Basic Description And Characteristics Of Near Field Communication (NFC) Technology

Introduction to NFC technology

Discuss about the Present And Future Of NFC Application.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

According to this author, near field communication is known to be an emerging technology which is used for short range communication. It is totally based on various kinds of wireless standard which makes use of RFID infrastructure (Nagashree, Rao & Aswini, 2014). Along with combination with NFC based smartphones it can provide contactless transaction for various kinds of services related mobile payment and air ticketing. The main objective of this paper is to provide basic description and characteristics related to advantage of this technology. The present and future of NFC application will be taken analyzed for future scenes. Along with this the paper also discusses on security concern, issues and present conflict in the paper. From the paper I have learned about technical principles, operation mode, NFC data, connection handover and lastly architecture of NFC technology. After that I have learnt about application of NFC in real world. NFC are used in mobile payment like Google wallet, ISIS consortium, SIMpass technology and P2P payment.

According to this author NFC can be defined is a short range wireless communication technology which is depend on approval and maturing of standard in the domain of smart card and NFC (Grosse-Puppendahl et al. 2014). RFID tag can be defined as an antenna which is used for receiving and transmitting radio signal. It can be defined as an integrated circuit which can be used for storing and processing of information for modulation and demodulation of signal. One of the major benefit of NFC is that this technology is considered to be compatible with RFID infrastructure. RFID are also known to be contactless smartcard. NFC can be considered to be strict distinction between reader and transponder associated with it. It can not only read and write data from a tag but can also transmit data into another NFC device. From this paper I have learned about three operating modes in NFC that is reader/ writer mode, emulation of card mode and lastly peer to peer mode.

According to this Author, NFC is well-known technology which is used for wireless communication in short range. NFC has large number of application like payment and ticketing, electronic keys, identification of large number of things, receiving and sharing of information and lastly setting up of various kinds of services (Liu et al. 2015). NFC provides a platform to user for making fast and securing purchase with electronic money. The author states that NFC can be used for identifying documents. An example has been provided by author which allow students to store on their cell phone. The data can be easily stored on any kind of tagged object which can be used be easily accessed by various mobile phones for downloading travel timetables. NFC can be used for setting up of long range wireless technologies like Bluetooth and LAN. From the paper I have learned about characteristics of NFC. I have also learned that NFC was developed by Sony and Philips.

Technical principles and operation modes of NFC technology

According to this author NFC is well known technology which is used for wireless short range communication. The ultimate goal of NFC is to provide advantage of short- range wireless communication to large number of users (Teh et al. 2014). With the help of point or touch NFC provides an effortless use of various devices and gadgets on regular basis. There many advantage of using NFC technology like downloading of music and video from various smart phone, exchange of business cards with another cell phone, making use of point of sale for paying during purchase. It also provides feature of pairing of Bluetooth device. From this paper I have learned about various of advantages of using NFC technology.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

According to this author there are namely three modes of communication in NFC that is read and write mode, tag removal mode and lastly peer to peer connection mode. In read and write mode various NFC mobile can easily read or write to the tag which is provided. Read and write mode of NFC can be easily seen in smart poster. On the contrary tag emulation mobile phone acts like smart card (Choi et al. 2015). The example of peer to peer communication in NFC phones is nothing but the exchange of various business cards. Transmission of RF signal between transmitter creates transmitter and receiver provides a large number of distinction between NFC and other kinds of wireless modes. NFC makes use of magnetic coupling between various devices instead of broadcasting of waves in a freeway. From this paper I have learned about the fact that NFC devices can easily operate in low electric and magnetic field due to property of short range communication.

According to this author NFC system can easily operate as per the requirement into two modes that is active and passive mode (Honkakorpi, 2015). In active mode both the devices provide field of radio frequency which is used for the transfer of data. In this mode one device is initiator and another one is the target. On the contrary in passive mode only one kind of device can generate RF field and another one makes use of load modulation for transfer of data. Passive mode comes up with key benefit like low consumption of battery. NFC sticker is a new kind of technology which is considered to be an alternative solution to large number of NFC devices. Some advantages of NFC sticker are that it is small in size like any cell phone. It is very easy to use NFC stickers as it can easily provide large number of business benefits.

Application of NFC in the real world

According to this author NFC can easily communicate between various devices by making use of magnetic field induction. There are mainly four ways by which NFC operates that is phone to phone, phone to tag and lastly phone to reader. In phone to phone two cell phones are generally equipped with NFC technology for establishing communication with each other. It can be used for transferring files and pictures just by touching it (Bakula, Pelgrims, & Puers, 2015). While in phone to device NFC are well equipped with cell phone for communicating with large number of devices. Touching the phone with NFC equipped printer it can easily print the pictures present in the phone. It can also perform payment related transaction by simply touching it on the device. Tags are embedded in posters which are used for marketing purpose. When cell phones are tagged with a tag then data from the tag is transferred into the cell phone.

According to this author NFC is wireless technology which is considered to be subset of RFID. It operates at a frequency of 13.56 MHz. It can easily provide a speed of 424 kbps. NFC mainly falls under three categories for its use in different field like service initiation category, peer to peer category and lastly category of payment and ticketing (Chou, Yan & Lu, 2014). In matters of service initiation NFC can be considered to be much similar to RFID. NFC devices reads various kinds of data from the tag and this particular information can be easily used in various number of ways. Various kinds of N|FC devices can read the data containing important information even if the cell phone is switched off. In Peer to Peer communication data can be used for creating a direct link between two devices which can be again used for transfer of data.

According to this author near field communication (NFC) has a large number of uses like contactless payments by making use of NFC enabled mobile phones. It can be considered to be convenient and secure kind of purchase method in various kinds of transactions. Man-in the middle is another kind of security issue in NFC which mainly requires involvement of three party. In this the communication between two party is interpreted by a third party. The third party makes use of information received and modified if it only enables them to achieve various kinds of objectives. Practically it is not possible to have man-in the middle attack on any kind of kind of NFC link which is provided. But it is highly recommended to make use of active- passive communication mode (Cohen et al. 2017). The mode should be used in such a way RF field is generated on a continuous basis by one of the valid parties. The active party should continuously listen to RF field during sending of data so that it can easily detect data from any kind of disturbance which can be caused by a potential hacker.

Advantages of NFC technology

According to this author NFC (Near field communication) has a large number of application in daily life like contactless token, medical application along with sensor and lastly security application. Contactless payment in generally inclusive in wide range of application like service payments, downloading of movies, shopping of TV at home and even ticketing from smart posters (Gaikwad et al. 2017).  Contactless browsing is mainly used for security verification and various kinds of municipal services. Wireless connection is all about a smart phone which comes up with NFC reader for point to point transmission of data. NFC also provides the option of contactless download which is downloading of data for providing convenient way or method for new kind of application on NFC. NFC technology comes up with the option of short range which can be easily applied for monitoring of health. This can ultimately result in monitoring of health in long term by establishing connection mobile device and mobile terminal. NFC in smart phones can be easily used for unlocking doors in various hotels.

According to this author NFC comes up with large number of benefits like ease of using it, versatility and secure communication. Near filed communication provides the option of contactless payment system as it removes the headache of carrying multiple cards. One password cannot protect the whole wallet while a single password can easily protect the whole smart phone. NFC can be easily used in large number of application ranging from bank cards to passes of bus. NFC establishes a secure as it can easily transfer data over secure channel along with encryption of various information (Sangwan et al. 2016). NFC allows various kinds of individual to easily share data cost in efficient way. NFC consumes less amount of power in comparison to Bluetooth will it does not require any kind of setup or established connection with other gadgets or devices.

According to this author there are five kind of security threats in NFC like eavesdropping, corruption of data, modification of data, insertion of data and lastly man in the middle attack. There are mainly three kind of security issues in NFC like compatibility, security and lastly cost. NFC is a new kind of technology so its compatibility can be considered as the main issue. NFC is considered to be much expensive kind of technology (Cheng et al. 2016). So various organization around the globe does not get motivation to implement this particular technology in various workplaces. The last kind of issue encountered in NFC is hacking. With the growth of computers like hand held computers they are becoming more prone to various kinds of viruses.

References

Bakula, M., Pelgrims, P., & Puers, R. (2015). A wireless powering and communication system for implantable devices based on a Royer oscillator with radio and near-field communication links. Procedia engineering, 120, 306-309.

Cheng, R. S., Hong, W. J., Wang, J. S., & Lin, K. W. (2016). An Indoor Guidance System Combining Near Field Communication and Bluetooth Low Energy Beacon Technologies. World Academy of Science, Engineering and Technology, International Journal of Electronics and Communication Engineering, 3(9).        

Choi, E. K., Park, J., Kim, B. S., & Lee, D. (2015). Fabrication of electrodes and near-field communication tags based on screen printing of silver seed patterns and copper electroless plating. International Journal of Precision Engineering and Manufacturing, 16(10), 2199-2204.

Chou, H. T., Yan, Y. T., & Lu, K. Y. (2014, December). Investigation of antenna structure consisting of crossed-field elements for strong EM radiation in the near-zone communications. In Antennas and Propagation (ISAP), 2014 International Symposium on (pp. 143-144). IEEE.

Cohen, M., Abulafia, Y., Lev, D., Lewis, A., Shavit, R., & Zalevsky, Z. (2017). Wireless Communication with Nanoplasmonic Data Carriers: Macroscale Propagation of Nanophotonic Plasmon Polaritons Probed by Near-Field Nanoimaging. Nano letters, 17(9), 5181-5186.

Gaikwad, S., Shah, R., Boob, S., Chimthankar, P., & Thakkar, M. (2017). Smart Electricity Meter System using Near Field Communication (NFC). International Journal of Engineering Science, 12324.

Grosse-Puppendahl, T., Herber, S., Wimmer, R., Englert, F., Beck, S., von Wilmsdorff, J., … & Kuijper, A. (2014, September). Capacitive near-field communication for ubiquitous interaction and perception. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (pp. 231-242). ACM.

Honkakorpi, J. (2015). Near field communication.

Liu, W., Yan, S., Cheng, Y., Li, Q., Feng, Z., Wang, X., … & Nie, Y. (2015). Monodomain design and permeability study of high-Q-factor NiCuZn ferrites for near-field communication application. Journal of Electronic Materials, 44(11), 4367-4372.

Nagashree, R. N., Rao, V., & Aswini, N. (2014). Near field communication. IJ Wireless and Microwave Technologies, 4(2), 20-30.

Sangwan, V. C. A., Kumari, N., Singh, K., & Dhdharia, A. (2016). DIGITALIZING THE BILLING SYSTEM USING NEAR FIELD COMMUNICATION. Development, 3(3).

Teh, P. L., K. Ahmed, P., Cheong, S. N., & Yap, W. J. (2014). Age-group differences in Near Field Communication smartphone. Industrial Management & Data Systems, 114(3), 484-502.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP