+ All Categories
Home > Documents > Mobile Jammer Report

Mobile Jammer Report

Date post: 24-Oct-2014
Category:
Upload: mahesh-kute
View: 259 times
Download: 5 times
Share this document with a friend
Popular Tags:
61
A Project report On MOBILE JAMMER Submitted by 1) KUTE MAHESH ASHOKRAO 2) JADHAV GOVIND BHASKAR 3) SAWASE GOKUL PRABHAKAR 4) SHINDE SUDHAKAR BABURAO DIPLOMA IN ELECTRONIC’S & COMMUNICATION ENGINEERING MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION, MUMBAI (M.S)
Transcript

A

A

Project report

On

MOBILE JAMMER

Submitted by

1) KUTE MAHESH ASHOKRAO 2) JADHAV GOVIND BHASKAR

3) SAWASE GOKUL PRABHAKAR

4) SHINDE SUDHAKAR BABURAO

DIPLOMA IN ELECTRONICS & COMMUNICATION ENGINEERING

MAHARASHTRA STATE BOARD OF TECHNICAL

EDUCATION, MUMBAI (M.S)

Department of Electronics & Communication

Engineering

GOVERNMENT POLYTECHNIC, BEED2010-2011

I GOVERNMENT POLYTECHNIC, BEED

(ELECTRONICS & COMMUNICATION DEPARTMENT)

CERTIFICATE

This is certify that the project on,

MOBILE JAMMER

Submitted By: -

1) KUTE MAHESH ASHOKRAO 2) JADHAV GOVIND BHASKAR

3) SAWASE GOKUL PRABHAKAR

4) SHINDE SUDHAKAR BABURAO

Of Third Year Diploma in Electronics & Communication as a partial fulfillment of their Curriculum of Maharashtra State Board Of Technical Educations Diploma In Electronics & Communication in the academic year 2010-11.The work is carried out under the supervision & guidance of

Miss Bhandare A. S. Mr. Abdul F.H. (Project Guide) (H.O.D)

External Examiner Mr. Swar S. M.

(Principal)

II

GOVERNMENT POLYTECHNIC, BEED

(ELECTRONICS & COMMUNICATION DEPARTMENT)

SUBMISSION

Certified that this submitted By: -

1) KUTE MAHESH ASHOKRAO

2) JADHAV GOVIND BHASKAR

3) SAWASE GOKUL PRABHAKAR

4) SHINDE SUDHAKAR BABURAO

The students of third year of course ELECTRONICS & COMMUNICATION DEPARTMENT

Humbly submits that we have completed from time to time that project work as described in this report by our own skills & study between the periods from 2010-2011 as per guidance / instruction of

MISS. BHANDARE A. S.

And that following students were associate with me for this work. However, quantum of our contribution has been approved by teacher. And we have not copied report or its appreciable part from any other literature in contravention of our academic ethics.

III

ACKNOWLEDGEMENT

Project always an integral part in an engineering students in educational life without which the education is incomplete. It not only technical knowledge regarding the concerned field but also enhances the practical skill. It turns knowledge into reality. The theoretical knowledge acquired through reading, discussion can be confirmed through practical projects only. Hence one can see knowledge being put into action, which not only act as cements linking of knowledge but also creates confidence in an engineering student.

We have no word to express sincere thanks to

GOVERNMENT POLYTECHNIC, BEED

We sincerely thanks the project guide

MISS. BHANDARE A. S. MADAM

for this valuable guidance & suggestion from time to time trough the completion of project. We are indeed to very thankful to our collage principal MR. SWAR S. M. SIR & our HOD MR. ABDUL F. H. SIR for their kindly helping. We are also thankful to all the staff of

ELECTRONICS & COMMUNICATION DEPARTMENT

Department Mr. S. S. Kulkarni sir, Mr. M. M. Kulkarni sir, Miss. Bakshi madam & Mr. Imran Shaikh sir by their co-operation the project is completed successfully.

IV

CONTENTS

Sr. No Topic Page No.

A List of Abbreviations .1 B List of Symbols ..2 C List of Figures... 3 D Abstract .4

Introduction 5

Operation .6

3. Jamming Techniques.....9 Spoofing Shielding Attacks Denial of Service

4. Design Parameters ..10

The distance to be jammed (D) The frequency bands Jammingto-signal ratio {J/S} Free space loss {F}

5. System Design..12 5.1 Power calculations 5.2 Parts of the jammer device 5.2.1 The Power supply 5.2.2 Circuit diagram of mobile jammer 5.2.3 The IF- section 5.2.3 The RF-Section V

6. Appendix . 28

6.1 Parts

6.2 The layout of the jammer

7. Performance Analysis30 7.1PCB making 7.2Testing & Troubleshooting

8 Applications.36

9 Advantages..36

10 Disadvantages..

11 Future Developmets/ Scope37

12 Result..37

13 Conclusion38

14. Referances....39

VI

A. LIST OF ABBREVIATIONS

Vref ..Reference Voltage

Vcc Supply Voltage

IC Integrated Circuit

AMP.Amplifier

GND . Ground

PCB .... Printed Circuit Board

AC ..... Alternating Current

C . Direct Current

mA.. Milliampere

f Microfarad

1

B. LIST OF SYMBOLS

SYMBOL

NAME

Resistor

Capacitor

Diode

Step down transformer

Oscillator

Ground

2

C. LIST OF FIGURES

Sr. no

Figure NoName of figure

1Figure No.2.1

operation in off condition

2Figure No.2.2

operation in on condition

3Figure No.5.1

Jammer main blocks.

4Figure No.5.2

Parts of the power supply

5Figure No.5.3

A-stable 555timer

6Figure No.5.4

Triangular wave generator

7Figure No.5.5

The noise generator

8Figure No5.6

IF- Section circuit

9Figure No.6.1

RF-Section circuit

10Figure No.6.2

The jammer Device

11Figure No.6.3

PCB layout of IF-Section

12Figure No.6.4

PCB layout of RF-Section

3

D. ABSTRACT

This report presents the design, implementation, and testing of a dual-band cell-phone jammer. This jammer works at GSM 900 and GSM 1800 simultaneously and thus jams the nine well-known carriers in India (Airtel, Bsnl, Idea, Vodafone, Tata Docomo, Tata Indicom, Reliance, Uninor & Vargin ). This project went through two phases:

Phase one: studying the GSM-system to find the best jamming technique, establishing the system design and selecting suitable components.

Phase two: buying all the needed components, drawing the overall schematics, fabricating the PCB layout, assembling the devices, performing some measurements and finally testing the mobile jammer.

The designed jammer was successful in jamming the nine carriers in India as will be shown at the end of this report.

4

1.INTRODUCTION

Communication jamming devices were first developed and used by military. This interest comes from the fundamental objective of denying the successful transport of information from the sender (tactical commanders) to the receiver (the army personnel), and vice-versa. Nowadays, mobile (or cell) phones are becoming essential tools in our daily life. Here in India, for example, with a rather high population, nine cell phone carries are available; namely; Airtel, Bsnl, Idea, Vodafone, Tata Docomo, Tata Indicom, Reliance, Uninor & Vargin. They use the GSM 900 system, while the Tata indicom, Reliance, Vargin uses the GSM 1800 system. Needless to say, the wide use of mobile phones could create some problems as the sound of ringing becomes annoying or disrupting. This could happen in some places like conference rooms, law courts, libraries, lecture rooms and mosques. One way to stop these disrupting ringings is to install a device in such places which will inhibit the use of mobiles, i.e., make them obsolete. Such a device is known as cell phone jammer or "MOBILE jammer", which is basically some kind of electronic countermeasure device. The technology behind cell phone jamming is very simple. The jamming device broadcasts an RF signal in the frequency range reserved for cell phones that interferes with the cell phone signal, which results in a "no network available" display on the cell phone screen. All phones within the effective radius of the jammer are silenced. It should be mentioned that cell phone jammers are illegal devices in most countries. According to the Federal Communications Commission (FCC) in the USA: "The manufacture, importation, sale, or offer for sale, of devices designed to block or jam wireless transmissions is prohibited". However, recently, there has been an increasing demand for portable cell phone jammers. We should mention that this project, presented in this report, is solely done for educational purposes. There is no intention to manufacture or sell such devices in India, or elsewhere. In this project, a device that will jam both GSM 900 and GSM 1800 services will be designed, built, and tested.

52. OPERATION

Jamming devices overpower the cell phone by transmitting a signal on the same frequency as the cell phone and at a high enough power that the two signals collide and canceleach other out. Cell phones are designed to add power if they experience low-level interference, so the jammer must recognize and match the power increase from the phone. Cell phones are full-duplex devices, which mean they use two separate frequencies, one for talking and one for listening simultaneously. Some jammers block only one of the frequencies used by cell phones, which has the effect of blocking both. The phone is tricked into thinking there is no service because it can receive only one of the frequencies. Less complex devices block only one group of frequencies, while sophisticated jammers can block several types of networks at once to head off dual-mode or tri-mode phones that automatically switch among different network types to

find an open signal. Some of the high-end devices block all frequencies at once and others can be tuned to specific frequencies. To jam a cell phone, all you need is a device that broadcasts on the correct frequencies.

Although different cellular systems process signals differently, all cell-phone networks use radio signals that can be interrupted. GSM, used in digital cellular and PCS-based systems, operates in the 900-MHz and 1800-MHz bands in Europe and Asia and in the 1900-MHz (sometimes referred to as 1.9-GHz) band in the United States. Jammers can broadcast on any frequency and are effective against AMPS, CDMA, TDMA, GSM, PCS, DCS, iDEN and Nextel systems. Old fashioned analog cell phones and today's digital devices are equally susceptible to jamming. Disrupting a cell phone is the same as jamming any other type of radio communication. A cell phone works by communicating with its service network through a cell tower or base station. Cell towers divide a city into small areas, or cells. As a cell phone user drives down the street, the signal is handed from tower to tower.

6

Fig.2.1 operation in off condition

A jamming device transmits on the same radio frequencies as the cell phone, disrupting the communication between the phone and the cell-phone base station in the town

. Fig2.2 operation in on condition

It's a called a denial-of-service attack. The jammer denies service of the radio spectrum to the cell-phone users within range of the jamming device. Older jammers sometimes were limited to working on phones using only analog or older digital mobile phone standards.

7

Newer models such as the double and triple band jammers can block all widely used systems (AMPS, iDEN, GSM, etc) and are even very effective against newer phones which hop to different frequencies and systems when interfered with. As the dominant network technology and frequencies used for mobile phones vary worldwide, some work only in specific regions such as Europe or North America.

The power of the jammer's effect can vary widely based on factors such as proximity to towers, indoor and outdoor settings, presence of buildings and landscape, even temperature and humidity play a role. There are concerns that crudely designed jammers may disrupt the functioning of medical devices such as pacemakers. However, like cell phones, most of the devices in common use operate at low enough power output (


Recommended