SlideShare a Scribd company logo
1 of 24
FUNDAMENTALS OF
M-COMMERCE
 RFID
 WiMAX
 SMS
 SECURITY ISSUES IN MOBILE
COMPUTING
BY:
Theiva Sena.R(21BCC556)
1.RFID
• Radio Frequency Identification
• It uses radio waves to passively identify a tagged object
• several commercial and industrial applications, from
tracking items along a supply chain to keeping track of items
checked out of a library.
• Developed in 1970’s but it is being very active in recent times
because of the advanced technology
• The two basic elements of RFID are : Reader and tag
RFID TAGS
• RFID tags is used for automatically identifying a person, a package or an item.
• It can be incorporated into a product, animal, or person for the purpose of identification
• and tracking using radio waves.
• The three basic elements of RFID Tags are:-
1) Antenna:
the purpose of the antenna in an RFID tag is to communicate with the RFID reader.
2) Microchip:
it acts as a storage of RFID tag. It keeps the record of data or identification number.
3) Battery:
some tags contain a battery to power the microchip required for reading/writing
functionalities.
• work by using a microchip and an antenna to receive and transmit information in simple it is an Integrated Circuit(IC)
1)UHF or Ultra-High Frequency tags –
300 MHz to 3GHz
2) HF or High Frequency tags – 3 to 30
MHz
3) LF or Low Frequency tags – 30 KHz
to 300 KHz
RFID TAGS
ACTIVE RFID TAG
SEMI-PASSIVE RFID
TAG PASSIVE RFID TAG
TRANSPONDERS BEACONS HARD TAGS INLAYS
Active RFID Tag
It is also known as batter-operated because it uses an onboard
battery as their power supply
 It transmits information either 915MHz or 433MHz
 It is used to track location
TRANSPONDERS – reader is required to transmit data and it can be
used in aircraft location , access control system
 BEACONS – An information ping in every seconds is what beacons
send out and it can be used in oil and gas industry , cargo tracking etc
Semi-Passive RFID Tag
 It is also known as Batter assisted tag(BAT)
The power supply inside it provides powers only to the part that
holds the data
It first uses backscatter to communicate with the reader and does not
have signal transmitter inside
The range is very shorter and it has improved accuracy, flexibility and
ease of use
It is convenient for laboratory staff
Passive RFID Tag
 Frequency that is used can affect the range of the tag
 Readers scans the passive RFID tag and the energy will be
transmitted
Antenna and the chip gets the information that is relayed back to the
reader
 Reader transmitted back to RFID computer program
 HARD TAGS – They are made out of hard & durable metal or plastic
and used mainly in jail , prison for checking the presence of people
INLAYS – It is thin and can come in the form of stickers that can be
placed in products.
CHARACTERISTICS ACTIVE RFID TAG SEMI-PASSIVE RFID TAG PASSIVE RFID TAG
Battery Yes Yes No
Active transmitter Yes No No
Range 300-750 feet
100 feet
20 feet
Radio interference Yes No No
Storage space High capacity Larger than passive tags Limited
Life span 2-7 years 2-7 years 20 years
Size, weight Highly Expensive Expensive Cheap
Applications of RFID
• Medical Application
• Libraries
• Highway toll collection
• Automatic identification and anti-theft vehicles
• Animal tracking
2.WiMAX
• Worldwide Interoperability for Microwave Access
• It is a communication technology for wirelessly delivering high-speed
Internet service to large geographical asset
• WiMAX operates over radio waves on tower-received model
• A single WiMAX tower can provide coverage over about 8,000 square
km
• It also connect to other towers via a line-of-sight microwave link to
broaden coverage further.
• It is a formed to promote and certify compatibility and
interoperability of broadband wireless
• It is created for Metropolitan Area Networks(MAN).
D/B Wi-Fi and WiMAX
• Wi-Fi doesn’t cover over larger distance but WiMAX covers far
distance
• Wi-Fi covers radius of several hundred feet, a fixed WiMAX
station can cover a range of up to 30 miles.
• Wi-Fi can be set in home networks and coffee shops, it is
impractical for larger areas but WiMAX can cover over several
miles with a single station.
• WiMAX is also known by its technical name, "IEEE 802.16,"
which is similar to Wi-Fi's technical specification of 802.11.
• We cant replace WiMAX with Wi-Fi but we can use it along with
Wi-Fi
IEEE 802.16
• The 802.16a standard for 2-11 GHz is a wireless metropolitan
area network (MAN) technology that will provide broadband
wireless connectivity to Fixed, Portable and Nomadic devices.
• It can be used to connect 802.11 hot spots to the Internet,
provide campus connectivity, and provide a wireless alternative
to cable and DSL for last mile broadband access.
3.SMS
SMS, which stands for Short Message Service, is the text messaging service on
most mobile phones and other mobile devices.
SMS is based on standardized communication protocols to send text messages
from device to device.
SMS is ideal for sending short, text-only messages and up to 160 characters
 MMS (Multimedia Messaging Service) is the most common alternative to SMS
and in MMS we can send images, audio and videos
On December 3, 1992, the first SMS text message in history is sent: Neil
Papworth, a 22-year-old engineer, uses a personal computer to send the text
message “Merry Christmas” via the Vodafone network to the phone of a
colleague.
SMS Marketing
• Short-term promotions for retail or ecommerce businesses
• Urgent updates about events or customer orders
• Appointment reminders
• Internal alerts
• E-Commerce stores
• Travel agencies
Mobile Computing
 Mobile Computing is the technology used for transmitting voice and data
through small, portable devices using wireless enabled networks.
 Examples are Online delivery systems associated with credit card verification.
The three main components of mobile computing are :-
1) Mobile Hardware
2) Mobile Software
3) Mobile Communication
Safety measures in Mobile Computing
• Use strong passwords/biometrics
• Ensure public or free Wi-Fi is protected
• Utilize VPN(Virtual private network)
• Encrypt your device
• Install an Antivirus application
• Update to the latest software
RFID

More Related Content

What's hot

Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identificationbansarirajani
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technologysweta dargad
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
RFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDRFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDEcoTrackSystemsETSRF
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) Chetan Pandey
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th semAmit Ranjan
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Hari
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and ApplicationsAnal Mandal
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)Amber Bhaumik
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutionsashtopustech
 
Automation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDAutomation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDSudher Sun
 
RFID Technology - Electronics and Communication Seminar Topic
RFID Technology - Electronics and Communication Seminar TopicRFID Technology - Electronics and Communication Seminar Topic
RFID Technology - Electronics and Communication Seminar TopicHimanshiSingh71
 
Warehouse management and operations rfid
Warehouse management and operations rfidWarehouse management and operations rfid
Warehouse management and operations rfidSopagna Chan
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenariosDavide Del Monte
 

What's hot (20)

Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDRFID Library Automation - ETS RFID
RFID Library Automation - ETS RFID
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
Automation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDAutomation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFID
 
RFID Technology - Electronics and Communication Seminar Topic
RFID Technology - Electronics and Communication Seminar TopicRFID Technology - Electronics and Communication Seminar Topic
RFID Technology - Electronics and Communication Seminar Topic
 
Warehouse management and operations rfid
Warehouse management and operations rfidWarehouse management and operations rfid
Warehouse management and operations rfid
 
RFID
RFID RFID
RFID
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 

Similar to RFID

Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologiesChandrakant Choure
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
 
Wirless Parsonal Area Networks.ppt
Wirless Parsonal Area Networks.pptWirless Parsonal Area Networks.ppt
Wirless Parsonal Area Networks.pptMunazza63
 
A Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID SensorsA Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID SensorsEditor IJMTER
 
4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh4g technology Ganesh Deshmukh
4g technology Ganesh DeshmukhGanesh Deshmukh
 
2g,3g,4g technology
2g,3g,4g technology2g,3g,4g technology
2g,3g,4g technologyTauseef khan
 
4g technology
4g technology4g technology
4g technologyMano27
 
Radio Frequencies for IoT
Radio Frequencies for IoTRadio Frequencies for IoT
Radio Frequencies for IoTJordan Eller
 
Seminar on 4 g wireless system
Seminar on 4 g wireless systemSeminar on 4 g wireless system
Seminar on 4 g wireless systemKedar Damkondwar
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologiesFabMinds
 
4 g communication systems
4 g communication systems4 g communication systems
4 g communication systemsAkash R
 
Presentation on Wireless devices
Presentation on Wireless devicesPresentation on Wireless devices
Presentation on Wireless devicesUnhappy Verse
 
What are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfWhat are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfAntenna Manufacturer Coco
 
Networking Technologies in IOT.pdf
Networking Technologies in IOT.pdfNetworking Technologies in IOT.pdf
Networking Technologies in IOT.pdfVandanaPagar1
 

Similar to RFID (20)

Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
 
Ch4
Ch4Ch4
Ch4
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
ZKK Sdn Bhd
ZKK Sdn BhdZKK Sdn Bhd
ZKK Sdn Bhd
 
Wirless Parsonal Area Networks.ppt
Wirless Parsonal Area Networks.pptWirless Parsonal Area Networks.ppt
Wirless Parsonal Area Networks.ppt
 
A Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID SensorsA Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID Sensors
 
4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh
 
4g technology
4g technology4g technology
4g technology
 
2g,3g,4g technology
2g,3g,4g technology2g,3g,4g technology
2g,3g,4g technology
 
4g technology
4g technology4g technology
4g technology
 
Radio Frequencies for IoT
Radio Frequencies for IoTRadio Frequencies for IoT
Radio Frequencies for IoT
 
Seminar on 4 g wireless system
Seminar on 4 g wireless systemSeminar on 4 g wireless system
Seminar on 4 g wireless system
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
ch3.pptx
ch3.pptxch3.pptx
ch3.pptx
 
4G Technology
4G Technology4G Technology
4G Technology
 
4 g communication systems
4 g communication systems4 g communication systems
4 g communication systems
 
Presentation on Wireless devices
Presentation on Wireless devicesPresentation on Wireless devices
Presentation on Wireless devices
 
1.pptx
1.pptx1.pptx
1.pptx
 
What are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfWhat are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdf
 
Networking Technologies in IOT.pdf
Networking Technologies in IOT.pdfNetworking Technologies in IOT.pdf
Networking Technologies in IOT.pdf
 

More from RajaKrishnan M

Shortcomings of Demat Account
Shortcomings of Demat AccountShortcomings of Demat Account
Shortcomings of Demat AccountRajaKrishnan M
 
Demat Account Services
Demat Account ServicesDemat Account Services
Demat Account ServicesRajaKrishnan M
 
Depository Participant
Depository ParticipantDepository Participant
Depository ParticipantRajaKrishnan M
 
Services provided in Mobile Banking
Services provided in Mobile BankingServices provided in Mobile Banking
Services provided in Mobile BankingRajaKrishnan M
 
Factors affecting share price
Factors affecting share priceFactors affecting share price
Factors affecting share priceRajaKrishnan M
 
Loss of Confidence of small investors
Loss of Confidence of small investorsLoss of Confidence of small investors
Loss of Confidence of small investorsRajaKrishnan M
 
Technological forces fueling e-commerce
Technological forces fueling e-commerceTechnological forces fueling e-commerce
Technological forces fueling e-commerceRajaKrishnan M
 
Encryption and Decryption
Encryption and DecryptionEncryption and Decryption
Encryption and DecryptionRajaKrishnan M
 
Meaning, Anatomy and Forces Fueling e-commerce
Meaning, Anatomy and Forces Fueling e-commerceMeaning, Anatomy and Forces Fueling e-commerce
Meaning, Anatomy and Forces Fueling e-commerceRajaKrishnan M
 
Forces Fueling e-commerce
Forces Fueling e-commerceForces Fueling e-commerce
Forces Fueling e-commerceRajaKrishnan M
 
Inter Organizational e-commerce
Inter Organizational e-commerceInter Organizational e-commerce
Inter Organizational e-commerceRajaKrishnan M
 
Factors for the success of m-commerce
Factors for the success of m-commerceFactors for the success of m-commerce
Factors for the success of m-commerceRajaKrishnan M
 
Advantages of E-Commerce
Advantages of E-CommerceAdvantages of E-Commerce
Advantages of E-CommerceRajaKrishnan M
 
E-Commerce and E- Businesss
E-Commerce and E- BusinesssE-Commerce and E- Businesss
E-Commerce and E- BusinesssRajaKrishnan M
 
Electronic Data Interchange & Internet
Electronic Data Interchange & InternetElectronic Data Interchange & Internet
Electronic Data Interchange & InternetRajaKrishnan M
 
Performance of contract
Performance of contract Performance of contract
Performance of contract RajaKrishnan M
 

More from RajaKrishnan M (20)

Shortcomings of Demat Account
Shortcomings of Demat AccountShortcomings of Demat Account
Shortcomings of Demat Account
 
Demat Account Services
Demat Account ServicesDemat Account Services
Demat Account Services
 
Depository Participant
Depository ParticipantDepository Participant
Depository Participant
 
Services provided in Mobile Banking
Services provided in Mobile BankingServices provided in Mobile Banking
Services provided in Mobile Banking
 
Ombudsman scheme
Ombudsman scheme Ombudsman scheme
Ombudsman scheme
 
Factors affecting share price
Factors affecting share priceFactors affecting share price
Factors affecting share price
 
Rights of investors
Rights of investorsRights of investors
Rights of investors
 
Loss of Confidence of small investors
Loss of Confidence of small investorsLoss of Confidence of small investors
Loss of Confidence of small investors
 
Facilities by BSE
Facilities by BSEFacilities by BSE
Facilities by BSE
 
Technological forces fueling e-commerce
Technological forces fueling e-commerceTechnological forces fueling e-commerce
Technological forces fueling e-commerce
 
Encryption and Decryption
Encryption and DecryptionEncryption and Decryption
Encryption and Decryption
 
Meaning, Anatomy and Forces Fueling e-commerce
Meaning, Anatomy and Forces Fueling e-commerceMeaning, Anatomy and Forces Fueling e-commerce
Meaning, Anatomy and Forces Fueling e-commerce
 
Forces Fueling e-commerce
Forces Fueling e-commerceForces Fueling e-commerce
Forces Fueling e-commerce
 
Inter Organizational e-commerce
Inter Organizational e-commerceInter Organizational e-commerce
Inter Organizational e-commerce
 
Factors for the success of m-commerce
Factors for the success of m-commerceFactors for the success of m-commerce
Factors for the success of m-commerce
 
Advantages of E-Commerce
Advantages of E-CommerceAdvantages of E-Commerce
Advantages of E-Commerce
 
Types of E-Commerce
Types of E-CommerceTypes of E-Commerce
Types of E-Commerce
 
E-Commerce and E- Businesss
E-Commerce and E- BusinesssE-Commerce and E- Businesss
E-Commerce and E- Businesss
 
Electronic Data Interchange & Internet
Electronic Data Interchange & InternetElectronic Data Interchange & Internet
Electronic Data Interchange & Internet
 
Performance of contract
Performance of contract Performance of contract
Performance of contract
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

RFID

  • 1. FUNDAMENTALS OF M-COMMERCE  RFID  WiMAX  SMS  SECURITY ISSUES IN MOBILE COMPUTING BY: Theiva Sena.R(21BCC556)
  • 2. 1.RFID • Radio Frequency Identification • It uses radio waves to passively identify a tagged object • several commercial and industrial applications, from tracking items along a supply chain to keeping track of items checked out of a library. • Developed in 1970’s but it is being very active in recent times because of the advanced technology • The two basic elements of RFID are : Reader and tag
  • 3. RFID TAGS • RFID tags is used for automatically identifying a person, a package or an item. • It can be incorporated into a product, animal, or person for the purpose of identification • and tracking using radio waves. • The three basic elements of RFID Tags are:- 1) Antenna: the purpose of the antenna in an RFID tag is to communicate with the RFID reader. 2) Microchip: it acts as a storage of RFID tag. It keeps the record of data or identification number. 3) Battery: some tags contain a battery to power the microchip required for reading/writing functionalities. • work by using a microchip and an antenna to receive and transmit information in simple it is an Integrated Circuit(IC)
  • 4.
  • 5. 1)UHF or Ultra-High Frequency tags – 300 MHz to 3GHz 2) HF or High Frequency tags – 3 to 30 MHz 3) LF or Low Frequency tags – 30 KHz to 300 KHz RFID TAGS ACTIVE RFID TAG SEMI-PASSIVE RFID TAG PASSIVE RFID TAG TRANSPONDERS BEACONS HARD TAGS INLAYS
  • 6. Active RFID Tag It is also known as batter-operated because it uses an onboard battery as their power supply  It transmits information either 915MHz or 433MHz  It is used to track location TRANSPONDERS – reader is required to transmit data and it can be used in aircraft location , access control system  BEACONS – An information ping in every seconds is what beacons send out and it can be used in oil and gas industry , cargo tracking etc
  • 7. Semi-Passive RFID Tag  It is also known as Batter assisted tag(BAT) The power supply inside it provides powers only to the part that holds the data It first uses backscatter to communicate with the reader and does not have signal transmitter inside The range is very shorter and it has improved accuracy, flexibility and ease of use It is convenient for laboratory staff
  • 8. Passive RFID Tag  Frequency that is used can affect the range of the tag  Readers scans the passive RFID tag and the energy will be transmitted Antenna and the chip gets the information that is relayed back to the reader  Reader transmitted back to RFID computer program  HARD TAGS – They are made out of hard & durable metal or plastic and used mainly in jail , prison for checking the presence of people INLAYS – It is thin and can come in the form of stickers that can be placed in products.
  • 9. CHARACTERISTICS ACTIVE RFID TAG SEMI-PASSIVE RFID TAG PASSIVE RFID TAG Battery Yes Yes No Active transmitter Yes No No Range 300-750 feet 100 feet 20 feet Radio interference Yes No No Storage space High capacity Larger than passive tags Limited Life span 2-7 years 2-7 years 20 years Size, weight Highly Expensive Expensive Cheap
  • 10. Applications of RFID • Medical Application • Libraries • Highway toll collection • Automatic identification and anti-theft vehicles • Animal tracking
  • 11.
  • 12.
  • 13. 2.WiMAX • Worldwide Interoperability for Microwave Access • It is a communication technology for wirelessly delivering high-speed Internet service to large geographical asset • WiMAX operates over radio waves on tower-received model • A single WiMAX tower can provide coverage over about 8,000 square km • It also connect to other towers via a line-of-sight microwave link to broaden coverage further. • It is a formed to promote and certify compatibility and interoperability of broadband wireless • It is created for Metropolitan Area Networks(MAN).
  • 14. D/B Wi-Fi and WiMAX • Wi-Fi doesn’t cover over larger distance but WiMAX covers far distance • Wi-Fi covers radius of several hundred feet, a fixed WiMAX station can cover a range of up to 30 miles. • Wi-Fi can be set in home networks and coffee shops, it is impractical for larger areas but WiMAX can cover over several miles with a single station. • WiMAX is also known by its technical name, "IEEE 802.16," which is similar to Wi-Fi's technical specification of 802.11. • We cant replace WiMAX with Wi-Fi but we can use it along with Wi-Fi
  • 15. IEEE 802.16 • The 802.16a standard for 2-11 GHz is a wireless metropolitan area network (MAN) technology that will provide broadband wireless connectivity to Fixed, Portable and Nomadic devices. • It can be used to connect 802.11 hot spots to the Internet, provide campus connectivity, and provide a wireless alternative to cable and DSL for last mile broadband access.
  • 16.
  • 17.
  • 18. 3.SMS SMS, which stands for Short Message Service, is the text messaging service on most mobile phones and other mobile devices. SMS is based on standardized communication protocols to send text messages from device to device. SMS is ideal for sending short, text-only messages and up to 160 characters  MMS (Multimedia Messaging Service) is the most common alternative to SMS and in MMS we can send images, audio and videos On December 3, 1992, the first SMS text message in history is sent: Neil Papworth, a 22-year-old engineer, uses a personal computer to send the text message “Merry Christmas” via the Vodafone network to the phone of a colleague.
  • 19.
  • 20. SMS Marketing • Short-term promotions for retail or ecommerce businesses • Urgent updates about events or customer orders • Appointment reminders • Internal alerts • E-Commerce stores • Travel agencies
  • 21.
  • 22. Mobile Computing  Mobile Computing is the technology used for transmitting voice and data through small, portable devices using wireless enabled networks.  Examples are Online delivery systems associated with credit card verification. The three main components of mobile computing are :- 1) Mobile Hardware 2) Mobile Software 3) Mobile Communication
  • 23. Safety measures in Mobile Computing • Use strong passwords/biometrics • Ensure public or free Wi-Fi is protected • Utilize VPN(Virtual private network) • Encrypt your device • Install an Antivirus application • Update to the latest software