SlideShare a Scribd company logo
1 of 34
Cell phone jammer withprescheduledtime duration
ABSTRACT
Mobile
INTRODUCTION
Communication jamming device were first developed and used by military. This
interest comes from the fundamental objective of denying the successful transport
of information from the sender (tactical commander) to the receiver (the army
personnel), and vice-versa. Nowadays, mobile phones are becoming essential toolin
our daily life. The technology behind cell phonejamming is very simple. Thewidely
use the mobile phone could create some problems as the sound of ringing becomes
annoying or disrupting. This could happen in some places like conference room, aw
court, libraries, lecture room and mosques. The jamming device broadcasts an RF
signal in the frequency range reserved for cell phones that interference with the cell
phone signal, which results in a “no network available” display on the cell phone
screen. All phones with in the effective radius of the jammer are science. It should
be mentioned that cell phone jammers are illegal devices in most countries.
A mobile phone jammer is an instrument used to prevent cellular phones from
receiver signal from based station. When used, the jammer effectively disables
Cell phone jammer withprescheduledtime duration
cellular phones (fig 1). This device can be used in practically any location, but are
found primarily in places where a phone call would be particularly in places where
a phone call would be particularly disruptive because silence is expected. As with
other radio jamming, cell phone jammers block cell phone use by sending out radio
waves along the same frequencies that cellular phone use. These causes enough
interface with the communication between cell phones and towers to radar the
phones unusable. On most retail phones, the network would simply appear out of
range. Most cell phones use different bands to send
and receive communications from towers (called frequency division depleting,
FDD). Jammers can work by either disrupting phone to tower frequencies or tower
to phone frequencies. Smaller handheld models block all bands from 800 MHz to
1900 MHz within a 30-foot range (9meters). Small devices tend to used the former
method, while larger more expensive models many interfere directly with the tower.
The GSM jammer is a device that transmit signal on the same frequency at which
the GSM system operates, the jamming success when the mobile phone in the area
where the jammer is located can‟t communicate, the basic idea military use that was
called denial ofservice attack. Mobile jammer is used to prevent mobile phone from
receiving or transmitting signal with the base stations. When used, the jammer
effectively disables cellular phones as shown in fig 2. There are several ways to jam
an RF device. The three most common techniques can be categorized as follows
In this kind of jamming, the device forces the mobile to turn off itself. This type is
very difficult to be implemented since the jamming device first detects any mobile
phone in a specific area, then the device sends the signal to disable the mobile phone
.some type of this technique can detect if a nearby mobile phone is there and sends
a message to tell the user to switch the phone to the silent mode (intelligent beacon
disablers). Shielding attacks: This is known as TEMPEST or EMF shielding. This
Cell phone jammer withprescheduledtime duration
kind required closing an area in a faraday cage so that any device inside this cage
cannot transmit orreceiver RF signal from outside ofthe cage. This area can belarge
as buildings. Denial of service: This technique is referred to DOS. In this technique,
the device transmits a noise signal at the same operating frequency of the mobile
phone in order to decrease the signal -to-noise ratio (SNR) of the mobile under its
minimum value. This kind ofjamming technique is the simplest one since the device
is always on. Our device is of this type.
The systemthat to setthe scheduled time duration for mobile jammer. The activation
and deactivation time schedules can beprogrammed with microcontroller. In order
to run the RTC (real time clock) one crystal oscillator is externally interfaced, an
oscillator is an electronic circuit that produces a repetitive electronic signal. The
power supply interfaced it is used to battery backup for the purpose of update the
time when the absence of power. The A.C input i.e., 230v from the mains supply is
step down by the transformer to 12v and is fed to a rectifier. One reset button
interface, Reset is used for putting the microcontroller into a „known‟ condition.
That partially means that microcontroller can behave rather inaccurately under
certain undesirable condition. In order to continuous its proper functioning it has to
be reset. Relay is an electrically controllable switch widely used in industrial
controls, automobile and appliances.
Cell phone jammer withprescheduledtime duration
LITERATURE SURVEY
2014, ShantanuKrishna Mahato, C.vimala
Cell phones are everywhere these days. It’s great to be able to call anyone at anytime.
Unfortunately, restaurants, public places, class room, shopping malls and
churches all suffer from the spread of cell phones because not all cell-phone users
know when to stop talking while mostof us just grumble and move on, some people
are actually going to extremes to retaliate. Mobile jammer is a device used to prevent
mobile phones from receiving or transmitting signals with the base stations. In this
paper, we have to jam a cell phone, all we are developing a device that broadcasts
on the correct frequencies. Although different cellular systems process signals
differently, all cell-phone networks use radio signals that can be interrupted. GSM,
used in digital cellular and PCS-based systems, operates inthe 900-MHz, 1800-MHz
and WCDMA 2100 bands in Europe and Asia and in the 1900- MHz band in the
United States. Jammers can broadcast on any frequency and are effective against
WCDMA, GSM and DCS. This project discusses the design and development of
GSM Mobile jammer and aims to present a solution for the problems of occur
through the cell phone. The main concept of jamming is the releasing of same
Cell phone jammer withprescheduledtime duration
frequency which is using by mobile service provider with noise so user equipment
gets destruct.
EXISTING SYSTEM
In market, there are various types of jamming devices available which are using
different jamming techniques. Some of thosedevices are built with only one feature
in it like it will jam only 2G network compatible cell phones. This type of device
comes with several independent oscillators transmitting jamming signals capable of
blocking frequencies used by paging devices as well as those used by cellular
systems control channels for call establishment. IT does not transmit an interfering
signal on the controlchannels. Thedevice, when located in the designated quite area,
functions as a detector. Ithas a unique identification number forcommunicating with
the cellular base station. The device, when located in the designated quite area,
functions as a beacon and any compatible terminal s instructed to disable its ringer
or disable its operation, while within the coverage area of beacon. It behaves like a
small, independent and portable base station, which can directly interact with the
operation ofthe local mobile phone. The jammer is predominantly in receiving mode
and will choose to interact and block the cell phone directly if it is within close
proximity of the jammer. Although labor intensive to construct, the Faraday cage
essentially Blocks or greatly attenuates, virtually all electromagnetic radiation from
entering or leaving the cage or in this case a target room.
DISADVANTAGES
 OFMD is highly sensitive to STO. Due to the use of IFFT and FFT for
modulation and demodulation at transmitter and receiver respectively, correct
timing is required at the
Cell phone jammer withprescheduledtime duration
 It is highly sensitive to carrier frequency offset. Mostofthe advantages of the
orthogonal nature of sub-carriers and this orthogonality between sub carriers
will be destroyed if frequency offset arises between them. The major cause
of CFO is Doppler shifts (due to relative motion between transmitter and
channel.
 The transmitted signal of OFDM exhibits a high Peak-To-Average Power
Ratio (PAPR). This high PAPR reduces the efficiency of high power
amplifier and degrades the performance of the system.
Cell phone jammer withprescheduledtime duration
PROPOSED SYSTEM
We have designed and developed a project based on hardware viewing concept
“Mobile Jammer” which blocks the mobile networks of a designated area that are
receiving their 3G network from the base stations. A jammer is any device that
deliberately blocks, jam or interferes with authorized wireless communications . In
many countries, jammers are illegal and their use can result in large fines. A mobile
phone jammer is an instrument used to prevent cellular phones from receiving signal
from based station. Jammer should recognize that power. Power of jamming signal
should match the power increase from the phone. Sophisticated jammers can block
several networks to head offdual or tri-mode phonethat automatically switch among
different network to fin It overpowers the mobile receiving networks bytransmitting
the same frequency received by mobile phones. We have designed a block diagram
of mobile jammer which shows the flow of our project. We have designed it in a
way which gives full details about each block, how a jamming signal is transmitting
i.e. how it will jam a mobile phone.
Cell phone jammer withprescheduledtime duration
BLOCK DIAGRAM
Cell phone jammer withprescheduledtime duration
WORKING PRINCIPLE
The block diagram of the system that to set the scheduled time duration for mobile
jammer. The activation and deactivation time schedules can be programmed with
microcontroller. In order to run the RTC (real time clock) one crystal oscillator is
externally interfaced, an oscillator is an electronic circuit that produces a repetitive
electronic signal. The power supply interfaced it is used to battery backup for the
purpose of update the time when the absence of power. The A.C input i.e., 230v
from the mains supply is step down bythe transformer to 12v and is fed to a rectifier.
One reset button interface, Reset is used for putting the microcontroller into a
Cell phone jammer withprescheduledtime duration
„known‟ condition. That partially means that microcontroller can behave rather
inaccurately under certain undesirable condition. In order to continuous its proper
functioning it has to bereset. Relay is an electrically controllable switch widely used
in industrial controls, automobile and appliances. One LCD (liquid crystal display)
also interface in this micro controller, it is flat electronic visual display that used that
use the light modulating properties of liquid crystals. These components are
specialized for being used with the microcontrollers, which means that they cannot
be activated by standard IC circuits. RTC (real time clock) is interface because it is
widely used device that provides accurate time and date for many applications. LED
indicator interface in this microcontroller it have a life of at last ten years and
consumer 90 percent less power than conventional indicators, depend on the type of
the materials (Ga, AS, p).
ADVANTAGES
Less Implementation Complexity
Robustness Against Narrowband Interference
Immune to Frequency Selective Fading
High Spectral Efficiency
Using 3g network for speed
Cell phone jammer withprescheduledtime duration
SOFTWARE DISCRIPSION
PIC KIT-2 SOFTWARE
Information contained in this publication regarding device applications and the like is
provided only for your convenience and may be superseded by updates. It is your
responsibility to ensure that your application meets with your specifications. Microchip
makes no representations or warranties ofany kind whether express or implied, written
or oral, statutory or otherwise, related to the information, including but not limited to
its condition, quality, performance, merchantability or fitness for purpose. Microchip
disclaims all liability arising from this information and its use. Use of microchip
devices in life support and/or safety applications is entirely at the buyers risk, and the
buyer agrees to defend, indemnify and hold harmless microchip from any and all
damages, claims, suits, or expenses resulting from such use. No licenses are conveyed,
implicitly or otherwise, under any microchip intellectual property rights
The PICKit 2 Development Programmer/Debugger kit contains the following items:
1. The PICKit 2 Development Programmer/Debugger
2. USB cable
3. PICKit Starter Kit and MPLAB IDE CD-ROMs Additionally, the PICKit 2 Starter
Kit and PICKit 2 Debug Express kit both contain a demo board with a PIC
microcontroller device.
The PICKit 2 Development Programmer/Debugger is a low-cost development
programmer. It is capable of programming most of Microchips Flash microcontrollers
and serial EEPROM devices. For specific device support, see the README file
included on the PICKit 2 Starter Kit CD-ROM.
Cell phone jammer withprescheduledtime duration
PICKit 2 PROGRAMMER APPLICATION
The PICKit 2 Programmer application allows you to program all supported devices
listed in the PICKit 2 Readme file. The programming interface appears. Its controls are
listed in the following sections. For more information on how to install and use the
PICKit 2 Programmer application, see Chapter 2. Picket 2 Programmers Getting
Started.
Cell phone jammer withprescheduledtime duration
Menu Bar
The menu bar selects various functions of the PICKit 2 Programmer application. A
summary of the functions are:
File
Import Hex. Import a hex file for programming. The hex file format INHX32 is
supported.
Export Hex. Export a hex file read from a device. The hex file is created in the
NHX32 format.
File History Up to the last four hex files opened are displayed with their file path. These
recent hex files may be selected to quickly import them. Note that the file history will
initially be blank on a new installation until a hex file is imported.
Exit. Exit the program.
DOT NET C#
Develop and Deliver Enterprise-Critical Desktop and Web Applications with C# .NET
• Complete Case Studies with Ready-to-Run Source Codeand Full Explanations
• Hundreds ofDeveloping & Deploying, Migrating, and Debugging Sidebars, Security
Alerts, and C# .NET FAQs
• Complete Coverage of Web Services and the Integrated Development Environment
(IDE)
This CD-ROM contains the code files that are used in each chapter of this
book. Thecodefiles for each chapter are located in a chXX directory (for example, the
files for are in the ch08 directory).Any further directory structure depends on the
projects that are presented within the chapter. To work with the examples provided,
you will need at least the Windows 2000 or Windows XP Professional operating
Cell phone jammer withprescheduledtime duration
system with the latest service packs, IIS 5.x, and IE 6.0, since ASP.NET and Web
Services (a part of ASP.NET) are not supported on earlier operating systems such as
Windows 9x/Windows ME/Windows NT. Also needed is the .NET SDK Beta2 (the
latest public release available while writing this book) and the Visual Studio.NET
Beta2 IDE. The C# .NET Web Developer’s Guide provides you with extensive
examples that will help solve the problems you might face while developing
applications for the .NET Platform rather than concentrating on the theory of C# and
.NET programming. Therefore code is the main feature of this book. The chapters
contain bothcodesnippets and sample programs that illustrate the principles discussed.
Chapter 2 presents a series of sample programs that introduce concepts in C# that are
different from other object-oriented languages. Chapter 4 helps you understand the
basics of building Graphical User Interface (GUI)-rich Windows Forms applications;
the examples presented in this chapter are the launch pad for Windows Forms
applications used in other chapters. Similarly, code presented in Chapter 8 helps you
to interact with various databases using ADO.NET; again, this chapter acts as a
foundation for further chapters’ database coverage. Chapter 9 will acquaint you with
using .NET Class Libraries to interact with XML and its related technologies. Discuss
technologies and Application Program Interfaces (APIs) that help two applications to
communicate and interact with each other. focuses on enabling applications to
communicate over the TCP and UDP protocols and provides an overview of the
techniques used to interact with Web pages programmatically. Code examples in
Chapter 6 and Chapter11 concentrate onusing Simple ObjectAccess Protocol(SOAP)
and object serialization and de serialization.
Formany years, C and C++ programmers have been searching for alternative
programming languages that offer the same kind offlexibility and powerofC and C++,
but without the complexities and steep learning curve required for mastery of the
Cell phone jammer withprescheduledtime duration
language. What many programmers desired was a language that would allow
applications to be built rapidly, but at the same time giving them the ability to codeat
low level. The search has finally ended with Microsoft’s new language—C#, a member
of the .NET Framework. C# is the revolutionary new language from Microsoft,
designed solely to run on the .NET framework. Drawing experiences from C, C++, and
Visual Basic, C# was designed to bea simple and modern objectoriented programming
language. But why learn C#? With the integration of C# and the Visual Studio.NET
(known as Visual C#), developing Windows and Web applications has been radically
simplified. With full access to the .NET Class Libraries, C# includes built-in support
for developing robustWeb services and ASP.NET applications. (It was reportedly said
that Visual Studio.NET was built entirely using C# and that most of the examples in
MSDN were coded in C#.That in and of itself is a very good reason to learn C#!)
Besides this, C# enhances the productivity of programmers by eliminating common
errors often associated with C and C++. While many of the earlier C# books have
primarily focused on the language syntax, The C# .NET Web Developer’s Guide
illustrates the uses of C# for Web developers looking to harness the new functionality
and ease of this powerful programming language. he bestway to learn a new language
is by trying out the examples while you are reading this book. Within many chapters,
you will find numerous codeexamples used in various practical situations; this hands-
on, code-intensive approach allows you to have a deeper understanding of issues
involved in C# Web development, and at the same time allows you to cut and paste
portions of applicable codeinto your current projects, thereby shortening development
time.
HARDWARE REQUIREMENT
1. POWER SUPPLY
2. MICROCONTROLLER
Cell phone jammer withprescheduledtime duration
3. LCD DISPLAY
4. MOTORS
POWER SUPPLY
In most of our electronic products or projects we need a power supply for converting
mains AC voltage to a regulated DC voltage. Formaking a power supply designing of
each and every component is essential. Here I’m going to discuss the designing
of regulated 5V Power Supply.
Let’s start with very basic things the choosing of components
Component List :
1. Step down transformer
2. Voltage regulator
3. Capacitors
4. Diodes
Let’s get into detail of rating of the devices:
7805 IC Rating :
 Input voltage range 7V- 35V
 Current rating Ic = 1A
 Output voltage range VMax=5.2V ,VMin=4.8V
Cell phone jammer withprescheduledtime duration
LM7805 – Pin Diagram
Transformer:
Selecting a suitable transformer is of great importance. The current rating and the
secondaryvoltage of the transformer is a crucial factor.
 The current rating of the transformer depends upon the current required for the load to
be driven.
 The input voltage to the 7805 IC should be at least 2V greater than the required 2V
output; therefore it requires an input voltage at least close to 7V.
 So I chosea 6-0-6 transformer with current rating 500mA (Since 6*√2 = 8.4V).
MICROCONTROLLER
High-Performance RISC CPU:
• Only 35 single-word instructions to learn
• All single-cycle instructions except for program branches, which are two-cycle
• Operating speed:DC – 20 MHz clock input DC – 200 ns instruction cycle
• Up to 8K x 14 words ofFlash Program Memory, Up to 368 x 8 bytes of Data Memory
(RAM), Up to 256 x 8 bytes of EEPROM Data Memory
Cell phone jammer withprescheduledtime duration
• Pin out compatible to other 28-pin or 40/44-pin PIC16CXXX and PIC16FXXX
microcontrollers
Peripheral Features:
• Timer0: 8-bit timer/counter with 8-bit prescaler
• Timer1: 16-bit timer/counter with prescaler, can be incremented during Sleep via
external crystal/clock
• Timer2: 8-bit timer/counter with 8-bit period register, prescaler and postscaler
• Two Capture, Compare, PWM modules
- Capture is 16-bit, max. Resolution is 12.5 ns
- Compare is 16-bit, max. Resolution is 200 ns
- PWM max. Resolution is 10-bit
• Synchronous Serial Port(SSP) with SPI™ (Master mode) and I2C™ (Master/Slave)
• Universal Synchronous Asynchronous Receiver Transmitter (USART/SCI) with 9-
bit address detection
• Parallel Slave Port(PSP) – 8bits wide with external RD, WR and CS controls (40/44-
pin only)
• Brown-out detection circuitry for Brown-out Reset (BOR)
Analog Features:
• 10-bit, up to 8-channel Analog-to-Digital Converter (A/D)
• Brown-out Reset (BOR)
• Analog Comparator module with:
- Two analog comparators
- Programmable on-chip voltage reference (VREF) module
- Programmable input multiplexing from device inputs and internal voltage reference
- Comparator outputs are externally accessible Special Microcontroller Features:
Cell phone jammer withprescheduledtime duration
• 100,000 erase/write cycle Enhanced Flash program memory typical
• 1,000,000 erase/write cycle Data EEPROM memory typical
• Data EEPROM Retention > 40 years
• Self-reprogrammable under software control
• In-Circuit Serial Programming™ (ICSP™)via two pins
• Single-supply 5V In-Circuit Serial Programming
• Watchdog Timer (WDT) with its own on-chip RC oscillator for reliable operation
• Programmable codeprotection
• Power saving Sleep mode
• Selectable oscillator options
• In-Circuit Debug (ICD) via two pins CMOS Technology:
• Low-power, high-speed Flash/EEPROM technology
• Fully static design
• Wide operating voltage range (2.0V to 5.5V)
• Commercial and Industrial temperature ranges
• Low-power consumption
Cell phone jammer withprescheduledtime duration
DEVICE OVERVIEW
This document contains device specific information about the following devices:
• PIC16F873A
• PIC16F874A
• PIC16F876A
• PIC16F877A
PIC16F873A/876A devices are available only in 28-pin packages, while
PIC16F874A/877A devices are available in 40-pin and 44-pin packages. All devices
in the PIC16F87XA family share commonarchitecture with the following differences:
Cell phone jammer withprescheduledtime duration
• The PIC16F873A and PIC16F874A have one-half of the total on-chip memory ofthe
PIC16F876A and PIC16F877A
• The 28-pin devices have three I/O ports, while the 40/44-pin devices have five
• The 28-pin devices have fourteen interrupts, while the 40/44-pin devices have fifteen
• The 28-pin devices have five A/D input channels, while the 40/44-pin devices have
eight
• The Parallel Slave Port is implemented only on the 40/44-pin devices.
The available features are summarized. Block diagrams of the PIC16F873A/876A and
PIC16F874A/877A devices are provided respectively. The pin outs for these device
families are listed. Additional information may be found in the PICmicroÂŽ Mid-Range
Reference Manual (DS33023), which may be obtained from your local Microchip
Sales Representative or downloaded from the Microchip web site. The Reference
Manual should be considered a complementary document to this data sheet and is
highly recommended reading for a better understanding of the device architecture and
operation of the peripheral modules.
MEMORYORGANIZATION
There are three memory blocks in each of the PIC16F87XA devices. The program
memory and data memory have separate buses so that concurrent access can occurand
is detailed in this section. The EEPROM data memory block is detailed “Data
EEPROM and Flash Program Memory”. Additional information on device memory
may be found in the PICmicroÂŽ Mid-Range MCU Family Reference Manual. Program
Memory Organization The PIC16F87XA devices have a 13-bit program counter
capable of addressing an 8K word x 14 bit program memory space. The
PIC16F876A/877A devices have 8K words x 14 bits of Flash program memory, while
PIC16F873A/874A devices have 4K words x 14 bits. Accessing a location above the
physically implemented address will causea wraparound. The Reset vectoris at 0000h
and the interrupt vector is at 0004h.
Cell phone jammer withprescheduledtime duration
Data Memory Organization
The data memory is partitioned into multiple banks which contain the General Purpose
Registers and the Special Function Registers. Bits RP1(Status<6>) and
RP0 (Status<5>) are the bank select bits.
Status Register
The Status register contains the arithmetic status of the ALU, the Reset status and the
bank select bits for data memory. The Status register can be the destination for any
instruction, as with any other register. If the Status register is the destination for an
instruction that affects the Z, DC or C bits, then the write to these three bits is disabled.
These bits are set or cleared according to the device logic. Furthermore, the TO and
PD bits are not writable, therefore, the result of an instruction with the Status register
as destination may be different than intended.
DATA EEPROM AND FLASH PROGRAM MEMORY
The data EEPROM and Flash program memory is readable and writable during normal
operation (over the full VDD range). This memory is not directly mapped in the register
file space. Instead, it is indirectly addressed through the Special Function Registers.
There are six SFRs used to read and write this memory: • EECON1 • EECON2 •
EEDATA • EEDATH • EEADR • EEADRH When interfacing to the data memory
block, EEDATA holds the 8-bit data for read/write and EEADR holds the address of
the EEPROM location being accessed. These devices have 128 or 256 bytes of data
EEPROM (depending on the device), with an address range from 00h to FFh. On
devices with 128 bytes, addresses from 80h to FFh are unimplemented and will
wraparound to the beginning of data EEPROM memory. When writing to
unimplemented locations, the on-chip charge pump will be turned off. When
interfacing the program memory block, the EEDATA and EEDATH registers form a
Cell phone jammer withprescheduledtime duration
two-byte word that holds the 14-bit data for read/write and the EEADR and EEADRH
registers form a two-byte word that holds the 13-bit address of the program memory
location being accessed. Thesedevices have 4 or 8K words of program Flash, with an
address range from 0000h to 0FFFh for the PIC16F873A/874A and 0000h to 1FFFh
for the PIC16F876A/877A. Addresses above the range of the respective device will
wraparound to the beginning of program memory. The EEPROM data memory allows
single-byte read and write. The Flash program memory allows single-word reads and
four-word block writes. Program memory write operations automatically perform an
erase-beforewrite on blocks of four words. A byte write in data EEPROM memory
automatically erases the location and writes the new data (erase-before-write). The
write time is controlled by an on-chip timer. The write/erase voltages are generated by
an on-chip charge pump, rated to operate over the voltage range of the device for byte
or word operations. When the device is code-protected, the CPUmay continue to read
and write the data EEPROM memory. Depending on the settings of the write-protect
bits, the device may ormay not be able to write certain blocks of the program memory;
however, reads of the program memory are allowed. When code-protected,the device
programmer can no longer access data or program memory; this does NOT inhibit
internal reads or writes.
I/O PORTS
Some pins for these I/O ports are multiplexed with an alternate function for the
peripheral features on the device. In general, when a peripheral is enabled, that
pin may not be used as a general purposeI/O pin. Additional information on I/O ports
may be found in the PICmicro™ Mid-Range Reference Manual (DS33023).
PORTAand the TRISA Register
Cell phone jammer withprescheduledtime duration
PORTAis a 6-bit wide, bidirectional port. The corresponding data direction register is
TRISA. Setting a TRISA bit (= 1) will make the corresponding PORTA pin an input
(i.e., put the corresponding output driver in a High-Impedance mode). Clearing a
TRISA bit (= 0) will make the corresponding PORTA pin an output (i.e., put the
contents of the output latch on the selected pin). Reading the PORTAregister reads the
status of the pins, whereas writing to it will write to the portlatch. All write operations
are read-modify-write operations. Therefore, a write to a portimplies that the portpins
are read, the value is modified and then written to the port data latch. Pin RA4 is
multiplexed with the Timer0 module clock input to become the RA4/T0CKI pin. The
RA4/T0CKI pin is a Schmitt Trigger input and an open-drain output. All other PORTA
pins have TTL input levels and full CMOS output drivers. Other PORTA pins are
multiplexed with analog inputs and the analog VREF input for boththe A/D converters
and the comparators. The operation of each pin is selected by clearing/setting the
appropriate controlbits in the ADCON1 and/or CMCON registers.
PORTB and the TRISB Register
PORTB is an 8-bit wide, bidirectional port. The corresponding data direction register
is TRISB. Setting a TRISB bit (= 1) will make the correspondingPORTB
pin an input (i.e., put the corresponding output driver in a High-Impedance mode).
Clearing a TRISB bit (= 0) will make the corresponding PORTB pin an output (i.e.,
put the contents of the output latch on the selected pin). Three pins of PORTB are
multiplexed with the In-Circuit Debugger and Low-Voltage Programming function:
RB3/PGM, RB6/PGC and RB7/PGD. The alternate functions of these pins are
described in Section 14.0 “Special Features of the CPU”. Each of the PORTBpins has
a weak internal pull-up. A single control bit can turn on all the pull-ups. This is
performed by clearing bit RBPU (OPTION_REG<7>). The weak pull-up is
Cell phone jammer withprescheduledtime duration
automatically turned off when the portpin is configured as an output. The pull-ups are
disabled on a Power-on Reset.
PORTC and the TRISC Register
PORTC is an 8-bit wide, bidirectional port. The corresponding data direction register
is TRISC. Setting a TRISC bit (= 1) will make the correspondingPORTC
pin an input (i.e., put the corresponding output driver in a High-Impedance mode).
Clearing a TRISC bit (= 0) will make the corresponding PORTC pin an output (i.e.,
put the contents of the output latch on the selected pin). PORTC is multiplexed with
several peripheral functions (Table 4-5). PORTC pins have Schmitt Trigger input
buffers. When the I2C module is enabled, the PORTC<4:3> pins can be configured
with normal I2C levels, or with SMBus levels, by using the CKE bit (SSPSTAT<6>).
When enabling peripheral functions, care should be taken in defining TRIS bits for
each PORTC pin. Some
peripherals override the TRIS bit to make a pin an output, while other peripherals
override the TRIS bit to make a pin an input. Since the TRIS bit override is in
effect while the peripheral is enabled, read-modify write instructions (BSF, BCF,
XORWF) with TRISC as the destination, should be avoided. The user should refer to
the corresponding peripheral section for the correctTRIS bit settings.
PORTD and TRISD Registers
PORTD is an 8-bit port with Schmitt Trigger input buffers. Each pin is individually
configurable as an input or output. PORTD can be configured as an 8-bit wide
microprocessor port (Parallel Slave Port) by setting control bit, PSPMODE
(TRISE<4>). In this mode, the input buffers are TTL.
PORTE and TRISE Register
Cell phone jammer withprescheduledtime duration
PORTE has three pins (RE0/RD/AN5, RE1/WR/AN6 and RE2/CS/AN7) which are
individually configurable as inputs or outputs. These pins have Schmitt Trigger input
buffers. The PORTE pins become the I/O control inputs for the microprocessor port
when bit PSPMODE (TRISE<4>) is set. In this mode, the user must make certain that
the TRISE<2:0> bits are set and that the pins are configured as digital inputs. Also,
ensure that ADCON1 is configured for digital I/O. In this mode, the input buffers are
TTL. Register 4-1 shows the TRISEregister which also controls the Parallel Slave Port
operation. PORTEpins are multiplexed with analog inputs. When selected for analog
input, these pins will read as ‘0’s. TRISE controls the direction of the RE pins, even
when they are being used as analog inputs. The user must make sure to keep the pins
configured as inputs when using them as analog inputs.
ParallelSlave Port
The Parallel Slave Port(PSP)is not implemented on the PIC16F873A orPIC16F876A.
PORTD operates as an 8-bit wide Parallel Slave Port, or microprocessor port, when
control bit PSPMODE (TRISE) is set. In Slave mode, it is asynchronously readable
and writable by the external world through RD control input pin, RE0/RD/AN5, and
WR control input pin, RE1/WR/AN6. The PSP can directly interface to an 8-bit
microprocessor data bus. The external microprocessor can read or write the PORTD
latch as an 8-bit latch. Setting bit PSPMODE enables portpin RE0/RD/AN5 to be the
RD input, RE1/WR/AN6 to be the WR input and RE2/CS/AN7 to be the CS (Chip
Select) input. Forthis functionality, the correspondingdata direction bits ofthe TRISE
register (TRISE) must be configured as inputs (set). The A/D port configuration bits,
PCFG3:PCFG0 (ADCON1), must be set to configure pins RE2:RE0 as digital I/O.
There are actually two 8-bit latches: one for data output and one for data input. The
user writes 8-bit data to the PORTD data latch and reads data from the port pin latch
(note that they have the same address). In this mode, the TRISD register is ignored
Cell phone jammer withprescheduledtime duration
since the external device is controlling the direction of data flow. A write to the PSP
occurs when both the CS and WR lines are first detected low. When either the CS or
WR lines become high (level triggered), the Input Buffer Full (IBF) status flag bit
(TRISE) is set on the Q4 clock cycle, following the next Q2 cycle, to signal the write
is complete. The interrupt flag bit, PSPIF (PIR1), is also set on the same Q4 clock
cycle. IBF can only be cleared by reading the PORTD input latch. The Input Buffer
Overflow (IBOV) status flag bit (TRISE) is setif a second write to the PSP is attempted
when the previous byte has not been read out of the buffer. A read from the PSP occurs
when both the CS and RD lines are first detected low. The Output Buffer Full (OBF)
status flag bit (TRISE) is cleared immediately indicating that the PORTD latch is
waiting to be read by the external bus. When either the CS or RD pin becomes high
(level triggered), the interrupt flag bit PSPIF is set on the Q4 clock cycle, following
the next Q2 cycle, indicating that the read is complete. OBF remains low until data is
written to PORTDby the user firmware.
TIMER0 MODULE
The Timer0 module timer/counter has the following
features:
• 8-bit timer/counter
• Readable and writable
• 8-bit software programmable prescaler
• Internal or external clock select
• Interrupt on overflow from FFhto 00h
• Edge select for external is a block diagram of the Timer0 module and the prescaler
shared with the WDT. Additional information on the Timer0 module is available in the
PICmicroÂŽ Mid-Range MCU Family Reference Manual (DS33023). Timer mode is
selected by clearing bit T0CS (OPTION_REG<5>). In Timer mode, the Timer0
Cell phone jammer withprescheduledtime duration
module will increment every instruction cycle (without prescaler). If the TMR0register
is written, the increment is inhibited for the following two instruction cycles. The user
can work around this by writing an adjusted value to the TMR0 register. Counter mode
is selected by setting bit T0CS (OPTION_REG<5>). In Counter mode, Timer0 will
increment either on every rising or falling edge of pin RA4/T0CKI. The incrementing
edge is determined by the Timer0 SourceEdge Select bit, T0SE (OPTION_REG<4>).
Clearing bit T0SE selects the rising edge. Restrictions on the external clock input are
discussed in detail “Using Timer0 with an External Clock”. The prescaler is mutually
exclusively shared between the Timer0 module and the WatchdogTimer. The prescaler
is not readable or writable. “Prescaler” details the operation of the prescaler.
TIMER1 MODULE
The Timer1 module is a 16-bit timer/counter consisting of two 8-bit registers (TMR1H
and TMR1L) which are readable and writable. The TMR1 register pair
(TMR1H:TMR1L) increments from 0000h to FFFFh and rolls over to 0000h. The
TMR1 interrupt, if enabled, is generated on overflow which is latched in interrupt
flag bit, TMR1IF (PIR1<0>). This interrupt can beenabled/disabled bysetting/clearing
TMR1 interrupt enable bit, TMR1IE (PIE1<0>).
Timer1 can operate in one of two modes:
• As a Timer
• As a Counter
The operating mode is determined by the clock select bit, TMR1CS (T1CON<1>).
TIMER2 MODULE
Timer2 is an 8-bit timer with a prescaler and a postscalar. It can be used as the PWM
time base for the PWM mode of the CCP module(s). The TMR2 register
Cell phone jammer withprescheduledtime duration
is readable and writable and is cleared on any device Reset. The input clock (FOSC/4)
has a prescaler option of 1:1, 1:4 or 1:16, selected by controlbits T2CKPS1:T2CKPS0
(T2CON<1:0>). The Timer2 module has an 8-bit period register, PR2. Timer2
increments from 00h until it match PR2 and then resets to 00h on the next increment
cycle. PR2 is a readable and writable register. The PR2 register is initialized to FFh
upon Reset. The match output of TMR2 goes through a 4-bit postscalar (which gives
a 1:1 to 1:16 scaling inclusive) to generate a TMR2 interrupt (latched in flag bit,
TMR2IF (PIR1<1>)). Timer2 can be shut-off by clearing control bit, TMR2ON
(T2CON<2>), to minimize power consumption.
CAPTURE/COMPARE/PWM MODULES
Each Capture/Compare/PWM (CCP) module contains
a 16-bit register which can operate as a:
• 16-bit Capture register
• 16-bit Compare register
• PWM Master/Slave Duty Cycle register
Both the CCP1and CCP2modules are identical in operation, with the exception being
the operation of the special event trigger. Table 8-1 and Table 8-2 show the resources
and interactions of the CCP module(s). In the following sections, the operation of a
CCP module is described with respect to CCP1. CCP2 operates the same as CCP1
except where noted.
CCP1Module:
Capture/Compare/PWM Register 1 (CCPR1) is comprised of two 8-bit registers:
CCPR1L (low byte) and CCPR1H (high byte). The CCP1CON register controls the
operation ofCCP1. The special event trigger is generated by a comparematch and will
reset Timer1.
Cell phone jammer withprescheduledtime duration
LCD 16X2
Alphanumeric displays are used in a wide range of applications, including palmtop
computers, word processors, photocopiers, point of sale terminals, medical
instruments, cellular phones, etc. The 16 x 2 intelligent alphanumeric dot matrix
displays is capable ofdisplaying 224 different characters and symbols. A full list ofthe
characters and symbols is printed on pages 7/8 (note these symbols can vary between
brand of LCD used). This booklet provides all the technical specifications for
connecting the unit, which requires a single power supply (+5V). Available as an
optional extra is the Serial LCD Firmware, which allows serial control of the display.
This option provides much easier connection and use of the LCD module. The
firmware enables microcontrollers (and microcontroller based systems such as the
PICAXE) to visually output user instructions or readings onto an LCD module. All
LCD commands are transmitted serially via a single microcontroller pin. The firmware
can also be connected to the serial port of a computer.
MOTOR
The unit operates on 1.5 - 3v (917D & 917D/A, also with higher torque motor 920D &
920D/A), or 12-24v (927D & 927D/A) D.C. power sources, either battery or suitable
transformer. Its simple versatile design and sturdy construction make it suitable for a
hostof uses from powering models and robots to teaching the principles of mechanics.
Current consumptiondepends oneventual load but is within the range 0.2 to 0.8n amps.
The output shaft is 3mm diameter. Designed for heavy-duty industrial and model
applications this robust unit boasts a powerful high quality, three pole motor with
sintered bronze bearings. The all steel gearbox incorporates bronze output bearings,
enabling the high torque transfer from the motor to be transmitted through the gearbox.
The unit is mounted on a 1mm thick plated steel bracket.
Cell phone jammer withprescheduledtime duration
RF section:
This is the most important part of the jammer, since the output of this section will be
interfacing with the mobile. The RF-section consists of three main parts: voltage
controlled oscillator VCO, power amplifier and antenna. The voltage controlled
oscillator (VCO) is the heart of the RF-section. It is the device that generates the RF
signal which will interfere with the cell phone. The output of the VCO has a frequency
which is proportional to the input voltage, thus, we can control the output frequency
by changing the input voltage. When the input voltage is DC, the output is a specific
frequency, while if the input is a triangular waveform, the output will span a specific
frequency range. In our design, we need to find a VCO for GSM 900 and GSM 1800.
There are three selection criteria for selecting a VCO for this application. Most
importantly, it should cover the bands that we need, secondly, it should be readily
available at low cost, and finally, it should run at low power consumption. Moreover,
we need to minimize the size of GSM-jammer. So, we started to search through the
internet for VCO's that work for GSM 900 & GSM 1800 bands.
Finally, we found the following VCO IC’s:-
CVCO55BE; this is for GSM 1800. The output frequency is 1785-1900 MHz and the
output power is up to 5 dBm.
CVCO55CL; this is for GSM 900. The output frequency is 925-970 MHz and the
output power is up to 8 dBm.
We chosethese IC’s for the following reasons:-
[A] Surface mount, which reduces the size of product.
[B] Having large output power that reduces the number of amplification stages that we
need.
[C] Having same value of power supply which is typically equal to 5 volt.
Cell phone jammer withprescheduledtime duration
[D] Having same noise properties.
CONCLUSION
While testing a jammer we observed that jamming range depends on surroundings
and signal strength in that surrounding. In low network areas, the jamming range
increases to 20 meters also. In general, the jamming attack was protected bynetwork
signal power, and having jammer with high power there is guarantee of jamming
quickly. From above all observation, it can be concluded that the cell phone jammer
worked efficiently And its automatically deactivated by using the frequency
generator.A most of the areas where there is need to jam the signal for maintaining
silence and peace for the people. Also there is need of more powerful jamming
devices for large space. However our jammer is effective in short space
Cell phone jammer withprescheduledtime duration
requirements. This work is intended to provide an open base for developing the
prototypein the form of hardware, software, range of antenna etc.
References
[1] Rick Hartley, RF / Microwave PC Board Design and Layout, Avionics Systems.
[2] John Scourias, Overview of the Global System for Mobile Communications,
University of Waterloo.
[3] Ahmed Jisrawi, "GSM 900 Mobile Jammer", undergrad project, JUST, 2006.
[4] Limor Fried, Social Defense Mechanisms: Tools for Reclaiming our Personal
Space.
[5] Siwiak, K., Radio-wave propagation and Antennas for personalcommunication.
[6] Pozar, D., Microwave Engineering, John Wiley and Sons, 2005.
Cell phone jammer withprescheduledtime duration
[7] "FREQUENCY PLANNING AND FREQUENCY COORDINATION FOR
THE GSM 900, GSM 1800, E-GSM and GSM-R LAND MOBILE SYSTEMS
(Except direct mode operation (DMO) channels)" by Working Group Frequency
Management" (WGFM).

More Related Content

What's hot

Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammerDeepak Bhojwani
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer reportSameer Gupta
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammersTaruni Kancharla
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerChandu Pawar
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt Sameer Gupta
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jammingMahmoud Abdeen
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer workselprocus
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?xiha tareen
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerSuman Bose
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammerARYAN KUMAR
 
Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdfManu M
 
Intelligent jammer
Intelligent jammerIntelligent jammer
Intelligent jammerPrejith Pavanan
 
Mobile phone intelligent jamming system
Mobile phone intelligent jamming systemMobile phone intelligent jamming system
Mobile phone intelligent jamming systemPatel Ibrahim
 

What's hot (20)

Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Mobile phone jammers
Mobile phone jammersMobile phone jammers
Mobile phone jammers
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammer
 
Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdf
 
Intelligent jammer
Intelligent jammerIntelligent jammer
Intelligent jammer
 
Mobile phone intelligent jamming system
Mobile phone intelligent jamming systemMobile phone intelligent jamming system
Mobile phone intelligent jamming system
 

Viewers also liked

Cell phone detector & jammer
Cell phone detector & jammerCell phone detector & jammer
Cell phone detector & jammerAmar Raj
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerAvay Minni
 
ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot
ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot
ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot ASHOKKUMAR RAMAR
 
защита от перехЗащита от перехвата GSM сигналавата Gsm сигнала
защита от перехЗащита от перехвата GSM сигналавата Gsm сигналазащита от перехЗащита от перехвата GSM сигналавата Gsm сигнала
защита от перехЗащита от перехвата GSM сигналавата Gsm сигналаPositive Hack Days
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardwarevanhoefm
 
Lifi TECHNOLOGY REPORT
Lifi TECHNOLOGY REPORTLifi TECHNOLOGY REPORT
Lifi TECHNOLOGY REPORTonkarbhujbal
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerMohamed Atef
 
Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptAmar Raj
 
Mobile phone detector pdf
Mobile phone detector pdfMobile phone detector pdf
Mobile phone detector pdfVamshi Varun
 
Cellphone detector report
Cellphone detector reportCellphone detector report
Cellphone detector reportvenu13
 

Viewers also liked (10)

Cell phone detector & jammer
Cell phone detector & jammerCell phone detector & jammer
Cell phone detector & jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot
ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot
ROBOTICS PROJECTS ABSTRACT-Cellphone controlled 3axisrobot
 
защита от перехЗащита от перехвата GSM сигналавата Gsm сигнала
защита от перехЗащита от перехвата GSM сигналавата Gsm сигналазащита от перехЗащита от перехвата GSM сигналавата Gsm сигнала
защита от перехЗащита от перехвата GSM сигналавата Gsm сигнала
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardware
 
Lifi TECHNOLOGY REPORT
Lifi TECHNOLOGY REPORTLifi TECHNOLOGY REPORT
Lifi TECHNOLOGY REPORT
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone Jammer
 
Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer ppt
 
Mobile phone detector pdf
Mobile phone detector pdfMobile phone detector pdf
Mobile phone detector pdf
 
Cellphone detector report
Cellphone detector reportCellphone detector report
Cellphone detector report
 

Similar to Cell phone jammer presentation

Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd Iaetsd
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptxDyarAbubakr
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksIJMER
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerAvay Minni
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyVenky Venkatesh
 
mobilejammer
mobilejammermobilejammer
mobilejammerNaga Dinesh
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networksijtsrd
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2mgnboy
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent JammerPrejith Pavanan
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile JammerrSwarna Gautam
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxLingaSwamy10
 
Best abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libreBest abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libreNavin Mishra
 
Mobile Signal jammer
Mobile Signal jammerMobile Signal jammer
Mobile Signal jammerJubayer Rahman
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer pptAmit sundaray
 

Similar to Cell phone jammer presentation (20)

Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
Presentation1
Presentation1Presentation1
Presentation1
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
Cell phone jammers
Cell phone jammersCell phone jammers
Cell phone jammers
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile Jammerr
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
Best abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libreBest abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libre
 
Govind
GovindGovind
Govind
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
 
Mobile Signal jammer
Mobile Signal jammerMobile Signal jammer
Mobile Signal jammer
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Study on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube ExchangerAnamika Sarkar
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĂŁo Esperancinha
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Study on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ďťżTube Exchanger
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 

Cell phone jammer presentation

  • 1. Cell phone jammer withprescheduledtime duration ABSTRACT Mobile INTRODUCTION Communication jamming device were first developed and used by military. This interest comes from the fundamental objective of denying the successful transport of information from the sender (tactical commander) to the receiver (the army personnel), and vice-versa. Nowadays, mobile phones are becoming essential toolin our daily life. The technology behind cell phonejamming is very simple. Thewidely use the mobile phone could create some problems as the sound of ringing becomes annoying or disrupting. This could happen in some places like conference room, aw court, libraries, lecture room and mosques. The jamming device broadcasts an RF signal in the frequency range reserved for cell phones that interference with the cell phone signal, which results in a “no network available” display on the cell phone screen. All phones with in the effective radius of the jammer are science. It should be mentioned that cell phone jammers are illegal devices in most countries. A mobile phone jammer is an instrument used to prevent cellular phones from receiver signal from based station. When used, the jammer effectively disables
  • 2. Cell phone jammer withprescheduledtime duration cellular phones (fig 1). This device can be used in practically any location, but are found primarily in places where a phone call would be particularly in places where a phone call would be particularly disruptive because silence is expected. As with other radio jamming, cell phone jammers block cell phone use by sending out radio waves along the same frequencies that cellular phone use. These causes enough interface with the communication between cell phones and towers to radar the phones unusable. On most retail phones, the network would simply appear out of range. Most cell phones use different bands to send and receive communications from towers (called frequency division depleting, FDD). Jammers can work by either disrupting phone to tower frequencies or tower to phone frequencies. Smaller handheld models block all bands from 800 MHz to 1900 MHz within a 30-foot range (9meters). Small devices tend to used the former method, while larger more expensive models many interfere directly with the tower. The GSM jammer is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phone in the area where the jammer is located can‟t communicate, the basic idea military use that was called denial ofservice attack. Mobile jammer is used to prevent mobile phone from receiving or transmitting signal with the base stations. When used, the jammer effectively disables cellular phones as shown in fig 2. There are several ways to jam an RF device. The three most common techniques can be categorized as follows In this kind of jamming, the device forces the mobile to turn off itself. This type is very difficult to be implemented since the jamming device first detects any mobile phone in a specific area, then the device sends the signal to disable the mobile phone .some type of this technique can detect if a nearby mobile phone is there and sends a message to tell the user to switch the phone to the silent mode (intelligent beacon disablers). Shielding attacks: This is known as TEMPEST or EMF shielding. This
  • 3. Cell phone jammer withprescheduledtime duration kind required closing an area in a faraday cage so that any device inside this cage cannot transmit orreceiver RF signal from outside ofthe cage. This area can belarge as buildings. Denial of service: This technique is referred to DOS. In this technique, the device transmits a noise signal at the same operating frequency of the mobile phone in order to decrease the signal -to-noise ratio (SNR) of the mobile under its minimum value. This kind ofjamming technique is the simplest one since the device is always on. Our device is of this type. The systemthat to setthe scheduled time duration for mobile jammer. The activation and deactivation time schedules can beprogrammed with microcontroller. In order to run the RTC (real time clock) one crystal oscillator is externally interfaced, an oscillator is an electronic circuit that produces a repetitive electronic signal. The power supply interfaced it is used to battery backup for the purpose of update the time when the absence of power. The A.C input i.e., 230v from the mains supply is step down by the transformer to 12v and is fed to a rectifier. One reset button interface, Reset is used for putting the microcontroller into a „known‟ condition. That partially means that microcontroller can behave rather inaccurately under certain undesirable condition. In order to continuous its proper functioning it has to be reset. Relay is an electrically controllable switch widely used in industrial controls, automobile and appliances.
  • 4. Cell phone jammer withprescheduledtime duration LITERATURE SURVEY 2014, ShantanuKrishna Mahato, C.vimala Cell phones are everywhere these days. It’s great to be able to call anyone at anytime. Unfortunately, restaurants, public places, class room, shopping malls and churches all suffer from the spread of cell phones because not all cell-phone users know when to stop talking while mostof us just grumble and move on, some people are actually going to extremes to retaliate. Mobile jammer is a device used to prevent mobile phones from receiving or transmitting signals with the base stations. In this paper, we have to jam a cell phone, all we are developing a device that broadcasts on the correct frequencies. Although different cellular systems process signals differently, all cell-phone networks use radio signals that can be interrupted. GSM, used in digital cellular and PCS-based systems, operates inthe 900-MHz, 1800-MHz and WCDMA 2100 bands in Europe and Asia and in the 1900- MHz band in the United States. Jammers can broadcast on any frequency and are effective against WCDMA, GSM and DCS. This project discusses the design and development of GSM Mobile jammer and aims to present a solution for the problems of occur through the cell phone. The main concept of jamming is the releasing of same
  • 5. Cell phone jammer withprescheduledtime duration frequency which is using by mobile service provider with noise so user equipment gets destruct. EXISTING SYSTEM In market, there are various types of jamming devices available which are using different jamming techniques. Some of thosedevices are built with only one feature in it like it will jam only 2G network compatible cell phones. This type of device comes with several independent oscillators transmitting jamming signals capable of blocking frequencies used by paging devices as well as those used by cellular systems control channels for call establishment. IT does not transmit an interfering signal on the controlchannels. Thedevice, when located in the designated quite area, functions as a detector. Ithas a unique identification number forcommunicating with the cellular base station. The device, when located in the designated quite area, functions as a beacon and any compatible terminal s instructed to disable its ringer or disable its operation, while within the coverage area of beacon. It behaves like a small, independent and portable base station, which can directly interact with the operation ofthe local mobile phone. The jammer is predominantly in receiving mode and will choose to interact and block the cell phone directly if it is within close proximity of the jammer. Although labor intensive to construct, the Faraday cage essentially Blocks or greatly attenuates, virtually all electromagnetic radiation from entering or leaving the cage or in this case a target room. DISADVANTAGES  OFMD is highly sensitive to STO. Due to the use of IFFT and FFT for modulation and demodulation at transmitter and receiver respectively, correct timing is required at the
  • 6. Cell phone jammer withprescheduledtime duration  It is highly sensitive to carrier frequency offset. Mostofthe advantages of the orthogonal nature of sub-carriers and this orthogonality between sub carriers will be destroyed if frequency offset arises between them. The major cause of CFO is Doppler shifts (due to relative motion between transmitter and channel.  The transmitted signal of OFDM exhibits a high Peak-To-Average Power Ratio (PAPR). This high PAPR reduces the efficiency of high power amplifier and degrades the performance of the system.
  • 7. Cell phone jammer withprescheduledtime duration PROPOSED SYSTEM We have designed and developed a project based on hardware viewing concept “Mobile Jammer” which blocks the mobile networks of a designated area that are receiving their 3G network from the base stations. A jammer is any device that deliberately blocks, jam or interferes with authorized wireless communications . In many countries, jammers are illegal and their use can result in large fines. A mobile phone jammer is an instrument used to prevent cellular phones from receiving signal from based station. Jammer should recognize that power. Power of jamming signal should match the power increase from the phone. Sophisticated jammers can block several networks to head offdual or tri-mode phonethat automatically switch among different network to fin It overpowers the mobile receiving networks bytransmitting the same frequency received by mobile phones. We have designed a block diagram of mobile jammer which shows the flow of our project. We have designed it in a way which gives full details about each block, how a jamming signal is transmitting i.e. how it will jam a mobile phone.
  • 8. Cell phone jammer withprescheduledtime duration BLOCK DIAGRAM
  • 9. Cell phone jammer withprescheduledtime duration WORKING PRINCIPLE The block diagram of the system that to set the scheduled time duration for mobile jammer. The activation and deactivation time schedules can be programmed with microcontroller. In order to run the RTC (real time clock) one crystal oscillator is externally interfaced, an oscillator is an electronic circuit that produces a repetitive electronic signal. The power supply interfaced it is used to battery backup for the purpose of update the time when the absence of power. The A.C input i.e., 230v from the mains supply is step down bythe transformer to 12v and is fed to a rectifier. One reset button interface, Reset is used for putting the microcontroller into a
  • 10. Cell phone jammer withprescheduledtime duration „known‟ condition. That partially means that microcontroller can behave rather inaccurately under certain undesirable condition. In order to continuous its proper functioning it has to bereset. Relay is an electrically controllable switch widely used in industrial controls, automobile and appliances. One LCD (liquid crystal display) also interface in this micro controller, it is flat electronic visual display that used that use the light modulating properties of liquid crystals. These components are specialized for being used with the microcontrollers, which means that they cannot be activated by standard IC circuits. RTC (real time clock) is interface because it is widely used device that provides accurate time and date for many applications. LED indicator interface in this microcontroller it have a life of at last ten years and consumer 90 percent less power than conventional indicators, depend on the type of the materials (Ga, AS, p). ADVANTAGES Less Implementation Complexity Robustness Against Narrowband Interference Immune to Frequency Selective Fading High Spectral Efficiency Using 3g network for speed
  • 11. Cell phone jammer withprescheduledtime duration SOFTWARE DISCRIPSION PIC KIT-2 SOFTWARE Information contained in this publication regarding device applications and the like is provided only for your convenience and may be superseded by updates. It is your responsibility to ensure that your application meets with your specifications. Microchip makes no representations or warranties ofany kind whether express or implied, written or oral, statutory or otherwise, related to the information, including but not limited to its condition, quality, performance, merchantability or fitness for purpose. Microchip disclaims all liability arising from this information and its use. Use of microchip devices in life support and/or safety applications is entirely at the buyers risk, and the buyer agrees to defend, indemnify and hold harmless microchip from any and all damages, claims, suits, or expenses resulting from such use. No licenses are conveyed, implicitly or otherwise, under any microchip intellectual property rights The PICKit 2 Development Programmer/Debugger kit contains the following items: 1. The PICKit 2 Development Programmer/Debugger 2. USB cable 3. PICKit Starter Kit and MPLAB IDE CD-ROMs Additionally, the PICKit 2 Starter Kit and PICKit 2 Debug Express kit both contain a demo board with a PIC microcontroller device. The PICKit 2 Development Programmer/Debugger is a low-cost development programmer. It is capable of programming most of Microchips Flash microcontrollers and serial EEPROM devices. For specific device support, see the README file included on the PICKit 2 Starter Kit CD-ROM.
  • 12. Cell phone jammer withprescheduledtime duration PICKit 2 PROGRAMMER APPLICATION The PICKit 2 Programmer application allows you to program all supported devices listed in the PICKit 2 Readme file. The programming interface appears. Its controls are listed in the following sections. For more information on how to install and use the PICKit 2 Programmer application, see Chapter 2. Picket 2 Programmers Getting Started.
  • 13. Cell phone jammer withprescheduledtime duration Menu Bar The menu bar selects various functions of the PICKit 2 Programmer application. A summary of the functions are: File Import Hex. Import a hex file for programming. The hex file format INHX32 is supported. Export Hex. Export a hex file read from a device. The hex file is created in the NHX32 format. File History Up to the last four hex files opened are displayed with their file path. These recent hex files may be selected to quickly import them. Note that the file history will initially be blank on a new installation until a hex file is imported. Exit. Exit the program. DOT NET C# Develop and Deliver Enterprise-Critical Desktop and Web Applications with C# .NET • Complete Case Studies with Ready-to-Run Source Codeand Full Explanations • Hundreds ofDeveloping & Deploying, Migrating, and Debugging Sidebars, Security Alerts, and C# .NET FAQs • Complete Coverage of Web Services and the Integrated Development Environment (IDE) This CD-ROM contains the code files that are used in each chapter of this book. Thecodefiles for each chapter are located in a chXX directory (for example, the files for are in the ch08 directory).Any further directory structure depends on the projects that are presented within the chapter. To work with the examples provided, you will need at least the Windows 2000 or Windows XP Professional operating
  • 14. Cell phone jammer withprescheduledtime duration system with the latest service packs, IIS 5.x, and IE 6.0, since ASP.NET and Web Services (a part of ASP.NET) are not supported on earlier operating systems such as Windows 9x/Windows ME/Windows NT. Also needed is the .NET SDK Beta2 (the latest public release available while writing this book) and the Visual Studio.NET Beta2 IDE. The C# .NET Web Developer’s Guide provides you with extensive examples that will help solve the problems you might face while developing applications for the .NET Platform rather than concentrating on the theory of C# and .NET programming. Therefore code is the main feature of this book. The chapters contain bothcodesnippets and sample programs that illustrate the principles discussed. Chapter 2 presents a series of sample programs that introduce concepts in C# that are different from other object-oriented languages. Chapter 4 helps you understand the basics of building Graphical User Interface (GUI)-rich Windows Forms applications; the examples presented in this chapter are the launch pad for Windows Forms applications used in other chapters. Similarly, code presented in Chapter 8 helps you to interact with various databases using ADO.NET; again, this chapter acts as a foundation for further chapters’ database coverage. Chapter 9 will acquaint you with using .NET Class Libraries to interact with XML and its related technologies. Discuss technologies and Application Program Interfaces (APIs) that help two applications to communicate and interact with each other. focuses on enabling applications to communicate over the TCP and UDP protocols and provides an overview of the techniques used to interact with Web pages programmatically. Code examples in Chapter 6 and Chapter11 concentrate onusing Simple ObjectAccess Protocol(SOAP) and object serialization and de serialization. Formany years, C and C++ programmers have been searching for alternative programming languages that offer the same kind offlexibility and powerofC and C++, but without the complexities and steep learning curve required for mastery of the
  • 15. Cell phone jammer withprescheduledtime duration language. What many programmers desired was a language that would allow applications to be built rapidly, but at the same time giving them the ability to codeat low level. The search has finally ended with Microsoft’s new language—C#, a member of the .NET Framework. C# is the revolutionary new language from Microsoft, designed solely to run on the .NET framework. Drawing experiences from C, C++, and Visual Basic, C# was designed to bea simple and modern objectoriented programming language. But why learn C#? With the integration of C# and the Visual Studio.NET (known as Visual C#), developing Windows and Web applications has been radically simplified. With full access to the .NET Class Libraries, C# includes built-in support for developing robustWeb services and ASP.NET applications. (It was reportedly said that Visual Studio.NET was built entirely using C# and that most of the examples in MSDN were coded in C#.That in and of itself is a very good reason to learn C#!) Besides this, C# enhances the productivity of programmers by eliminating common errors often associated with C and C++. While many of the earlier C# books have primarily focused on the language syntax, The C# .NET Web Developer’s Guide illustrates the uses of C# for Web developers looking to harness the new functionality and ease of this powerful programming language. he bestway to learn a new language is by trying out the examples while you are reading this book. Within many chapters, you will find numerous codeexamples used in various practical situations; this hands- on, code-intensive approach allows you to have a deeper understanding of issues involved in C# Web development, and at the same time allows you to cut and paste portions of applicable codeinto your current projects, thereby shortening development time. HARDWARE REQUIREMENT 1. POWER SUPPLY 2. MICROCONTROLLER
  • 16. Cell phone jammer withprescheduledtime duration 3. LCD DISPLAY 4. MOTORS POWER SUPPLY In most of our electronic products or projects we need a power supply for converting mains AC voltage to a regulated DC voltage. Formaking a power supply designing of each and every component is essential. Here I’m going to discuss the designing of regulated 5V Power Supply. Let’s start with very basic things the choosing of components Component List : 1. Step down transformer 2. Voltage regulator 3. Capacitors 4. Diodes Let’s get into detail of rating of the devices: 7805 IC Rating :  Input voltage range 7V- 35V  Current rating Ic = 1A  Output voltage range VMax=5.2V ,VMin=4.8V
  • 17. Cell phone jammer withprescheduledtime duration LM7805 – Pin Diagram Transformer: Selecting a suitable transformer is of great importance. The current rating and the secondaryvoltage of the transformer is a crucial factor.  The current rating of the transformer depends upon the current required for the load to be driven.  The input voltage to the 7805 IC should be at least 2V greater than the required 2V output; therefore it requires an input voltage at least close to 7V.  So I chosea 6-0-6 transformer with current rating 500mA (Since 6*√2 = 8.4V). MICROCONTROLLER High-Performance RISC CPU: • Only 35 single-word instructions to learn • All single-cycle instructions except for program branches, which are two-cycle • Operating speed:DC – 20 MHz clock input DC – 200 ns instruction cycle • Up to 8K x 14 words ofFlash Program Memory, Up to 368 x 8 bytes of Data Memory (RAM), Up to 256 x 8 bytes of EEPROM Data Memory
  • 18. Cell phone jammer withprescheduledtime duration • Pin out compatible to other 28-pin or 40/44-pin PIC16CXXX and PIC16FXXX microcontrollers Peripheral Features: • Timer0: 8-bit timer/counter with 8-bit prescaler • Timer1: 16-bit timer/counter with prescaler, can be incremented during Sleep via external crystal/clock • Timer2: 8-bit timer/counter with 8-bit period register, prescaler and postscaler • Two Capture, Compare, PWM modules - Capture is 16-bit, max. Resolution is 12.5 ns - Compare is 16-bit, max. Resolution is 200 ns - PWM max. Resolution is 10-bit • Synchronous Serial Port(SSP) with SPI™ (Master mode) and I2C™ (Master/Slave) • Universal Synchronous Asynchronous Receiver Transmitter (USART/SCI) with 9- bit address detection • Parallel Slave Port(PSP) – 8bits wide with external RD, WR and CS controls (40/44- pin only) • Brown-out detection circuitry for Brown-out Reset (BOR) Analog Features: • 10-bit, up to 8-channel Analog-to-Digital Converter (A/D) • Brown-out Reset (BOR) • Analog Comparator module with: - Two analog comparators - Programmable on-chip voltage reference (VREF) module - Programmable input multiplexing from device inputs and internal voltage reference - Comparator outputs are externally accessible Special Microcontroller Features:
  • 19. Cell phone jammer withprescheduledtime duration • 100,000 erase/write cycle Enhanced Flash program memory typical • 1,000,000 erase/write cycle Data EEPROM memory typical • Data EEPROM Retention > 40 years • Self-reprogrammable under software control • In-Circuit Serial Programming™ (ICSP™)via two pins • Single-supply 5V In-Circuit Serial Programming • Watchdog Timer (WDT) with its own on-chip RC oscillator for reliable operation • Programmable codeprotection • Power saving Sleep mode • Selectable oscillator options • In-Circuit Debug (ICD) via two pins CMOS Technology: • Low-power, high-speed Flash/EEPROM technology • Fully static design • Wide operating voltage range (2.0V to 5.5V) • Commercial and Industrial temperature ranges • Low-power consumption
  • 20. Cell phone jammer withprescheduledtime duration DEVICE OVERVIEW This document contains device specific information about the following devices: • PIC16F873A • PIC16F874A • PIC16F876A • PIC16F877A PIC16F873A/876A devices are available only in 28-pin packages, while PIC16F874A/877A devices are available in 40-pin and 44-pin packages. All devices in the PIC16F87XA family share commonarchitecture with the following differences:
  • 21. Cell phone jammer withprescheduledtime duration • The PIC16F873A and PIC16F874A have one-half of the total on-chip memory ofthe PIC16F876A and PIC16F877A • The 28-pin devices have three I/O ports, while the 40/44-pin devices have five • The 28-pin devices have fourteen interrupts, while the 40/44-pin devices have fifteen • The 28-pin devices have five A/D input channels, while the 40/44-pin devices have eight • The Parallel Slave Port is implemented only on the 40/44-pin devices. The available features are summarized. Block diagrams of the PIC16F873A/876A and PIC16F874A/877A devices are provided respectively. The pin outs for these device families are listed. Additional information may be found in the PICmicroÂŽ Mid-Range Reference Manual (DS33023), which may be obtained from your local Microchip Sales Representative or downloaded from the Microchip web site. The Reference Manual should be considered a complementary document to this data sheet and is highly recommended reading for a better understanding of the device architecture and operation of the peripheral modules. MEMORYORGANIZATION There are three memory blocks in each of the PIC16F87XA devices. The program memory and data memory have separate buses so that concurrent access can occurand is detailed in this section. The EEPROM data memory block is detailed “Data EEPROM and Flash Program Memory”. Additional information on device memory may be found in the PICmicroÂŽ Mid-Range MCU Family Reference Manual. Program Memory Organization The PIC16F87XA devices have a 13-bit program counter capable of addressing an 8K word x 14 bit program memory space. The PIC16F876A/877A devices have 8K words x 14 bits of Flash program memory, while PIC16F873A/874A devices have 4K words x 14 bits. Accessing a location above the physically implemented address will causea wraparound. The Reset vectoris at 0000h and the interrupt vector is at 0004h.
  • 22. Cell phone jammer withprescheduledtime duration Data Memory Organization The data memory is partitioned into multiple banks which contain the General Purpose Registers and the Special Function Registers. Bits RP1(Status<6>) and RP0 (Status<5>) are the bank select bits. Status Register The Status register contains the arithmetic status of the ALU, the Reset status and the bank select bits for data memory. The Status register can be the destination for any instruction, as with any other register. If the Status register is the destination for an instruction that affects the Z, DC or C bits, then the write to these three bits is disabled. These bits are set or cleared according to the device logic. Furthermore, the TO and PD bits are not writable, therefore, the result of an instruction with the Status register as destination may be different than intended. DATA EEPROM AND FLASH PROGRAM MEMORY The data EEPROM and Flash program memory is readable and writable during normal operation (over the full VDD range). This memory is not directly mapped in the register file space. Instead, it is indirectly addressed through the Special Function Registers. There are six SFRs used to read and write this memory: • EECON1 • EECON2 • EEDATA • EEDATH • EEADR • EEADRH When interfacing to the data memory block, EEDATA holds the 8-bit data for read/write and EEADR holds the address of the EEPROM location being accessed. These devices have 128 or 256 bytes of data EEPROM (depending on the device), with an address range from 00h to FFh. On devices with 128 bytes, addresses from 80h to FFh are unimplemented and will wraparound to the beginning of data EEPROM memory. When writing to unimplemented locations, the on-chip charge pump will be turned off. When interfacing the program memory block, the EEDATA and EEDATH registers form a
  • 23. Cell phone jammer withprescheduledtime duration two-byte word that holds the 14-bit data for read/write and the EEADR and EEADRH registers form a two-byte word that holds the 13-bit address of the program memory location being accessed. Thesedevices have 4 or 8K words of program Flash, with an address range from 0000h to 0FFFh for the PIC16F873A/874A and 0000h to 1FFFh for the PIC16F876A/877A. Addresses above the range of the respective device will wraparound to the beginning of program memory. The EEPROM data memory allows single-byte read and write. The Flash program memory allows single-word reads and four-word block writes. Program memory write operations automatically perform an erase-beforewrite on blocks of four words. A byte write in data EEPROM memory automatically erases the location and writes the new data (erase-before-write). The write time is controlled by an on-chip timer. The write/erase voltages are generated by an on-chip charge pump, rated to operate over the voltage range of the device for byte or word operations. When the device is code-protected, the CPUmay continue to read and write the data EEPROM memory. Depending on the settings of the write-protect bits, the device may ormay not be able to write certain blocks of the program memory; however, reads of the program memory are allowed. When code-protected,the device programmer can no longer access data or program memory; this does NOT inhibit internal reads or writes. I/O PORTS Some pins for these I/O ports are multiplexed with an alternate function for the peripheral features on the device. In general, when a peripheral is enabled, that pin may not be used as a general purposeI/O pin. Additional information on I/O ports may be found in the PICmicro™ Mid-Range Reference Manual (DS33023). PORTAand the TRISA Register
  • 24. Cell phone jammer withprescheduledtime duration PORTAis a 6-bit wide, bidirectional port. The corresponding data direction register is TRISA. Setting a TRISA bit (= 1) will make the corresponding PORTA pin an input (i.e., put the corresponding output driver in a High-Impedance mode). Clearing a TRISA bit (= 0) will make the corresponding PORTA pin an output (i.e., put the contents of the output latch on the selected pin). Reading the PORTAregister reads the status of the pins, whereas writing to it will write to the portlatch. All write operations are read-modify-write operations. Therefore, a write to a portimplies that the portpins are read, the value is modified and then written to the port data latch. Pin RA4 is multiplexed with the Timer0 module clock input to become the RA4/T0CKI pin. The RA4/T0CKI pin is a Schmitt Trigger input and an open-drain output. All other PORTA pins have TTL input levels and full CMOS output drivers. Other PORTA pins are multiplexed with analog inputs and the analog VREF input for boththe A/D converters and the comparators. The operation of each pin is selected by clearing/setting the appropriate controlbits in the ADCON1 and/or CMCON registers. PORTB and the TRISB Register PORTB is an 8-bit wide, bidirectional port. The corresponding data direction register is TRISB. Setting a TRISB bit (= 1) will make the correspondingPORTB pin an input (i.e., put the corresponding output driver in a High-Impedance mode). Clearing a TRISB bit (= 0) will make the corresponding PORTB pin an output (i.e., put the contents of the output latch on the selected pin). Three pins of PORTB are multiplexed with the In-Circuit Debugger and Low-Voltage Programming function: RB3/PGM, RB6/PGC and RB7/PGD. The alternate functions of these pins are described in Section 14.0 “Special Features of the CPU”. Each of the PORTBpins has a weak internal pull-up. A single control bit can turn on all the pull-ups. This is performed by clearing bit RBPU (OPTION_REG<7>). The weak pull-up is
  • 25. Cell phone jammer withprescheduledtime duration automatically turned off when the portpin is configured as an output. The pull-ups are disabled on a Power-on Reset. PORTC and the TRISC Register PORTC is an 8-bit wide, bidirectional port. The corresponding data direction register is TRISC. Setting a TRISC bit (= 1) will make the correspondingPORTC pin an input (i.e., put the corresponding output driver in a High-Impedance mode). Clearing a TRISC bit (= 0) will make the corresponding PORTC pin an output (i.e., put the contents of the output latch on the selected pin). PORTC is multiplexed with several peripheral functions (Table 4-5). PORTC pins have Schmitt Trigger input buffers. When the I2C module is enabled, the PORTC<4:3> pins can be configured with normal I2C levels, or with SMBus levels, by using the CKE bit (SSPSTAT<6>). When enabling peripheral functions, care should be taken in defining TRIS bits for each PORTC pin. Some peripherals override the TRIS bit to make a pin an output, while other peripherals override the TRIS bit to make a pin an input. Since the TRIS bit override is in effect while the peripheral is enabled, read-modify write instructions (BSF, BCF, XORWF) with TRISC as the destination, should be avoided. The user should refer to the corresponding peripheral section for the correctTRIS bit settings. PORTD and TRISD Registers PORTD is an 8-bit port with Schmitt Trigger input buffers. Each pin is individually configurable as an input or output. PORTD can be configured as an 8-bit wide microprocessor port (Parallel Slave Port) by setting control bit, PSPMODE (TRISE<4>). In this mode, the input buffers are TTL. PORTE and TRISE Register
  • 26. Cell phone jammer withprescheduledtime duration PORTE has three pins (RE0/RD/AN5, RE1/WR/AN6 and RE2/CS/AN7) which are individually configurable as inputs or outputs. These pins have Schmitt Trigger input buffers. The PORTE pins become the I/O control inputs for the microprocessor port when bit PSPMODE (TRISE<4>) is set. In this mode, the user must make certain that the TRISE<2:0> bits are set and that the pins are configured as digital inputs. Also, ensure that ADCON1 is configured for digital I/O. In this mode, the input buffers are TTL. Register 4-1 shows the TRISEregister which also controls the Parallel Slave Port operation. PORTEpins are multiplexed with analog inputs. When selected for analog input, these pins will read as ‘0’s. TRISE controls the direction of the RE pins, even when they are being used as analog inputs. The user must make sure to keep the pins configured as inputs when using them as analog inputs. ParallelSlave Port The Parallel Slave Port(PSP)is not implemented on the PIC16F873A orPIC16F876A. PORTD operates as an 8-bit wide Parallel Slave Port, or microprocessor port, when control bit PSPMODE (TRISE) is set. In Slave mode, it is asynchronously readable and writable by the external world through RD control input pin, RE0/RD/AN5, and WR control input pin, RE1/WR/AN6. The PSP can directly interface to an 8-bit microprocessor data bus. The external microprocessor can read or write the PORTD latch as an 8-bit latch. Setting bit PSPMODE enables portpin RE0/RD/AN5 to be the RD input, RE1/WR/AN6 to be the WR input and RE2/CS/AN7 to be the CS (Chip Select) input. Forthis functionality, the correspondingdata direction bits ofthe TRISE register (TRISE) must be configured as inputs (set). The A/D port configuration bits, PCFG3:PCFG0 (ADCON1), must be set to configure pins RE2:RE0 as digital I/O. There are actually two 8-bit latches: one for data output and one for data input. The user writes 8-bit data to the PORTD data latch and reads data from the port pin latch (note that they have the same address). In this mode, the TRISD register is ignored
  • 27. Cell phone jammer withprescheduledtime duration since the external device is controlling the direction of data flow. A write to the PSP occurs when both the CS and WR lines are first detected low. When either the CS or WR lines become high (level triggered), the Input Buffer Full (IBF) status flag bit (TRISE) is set on the Q4 clock cycle, following the next Q2 cycle, to signal the write is complete. The interrupt flag bit, PSPIF (PIR1), is also set on the same Q4 clock cycle. IBF can only be cleared by reading the PORTD input latch. The Input Buffer Overflow (IBOV) status flag bit (TRISE) is setif a second write to the PSP is attempted when the previous byte has not been read out of the buffer. A read from the PSP occurs when both the CS and RD lines are first detected low. The Output Buffer Full (OBF) status flag bit (TRISE) is cleared immediately indicating that the PORTD latch is waiting to be read by the external bus. When either the CS or RD pin becomes high (level triggered), the interrupt flag bit PSPIF is set on the Q4 clock cycle, following the next Q2 cycle, indicating that the read is complete. OBF remains low until data is written to PORTDby the user firmware. TIMER0 MODULE The Timer0 module timer/counter has the following features: • 8-bit timer/counter • Readable and writable • 8-bit software programmable prescaler • Internal or external clock select • Interrupt on overflow from FFhto 00h • Edge select for external is a block diagram of the Timer0 module and the prescaler shared with the WDT. Additional information on the Timer0 module is available in the PICmicroÂŽ Mid-Range MCU Family Reference Manual (DS33023). Timer mode is selected by clearing bit T0CS (OPTION_REG<5>). In Timer mode, the Timer0
  • 28. Cell phone jammer withprescheduledtime duration module will increment every instruction cycle (without prescaler). If the TMR0register is written, the increment is inhibited for the following two instruction cycles. The user can work around this by writing an adjusted value to the TMR0 register. Counter mode is selected by setting bit T0CS (OPTION_REG<5>). In Counter mode, Timer0 will increment either on every rising or falling edge of pin RA4/T0CKI. The incrementing edge is determined by the Timer0 SourceEdge Select bit, T0SE (OPTION_REG<4>). Clearing bit T0SE selects the rising edge. Restrictions on the external clock input are discussed in detail “Using Timer0 with an External Clock”. The prescaler is mutually exclusively shared between the Timer0 module and the WatchdogTimer. The prescaler is not readable or writable. “Prescaler” details the operation of the prescaler. TIMER1 MODULE The Timer1 module is a 16-bit timer/counter consisting of two 8-bit registers (TMR1H and TMR1L) which are readable and writable. The TMR1 register pair (TMR1H:TMR1L) increments from 0000h to FFFFh and rolls over to 0000h. The TMR1 interrupt, if enabled, is generated on overflow which is latched in interrupt flag bit, TMR1IF (PIR1<0>). This interrupt can beenabled/disabled bysetting/clearing TMR1 interrupt enable bit, TMR1IE (PIE1<0>). Timer1 can operate in one of two modes: • As a Timer • As a Counter The operating mode is determined by the clock select bit, TMR1CS (T1CON<1>). TIMER2 MODULE Timer2 is an 8-bit timer with a prescaler and a postscalar. It can be used as the PWM time base for the PWM mode of the CCP module(s). The TMR2 register
  • 29. Cell phone jammer withprescheduledtime duration is readable and writable and is cleared on any device Reset. The input clock (FOSC/4) has a prescaler option of 1:1, 1:4 or 1:16, selected by controlbits T2CKPS1:T2CKPS0 (T2CON<1:0>). The Timer2 module has an 8-bit period register, PR2. Timer2 increments from 00h until it match PR2 and then resets to 00h on the next increment cycle. PR2 is a readable and writable register. The PR2 register is initialized to FFh upon Reset. The match output of TMR2 goes through a 4-bit postscalar (which gives a 1:1 to 1:16 scaling inclusive) to generate a TMR2 interrupt (latched in flag bit, TMR2IF (PIR1<1>)). Timer2 can be shut-off by clearing control bit, TMR2ON (T2CON<2>), to minimize power consumption. CAPTURE/COMPARE/PWM MODULES Each Capture/Compare/PWM (CCP) module contains a 16-bit register which can operate as a: • 16-bit Capture register • 16-bit Compare register • PWM Master/Slave Duty Cycle register Both the CCP1and CCP2modules are identical in operation, with the exception being the operation of the special event trigger. Table 8-1 and Table 8-2 show the resources and interactions of the CCP module(s). In the following sections, the operation of a CCP module is described with respect to CCP1. CCP2 operates the same as CCP1 except where noted. CCP1Module: Capture/Compare/PWM Register 1 (CCPR1) is comprised of two 8-bit registers: CCPR1L (low byte) and CCPR1H (high byte). The CCP1CON register controls the operation ofCCP1. The special event trigger is generated by a comparematch and will reset Timer1.
  • 30. Cell phone jammer withprescheduledtime duration LCD 16X2 Alphanumeric displays are used in a wide range of applications, including palmtop computers, word processors, photocopiers, point of sale terminals, medical instruments, cellular phones, etc. The 16 x 2 intelligent alphanumeric dot matrix displays is capable ofdisplaying 224 different characters and symbols. A full list ofthe characters and symbols is printed on pages 7/8 (note these symbols can vary between brand of LCD used). This booklet provides all the technical specifications for connecting the unit, which requires a single power supply (+5V). Available as an optional extra is the Serial LCD Firmware, which allows serial control of the display. This option provides much easier connection and use of the LCD module. The firmware enables microcontrollers (and microcontroller based systems such as the PICAXE) to visually output user instructions or readings onto an LCD module. All LCD commands are transmitted serially via a single microcontroller pin. The firmware can also be connected to the serial port of a computer. MOTOR The unit operates on 1.5 - 3v (917D & 917D/A, also with higher torque motor 920D & 920D/A), or 12-24v (927D & 927D/A) D.C. power sources, either battery or suitable transformer. Its simple versatile design and sturdy construction make it suitable for a hostof uses from powering models and robots to teaching the principles of mechanics. Current consumptiondepends oneventual load but is within the range 0.2 to 0.8n amps. The output shaft is 3mm diameter. Designed for heavy-duty industrial and model applications this robust unit boasts a powerful high quality, three pole motor with sintered bronze bearings. The all steel gearbox incorporates bronze output bearings, enabling the high torque transfer from the motor to be transmitted through the gearbox. The unit is mounted on a 1mm thick plated steel bracket.
  • 31. Cell phone jammer withprescheduledtime duration RF section: This is the most important part of the jammer, since the output of this section will be interfacing with the mobile. The RF-section consists of three main parts: voltage controlled oscillator VCO, power amplifier and antenna. The voltage controlled oscillator (VCO) is the heart of the RF-section. It is the device that generates the RF signal which will interfere with the cell phone. The output of the VCO has a frequency which is proportional to the input voltage, thus, we can control the output frequency by changing the input voltage. When the input voltage is DC, the output is a specific frequency, while if the input is a triangular waveform, the output will span a specific frequency range. In our design, we need to find a VCO for GSM 900 and GSM 1800. There are three selection criteria for selecting a VCO for this application. Most importantly, it should cover the bands that we need, secondly, it should be readily available at low cost, and finally, it should run at low power consumption. Moreover, we need to minimize the size of GSM-jammer. So, we started to search through the internet for VCO's that work for GSM 900 & GSM 1800 bands. Finally, we found the following VCO IC’s:- CVCO55BE; this is for GSM 1800. The output frequency is 1785-1900 MHz and the output power is up to 5 dBm. CVCO55CL; this is for GSM 900. The output frequency is 925-970 MHz and the output power is up to 8 dBm. We chosethese IC’s for the following reasons:- [A] Surface mount, which reduces the size of product. [B] Having large output power that reduces the number of amplification stages that we need. [C] Having same value of power supply which is typically equal to 5 volt.
  • 32. Cell phone jammer withprescheduledtime duration [D] Having same noise properties. CONCLUSION While testing a jammer we observed that jamming range depends on surroundings and signal strength in that surrounding. In low network areas, the jamming range increases to 20 meters also. In general, the jamming attack was protected bynetwork signal power, and having jammer with high power there is guarantee of jamming quickly. From above all observation, it can be concluded that the cell phone jammer worked efficiently And its automatically deactivated by using the frequency generator.A most of the areas where there is need to jam the signal for maintaining silence and peace for the people. Also there is need of more powerful jamming devices for large space. However our jammer is effective in short space
  • 33. Cell phone jammer withprescheduledtime duration requirements. This work is intended to provide an open base for developing the prototypein the form of hardware, software, range of antenna etc. References [1] Rick Hartley, RF / Microwave PC Board Design and Layout, Avionics Systems. [2] John Scourias, Overview of the Global System for Mobile Communications, University of Waterloo. [3] Ahmed Jisrawi, "GSM 900 Mobile Jammer", undergrad project, JUST, 2006. [4] Limor Fried, Social Defense Mechanisms: Tools for Reclaiming our Personal Space. [5] Siwiak, K., Radio-wave propagation and Antennas for personalcommunication. [6] Pozar, D., Microwave Engineering, John Wiley and Sons, 2005.
  • 34. Cell phone jammer withprescheduledtime duration [7] "FREQUENCY PLANNING AND FREQUENCY COORDINATION FOR THE GSM 900, GSM 1800, E-GSM and GSM-R LAND MOBILE SYSTEMS (Except direct mode operation (DMO) channels)" by Working Group Frequency Management" (WGFM).