Cell phone jammer with prescheduled time duration ABSTRACT Mobile INTRODUCTION Communication jamming device were first developed and used by military. This interest comes from the fundamental objective of denying the successful transport of information from the sender (tactical commander) to the receiver (the army personnel), and vice-versa. Nowadays, mobile phones are becoming essential tool in our daily life. The technology behind cell phone jamming is very simple. The widely use the mobile phone could create some problems as the sound of ringing becomes annoying or disrupting. This could happen in some places like conference room, aw court,
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Cell phone jammer with prescheduled time duration
ABSTRACT
Mobile
INTRODUCTION
Communication jamming device were first developed and used by military. This
interest comes from the fundamental objective of denying the successful transport
of information from the sender (tactical commander) to the receiver (the army
personnel), and vice-versa. Nowadays, mobile phones are becoming essential tool
in our daily life. The technology behind cell phone jamming is very simple. The
widely use the mobile phone could create some problems as the sound of ringing
becomes annoying or disrupting. This could happen in some places like conference
room, aw court, libraries, lecture room and mosques. The jamming device
broadcasts an RF signal in the frequency range reserved for cell phones that
interference with the cell phone signal, which results in a “no network available”
display on the cell phone screen. All phones with in the effective radius of the
jammer are science. It should be mentioned that cell phone jammers are illegal
devices in most countries.
Cell phone jammer with prescheduled time duration
A mobile phone jammer is an instrument used to prevent cellular phones from
receiver signal from based station. When used, the jammer effectively disables
cellular phones (fig 1). This device can be used in practically any location, but are
found primarily in places where a phone call would be particularly in places where
a phone call would be particularly disruptive because silence is expected. As with
other radio jamming, cell phone jammers block cell phone use by sending out radio
waves along the same frequencies that cellular phone use. These causes enough
interface with the communication between cell phones and towers to radar the
phones unusable. On most retail phones, the network would simply appear out of
range. Most cell phones use different bands to send
and receive communications from towers (called frequency division depleting,
FDD). Jammers can work by either disrupting phone to tower frequencies or tower
to phone frequencies. Smaller handheld models block all bands from 800 MHz to
1900 MHz within a 30-foot range (9meters). Small devices tend to used the former
method, while larger more expensive models many interfere directly with the
tower. The GSM jammer is a device that transmit signal on the same frequency at
which the GSM system operates, the jamming success when the mobile phone in
the area where the jammer is located can‟t communicate, the basic idea military
use that was called denial of service attack. Mobile jammer is used to prevent
mobile phone from receiving or transmitting signal with the base stations. When
used, the jammer effectively disables cellular phones as shown in fig 2. There are
several ways to jam an RF device. The three most common techniques can be
categorized as follows
In this kind of jamming, the device forces the mobile to turn off itself. This type is
very difficult to be implemented since the jamming device first detects any mobile
phone in a specific area, then the device sends the signal to disable the mobile
Cell phone jammer with prescheduled time duration
phone .some type of this technique can detect if a nearby mobile phone is there and
sends a message to tell the user to switch the phone to the silent mode (intelligent
beacon disablers). Shielding attacks: This is known as TEMPEST or EMF
shielding. This kind required closing an area in a faraday cage so that any device
inside this cage cannot transmit or receiver RF signal from outside of the cage.
This area can be large as buildings. Denial of service: This technique is referred to
DOS. In this technique, the device transmits a noise signal at the same operating
frequency of the mobile phone in order to decrease the signal -to-noise ratio (SNR)
of the mobile under its minimum value. This kind of jamming technique is the
simplest one since the device is always on. Our device is of this type.
The system that to set the scheduled time duration for mobile jammer. The
activation and deactivation time schedules can beprogrammed with
microcontroller. In order to run the RTC (real time clock) one crystal oscillator is
externally interfaced, an oscillator is an electronic circuit that produces a repetitive
electronic signal. The power supply interfaced it is used to battery backup for the
purpose of update the time when the absence of power. The A.C input i.e., 230v
from the mains supply is step down by the transformer to 12v and is fed to a
rectifier. One reset button interface, Reset is used for putting the microcontroller
into a „known‟ condition. That partially means that microcontroller can behave
rather inaccurately under certain undesirable condition. In order to continuous its
proper functioning it has to be reset. Relay is an electrically controllable switch
widely used in industrial controls, automobile and appliances.
Cell phone jammer with prescheduled time duration
LITERATURE SURVEY
2014, Shantanu Krishna Mahato, C.vimala
Cell phones are everywhere these days. It’s great to be able to call anyone at
anytime. Unfortunately, restaurants, public places, class room, shopping malls and
churches all suffer from the spread of cell phones because not all cell-phone users
know when to stop talking while most of us just grumble and move on, some
people are actually going to extremes to retaliate. Mobile jammer is a device used
to prevent mobile phones from receiving or transmitting signals with the base
stations. In this paper, we have to jam a cell phone, all we are developing a device
that broadcasts on the correct frequencies. Although different cellular systems
process signals differently, all cell-phone networks use radio signals that can be
interrupted. GSM, used in digital cellular and PCS-based systems, operates in the
900-MHz, 1800-MHz and WCDMA 2100 bands in Europe and Asia and in the
1900- MHz band in the United States. Jammers can broadcast on any frequency
and are effective against WCDMA, GSM and DCS. This project discusses the
Cell phone jammer with prescheduled time duration
design and development of GSM Mobile jammer and aims to present a solution for
the problems of occur through the cell phone. The main concept of jamming is the
releasing of same frequency which is using by mobile service provider with noise
so user equipment gets destruct.
EXISTING SYSTEM
In market, there are various types of jamming devices available which are using
different jamming techniques. Some of those devices are built with only one
feature in it like it will jam only 2G network compatible cell phones. This type of
device comes with several independent oscillators transmitting jamming signals
capable of blocking frequencies used by paging devices as well as those used by
cellular systems control channels for call establishment. IT does not transmit an
interfering signal on the control channels. The device, when located in the
designated quite area, functions as a detector. It has a unique identification number
for communicating with the cellular base station. The device, when located in the
designated quite area, functions as a beacon and any compatible terminal s
instructed to disable its ringer or disable its operation, while within the coverage
area of beacon. It behaves like a small, independent and portable base station,
which can directly interact with the operation of the local mobile phone. The
jammer is predominantly in receiving mode and will choose to interact and block
the cell phone directly if it is within close proximity of the jammer. Although
labor intensive to construct, the Faraday cage essentially Blocks or greatly
attenuates, virtually all electromagnetic radiation from entering or leaving the cage
or in this case a target room.
DISADVANTAGES
Cell phone jammer with prescheduled time duration
OFMD is highly sensitive to STO. Due to the use of IFFT and FFT for
modulation and demodulation at transmitter and receiver respectively,
correct timing is required at the
It is highly sensitive to carrier frequency offset. Mostof the advantages of
the orthogonal nature of sub-carriers and this orthogonality between sub
carriers will be destroyed if frequency offset arises between them. The
major cause of CFO is Doppler shifts (due to relative motion between
transmitter and channel.
The transmitted signal of OFDM exhibits a high Peak-To-Average Power
Ratio (PAPR). This high PAPR reduces the efficiency of high power
amplifier and degrades the performance of the system.
Cell phone jammer with prescheduled time duration
PROPOSED SYSTEM
We have designed and developed a project based on hardware viewing concept
“Mobile Jammer” which blocks the mobile networks of a designated area that are
receiving their 3G network from the base stations. A jammer is any device that
deliberately blocks, jam or interferes with authorized wireless communications . In
many countries, jammers are illegal and their use can result in large fines. A
mobile phone jammer is an instrument used to prevent cellular phones from
receiving signal from based station. Jammer should recognize that power. Power of
jamming signal should match the power increase from the phone. Sophisticated
jammers can block several networks to head off dual or tri-mode phone that
automatically switch among different network to fin It overpowers the mobile
receiving networks by transmitting the same frequency received by mobile phones.
We have designed a block diagram of mobile jammer which shows the flow of our
project. We have designed it in a way which gives full details about each block,
how a jamming signal is transmitting i.e. how it will jam a mobile phone.
Cell phone jammer with prescheduled time duration
BLOCK DIAGRAM
Cell phone jammer with prescheduled time duration
WORKING PRINCIPLE
The block diagram of the system that to set the scheduled time duration for mobile
jammer. The activation and deactivation time schedules can be programmed with
microcontroller. In order to run the RTC (real time clock) one crystal oscillator is
externally interfaced, an oscillator is an electronic circuit that produces a repetitive
electronic signal. The power supply interfaced it is used to battery backup for the
purpose of update the time when the absence of power. The A.C input i.e., 230v
from the mains supply is step down by the transformer to 12v and is fed to a
rectifier. One reset button interface, Reset is used for putting the microcontroller
Cell phone jammer with prescheduled time duration
into a „known‟ condition. That partially means that microcontroller can behave
rather inaccurately under certain undesirable condition. In order to continuous its
proper functioning it has to be reset. Relay is an electrically controllable switch
widely used in industrial controls, automobile and appliances. One LCD (liquid
crystal display) also interface in this micro controller, it is flat electronic visual
display that used that use the light modulating properties of liquid crystals. These
components are specialized for being used with the microcontrollers, which means
that they cannot be activated by standard IC circuits. RTC (real time clock) is
interface because it is widely used device that provides accurate time and date for
many applications. LED indicator interface in this microcontroller it have a life of
at last ten years and consumer 90 percent less power than conventional indicators,
depend on the type of the materials (Ga, AS, p).
ADVANTAGES
Less Implementation Complexity
Robustness Against Narrowband Interference
Immune to Frequency Selective Fading
High Spectral Efficiency
Using 3g network for speed
Cell phone jammer with prescheduled time duration
SOFTWARE DISCRIPSION
PIC KIT-2 SOFTWARE
Information contained in this publication regarding device applications and the like is
provided only for your convenience and may be superseded by updates. It is your
responsibility to ensure that your application meets with your specifications.
Microchip makes no representations or warranties of any kind whether express or
implied, written or oral, statutory or otherwise, related to the information, including
but not limited to its condition, quality, performance, merchantability or fitness for
purpose. Microchip disclaims all liability arising from this information and its use.
Use of microchip devices in life support and/or safety applications is entirely at the
buyers risk, and the buyer agrees to defend, indemnify and hold harmless microchip
from any and all damages, claims, suits, or expenses resulting from such use. No
licenses are conveyed, implicitly or otherwise, under any microchip intellectual
property rights
The PICKit 2 Development Programmer/Debugger kit contains the following items:
1. The PICKit 2 Development Programmer/Debugger
2. USB cable
3. PICKit Starter Kit and MPLAB IDE CD-ROMs Additionally, the PICKit 2 Starter
Kit and PICKit 2 Debug Express kit both contain a demo board with a PIC
microcontroller device.
The PICKit 2 Development Programmer/Debugger is a low-cost development
programmer. It is capable of programming most of Microchips Flash
microcontrollers and serial EEPROM devices. For specific device support, see the
README file included on the PICKit 2 Starter Kit CD-ROM.
Cell phone jammer with prescheduled time duration
PICKit 2 PROGRAMMER APPLICATION
The PICKit 2 Programmer application allows you to program all supported devices
listed in the PICKit 2 Readme file. The programming interface appears. Its controls
are listed in the following sections. For more information on how to install and use
the PICKit 2 Programmer application, see Chapter 2. Picket 2 Programmers Getting
Started.
Cell phone jammer with prescheduled time duration
Menu Bar
The menu bar selects various functions of the PICKit 2 Programmer application. A
summary of the functions are:
File
Cell phone jammer with prescheduled time duration
Import Hex. Import a hex file for programming. The hex file format INHX32 is
supported.
Export Hex. Export a hex file read from a device. The hex file is created in the
NHX32 format.
File History Up to the last four hex files opened are displayed with their file path.
These recent hex files may be selected to quickly import them. Note that the file
history will initially be blank on a new installation until a hex file is imported.
Exit. Exit the program.
DOT NET C#
Develop and Deliver Enterprise-Critical Desktop and Web Applications with
C# .NET
• Complete Case Studies with Ready-to-Run Source Code and Full Explanations
• Hundreds of Developing & Deploying, Migrating, and Debugging Sidebars,
Security Alerts, and C# .NET FAQs
• Complete Coverage of Web Services and the Integrated Development Environment
(IDE)
This CD-ROM contains the code files that are used in each chapter of this
book. The code files for each chapter are located in a chXX directory (for example,
the files for are in the ch08 directory).Any further directory structure depends on the
projects that are presented within the chapter. To work with the examples provided,
you will need at least the Windows 2000 or Windows XP Professional operating
system with the latest service packs, IIS 5.x, and IE 6.0, since ASP.NET and Web
Services (a part of ASP.NET) are not supported on earlier operating systems such as
Windows 9x/Windows ME/Windows NT. Also needed is the .NET SDK Beta2 (the
latest public release available while writing this book) and the Visual Studio.NET
Beta2 IDE. The C# .NET Web Developer’s Guide provides you with extensive
Cell phone jammer with prescheduled time duration
examples that will help solve the problems you might face while developing
applications for the .NET Platform rather than concentrating on the theory of C#
and .NET programming. Therefore code is the main feature of this book. The
chapters contain both code snippets and sample programs that illustrate the principles
discussed. Chapter 2 presents a series of sample programs that introduce concepts in
C# that are different from other object-oriented languages. Chapter 4 helps you
understand the basics of building Graphical User Interface (GUI)-rich Windows
Forms applications; the examples presented in this chapter are the launch pad for
Windows Forms applications used in other chapters. Similarly, code presented in
Chapter 8 helps you to interact with various databases using ADO.NET; again, this
chapter acts as a foundation for further chapters’ database coverage. Chapter 9 will
acquaint you with using .NET Class Libraries to interact with XML and its related
technologies. Discuss technologies and Application Program Interfaces (APIs) that
help two applications to communicate and interact with each other. focuses on
enabling applications to communicate over the TCP and UDP protocols and provides
an overview of the techniques used to interact with Web pages programmatically.
Code examples in Chapter 6 and Chapter 11 concentrate on using Simple Object
Access Protocol (SOAP) and object serialization and de serialization.
For many years, C and C++ programmers have been searching for
alternative programming languages that offer the same kind of flexibility and power
of C and C++, but without the complexities and steep learning curve required for
mastery of the language. What many programmers desired was a language that would
allow applications to be built rapidly, but at the same time giving them the ability to
code at low level. The search has finally ended with Microsoft’s new language—C#,
a member of the .NET Framework. C# is the revolutionary new language from
Microsoft, designed solely to run on the .NET framework. Drawing experiences from
Cell phone jammer with prescheduled time duration
C, C++, and Visual Basic, C# was designed to be a simple and modern object
oriented programming language. But why learn C#? With the integration of C# and
the Visual Studio.NET (known as Visual C#), developing Windows and Web
applications has been radically simplified. With full access to the .NET Class
Libraries, C# includes built-in support for developing robust Web services and
ASP.NET applications. (It was reportedly said that Visual Studio.NET was built
entirely using C# and that most of the examples in MSDN were coded in C#.That in
and of itself is a very good reason to learn C#!) Besides this, C# enhances the
productivity of programmers by eliminating common errors often associated with C
and C++. While many of the earlier C# books have primarily focused on the language
syntax, The C# .NET Web Developer’s Guide illustrates the uses of C# for Web
developers looking to harness the new functionality and ease of this powerful
programming language. he best way to learn a new language is by trying out the
examples while you are reading this book. Within many chapters, you will find
numerous code examples used in various practical situations; this hands-on, code-
intensive approach allows you to have a deeper understanding of issues involved in
C# Web development, and at the same time allows you to cut and paste portions of
applicable code into your current projects, thereby shortening development time.
HARDWARE REQUIREMENT
1. POWER SUPPLY
2. MICROCONTROLLER
3. LCD DISPLAY
4. MOTORS
POWER SUPPLY
Cell phone jammer with prescheduled time duration
In most of our electronic products or projects we need a power supply for converting
mains AC voltage to a regulated DC voltage. For making a power supply
designing of each and every component is essential. Here I’m going to discuss the
designing of regulated 5V Power Supply.
Let’s start with very basic things the choosing of components