• Enterprise IT Services
    • Enterprise IT Services
      • Enterprise IT Services & Consulting
      • Voice, Video & Mobile Communications
      • Virtual IT Department – CIO, CTO, CISO Services
      • Business Continuity Planning
      • Business Hardware & Software
      • Network Maintenance & Parts Logistics
    • Enterprise Security
      • Information Technology Security Audits
      • Managed Firewall Services
      • Managed Network Security
      • Facility Access Controls & Systems
      • Systems Security Audits
    • Data Center Services
      • Business Virtualization
      • Cloud Computing & Hosting Solutions
      • Data Center Modernization
      • Data Center Relocation
      • Disaster Recovery Services & Solutions
    • IT Data Analytics
      • IT Management Software
      • IT Security Analytics
      • Application Response Time Analytics
      • Firewall Log Analytics
      • Server Performance Analytics
      • Help Desk Analytics
      • Arnett Group Insights Portal Login
  • IT Audits
    • M&A Tech Audits
    • Security Audits
  • Request Information
  • Events
  • Resources
    • Enterprise Networks
    • Data Center & Cloud
    • IT Security
    • Collaboration
    • Communication
    • Li-Fi Technology
    • AI & Cognitive Applications
  • Support
  • Arnett Group
    • News
    • About Us
    • Meet The Team
    • Testimonials
    • Careers
    • Terms & Privacy
    • Contact Arnett Group

Call Arnett Group IT Solutions! 844-IT-STRATegy (844-487-7283)

We're Centrally Located
sales@arnettgroup.net
Login

Login
Arnett GroupArnett Group
Arnett GroupArnett Group
  • Enterprise IT Services
    • Enterprise IT Services
      • Enterprise IT Services & Consulting
      • Voice, Video & Mobile Communications
      • Virtual IT Department – CIO, CTO, CISO Services
      • Business Continuity Planning
      • Business Hardware & Software
      • Network Maintenance & Parts Logistics
    • Enterprise Security
      • Information Technology Security Audits
      • Managed Firewall Services
      • Managed Network Security
      • Facility Access Controls & Systems
      • Systems Security Audits
    • Data Center Services
      • Business Virtualization
      • Cloud Computing & Hosting Solutions
      • Data Center Modernization
      • Data Center Relocation
      • Disaster Recovery Services & Solutions
    • IT Data Analytics
      • IT Management Software
      • IT Security Analytics
      • Application Response Time Analytics
      • Firewall Log Analytics
      • Server Performance Analytics
      • Help Desk Analytics
      • Arnett Group Insights Portal Login
  • IT Audits
    • M&A Tech Audits
    • Security Audits
  • Request Information
  • Events
  • Resources
    • Enterprise Networks
    • Data Center & Cloud
    • IT Security
    • Collaboration
    • Communication
    • Li-Fi Technology
    • AI & Cognitive Applications
  • Support
  • Arnett Group
    • News
    • About Us
    • Meet The Team
    • Testimonials
    • Careers
    • Terms & Privacy
    • Contact Arnett Group

Wireless data from every light bulb | Harald Haas

Home | Uncategorized | Wireless data from every light bulb | Harald Haas



August 2, 2011 Uncategorized


What if every light bulb in the world could also transmit data? At TEDGlobal, Harald Haas demonstrates, for the first time, a device that could do exactly that. By flickering the light from a single LED, a change too quick for the human eye to detect, he can transmit far more data than a cellular tower — and do it in a way that’s more efficient, secure and widespread.

TEDTalks is a daily video podcast of the best talks and performances from the TED Conference, where the world’s leading thinkers and doers give the talk of their lives in 18 minutes. Featured speakers have included Al Gore on climate change, Philippe Starck on design, Jill Bolte Taylor on observing her own stroke, Nicholas Negroponte on One Laptop per Child, Jane Goodall on chimpanzees, Bill Gates on malaria and mosquitoes, Pattie Maes on the “Sixth Sense” wearable tech, and “Lost” producer JJ Abrams on the allure of mystery. TED stands for Technology, Entertainment, Design, and TEDTalks cover these topics as well as science, business, development and the arts. Closed captions and translated subtitles in a variety of languages are now available on TED.com, at .

Do you know

that we have 1.4 million cellular radio masts

deployed worldwide?

And these are base stations.

And we also have

more than five billion

of these devices here.

These are cellular mobile phones.

And with these mobile phones,

we transmit more than 600 terabytes of data

every month.

This is a 6 with 14 zeroes —

a very large number.

And wireless communications

has become a utility

like electricity and water.

We use it everyday. We use it in our everyday lives now —

in our private lives, in our business lives.

And we even have to be asked sometimes, very kindly,

to switch off the mobile phone at events like this

for good reasons.

And it’s this importance

why I decided to look into the issues

that this technology has,

because it’s so fundamental to our lives.

And one of the issues is capacity.

The way we transmit wireless data is by using electromagnetic waves —

in particular, radio waves.

And radio waves are limited.

They are scarce; they are expensive;

and we only have a certain range of it.

And it’s this limitation

that doesn’t cope

with the demand of wireless data transmissions

and the number of bytes and data which are transmitted every month.

And we are simply running out of spectrum.

There’s another problem.

That is efficiency.

These 1.4 million cellular radio masts, or base stations,

consume a lot of energy.

And mind you, most of the energy

is not used to transmit the radio waves,

it is used to cool the base stations.

Then the efficiency of such a base station

is only at about five percent.

And that creates a big problem.

Then there’s another issue that you’re all aware of.

You have to switch off your mobile phone

during flights.

In hospitals, they are security issues.

And security is another issue.

These radio waves penetrate through walls.

They can be intercepted,

and somebody can make use of your network

if he has bad intentions.

So these are the main four issues.

But on the other hand,

we have 14 billion of these:

light bulbs, light.

And light is part of the electromagnetic spectrum.

So let’s look at this in the context

of the entire electromagnetic spectrum, where we have gamma rays.

You don’t want to get close to gamma rays, it could be dangerous.

X-rays, useful when you go to hospitals.

Then there’s ultraviolet light.

it’s good for a nice suntan,

but otherwise dangerous for the human body.

Infrared —

due to eye safety regulations,

can be only used with low power.

And then we have the radio waves, they have the issues I’ve just mentioned.

And in the middle there, we have this visible light spectrum.

It’s light,

and light has been around for many millions of years.

And in fact, it has created us,

has created life,

has created all the stuff of life.

So it’s inherently safe to use.

And wouldn’t it be great to use that for wireless communications?

Not only that, I compared [it to] the entire spectrum.

I compared the radio waves spectrum —

the size of it —

with the size of the visible light spectrum.

And guess what?

We have 10,000 times more of that spectrum,

which is there for us to use.

So not only do we have this huge amount of spectrum,

let’s compare that with a number I’ve just mentioned.

We have 1.4 million

expensively deployed,

inefficient radio cellular base stations.

And multiply that by 10,000,

then you end up at 14 billion.

14 billion is the number of light bulbs installed already.

So we have the infrastructure there.

Look at the ceiling, you see all these light bulbs.

Go to the main floor, you see these light bulbs.

Can we use them for communications?

Yes.

What do we need to do?

The one thing we need to do

is we have to replace these inefficient incandescent light bulbs,

florescent lights,

with this new technology of LED,

LED light bulbs.

An LED is a semiconductor. It’s an electronic device.

And it has a very nice acute property.

Its intensity can be modulated

at very high speeds,

and it can be switched off at very high speeds.

And this is a fundamental basic property

that we exploit

with our technology.

So let’s show how we do that.

Let’s go to the closest neighbor to the visible light spectrum —

go to remote controls.

You all know remote controls have an infrared LED —

basically you switch on the LED, and if it’s off, you switch it off.

And it creates a simple, low-speed data stream

in 10,000 bits per second,

20,000 bits per second.

Not usable for a YouTube video.

What we have done

is we have developed a technology

with which we can furthermore

replace the remote control of our light bulb.

We transmit with our technology,

not only a single data stream,

we transmit thousands of data streams

in parallel,

at even higher speeds.

And the technology we have developed —

it’s called SIM OFDM.

And it’s spacial modulation —

these are the only technical terms, I’m not going into details —

but this is how we enabled

that light source

to transmit data.

You will say, “Okay, this is nice —

a slide created in 10 minutes.”

But not only that.

What we’ve done

is we have also developed a demonstrator.

And I’m showing for the first time in public

this visible light demonstrator.

And what we have here

is no ordinary desk lamp.

We fit in an LED light bulb,

worth three U.S. dollars,

put in our signal processing technology.

And then what we have here is a little hole.

And the light goes through that hole.

There’s a receiver.

The receiver will convert these little, subtle changes in the amplitude

that we create there

into an electrical signal.

And that signal is then converted back

to a high-speed data stream.

In the future we hope

that we can integrate this little hole

into these smart phones.

And not only integrate a photo detector here,

but maybe use the camera inside.

So what happens

when I switch on that light?

As you would expect,

it’s a light, a desk lamp.

Put your book beneath it and you can read.

It’s illuminating the space.

But at the same time, you see this video coming up here.

And that’s a video, a high-definition video

that is transmitted through that light beam.

You’re critical.

You think, “Ha, ha, ha.

This is a smart academic doing a little bit of tricks here.”

But let me do this.

(Applause)

Once again.

Still don’t believe?

It is this light

that transmits this high-definition video in a split stream.

And if you look at the light,

it is illuminating as you would expect.

You don’t notice with your human eye.

You don’t notice the subtle changes in the amplitude

that we impress onto this light bulb.

It’s serving the purpose of illumination,

but at the same time, we are able to transmit this data.

And you see,

even light from the ceiling comes down here to the receiver.

It can ignore that constant light,

because all the receiver’s interested in

are subtle changes.

You also have a critical question now, and

you say, “Okay,

do I have to have the light on all the time

to have this working?”

And the answer is yes.

But, you can dim down the light

to a level that it appears to be off.

And you are still able to transmit data — that’s possible.

So I’ve mentioned to you the four challenges.

Capacity:

We have 10,000 times more spectrum,

10,000 times more LEDs

installed already in the infrastructure there.

You would agree with me, hopefully,

there’s no issue of capacity anymore.

Efficiency:

This is data through illumination —

it’s first of all an illumination device.

And if you do the energy budget,

the data transmission comes for free —

highly energy efficient.

I don’t mention the high energy efficiency

of these LED light bulbs.

If the whole world would deploy them,

you would save hundreds of power plants.

That’s aside.

And then I’ve mentioned the availability.

You will agree with me that we have lights in the hospital.

You need to see what to do.

You have lights in an aircraft.

So it’s everywhere in a day there is light.

Look around. Everywhere. Look at your smart phone.

It has a flashlight, an LED flashlight.

These are potential sources for high-speed data transmission.

And then there’s security.

You would agree with me

that light doesn’t penetrate through walls.

So no one, if I have a light here,

if I have secure data,

no one on the other side of this room through that wall

would be able to read that data.

And there’s only data where there is light.

So if I don’t want that receiver to receive the data,

then what I could do,

turn it away.

So the data goes in that direction, not there anymore.

Now we can in fact see where the data is going to.

So for me,

the applications of it,

to me, are beyond imagination at the moment.

We have had a century of very nice, smart application developers.

And you only have to notice, where we have light,

there is a potential way to transmit data.

But I can give you a few examples.

Well you may see the impact already now.

This is a remote operated vehicle

beneath the ocean.

And they use light to illuminate space down there.

And this light can be used to transmit wireless data

that these things [use] to communicate with each other.

Intrinsically safe environments

like this petrochemical plant —

you can’t use RF, it may generate antenna sparks,

but you can use light — you see plenty of light there.

In hospitals,

for new medical instruments;

in streets for traffic control.

Cars have LED-based headlights, LED-based back lights,

and cars can communicate with each other

and prevent accidents

in the way that they exchange information.

Traffic lights can communicate to the car and so on.

And then you have these millions of street lamps

deployed around the world.

And every street lamp could be a free access point.

We call it, in fact, a Li-Fi,

light-fidelity.

And then we have these aircraft cabins.

There are hundreds of lights in an aircraft cabin,

and each of these lights

could be a potential transmitter of wireless data.

So you could enjoy your most favorite TED video

on your long flight back home.

Online life. So that is a vision, I think, that is possible.

So, all we would need to do

is to fit a small microchip

to every potential illumination device.

And this would then combine

two basic functionalities:

illumination and wireless data transmission.

And it’s this symbiosis that I personally believe

could solve the four essential problems

that face us in wireless communication these days.

And in the future,

you would not only have 14 billion light bulbs,

you may have 14 billion Li-Fis

deployed worldwide —

for a cleaner, a greener,

and even a brighter future.

Thank you.

(Applause)

Tags: dataData Transferefficientflickering lightHarald HaasledsecureTechnologyTEDTEDGlobalTEDTalkstransmit datawirelesswireless data
0
Share

You also might be interested in

How Secured2 Data Security Technology Works | Overview

How Secured2 Data Security Technology Works | Overview

May 22, 2019

Security threats are evolving and sadly the security industry is continuing to push encryption developed in the 1970’s. Secured2 is a better way to protect data and the first solution to go beyond encryption to secure your information.

Wireless Data Transmit With Laser Light Experiment | LiFi

Wireless Data Transmit With Laser Light Experiment | LiFi

Dec 1, 2020

Hello friends aaj es video me ham Lifi device banayenge. jiske dwara hum data transmission ka experiment karenge. lifi ki maximum speed 100Gbps tested ki gai hai aur ye 240Gbps tak ho sakati hai. es experiment me, hum LiFi par audio signal transmi karenge. eske liye hai lazer diode ka use karenge, aur bhi chije…

Fortinet Secure SD-WAN High Availability (HA) Failover Demo | Secure SD-WAN

Fortinet Secure SD-WAN High Availability (HA) Failover Demo | Secure SD-WAN

Jan 4, 2021

Learn more: What is SD-WAN? Explore Fortinet SD-WAN solutions: Watch this video to learn how Fortinet Secure SD-WAN can be configured for device HA at the branch and how applications can seamlessly failover to the backup device in the event of a hardware failure. What is SD-WAN? Software-defined wide-area network…

– Request Information –

Fortinet Consulting

Network Security Consulting & Audits

Data Center Relocation

IT Solutions & Resources

  • AI & Cognitive Services (31)
  • Analytics (1)
  • Business (211)
  • Cisco (743)
  • Collaboration (37)
  • Communication (38)
  • Cyber Security (307)
  • Data Center & Cloud (61)
  • Defendify (54)
  • Enterprise Networks (211)
  • Events (4)
  • FAQ (2)
  • Firewall (51)
  • Fortinet (330)
  • Governance (26)
  • Microsoft Cloud (20)
  • Microsoft Office 365 (65)
  • News (7)
  • Podcasts (5)
  • Uncategorized (536)
  • Unified Communications (19)
  • Updates (3)
  • Video (1,112)

Recent IT & Cyber Security News

  • Beers with Peers Event 5/12/22 @ Raised Grain Brewing – Wisconsin Act 73 Data Security Requirements April 17, 2022
  • Which is the better fit for you? The Alternative Clouds or Hyperscale Clouds? April 6, 2022
  • F.B.a.a.S – Free Beer as a Service February 3, 2022
  • Snort 3 and Me: The Rule Writers Speak October 8, 2021

IT and Security Reference

AI analytics antivirus camera phone cisco Cisco IT Cloud cloud security Collaboration cyber cyberattack cybercrime cybercriminal cybersecurity cyberthreat data center endpoint firewall FortiGate Fortinet FortiOS free hybrid cloud information technology IoT IT malware Microsoft mobile security network networking network security NGFW Office 365 Private Cloud public cloud ransomware sd-wan security Security Fabric sharing Technology upload video video phone

Follow Us On …

Learn How Arnett Group Comprehensive Enterprise IT Services Can Help Your Business Request Information
Arnett Group Logo
The Arnett Group team understands the advantages of being flexible and proactive in seeking the right combination of skills and technology to suit your unique situation. There’s no single recommendation or favorite product that is a cure-all. We devise solutions that fit your needs while keeping you informed of the latest technologies affecting your business and the right technology at the right price.

Get started today.

Contact Info

  • Arnett Group
  • US Corporate Headquarters
  • 920-261-2037
  • info@arnettgroup.com
  • https://www.arnettgroup.net
  • arnettgroup

IT & Security Reference

  • Beers with Peers Event 5/12/22 @ Raised Grain Brewing – Wisconsin Act 73 Data Security Requirements
  • Which is the better fit for you? The Alternative Clouds or Hyperscale Clouds?
  • F.B.a.a.S – Free Beer as a Service
  • Snort 3 and Me: The Rule Writers Speak
  • Automate External Network Connectivity from Google using Cloud ACI
  • Achieving Security Automation in Google Cloud using Cloud ACI

Arnett Group™ © 2023 This Website is Owned / Operated by Arnett Services Group LLC
"Arnett Group" is a registered trademark of Arnett Services Group LLC

  • Terms & Privacy
  • Arnett Logistics
  • Data Center Migration Services & Enterprise IT Consulting
  • About
  • Hiring Top Professionals
  • Testimonials
  • Contact
Prev Next