Performance Evaluation of Multiple Access Techniques in NFC Systems

Verified

Added on  2022/09/07

|6
|1326
|18
Report
AI Summary
This report provides an in-depth analysis of multiple access techniques within Near Field Communication (NFC) systems. It explores various methods, including FDMA, TDMA, CDMA, and OFDMA, and their applications in mobile interactions using NFC tags as a user interface. The study examines the evolution of these techniques, starting from early RFID applications to more complex scenarios involving interactive NFC panels and dynamic application UIs. The report investigates key research questions related to NFC technology, security vulnerabilities, authorization protocols, and usability. The methodology includes literature review from sources like the school library, Google Scholar, and Research Gate. The report also outlines key milestones and deliverables, such as the comparative analysis of access schemes and techniques for mobile interactions, and includes a detailed bibliography of related works.
Document Page
1
Performance evaluation of multiple access techniques in NFC system
Student’s Name
Course
Professor’s Name
University
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
Abstract
NFC scheme is a mobile technological framework , often known as a touch-based
interface with marked items that can be utilized as physical UI. The multiple access techniques
uses the grid of NFC-tags as a User interface and integrate them with an expected application UI
to allow proper interaction between mobile systems and big screens .
Introduction
we shall examine the interaction designs of the multiple access methods for NFC-
systems above the public touch-select interface with singular identifiers and assess them using
NFC pinboard framework . An analysis of the user might confirm the overall preference for
simple-touch select , but correspondingly demonstrates that other methods can be used as
substitutes such as implementing interactions from which all the users want to feel they are in
control. It is important to note that there are four key multiple access techniques that can be
utilized in cellular systems ranging from the analogue cellular frameworks to the cellular
technologies that are being tested for future use . The Multiple access techniques are known as
FDMA,TDMA,CDMA and OFDMA
Related work
Interaction between the Multiple interaction techniques with NFC have significantly
evolved since 1999, when developers tagged day-to-day items with RFID identifiers to connect
them with electronic documentations or email contacts . Since them these schemes have been
used increasingly among various mobile applications such as ticketing , access regulator , home
maintenance or entertainment among others . In Baldauf, Fröhlich, & Reichl, (2010) research .
the multiple access schemes are utilized in tagging various objects in an effort to classify them or
Document Page
3
link them with other digital items that would in turn facilitate the interaction with them . While it
is understood that most application use simple schemes to facilitate interaction with single NFC
tags , others such as FDMA and CDMA can be utilized using NFC-identifiers while others
follow multi-tag method to enable interaction . This makes it much easier to record features to
multiple identifiers on various objects , thus changing them into physical User interfaces that
extend mobile UIs. Some of the key instances include posters that include of various tags that
would allow users to invoke web facilities for mobile ticketing .
Broll, Reithmeier, Holleis, & Wagner, (2010) utilizes a ticketed panel to help him run
multimedia player whose schemes have been recorded to FDMA . Broll, et .al., (2011) used
TDMA on the back of their devices in order to have ease while interacting with points-of-
interests. In the subsequent stage , physical user interfaces include a grid of NFC identifiers that
would offer totally interactive surface for manipulating dynamic application UI’s. Contrary to
static poster , these schemes are not used as references to specific items information such as POIs
on a map application , but merely show their location in the grid. In that way , it is easy to map
the tags to the UI frameworks of various applications. Ruan , et .al., (2010 ) have developed and
refined dynamic OFDMA elements of various applications and project them onto the interactive
surface. In addition to that they have integrated to the NFC grid and a set of projected application
User interfaces in an effort to develop an interactive NFC panel.
Key Aims of the project
The main objective of this paper is to research about the various interface scheme for
NFC display outside the regular touch-select interface with singular tags .The simple aspect of
the single tag interaction is a huge advantage for mobile interactions with NFC. This research
will begin with a clear description of the Multiple access techniques since NFC was developed
Document Page
4
based on that and then the report will go ahead to cover the overall understanding about the NFC
technology .The paper will begin with the introduction of NFC and proceed in describing the
communication technology with the Multiple access schemes together with the digital
modulation and interfaces. During the research , the NFC standard will be discussed in relation
to the various access schemes .
Key Research Questions
The key questions for this research will be based on the interaction between the NFC and the
multiple access techniques .
1. What is NFC and how can it be utilized in mobile phones ? it is important to understand
the NFC technology and the standards ought to be studied.
2. Which types of vulnerabilities can be found with the interaction between the multiple
access schemes and NFC ? Thus, it is important to investigate security in NFC.
3. Which authorization protocols are used in the interaction between the NFC and the
Multiple access schemes ? A good authorization protocol allows authentication and
should safeguard against the key vulnerabilities .
4. How usable are these interactions ? In is necessary to reflect on the usability of the
designed frameworks as it is the key motivation of using NFC in any mobile phone . In
addition , it would be necessary to reflect upon the security related to the subject .
Research Methodology
Since NFC systems are a fascinating and educative area in technology and development.
Therefore, it would be necessary to look into it based on information that links NFC to the
multiple access schemes .While researching the school library, Google Scholar, and Research
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
gate, there is a wide range of documents that will prove valuable for the research. My submission
of the proposal was an eye-opener since the suggestions I received from the instructor made me
dig deeper with more refined searches for content. Getting access to the primary sources is still a
major challenge but I have gathered materials with translated ancient texts and valid documents
with deciphered information of the technological texts used in NFC systems .
The key milestones and deliverable for this project
1. Obtaining the various design schemes and their interaction with the NFC.
2. Comparative analysis of the various access schemes .
3. Techniques for mobile interactions with NFC systems
A higher-level timeline which include fundamental tasks and deadlines for this project
are the actual buildouts between the NFC system and the Multiple access schemes . If the tasks
are not carried out on time , it will consume a lot of time for further and deeper analysis of these
interactions . In addition, if the tasks are delayed the testing of the schemes will also be affected.
Document Page
6
Bibliography
Baldauf, M., Fröhlich, P., & Reichl, P. (2010). Touching the untouchables: Vision-based real-
time interaction with public displays through mobile touchscreen devices. Adj. Proc.
Pervasive.
Broll, G., Reithmeier, W., Holleis, P., & Wagner, M. (2010, January). Design and evaluation of
techniques for mobile interaction with dynamic NFC-displays. In Proceedings of the fifth
international conference on Tangible, embedded, and embodied interaction (pp. 205-
212).
Broll, G., Graebsch, R., Scherr, M., Boring, S., Holleis, P., & Wagner, M. (2011, February).
Touch to Play--Exploring Touch-Based Mobile Interaction with Public Displays. In 2011
Third International Workshop on Near Field Communication (pp. 15-20). IEEE.
Ruan, H., Qian, Y., Zhang, Y., & Zhou, M. (2010, October). Touchinteract: An interaction
technique with large displays using touchscreen-phone. In 2010 7th International
Conference on Ubiquitous Intelligence & Computing and 7th International Conference
on Autonomic & Trusted Computing (pp. 262-265). IEEE.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]