SlideShare a Scribd company logo
1 of 19
 Soumya Shuchi(14300211047)
 Srirupa Das(14300211048)
 Subhendu Paul(14300211050)
 Sumadhura Biswas(14300211051)
 Suman Bose(14300211052)
Presented by
1Dept. IT,GNIT
 What is mobile jammer?
 History
 How is works?
 Types of jamming techniques?
 Design parameter and specification
 Block diagram
 Types and application
 Future scope
 conclusion
2Dept. IT,GNIT
 A mobile phone jammer is an instrument used to
prevent cellular phones from receiving signals from
base stations.
3Dept. IT,GNIT
 Mobile jammer was originally developed for law
enforcement and the military to interrupt
communications by criminals and terrorists.
 Some were also designed to foil the use of certain
remotely detonated explosives.
4Dept. IT,GNIT
 Transmits same radio frequencies of greater power as the cell
phone, disrupting the communication between the phone
and the cell-phone base station in the tower.
 This causes interference with
communication of cell phones
and towers to render the phones
unusable. On most phones,
the network would be out of
range.
5Dept. IT,GNIT
 Type "A" Device: JAMMERS
 Type “B” Device: INTELLIGENT CELLULAR DISABLERS
 Type “C” Device: INTELLIGENT BEACON DISABLERS
 Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS
6Dept. IT,GNIT
1.Type "A" Device: JAMMERS
This type of device comes equipped with several
independent oscillators transmitting ‘jamming
signals’ capable of blocking frequencies used by
cellular systems for call establishment.
7Dept. IT,GNIT
2.Type “B” Device: INTELLIGENT CELLULAR DISABLERS
 Unlike jammers, Type ”B” devices do not transmit an
interfering signal on the control channels. The device, when
located in a designated ’quite’ area, functions as a ’detector’.
 When the device detects the presence of a mobile phone in
the "silent" room; a prevention of authorization of call
establishment is done by the software at the base station.
8Dept. IT,GNIT
3. Type “C” Device : INTELLIGENT BEACON DISABLERS
Unlike jammers, Type C devices do not transmit an
interfering signal on the control channels. The device, when
located in a designated ’quiet’ area, functions as a ’beacon’
and any compatible terminal is instructed to disable its
operation, while within the coverage area of beacon.
9Dept. IT,GNIT
4. Type “D” Device : DIRECT RECEIVE & TRANSMIT JAMMERS
This jammer behaves like a small, independent and portable
base station, which can directly interact with the operation of
the local mobile phone. The jammer is predominantly in
receive mode and will intelligently choose to interact and
block the cell Phone directly if it is within close proximity of
the jammer.
10Dept. IT,GNIT
 The frequency band GSM 900 (935-960 MHz )
GSM 1800 (1805-1880 MHz)
 The distance to be jammed (R)
 Jamming–to-signal ratio
11Dept. IT,GNIT
Power Supply
•Transformer
•Rectification
•Filter
•Regulator
IF-Section
•Triangle wave
generator
•Noise generator
•Mixer summer
RF Section
•VCO
•Power
amplifier
•Antenna
12Dept. IT,GNIT
 Adjustable Mobile Jammer
 School &Prison Mobile Jammer
 Remote Control Mobile jammer
 Explosion – Proof Mobile jammer
 Police & Military Mobile Jammer
 Portable Mobile Jammer
13Dept. IT,GNIT
14Dept. IT,GNIT
 To maintain the complete silence in library and
lecture hall.
 To avoid fraud in examination hall.
 To avoid disturbance in class room.
 For providing security in business conference, board
of directors rooms, seminars, etc.
15Dept. IT,GNIT
 Church/Cathedral/Temple/Religious establishment.
 For providing calm and peaceful atmosphere in
Hospitals.
 And mostly in security purpose.
16Dept. IT,GNIT
 While the law clearly prohibits using a device to
actively disrupt a cell-phone signal, there are no
rules against passive cell-phone blocking.
 Companies are working on devices that control a cell
phone but do not jam the signal.
17Dept. IT,GNIT
 Every technology has good aspect as well as bad
aspect, the important thing is, how we are using it.
 Cell phone jammers are very useful to the society
from the anti-social elements.
 Cell phone jammers prevent the students from using
cell phones to the schools and colleges.
18Dept. IT,GNIT
 www.google.com
 www.wikipedia.com
 www.jammer.in
19Dept. IT,GNIT

More Related Content

What's hot

What's hot (20)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Cellphone signal detector and jammer ppt
Cellphone signal detector and jammer pptCellphone signal detector and jammer ppt
Cellphone signal detector and jammer ppt
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Cell phone detector & jammer
Cell phone detector & jammerCell phone detector & jammer
Cell phone detector & jammer
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone Jammer
 
SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILES
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
Gsm (Part 1)
Gsm (Part 1)Gsm (Part 1)
Gsm (Part 1)
 
Cell tower, BTS & antennas
Cell tower, BTS & antennasCell tower, BTS & antennas
Cell tower, BTS & antennas
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammer
 
satellite-communications
satellite-communicationssatellite-communications
satellite-communications
 
Mobile detector
Mobile detectorMobile detector
Mobile detector
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 

Viewers also liked

Mobile jammer
Mobile jammerMobile jammer
Mobile jammerharrynik
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammerAlok Gupta
 
Level Switching PPT
Level Switching PPTLevel Switching PPT
Level Switching PPTSameer Gupta
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyVenky Venkatesh
 
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima Pandit
Soft computing (ANN and Fuzzy Logic)  : Dr. Purnima PanditSoft computing (ANN and Fuzzy Logic)  : Dr. Purnima Pandit
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima PanditPurnima Pandit
 
Holographic Data Storeg ppt
Holographic Data Storeg pptHolographic Data Storeg ppt
Holographic Data Storeg pptSameer Gupta
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt9440999171
 
Brain Chip Technology
Brain Chip TechnologyBrain Chip Technology
Brain Chip Technologyanitha pillai
 

Viewers also liked (14)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
MOBILE JAMMER
MOBILE JAMMERMOBILE JAMMER
MOBILE JAMMER
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Level Switching PPT
Level Switching PPTLevel Switching PPT
Level Switching PPT
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima Pandit
Soft computing (ANN and Fuzzy Logic)  : Dr. Purnima PanditSoft computing (ANN and Fuzzy Logic)  : Dr. Purnima Pandit
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima Pandit
 
Holographic Data Storeg ppt
Holographic Data Storeg pptHolographic Data Storeg ppt
Holographic Data Storeg ppt
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
 
Soft computing
Soft computingSoft computing
Soft computing
 
Brain Chip Technology
Brain Chip TechnologyBrain Chip Technology
Brain Chip Technology
 

Similar to Mobile jammer

Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networksijtsrd
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxLingaSwamy10
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?xiha tareen
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jammingPREMKUMAR
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd Iaetsd
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2mgnboy
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxVinodDoddaka
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksIJMER
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , IntroLakshman Basnet
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jammingMahmoud Abdeen
 

Similar to Mobile jammer (20)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
Mobile jammer ppt
Mobile jammer pptMobile jammer ppt
Mobile jammer ppt
 
Govind
GovindGovind
Govind
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Ceplone
CeploneCeplone
Ceplone
 
Wireless Jamming Networks
Wireless Jamming NetworksWireless Jamming Networks
Wireless Jamming Networks
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
Jamming Devices and how they works?
Jamming Devices and how they works?Jamming Devices and how they works?
Jamming Devices and how they works?
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 

More from Suman Bose

More from Suman Bose (7)

Online Movie Ticket Booking
Online Movie Ticket BookingOnline Movie Ticket Booking
Online Movie Ticket Booking
 
Online Mobile Phone Recharge
Online Mobile Phone RechargeOnline Mobile Phone Recharge
Online Mobile Phone Recharge
 
Voice browser
Voice browserVoice browser
Voice browser
 
Captcha
CaptchaCaptcha
Captcha
 
Virusppt
ViruspptVirusppt
Virusppt
 
Blue brain
Blue brainBlue brain
Blue brain
 
IPv6
IPv6IPv6
IPv6
 

Recently uploaded

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Recently uploaded (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Mobile jammer

  • 1.  Soumya Shuchi(14300211047)  Srirupa Das(14300211048)  Subhendu Paul(14300211050)  Sumadhura Biswas(14300211051)  Suman Bose(14300211052) Presented by 1Dept. IT,GNIT
  • 2.  What is mobile jammer?  History  How is works?  Types of jamming techniques?  Design parameter and specification  Block diagram  Types and application  Future scope  conclusion 2Dept. IT,GNIT
  • 3.  A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations. 3Dept. IT,GNIT
  • 4.  Mobile jammer was originally developed for law enforcement and the military to interrupt communications by criminals and terrorists.  Some were also designed to foil the use of certain remotely detonated explosives. 4Dept. IT,GNIT
  • 5.  Transmits same radio frequencies of greater power as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower.  This causes interference with communication of cell phones and towers to render the phones unusable. On most phones, the network would be out of range. 5Dept. IT,GNIT
  • 6.  Type "A" Device: JAMMERS  Type “B” Device: INTELLIGENT CELLULAR DISABLERS  Type “C” Device: INTELLIGENT BEACON DISABLERS  Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS 6Dept. IT,GNIT
  • 7. 1.Type "A" Device: JAMMERS This type of device comes equipped with several independent oscillators transmitting ‘jamming signals’ capable of blocking frequencies used by cellular systems for call establishment. 7Dept. IT,GNIT
  • 8. 2.Type “B” Device: INTELLIGENT CELLULAR DISABLERS  Unlike jammers, Type ”B” devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quite’ area, functions as a ’detector’.  When the device detects the presence of a mobile phone in the "silent" room; a prevention of authorization of call establishment is done by the software at the base station. 8Dept. IT,GNIT
  • 9. 3. Type “C” Device : INTELLIGENT BEACON DISABLERS Unlike jammers, Type C devices do not transmit an interfering signal on the control channels. The device, when located in a designated ’quiet’ area, functions as a ’beacon’ and any compatible terminal is instructed to disable its operation, while within the coverage area of beacon. 9Dept. IT,GNIT
  • 10. 4. Type “D” Device : DIRECT RECEIVE & TRANSMIT JAMMERS This jammer behaves like a small, independent and portable base station, which can directly interact with the operation of the local mobile phone. The jammer is predominantly in receive mode and will intelligently choose to interact and block the cell Phone directly if it is within close proximity of the jammer. 10Dept. IT,GNIT
  • 11.  The frequency band GSM 900 (935-960 MHz ) GSM 1800 (1805-1880 MHz)  The distance to be jammed (R)  Jamming–to-signal ratio 11Dept. IT,GNIT
  • 12. Power Supply •Transformer •Rectification •Filter •Regulator IF-Section •Triangle wave generator •Noise generator •Mixer summer RF Section •VCO •Power amplifier •Antenna 12Dept. IT,GNIT
  • 13.  Adjustable Mobile Jammer  School &Prison Mobile Jammer  Remote Control Mobile jammer  Explosion – Proof Mobile jammer  Police & Military Mobile Jammer  Portable Mobile Jammer 13Dept. IT,GNIT
  • 15.  To maintain the complete silence in library and lecture hall.  To avoid fraud in examination hall.  To avoid disturbance in class room.  For providing security in business conference, board of directors rooms, seminars, etc. 15Dept. IT,GNIT
  • 16.  Church/Cathedral/Temple/Religious establishment.  For providing calm and peaceful atmosphere in Hospitals.  And mostly in security purpose. 16Dept. IT,GNIT
  • 17.  While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking.  Companies are working on devices that control a cell phone but do not jam the signal. 17Dept. IT,GNIT
  • 18.  Every technology has good aspect as well as bad aspect, the important thing is, how we are using it.  Cell phone jammers are very useful to the society from the anti-social elements.  Cell phone jammers prevent the students from using cell phones to the schools and colleges. 18Dept. IT,GNIT
  • 19.  www.google.com  www.wikipedia.com  www.jammer.in 19Dept. IT,GNIT

Editor's Notes

  1. The frequency bands    UPLINK (Handset transmit) DOWNLINK(Handset receive) GSM 900: 890-915 MHz 935-960 MHz GSM 1800 1710-1785 MHz 1805-1880 MHz  Jamming frequency must be the same as the downlink, because it needs lower power to do jamming than the uplink range and there is no need to jam the base station itself. So, our frequency design will be as follows: GSM 900 935-960 MHz GSM 1800 1805-1880 MHz The distance to be jammed (D)  This parameter is very important in our design, since the amount of the output power of the jammer depends on the area that we need to jam. Later on we will see the relationship between the output power and the distance D. Our design is established upon D=10 meters for GSM 1800 band and D=20 meters for GSM 900 band. If the distance between jammer and receiver is doubled the jammer has to quadruple its output in order for the jamming to have the same effect.Jamming–to-signal ratio {J/S} Jamming is successful when the jamming signal denies the usability of the communication transmission. In digital communications, the usability is denied when the error rate of the transmission can not be compensated by error correction. Usually, a successful jamming attack requires that the jammer power is roughly equal to signal power at the receiver (mobile device). The general equation of the jamming-to-signal ratio is given as follows: Jamming–to-signal ratio {J/S} = PjGjrGrj R2trLr Br / PtGtrGrt R2jrLjBj  where: Pj=jammer power, Gjr= antenna gain from jammer to receiver, Grj=antenna gain from receiver to jammer, Rtr=range between communication transmitter and receiver, Br=communication receiver bandwidth, Lr =communication signal loss, Pt=transmitter power, Gtr= antenna gain from transmitter to receiver, Grt=antenna gain from receiver to transmitter, Rjr=range between jammer and communication receiver, Bj=jammer bandwidth, and Lj=jamming signal loss.For GSM, the specified system SNRmin(Minimum detectable signal (MDS) by a device) is 9 dB which will be used as the worst case scenario for the jammer.
  2. The Power supply  This is used to supply the other sections with the needed voltages. Any power supply consists of the following main parts: Transformer: - is used to transform the 220VAC to other levels of voltages. Rectification: - this part is to convert the AC voltage to a DC one. We have two methods for rectification: A] Half wave-rectification: the output voltage appears only during positive cycles of the input signal. B] Full wave –rectification: a rectified output voltage occurs during both the positive and negative cycles of the input signal. The Filter: used to eliminate the fluctuations in the output of the full wave rectifier “eliminate the noise” so that a constant DC voltage is produced. This filter is just a large capacitor used to minimize the ripple in the output. Regulator: this is used to provide a desired DC-voltage. IF-SectionThe function of the IF-section of the mobile jammer is to generate the tuning signal for the VCO in the RF-Section, which will sweep the VCO through the desired range of frequencies. This tuning signal is generated by a triangular wave generator((To tune the VCO in the RF section) along with noise generator(provides the output noise), and Mixer summer((to mix the triangle and the noise waves). RF Section The RF-section is the most important part of the mobile jammer , it consists of the VCO,RF Power Amplifier, and the antenna.VCO: The VCO is responsible for generating the RF signal which will over power the mobile downlink signal. It should match the frequency of the GSM system.Power Amplifier: It is needed to amplify the to increase the VCO output to a desired range.Antenna: A proper antenna is necessary to transmit the jamming signal. In order to have optimal power transfer, the antenna system must be matched to the transmission system.