Вы находитесь на странице: 1из 14

BY

P.V.RAJA SHEKAR
06S11F0031
MCA FINAL YEAR
CONTENTS
 WHAT IS VIRTUAL REALITY
 WHAT IS HOLOGRAMIC IMAGE
 WHAT IS TELE IMMERSION
 APPLICATIONS
 ADVANTAGES
 DISADVANTAGES
 CONCLUSION
 REFERENCES
Virtual Reality
 Definition:

A computer generated,
‘immersive’ (or wide field),
multi-sensory information
program which tracks a
user in real time.
TELE IMMERSION

Tele-Immersion is the synthesis


of Virtual Reality, video
conferencing, and advanced
computation
TI setup
Hardware and software
technologies needed:
- 3D real-time system for acquisition of
dynamic, real objects (Upenn)
- static scene acquisition (UNC)
- rendering and stereo display architecture
(UNC)
- high precision headtracking system
(UNC)
- modeling and manipulation with virtual
objects (Brown)
- multi-person interaction and collaborative
architecture (Brown)
Camera arrangement

C4 data C5 data
C3 data PC3 C4 data

C 5ta
PC2 PC4

6
da at
C a
d
C
dCa2 3
C
da ta

C 4 C
ta

PC1
3 5 PC5

C C
2 6
C C
1 7
Characteristics of Tele-Immersion Flows

BW Latency Jitter Reliability Burstiness Packet Protocol


Sensitive Sensitive Reqrmnt Size
Avatar (virtual Low Y Y Low Constant Small RTP / UDP
representation)
Audio Med Y Y Low Constant Med RTP / UDP
conference
Video High Y Y Low Constant Large RTP / UDP
conference
Realtime state Low Y Y Med Short Small FEC
updates bursts
Non-realtime Low N N High App Small TCP
state updates dependent
Small bulk data Med N N High Medium Large TCP/CPTCP
(image files) bursts
Large bulk data High N N High Very long Large PTCP /
(raw data sets) bursts RBUDP
Streaming bulk High Y N High Long Large SRBUDP /
data bursts AFEC
(high quality
audio/video/bit
map/polygons)
Applications:
- preoperative planning
- tele-diagnostics
- tele-assisted surgery
- advanced surgical training
Other:
- tele-meetings
- tele-collaborative design
- computer supported training and education
- 3D interactive video
- entertainment
Advantages

 Eliminates the barriers of space and


time.
Conclusion
 In order to encourage applications, a better
level of communication among network
engineers, application programmers, and
scientists needs to be supported. The
nomenclature and styles of networking access
and engineering are essentially totally disjoint
from the way application programmers and
computational scientists write programs and
use computers. Security and Acceptable Use
Policy (AUP) considerations are typically
idiosyncratic at computer sites, yet need to be
uniform, or at least interoperable, for networks
to support applications.