Wireless Network Design, RFID and NFC Technologies: A Detailed Report

Verified

Added on  2023/06/04

|25
|885
|138
Report
AI Summary
This report provides an overview of RFID (Radio Frequency Identification) and NFC (Near Field Communication) technologies, detailing their functionalities, applications, and challenges. It compares and contrasts the two technologies, highlighting their operational differences, security aspects, and potential vulnerabilities. The report also delves into wireless network design, including IP configuration of multiple laptops, security implementations on access points, and client-side verification processes. Furthermore, it presents the results of ping tests, channel configurations, and mismatch tests to assess network performance and identify potential issues. The report concludes with a comprehensive analysis of the practical aspects of wireless network setup and the application of RFID and NFC technologies in real-world scenarios, supported by relevant figures and references.
Document Page
1. RFID & NFC:
RFID: RFID stands for Radio frequency identification which is used to read or capture stored
information. RFID comprised with a tag and an antenna. Simply is has the capability to identify
radio waves. The NC is also a branch of RFID which operates at the same frequency as RFID.
Both process operates at 13.56 MHZ. NFC is considered as a secure way for data exchange as it
is capable of working as both NFC tag and NFC reader (Mar-Ortiz, Gonzalez & Adenso-Díaz,
2017). This unique capability enable peer to peer communication. RFID is basically associated
with Automatic identification and Data capture. The AIDC methods are used to identify and
collect information and directly transport into systems. RFID tags are utilized transmit data to
RFID reader (Köstinger et al., 2013. Then the RFID reader converts the radio waves to usable
form. Information collected from the tags is then transferred through a communications interface
to a host computer system, where the data can be stored in a database and analyzed at a later
time.
Challenges:
RFID system also faced several challenges which are followed:
RFID tags with unique serial numbers could be linked to an individual credit card
number.
RFID tags can be read a greater distances with a high-gain antenna
RFID tags can be read without your knowledge
RFID tags are difficult to remove
RFID tags are difficult to remove
The contents of an RFID tag can be read after the item leaves the supply chain
RFID Reader Collision
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NFC: On the other hand, NFC stands for near field Communication. As the name implies it is
capable of communicate over a short range with compatible devices. Generally one transmitting
device and another to receive the signal (Köstinger et al., 2013. It works by transferring
information over radio waves. To determine what sort of information will be exchanged between
devices, the NFC standard currently has three distinct modes of operation. Perhaps the most
common use in smartphones is the peer-to-peer mode (Urien & Piramuthu, 2014). This allows
two NFC-enabled devices to exchange various pieces of information between each other. In this
mode both devices switch between active when sending data and passive when receiving.
Challenges:
NFC compatible devices can only communicate when they are within four centimeters of
each other.
NFC tags do not power themselves. Instead, they rely on power from the smartphone or
other device interacting with them.
The first smartphone virus, a Trojan, was detected in October 2010 and several more
have appeared since.
2. Wireless network Design
Document Page
Fifure1: Wireless Network
IP Configuration:
Figure 2: Configuration of laptop 1
Document Page
Figure 3: Configuration of laptop 2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 4: Configuration of laptop 3
Document Page
Figure 5: Configuration of laptop 4
Document Page
Security implementatation:
Figure 6: Security implementation on the Access point 1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 7: Security implementation on the Access point 2
Document Page
Connecting devices:
Figure 8: Client side verification on laptop 1
Document Page
Figure 9: Client side verification on laptop 2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 10: Client side verification on laptop 3
Document Page
Figure 11: Client side verification on laptop 4
a) Ping
chevron_up_icon
1 out of 25
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]