Design And Construction Of A Wireless Cellphone Detector And Jammer

This research work on “Design And Construction Of A Wireless Cellphone Detector And Jammer” is available in PDF/DOC. Click the below button to request or download the complete material

Overview

ABSTRACT

This research have been done to restrict the use of cellphones in restricted areas and to increase security. Sometimes people go to the extent of using mobiles in prohibited areas, due to such acts the security policies of those places are hindered and the effects might be hazardous. Therefore to find an answer to that problem with the help of this study a solution can be derived. A device can be set up which will consist of a cell phone detector with signal jammer. In the current market, basically these are two separate devices i.e., a cell phone detector and a signal jammer but they don’t serve the purpose completely as the detector can only detect signals but they can’t block them whereas the jammer can only jam the signals but they cannot detect it, and we cannot let the jammer turned on continuously as it may harm the environment. But if we combine these two devices and make it a single handy device then our purpose can be served. 

TABLE OF CONTENTS

COVER PAGE

TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWELDGEMENT

ABSTRACT

CHAPTER ONE

1.0   INTRODUCTION

1.1   BACKGROUND OF THE PROJECT

  • PROBLEM STATEMENT
  • OBJECTIVE OF THE PROJECT
  • PURPOSE OF THE STUDY
  • SIGNIFICANCE OF THE PROJECT
  • LIMITATION OF THE PROJECT
  • APPLICATION OF THE PROJECT
  • METHODOLOGY
  • PROJECT ORGANISATION

CHAPTER TWO

LITERATURE REVIEW

  • HISTORY OF RF/ GSM JAMMER
  • OPERATION OF THE PROJECT
  • REVIEW OF THE PREVIOUS WORK
  • PRESENT WORK
  • HOW A GSM JAMMER WORKS
  • HOW GSM JAMMERS ARE MADE
  • GSM JAMMER RANGE
  • RADIO FREQUENCY JAMMER USES
  • RADIO FREQUENCY JAMMER EVOLUTION
  • HISTORICAL BACKGROUND OF A GSM JAMMER

CHAPTER THREE

SYSTEM DESIGN

  • SYSTEM BLOCK DIAGRAM
  • OPERATION OF THE SYSTEM
  • SYSTEM CIRCUIT DIAGRAM

CHAPTER FOUR

4.0     IMPLEMENTATION AND TESTING

4.1     RESULT

CHAPTER FIVE

CONCLUSIONS, SUMMARY RECOMMENDATIONS AND REFERENCES

  • CONCLUSIONS
  • SUMMARY
  • RECOMMENDATION
  • REFERENCES

CHAPTER ONE

1.0                                                        INTRODUCTION

1.1                                           BACKGROUND OF THE STUDY

In the present world every person is so engrossed in their mobile phones that they carry it themselves almost everywhere which also includes the restricted areas like examination halls, conference halls, meeting rooms, court rooms, petrol pumps and many more places. This hampers the privacy and security of that place. This can be prevented by installing jammers in these places, but when left active for long time it can be dangerous for the environment as it emits radiations. To overcome this issue we can use a detector which activates the jammer.

Wireless Mobile Phone devices are alternative to more expensive measures against denial of services by service providers. This work concentrates in designing a system that will detect the presence of mobile phone signals from an unauthorized user in restricted areas which will in turn trigger another device to restrict the user from service (Abdul, 2008). The mobile detector system with frequency jamming feature will be able to jam mobile phone frequency signal upon detection to prevent the transmitted signal from getting to the users cell phone.

This mobile detector system with frequency jamming features can sense the presence of an activated mobile cell phone from a distance. So it can be used to prevent the use of mobile phones in examination halls, confidential rooms, etc. It is also useful for detecting the use of mobile phone for spying and unauthorized video transmission. Jamming devices overpower the cell phone by transmitting a signal on the same frequency and at a higher enough power that the two signals collide and cancel each other out. Cell phones are designed to add power if they experience low-level interference, so the jammer must recognize and match the power increase from the phone. Some cell phone jammers are made to look like actual phones. Others are brief cased size or larger.

The usefulness of Mobile Detectors covers areas such as Churches/Mosques, university lecture rooms, libraries, hospitals, fuel pumps, meeting rooms, banking halls and other places where silence is appreciated. The frequency jammer which is being housed in a small metal/plastic box and quite inconspicuous can be mounted on a wall or a ceiling (Christian, 2012).

Cell phones are a full-duplex device which means they use two separated frequencies, one for talking and one for listening simultaneously. Some jammers block only one of the frequencies used by cell phones, while some have the effect of blocking both. The phone is tricked into thinking there is no service because it can receive only one of the frequencies. Less complex devices block only one group of frequencies, while sophisticated jammers can block several types of networks at once to head off dual-mode or tri-mode phones that automatically switch among different network types to find an open signal. Some of the high end devices block all frequencies at once, and others can be tuned to specific frequencies.

Cell phone Jammers are usually simple devices with typically only a switch to turn it on and off, a light to show that it is operational and an external antenna to send the signal. If the jammer is more sophisticated, it might include controls to set the jamming for varied frequencies or strengths. Small GSM jammers are usually powered by batteries. Often, the batteries are even the same as cell phone batteries. Larger GSM jammers are electrically powered (Ahmed, 2006).

1.2                                                  PROBLEM STATEMENT

In The development of ways to reduce malpractices, killing, kidnapping, assassination is an important area of research. One of the major problems discovered aiding these atrocities has been the creation of mobile phones, which however is a good communication device but needs to be curtailed some places. In order to have a higher level of security in some places a mobile detector system with a frequency jamming feature which was developed using mobile cell phone detection techniques of measuring a cell phone’s electromagnetic properties, determining an identifiable signature, measuring the RF spectrum and meeting the jamming requirements.

1.3                     AIM AND OBJECTIVES OF THE STUDY

The main aim of this study is build a wireless mobile detector system with frequency jamming features is designed to detect the RF signals from mobile phones. The main objectives of this project are as follows:

  1. To restrict the use of phones in prohibited areas.
  2. To prevent the sending and receiving of confidential
  • To serve the purpose of both detector and jammer in a single device.

1.4                                               PURPOSE OF THE CIRCUIT

This circuit is designed to detect the transmission of signals in a particular area and block it with the help of jammer. This will help in securing the privacy of those places.

1.5                                         SIGNIFICANCE OF THE PROJECT

Even thought using of cell phone is every important for our daily life but these cell phone devices are creating some problems as the sound of ringing becomes annoying or disrupting in our environment. So the device jammer is the solution to avoid the annoying or disrupting of the cell phone devices.

1.6                                          APPLICATIONS OF JAMMER

Normally jammers are used in government offices in some countries, but jammers are mainly used by military, navy, air force and entire defense systems. People will not use jammers everywhere, but they use in selected places and highly confidential meetings, gathering Churches/Mosques, university lecture rooms, libraries, hospitals, fuel pumps, meeting rooms, banking halls and other places etc.

1.7                                                  LIMITATION OF STUDY

As we all know that no human effort to achieve a set of goals goes without difficulties, certain constraints were encountered in the course of carrying out this project and they are as follows:-

  1. Difficulty in information collection: I found it too difficult in laying hands of useful information regarding this work and this course me to visit different libraries and internet for solution.
  2. Difficulty in parts gathering: I found it too difficult when gathering electronics parts used for the prototype.
  • Financial Constraint: Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection.
  1. Time Constraint: The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work.

1.8                                             RESEARCH METHODOLOGY

In the course of carrying this study, numerous sources were used which most of them are by visiting libraries, consulting journal and news papers and online research which Google was the major source that was used.

1.9                                   PROJECT ORGANISATION

The work is organized as follows: chapter one discuses the introductory part of the work, chapter two presents the literature review of the study, chapter three describes the methods applied, chapter four discusses the results of the work, chapter five summarizes the research outcomes and the recommendations.