SlideShare a Scribd company logo
1 of 18
Cell Phone Jammer Incorporated with Cell Phone Detector  RicrelCochon Jimenez I-DA2 Prof. Alexander Redor 1
Contents Introduction Types of Jammer How Jammer Works What inside Jammer Applications of Jammer Future scope of Jamming Technology Cell Phone Detector Introduction Block Diagram Application Conclusion 2
Cell phone jammers are devices that create a temporary "dead zone" to all cell phone traffic in their immediate proximity Introduction 3
Jamming  techniques Type "A" Device: JAMMERS Type “B” Device: INTELLIGENT  CELLULAR DISABLERS Type “C” Device: INTELLIGENT  BEACON DISABLERS Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS Type “E” Device: EMI SHIELD - PASSIVE JAMMING 4
How Jammer Works A jamming device transmits - same radio frequencies of greater power as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower. It's a called a denial-of-service attack.  .....Jamming basics.... 5
This causes  interference with communication of cell phones and towers to render the phones     unusable. On most  phones, the network would be out of range.  So Jammers work by either disrupting  phone to tower freq.. or tower to phone  frequencies.  6
  Design Parameters/ Specification The frequency bands Distance to be jammed (D) PjGjrGrj R2trLr Br Jamming–to-signal ratio {J/S}= 				 			          PtGtrGrt R2jrLjBj     Free space loss {F}= Path Loss (dB)= 32.44 + 20 log D(km) + 20log f(MHz) Power calculations 7
Block Diagram If  section Rf  section Jamming signals Power supply 8
Power supply Transformer Rectifier  Regulator 9 filter
IF section Triangular wave generator Noise generator Mixer summer  “Summer” 10
Rf section Voltage Controlled Oscillator Power  Amplifier  Antenna 11
Application  To maintain the complete silence in library and lecture hall To avoid fraud in examination hall To avoid disturbance in class room For providing security in business conference, board of directors rooms, seminars, etc.,  For providing calm and peaceful atmosphere in Hospitals  Church/Mosques/Cathedral/Temple/Religious establishment 12
Future scope of Jamming Technology While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking.  Companies are working on devices that control a cell phone but do not "jam the signal.  13
Cell phone detector Introduction 14
Block Diagram 15
Applications Cell-phone alerter (detector)  is useful that indicate the presence of a cell-phone signal. These can be used in hospitals where cell-phone signals could interfere with sensitive medical equipment. When a signal is detected, users are asked to turn off their phones or Jamming can be used. It is useful airport. It is useful in class rooms and examination hall. It is useful wherever  cell phone can disturb. 16
Conclusion Every technology has good aspect as well as bad aspect the important thing  is ,how we are using it. Cell phone jammers are very useful to the society from the anti-social elements. We can save our national leaders. we can restrict the communication network between the anti-social elements by using the cell phone jammers. Cell phone jammers prevent the students from carrying cell phones to the colleges. As every thing goes fine, it is very necessary to implement in all the colleges 17
Shri Mata Vaishno Devi University, Katra 18

More Related Content

What's hot (20)

Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
mobile jammer
mobile jammermobile jammer
mobile jammer
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 

Similar to Ceplone

mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxLingaSwamy10
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxVinodDoddaka
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile JammersRamaBoya2
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2mgnboy
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer reportAmit sundaray
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksIJMER
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networksijtsrd
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd Iaetsd
 

Similar to Ceplone (17)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
Govind
GovindGovind
Govind
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Intelligent jammer
Intelligent jammerIntelligent jammer
Intelligent jammer
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 

Ceplone

  • 1. Cell Phone Jammer Incorporated with Cell Phone Detector RicrelCochon Jimenez I-DA2 Prof. Alexander Redor 1
  • 2. Contents Introduction Types of Jammer How Jammer Works What inside Jammer Applications of Jammer Future scope of Jamming Technology Cell Phone Detector Introduction Block Diagram Application Conclusion 2
  • 3. Cell phone jammers are devices that create a temporary "dead zone" to all cell phone traffic in their immediate proximity Introduction 3
  • 4. Jamming techniques Type "A" Device: JAMMERS Type “B” Device: INTELLIGENT CELLULAR DISABLERS Type “C” Device: INTELLIGENT BEACON DISABLERS Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS Type “E” Device: EMI SHIELD - PASSIVE JAMMING 4
  • 5. How Jammer Works A jamming device transmits - same radio frequencies of greater power as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower. It's a called a denial-of-service attack. .....Jamming basics.... 5
  • 6. This causes interference with communication of cell phones and towers to render the phones unusable. On most phones, the network would be out of range. So Jammers work by either disrupting phone to tower freq.. or tower to phone frequencies. 6
  • 7. Design Parameters/ Specification The frequency bands Distance to be jammed (D) PjGjrGrj R2trLr Br Jamming–to-signal ratio {J/S}= PtGtrGrt R2jrLjBj     Free space loss {F}= Path Loss (dB)= 32.44 + 20 log D(km) + 20log f(MHz) Power calculations 7
  • 8. Block Diagram If section Rf section Jamming signals Power supply 8
  • 9. Power supply Transformer Rectifier Regulator 9 filter
  • 10. IF section Triangular wave generator Noise generator Mixer summer “Summer” 10
  • 11. Rf section Voltage Controlled Oscillator Power Amplifier Antenna 11
  • 12. Application To maintain the complete silence in library and lecture hall To avoid fraud in examination hall To avoid disturbance in class room For providing security in business conference, board of directors rooms, seminars, etc., For providing calm and peaceful atmosphere in Hospitals Church/Mosques/Cathedral/Temple/Religious establishment 12
  • 13. Future scope of Jamming Technology While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking. Companies are working on devices that control a cell phone but do not "jam the signal. 13
  • 14. Cell phone detector Introduction 14
  • 16. Applications Cell-phone alerter (detector) is useful that indicate the presence of a cell-phone signal. These can be used in hospitals where cell-phone signals could interfere with sensitive medical equipment. When a signal is detected, users are asked to turn off their phones or Jamming can be used. It is useful airport. It is useful in class rooms and examination hall. It is useful wherever cell phone can disturb. 16
  • 17. Conclusion Every technology has good aspect as well as bad aspect the important thing is ,how we are using it. Cell phone jammers are very useful to the society from the anti-social elements. We can save our national leaders. we can restrict the communication network between the anti-social elements by using the cell phone jammers. Cell phone jammers prevent the students from carrying cell phones to the colleges. As every thing goes fine, it is very necessary to implement in all the colleges 17
  • 18. Shri Mata Vaishno Devi University, Katra 18