Design And Construction Of A Wireless Cellphone Detector And Jammer
This research work on “Design And Construction Of A Wireless Cellphone Detector And Jammer” is available in PDF/DOC. Click the below button to request or download the complete material
ABSTRACT
This research have been done to restrict the use of cellphones in restricted areas and to increase security. Sometimes people go to the extent of using mobiles in prohibited areas, due to such acts the security policies of those places are hindered and the effects might be hazardous. Therefore to find an answer to that problem with the help of this study a solution can be derived. A device can be set up which will consist of a cell phone detector with signal jammer. In the current market, basically these are two separate devices i.e., a cell phone detector and a signal jammer but they don’t serve the purpose completely as the detector can only detect signals but they can’t block them whereas the jammer can only jam the signals but they cannot detect it, and we cannot let the jammer turned on continuously as it may harm the environment. But if we combine these two devices and make it a single handy device then our purpose can be served.
TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
- PROBLEM STATEMENT
- OBJECTIVE OF THE PROJECT
- PURPOSE OF THE STUDY
- SIGNIFICANCE OF THE PROJECT
- LIMITATION OF THE PROJECT
- APPLICATION OF THE PROJECT
- METHODOLOGY
- PROJECT ORGANISATION
CHAPTER TWO
LITERATURE REVIEW
- HISTORY OF RF/ GSM JAMMER
- OPERATION OF THE PROJECT
- REVIEW OF THE PREVIOUS WORK
- PRESENT WORK
- HOW A GSM JAMMER WORKS
- HOW GSM JAMMERS ARE MADE
- GSM JAMMER RANGE
- RADIO FREQUENCY JAMMER USES
- RADIO FREQUENCY JAMMER EVOLUTION
- HISTORICAL BACKGROUND OF A GSM JAMMER
CHAPTER THREE
SYSTEM DESIGN
- SYSTEM BLOCK DIAGRAM
- OPERATION OF THE SYSTEM
- SYSTEM CIRCUIT DIAGRAM
CHAPTER FOUR
4.0 IMPLEMENTATION AND TESTING
4.1 RESULT
CHAPTER FIVE
CONCLUSIONS, SUMMARY RECOMMENDATIONS AND REFERENCES
- CONCLUSIONS
- SUMMARY
- RECOMMENDATION
- REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
In the present world every person is so engrossed in their mobile phones that they carry it themselves almost everywhere which also includes the restricted areas like examination halls, conference halls, meeting rooms, court rooms, petrol pumps and many more places. This hampers the privacy and security of that place. This can be prevented by installing jammers in these places, but when left active for long time it can be dangerous for the environment as it emits radiations. To overcome this issue we can use a detector which activates the jammer.
Wireless Mobile Phone devices are alternative to more expensive measures against denial of services by service providers. This work concentrates in designing a system that will detect the presence of mobile phone signals from an unauthorized user in restricted areas which will in turn trigger another device to restrict the user from service (Abdul, 2008). The mobile detector system with frequency jamming feature will be able to jam mobile phone frequency signal upon detection to prevent the transmitted signal from getting to the users cell phone.
This mobile detector system with frequency jamming features can sense the presence of an activated mobile cell phone from a distance. So it can be used to prevent the use of mobile phones in examination halls, confidential rooms, etc. It is also useful for detecting the use of mobile phone for spying and unauthorized video transmission. Jamming devices overpower the cell phone by transmitting a signal on the same frequency and at a higher enough power that the two signals collide and cancel each other out. Cell phones are designed to add power if they experience low-level interference, so the jammer must recognize and match the power increase from the phone. Some cell phone jammers are made to look like actual phones. Others are brief cased size or larger.
The usefulness of Mobile Detectors covers areas such as Churches/Mosques, university lecture rooms, libraries, hospitals, fuel pumps, meeting rooms, banking halls and other places where silence is appreciated. The frequency jammer which is being housed in a small metal/plastic box and quite inconspicuous can be mounted on a wall or a ceiling (Christian, 2012).
Cell phones are a full-duplex device which means they use two separated frequencies, one for talking and one for listening simultaneously. Some jammers block only one of the frequencies used by cell phones, while some have the effect of blocking both. The phone is tricked into thinking there is no service because it can receive only one of the frequencies. Less complex devices block only one group of frequencies, while sophisticated jammers can block several types of networks at once to head off dual-mode or tri-mode phones that automatically switch among different network types to find an open signal. Some of the high end devices block all frequencies at once, and others can be tuned to specific frequencies.
Cell phone Jammers are usually simple devices with typically only a switch to turn it on and off, a light to show that it is operational and an external antenna to send the signal. If the jammer is more sophisticated, it might include controls to set the jamming for varied frequencies or strengths. Small GSM jammers are usually powered by batteries. Often, the batteries are even the same as cell phone batteries. Larger GSM jammers are electrically powered (Ahmed, 2006).
1.2 PROBLEM STATEMENT
In The development of ways to reduce malpractices, killing, kidnapping, assassination is an important area of research. One of the major problems discovered aiding these atrocities has been the creation of mobile phones, which however is a good communication device but needs to be curtailed some places. In order to have a higher level of security in some places a mobile detector system with a frequency jamming feature which was developed using mobile cell phone detection techniques of measuring a cell phone’s electromagnetic properties, determining an identifiable signature, measuring the RF spectrum and meeting the jamming requirements.
1.3 AIM AND OBJECTIVES OF THE STUDY
The main aim of this study is build a wireless mobile detector system with frequency jamming features is designed to detect the RF signals from mobile phones. The main objectives of this project are as follows:
- To restrict the use of phones in prohibited areas.
- To prevent the sending and receiving of confidential
- To serve the purpose of both detector and jammer in a single device.
1.4 PURPOSE OF THE CIRCUIT
This circuit is designed to detect the transmission of signals in a particular area and block it with the help of jammer. This will help in securing the privacy of those places.
1.5 SIGNIFICANCE OF THE PROJECT
Even thought using of cell phone is every important for our daily life but these cell phone devices are creating some problems as the sound of ringing becomes annoying or disrupting in our environment. So the device jammer is the solution to avoid the annoying or disrupting of the cell phone devices.
1.6 APPLICATIONS OF JAMMER
Normally jammers are used in government offices in some countries, but jammers are mainly used by military, navy, air force and entire defense systems. People will not use jammers everywhere, but they use in selected places and highly confidential meetings, gathering Churches/Mosques, university lecture rooms, libraries, hospitals, fuel pumps, meeting rooms, banking halls and other places etc.
1.7 LIMITATION OF STUDY
As we all know that no human effort to achieve a set of goals goes without difficulties, certain constraints were encountered in the course of carrying out this project and they are as follows:-
- Difficulty in information collection: I found it too difficult in laying hands of useful information regarding this work and this course me to visit different libraries and internet for solution.
- Difficulty in parts gathering: I found it too difficult when gathering electronics parts used for the prototype.
- Financial Constraint: Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection.
- Time Constraint: The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work.
1.8 RESEARCH METHODOLOGY
In the course of carrying this study, numerous sources were used which most of them are by visiting libraries, consulting journal and news papers and online research which Google was the major source that was used.
1.9 PROJECT ORGANISATION
The work is organized as follows: chapter one discuses the introductory part of the work, chapter two presents the literature review of the study, chapter three describes the methods applied, chapter four discusses the results of the work, chapter five summarizes the research outcomes and the recommendations.