Cell Phone Jammer , Intro

download Cell Phone Jammer , Intro

If you can't read please download the document

Transcript of Cell Phone Jammer , Intro

1. Outline Swastik College 1 Introduction How Cell Phone Jammer Works Types of Jamming techniques Simple block diagram Types Of Jammer Device Applications of Jammer Future scope of Jamming Technology Conclusion 2. Cell phone jammers are devices that create a temporary "dead zone" to all cell phone traffic in their immediate proximity Swastik College 2 Introduction 3. jammers can: Swastik College 3 prevent your cell phone from making or receiving calls, text messages, and emails; prevent your Wi-Fi enabled device from connecting to the Internet; prevent your GPS unit from receiving correct positioning signals; and prevent a first responder from locating you in an emergency. ... 4. Swastik College 4 transmits - same radio frequencies of greater power as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower : denial-of-service attack. working 5. History Swastik College 5 originally developed for law enforcement and the military to interrupt communications by criminals and terrorists. to foil the use of certain remotely detonated explosives. 6. Swastik College 6 causes interference with communication of cell phones and towers to render the phones unusable. On most phones, the network would be out of range. either disrupting phone to tower freq.. or tower to phone frequencies. working 7. Jamming techniques Swastik College 7 Type Name A JAMMERS B INTELLIGENT CELLULAR DISABLERS C INTELLIGENT BEACON DISABLERS D DIRECT RECEIVE & TRANSMIT JAMMERS E EMI SHIELD - PASSIVE JAMMING 8. Jamming techniques Swastik College 8 1. Type "A" Device: JAMMERS . comes equipped with several independent oscillators . transmits jamming signals which block frequencies used by paging devices as well as those used by cellular systems 9. Jamming techniques Swastik College 9 2.Type B Device: INTELLIGENT CELLULAR DISABLERS Unlike jammers, dont transmit an interfering signal The device, when located in a designated quite area, functions as a detector. has a unique identification number for communicating with the cellular base station. 10. Jamming techniques Swastik College 10 3. Type C Device (Intelligent Beacon Disablers) Unlike jammers, dont transmit an interfering signal The device, when located in a designated quiet area, functions as a beacon and any compatible terminal is instructed to disable its ringer or disable its operation, while within the coverage area of beacon. 11. Jamming techniques Swastik College 11 4. Type D Device (Direct Receive & Transmit Jammers) behaves like a small, independent and portable base station, can directly interact intelligently or unintelligently with operation of local mobile phones. is predominantly in receive mode intelligently chooses to interact and block the cell phone directly if within close proximity of the jammer. 12. Jamming techniques Swastik College 12 5. Type E Device (EMI Shield - Passive Jamming) Uses EMI suppression techniques to make a room into what is called Faraday cage labor intensive to construct, Blocks virtually all electromagnetic radiation from entering or leaving the cage - a target room. 13. Design Parameters/ Specification Swastik College 13 Free space loss {F}= Path Loss (dB)= 32.44 + 20 log D(km) + 20log f(MHz) The frequency bands Distance to be jammed (D) Power calculations 14. Block Diagram Swastik College 14 If section Rf section Jamming signals Power supply 15. Types Swastik College Remote Control cell phone jammer Adjustable cell phone Jammer School &Prison Phone Jammer Explosion Proof cell phone jammer Police & Mila try Phone Jammer Portable Cell Phone Jammer 15 16. Swastik College 16 In use: 17. Applications Swastik College 17 For maintaining complete silence in : library,lecture hall, temples,conferences, prisons, restaurants examination hall To avoid disturbances in class room to stop the terrorists for organizing explosions in several places at a time/communication For providing security in business conference, board of directors rooms, seminars, VVIPs etc., For providing calm and peaceful atmosphere in Hospitals Church/Mosques/Cathedral/Temple/Religious establishment 18. Challenges Swastik College 18 emergencies law signal interferencs Cost 19. Future Scope Swastik College 19 While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking. Companies are working on devices that control a cell phone but dont jam the signal. 20. Conclusion Swastik College 20 Every technology has good aspect as well as bad aspect the important thing is ,how we are using it. useful to the society from the anti-social elements. can save our national leaders. can restrict the communication network between the anti-social elements by using the cell phone jammers. prevent the students from carrying cell phones to the colleges. 21. References Swastik College 21 http://en.wikipedia.org/wiki/Mobile_phone_jammer www.HowStuffWork.com/ http://jammerall.blog.com/ http://techpolicy.typepad.com/tpp/2004/04/cell_phone_ja mm.html http://2.bp.blogspot.com/ Google images 22. Thank You! Swastik College 22 www.lakshmanbasnet.com.np /lakshmanbasnet