Advertisement
Guest User

swag

a guest
Jan 18th, 2018
152
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Latex 15.48 KB | None | 0 0
  1. \documentclass[12pt, a4paper]{article}
  2. \usepackage[utf8]{inputenc}
  3. \usepackage{hyperref}
  4. \usepackage{fancyhdr}
  5. \usepackage{graphicx}
  6.  
  7. \renewcommand{\contentsname}{Table of Contents}
  8.  
  9. \hypersetup{
  10.    colorlinks=true,
  11.    linkcolor=black,
  12.    filecolor=magenta,      
  13.    urlcolor=blue,
  14. }
  15.  
  16. \urlstyle{same}
  17.  
  18. \pagestyle{fancy}
  19. \fancyhf{}
  20. \rhead{Örnsköldsvik Gymnasium \\ \today}
  21. \lhead{The Future of Everyday Technology \\ Mattias Nordin}
  22. \cfoot{\thepage}
  23.  
  24. \title{The Future of Everyday Technology}
  25. \author{Mattias Nordin \\\scalebox{0.75}{Tutor: Cecilia Westberg}
  26.        }
  27. \date{\today}
  28.  
  29.  
  30.  
  31. \begin{document}
  32.  
  33. \maketitle
  34.  
  35.  
  36.  
  37.  
  38.  
  39. \newpage
  40.  
  41. \section*{Abstract}
  42.    
  43.    This report is going to explain and discuss the different technologies RFID and NFC, and strives towards educating and informing the reader regarding this subject. The results primary focuses on the pros and use cases of the technology, whilst only briefly remarking the cons. These results also disputes whether to utilize RFID and NFC in the different situations, whilst debating which technology is the most suited for the aforementioned situations.
  44.  
  45. \newpage
  46.  
  47. \tableofcontents
  48.  
  49. \newpage
  50.  
  51. \section{Introduction}
  52.  
  53.    \subsection{Background}
  54.     The world continues to develop many different ways to ease the struggles of our daily lives and %cars are getting more efficient and we got unlimited access to the internet through our "smartphones" which these days seem to live in our trouser pockets.
  55.     this paper is going to inform about "RFID" and "NFC", both of which are different radio frequency protocols. It will explain how the different technologies work and also describe ways to further ease our daily hassles by utilizing it.
  56.  
  57.     \subsection{Aim}
  58.    
  59.    This paper is going to discuss why "RFID" and "NFC" technology is getting more and more relevant, it is also going to investigate in what areas it can be implemented for maximum efficiency. It will compare the two technologies and provide relevant arguments for when it should be implemented, while taking into consideration different factors that might cause variations concerning scenarios with similar circumstances. \\
  60.    This paper is based on the following questions:
  61.    \begin{itemize}
  62.        \item What characterize RFID and NFC?
  63.        \item What are the major differences between the technologies and what are the pros and cons of their differences?
  64.        \item How can these technologies be utilized?
  65.    \end{itemize}
  66.    
  67.    
  68. \section{Method}
  69.    The method that will be used to obtain information for this paper will involve  different articles, blog posts and additional information of value encountered on the Internet. The material has been selected due to their relevance to match the aim of this paper.
  70. \newpage    
  71. \section{Results}
  72.    
  73.    \subsection{What characterize RFID and NFC?}
  74.    \subsection*{Shared characteristics}
  75.    Both of these are technologies that utilize radio frequencies in order to communicate, however the technology requires more than one component in order to actually do something. Those components are a chip and a reader, the chip being the component that holds a small code and the reader being the component which reads the chip. In order to perform a task, one of the components has to be within one centimeter of the other in order to exchange information.
  76.    Some chips are what is described as "active" which means that they have some sort of power source (e.g a battery or hard-lined power delivery), these chips generally have a range vastly superior to passive chips$^{[2]}$. Consequently passive chips rely on the reader to provide the necessary power through induction, which lowers both the cost and maintenance of the chip since it does not require a battery in order to operate.
  77.    
  78.    
  79.    \subsection*{RFID}
  80.    
  81.    RFID is short for Radio Frequency Identification. The origin of the modern "RFID tag" pioneered in 1973 when an active re-writable RFID tag was first patented. This was then quickly followed by another patent, which was acquired by Charles Walton regarding the usage of a passive RFID tag in order to unlock a door$^{[5]}$. This is made possible by the nature of RFID, which is a chip that is connected to a coil which powers the chip through induction when it is close enough to a reader that emits radio waves. A real world example is key-cards that is used to unlock a door, generally used by corporations that require access to their office building. This vast adaptation evolved because it provides the company CEO or security manager to instantly disable a "key" if it were to be misplaced or activate new keys when new workers are enlisted, which is proven to be effective and useful when dealing with a large group of individuals.
  82.     %Passive chips are however  vastly more implemented compared to active chips because of their ease of use,low maintenance and lower cost.
  83.     \\
  84.    
  85.     The major downside with RFID is that it does not support two way communication, which means that it can only be read and not get written on. Requiring the tag be read and thereupon use a register which declares and specifies the properties of the "tagged" item.
  86.  
  87.     \subsection*{NFC}
  88.    
  89.     % allows for two way communication, this means that the "tag" : (given that those features have been written on the tag earlier)
  90.     NFC is more or less the next generation of RFID and short for Near Field Communication, the technology became standardized by Sony, Nokia and Philips in 2004$^{[3]}$. The progression which differentiates NFC from RFID enough to deserve a new name is that it can not only be read but also get written on, one can for example write a tag which puts ones phone in "driver mode" when inside the car$^{[4]}$. Thus only requiring the tag be read in order to instantly declare and specify the properties of the "tagged" item or perform a predetermined task. \\
  91.     % NFC allows the user to both identify and receive information on the smartphone, while RFID only identifies.
  92.    
  93.      These tasks tend to vary, from connecting a mobile phone to the local WIFI in a building or put a business card on display. A tag can trigger ones phone into open websites or set an alarm for the next day and many more things.
  94.    
  95.     \subsection{What are the major differences between the technologies and what are the pros and cons of their differences?}
  96.    
  97.    The main difference between RFID and NFC is that NFC allows for two way communication, whereas RFID can only be read and all it contains is a unique code (an identity)$^{[1]}$. The main pro of RFID is that it is cheaper and can be smaller allowing it to be implemented in situations where size and cost are of utmost importance$^{[5]}$. RFID tends to require more technological knowledge from the user, as the user needs to administrate a register with the information regarding the RFID tags. This means that if the user wants something to get triggered when a specific RFID tag is read, the user needs to manage an application that recognizes the tag and then executes the task at hand. \\
  98.    
  99.     On the contrary, NFC would solely require the user to download pre-existing software in order to write to NFC tags and then add a command to the tag, this so-called "task" would then be saved on the tag to be triggered whenever a reader is nearby. This is a major pro in favour of NFC because it allows a "tag" written by anyone to be read by everyone.  \\
  100.    
  101.     %Stated in layman terms NFC pulls out ahead when the operator wants something to happen when the chip is read, whereas RFID is cheaper and smaller which allows it to be implemented in more products.
  102.    
  103.  
  104.    
  105. \newpage
  106.     \subsection{How can these technologies be utilized?}
  107.    
  108.    \subsubsection*{RFID}
  109.    \begin{enumerate}
  110.    
  111.    
  112.    \item As a key that the administrator or owner of a building can turn on and off, this can be found on for example "Umeå Universitet".
  113.    
  114.    \item To mark inventory in a storage facility or a personal storage room.
  115.    
  116.    \item On clothes in a store as a measurement to prohibit theft.
  117.    
  118.    \item Embedded in casino chips, to prevent cheating and provide the casinos management with information and statistics$^{[6]}$.
  119.    
  120.    \item Tesla Model 3 utilizes an RFID card tag as the car key$^{[7]}$.
  121.    
  122.    \item To optimize the flow in hospital traffic and simplifying the medication management system$^{[6]}$.
  123.    
  124.    \end{enumerate}
  125.    
  126.    \subsubsection*{NFC}
  127.    
  128.    \begin{enumerate}
  129.    
  130.    \item Combination of a payment system and locker keys inside a bathhouse.
  131.    
  132.    \item Contactless payment, Such as "Apple pay", "Android pay" and "Samsung pay"$^{[1]}$.
  133.  
  134.    \item Display a digital business card$^{[4]}$.
  135.    
  136.    \item SJ allows NFC chips to store a train ticket instead of having a physical paper or text ticket$^{[8]}$.
  137.    
  138.    \item Instantly connect a mobile phone to a WIFI network$^{[4]}$.
  139.    
  140.    \item Set an alarm for the next day at a predetermined time$^{[4]}$.
  141.    
  142.    \item Launch a website$^{[4]}$.
  143.    
  144.    \item Unlock a door, similar to RFID$^{[3]}$.
  145.    
  146.    
  147.    
  148.    \end{enumerate}
  149.  
  150. \newpage
  151.  
  152. \section{Discussion}
  153.    
  154.  
  155.    These results describes that both RFID and NFC are technologies that can be used to further simplify the daily hassles we face today, if that is being able to "share" a business card or to use "contactless payments" to pay in a supermarket that is something every individual decides for oneself. It also discusses the diversity of these technologies since it lets every user chose whether or not to utilize RFID or NFC to "solve" a task, consequently allowing the consumer to evaluate if the technologies are safe and logical to adopt. \\
  156.    
  157.    This paper describes how diverse these technologies are and
  158.    gives a few examples on how to utilize this technology today, whilst stating that the technologies possibilities are only limited by the creativity of the individual using it. Consequently allowing this technology to develop and evolve with time, and who knows what the future will hold in store for RFID and NFC.
  159.    
  160.    
  161. \section{Conclusion}
  162.  
  163.    I believe that these technologies are more common than most realize, since many companies utilizes RFID to keep track of inventory. In addition to that stores that sell clothes tend to have tagged their products in order to get notified whenever something gets stolen, or the cards that allow people to commute effortlessly to their workplace every day. \\
  164.    
  165.    When searching information I came across two groups that impedes with not only the technologies recognition, but also its ability to expand. Firstly there are crowds that believes NFC and RFID can be traced and fears that the government or some secret organization tracks them, and the second group being those believing that criminals can steal the information that is located on a tag by just being nearby with a reader and utilize that in order to acquire the tags information whenever the tag is used. \\
  166.    
  167.    Thankfully both of these beliefs are pure paranoia, since the signal that the reader would be acquiring from the tag would get mixed with the signal admitted from the reader that is actually exchanging information with the tag. Also the organization that would be tracking you or if the criminal tries to read your tag directly, it has to be within a couple centimeters of the tag with a tag reader in order to track anything or acquire any information.
  168. \newpage
  169.    I therefore believe it is safe to say that you would notice it if someone stood a centimeter away from you with a reading device trying to read a tag that you wear. What I think these people do is that they mix up tracking with the possibility to register RFID and NFC tags. For example if your dog has an "RFID collar" the dogs location can be registered if the dog were to run away, however this requires that the dog is found and the tag is read. \\
  170.  
  171.    
  172.    This allows me to grasp that an average nontechnical person does not fully realize that how this process functions and believes that the dog can be traced at all times, since they only see the result of someone finding the dog and registering it. Thus only getting the message id est "your dog is currently located at Distriktsveterinärerna Örnsköldsvik", without getting informed about how the dog was located and the process of registering it. I believe that in order to eliminate this misunderstanding the companies who distributes the tags requires to inform the purchaser about the actual attributes of RFID and NFC, moreover the "tracking" service should further clarify the process of locating and registering an animal.\\
  173.    
  174.    No matter if you are technical or nontechnical I believe RFID and NFC are here to stay and become more interlinked with the majority's daily life. Since the use cases keep evolving along other technological discoveries I wholeheartedly believe that the future lies full of different situations in which we utilize RFID or NFC, situations in which we today does not. So I myself is thrilled to see what the future keeps in store regarding our daily lives and hassles, and I look forward to realizing the complete diversity and potential that RFID and NFC offers to solve those hassles.
  175.    
  176. \newpage
  177. \section{List of works cited}
  178.    \begin{enumerate}
  179.    
  180.    \item \textit{Chandler, Nathan} "What's the difference between RFID and NFC?" \\March 7, 2012 (Retrieved December 13, 2017)
  181.    \\
  182.    \url{https://electronics.howstuffworks.com/difference-between-rfid-and-nfc.htm}
  183.    
  184.    
  185.    \item \textit{Kevin Bonsor} \& \textit{Wesley Fenlon}, "How RFID Works", November 5, 2007 (Retrieved December 13, 2017)
  186.    \\
  187.    \url{https://electronics.howstuffworks.com/gadgets/high-tech-gadgets/rfid.htm}
  188.    
  189.    
  190.    \item \textit{Strickland, Jonathan}, "How Near Field Communication Works", \\February 10, 2012 (Retrieved December 13, 2017)
  191.    \\
  192.    \url{https://electronics.howstuffworks.com/near-field-communication.htm}
  193.    
  194.    
  195.    \item \textit{Frew, James} "9 Awesome Ways to Use NFC That'll Impress Your Friends", April 18, 2016 (Retrieved December 13, 2017)
  196.    \\
  197.    \scalebox{0.875}{\url{http://www.makeuseof.com/tag/9-awesome-ways-use-nfc-thatll-impress-friends/}}
  198.    
  199.    
  200.    \item \textit{Roberti, Mark} "The History of RFID Technology", January 15, 2005 (Retrieved December 13, 2017)
  201.    \\
  202.    \url{http://www.rfidjournal.com/articles/view?1338}
  203.    
  204.    
  205.    \item \textit{RFID Arena guest blogger} "7 unexpected and awesome uses of RFID tags", March 4, 2014 (Retrieved December 13, 2017)
  206.    \\
  207.    \url{http://rfidarena.com/2014/3/4/7-unexpected-and-awesome-uses-of-rfid-tags.aspx}
  208.    
  209.    \item \textit{Lambert, Fred} "Tesla Model 3: how the keyless and phone entry works and user manual", September 22, 2017 (Retrieved January 13, 2018)
  210.    \\
  211.    \scalebox{0.875}{\url{https://electrek.co/2017/09/22/tesla-model-3-how-keyless-and-phone-entry-works/}}
  212.    
  213.    \item \textit{Kristensson, Johan} "De fick lägga tågbiljetten under huden", May 17, 2017 (Retrieved January 17, 2018)
  214.    \\
  215.    \scalebox{0.875}{\url{https://www.nyteknik.se/digitalisering/de-fick-lagga-tagbiljetten-under-huden-6849401}}
  216.    
  217.    \end{enumerate}
  218.    
  219. \section{Critical Analysis of Sources}
  220.  
  221.    These sources are trustworthy because of their consistent and uniformed agreement regarding the subject. Albeit the sources individually may not be trustworthy, since they all discuss the same subject whilst confirming one another. Therefore developing into a collection of trustworthy sources.
  222.  
  223. \end{document}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement