Comparative Analysis
NFC is short form of near field communication, whereas RFID stands radio frequency identification. The two use radio signals for all kinds for tracking and tagging purposes. At sometimes bar codes are being replaced.
RFID is one of the technologies named as Automatic Identification and Data Capture. This technologies identifies objects, they collect data about the objects, and enters the data directly into the computing environment automatically with very minimal human intervention.
The RFID techniques uses radio waves to achieve this goal. The RFID enabled devices have three main components namely: RFID reader, antenna and smart label. The antenna and smart reader and label are used to relay data to the RFID reader. The smart reader then changes radio waves to more usable kind of information. The data collected from smart label is relayed through communications interface to a host server database computer systems (Ahson & Ilyas, 2017 ).
NFC enables communication within a short range as the name implies. The communicating devices must be compatible. They therefore need a transmitting device and a recipient device that receives the signals.
NFC devices can either termed as Passive or Active devices depending on whether the devices can relay information to other devices without need of power of their own. On other hand, active devices are capable of sending and receiving information. Additionally, they can communicate to each other passive devices inclusive.
The NCF works on the principle that information can be send over radio waves. It is another standard of standard of data communication. This translates that communicating devices have to strictly adhere to certain principles for them to communicate. Technology used here is a child brain of old RFID. Older RFID used electromagnetic induction waves to communicate with their peers (Sabella, 2016).
RFID/NFC tags and transceivers use bidirectional security structure that enables highest mode of security in a contactless communication manner. The RFID tags are integrated with IC which has SHA-256 secure authenticator that bases on the FIPD 180-4 standard. Once it is paired with the NFC tag IC, bidirectional security model implements 2-way authentication. Every NFC transponder consists of exceptional 64-bit Read Only Memory ID that serves as the electronic unique number within the application (Kitsos, 2016 ).
Wireless have grown everywhere, you can find hotspots in almost every public places. In this task we will use Packet tracer tool to create a wireless topology on packet tracer. We will assume our IP address as 10.10.10.1 and 10.10.10.2.
Before authentication
Setting the SSID and Passphrase on Access Points.
Setting the SSID and Passphrase on Laptops
Setting the static on Laptops
After authentication
- only laptops in the same WLAN with the same SSID and passphrase communicating
Packet Tracer PC Command Line 1.0
C:>ping 10.0.0.2
Pinging 10.0.0.2 with 32 bytes of data:
Reply from 10.0.0.2: bytes=32 time=69ms TTL=128
Reply from 10.0.0.2: bytes=32 time=22ms TTL=128
Reply from 10.0.0.2: bytes=32 time=18ms TTL=128
Reply from 10.0.0.2: bytes=32 time=23ms TTL=128
Ping statistics for 10.0.0.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 18ms, Maximum = 69ms, Average = 33ms
Working of RFID
C:>
C:>ping 10.0.0.3
Pinging 10.0.0.3 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 10.0.0.3:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
C:>ping 10.0.0.4
Pinging 10.0.0.4 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 10.0.0.4:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
C:>
It is easy to communicate with connected computers, let’s say, Laptop 0, which sends a ping ECHO message to laptop 1. The MAC address of Laptop 0 is send with the IP address of Laptop 1. However, it should be noted that MAC address does not go beyond a routing device. In this case, the MAC address of router interface that connects to the remote network is used. A broadcast storm is sent out shouting that “could this be you?” Once the laptop 1 recognizes its address it accepts the message.
- Screenshots for changing the channel of Access points
When a channel is changed, there is no change of events between the access point and the client laptop.
- A paraphrase mismatch leads to disconnection between client laptop and access points devices.
Statement of the problem
Resource reservation and utilization is one of the 21st century objectives. No one of us would want to waste electricity and water. In addition, who on earth would want to get tired because of too manual work? Of course no one. Is it so?
In the 21st century, with smartest and fastest growing technology, chores or duties that were performed manually can be done in a smarter way with IoT around.
In our Smart Home Project, we will be developing a solution to an event whereby when I am at the place of work, I should be in a position to monitor and control my home by use of a browser on my smartphone or computer (Kyas, 2017).
To implement this project the following tabulated list of items will be required
Item Name |
Quantity |
Justification |
Registration server |
1 |
Registration server will be stored in cloud. All the events recorded from smart devices will be accessed from the registration sever. It is good to mention that all control and monitoring will be done from the registration server. |
Cable modem |
1 |
Cable modem will be used to bring the internet to our smart home |
DLC Home Gateway (Digital Logic Controller) |
1 |
The DLC will be integrated with home smart devices enabling their control. |
Home appliances |
NA |
Our home appliances are the devices to be controlled by the smart technology. They include water sprinkler, motion sensor, carbon II oxide detector, and wind detector, temperature monitor, ceiling fan, smart windows and door. |
(O’Driscoll, 2014)
The term wireless connection denotes to the art of transmission of data or communication over a distance without the need of cables, wires nor electrical conductors. Wireless technology has been one of the most important medium of information transfer. The communication is scheduled and transmission takes place through radio frequencies, satellite infrared etc.
In our implementation of smart home, we will use satellite wireless communication technology.
Satellite communication is an example of wireless technologies. This kind of wireless technologies is widely spread making users to remain connected anywhere on the earth’s surface.
The satellite operates by communicating directly to orbiting satellites through radio signals. Our smart home employ use of cable modem cable modem is an example of use of satellite technologies (Richharia, 2017 ).
References
Ahson, S. A., & Ilyas, . (2017 ). RFID Handbook: Applications, Technology, Security, and Privacy. Boca Raton: CRC Press.
Kitsos, P. (2016 ). Security in RFID and Sensor Networks. Boca Raton: CRC Press .
Kyas, O. ( 2017). How To Smart Home: A Step by Step Guide for Smart Homes & Building Automation. Hoboken: Key Concept Press.
O’Driscoll, G. (2014). anage Your Smart Home With An App!: Learn Step-by-Step How to Control Your . HomeMentors.com.
Richharia, M. (2017 ). Satellite Communication Systems: Design Principles. Macmillan International Higher Education. .
Sabella, R. R. (2016). NFC For Dummies. Hoboken: John Wiley & Sons.