Information Technology Reference
In-Depth Information
By using the system, she can easily retrieve her collections of photographs
and videos by name, event, date, file type, size, expression, and location.
When she retrieved photos with expression mode and chose “Happy,” she
would realize that in addition to sharing her serendipitous moments during
her wedding ceremony, she can also share serendipitous moments during
birthday parties and other events.
When the database is ready, Ida can make her serendipitous moments avail-
able to share within the peer group. Ida can also invite other peer members
to share their serendipitous moments not just from wedding and birthday
ceremonies but any serendipitous moment that may exist in their lifetime
memories. As a result, many peer members contribute to share their ser-
endipitous moments by sharing photos and videos through the system. In
addition, when a user captures their serendipitous moment or their lifetime
activity and pairs with the GPS receiver, the user can see the location and
movement on a map by date. The user can retrieve peer groups and their
own serendipitous moments and ask the system to generate a report on how
many of them are similar.
Back to the scenario, Ida can retrieve a personal photo or video map by
month or year using GPS locations and create location metadata. She can also
download shared files from her peer group and map movement by month
or year in a split window and activate the function that traces two different
individuals' movements. When one of the peer members shares their meta-
data location with Ida, she may discover that at certain dates or locations they
were present at the same place, even if they were not aware of it at the time.
As a result, they can share their stories behind the scenes. The advantage of
the system is that a user can track back to where they were at a specific date,
establish who they met with, what happened, and correlate this movement
between two or more people even if it happened many years earlier.
12.3.4 System Design
We consider the use of JXTA P2P networking technology for the system since
JXTA [34] provides an open set of P2P protocols that enable any device on the
network to communicate, collaborate, and share resources. The JXTA peers
create a virtual, ad hoc network on top of existing networks, hiding their
underlying complexity. In the JXTA virtual network, any peer can interact
with other peers, regardless of location, type of device, or operating environ-
ment, even when some peers and resources are located behind firewalls or
are on different network transports. The JXTA technology supports multi-
platform operation and avoids the constraints of hierarchical client-server
architectures.
For the purposes of our architecture, the most important characteristics
are that JXTA technology can run on any device, including cell phones,
PDAs, two-way pagers, electronic sensors, desktop computers, and servers.
It is based on proven technologies and standards such as HTTP, TCP/IP, and
Search WWH ::




Custom Search