Transcript

Presented By

SK. Fahad

What is NFC• NFC is a short-range wireless

technology.• NFC provides unique advantages over

other available wireless technologies. • The design includes a near-field

transmitter and receiver to send data from one computer to another

How NFC Works : NFC is based on RFID technology that uses magnetic field induction between electronic devices in close proximity. For two devices to communicate using NFC, one device must have an NFC reader/writer and one must have an NFC tag.

Benefits & Features:

• Not restricted to 1-to-1 communication

• Multiple devices in a small area can communicate with each other using the same frequency.

• Maximum transfer bit rate of 800kbps.

• No special software is required.• Operation at a frequency of 13.5

MHz • No ethical concerns due to range

Social networking:NFC can be used in social networking situations, such as sharing contacts, photos, videos or files, and entering multiplayer mobile games.

Application

ApplicationPayment by NFC:Instant payments and coupon delivery using your handset, as we do with your credit card or debit card.

ApplicationIdentity documents:The NFC Forum promotes the potential for NFC-enabled devices to act as electronic identity documents and keycards. As NFC has a short range and supports encryption, it may be more suitable than earlier, less private RFID systems.

Aspect NFC Bluetooth Bluetooth Low Energy

RFID compatible ISO 18000-3 active active

Standardisation body ISO/IEC Bluetooth SIG Bluetooth SIG

Network Standard ISO 13157 etc. IEEE 802.15.1 IEEE 802.15.1

Network Type Point-to-point WPAN WPANCryptography not with RFID available available

Range < 0.2 m ~100 m (class 1) ~50 m

Frequency 13.56 MHz 2.4–2.5 GHz 2.4–2.5 GHzBit rate 424 kbit/s 2.1 Mbit/s ~1.0 Mbit/s

Set-up time < 0.1 s < 6 s < 0.006 s

Power consumption < 15mA (read) varies with

class

< 15 mA (transmit or receive)

Comparing with other wireless technology:

Disadvantages:•Data transfer rate is small compared to blue tooth and other wireless communications.

•No protection in data modification.

•No protection in eavesdropping.

top related