Near field communication


Published on


Published in: Education, Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Near field communication

  1. 1. Near Field CommunicationBy,Siddharth D.C.(1RV09IT043)Shomik.M .(1RV09IT040)Varun .R. Athreya .(1RV09IT065) IT Dept., RVCE
  2. 2. Outline Brief introduction History Key benefits NFC Operation NFC tags & Security Threats NFC and other wireless technologies NFC Application NFC in Market IT Dept., RVCE
  3. 3. What is NFC ? Standards based technology used to provide short range wireless connectivity, that carry secure two way interactions between electronic devices. Provides contact-less communication up to distance of 5 cm.This makes it more “secure”. Utilizes inductive coupling for its operation. Form of RFID but has specific standards of operation. IT Dept., RVCE
  4. 4. Origins NFC traces its roots back to Radio-frequency identification, or RFID. RFID allows a reader to send radio waves to a passive electronic tag for identification and tracking. 1983 The first patent to be associated with the abbreviation RFID was granted to Charles Walton. 2004 Nokia, Philips and Sony established the Near Field Communication (NFC) Forum 2006 Specification for "Smart Poster" records IT Dept., RVCE
  5. 5. …. 2006 Nokia 6131 was the first NFC phone 2009 In January, NFC Forum released Peer-to- Peer standards to transfer contact, URL, initiate Bluetooth. 2010 Samsung Nexus S: First Android NFC phone 2011 Google I/O "How to NFC" demonstrates NFC to initiate a game and to share a contact, URL, app, video, 2011 NFC support becomes part of the Symbian mobile operating system with the release of Symbian Anna version. IT Dept., RVCE
  6. 6. Key benefits NFC provides a range of benefits to consumers and businesses, such as: Intuitive: NFC interactions require no more than a simple touch Versatile: NFC is ideally suited to the broadest range of industries, environments. Open and standards-based: The underlying layers of NFC technology follow universally implemented ISO, ECMA, and ETSI standards Technology-enabling: NFC facilitates fast and simple setup of wireless technologies, such as Bluetooth, Wi-Fi, etc.) ….. IT Dept., RVCE
  7. 7. … Inherently secure: NFC transmissions are short range (from a touch to a few centimeters) Interoperable: NFC works with existing contactless card technologies Security-ready: NFC has built-in capabilities to support secure applications IT Dept., RVCE
  8. 8. Inductive couplingAn inductively coupledtransponder comprises anelectronic data carrying device,usually a single microchip, anda large coil that functions as anantennaInductively coupledtransponders are almostalways operated passively IT Dept., RVCE
  9. 9. NFC Tech Device Types &Oper’n near field communication standard The NFC defines two types of NFC device. - Initiator -Target• Active mode of communication: In the active NFC mode of communication, both devices generate an RF signal on which the data is carried.• Passive mode of communication: In this mode of communication, only one NFC device generates an RF field. The second passive device which is the target uses a technique called load modulation to transfer the data back to the primary device or initiator. …. IT Dept., RVCE
  10. 10. …. NFC- wireless technology Operating frequency-13.56 MHz (unregulated 13.56 MHz frequency band). As a result no licenses are required for operation on these frequencies. NFC -Half duplex as the same channel is used for both transmit and receive. Technique- Listen before talk protocol IT Dept., RVCE
  11. 11. Data Transfer & Tags NFC Tag- passive device The users touches an NFC enabled device onto the tag. A small amount of power is taken by the NFC tag from the reader/writer to power the tag electronics. The tag is then enabled to transfer a small amount of information to the reader/writer. The data stored in the tag memory is transferred to the NFC enabled device. Although normally only a small amount of data, this may be used to direct the device to a website URL, it may be a small amount of text, or other data. ….. IT Dept., RVCE
  12. 12. …TAG’S TYPE CAPABILITY MEMORY SPEEDTYPE 1 Read & Rewrite 2 kbyte 109 kbit/sTYPE 2 Read ,Rewrite 2 kbyte 109 kbit/s Configure-Read onlyTYPE 3 Complex 2 kbyte 220 kbit/s operationTYPE 4 Read / 32 kbyte 424 kbit/s. Rewritable /Read-only IT Dept., RVCE
  13. 13. Tagcharacteristics Read speed Die size Unit price IT Dept., RVCE
  14. 14. NFC Security Threats Eaves dropping Data corruption Data modification Man-in-middle attack IT Dept., RVCE
  15. 15. Comparisons IT Dept., RVCE
  16. 16.  Bluetooth: Although both Bluetooth and NFC can be used to transfer data, Bluetooth has been designed to transfer data over much greater distances. NFC is designed to be close proximity only. Wi-Fi / IEEE 802.11: Wi-Fi is designed for local area networks, and is not a short range peer to peer technology. RFID: Although RFID is very similar to NFC in many respects, RFID is a much broader technology. NFC is a specific case which is defined by standards enabling it to be interoperable. IT Dept., RVCE
  17. 17. NFC Applications IT Dept., RVCE
  18. 18. …. IT Dept., RVCE
  19. 19. NFC in Market Nokia 700 Samsung nexus sAnd many more phones from Nokia with symbianAnna and Samsung Android phones support NFC IT Dept., RVCE
  20. 20. Bibliography
  21. 21. IT Dept., RVCE