SlideShare a Scribd company logo
MOBILE JAMMER
PRESENTED
By
A. VENKATESH
(11BG1A05B2)
Under the esteemed guidance of
T. NAGA LAKSHMI
Assistant Professor
Dept. of Computer Science and Engineering
SRI VENKATESWARA INSTITUTE OF SCIENCE AND TECHNOLOGY
Kadapa
CONTENTS
•Introduction
•Components of Mobile Jammer
•Mobile Jamming Techniques
•Design Parameters / Specification of mobile
jammer
•Block Diagram of Mobile Jammer
•Applications
•Legal Issues and Alternatives of Mobile Jamming
•Conclusion
Why mobile JAMMER is needed?
•A mobile Jammer is an instrument which is used to
prevent mobile phones from receiving signals from
the base stations Which can be used in practically at
any location but are mostly found in places where a
phone call would be particularly disruptive because
silence is expected.
Components of Mobile Jammer
Voltage Controlled
oscillator (VCO)
Tuning Circuit
Noise Source
RF-Amplification unit
Transmitting Antenna
Voltage Controlled Oscillator
•VCO is like heart of our jammer.
•VCO produces RF signal which will interact with
the blocked device.
•We must select frequencies which Will be used in
our Signal blocking device.
Tuning circuit
Tuning circuit can be of two types:
 Open-loop
 Feedback
Open-loop is a saw tooth-wave generator which
makes VCO to go from lowest to highest frequency.
The feedback is used to adjust the VCOs frequency
constantly.
Noise generator
• Produces random electronic output in a specified frequency range to
jam the cell-phone network signal (part of the tuning circuit)
RF Amplification Unit
• RF Amplification Unit is what we need when we wish to increase the
area covered by our jammer along with its signal blocking power.
Transmitting Antenna
• Transmitting Antenna is a tool which transmits signals produced by
your jammer. The main characteristic of antenna is VSWR (Voltage
Standing Wave Ratio).
Power Source
• Power Source makes our creation to become alive. Generally mobile
phone jammers use 5V of DC to operate.
Mobile Jamming Techniques
There are various types of jamming devices available which
are using different jamming techniques.
Type "A" Device
Type "B" Device
Type "C" Device
Type "D" Device
Type "E" Device
Type "A" device
Type "A" devices are simple jammer.
This type of device comes equipped with several independent oscillators
transmitting jamming signals capable of blocking frequencies used by
paging devices as well as those used by cellular systems control
channels for call establishment.
Type "B" device
Type "B" devices are also known as INTELLIGENT CELLULAR
DISABLERS.
The device, when located in a designated quite area, functions as a
detector.
Type "C" device
Type "C" devices are also known as INTELLIGENT BEACON
DISABLERS.
Unlike jammers, type c devices do not transmit an interfering signal on
the control channels.
Type "D" device
Type "D" devices are DIRECT RECEIVE TRANSMIT
JAMMERS.
This jammer behaves like a small, independent and portable
base station, which can directly interact intelligently or
unintelligently with the operation of the local mobile phone.
Type "E" device
Type "E" devices are used for EMI Shield - Passive Jamming.
This technique is using EMI suppression techniques to make
a room into what is called faraday cage
Design Parameters / Specification of mobilejammer
The frequency bands
Distance to be jammed (D)
Pj Gjr Grj R2
tr Lr Br
Jamming–to-signal ratio {J/S}= Pt Gtr Grt R2
jr Lj Bj
Free space loss {F}=Path Loss (dB)= 32.44 + 20 log D(km) + 20log f(MHz)
Power calculations
The layout of the jammer
Block Diagramof Mobile Jammer
• Power Supply
IF Section
RF Section
Mobile jammer
Applications
• To maintain the complete silence in library and lecture hall
• To avoid fraud in examination hall
• To avoid disturbance in class room.
• For providing security in business conference, board of directors
rooms, seminars, etc.
• For providing calm and peaceful atmosphere in Hospitals
Legal Issues and Alternatives of Mobile Jamming
 Cell phone jammers are illegal in most countries —
except to military, law enforcement and certain
governmental agencies.
 It’s a “Property Theft”.
 It also represents a “Safety Hazard”.
Legal Issues and Alternatives of Mobile Jamming
 In India - legal, Government, Religious Places, Prisons and
Educational Institutions use jammers
 India has installed jammers in parliament and some
prisons.
 It has been reported that universities in Italy have adopted
the technology to prevent cheating.
Students were taking photos of tests with their camera
phones and sending them to classmates.
Alternatives to Mobile Jamming
• While the law clearly prohibits using a device to actively
disrupt a cell-phone signal, there are no rules against passive
cell-phone blocking.
• That means using things like wallpaper or building materials
embedded with metal fragments to prevent cell-phone signals
from reaching inside or outside the room.
• Some buildings have designs that block radio signals by
accident due to thick concrete walls or a steel skeleton.
• Companies are working on devices that control a cell phone
but do not "jam the signal."
Conclusion
• At last we can say GSM, CDMA, 3G Mobile jammer was designed and
built it is mainly intended to prevent the usage of mobile phones in
places inside its coverage. without interfering with the
communication channels outside its range, thus providing a cheap
and reliable method for blocking mobile communication in the
required restricted areas only.
Mobile jammer by venkatesh akkisetty

More Related Content

What's hot

MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
Sujit George
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
Mukul Agarwal
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
Sameer Gupta
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
akash roy
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
Mehul Ranavasiya
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
Farhanullah khan
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Shivam Jaiswal
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
Deepak Bhojwani
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Abhishek Gupta
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
Sudhanshu kumar Sah
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
PREMKUMAR
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
Alok Gupta
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
Bhadra Gowdra
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
harrynik
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
Lakshman Basnet
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Avay Minni
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
Mahmoud Abdeen
 
Mobile Jammer_2
Mobile Jammer_2Mobile Jammer_2
Mobile Jammer_2
Mehul Ranavasiya
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Aditya Kumar Tripathy
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
elprocus
 

What's hot (20)

MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
 
Mobila Jammer
Mobila JammerMobila Jammer
Mobila Jammer
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 
Mobile Jammer_2
Mobile Jammer_2Mobile Jammer_2
Mobile Jammer_2
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 

Viewers also liked

Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
Shishu Priya Darshi
 
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
CODE BLUE
 
Best practice for_physical_atm_security
Best practice for_physical_atm_securityBest practice for_physical_atm_security
Best practice for_physical_atm_security
billhien
 
ATM
ATMATM
ATM Compromise with and without Whitelisting
ATM Compromise with and without WhitelistingATM Compromise with and without Whitelisting
ATM Compromise with and without Whitelisting
Alexandru Gherman
 
Presentation1
Presentation1Presentation1
Presentation1
poojithakannikanti
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
Suraj Prajapati
 
Atm security
Atm securityAtm security
Atm security
Sajan Sahu
 
[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl
[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl
[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl
CODE BLUE
 
Govind
GovindGovind
Govind
Garima Singh
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
An Introduction to Soft Computing
An Introduction to Soft ComputingAn Introduction to Soft Computing
An Introduction to Soft Computing
Tameem Ahmad
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
Clarice_Wilson
 
Security
SecuritySecurity
Security
AyushiGupta3123
 
Atm security
Atm securityAtm security
Atm security
Likan Patra
 
rain technology
rain technologyrain technology
rain technology
Sneha Nitta
 
Sensitive skin
Sensitive skinSensitive skin
Sensitive skin
Vivek Jha
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
Prabhat Singh
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
suresh5c2
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
tejinderubs
 

Viewers also liked (20)

Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
 
Best practice for_physical_atm_security
Best practice for_physical_atm_securityBest practice for_physical_atm_security
Best practice for_physical_atm_security
 
ATM
ATMATM
ATM
 
ATM Compromise with and without Whitelisting
ATM Compromise with and without WhitelistingATM Compromise with and without Whitelisting
ATM Compromise with and without Whitelisting
 
Presentation1
Presentation1Presentation1
Presentation1
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Atm security
Atm securityAtm security
Atm security
 
[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl
[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl
[CB16] 基調講演: セキュリティはどれくらいが適量? – How much security is too much? – by Karsten Nohl
 
Govind
GovindGovind
Govind
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
An Introduction to Soft Computing
An Introduction to Soft ComputingAn Introduction to Soft Computing
An Introduction to Soft Computing
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Security
SecuritySecurity
Security
 
Atm security
Atm securityAtm security
Atm security
 
rain technology
rain technologyrain technology
rain technology
 
Sensitive skin
Sensitive skinSensitive skin
Sensitive skin
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 

Similar to Mobile jammer by venkatesh akkisetty

mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
LingaSwamy10
 
mobilejammer
mobilejammermobilejammer
mobilejammer
Naga Dinesh
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Avay Minni
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
Amit sundaray
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
xiha tareen
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
RamaBoya2
 
Ceplone
CeploneCeplone
Ceplone
limitofvision
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile Jammerr
Swarna Gautam
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Pula Likhitha
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
Venky Venkatesh
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
IJMER
 
MINI%20PROJECT.pptx
MINI%20PROJECT.pptxMINI%20PROJECT.pptx
MINI%20PROJECT.pptx
HarshiniR23
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
DyarAbubakr
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
mgnboy
 
Anti-Theft System
Anti-Theft SystemAnti-Theft System
Anti-Theft System
INDIAN BARCODE CORPORATION
 
Anti-Theft System By MINDWARE
Anti-Theft System By MINDWAREAnti-Theft System By MINDWARE
Anti-Theft System By MINDWARE
INDIAN BARCODE CORPORATION
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
VinodDoddaka
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
Manikandan Jeeva
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
Dr-Ahmed Elkorany
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
ijtsrd
 

Similar to Mobile jammer by venkatesh akkisetty (20)

mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 
Mobile Jammers
Mobile JammersMobile Jammers
Mobile Jammers
 
Ceplone
CeploneCeplone
Ceplone
 
Mobile Jammerr
Mobile JammerrMobile Jammerr
Mobile Jammerr
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
MINI%20PROJECT.pptx
MINI%20PROJECT.pptxMINI%20PROJECT.pptx
MINI%20PROJECT.pptx
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
Anti-Theft System
Anti-Theft SystemAnti-Theft System
Anti-Theft System
 
Anti-Theft System By MINDWARE
Anti-Theft System By MINDWAREAnti-Theft System By MINDWARE
Anti-Theft System By MINDWARE
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 

Recently uploaded

CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 

Recently uploaded (20)

CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 

Mobile jammer by venkatesh akkisetty

  • 1. MOBILE JAMMER PRESENTED By A. VENKATESH (11BG1A05B2) Under the esteemed guidance of T. NAGA LAKSHMI Assistant Professor Dept. of Computer Science and Engineering SRI VENKATESWARA INSTITUTE OF SCIENCE AND TECHNOLOGY Kadapa
  • 2. CONTENTS •Introduction •Components of Mobile Jammer •Mobile Jamming Techniques •Design Parameters / Specification of mobile jammer •Block Diagram of Mobile Jammer •Applications •Legal Issues and Alternatives of Mobile Jamming •Conclusion
  • 3. Why mobile JAMMER is needed? •A mobile Jammer is an instrument which is used to prevent mobile phones from receiving signals from the base stations Which can be used in practically at any location but are mostly found in places where a phone call would be particularly disruptive because silence is expected.
  • 4. Components of Mobile Jammer Voltage Controlled oscillator (VCO) Tuning Circuit Noise Source RF-Amplification unit Transmitting Antenna
  • 5. Voltage Controlled Oscillator •VCO is like heart of our jammer. •VCO produces RF signal which will interact with the blocked device. •We must select frequencies which Will be used in our Signal blocking device. Tuning circuit Tuning circuit can be of two types:  Open-loop  Feedback Open-loop is a saw tooth-wave generator which makes VCO to go from lowest to highest frequency. The feedback is used to adjust the VCOs frequency constantly.
  • 6. Noise generator • Produces random electronic output in a specified frequency range to jam the cell-phone network signal (part of the tuning circuit) RF Amplification Unit • RF Amplification Unit is what we need when we wish to increase the area covered by our jammer along with its signal blocking power. Transmitting Antenna • Transmitting Antenna is a tool which transmits signals produced by your jammer. The main characteristic of antenna is VSWR (Voltage Standing Wave Ratio). Power Source • Power Source makes our creation to become alive. Generally mobile phone jammers use 5V of DC to operate.
  • 7. Mobile Jamming Techniques There are various types of jamming devices available which are using different jamming techniques. Type "A" Device Type "B" Device Type "C" Device Type "D" Device Type "E" Device
  • 8. Type "A" device Type "A" devices are simple jammer. This type of device comes equipped with several independent oscillators transmitting jamming signals capable of blocking frequencies used by paging devices as well as those used by cellular systems control channels for call establishment. Type "B" device Type "B" devices are also known as INTELLIGENT CELLULAR DISABLERS. The device, when located in a designated quite area, functions as a detector. Type "C" device Type "C" devices are also known as INTELLIGENT BEACON DISABLERS. Unlike jammers, type c devices do not transmit an interfering signal on the control channels.
  • 9. Type "D" device Type "D" devices are DIRECT RECEIVE TRANSMIT JAMMERS. This jammer behaves like a small, independent and portable base station, which can directly interact intelligently or unintelligently with the operation of the local mobile phone. Type "E" device Type "E" devices are used for EMI Shield - Passive Jamming. This technique is using EMI suppression techniques to make a room into what is called faraday cage
  • 10. Design Parameters / Specification of mobilejammer The frequency bands Distance to be jammed (D) Pj Gjr Grj R2 tr Lr Br Jamming–to-signal ratio {J/S}= Pt Gtr Grt R2 jr Lj Bj Free space loss {F}=Path Loss (dB)= 32.44 + 20 log D(km) + 20log f(MHz) Power calculations
  • 11. The layout of the jammer
  • 17. Applications • To maintain the complete silence in library and lecture hall • To avoid fraud in examination hall • To avoid disturbance in class room. • For providing security in business conference, board of directors rooms, seminars, etc. • For providing calm and peaceful atmosphere in Hospitals
  • 18. Legal Issues and Alternatives of Mobile Jamming  Cell phone jammers are illegal in most countries — except to military, law enforcement and certain governmental agencies.  It’s a “Property Theft”.  It also represents a “Safety Hazard”.
  • 19. Legal Issues and Alternatives of Mobile Jamming  In India - legal, Government, Religious Places, Prisons and Educational Institutions use jammers  India has installed jammers in parliament and some prisons.  It has been reported that universities in Italy have adopted the technology to prevent cheating. Students were taking photos of tests with their camera phones and sending them to classmates.
  • 20. Alternatives to Mobile Jamming • While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking. • That means using things like wallpaper or building materials embedded with metal fragments to prevent cell-phone signals from reaching inside or outside the room. • Some buildings have designs that block radio signals by accident due to thick concrete walls or a steel skeleton. • Companies are working on devices that control a cell phone but do not "jam the signal."
  • 21. Conclusion • At last we can say GSM, CDMA, 3G Mobile jammer was designed and built it is mainly intended to prevent the usage of mobile phones in places inside its coverage. without interfering with the communication channels outside its range, thus providing a cheap and reliable method for blocking mobile communication in the required restricted areas only.