logo

Communication And Information Technology docx.

   

Added on  2022-08-13

13 Pages2808 Words22 Views
Running head: COMMUNICATION AND INFORMATION TECHNOLOGY
Communication and Information Technology
Name of the Student
Name of the University
Author note

COMMUNICATION AND INFORMATION TECHNOLOGY1
Table of Contents
Unit 3: Radio-Frequency Identification Devices.............................................................................2
3.1 Understanding of Identification Friend-or-Foe Systems.......................................................2
3.2 Spy on the Wall.....................................................................................................................2
3.3 Electronic Product Code (EPC).............................................................................................2
3.4 RFID Architectures................................................................................................................3
3.5 RFID Applications: Post Point of Sale..................................................................................4
3.6 RFID Applications: Human Implantation.............................................................................4
3.7 RFID Applications: Use of HIMs in the Workplace.............................................................4
Unit 4: Biometrics............................................................................................................................5
4.1 Forms of Biometric Data.......................................................................................................5
4.2 Validation and Identification.................................................................................................5
4.3 Types of Biometric Measurement.........................................................................................6
4.4 Overview of Biometric Measurements..................................................................................7
4.5 Facial biometrics....................................................................................................................7
4.6 Iris and retina biometrics.......................................................................................................8
4.7 Gait biometric........................................................................................................................8
4.8 Voice biometric.....................................................................................................................8
4.9 BNA biometric.......................................................................................................................9
4.10 Biometrics and Ethical Issues..............................................................................................9
References......................................................................................................................................11

COMMUNICATION AND INFORMATION TECHNOLOGY2
Unit 3: Radio-Frequency Identification Devices
3.1 Understanding of Identification Friend-or-Foe Systems
The Identification Friend-or-Foe (IFF) systems are defined as a secure system for aircraft
identification, which is able to detect and measure differences between the hostile and friendly
aircrafts. The IFF systems make use of RFID and electromagnetic devices for communicating
with the aircrafts and identifying of various forces within the airspace (Svyd et al. 2019). These
systems are considered as a two-channel system that employs the 1030 MHz band, which is
responsible for interrogating signals. The 1090 MHz band is further used for response signals.
3.2 Spy on the Wall
The RFID systems, which are considered as similar to FM radio waves have the
capability of penetrating through doors, walls, clothes and other materials. With the proper form
of RFID reader, the user would be able to trigger the interrogation capability within the RGID
tag within ePassports, library cards, credit cards, enhanced driver licenses and many others
(McIntyre, Michael and Albrecht 2015). In this way, the RFID devices could be used as a spy
tool for viewing across certain objects and extract information.
3.3 Electronic Product Code (EPC)
The EPC is defined as a universal identifier, which aims at providing an unique identity
to some specific physical object. The identity provided by EPC is considered to be unique for
every physical object and every category of physical objects. The EPCs are encoded with RFID
tags and thus it helps in easy tracking of all forms of objects that includes documents, fixed
assets and reusable transport items (Toyoda et al. 2017). It is thus designed in accordance to a

COMMUNICATION AND INFORMATION TECHNOLOGY3
flexible framework, which could support many kinds of coding schemes including the current
use of barcode technology.
3.4 RFID Architectures
The RF communication primarily occurs with the transference of data created by
electromagnetic waves. With the generation of electromagnetic waves created at the source, the
effect could be further received at a far distance from the source based on the identification.
The RFID system comprises of three components:
1. RFID transponder or tag
2. RFID transceiver or reader
3. Data processing subsystem
The RFID tag comprises of wireless transducer, encapsulating materials and an antenna.
The tags could be either passive or active in nature.
The RFID comprises of antenna, decider and transceiver. They would be responsible for
sending periodic form of signals based on inquiring whether any tag would remain in the vicinity
of the signal. After the receiving of signal, the information would be passed on to the data
processor.
The data processing subsystem helps in supporting and providing a way of storing and
processing over the data.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Networking Concepts - Comparative Analysis and Ping Test
|6
|1027
|445

Study on Radio Frequency Identification
|11
|2382
|328

RFID Technology: Types, Similar Technologies, Limitations, Use Cases and Implementation
|6
|2133
|300

Working of Radio Frequency Identification (RFID)
|10
|2235
|202

Increasing Security Breach and Solutions on RFID
|35
|5550
|125

Reconfigurable RFID Antennas and Applications
|5
|3515
|443