SlideShare a Scribd company logo
Near
Field
Communication
A Presentation By Praful K M
Introduction
What Is NFC?
What Is NFC?
▪ NFC or Near Field Communication is a short range high frequency wireless
communication technology.
▪ NFC is mainly aimed for mobile or handheld devices.
What Is NFC?
▪ A radio communication is established by touching the two phones or keeping them
in a proximity of a few centimetres (up to 10 cm) .
▪ Logo Allows communication between Two powered (active) devices Powered and
non self-powered (passive) devices
Evolution
Of NFC Technology
Evolution
▪ In 2004, NFC Forum was formed by Nokia, Philips, Sony, to set standards for NFC .
Every NFC enabled device will have “N-Mark” trademark ,developed by NFC Forum.
Evolution
▪ In 2006 First mobile phone( Nokia 6131) with NFC released by NOKIA.
Evolution
▪ In 2010 First android phone SAMSUNG NEXUS S with NFC support released.
Features
of Near Field Communications
Features
▪ NFC is an extension of Radio frequency identification (RFID) technology that
combines the interface of a smartcard and a reader into a single device.
▪ This allow two-way communication between endpoints, where earlier systems were
one-way only.
Features
▪ It operates within the globally available and unlicensed radio frequency band of
13.56 MHz, with a bandwidth of 14 kHz.
▪ Working distance with compact standard antennas: up to 10 cm .
Features
▪ Supported data rates: 106, 212 and 424K bit/s For two devices to communicate
using NFC, one device must have an NFC reader/writer and one must have an NFC
tag
Operation
Of NFCs
Operation
▪ NFC has two communicative terminals :The INITIATOR is the one who wishes to
communicate and starts the communication. The TARGET receives the initiator’s
communication request and sends back a reply
Operation
▪ NFC employs two different coding to transfer data. If an active device transfers data
at 106 Kbit/s, a Modified Miller coding with 100% modulation is used. In all other
cases Manchester coding is used with a modulation ratio of 10%.
Active Communication Mode
▪ In Active mode, both devices with NFC chip generates an electromagnetic field and
exchange data.
Passive Communication Mode
▪ In Passive mode, there is only one active device and the other uses that field to
exchange information.
Operation
▪ NFC devices communicate via magnetic field induction, where two loop antennas
are located within each others near field, effectively forming an air-core transformer.
▪ The reader continuously generates an RF carrier sine wave (at 13.56MHz), watching
always for modulation to occur. Detected modulation of the field would indicate the
presence of a tag.
Operation
▪ A tag enters the RF field generated by the reader.
▪ Once the tag has received sufficient energy to operate correctly, it divides down the
carrier and begins clocking its data to an output transistor, which is normally
connected across the coil inputs.
Operation
▪ The tag’s output transistor shunts the coil, sequentially corresponding to the data
which is being clocked out of the memory array.
▪ Shunting the coil causes a momentary fluctuation (dampening) of the carrier wave,
which is seen as a slight change in amplitude of the carrier.
▪ The reader peak-detects the amplitude modulated data and processes the resulting
bit stream according to the encoding and data modulation methods used.
Categories
Of NFC Application
Touch And Go
Touch And Confirm
Touch And Connect
Operating Modes
Of NFC Devices
Reader/Writing Mode
▪ Reader/writer mode the NFC device is capable of reading NFC Forum- mandated tag
types, such as a tag embedded in an NFC smart poster.
Peer-to-Peer Mode
▪ Peer-to-Peer mode Two NFC devices can exchange data. For example, you can share
Bluetooth or Wi-Fi link set-up parameters or you can exchange data such as virtual
business cards or digital photos.
Card Emulation Mode
▪ Card Emulation mode The NFC device appears to an external reader much the same
as a traditional contactless smart card. This enables contactless payments and
ticketing by NFC devices without changing the existing infrastructure.
Applications Of NFCs
Merits & Demerits
Of NFCs
Merits
▪ High convenience to the user, because the data exchange is done by bringing two
mobiles together
▪ Reduces cost of electronic issuance
▪ Secure communication
▪ No special software
▪ No manual configuration and settings
▪ No search and pair procedure
Demerits
▪ The system has the limitation that it can be operated only with devices under a short
range i.e. around 10 cm.
▪ The data transfer rate is very less at about 106kbps, 212 kbps and 424kbps.
Thank You
For Watching

More Related Content

What's hot

Near field Technology
Near field TechnologyNear field Technology
Near field Technology
shrien_sahi
 
LALIT NFC
LALIT NFCLALIT NFC
LALIT NFC
LALIT SEHRAWAT
 
10.1
10.110.1
10.1
wacerone
 
NFC
NFCNFC
Near field communication
Near field communicationNear field communication
Near field communication
PRADEEP Cheekatla
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
Neha Singh
 
Near Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshNear Field Communication (NFC) by Logesh
Near Field Communication (NFC) by Logesh
Logesh Kumar
 
Introduction to NFC
Introduction to NFCIntroduction to NFC
Introduction to NFC
Venkat Alagarsamy
 
NFC documation
NFC documationNFC documation
NFC documation
Saiprasad
 
NFC- Standards and Security
NFC- Standards and SecurityNFC- Standards and Security
NFC- Standards and Security
Universitat Politècnica de Catalunya
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
Manish Sharma
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
mahima28
 
nfc report file
nfc report filenfc report file
nfc report file
Nitish Tanwar
 
wireless communication
wireless communicationwireless communication
wireless communication
Sakshi Bhargava
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
Tejasvi Kurusetti
 
Nfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkamNfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkam
Krishnaprasad Arumugam
 
Near field communication - Data transmission
Near field communication - Data transmissionNear field communication - Data transmission
Near field communication - Data transmission
Dhruv Patel
 
It nfc presentation
It nfc presentationIt nfc presentation
It nfc presentation
Peerapat Kruarattikan
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field Communication
Salomon Thomas
 
Nfc
NfcNfc

What's hot (20)

Near field Technology
Near field TechnologyNear field Technology
Near field Technology
 
LALIT NFC
LALIT NFCLALIT NFC
LALIT NFC
 
10.1
10.110.1
10.1
 
NFC
NFCNFC
NFC
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
Near Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshNear Field Communication (NFC) by Logesh
Near Field Communication (NFC) by Logesh
 
Introduction to NFC
Introduction to NFCIntroduction to NFC
Introduction to NFC
 
NFC documation
NFC documationNFC documation
NFC documation
 
NFC- Standards and Security
NFC- Standards and SecurityNFC- Standards and Security
NFC- Standards and Security
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
nfc report file
nfc report filenfc report file
nfc report file
 
wireless communication
wireless communicationwireless communication
wireless communication
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Nfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkamNfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkam
 
Near field communication - Data transmission
Near field communication - Data transmissionNear field communication - Data transmission
Near field communication - Data transmission
 
It nfc presentation
It nfc presentationIt nfc presentation
It nfc presentation
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field Communication
 
Nfc
NfcNfc
Nfc
 

Similar to Near Field Communications - NFC - Uses, Applications, Cost and Much More

NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
Akshat Rohatgi
 
nfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfnfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdf
SibenConor
 
Nfc
Nfc Nfc
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
ronak1207
 
Near field communication.pptx
Near field communication.pptxNear field communication.pptx
Near field communication.pptx
Poriumlimited
 
NFC tech
NFC techNFC tech
NFC tech
Rama Sai Mallam
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
Vasanth Krupa
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
avtechno
 
NFC (near Field Communication)
NFC (near Field Communication)NFC (near Field Communication)
NFC (near Field Communication)
Chetan Chaudhari
 
Near field communication new
Near field communication newNear field communication new
Near field communication new
Sanu Varghese
 
Near field communication
Near field communicationNear field communication
Near field communication
Rahul Patil
 
Nfc technology
Nfc  technologyNfc  technology
Nfc technology
Deepak Raj
 
Near field communication
Near field communicationNear field communication
Near field communication
divyasolanki101
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
mahima28
 
NFC
NFCNFC
Nfc- Near Field Communicatio
Nfc- Near Field CommunicatioNfc- Near Field Communicatio
Nfc- Near Field Communicatio
Sachin Gamit
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
Aditya Singh
 
Near field communication
Near field communicationNear field communication
Near field communication
Dheeraj Raja
 
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptxNFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
ShirishaBhuvanagiri
 
Near field communication
Near field communicationNear field communication
Near field communication
Vaibhav Chandak
 

Similar to Near Field Communications - NFC - Uses, Applications, Cost and Much More (20)

NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
nfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfnfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdf
 
Nfc
Nfc Nfc
Nfc
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
Near field communication.pptx
Near field communication.pptxNear field communication.pptx
Near field communication.pptx
 
NFC tech
NFC techNFC tech
NFC tech
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
NFC (near Field Communication)
NFC (near Field Communication)NFC (near Field Communication)
NFC (near Field Communication)
 
Near field communication new
Near field communication newNear field communication new
Near field communication new
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc technology
Nfc  technologyNfc  technology
Nfc technology
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
NFC
NFCNFC
NFC
 
Nfc- Near Field Communicatio
Nfc- Near Field CommunicatioNfc- Near Field Communicatio
Nfc- Near Field Communicatio
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptxNFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
 
Near field communication
Near field communicationNear field communication
Near field communication
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Near Field Communications - NFC - Uses, Applications, Cost and Much More

  • 3. What Is NFC? ▪ NFC or Near Field Communication is a short range high frequency wireless communication technology. ▪ NFC is mainly aimed for mobile or handheld devices.
  • 4. What Is NFC? ▪ A radio communication is established by touching the two phones or keeping them in a proximity of a few centimetres (up to 10 cm) . ▪ Logo Allows communication between Two powered (active) devices Powered and non self-powered (passive) devices
  • 6. Evolution ▪ In 2004, NFC Forum was formed by Nokia, Philips, Sony, to set standards for NFC . Every NFC enabled device will have “N-Mark” trademark ,developed by NFC Forum.
  • 7. Evolution ▪ In 2006 First mobile phone( Nokia 6131) with NFC released by NOKIA.
  • 8. Evolution ▪ In 2010 First android phone SAMSUNG NEXUS S with NFC support released.
  • 9. Features of Near Field Communications
  • 10. Features ▪ NFC is an extension of Radio frequency identification (RFID) technology that combines the interface of a smartcard and a reader into a single device. ▪ This allow two-way communication between endpoints, where earlier systems were one-way only.
  • 11. Features ▪ It operates within the globally available and unlicensed radio frequency band of 13.56 MHz, with a bandwidth of 14 kHz. ▪ Working distance with compact standard antennas: up to 10 cm .
  • 12. Features ▪ Supported data rates: 106, 212 and 424K bit/s For two devices to communicate using NFC, one device must have an NFC reader/writer and one must have an NFC tag
  • 14. Operation ▪ NFC has two communicative terminals :The INITIATOR is the one who wishes to communicate and starts the communication. The TARGET receives the initiator’s communication request and sends back a reply
  • 15. Operation ▪ NFC employs two different coding to transfer data. If an active device transfers data at 106 Kbit/s, a Modified Miller coding with 100% modulation is used. In all other cases Manchester coding is used with a modulation ratio of 10%.
  • 16. Active Communication Mode ▪ In Active mode, both devices with NFC chip generates an electromagnetic field and exchange data.
  • 17. Passive Communication Mode ▪ In Passive mode, there is only one active device and the other uses that field to exchange information.
  • 18. Operation ▪ NFC devices communicate via magnetic field induction, where two loop antennas are located within each others near field, effectively forming an air-core transformer. ▪ The reader continuously generates an RF carrier sine wave (at 13.56MHz), watching always for modulation to occur. Detected modulation of the field would indicate the presence of a tag.
  • 19. Operation ▪ A tag enters the RF field generated by the reader. ▪ Once the tag has received sufficient energy to operate correctly, it divides down the carrier and begins clocking its data to an output transistor, which is normally connected across the coil inputs.
  • 20. Operation ▪ The tag’s output transistor shunts the coil, sequentially corresponding to the data which is being clocked out of the memory array. ▪ Shunting the coil causes a momentary fluctuation (dampening) of the carrier wave, which is seen as a slight change in amplitude of the carrier. ▪ The reader peak-detects the amplitude modulated data and processes the resulting bit stream according to the encoding and data modulation methods used.
  • 26. Reader/Writing Mode ▪ Reader/writer mode the NFC device is capable of reading NFC Forum- mandated tag types, such as a tag embedded in an NFC smart poster.
  • 27. Peer-to-Peer Mode ▪ Peer-to-Peer mode Two NFC devices can exchange data. For example, you can share Bluetooth or Wi-Fi link set-up parameters or you can exchange data such as virtual business cards or digital photos.
  • 28. Card Emulation Mode ▪ Card Emulation mode The NFC device appears to an external reader much the same as a traditional contactless smart card. This enables contactless payments and ticketing by NFC devices without changing the existing infrastructure.
  • 31. Merits ▪ High convenience to the user, because the data exchange is done by bringing two mobiles together ▪ Reduces cost of electronic issuance ▪ Secure communication ▪ No special software ▪ No manual configuration and settings ▪ No search and pair procedure
  • 32. Demerits ▪ The system has the limitation that it can be operated only with devices under a short range i.e. around 10 cm. ▪ The data transfer rate is very less at about 106kbps, 212 kbps and 424kbps.