SlideShare a Scribd company logo
Near
Field
Communication
SUBMITTED BY:-
MANOGNYA
1141019040
ICE-’A’
Contents
What is NFC
History
NFC tag
Operation
Application
Comparison with Bluetooth
Advantages & Disadvantages
Future of NFC
2
What is NFC?
NFC or Near Field Communication is a short range high frequency wireless
communication technology.
A radio communication is established by touching the two phones or keeping
them in a proximity of a few centimeters.
NFC is mainly aimed for mobile or handheld devices.
It allows for simplified transactions, data exchange, and wireless connections
between two devices.
3
Features
NFC is an extension of Radio frequency identification or RFID technology.
It’s operating frequency is 13.56MHz.
Working distance with compact standard antennas: up to 10 cm.
Supported data rates: 106 to 424 Kbit/s.
For two devices to communicate using NFC, one device must have an NFC
reader/writer and one must have an NFC tag.
4
History
2004NFC Forum was formed by Nokia, Philips, Sony, to set standards for
NFC. Every NFC enabled device will have “N-Mark” trademark ,developed by
NFC Forum.
2006NOKIA 6131 was the first NFC phone.
5
Contd.
2010First android phone SAMSUNG NEXUS S with NFC
support was released.
2011NFC support became a part of the Symbian mobile
operating system with the release of Symbian Anna version.
2013 Samsung announces major partnership to develop
mobile payments.
2014Apple announces Apple pay, an NFC payment feature for the iPhone 6
and iPhone 6 Plus.
6
NFC Tag
NFC tags are small microchips which can store a small amount of information
that can be transferred to another NFC device.
NFC tags works by an active device generating a magnetic field which induces
an electric current in the antenna of the passive device which powers up the
NFC Chip.
The antenna on an NFC tag is made of etched aluminium or occasionally
copper.
7
Contd.
The bonding bit is the connection between the chip and the antenna.
This bit will break when the tag is bended too much.
8
Operation of NFC
NFC works using electromagnetic Induction between two loop antennas.
9
Contd.
Faraday’s 1st law - Any change in the magnetic field of a coil of wire will cause
an emf to be induced in the coil.
Faraday’s 2nd law - It states that the magnitude of emf induced in the coil is
equal to the rate of change of flux that linkages with the coil.
Considering Lenz’s law,
E = N
𝑑𝜙
𝑑𝑡
10
E = -N
𝑑𝜙
𝑑𝑡
Modes of operation
11
Contd.
ACTIVE MODE -
In this mode both devices generate RF field
to transfer data. In this situation any of the
devices can be the initiator and other will
be the target.
12
Contd.
PASSIVE MODE -
In Passive mode, there is only one active device and the other uses that field to
exchange information.
13
Application of NFC
SMART POSTERS -
An object that has, affixed to or embedded in it, one or
more readable NFC tags with NDEF messages stored in
them.
Each tag is read when an NFC device is held close to the
“N-Mark” shown.
Garment tag, magazine page, movie posters etc.
14
Contd.
MOBILE PAYMENT -
NFC phone will open wallet application. Wallet will
display product cost when user clicks “Buy”.
At check out, wallet will display all credit/debit cards
in wallet for payment.
Customer will select card for payment
Wallet will show the confirmation page.
15
Other applications
Access- Ensure secure building area access for personnel with NFC device.
Parking- Use NFC to authenticate parking entry and keep record .
Maps- An interactive NFC Smart Poster map allows the user to download the
map, get additional information on relevant services.
Connection with different devices like Bluetooth headset, printer, camera etc.
NFC Parking >>>
<<<Security Gate
16
Comparison with Bluetooth
Aspect NFC BLUETOOTH
Set-up time <0.1 msec ~6 sec
Range Upto 10 cm Upto 30m
Frequency 13.56 MHz 2.4-2.5 GHz
Bit rate 424 Kbit/sec 2.1 Mbit/sec
Power consumption Less power Varies with class
Consumer experience Touch, wave & simply
connect
Configuration needed
17
Advantages of NFC
No special software
No manual configuration and settings
No search and pair procedure
High convenience to the user, because the data exchange is done by bringing
two mobiles together.
Secure communication
18
Disadvantages of NFC
The system has the limitation that it can be operated only with devices under a
short range i.e around 10 cm.
The data transfer rate is very less.
Expensive
NFC technology is relatively new, so not every mobile phone will be compatible
with this technology.
19
Future of NFC
New generations of iPhone, iPod and iPad products would reportedly be
equipped with NFC capability which would enable small-scale monetary
transactions.
Google wallet is Google’s smartphone program that allows users to load credit
card information and pay with the swipe of their phone.
Visa is expanding its horizons and testing the use of NFC as a means of
smartphone payment using Visa credit cards.
20
Conclusion
Mobile handsets are the primary target for NFC and soon NFC will be
implemented in most handheld devices.
Even though NFC have the shortest range among radio frequency technologies,
combining them with existing technologies like Bluetooth or Infrared can
increase its range of applications.
21
Reference
[1] http://www.nfc-forum.org
[2] http://www.nearfieldcommunication.org
[3] http://electronics.howstuffworks.com/near-field-communication2.htm
[4] http://www.nfcworld.com/nfc-phones-list/
[5] International Journal of Computer Science and Network Security, VOL.12
No.2,Feb 2012 by Hussein Ahmad Al-Ofeishat , Mohammad A.A.Al Rababah
[6] Beginning NFC by Tom Igoe, Don Coleman & Brian Jepson
[7] http://www.electrical4u.com/faraday-law-of-electromagnetic-induction/
22
nfc

More Related Content

What's hot

Bluetooth
BluetoothBluetooth
Bluetooth
Bhushan Bagde
 
Bluetooth Network security
Bluetooth Network securityBluetooth Network security
Bluetooth Network security
vuttarkarrsreekanthr
 
RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overview
Maarten Weyn
 
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
Maarten Weyn
 
R1x g17 bluetooth i
R1x g17 bluetooth iR1x g17 bluetooth i
R1x g17 bluetooth i
cairo university
 
Bluetooth bluetooth-low-energy-ant-nfc-wifi-compare
Bluetooth bluetooth-low-energy-ant-nfc-wifi-compareBluetooth bluetooth-low-energy-ant-nfc-wifi-compare
Bluetooth bluetooth-low-energy-ant-nfc-wifi-compare
Droidcon Berlin
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
wayn
 
Cell phone detector
Cell phone detectorCell phone detector
NFC near feald communication
NFC near feald communicationNFC near feald communication
NFC near feald communication
MADHANRAJXBOX360
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
Chandrakant Choure
 
Power Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTHPower Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTH
Manshi Raj
 
Bluetooth, Infrared
Bluetooth, InfraredBluetooth, Infrared
Bluetooth, Infrared
Prashant Priyam
 
Bluetooth ppt by Ajay
Bluetooth ppt by AjayBluetooth ppt by Ajay
Bluetooth ppt by Ajay
Åjâÿ Chelachuvadu
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
Shubham Chauhan
 
Project work (2014-2015)1
Project work (2014-2015)1Project work (2014-2015)1
Project work (2014-2015)1
mukthar mohamed
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
Manish Sharma
 
Bluetooth
BluetoothBluetooth
Bluetooth
Sumeet Rayat
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
Mohammad Shoeb Quraishi
 
Mobile detector
Mobile detectorMobile detector

What's hot (19)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Network security
Bluetooth Network securityBluetooth Network security
Bluetooth Network security
 
RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overview
 
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
 
R1x g17 bluetooth i
R1x g17 bluetooth iR1x g17 bluetooth i
R1x g17 bluetooth i
 
Bluetooth bluetooth-low-energy-ant-nfc-wifi-compare
Bluetooth bluetooth-low-energy-ant-nfc-wifi-compareBluetooth bluetooth-low-energy-ant-nfc-wifi-compare
Bluetooth bluetooth-low-energy-ant-nfc-wifi-compare
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Cell phone detector
Cell phone detectorCell phone detector
Cell phone detector
 
NFC near feald communication
NFC near feald communicationNFC near feald communication
NFC near feald communication
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
 
Power Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTHPower Point Presentation on BLUTOOTH
Power Point Presentation on BLUTOOTH
 
Bluetooth, Infrared
Bluetooth, InfraredBluetooth, Infrared
Bluetooth, Infrared
 
Bluetooth ppt by Ajay
Bluetooth ppt by AjayBluetooth ppt by Ajay
Bluetooth ppt by Ajay
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Project work (2014-2015)1
Project work (2014-2015)1Project work (2014-2015)1
Project work (2014-2015)1
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Mobile detector
Mobile detectorMobile detector
Mobile detector
 

Similar to nfc

Report on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATIONReport on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATION
Prandeep Shekhawat
 
NFC tech
NFC techNFC tech
NFC tech
Rama Sai Mallam
 
Nfc
Nfc Nfc
Nfc technology
Nfc  technologyNfc  technology
Nfc technology
Deepak Raj
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
Aditya Singh
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
mahima28
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
mahima28
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technology
shrien_sahi
 
Near field communication
Near field communicationNear field communication
Near field communication
Vaibhav Chandak
 
NFC (near Field Communication)
NFC (near Field Communication)NFC (near Field Communication)
NFC (near Field Communication)
Chetan Chaudhari
 
Near field communication
Near field communicationNear field communication
Near field communication
Rahul Patil
 
NFC
NFCNFC
Near Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much MoreNear Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much More
Praful Manjunath
 
Nfc
NfcNfc
Nfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkamNfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkam
Krishnaprasad Arumugam
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
Yesha Kava
 
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptxNFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
ShirishaBhuvanagiri
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
Julaiha Probo Anggraini
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
Neha Singh
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
Deepak Kl
 

Similar to nfc (20)

Report on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATIONReport on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATION
 
NFC tech
NFC techNFC tech
NFC tech
 
Nfc
Nfc Nfc
Nfc
 
Nfc technology
Nfc  technologyNfc  technology
Nfc technology
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technology
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC (near Field Communication)
NFC (near Field Communication)NFC (near Field Communication)
NFC (near Field Communication)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC
NFCNFC
NFC
 
Near Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much MoreNear Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much More
 
Nfc
NfcNfc
Nfc
 
Nfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkamNfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkam
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptxNFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

nfc

  • 2. Contents What is NFC History NFC tag Operation Application Comparison with Bluetooth Advantages & Disadvantages Future of NFC 2
  • 3. What is NFC? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication is established by touching the two phones or keeping them in a proximity of a few centimeters. NFC is mainly aimed for mobile or handheld devices. It allows for simplified transactions, data exchange, and wireless connections between two devices. 3
  • 4. Features NFC is an extension of Radio frequency identification or RFID technology. It’s operating frequency is 13.56MHz. Working distance with compact standard antennas: up to 10 cm. Supported data rates: 106 to 424 Kbit/s. For two devices to communicate using NFC, one device must have an NFC reader/writer and one must have an NFC tag. 4
  • 5. History 2004NFC Forum was formed by Nokia, Philips, Sony, to set standards for NFC. Every NFC enabled device will have “N-Mark” trademark ,developed by NFC Forum. 2006NOKIA 6131 was the first NFC phone. 5
  • 6. Contd. 2010First android phone SAMSUNG NEXUS S with NFC support was released. 2011NFC support became a part of the Symbian mobile operating system with the release of Symbian Anna version. 2013 Samsung announces major partnership to develop mobile payments. 2014Apple announces Apple pay, an NFC payment feature for the iPhone 6 and iPhone 6 Plus. 6
  • 7. NFC Tag NFC tags are small microchips which can store a small amount of information that can be transferred to another NFC device. NFC tags works by an active device generating a magnetic field which induces an electric current in the antenna of the passive device which powers up the NFC Chip. The antenna on an NFC tag is made of etched aluminium or occasionally copper. 7
  • 8. Contd. The bonding bit is the connection between the chip and the antenna. This bit will break when the tag is bended too much. 8
  • 9. Operation of NFC NFC works using electromagnetic Induction between two loop antennas. 9
  • 10. Contd. Faraday’s 1st law - Any change in the magnetic field of a coil of wire will cause an emf to be induced in the coil. Faraday’s 2nd law - It states that the magnitude of emf induced in the coil is equal to the rate of change of flux that linkages with the coil. Considering Lenz’s law, E = N 𝑑𝜙 𝑑𝑡 10 E = -N 𝑑𝜙 𝑑𝑡
  • 12. Contd. ACTIVE MODE - In this mode both devices generate RF field to transfer data. In this situation any of the devices can be the initiator and other will be the target. 12
  • 13. Contd. PASSIVE MODE - In Passive mode, there is only one active device and the other uses that field to exchange information. 13
  • 14. Application of NFC SMART POSTERS - An object that has, affixed to or embedded in it, one or more readable NFC tags with NDEF messages stored in them. Each tag is read when an NFC device is held close to the “N-Mark” shown. Garment tag, magazine page, movie posters etc. 14
  • 15. Contd. MOBILE PAYMENT - NFC phone will open wallet application. Wallet will display product cost when user clicks “Buy”. At check out, wallet will display all credit/debit cards in wallet for payment. Customer will select card for payment Wallet will show the confirmation page. 15
  • 16. Other applications Access- Ensure secure building area access for personnel with NFC device. Parking- Use NFC to authenticate parking entry and keep record . Maps- An interactive NFC Smart Poster map allows the user to download the map, get additional information on relevant services. Connection with different devices like Bluetooth headset, printer, camera etc. NFC Parking >>> <<<Security Gate 16
  • 17. Comparison with Bluetooth Aspect NFC BLUETOOTH Set-up time <0.1 msec ~6 sec Range Upto 10 cm Upto 30m Frequency 13.56 MHz 2.4-2.5 GHz Bit rate 424 Kbit/sec 2.1 Mbit/sec Power consumption Less power Varies with class Consumer experience Touch, wave & simply connect Configuration needed 17
  • 18. Advantages of NFC No special software No manual configuration and settings No search and pair procedure High convenience to the user, because the data exchange is done by bringing two mobiles together. Secure communication 18
  • 19. Disadvantages of NFC The system has the limitation that it can be operated only with devices under a short range i.e around 10 cm. The data transfer rate is very less. Expensive NFC technology is relatively new, so not every mobile phone will be compatible with this technology. 19
  • 20. Future of NFC New generations of iPhone, iPod and iPad products would reportedly be equipped with NFC capability which would enable small-scale monetary transactions. Google wallet is Google’s smartphone program that allows users to load credit card information and pay with the swipe of their phone. Visa is expanding its horizons and testing the use of NFC as a means of smartphone payment using Visa credit cards. 20
  • 21. Conclusion Mobile handsets are the primary target for NFC and soon NFC will be implemented in most handheld devices. Even though NFC have the shortest range among radio frequency technologies, combining them with existing technologies like Bluetooth or Infrared can increase its range of applications. 21
  • 22. Reference [1] http://www.nfc-forum.org [2] http://www.nearfieldcommunication.org [3] http://electronics.howstuffworks.com/near-field-communication2.htm [4] http://www.nfcworld.com/nfc-phones-list/ [5] International Journal of Computer Science and Network Security, VOL.12 No.2,Feb 2012 by Hussein Ahmad Al-Ofeishat , Mohammad A.A.Al Rababah [6] Beginning NFC by Tom Igoe, Don Coleman & Brian Jepson [7] http://www.electrical4u.com/faraday-law-of-electromagnetic-induction/ 22