.11b

extension runs at 1, 2, 5.5 and

11 Mb/s IBM Wireless e-business

802.11a

is a proposed spec running in the

5GHz

IBM band with speeds of

54Mb/s

scheduled for

2002

•But range is less (more like 10m) •The

802.15 Coexistence Task Group

is addressing interoperability between low-power wireless devices (Bluetooth) and 802.11b. Completion is scheduled for 2001 •

IBM

is a

member

of 802.11 and 802.15

IBM Wireless e-business

•Because most wireless networking hardware vendors support the 802.11 standard they can

inter operate.

Verification

is recommended because there are two different modulation techniques: •Frequency Hopping Spread Spectrum (FHSS) •Direct Sequence Spread Spectrum (DSSS) •They are not interoperable. •When purchasing wireless networking hardware from separate vendors be sure to

obtain guarantees

from the vendors that the hardware will inter-operate and follows the standards.

IBM Wireless e-business

•Within a

short time

all new wireless cards, like Ethernet cards, will become inexpensive, ubiquitous and

totally interoperable

. •The latest version of the standard (802.11b) defines

11mbps

with support for the older standard of 1mbps and 2mbps speeds. This provides compatibility with different or older equipment.

•Note that this new standard

covers DS-type Networks, not FH types

.

•At this point

mixing Access Points is not recommended,

unless it has the

Wi-Fi

(Wireless Fidelity) logo from WECA (Wireless Ethernet Compatibility Association)

IBM Wireless e-business

•The Access Point acts as a

“Bridge”

between the wireless and wired networks •

Hardware

access points are available with various types of network interfaces, such as Ethernet or Token Ring •

Software

access point may also be used

IBM Wireless e-business

• Each access point has a

finite range

• The

distance varies

depending upon the environment; indoor, outdoor, building construction.

• Operating at the limits of the range

reduces performance

. • Typical indoor ranges are

20-50 meters, outdoor are 100-200 meters

Longer ranges

are possible; performance will degrade with distance.

• Using multiple Access Points will

extend the range IBM Wireless e-business

•Inexpensive access points have a recommended limit of

10

•More expensive access points support up to

100

wireless connections. •Using more computers than recommended will

degrade performance

and reliability •

Multiple

access points can be connected to a wired LAN, or to a second WLAN.

Functions vary

by manufacturer

IBM Wireless e-business

•A wireless computer can

"roam"

from one access point to another •Completely

transparent

user to the •Some access point configurations

require security authentication

when swapping access points, usually in the form of a password dialog box. •Access points are required to have

overlapping

wireless areas to achieve this.

IBM Wireless e-business

•WLAN offers a

cost-effective

solution to users with difficult physical installations such as: •campuses •hospitals •businesses with more than one location in immediate proximity but separated by public thoroughfare.

•This type of installation requires

two access points

.

•Each access point acts as a

bridge

or router connecting its own LAN to the wireless connection. •The wireless connection allows the two access points to communicate with each other, and therefore

interconnect

the two LAN's.

IBM Wireless e-business

Mobile users

, both on and off “campus” •Where physical wiring is

difficult

or impossible •

Connecting small groups

to a larger work environment. •Wireless networking in these environments is a very

cost effective alternative

Temporary

wireless LANs can easily be created for exhibitions, school or business projects, all without any trailing cabling.

IBM Wireless e-business

Potential

security issues; physical access not required.

•802.11 wireless communications nor decoded by simple scanners or short wave receivers.

cannot

be received •However,

eavesdropping

equipment. is possible using

special

•802.11 WLAN have a function called

WEP

Equivalent Privacy); a form of encryption.

(Wired •Access Points can control access via

unique MAC addresses.

•Virtual Private Networking

(VPN)

techniques will work over wireless networks in the same way as traditional wired networks. This is the best approach.

IBM Wireless e-business

WLAN Security: SSID

•Network

access control

can be implemented using an SSID associated with an AP or group of APs. •The SSID provides a mechanism to

"segment" a wireless network

into multiple networks serviced by one or more APs.

•Each AP is

programmed with an SSID

corresponding to a specific wireless network.

•To access this network, client computers must be

configured with the correct SSID.

•The SSID acts as a

simple password IBM Wireless e-business

WLAN Security: MAC Filtering

•A client computer can be identified by the

unique MAC

address of its 802.11 network card. •Each AP can be programmed with a

list of MAC addresses

associated with the client computers allowed to access the AP. •If a client's MAC address is

not included

in this list, the client is

not allowed

to associate with the AP. •MAC address filtering provides

good security

, but is best suited to small networks. •Each AP must be

manually programmed

with a list of MAC addresses, and the list must be kept up-to-date.

IBM Wireless e-business

WLAN Security: WEP

•WEP provides

encrypted communication

•All clients and APs on a wireless network

use the same key

•The key

resides in the client

computer and in each

AP

•Support for WEP is

standard

•WEP specifies the use of a

64-bit

encryption key •Implementations of

non-Wi-Fi 128-bit

key encryption exists •The 802.11 standard

does not specify a key management

protocol, so all keys on a network must be managed manually

IBM Wireless e-business

WLAN Security: VPN

•A

VPN solution

for wireless access is the

most suitable

alternative to WEP and MAC address filtering. •VPN solutions are

already widely deployed

to provide remote workers with secure access to the network via the Internet. •In this remote user application, the VPN

provides a secure

, dedicated path (or "tunnel") over an "untrusted" network-in this case, the Internet. •Various

tunneling protocols

are used in conjunction with standard, centralized authentication solutions,such as Remote Authentication Dial-In User Service (

RADIUS

) servers.

IBM Wireless e-business

WLAN Security: VPN

VPN

technology can also be used for

secure wireless access

; the "untrusted" network is the wireless network. •The APs are configured for

open access with no WEP encryption

, but wireless access is isolated from the enterprise network by the VPN server and a VLAN between the APs and the VPN servers. •The APs should still be configured with

SSIDs

for segmentation. •

Authentication and full encryption

provided

through the VPN

over the wireless network is servers that also act as gateways. •Unlike the WEP key and MAC address filtering approaches, the VPN-based solution is

scalable

to a very large number of users.

IBM Wireless e-business

Cell phone Modem Access Point ThinkPad WorkPad Peripherals

Personal Area “Connectivity”

1. What is Bluetooth?

2. Characteristics?

3. Usage scenarios: Today/Tomorrow?

4. 802.11 vs. Bluetooth vs. IR

5. Security

6. IBM’s Contribution

IBM Wireless e-business

Defacto standard for

wireless Personal Connectivity technology Specification

for

small

-form factor,

low

-cost,

short

range radio links between mobile PCs, mobile phones and other

portable devices.

The Bluetooth Special Interest Group

(SIG)

is an industry group consisting of leaders in the telecommunications and computing industries that are driving development of the technology and bringing it to market.

IBM, Toshiba, Ericsson, Nokia, Intel - Motorola, Microsoft, Lucent and 3Com

companies - plus

2000+

other

IBM Wireless e-business

Bluetooth Market Potential

W/W Bluetooth Enabled Equipment Forecast (Units in Millions) Source : Cahners In Stat July 2000 IBM Wireless e-business

• Operates in the

2.4 GHz

Industrial-Scientific-Medical (ISM) band at a data rate of

721Kb/s

• Uses

Frequency Hopping (FH) spread spectrum

, which divides the frequency band into a number of channels (2.402 - 2.480 GHz yielding 79 channels). 1600 hops/sec.

• During a connection, radio transceivers

hop

from one channel to another in a

pseudo-random fashion, determined by the Master

. • Supports up to

8 devices in a piconet

slaves sharing a channel). (1 master and up to 7 • Up to

10 piconets

can combine to form

scatternets (scaling).

IBM Wireless e-business

• A

collection

of devices • Connected via Bluetooth in an

ad hoc

fashion. • Starts with

two

devices, and may grow to

eight

(including the master) •

Master

sets the

clock

and

hopping

pattern.

• However, when establishing a piconet, one unit will act as a

master

and the other(s) as

slave

(s) for the duration of the piconet connection.

• A

Scatternet

is the

linking

of multiple

co-located piconets

through the sharing of common master or slave devices.

IBM Wireless e-business

• Built-in

security.

• Non line-of-sight transmission

through walls and briefcases

. •

Omni-directional

. • Supports both

voice and data Serial

links and

TCP/IP

services; easy integration of for networking •

Regulated

by governments

worldwide,

even France !

• Supports both

one-to-one

and

one-to-many

topologies networking • Devices must be in a

10 meter radius

for communications to occur.

IBM Wireless e-business

Bluetooth Protocol Stack

Lower Transport Upper Transport Middleware Adopted

WAE WAP vCard/vCal Obex Service Discovery TCP/UDP IP PPP RFComm LMP L2CAP HCI BaseBand Radio Telephony Control Audio IBM Wireless e-business

• One-to-one • One-to-many (generally Serial mode) (generally TCP/IP mode)

IBM Wireless e-business

• Bluetooth Usage Models for Notebooks • Dial-Up Networking via cell phone • Syncing • File Transfer • Target Devices • Cellphone • Desktop • Handheld • Other Notebook

File Transfer Dial-up Networking Synchronization

IBM Wireless e-business

• Bluetooth Usage Models for Handhelds • Dial-up Networking via Cell phone • Syncing • File Transfer (business cards) • Target Devices • Cell phone • Desktop • Notebook • Other handheld

Dial-up Networking Synchronization File Transfer

IBM Wireless e-business

Bluetooth Usage Models for Desktop Syncing File Transfer Lan Access for devices

Synchronization

Target Devices Handheld Notebook

File Transfer

IBM Wireless e-business

Headset Telephony Infrastructure Data Access Points IBM Wireless e-business

• A computer network that spans a relatively

large

geographical area. • Typically, a WAN consists of

two or more

local-area networks (LANs). • Computers connected to a WAN are often connected through

PSTNs

. They can also be connected through

leased

lines or

satellites

. The largest WAN in existence is the

Internet

.

IBM Wireless e-business

Ease-of-Use

Dial-Up Networking File Transfer Synchronization

Point to Point

Cordless Computer Intercom FAX LAN Access Headset

Multi-Point

Personal Area Networking Automotive Wake on Bluetooth Human Interface Devices Audio/Visual Walk-up Printing Hidden Computing Instant Postcard

Multi-Piconet

Today Tomorrow The Future

IBM Wireless e-business

Standard Connectivity

Today: Many Cable Connections • • • • • • • • • • • Serial Parallel Mouse Keyboard Floppy Audio IR USB Video Docking Power Adds weight and cost Decreases reliability

IBM Wireless e-business

Standard Connectivity

Today: Many Cable Connections Tomorrow: Fewer Cables • • • • • • • • • • • Serial Parallel Mouse Keyboard Floppy Audio IR USB Video Docking Power Adds weight and cost Decreases reliability Bluetooth • • • • USB Video Docking Power Reduces weight and cost Increases reliability

IBM Wireless e-business

Personal Area Networking

Spontaneous / ad-hoc networking Computer Supported Cooperative Work (CSCW) environments Workgroup collaboration Between many different devices PC, PDA, Printer, Mobile phone, Communicator, Digital Camera (Still & Video) Digital TV, MP3 Player etc… Slave-to-slave communication is through the master IBM Wireless e-business

Walk up “push” of adverts and services.

Demo uses IBM Research Blue Drekar stack available from Alphaworks.

Contact Yook Siong Chin.

IBM Wireless e-business

Location Aware Services

NOT

• • eg -

Location Based Services

Where is nearest xyz ?

Pay for vending.

• But

AWARE

• • •

of the user

anticipate needs prepare and be ready to interact only need to know that the user is present •

or indeed no longer present

• Bluetooth device eg Phone or PDA is ideal.

• •

Carried with user Individual

IBM Wireless e-business

Total effect = real ease of use

• Come into office • • • PC unlocks Buddy status says user at desk Phone calls go to desk phone • Go to lab • • • • Office PC locks up Buddy status says away from desk Lab lights turn on Phone calls go to lab • Go to lunch • • lab lights go off phone calls go to mobile • • Go back to office • PC unlocks • • Buddy status says user at desk Phone calls go to desk phone etc...

Without pressing a single button !

IBM Wireless e-business

Unique

MAC address for every Bluetooth device • Bluetooth has

built-in encryption and authentication

• In addition a frequency-hopping scheme with

1600 hops/sec

is employed. • All of this, together with an automatic output

power adaptation

to reduce the range exactly to requirement, makes the system extremely

difficult to eavesdrop IBM Wireless e-business

Security mode 1 (non-secure). • A device does not initiate any security procedures. • Security mode 2 (service-level enforcement security).

• A device does not initiate security procedures before channel establishment at the service level. This mode allows different and flexible access policies for applications, and is used especially for running applications with different security requirements in parallel. • Security mode 3 (link-level enforced security). •A device allows only authenticated connections. •Bluetooth technology has three security attributes •Authorization •Authentication •Encryption.

IBM Wireless e-business

•Authorization •Database of services which a device

has authorization

to use •Authentication •The user can choose to

"auto" trust

devices or

"manually" trust

devices.

•Authentication is accomplished using a

challenge-response

scheme using symmetric link keys.

•If the devices do not share a link key, one is created through a process called

"pairing"

and based on a shared secret association, like a

PIN code

. •If a device does not have a mechanism to enter a PIN, a restricted form link key, called a unit key, is generated based on the device's address and random number.

• Encryption can only be activated after authentication. Encryption is based on a stream cipher easily implemented in hardware or software.

IBM Wireless e-business

• IBM is one of the original 5

founding

members.

• IBM

authored the discovery protocol

(discovery protocol is a method to explore and discovery Bluetooth devices and services within range) • IBM

contributed to the lower layer protocol

that makes up the entire Bluetooth protocol stack (link level protocol) • IBM

contributed to the Bluetooth world-wide regulatory working bodies

to harmonize the 2.4GHz frequency spectrum use for Bluetooth and other government agency requirements.

• IBM

funds and contributes

events.

to many of the the organization’s • IBM is

leading the effort

to standardize IEEE 802.15, which will embrace Bluetooth as a short range wireless standard.

IBM Wireless e-business

Standard Primary Use Primary Products Technology Frequency Raw Data Rate Range Topology Power output Roaming Voice Security Cost per PC

(projected YE 2000/YE 2001)

Availability Infrared

IrDA

Bluetooth

Bluetooth Special Interest Group de-facto

HomeRF

None - based on HomeRF working group Home networking Cable replacement Notebook and Desktop PCs, PDAs, Mobile Phones, Printers Optical 850nm 4Mb/s line of sight 3/5 meters Point to Point Low No No Cable replacement Notebook and Desktop PCs, PDAs, Mobile Phones, Printers Frequency Hopping Spread Spectrum (FHSS) 2.4GHz

1Mb/s 10 meters Point to Point Point to Multipoint (8 devices/pico-net) Low No Yes Application Integrated Notebook and Desktop PCs Frequency Hopping Spread Spectrum (FHSS) 2.4GHz

1.6 Mb/s 50 meters multipoint High No Yes Less robust - unique network specific IDs

802.11b

IEEE 802.11b

Business networking Notebook and Desktop PCs Direct Sequence Spread Spectrum (DSSS) 2.4GHz

11 Mb/s 50 meters Many to Many (CSMA) High Yes No Robust including Wired Equivalent Privacy (WEP) $180/$80 $120/$100 $180/$80 Part of notebook for years; With Legacy Free, will become an option Option in 2000 Integrated by YE 2001 Option Option and integrated in 2000

IBM Wireless e-business

What do you want to do?

For connecting devices in your “Personal Domain”... For connecting clients to your LAN Infrastructure...

Campus wide

or someone else’s or a public one

Airport/Hotel

Bluetooth is the right choice 802.11b WLAN is the right choice

IBM Wireless e-business

For creating an ad hoc Peer-to-Peer Network Either would suffice Bluetooth: One-to-many 802.11b: Many-to-many Consider: •Technology install base •Size of the workgroup •Extent of the CSCW effort (Computer Supported Cooperative Work)

IBM Wireless e-business

Other Wireless Technologies

Advantages

Electric field

Carrier Frequency (MHz)

0.1-1

Maximum Bit Rate (Kbps) Range (m)

20 2 Magnetic field RF UHF 5 300-500 RF microwave ISM Optical infrared (low data rate) 2400 Light Optical infrared (high data rate) Light 250 40 1000 10 1000 6 30 10-100 10 1

Problems Application

Capacitive coupling limits range, data transmitted by touch, international use Signal goes through body, international use Low cost, efficient for distance Signal blocked by body, grounded objects Antenna size Local regulations Identification Picocells data messaging Access control, telecommand International, fast Cost, power Data networking Simple, very inexpensive, no regulations Simple, inexpensive, no regulations Directional Directional or high power Home remote control Infrared Data Association (IrDA) for laptops http://www.research.ibm.com/journal/sj/384/zimmerman.html

IBM Wireless e-business

UWB – Impulse Radio

• Ultra Wide Band

Uses picosecond mono-pulses

• •

Creates very wide radio spectrum Down in noise floor (-30 to -60dB)

Requires

very

accurate timebase

Normally based on PPM techniques

• •

But can deliver high data rates (80+ Mbs) At very low power ( µW)

Fourier Transform of infinitely narrow pulse = infinitely wide frequency spectrum

t f

IBM Wireless e-business

Example: Pulse-LINK ™

Pulse~LINK, Inc.

http://www.pulselink.net/

80Mbs

150m IBM Wireless e-business

UWB

• Currently used in military applications • Squirt radios • • Difficult to detect / intercept Low power for data rate means more portable

• Pulsed Radar

• • Can “see through” obstacles Difficult to detect and protect against

• Not licensed for public use

• • • Cuts across most currently licensed bands Backers claim no need as there will be no interference to normal equipment Others doubt that – they say the background noise will increase and some frequencies may be more impacted than others as pulses are not true impulse shape

IBM Wireless e-business

UWB

• Wide frequency range helps with transmission through obstacles

• • • Like bodies, walls, furniture Harder to shield against Helps Omni-directional transmission

• No studies on health implications

• Although very low power – what are the effects of continuous impulses across wide freq range ?

IBM Wireless e-business

Smart Dust

• Target is sub mm sized devices • Free floating in air • Containing sensors

• Temp, acceleration, pressure, chemical, etc

• And communications to other particles

• • • • 5 – 10 m range 20kbs 900MHz radio Or km range via laser http://robotics.eecs.berkeley.edu/~pister/SmartDust/

IBM Wireless e-business

The Challenge for Wearables

• Need to interconnect components UWB has lots of promise – low power – data rates high enough But no real interoperability standards between devices Not many off the shelf components – expensive (for now) Hign frequencies mean CMOS fab unlikely • & connect within PAN to other devices Probably needs to support existing standards Most likely Bluetooth But devices may will switch to UWB or similar • & connect outside of PAN Definitely needs to support existing standards Maybe via CPU point 802.11b/a too power hungry for WAN wearable use

IBM Wireless e-business

1) Bluetooth: PC Card and ThinkPad UltraPort

2) 802.11b PC Card, ThinkPad UltraPort and Access Point

3) ThinkPad and WorkPad Proven products

4) Other products “available”

IBM Wireless e-business

IBM High Rate IBM High Rate Wireless LAN PC Card Wireless LAN Access Point

£127 list price - 128bit

£105 list price - 64 bit

Plugs into the ThinkPad’s

• •

£486 IBM Web price Bridges to the wired corporate

CardBus slot Provides wireless access to corporate LAN from anywhere within a 45-90m radius

Supports speeds from 2 to 11 Mbps

64 bit encryption (WEP) or 128 bit

LAN Allows the user to roam within coverage area

Can support multiple users IBM Wireless e-business

Ann: 9/5 GA: October

£143 list price

Bluetooth PC Card

For Legacy Devices 09n9812

Ann: 1Q 2001

£127 list price

Bluetooth UltraPort

For Optimal Performance 09n9811

Designed to replace peripheral cables for PDAs, printers, cameras, etc.

Designed for personal space connectivity

Connectivity range of 10 meters

Nominal data rate of 1 Mb/s

Built-in encryption IBM Wireless e-business

Bluetooth Module Ericsson Cell Phone Ericsson Headset R520m, T39m

Wireless access to Internet and corporate networks

Wireless connection to ThinkPad

Non-directional; phone can be in your briefcase

Wirelessly update your phone’s address book from your system

Insulates you from rapid changes in cellular networks IBM Wireless e-business

TDK Blue5 clip for PalmV Nokia Bluetooth “battery” for 6210 & CF 1 card GN Netcom 9000 Headset IBM Wireless e-business

This is NOT a product Linux based watch / pda “Watchpad”

Runs X-clock really well !

Also now includes Bluetooth

Supports Sync , DUN and Audio

Current demos include PIM sync, and control of PC.

IBM Wireless e-business

Shrinking Components – Disk Drives

1980 – IBM Launches 1 st GB Disk 2000 – IBM Launches 1 st   GB Micro Drive  Costs < $500 1 GB is :  2500 high resolution photos, or  1000 200 page books, or  18 hours high quality music.

IBM Wireless e-business

Devices that Answer Back . . . !

     Standard Palm Pilot Speech Co-Processor  Speech to Text  Text to Speech Technology Demonstrator Progressing with Device Manufacturers Now runs on standard hPaq Ask Question Replies by Showing & Speaking Information

IBM Wireless e-business

IBM Prototype wearable

Highlights

ThinkPad 560X Equivalent Logic IBM YASU high density PCB Ultimate Portability Headphone Stereo Size System Unit, 0.85 lbs.(380g) IBM MicroDrive 1"Disk up to 1 G Capacity Compact Head Mount Display SVGA Full Color display (Developed by Olympus) System Unit with motherboard and battery Compact Head Mount Display - Olympus PC Eye-Trek (Micro display/Earphone/Microphone)

Not available for sale

Handy Controller - IBM Tractile (TrackPoint/Click Buttons)

IBM Wireless e-business

Visual Interaction

Vision Pad

prototype: • Transparent head mounted display • • Handheld controller Speech input • Augmented reality concept – sign recognition and translation

IBM Wireless e-business

Resources

IBM Pervasive Computing

• http://www.ibm.com/pvc

Bluetooth SIG

• http://www.bluetooth.com

Shameless Plug for Book

Bluetooth Revealed,

published by Prentice-Hall, September 2000

AU-Systems - good Bluetooth White Paper

• http://www.ausys.se/servlet/PSPDownloadServlet?iListItemId

=6833

UWB – Impulse Radio

• http://www.uwb.org

IBM Wireless e-business

IBM Wireless e-business