ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

RFID & NFC and Wireless Network Design

Verified

Added on  2023/06/04

|25
|885
|138
AI Summary
This article discusses RFID and NFC technologies, their differences, and challenges faced by them. It also covers the design of a wireless network, including IP configuration, security implementation, and device connectivity. Ping, channel, and mismatch tests are also performed. Subject: Technology, Course Code: NA, Course Name: NA, College/University: NA

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
1. RFID & NFC:
RFID: RFID stands for Radio frequency identification which is used to read or capture stored
information. RFID comprised with a tag and an antenna. Simply is has the capability to identify
radio waves. The NC is also a branch of RFID which operates at the same frequency as RFID.
Both process operates at 13.56 MHZ. NFC is considered as a secure way for data exchange as it
is capable of working as both NFC tag and NFC reader (Mar-Ortiz, Gonzalez & Adenso-Díaz,
2017). This unique capability enable peer to peer communication. RFID is basically associated
with Automatic identification and Data capture. The AIDC methods are used to identify and
collect information and directly transport into systems. RFID tags are utilized transmit data to
RFID reader (Köstinger et al., 2013. Then the RFID reader converts the radio waves to usable
form. Information collected from the tags is then transferred through a communications interface
to a host computer system, where the data can be stored in a database and analyzed at a later
time.
Challenges:
RFID system also faced several challenges which are followed:
RFID tags with unique serial numbers could be linked to an individual credit card
number.
RFID tags can be read a greater distances with a high-gain antenna
RFID tags can be read without your knowledge
RFID tags are difficult to remove
RFID tags are difficult to remove
The contents of an RFID tag can be read after the item leaves the supply chain
RFID Reader Collision

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
NFC: On the other hand, NFC stands for near field Communication. As the name implies it is
capable of communicate over a short range with compatible devices. Generally one transmitting
device and another to receive the signal (Köstinger et al., 2013. It works by transferring
information over radio waves. To determine what sort of information will be exchanged between
devices, the NFC standard currently has three distinct modes of operation. Perhaps the most
common use in smartphones is the peer-to-peer mode (Urien & Piramuthu, 2014). This allows
two NFC-enabled devices to exchange various pieces of information between each other. In this
mode both devices switch between active when sending data and passive when receiving.
Challenges:
NFC compatible devices can only communicate when they are within four centimeters of
each other.
NFC tags do not power themselves. Instead, they rely on power from the smartphone or
other device interacting with them.
The first smartphone virus, a Trojan, was detected in October 2010 and several more
have appeared since.
2. Wireless network Design
Document Page
Fifure1: Wireless Network
IP Configuration:
Figure 2: Configuration of laptop 1
Document Page
Figure 3: Configuration of laptop 2

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 4: Configuration of laptop 3
Document Page
Figure 5: Configuration of laptop 4
Document Page
Security implementatation:
Figure 6: Security implementation on the Access point 1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 7: Security implementation on the Access point 2
Document Page
Connecting devices:
Figure 8: Client side verification on laptop 1
Document Page
Figure 9: Client side verification on laptop 2

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 10: Client side verification on laptop 3
Document Page
Figure 11: Client side verification on laptop 4
a) Ping
Document Page
Figure 12: ping result from l0.0.0.4 to 10.10.0.1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 13: ping result from l0.0.0.4 to 10.10.0.3
Document Page
Figure 14: ping result from l0.0.0.4 to 10.10.0.2
Document Page
Figure 15: ping result from l0.0.0.1 to 10.10.0.3

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 16: ping result from l0.0.0.1 to 10.10.0.2
Document Page
Figure 17: ping result from l0.0.0.2 to 10.10.0.3
Document Page
b) Channel
Figure18: set the 5GH channel to 36

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 19: set the 5GH channel to 36
Document Page
Figure 20 : network diagram (not effected by the changes)
c) Mismatch
Document Page
Figure 21: Mismatch test 1
Figure 22: mismatch result
Figure 23: Mismatch test 2

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 24: Mismatch test 2
Document Page
Reference:
Köstinger, H., Gobber, M., Grechenig, T., Tappeiner, B., & Schramm, W. (2013, January).
Developing a NFC based patient identification and ward round system for mobile devices
using the android platform. In Point-of-Care Healthcare Technologies (PHT), 2013
IEEE (pp. 176-179). IEEE.
Mar-Ortiz, J., Gonzalez-Velarde, J. L., & Adenso-Díaz, B. (2017). Aplicación de métricas
software en la evaluación de modelos de procesos de negocio. Tectonophysics, 706, 706.
Mattei, E., Lucano, E., Censi, F., Triventi, M., & Calcagnini, G. (2016). Provocative testing for
the assessment of the electromagnetic interference of RFID and NFC readers on
implantable pacemaker. IEEE Transactions on Electromagnetic Compatibility, 58(1),
314-322.
Urien, P., & Piramuthu, S. (2014). Elliptic curve-based RFID/NFC authentication with
temperature sensor input for relay attacks. Decision Support Systems, 59, 28-36.
Document Page
1 out of 25
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]