Docstoc

TableOf Contents

Document Sample
TableOf Contents Powered By Docstoc
					S.NO.                                        CONTENTS                       PAGE NO.

     1   Acknowledgement                                                       I
     2   Candidate Declaration                                                 II
     3   Table of Contents                                                    III
     4   List of Tables                                                       IV
     5   List of Figures                                                      IV
     6   Abstract                                                              V
     7   Chapter 1    Introduction
                           1.1   Introduction to Near Field Communication      1
                           1.2   Applications of NFC                           1
                           1.3   Technology Focus                              3
                           1.4   Modes of Communication                        4
                           1.5   Terminology                                   5
                           1.6   Essential specifications                      5
                           1.7   Comparison with Existing Technologies         7
     8   Chapter 2    Standards and compatibility
                           2.1   Standards                                     9
                           2.2   GSMA                                         10
                           2.3   Stolpan                                      11
                           2.4   NFC Forum                                    11
                           2.5   Alternative Form Factors                     11
                           2.6   Other Standardization Bodies                 12
     9   Chapter 3    Technology overview
                           3.1   Communication Modes: Active and Passive      13
                           3.2   Coding and Modulation                        14

                                 3.2.1     Manchester Code                    14

                                 3.2.2     Modified Miller Code               15

                      3.3        Initiator and Target                         15

                      3.4        Collision Avoidance                          16

                      3.5        General Protocol flow                        16

10       Chapter 4    Comparison with other technologies                      18

                                                [ III ]
                  4.1     NFC and RFID                             18
                  4.2     Comparison with Bluetooth and Infrared   18
11   Chapter 5    Security aspects                                 20
                  5.1     Eavesdropping                            20
                  5.2     Data Destruction                         22
                  5.3     Data Modification                        22
                  5.4     Data Insertion                           24
                  5.5     Man-in-the-Middle-Attack                 24
12   Conclusion                                                    25
13   References                                                    26




                                      [ IV ]

				
DOCUMENT INFO
Shared By:
Tags:
Stats:
views:14
posted:4/2/2012
language:
pages:2