logo

Wireless Network: NFC Technology and System Network Diagram

   

Added on  2023-06-04

6 Pages1010 Words240 Views
 | 
 | 
 | 
Running head: WIRELESS NETWORK
Wireless Network
Name of the Student:
Name of the University:
Author Note
Wireless Network: NFC Technology and System Network Diagram_1

1
WIRELESS NETWORK
Part A
Answer to question number 1
For any kind of short distanced between two different devices the “Near Field
communication” or NFC is entrenched along with the NFC sensors. In order to transfer data
from any device regardless of power sources a tag is used. At the same time the information
transmission will not be completed successfully without the application of the small
transmitter. The mechanism of NFC works in a similar pattern for all other wireless signals,
Bluetooth and Wi Fi connections. For the transition of any information between the devices
radio wave is used as an intermediary. Though in order to successfully communicate with the
rest of the devices some additional requirements are to be incorporated to the system. In order
to transfer information from one device to another with the NFC operation the RFID
technology is utilized because it uses electromagnetic induction for data communication. The
most significant advantage associated to this technology is that it does not require external
power sources rather the in order to turn on the operation the electromagnetic field is helpful.
In order to transmit data the radio frequency required by the NFC is 1356 MHz and a speed
of 424 Kb/second (or 106212). This speed is enough for successful transmission of pictures,
music and other details of contracts. Three different operational approaches are available for
the Near Field Communication (NFC) technology and among three of these the most
appropriate and suitable one is peer to peer mode. For successful exchange of confidential
information this specific peer to peer mode is used. Whenever the device receives data from
the sender side is referred to as the passive data and vise versa. Apart from this it is also
determined that, in case of car emulation mode the NFC device can also be utilized as a smart
card. These kinds of smart cards are also used to tap into various systems and to make
payments also thus it can be also defined as a contactless credit card. While tags on the
Wireless Network: NFC Technology and System Network Diagram_2

2
WIRELESS NETWORK
receiver devices are utilized to link up with the receiver devices for the successful
transmission of information the NFC devices are used. This is implies as another major
application of the NFC devices. Whenever this specific technology and application is utilized
in this specific mode that time it is referred to as a read write mode. However, various
security level challenges are also associated to this technology among them snooping is the
most affecting risks. The third party needs not to access any information for collecting
information. Though, in order to accomplish a secured communication the transmission
channel is required to be well encrypted. While transmitting information from the sender side
to the receiver side security challenges may occur. The confidentiality of data can be
compromised due to unethical activities and third party interference. The NFC technology
will be referred to as a vulnerable one if any intermediary gets opportunities to access the
information without authentication. Only secured link of communication and active
communication can reduce the security challenges while transmitting datagram or
information packets. The other risks those have been identified for this technology are
intervention attack and this is required to be mitigated for establishing a secured
communication among the sender and the receiver.
Answer to question number 2
a. The system network diagram is described below as per the instruction provided:
Wireless Network: NFC Technology and System Network Diagram_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents