Near Field Communications (NFC) is an evolution of contactless data exchange which is being employed in mobile phone applications for data exchange and payment processing, among other applications. This presentation covers the evolution and technical details of this communications protocol along with compliance testing requirements.
Learn more: http://wireless-connectivity-test.com
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches.
What is NFC?
NFC or Near Field Communication is a short range high frequency wireless communication technology.
A radio communication is established by touching the two phones or keeping them in a proximity of a few centimetres.
NFC is mainly aimed for mobile or handheld devices.
NFC is an extension of Radio frequency identification or RFID technology.
RFID is mainly used for tracking and identification by sending radio waves.
NFC stands for Near Field Communication.
NFC is an extension of Radio Frequency IDentifier popularly known as RFID.
NFC is a short range high frequency wireless communication technology.
NFC was founded in the year 2004 by NOKIA, SONY and PHILIPS.
Near Field Communication (NFC) by LogeshLogesh Kumar
Explaining the NFC (Near Field Communication) Technology, Evolution, Operating Specification, Applications, Pros & Cons.
(This slide contains video files, its good to view the slide after downloading to your PC)
Near Field Communication is a very Versatile wireless technology. It has its range up to just 10-20 cm, but its short range is its advantage. Lets explore this technology and try to exploit it.
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches.
What is NFC?
NFC or Near Field Communication is a short range high frequency wireless communication technology.
A radio communication is established by touching the two phones or keeping them in a proximity of a few centimetres.
NFC is mainly aimed for mobile or handheld devices.
NFC is an extension of Radio frequency identification or RFID technology.
RFID is mainly used for tracking and identification by sending radio waves.
NFC stands for Near Field Communication.
NFC is an extension of Radio Frequency IDentifier popularly known as RFID.
NFC is a short range high frequency wireless communication technology.
NFC was founded in the year 2004 by NOKIA, SONY and PHILIPS.
Near Field Communication (NFC) by LogeshLogesh Kumar
Explaining the NFC (Near Field Communication) Technology, Evolution, Operating Specification, Applications, Pros & Cons.
(This slide contains video files, its good to view the slide after downloading to your PC)
Near Field Communication is a very Versatile wireless technology. It has its range up to just 10-20 cm, but its short range is its advantage. Lets explore this technology and try to exploit it.
NFC Development with Qt - v2.2.0 (5. November 2012)Andreas Jakl
Learn developing Near Field Communication (NFC) apps for Nokia's Symbian and MeeGo phones with step-by-step tutorials!
The three development options Qt, Symbian native and Java ME are outlined. A more detailed explanation shows the Qt Mobility 1.2 APIs to create modern NFC applications for smartphones.
In the final part, step-by-step hands-on tutorials walk you through developing your first two NFC apps. The first demo extends an example from the Qt SDK with reading & writing both URI and text NDEF records to create new sticky notes on the virtual corkboards visible on the screen. The second demo uses the LLCP protocol to create a peer-to-peer chat application between two NFC Forum compatible devices.
On Relaying NFC Payment Transactions using Android devicescgvwzq
NFC (Near Field Communication) defines the set of RFID standards designed to bidirectionally communicate via wireless and interchange data point-to-point between devices in proximity, normally a few centimeters (up to 10cm). Services that use NFC communications as contactless payments are exponentially growing: Public transport, parkings, fast supermarket cashers, vending machines and even NFC-capable credit/debit cards.In this talk, we investigate relay attacks in NFC-capable credit/debit cards. This attack exploits the communication proximity principle in NFC, which is shown to be non secure. Although a lot of attack countermeasures exist, they do not face with this attack vector since up to date special hardware was required to perform it. However, the story is rewritten with the NFC-capable mobile devices available in the market.
This work shows how nowadays a relay attack in NFC-capable credit/debit cards is possible using an NFC-capable Android device without further modifications (i.e., no root permissions, custom firmware, or custom OS are required). A PoC app implementing the attack is shown in the talk, as well as distributed relay attack scenarios that might become real before long.
Join us for a LIVE WEBINAR on this topic! Wednesday, November 14, 2:00pm ET
http://bit.ly/XPgjO7
Wide bandwidth modulation is becoming more common in communications. The emergence of the 802.11ac wireless Ethernet standard has extended the modulation bandwidth to 160 MHz which requires very wide band measurement equipment to measure. This presentation illustrates the details of a measurement method that uses a real time digital down converter and post processing software that measures the performance of this signal.
Smart Security System Using ARM And XBee For Boarder Areas( SYNOPSIS)WizApsProjects
Three U.S. Department of Homeland Security (DHS) component agencies carry out the majority of border-security missions: the U.S. Coast Guard (USCG), U.S. Customs and Border Protection (CBP), and Immigration and Customs Enforcement (ICE). A universal and more open world creates a growing need for more effective ways to control borders.
The soldiers may sometimes cross their area limit without their knowledge. This causes a lot of problems. They may be caught by other people. This project is developed for the soldiers to find out the border and to check whether the person is authorized or unauthorized. The main modules in this project are the RF transducer, ARM controller unit, and LCD. The Zigbee transmitter is connected to the border area. It transmits RF signals within a particular limit. The Zigbee receiver with the ARM controller unit will be under the control of the commander. When the soldier reaches a particular area, the RF signals are received by the receiver and given to the ARM controller unit. The ARM controller analyses the signal and sends the corresponding message to the LCD and the same information is transmitted to the commander via Zigbee. The receiver which is there at the commander receives the signal which was transmitted from the transmitter via Zigbee and displays proper information on the display. The ARM controller program is written in embedded c language and the microcontroller used is ARM7LPC2148.
Methodology:
This project is developed for the soldiers to find out the border and to check whether the person is authorized or unauthorized. The main modules in this project are the RF transducer, ARM controller unit, and LCD.
The transmitter will be there in the border area and the receiver will be there at the commander. The transmitter module has two inputs. One is the PIR sensor, which is used to detect persons. And the second is the RF receiver, which is used to detect whether the person is authorized or unauthorized with the help of an RF transmitter. If PIR senses a person and the RF receiver receives a signal from the RF transmitter, then the ARM controller analyses the signal and indicates the person is authorized via LCD. And the same information is transmitted to the commander via Zigbee and that will be displayed on receiver LCD. If PIR only receives a signal and sends that to the ARM controller. Then the controller will indicate the person is unauthorized with the help of a buzzer and display on the LCD. The commander will take appropriate action based on the information received at the receiver end.
Advantages
1. Protecting borders and other strategic areas are key to preventing these illegal activities and maintaining tight national security.
2. Secure and reliable communication.
3. Leading-edge technology that meets today's and tomorrow's needs.
4. Preventing unauthorized activity with many national borders stretching for hundreds of kilometers across
The USB 2.0 standard is widely deployed in both computer and embedded systems. Compliance testing for this standard includes signal integrity as well as a number of low-level protocol tests.
This presentation provides an overview of the test requirements for USB 2.0 compliance and provide background on each test case. Details of fixtures and signal integrity requirements are highlighted in detail.
For more information visit http://rohde-schwarz-scopes.com or call (888) 837-8772 to speak to a local Rohde & Schwarz expert.
NFC is based on a short-range wireless connectivity, designed for simple and safe interaction between electronic devices. It is easy to use wireless communication interface for last few centimetres . Connection between two devices is established just by holding the devices close to each other or touch them together.
Near Field Communications - NFC - Uses, Applications, Cost and Much MorePraful Manjunath
Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other.
See More!!
Radio Frequency identification (RFID) technology has become emerging
technique for tracking and items identification. Depend upon the function; various RFID
technologies could be used. Drawback of passive RFID technology, associated to the range
of reading tags and assurance in difficult environmental condition, puts boundaries on
performance in the real life situation [1]. To improve the range of reading tags and
assurance, we consider implementing active backscattering tag technology. For making
mobiles of multiple radio standards in 4G network; the Software Defined Radio (SDR)
technology is used. Restrictions in Existing RFID technologies and SDR technology, can be
eliminated by the development and implementation of the Software Defined Radio (SDR)
active backscattering tag compatible with the EPC global UHF Class 1 Generation 2 (Gen2)
RFID standard. Such technology can be used for many of applications and services.
Wi-Fi For Beginners Module 4 - More RFNigel Bowden
Slides from the Wi-Fi For Beginners Podcast. These are the slides from module four of a series of podcasts looking at the basics wireless LAN (WiFi) networking. In this module we explore more advanced RF (radio frequency) concepts .You can find the podcast at WiFiForBeginners.com and on iTunes
Diapositivas presentadas para el grado de Magister en Ciencias de la Computacion en University of Queensland.
Titulo de la Tesis: A RFID Collision Avoidance Framework based on SDR
Design and implementation of sdr based qpsk transceiver using fpgaTarik Kazaz
Software-defined radio (SDR) technology enables
implementation of wireless devices that support multiple air interfaces and modulation formats, which is very important
if consider the proliferation of wireless standards. To enable such functionality SDR is using reconfigurable hardware platform such as Field Programmable Gate Array (FPGA). In this paper, we present design procedure and implementation result of SDR based QPSK modulator on Altera Cyclone IV FPGA. For design and implementation of QPSK modulator we used Altera DSP
Builder Tool combined with Matlab/Simulink, Modelsim and
Quartus II design tools. As reconfigurable hardware platform
we used Altera DE2-115 development and education board with
AD/DA daughter card. Software and Hardware-in-the-loop (HIL)
simulation was conducted before hardware implementation and
verification of designed system. This method of design makes
implementation of SDR based modulators simpler ad faster.
Index Terms—SDR, FPGA, QPSK, DSP Builder, NCO, RRC
Analysis and Construction of a Robot controlled by a Universal Remote ControlIJERD Editor
This paper aims at controlling a robot that is a tank like vehicle using a universal infrared remote
control. The infrared signal sent from the universal infrared remote control is received by IR receiver and
decoded by the microcontroller PIC16F873A using an algorithm embedded in the microcontroller. The output
from the microcontroller is fed to the motor driver which drives the left and right motors. The robot‟s motor
control can be speed controlled by using PWM/PDM (Pulse Width Modulation/ Pulse Duration Modulation)
technique
Similar to Near Field Communications (NFC) Technology & Measurements (20)
This White Paper provides a general overview of various military and commercial radar systems. It also covers some typical measurements on such systems and their components.
Learn more about Radar Component Testing here: https://www.rohde-schwarz.com/solutions/test-and-measurement/aerospace-defense/radar-ew-test/radar-component-testing/radar-component-testing_250800.html
Much of the success or failure of #5G will come down to securing the right amount of spectrum, at the right cost, under the right conditions. Here's where specific regions are placing their bets.
*As of April 26, 2019.
Learn more about 5G solutions from Rohde & Schwarz:
http://bit.ly/2ILV7cA
Technology Manager Andreas Roessler covers 5G basics in this keynote presentation at the RF Lumination 2019 conference in February 2019.
RF Lumination 2019
"Meet 158+ years of RF design & test expertise at one event. If they can't answer your question, it must be a really good question!"
Watch all the presentations here:
https://www.rohde-schwarz-usa.com/RFLuminationContent.html
Andreas Roessler is the Rohde & Schwarz Technology Manager focused on UMTS Long Term Evolution (LTE) and LTE-Advanced. With responsibility for the strategic marketing and product portfolio development for LTE/LTE-Advanced, Andreas follows the standardization process in 3GPP very closely, particularly on core specifications as well as protocol conformance, RRM and RF conformance specifications for device and base stations testing. He graduated from Otto-von-Guericke University in Magdeburg, Germany, and received a Master's Degree in communication engineering.
True or false: 30 dBm + 30 dBm = 60 dBm?
Why does 1% work out to be -40 dB one time but then 0.1 dB or 0.05 dB the next time? These questions sometimes leave even experienced engineers scratching their heads. Decibels are found everywhere, including power levels, voltages, reflection coefficients, noise figures, field strengths and more. What is a decibel and how should we use it in our calculations? This Application Note is intended as a refresher on the subject of decibels.
Access the video from this presentation for free from
http://www.rohde-schwarz-usa.com/DebuggingEMISS_On-Demand.html
Overview:
Electromagnetic interference is increasingly becoming a problem in complex systems that must interoperate in both digital and RF domains. When failures due to EMI occur it is often difficult to track down the sources of such failures using standard test receivers and spectrum analyzers. The unique ability of real-time spectrum analysis and synchronous time domain signal acquisition to capture transient events can quickly reveals details about the sources of EMI.
What You Will Learn:
How to isolate and analyze sources of EMI using an oscilloscope
Measurement considerations for correlating time and frequency domains
Near field probing basics
Presented By:
Dave Rishavy, Product Manager Oscilloscopes, Rohde & Schwarz
Dave Rishavy has a BS in Electrical Engineering from Florida State University and an MBA from the University of Colorado. Prior to joining Rohde and Schwarz, Mr. Rishavy gained over 15 years of experience in the test and measurement field at Agilent Technologies. This included positions in a wide range of technical marketing areas such as application engineering, product marketing, marketing management and strategic product planning. While at Agilent, Dave led the marketing and industry segment teams for the Infiniium line of oscilloscopes as well as high end logic analysis.
(Slides from Live webinar on September 25, 2014, presented by Mike Schnecker. Watch the webinar On-Demand here: http://goo.gl/LkjUUg)
Attendees Will Learn:
An overview of switched mode power supplies
Common measurements (ie, what to measure and why)
Circuit loading and probing considerations
How instrument specifications impact measurement accuracy
Switched mode power supplies have become ubiquitous in electronics as they provide precise voltages including high power with very high efficiency. The efficiency of these power supplies requires low loss power transistors and the design requires measurement of highly dynamic voltages. Voltage levels can vary from millivolts to hundreds of volts in some applications.
In this webinar, the proper use of a digital oscilloscope to accurately measure these voltages will be discussed along with key aspects of instrument performance such as noise and overdrive recovery that affect the accuracy of the measurement.
Switched mode power supplies have become ubiquitous in electronics as they provide precise voltages including high power with very high efficiency. The efficiency of these power supplies requires low loss power transistors and the design requires measurement of highly dynamic voltages. Voltage levels can vary from millivolts to hundreds of volts in some applications. In this seminar, the proper use of a digital oscilloscope to accurately measure these voltages will be discussed along with key aspects of instrument performance such as noise and overdrive recovery that affect the accuracy of the measurement.
Embedded systems increasingly employ digital, analog and RF signals all of which are tightly synchronized in time. Debugging these systems is challenging in that one needs to measure a number of different signals in one or more domains (time, digital, frequency) and with tight time synchronization. This session will discuss how a digital oscilloscope can be used to effectively debug these systems, and some of the instrumentation considerations that go along with this.
Wireless communications is a hot topic in technology today, driven by technologies like Wireless Networking, Cellular Telephony, Wireless Connectivity and Satellite Communications among others. Traditionally, wireless and RF communications has been one of the last bastions of analog engineering. With the advent of low cost digital, high speed integrated circuits, this too has become part of the digital domain. Although information transmitted today is largely digital high frequency signals whether digital or analog always behave like analog signals so having fundamental knowledge of this high frequency behavior is key.
Jitter measurements are commonly done taking small snapshots in time, yet systems often experience jitter from sources that occur over relatively long time intervals, which may not be accounted for using short time interval measurements methods.
In this webinar we will present the application of a real time, digital clock recovery and trigger system to the measurement of jitter on clock and data signals. Details of the measurement methodology will be provided along with measurement examples on both clock and data signals.
You Will Learn:
- What is Jitter
- Different types of Jitter
- Jitter measurement techniques
- Benefits of Jitter analysis using real-time DDC techniques
Differential structures such as backplanes and cables are the primary means for transmitting high speed serial data signals. Signal integrity of these systems is determined by the characteristics of the media such as insertion loss, crosstalk, and differential to common mode conversion.
Complete measurement of the mixed mode s-parameters is often performed by transforming single-ended s-parameters and assuming that the system is linear. In some cases, linearity cannot be assumed such as where active components are used.
This presentation describes how to measure true differential s-parameters which can be measured even in the presence of non-linear elements.
Originally presented at DesignCon 2013.
Jitter is a very important topic in signal integrity for high speed serial data links. The jitter performance of clock signals used in generating the serial data signal is critical to the overall performance of these signals.
Phase noise is the most sensitive and accurate measurement of the performance of precision clocks.
This presentation covers the theory and practice for making phase noise measurements on clock signals as well as the relationship between phase noise and total jitter, random jitter and deterministic jitter. Measurements on a typical clock signal is also included.
For more information, visit http://rohde-schwarz-scopes.com or call (888) 837-8772 to speak to a local Rohde & Schwarz expert.
This seminar will provide the basics of this fascinating technology. After attending this seminar you will understand OFDM-principles,
including SC-FDMA as the transmission scheme of choice for the LTE uplink. Multiple antenna technology (MIMO) is a fundamental
part of LTE and its impact on the design of device and network architecture will be explained. Further LTE-related physical layer
aspects such as channel structure and cell search will be presented with an overview of the LTE protocol structure.
The second part of the seminar provides an overview of the evolution in LTE towards 3GPP specification Release 9 and 10. This
includes features and methods for location based services like GNSS support or time delay measurements and the concept of
multimedia broadcast. Finally, we’ll introduce the main features of LTE-Advanced (3GPP Release-10) including carrier aggregation for
a larger bandwidth and backbone network aspects like self-organizing networks and relaying concepts.
UMTS Long Term Evolution, LTE, is the technology of choice for the majority of network operators worldwide for providing mobile
broadband data and high-speed internet access to their subscriber base. Due to the high commitment LTE is the innovation platform
for the wireless industry for the next decade.
This class will provide the basics of this fascinating technology. After attending this course you will have an understanding of
OFDM-principles including SC-FDMA as the transmission scheme of choice for the LTE uplink. Multiple antenna technology (MIMO),
a fundamental part of LTE, will be explained as well as its impact on the design of device and network architecture. We’ll give a quick
introduction into the evolution of this technology including future upgrades of LTE features like multimedia broadcast, location based
services and increasing bandwidth through carrier aggregation.
The second part of the course will provide an overview including practical examples and exercises on how to test a LTE-capable device
while performing standardized RF measurements such as power, signal quality, spectrum and receiver sensitivity. We’ll address how
to automate these measurements in a simple and cost-effective way. We will introduce application based testing by demonstrating
end-to-end (E2E), throughput and application testing using the Rohde & Schwarz R&S®CMW500 Wideband Radio Communication
Tester. Examples of application tests are voice over LTE, VoLTE or Video over LTE.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
3. NFC Introduction
l Contactless data exchange
l Passive – active
l Active – active
l Close proximity ~ 10 cm
l Data transfer using the “near
field”
l Low carrier frequency of 13.56 MHz
l Magnetic coupling between
transmitter and receiver similar to
transformer principle
l Standard developed jointly by
NXP and Sony
l Backward compatible with
smart card technology
l ISO/IEC 14443 A/B
l JIS X 6319-4
3
4. NFC Coupling Method
Information is coupled between the polling and listening
devices using the near field – equivalent to transformer
principle
4
5. Frequency Spectrum of NFC Signal
l Auxiliary carriers transfer information from passive listener (target)
to poller (initiator) through load modulation on poller antenna
l Auxiliary carriers are not used in peer to peer communication
l Carrier is used as a power source in active-passive communications
5
6. Modulation Types
l Poller (initiator) uses ASK
modulation on 13.56 MHz carrier
l Passive devices communicate
on auxiliary carrier via load
modulation
l ASK for 14443A and PSK for 14443B
l ASK directly on carrier for JIS X
6319-4
6
7. Coding Types Used in NFC
l NRZ-L: logical 1 and 0 coded as high and low level and signal level
is maintained throughout a bit period
l Manchester: first half bit is high for a logical 1 and second half is
high for logical 0
l Modified Miller: negative going pulse after half a bit interval for a 1
and at the start of a bit interval for a 0. For a 1 followed by a zero,
no pulse
7
10. NFC Operating Modes
Each mode can
Use any of 3
technologies
l Card emulation mode (passive mode): behaves like existing
contactless card and conforms to one of the legacy standards
l Peer to Peer mode: both devices are active and exchange data
l Reader/Writer mode (active mode): the NFC device is active and
reads or writes a passive legacy RFID tag
10
14. NFC RF Measurements – Listening Device
l NFC Forum Reference Polling Device
l Sends commands to listening device
l Received response from listening device (load modulation)
l Command generator – modulated 13.56 MHz carrier
l Load modulation measuring tool – oscilloscope or signal anlyzer
14
15. NFC RF Measurements – Polling Device
l NFC Forum reference listening device
l Receives polling signal from device under test
l Transmits appropriate response via load modulation
l Listening device response generator – arbitrary waveform generator
(AWG)
l Measuring waveform tool – analyzes the polling signal and
generates a trigger for the response generator
l Measuring Field tool – measures the carrier power from the poller
15
17. RF Tests for NFC Devices in Polling Mode
l Carrier frequency accuracy
l Power level measurement
l Sufficient power to drive passive devices
l Measured within the specified volume above the coupling device
l Waveform characteristics
l Rise time, fall time, etc.
l Load modulation sensitivity
l Correct reception at minimum specified level
l Threshold level test
l Polling device must switch off its RF field when exposed to an RF field f
a certain strength
17
18. RF Tests for NFC Devices in Listening Mode
l Load modulation measurement
l The signal strength of the load modulation must be within required limits
l Power reception
l The listening device must answer correctly even in bad conditions
l Frame delay time
l Response time from the end of the polling command to the start of
transmission from the phone in card emulation mode
l Important in NFC-A mode for anti-collision
18
28. Summary
l NFC technology is an evolution of contactless data exchange
l Addition of peer to peer and read/write to passive smart card mode
l Backward compatible with legacy smart card
l The NFC forum has established both RF and protocol
compliance tests
l Guarantees interoperability
l RF testing verifies the air interface for polling and listening
devices
l Reference poller and listener
l Command and response generator (AWG and vector signal generator)
l Waveform analysis tool (oscilloscope with NFC trigger and I/Q
demodulation)
l Automation software controls acquisition and analyzes waveform data
28
29. Contact Us
About Rohde & Schwarz
Rohde & Schwarz is an independent group of companies specializing in electronics. It is a leading supplier of solutions in
the fields of test and measurement, broadcasting, radiomonitoring and radiolocation, as well as secure communications.
Established more than 75 years ago, Rohde & Schwarz has a global presence and a dedicated service network in over 70
countries. Company headquarters are in Munich, Germany.
Europe, Africa, Middle East
+49 89 4129 12345
customersupport@rohde-schwarz.com
North America
1-888-TEST-RSA (1-888-837-8772)
customer.support@rsa.rohde-schwarz.com
Latin America
+1-410-910-7988
customersupport.la@rohde-schwarz.com
Asia/Pacific
+65 65 13 04 88
customersupport.asia@rohde-schwarz.com
www.rohde-schwarz-scopes.com
29