Common search

Friday, October 19, 2012

Li-Fi a new technique for the exchange of data using light More impressive technique

Li-Fi a new technique for the exchange of data using lightMore impressive technique


A group of researchers at the University of Edinburgh to develop the process of linking wireless networks using light instead of radio waves technology currently used. And can reach data transfer speed of light through to 130 megabits per second (Mbps). They called the name of this technology name (Li-Fi), and data is transferred using a set of small bulbs (LEDs), where movement of data packets to sensors in particular by making changes in the intensity and the amount of light transmitted and invisible to the human eye.
He told the German physicist Harald Haas specialized in wireless communications at the University of Edinburgh that company Pure VLC has developed the so-called lighting smart and it will be able in the near future to use lighting systems to send and receive data and networking speeds up to 50 megabits per second. He added that he and the team has are developing technology (Li-Fi) to accommodate a larger amount of data sharing across networks of up to 1 gigabit per second.
As reported Haas Speaking at TEDGlobal conference last summer, the idea of ​​using light in the exchange of data, and introduced his initial experience with light office Regular download high-definition video. He said that he hoped that this new technology available in mobile devices soon by exploiting built-in camera as will be a gateway to load data.
Some of the significant benefits of technology (Li-Fi) they use a wider range of about 10,000 times the area of ​​the technology used in radio signals currently used in the data transfer process, which will allow the exchange of thousands of signals within the same space. This technique also is relatively safe because they operate within the line of sight, so it can be used inside homes and offices without thinking leakage signal to the outside, which could open the area to hack attacks.

No comments:

Post a Comment

.

Powered By Blogger

Search This Blog