logo

Wireless Networking: Near Field Communication (NFC) and Its Applications

   

Added on  2023-06-04

4 Pages876 Words408 Views
Running head: WIRELESS NETWORKING
Wireless Networking
Name of the Student:
Name of the university:
Author Note

1
WIRELESS NETWORKING
Answer to question number 1
Near Field Communication or NFC becomes ingrained in conjunction with NFC sensors
when it comes to a shorter distance between two different devices. A tag is used to transfer data
from any possible device irrespective of power. However, there is a requirement for small
transmitters for effective and successful transformation of information, without which the
transformation process will not be thriving (Zhao, Smith & Sample, 2015). For all Bluetooth,
WI-FI, and other wireless signals, the NFC mechanism forms analogous patterns. Radio waves
are used as intermediary when information transmission is about to be processed between these
devices. Nevertheless, there has to be implementations of additional requirements within the
system to make sure that successful connection is established with the rest of the devices as well.
NFC operation also requires utilizing RFID technology for the transfer of information from one
device to the other since RFID technology makes use of the electromagnetic induction process
for communication between data. The RFID technology has a unique advantage associated that
ensures that no external power resources are being utilized since they use their own
electromagnetic field for the purpose. The requirement for transmitting a radio frequency by
NFC is of about 1356 MHz with a speed of about 424 Kb/second or 106212 (Lau, 2015). This a
considerably high speed that can be considered enough to transfer music, pictures and any other
form of contact details. It can be seen that there are three approaches for the operation of Near
Field Communication or NFC that are available. Out of the three available approaches, the most
suitable approach in this regard is the peer to peer mode. To establish a successful mode for
effective exchange of confidential information, the specific modes of the peer to peer mode are
used. At the times where a device receives specific data or information from a sender, it is
regarded as a passive data and when the sender receives information from the device, it is termed

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Network: NFC Technology and System Network Diagram
|6
|1010
|240

Wireless Networking Concepts - Comparative Analysis and Ping Test
|7
|1157
|119

Working Method and Security Considerations of RFID and NFC
|4
|971
|368

Wireless Networking Concepts - Comparative Analysis and Ping Test
|6
|1027
|445

RFID & NFC and Wireless Network Design
|25
|885
|138

Wireless Networking: Comparative Analysis and Configuration
|10
|1409
|156