SlideShare a Scribd company logo
1 of 58
Download to read offline
A
Project Report
On
“CELLPHONE RF SIGNAL DETECTOR & JAMMER”
Submitted in partial fulfillment of the requirements for the award of the Degree of
BACHELOR OF ENGINEERING
In
ELECTRONICS & COMMUNICATION ENGINEERING
of
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
Jnana Sangama, Belagavi
Submitted by:
AMAN KUMAR
3RB09EC100
Under the guidance of
MR.DHIRAJ DESHPANDE.
Assistant Professor
Department of Electronics & Communication Engineering
Department of Electronics & Communication Engineering
BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI
Dist. Bidar, Karnataka
2014-2015
BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI
Dist. Bidar, Karnataka
Department of Electronics & Communication Engineering
CERTIFICATE
Certified that the Project Work entitled “CELLPHONE RF SIGNAL
DETECTOR & JAMMER” has been successfully carried out by AMAN KUMAR
(3RB09EC100) in partial fulfillment of the requirements for the award of degree of
Bachelor of Engineering in Electronics & Communication Engineering of Visvesvaraya
Technological University, Belagavi during the academic year 2014-2015. It is certified that
all the corrections/suggestions indicated for internal assessment have been incorporated in the
report deposited in the departmental library. The Project Report has been approved as it
satisfies the academic requirements in respect of Project Work prescribed for the said degree.
Project Guide Project Coordinator
Mr.Dhiraj Deshpande. Mr. Nagshetty Biradar
Assistant Professor Associate Professor
Head of Department Principal
Dr. T. S. Vishwanath Dr. BIPIN BIHARI LAL
Name of the examiners Signature with Date
1.
2.
BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI
Dist. Bidar, Karnataka
Department of Electronics & Communication Engineering
CERTIFICATE
Certified that the Project Work entitled “CELLPHONE RF SIGNAL
DETECTOR & JAMMER” has been successfully carried out by AMAN KUMAR
(3RB09EC100) in partial fulfillment of the requirements for the award of degree of
Bachelor of Engineering in Electronics & Communication Engineering of Visvesvaraya
Technological University, Belagavi during the academic year 2014-2015. It is certified that
all the corrections/suggestions indicated for internal assessment have been incorporated in the
report deposited in the departmental library. The Project Report has been approved as it
satisfies the academic requirements in respect of Project Work prescribed for the said degree.
Project Guide Project Coordinator
Mr.Dhiraj Deshpande. Mr. Nagshetty Biradar
Assistant Professor Associate Professor
Head of Department Principal
Dr. T. S. Vishwanath Dr. BIPIN BIHARI LAL
Name of the examiners Signature with Date
1.
2.
BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI
Dist. Bidar, Karnataka
Department of Electronics & Communication Engineering
CERTIFICATE
Certified that the Project Work entitled “CELLPHONE RF SIGNAL
DETECTOR & JAMMER” has been successfully carried out by AMAN KUMAR
(3RB09EC100) in partial fulfillment of the requirements for the award of degree of
Bachelor of Engineering in Electronics & Communication Engineering of Visvesvaraya
Technological University, Belagavi during the academic year 2014-2015. It is certified that
all the corrections/suggestions indicated for internal assessment have been incorporated in the
report deposited in the departmental library. The Project Report has been approved as it
satisfies the academic requirements in respect of Project Work prescribed for the said degree.
Project Guide Project Coordinator
Mr.Dhiraj Deshpande. Mr. Nagshetty Biradar
Assistant Professor Associate Professor
Head of Department Principal
Dr. T. S. Vishwanath Dr. BIPIN BIHARI LAL
Name of the examiners Signature with Date
1.
2.
BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI
Dist. Bidar, Karnataka
Department of Electronics & Communication Engineering
DECLARATION
I, Aman Kumar declare that the project entitled “CELLPHONE RF SIGNAL
DETECTOR & JAMMER” has been carried out by us and submitted in partial
fulfillment of the course requirements for the award of degree in Bachelor of Engineering
in Electronics & Communication Engineering of Visvesvaraya Technological
University, Belagavi during the academic year 2014-2015. The matter embodied in this
report has not been submitted to any other university or institution for the award of any
other degree.
Yours Sincerely,
Aman Kumar
BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI
Dist. Bidar, Karnataka
Department of Electronics & Communication Engineering
DECLARATION
I, Aman Kumar declare that the project entitled “CELLPHONE RF SIGNAL
DETECTOR & JAMMER” has been carried out by us and submitted in partial
fulfillment of the course requirements for the award of degree in Bachelor of Engineering
in Electronics & Communication Engineering of Visvesvaraya Technological
University, Belagavi during the academic year 2014-2015. The matter embodied in this
report has not been submitted to any other university or institution for the award of any
other degree.
Yours Sincerely,
Aman Kumar
BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI
Dist. Bidar, Karnataka
Department of Electronics & Communication Engineering
DECLARATION
I, Aman Kumar declare that the project entitled “CELLPHONE RF SIGNAL
DETECTOR & JAMMER” has been carried out by us and submitted in partial
fulfillment of the course requirements for the award of degree in Bachelor of Engineering
in Electronics & Communication Engineering of Visvesvaraya Technological
University, Belagavi during the academic year 2014-2015. The matter embodied in this
report has not been submitted to any other university or institution for the award of any
other degree.
Yours Sincerely,
Aman Kumar
Acknowledgements
First and foremost, we are grateful to our guide Mr. Dhiraj Deshpande,
Assistant Professor, for his positive criticism, valuable suggestions and
inevitable support. We felt extremely privileged and experienced an enthusiastic
interest from his side. This fueled our enthusiasm to step in even further and
encouraged us a lot.
We take this opportunity to express our sincere thanks to Dr. T. S.
Vishwanath, HOD for providing the necessary facilities in the department and
every other possible support.
The support and motivation from our project coordinator, Mr. Nagshetty
Biradar, Associate Professor and staff members and our Principal also need to
be mentioned.
Last but not the least; I extend my gratitude to the Almighty for giving me
strength and wisdom in completing this report.
Yours Sincerely,
Aman Kumar
ABSTRACT
Mobile jammer is used to prevent mobile phones from receiving or
transmitting signals with the base stations. Mobile jammers effectively disable mobile
phones within the defined regulated zones without causing any interference to other
communication means. Mobile jammers can be used in practically any location, but are
used in places where a phone call would be particularly disruptive like temples, libraries,
hospitals, cinema halls, schools & colleges etc.
As with other radio jamming, mobile jammers block mobile phone use by
sending out radio waves along the same frequencies that mobile phones use. This causes
enough interference with the communication between mobile phones and communicating
towers to render the phones unusable. Upon activating mobile jammers, all mobile
phones will indicate "NO NETWORK”. Incoming calls are blocked as if the mobile
phone were off. When the mobile jammers are turned off, all mobile phones will
automatically re-establish communications and provide full service.
Some countries prevent the use of jamming systems in civilian places; because it
is radiates the jamming signals at all time that may be effect on human health. The proposed
intelligent system solves this problem by designing a mobile detector which can decide if
there is mobile around or not, to make the jamming system work only when the cell phone is
making or receiving any calls or SMS.
This mobile detector or sniffer can sense the presence of an activated mobile cell
phone from a distance of one and-a-half meters. So it can be used to prevent use of mobile
phones in examination halls, confidential rooms, etc. It is also useful for detecting the use of
mobile phone for Spying and unauthorized video transmission. The circuit can detect the
incoming and outgoing calls, SMS and video transmission even if the mobile phone is kept
in the silent mode.
Table of Contents
Chapter 1: Introduction ………………………. 01
1.1 Introduction ………………………. 01
1.2 Thesis overview ………………………. 02
Chapter 2: History ………………………. 03
Chapter 3:Project Overview ………………………. 04
3.1 Block Diagram ………………………. 04
3.2 Description of Block Diagram ………………………. 05
3.2.1 Regulated power Supply ………………………. 05
3.2.2 Microcontroller ………………………. 06
3.2.3 Crystal oscillator ………………………. 09
3.2.4 On cip RTC ………………………. 09
3.2.5 LCD Screen ………………………. 10
3.2.6 Relay ………………………. 10
3.2.7 jammer Blocks ………………………. 11
3.2.8 Detector ckt ………………………. 11
Chapter 4 : Literature Survey ………………………. 13
4.1 jamming Techniques ………………………. 13
4.1.1 Spoofing ………………………. 13
4.1.2 Shield Attack ………………………. 13
4.1.3 Denial of Service ………………………. 13
4.2 Design Parameters ………………………. 14
4.2.1 The distance to be jammed (D) ………………………. 14
4.2.2 The frequency Bands ………………………. 14
4.2.3 Jamming-to-signal ratio {J/S} ………………………. 15
4.2.4 Free space loss {F} ………………………. 15
4.2.5 Power calculations ………………………. 15
Chapter 5 : System Design ………………………. 16
5.1 Cell Phone Jammer Schematic ………………………. 16
5.1.1 Power Supply ………………………. 17
5.1.2 IF Section ………………………. 17
5.1.3 RF Section ………………………. 21
5.2 Basic Concept and Working of Cell phone Detector………………………. 25
5.2.1 Purpose of the Circuit ………………………. 25
5.2.2 Concept ………………………. 25
5.2.3 How the Circuit Works? ………………………. 26
Chapter 6 : Software Description ………………………. 27
6.1 Express PCB ………………………. 27
6.1.1 Preparing Express PCB for First Use ………………………. 27
6.1.2 The Interface ………………………. 28
6.1.3 Design Considerations ………………………. 29
6.2 PIC Compiler ………………………. 30
6.3 Proteus ………………………. 31
6.4 Procedural steps for compilation, simulation and dumping………….. 31
6.4.1 Compilation and simulation steps ………………………. 31
6.4.2 Dumping steps ………………………. 35
6.5 Program Code ………………………. 42
Chapter 7: Advantages and Disadvantages ………………………. 46
Chapter 8: Applications ………………………. 47
Chapter 9: Results ………………………. 49
Bibliography ………………………. 50
LIST OF FIGURES
Figure No. Name Of Figure Page No.
3.1. Block diagram of jammer with controller .............................. 04
3.2. Jamming Block Diagram .............................. 05
3.3. Circuit diagram of Regulated Power Supply with Led connection .................. 06
3.4. Microcontrollers .............................. 06
3.5. Microcontroller pin diagram .............................. 07
3.6. Crystal oscillator .............................. 09
3.7. LCD screen .............................. 10
3.8. Relay .............................. 10
3.9. Detector Circuit .............................. 11
5.1. Schematic representation of cell phone jammer .............................. 16
5.2. Power Supply .............................. 17
5.3. Block diagram of IF section .............................. 18
5.4. Simple function generator circuit .............................. 19
5.5. Op – amp summer circuit .............................. 20
5.6. Positive diode – clamper with bias .............................. 20
5.7. Block diagram of RF section .............................. 21
5.8. Ckt dia of Detector .............................. 26
6.1. Tool bar necessary for the interface .............................. 28
6.2. Picture of opening a new file using PIC C compiler .............................. 31
6.3. Picture of compiling a new file using PIC C compiler .............................. 32
6.4. Picture of compiling a project.C file using PIC C compiler .............................. 32
6.5. Picture of checking errors and warnings using PIC C compiler .......................... 33
6.6. Picture of .hex file existing using PIC C compiler .............................. 34
6.7. Picture of program dumper window .............................. 35
6.8. Picture of checking communications before dumping program into microcontroller .... 36
6.9. Picture after connecting the dumper to microcontroller .............................. 37
6.10. Picture of dumper recognition to microcontroller .............................. 38
6.11. Picture of program importing into the microcontroller .............................. 39
6.12. Picture of program browsing which is to be dumped .............................. 40
6.13. Picture after program dumped into the microcontroller .............................. 41
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 1
CHAPTER 1: INTRODUCTION
1.1 Introduction:
Mobile jammer is used to prevent mobile phones from receiving or transmitting signals
with the base stations. Mobile jammers effectively disable mobile phones within the defined
regulated zones without causing any interference to other communication means Mobile jammers
can be used in practically any location, but are used in places where a phone call would be
particularly disruptive like Temples, Libraries, Hospitals, Cinema halls, schools & colleges etc.
As with other radio jamming, mobile jammers block mobile phone use by sending out
radio waves along the same frequencies that mobile phones use. This causes enough interference
with the communication between mobile phones and communicating towers to render the phones
unusable. Upon activating mobile jammers, all mobile phones will indicate "NO NETWORK".
Incoming calls are blocked as if the mobile phone were off. When the mobile jammers are turned
off, all mobile phones will automatically re-establish communications and provide full service. The
activation and deactivation time schedules can be programmed with microcontroller.
This project uses regulated 5V, 500mA power supply. Unregulated 12V DC is used for
relay. 7805 three terminal voltage regulator is used for voltage regulation. Bridge type full wave
rectifier is used to rectify the ac output of secondary of 230/12V step down transformer.
The cell phone detector can sense the presence of an activated mobile cell phone from a
distance of about one and half meters. So it can be used to prevent use of mobile phone in the
examination halls, confidential rooms, etc. it is also useful for detecting the use of mobile phone for
spying and unauthorised video transmission.
The Ckt can detect both the incoming and outgoing calls, SMS and video transmission
even if the mobile phone is kept in the silent mode. The moment the detector detect the RF
transmission signal from an activated mobile phone, it starts sound a beep alarm and the LED
blinks. The alarm continuous until the signal transmission ceases.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 2
The main features of this project are:
1. User friendly operation.
2. Very easy to operate.
3. LCD with driver.
4. Activities display on LCD.
5. Jammer activation using relay switch
1.2 Thesis Overview:
Chapter 1 Presents introduction to the overall thesis and the overview of the project. In the
project overview a brief introduction of “Cellphone RF Signal detector and
Jammer” and its applications are discussed.
Chapter 2 Presents the history about the jammer and detector.
Chapter 3 Presents the overview about the project. It explains the block diagram of the jammer
and detector and a short explanation about each block of these.
Chapter 4 Presents the literature survey. It shortly describes the jamming techniques, and
details about the design parameters of the ckt.
Chapter 5 Presents the system design. It consist of jammer schematics diagram and basic
concept of cell phone detector ckt.
Chapter 6 Presents the software description. It consist of details regarding Express PCB, PIC
controller and details about compilation, simulation and dumping.
Chapter 7 Presents the advantages and disadvantages of the project.
Chapter 8 Presents the application of the project.
Chapter 9 Presents the result of the project.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 3
CHAPTER 2: HISTORY
The technique used in most of the commercial jammers is based on noise attack. In the
previously designed cell-phone jammers, designers came up with an electronic device that acts as a
transmitter to transmit electromagnetic signals of respective frequency and higher power as used by
GSM/DCS systems. In this technique voltage controlled oscillator (VCO) plays a major role in
generating the jamming frequency. In our research we found that the above technique is complex
one as compared to our technique because our idea of jamming through spectrum distortion proves
to be simpler, easier to fabricate and cost effective.
The rapid proliferation of cell phones at the beginning of the 21st century to near
ubiquitous status eventually raised problems, such as their potential use to invade privacy or
contribute to academic cheating. In addition, public backlash was growing against the disruption
cell phones introduced in daily life. While older analog cell phones often suffered from poor
reception and could even be disconnected by simple interference such as high frequency noise,
increasingly sophisticated digital phones have led to more elaborate counters.
Cell phone jamming devices are an alternative to more expensive measures against cell
phones, such as Faraday cages, which are mostly suitable as built in protection for structures.
They were originally developed for law enforcement and the military to interrupt
communications by criminals and terrorists. Some were also designed to foil the use of certain
remotely detonated explosives. The civilian applications were apparent, so over time many
companies originally contracted to design jammers for government use switched over to sell these
devices to private entities. Since then, there has been a slow but steady increase in their purchase
and use, especially in major metropolitan areas.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 4
Mobile signal detector and jammer
Micro
controller
Regulated power supply
LCD
driver
LCD
Relay
driver
LED indicators
Crystal
Oscillator
Detector
circuit
Relay
Reset
Jammer circuit
CHAPTER 3: PROJECT OVERVIEW
In Cell phone jammer we can have various blocks like control switch set, LCD, RPS etc.,
each block has its own functions. Heart of the project is jammer block, which is explained in
subsequent chapters. The various blocks of cell phone jammer and controller is as shown in Figure
3.1
3.1 Block diagram
Figure 3.1: Block diagram of jammer with controller
The various blocks of cell phone jammer is shown in below Figure 3.1.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 5
Figure 3.2: Jamming Block Diagram
3.2 DESCRIPTION OF BLOCK DIAGRAM
The main parts of this schematic diagram are:
1) REGULATED POWER SUPPLY.
2) MICROCONTROLLER
3) CRYSTAL OSCILLATOR
4) ON CHIP RTC
5) LCD DISPLAY
6) RELAY
7) JAMMER BLOCK
8) DETECTOR CIRCUIT
3.2.1 Regulated Power Supply
A variable regulated power supply block shown in Figure 2.1, is also called a variable
bench power supply, is one where one can continuously adjust the output voltage as per the
requirements. Most digital logic circuits and processors need a 5 volt power supply. To use these
parts we need to build a regulated 5 volt source. To make a 5 volt power supply, we use a LM7805
voltage regulator IC.
The basic block diagram of the regulated power supply is as follows:
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 6
The basic circuit diagram of a regulated power supply (DC O/P) with led connected as load
is shown in fig: 3.3.
Fig 3.3 Circuit diagram of Regulated Power Supply with Led connection
3.2.2 Microcontroller
Fig: 3.4 Microcontrollers
A Microcontroller is a programmable digital processor with necessary peripherals. Both
microcontrollers and microprocessors are complex sequential digital circuits meant to carry out job
according to the program / instructions. Sometimes analog input/output interface makes a part of
microcontroller circuit of mixed mode (both analog and digital nature).
Peripheral Interface Controllers (PIC) is one of the advanced microcontrollers developed
by microchip technologies. These microcontrollers are widely used in modern electronics
applications. A PIC controller integrates all type of advanced interfacing ports and memory
modules. The first PIC chip was announced in 1975 (PIC1650). As like normal microcontroller, the
PIC chip also combines a microcontroller unit called CPU and is integrated with various types
of memory modules (RAM, ROM, EEPROM, etc), I/O ports, timers/counters, communication
ports, etc.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 7
PIC16F877A is one of the most advanced microcontrollers from Microchip. This
controller is widely used for experimental and modern applications because of its low price, wide
range of applications, high quality, and ease of availability.
Pin description:
PIC16F72 has a total of 28 pins. It is most frequently found in a DIP28 type of case but can
also be found in SMD case which is smaller from a DIP. DIP is an abbreviation for Dual In
Package. SMD is an abbreviation for Surface Mount Devices suggesting that holes for pins to go
through when mounting aren't necessary in soldering this type of a component.
Pins on PIC16F72 microcontroller have the following meaning:
There are 28 pins on PIC16F72. Most of them can be used as an IO pin. Others are already for
specific functions.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 8
These are the pin functions.
1. MCLR – to reset the PIC
2. RA0 – port A pin 0
3. RA1 – port A pin 1
4. RA2 – port A pin 2
5. RA3 – port A pin 3
6. RA4 – port A pin 4
7. RA5 – port A pin 5
8. VSS – ground
9. OSC1 – connect to oscillator
10. OSC2 – connect to oscillator
11. RC0 – port C pin 0 VDD – power supply
12. RC1 – port C pin 1
13. RC2 – port C pin 2
14. RC3 – port C pin 3
15. RC4 - port C pin 4
16. RC5 - port C pin 5
17. RC6 - port C pin 6
18. RC7 - port C pin 7
19. VSS - ground
20. VDD – power supply
21. RB0 - port B pin 0
22. RB1 - port B pin 1
23. RB2 - port B pin 2
24. RB3 - port B pin 3
25. RB4 - port B pin 4
26. RB5 - port B pin 5
27. RB6 - port B pin 6
28. RB7 - port B pin 7
By utilizing all of this pin so many application can be done such as:
1. LCD – connect to Port B pin.
2. LED – connect to any pin declared as output.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 9
3. Relay and Motor - connect to any pin declared as output.
4. External EEPROM – connect to I2C interface pin – RC3 and RC4 (SCL and SDA)
5. LDR, Potentiometer and sensor – connect to analogue input pin such as RA0.
6. GSM modem dial up modem – connect to RC6 and RC7 – the serial communication interface
using RS232 protocol.
For more detail function for each specific pin please refer to the device datasheet from
Microchip
3.2.3 Crystal oscillator
Crystal oscillator is made up of quartz crystal with the desired value of resonant
frequency forms part of the frequency-selective feedback network. Crystal oscillator is the
natural choice when the accuracy and stability of frequency.
The crystal oscillator speed that can be connected to the PIC microcontroller range from
DC to 20Mhz. Using the CCS C compiler normally 20Mhz oscillator will be used and the price is
very cheap. The 20 MHz crystal oscillator should be connected with about 22pF capacitor.There
are 5 input/output ports on PIC microcontroller namely port A, port B, port C, port D and port E.
Each port has different function. Most of them can be used as I/O port.
3.2.4 On chip RTC
The real time clock (RTC) is a widely used device that provides accurate time and
date for many applications. The RTC chip present in the PC provides time components of
hour, minute and second. The RTC chip uses an internal battery that keeps the time and date even
when the power is off. One of the most widely used RTC chips is the DS1307 from Dallas
semiconductor.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 10
3.2.5 LCD screen
LCD screen consists of two lines with 16 characters each. Each character consists
of 5x7dot matrix. Contrast on display depends on the power supply voltage and whether messages
are displayed in one or two lines. For that reason, variable voltage 0-Vdd is applied on pin marked
as Vee. Trimmer potentiometer is usually used for that purpose. Some versions of displays have
built in backlight (blue or green diodes). When used during operating, a resistor for current
limitation should be used (like with any LE diode).
3.2.6 Relay
A relay is an electrically operated switch. Current flowing through the coil of the relay
creates a magnetic field which attracts a lever and changes the switch contacts. The coil current
can be on or off so relays have two switch positions and they are double throw (changeover)
switches.
Relays allow one circuit to switch and second circuit which can be completely separate
from the first. For example a low voltage battery circuit can use a relay to switch a 230V AC
mains circuit. There is no electrical connection inside the relay between the two circuits; the link
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 11
is magnetic and mechanical.
The coil of a relay passes a relatively large current, typically 30mA for a 12Vrelay, but it
can be as much as 100mA for relays designed to operate from lower voltages. Most ICs (chips)
cannot provide this current and transistors usually used to amplify the small IC current to the
larger value required for the relay coil. Relays are usually SPDT (single pole double throw) or
DPDT (double pole double throw) but they can have many more sets of switch contacts, for
example relays with 4 sets of changeover contacts are readily available. Relays used in our
project have got a Coil rating of 12V.
3.2.7 Jammer blocks
Jammer block mainly consists of three parts, they are
i. Power supply.
ii. IF section.
iii.RF section.
About these we have discussed in chapter ..................
3.2.8 Detector Circuit
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 12
Mobile phone uses RF with a wavelength of 30cm at 872 to 2170 MHz. That is the signal is
high frequency with huge energy. When the mobile phone is active, it transmits the signal in the
form of sine wave which passes through the space. The encoded audio/video signal contains
electromagnetic radiation which is picked up by the receiver in the base station.
Ordinary LC (Coil-Capacitor) circuits are used to detect low frequency radiation in the
AM and FM bands. The tuned tank circuit having a coil and a variable capacitor retrieve the signal
from the carrier wave. But such LC circuits cannot detect high frequency waves near the
microwave region. Hence in the circuit, a capacitor is used to detect RF from mobile phone
considering that, a capacitor can store energy even from an outside source and oscillate like LC
circuit.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 13
CHAPTER 4: Literature Survey
4.1 Jamming Techniques:
There are several ways to jam an RF device. The three most common techniques can be
categorized as follows:
4.1.1 Spoofing
In this kind of jamming, the device forces the mobile to turn off itself. This type is very
difficult to be implemented since the jamming device first detects any mobile phone in a specific
area, then the device sends the signal to disable the mobile phone. Some types of this technique can
detect if a nearby mobile phone is there and sends a message to tell the user to switch the phone to
the silent mode (Intelligent Beacon Disablers).
4.1.2 Shielding Attacks
This is known as TEMPEST or EMF shielding. This kind requires closing an area in a
faraday cage so that any device inside this cage cannot transmit or receive RF signal from outside of
the cage. This area can be as large as buildings, for example.
4.1.3 Denial of Service
This technique is referred to DOS. In this technique, the device transmits a noise signal at
the same operating frequency of the mobile phone in order to decrease the signal-to-noise ratio
(SNR) of the mobile under its minimum value. This kind of jamming technique is the simplest one
since the device is always on. Our device is of this type.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 14
4.2 Design Parameters:
Based on the above, our device which is related to the DOS technique is transmitting noise
on the same frequencies of the two bands GSM 900 MHz, and GSM 1.8 GHz (known also as DCS
1800 band). We focused on some design parameters to establish the device specifications. These
parameters are as follows:
4.2.1. The distance to be jammed (D)
This parameter is very important in our design, since the amount of the output power of the
jammer depends on the area that we need to jam. Later on we will see the relationship between the
output power and the distance D. Our design is established upon D=10 meters for DCS 1800 band
and D=20 meters for GSM 900 band.
4.2.2. The frequency bands
GSM900:
Uplink: 890-915 MHz
Down link: 935-960 MHz
DCS 1800:
Uplink: 1710-1785MHz-1785 MHz
Downlink: 1805-1880 MHz
In our design, the jamming frequency must be the same as the downlink, because it needs
lower power to do jamming than the uplink range and there is no need to jam the base station itself.
So, our frequency design will be as follows:
GSM 900 935-960 MHz
GSM 1800 1805-1880 MHz
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 15
4.2.3. Jamming–to-signal ratio {J/S}
Jamming is successful when the jamming signal denies the usability of the communication
transmission. In digital communications, the usability is denied when the error rate of the
transmission cannot be compensated by error correction. Usually, a successful jamming attack
requires that the jammer power is roughly equal to signal power at the receiver (mobile device).
The general equation of the jamming-to-signal ratio is given as follows:
where: Pj=jammer power, Gjr= antenna gain from jammer to receiver, Grj=antenna gain
from receiver to jammer, Rtr=range between communication transmitter and receiver,
Br=communication receiver bandwidth, Lr =communication signal loss, Pt=transmitter power, Gtr=
antenna gain from transmitter to receiver, Grt=antenna gain from receiver to transmitter, Rjr=range
between jammer and communication receiver, Bj=jammer bandwidth, and Lj=jamming signal loss.
For GSM, the specified system SNRmin is 9 dB which will be used as the worst case
scenario for the jammer. The maximum power at the mobile device Pr is -15 dBm.
4.2.4 Free space loss {F}
The free-space loss (or path loss) is given by:
The maximum free space loss (worst case F) happens when the maximum frequency is
used in the above equation. Using 1880 MHz gives:
F (dB) =32.44+20 log 0.01 + 20 log 1880 which gives F =58 dB.
4.2.5 Power calculations
Here, we need to find the power that is needed to be transmitted to jam any cell phone
within a distance of around 10 meters for DCS. From the above considerations, we can find the
required output power from the device, as follows:
Using SNR=9 dB and the maximum power signal for mobile receiver=-15 dBm, gives J=-
24 dBm. But, our goal is to find the output power from the device, so when we add the free space
loss to the amount of power at the mobile receiver we get our target:
Output power=-24dBm+58dB = 34 dBm
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 16
CHAPTER 5:SYSTEM DESIGN
5.1 CELL PHONE JAMMER SCHEMATIC
Fig. 5.1 schematic representation of cell phone jammer.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 17
The schematic consists of mainly
1 Power supply.
2 IF section.
3. RF section
5.1.1 POWER SUPPLY
The power supply consists of the following main parts as shown in the Figure 5.2.
fig 5.2 Power Supply
Transformer: Is used to transform the 220VAC to other levels of voltages.
Rectification: This part is to convert the AC voltage to a DC one. We have two methods
for rectification: Half wave-rectification: the output voltage appears only during positive cycles of
the input signal. Full wave –rectification: a rectified output voltage occurs during both the positive
and negative cycles of the input signal.
The Filter: Used to eliminate the fluctuations in the output of the full wave
rectifier―eliminate the noise‖ so that a constant DC voltage is produced. This filter is just a large
capacitor used to minimize the ripple in the output.
5.1.2 IF SECTION
The block diagram of IF section is as shown in Figure 5.3. The function of the IF-section
of the Mobile jammer is to generate the tuning signal for the VCO in the RF- Section,
which will sweep the VCO through the desired range of frequencies. This tuning signal
is generated by a triangular wave generator (1 10 KHz) along with noise generator, and then
offset by proper amount so as to sweep the VCO output from the minimum
desired frequency to a maximum.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 18
Figure 5.3: Block diagram of IF section
The IF section consists of three main parts
i. Triangle wave generator. (To tune the VCO in the RF section).
ii. Noise generator (provides the output noise).
iii. Signal mixer and DC offset circuits (to mix the triangle and the noise waves).
i. Triangle wave generator
The triangle wave generator consists of op-amp LM1458. Its block diagram and
description is as shown in Figure 5.4. The next op amp IC 1b is wired as an integrator.R5 is the
feedback resistor and C2 is the integrating capacitor. Non inverting input of IC 1b (pin6) is tied to
ground using resistor R7. The output of IC 1a which is a square wave is applied to the inverting
input of IC 1b (pin 5) through R4 which is the input resistance of IC 1b.The output of IC 1b will
be a triangular wave form, because integrating a square wave will result in a triangular
waveform. IC 2a forms another integrator, where R11 is its feedback resistor and C3 is the
integrating capacitor.R6 is the input resistance of IC 2a. Non inverting input of IC 2a (pin 3)
is tied to ground using the 10K resistor R8. IC 2b forms an inverting amplifier where R9 is its input
resistor and R10 the feedback resistor. With the values of R10 & R9, the gain of the inverting
amplifier stage will be 27, (AV = -Rf/Rin) The triangular output waveform from the IC 1b is
further integrated using IC 2a inverter using IC 2b circuit diagram.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 19
Figure 5.4 : Simple function generator circuit
ii. Noise Generator
To achieve jamming a noise signal is mixed with the triangle wave signal to
produce the tuning voltage for the VCO. The noise will help in masking the jamming
transmission, making it look like random “noise” to an outside observer .Without the noise
generator, the jamming signal is just a sweeping, unmodulated Continuous Wave RF carrier.
The noise generator used in this design is based on the avalanche noise
generated by a Zener breakdown phenomenon. It is created when a PN junction is operated in the
reverse breakdown mode. The avalanche noise is very similar to shot noise, but much
more intense and has a flat frequency spectrum (white).
The magnitude of the noise is difficult to predict due to its dependence on the materials.
Basically the noise generator circuit consists of a standard 6.8 volt zener diode
with a small reverse current, a transistor buffer, and The National LM386 audio
amplifier which acts as a natural band-pass filter and mall-signal amplifier.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 20
iii. Signal mixer and DC offset circuits
Figure 5.5 : Op – amp summer circuit
The triangle wave and noise signals are mixed using OP-Amp configured as
summer shown in Figure 5.5, then a dc voltage is added to the resulted signal to obtain
the required tuning voltage using diode-clamper circuit that is shown in Figure 5.6. To gain good
clamping the RC time constant selected so that it‘s more than ten times the period of the input
frequency, also a potentiometer was added to control the biasing voltage so as to get the desired
tuning voltage.
Figure 5.6 : Positive diode – clamper with bias
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 21
5.1.3 RF SECTION
The block diagram of RF section is as shown in Figure 5.7
Figure 5.7 : Block diagram of RF section
The RF-section is the most important part of the mobile jammer it consists of
i. Voltage Controlled Oscillator (VCO).
ii. RF Power amplifier.
iii. Antenna.
These components were selected according to the desired specification of the
jammer such as the frequency range and the coverage range. It‘s important to note that all the
components used has 50 ohm input/output impedance, so 50 ohm micro strip was
needed for matching between the components.
Power requirements
To successfully jam a particular region, we need to consider a very important parameter
the signal to noise ratio, referred to as the SNR. Every device working on radio communication
principles can only tolerate noise in a signal up to a particular level. This is called the SNR
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 22
handling capability of the device. Most cellular devices have a SNR handling capability of around
12dB. A very good device might have a value of 9dB, although it is highly unlikely. To ensure
jamming of these devices, we need to reduce the SNR of the carrier signal to below the 9dB
level.For this, we consider the worst-case scenario from a jammers point of view. This would
mean maximum transmitted power Smax from the tower, along with the lowest value of the SNR
handling capability of a mobile device. So, mathematically
J = -24dBm
Since SNRmin = S/J
Where J is the power of the jamming signal.
So we need to have jamming signal strength of -24dBm at the mobile device‘s reception
to effectively jam it. However, our radiated signal will undergo some attenuation in being
transmitted from the antenna of the jammer to the antenna of the mobile device. This path
loss can be calculated using the simple free space path loss approximation:
Here f is the frequency in MHz, and D the distance traveled in kilometers. Using the
GSM downlink center frequency (947.5MHz) and a jamming radius of 20m, we get the value of
path loss to be 58dBm. This ideal path loss is for free space only, and the path losses in air will
me much greater. This means that the jamming radius will be less than the 20m used to calculate
this value. So, including the power lost in path loss, we need to transmit a signal with strength of:
JT = 58 - 24 = 34dBm
Now, the power output of our VCO is -3dBm, which needs to be amplified by 37dBm to
meet our requirements. For this, we used a two-stage amplification mechanism. The first stage is
the MAR-4SM pre-amplifier, which provides a 8dBm power gain. This takes the power level to
5dBm. To match the power to the input recommendation of the second
amplification stage (the PF08103B), we need to attenuate this by 4dB, for which a pi-
attenuator is used. Now the power level is 1dB, which is amplified by a gain of 33dB by the
PF08103B to an output power level of 34dBm.
Voltage controlled oscillator
The voltage controlled oscillator (VCO) is the heart of the RF-section. It is the device that
generates the RF signal which will interfere with the cell phone. The output of the VCO has a
frequency which is proportional to the input voltage, thus, we can control the output frequency by
changing the input voltage. When the input voltage is DC, the output is a specific frequency, while
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 23
if the input is a triangular waveform, the output will span a specific frequency range. In our design,
we need to find a VCO for GSM 900 and GSM 1800.
There are three selection criteria for selecting a VCO for this application. Most
importantly, it should cover the bands that we need, secondly, it should be readily available at low
cost, and finally, it should run at low power consumption. Moreover, we need to minimize the size
of GSM-jammer. So, we started to search through the internet for VCO's that work for GSM 900 &
GSM 1800 bands.
Finally, we found the following VCO IC’s:-
CVCO55BE; this is for GSM 1800. The output frequency is 1785-1900 MHz and the
output power is up to 5 dBm.
CVCO55CL; this is for GSM 900. The output frequency is 925-970 MHz and the output
power is up to 8 dBm.
We chose these IC’s for the following reasons:-
[A] Surface mount, which reduces the size of product.
[B] Having large output power that reduces the number of amplification stages that we need.
[C] Having same value of power supply which is typically equal to 5 volt.
[D] Having same noise properties.
The power amplifier:
Since 5 dBm output powers from the VCO do not achieve the desired output power of the
GSM jammer, we had to add an amplifier with a suitable gain to increase the VCO output to 34
dBm. We obtained our amplifier IC (PF08109B) from an old mobile as it was the most suitable,
cheapest and easiest way to get one.
The PF08109B, shown in Figure 15, has high gain of 35 dB. As datasheets illustrated that
this IC is designed to work in dual band GSM & DCS, we firstly designed and built our circuit
using only one power amplifier IC. Upon testing, the jammer didn’t work properly. It was
concluded that amplifier IC does not work at the two bands simultaneously. Such a fact was not
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 24
indicated in the datasheets. This result was really a big shock, but easily solved by changing the
whole RF design. The new design uses two power amplifier IC’s instead of one amplifier.
Antenna:
A proper antenna is necessary to transmit the jamming signal. In order to have optimal
power transfer, the antenna system must be matched to the transmission system. In this project, we
used two 1/4 wavelength monopole antennas, with 50 Ω input impedance so that the antennas are
matched to the system. We used monopole antenna since the radiation pattern is omni-directional.
Figure 17 shows the DCS 1800 antenna, while Figure 18 shows the GSM 900 antenna.
DCS antenna Specifications:
1. Frequency: 1700-1900MHz
2. Input impedance 50Ω
GSM 900 antenna Specifications:
1. Frequency: 850MHz-1GHz
2. Input impedance 50Ω
3. VSWR<2
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 25
5.2 BASIC CONCEPT AND WORKING OF CELLPHONE DETECTOR
5.2.1 PURPOSE OF THE CIRCUIT
This circuit is intended to detect unauthorized use of mobile phones in examination halls,
confidential rooms etc. It also helps to detect unauthorized video and audio recordings. It detects the
signal from mobile phones even if it is kept in the silent mode. It also detects SMS.
5.2.2. CONCEPT
Mobile phone uses RF with a wavelength of 30cm at 872 to 2170 MHz. That is the signal
is high frequency with huge energy. When the mobile phone is active, it transmits the signal in the
form of sine wave which passes through the space. The encoded audio/video signal contains
electromagnetic radiation which is picked up by the receiver in the base station. Mobile phone
system is referred to as “Cellular Telephone system” because the coverage area is divided into
“cells” each of which has a base station. The transmitter power of the modern 2G antenna in the
base station is 20-100 watts.
When a GSM (Global System of Mobile communication) digital phone is transmitting, the
signal is time shared with 7 other users. That is at any one second, each of the 8 users on the same
frequency is allotted 1/8 of the time and the signal is reconstituted by the receiver to form the
speech. Peak power output of a mobile phone corresponds to 2 watts with an average of 250 milli
watts of continuous power. Each handset with in a ‘cell’ is allotted a particular frequency for its use.
The mobile phone transmits short signals at regular intervals to register its availability to the nearest
base station. The network data base stores the information transmitted by the mobile phone. If the
mobile phone moves from one cell to another, it will keep the connection with the base station
having strongest transmission. Mobile phone always tries to make connection with the available
base station. That is why, the back light of the phone turns on intermittently while travelling. This
will cause severe battery drain. So in long journeys, battery will flat within a few hours.
AM Radio uses frequencies between 180 kHz and 1.6 MHz, FM radio uses 88 to 180
MHz, TV uses 470 to 854 MHz. Waves at higher frequencies but within the RF region is called
Micro waves. Mobile phone uses high frequency RF wave in the micro wave region carrying huge
amount of electromagnetic energy. That is why burning sensation develops in the ear if the mobile
is used for a long period. Just like a micro wave oven, mobile phone is ‘cooking’ the tissues in the
ear. RF radiation from the phone causes oscillation of polar molecules like water in the tissues. This
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 26
generates heat through friction just like the principle of microwave oven. The strongest radiation
from the mobile phone is about 2 watts which can make connection with a base station located 2 to
3 km away.
5.2.3 HOW THE CIRCUIT WORKS?
Ordinary LC (Coil-Capacitor) circuits are used to detect low frequency radiation in the AM
and FM bands. The tuned tank circuit having a coil and a variable capacitor retrieve the signal from
the carrier wave. But such LC circuits cannot detect high frequency waves near the microwave
region. Hence in the circuit, a capacitor is used to detect RF from mobile phone considering that, a
capacitor can store energy even from an outside source and oscillate like LC circuit.
Figure 5.8 Circuit diagram
R1 3.9 M
R2
100K R3 1 M
LED
Red
9 V Battery
+
C1
0.22 UF
C2
100
25V
UF
IC1
IC1
CA 3130
2
3
4
7
6
0.1
R4 100 R
R5 100R
BUZZER
C
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 27
CHAPTER 6: SOFTWARE DESCRIPTION
This project is implemented using following software’s:
 Express PCB – for designing circuit
 PIC C compiler - for compilation part
 Proteus 7 (Embedded C) – for simulation part
6.1 Express PCB:
Breadboards are great for prototyping equipment as it allows great flexibility to modify a
design when needed; however the final product of a project, ideally should have a neat PCB, few
cables, and survive a shake test. Not only is a proper PCB neater but it is also more durable as there
are no cables which can yank loose.
Express PCB is a software tool to design PCBs specifically for manufacture by the
company Express PCB (no other PCB maker accepts Express PCB files). It is very easy to use, but
it does have several limitations.
*It can be likened to more of a toy then a professional CAD program.
*It has a poor part library (which we can work around)
*It cannot import or export files in different formats
*It cannot be used to make prepare boards for DIY production
Express PCB has been used to design many PCBs (some layered and with surface-mount
parts. Print out PCB patterns and use the toner transfer method with an Etch Resistant Pen to make
boards. However, Express PCB does not have a nice print layout. Here is the procedure to design in
Express PCB and clean up the patterns so they print nicely.
6.1.1 Preparing Express PCB for First Use:
Express PCB comes with a less then exciting list of parts. So before any project is started
head over to Audio logic and grab the additional parts by morsel, ppl, and tangent, and extract them
into your Express PCB directory. At this point start the program and get ready to setup the
workspace to suit your style.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 28
Click View -> Options. In this menu, setup the units for “mm” or “in” depending on how
you think, and click “see through the top copper layer” at the bottom. The standard color scheme of
red and green is generally used but it is not as pleasing as red and blue.
6.1.2 The Interface:
When a project is first started you will be greeted with a yellow outline. This yellow
outline is the dimension of the PCB. Typically after positioning of parts and traces, move them to
their final position and then crop the PCB to the correct size. However, in designing a board with a
certain size constraint, crop the PCB to the correct size before starting.Fig: 4.1 show the toolbar in
which the each button has the following functions:
Fig 6.1: Tool bar necessary for the interface
 The select tool: It is fairly obvious what this does. It allows you to move and manipulate
parts. When this tool is selected the top toolbar will show buttons to move traces to the top
/ bottom copper layer, and rotate buttons.
 The zoom to selection tool: does just that.
 The place pad: button allows you to place small soldier pads which are useful for board
connections or if a part is not in the part library but the part dimensions are available.
When this tool is selected the top toolbar will give you a large selection of round holes,
square holes and surface mount pads.
 The place component: tool allows you to select a component from the top toolbar and then
by clicking in the workspace places that component in the orientation chosen using the
buttons next to the component list. The components can always be rotated afterwards with
the select tool if the orientation is wrong.
 The place trace: tool allows you to place a solid trace on the board of varying thicknesses.
The top toolbar allows you to select the top or bottom layer to place the trace on.
 The Insert Corner in trace: button does exactly what it says. When this tool is selected,
clicking on a trace will insert a corner which can be moved to route around components
and other traces.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 29
 The remove a trace button is not very important since the delete key will achieve the same
result.
6.1.3 Design Considerations:
Before starting a project there are several ways to design a PCB and one must be chosen to
suit the project’s needs. Single sided, or double sided?
When making a PCB you have the option of making a single sided board, or a double sided
board. Single sided boards are cheaper to produce and easier to etch, but much harder to design for
large projects. If a lot of parts are being used in a small space it may be difficult to make a single
sided board without jumper over traces with a cable. While there’s technically nothing wrong with
this, it should be avoided if the signal travelling over the traces is sensitive (e.g. audio signals).
A double sided board is more expensive to produce professionally, more difficult to etch
on a DIY board, but makes the layout of components a lot smaller and easier. It should be noted that
if a trace is running on the top layer, check with the components to make sure you can get to its pins
with a soldering iron. Large capacitors, relays, and similar parts which don’t have axial leads can
NOT have traces on top unless boards are plated professionally. Ground-plane or other special
purposes for one side.
When using a double sided board you must consider which traces should be on what side
of the board. Generally, put power traces on the top of the board, jumping only to the bottom if a
part cannot be soldiered onto the top plane (like a relay), and vice- versa.
Some projects like power supplies or amps can benefit from having a solid plane to use for
ground. In power supplies this can reduce noise, and in amps it minimizes the distance between
parts and their ground connections, and keeps the ground signal as simple as possible. However,
care must be taken with stubborn chips such as the TPA6120 amplifier from TI. The TPA6120
datasheet specifies not to run a ground plane under the pins or signal traces of this chip as the
capacitance generated could effect performance negatively.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 30
6.2 PIC Compiler:
PIC compiler is software used where the machine language code is written and compiled.
After compilation, the machine source code is converted into hex code which is to be dumped into
the microcontroller for further processing. PIC compiler also supports C language code.
It’s important that you know C language for microcontroller which is commonly known as
Embedded C. As we are going to use PIC Compiler, hence we also call it PIC C. The PCB, PCM,
and PCH are separate compilers. PCB is for 12-bit opcodes, PCM is for 14 bitopcodes, and PCH is
for 16-bit opcode PIC microcontrollers. Due to many similarities, all three compilers are covered in
this reference manual. Features and limitations that apply to only specific microcontrollers are
indicated within. These compilers are specifically designed to meet the unique needs of the PIC
microcontroller. This allows developers to quickly design applications software in a more readable,
high-level language. When compared to a more traditional C compiler, PCB, PCM, and PCH have
some limitations. As an example of the limitations, function recursion is not allowed. This is due to
the fact that the PIC has no stack to push variables onto, and also because of the way the compilers
optimize the code. The compilers can efficiently implement normal C constructs, input/output
operations, and bit twiddling operations. All normal C data types are supported along with pointers
to constant arrays, fixed point decimal, and arrays of bits.
PIC C is not much different from a normal C program. If you know assembly, writing a C
program is not a crisis. In PIC, we will have a main function, in which all your application specific
work will be defined. In case of embedded C, you do not have any operating system running in
there. So you have to make sure that your program or main file should never exit. This can be done
with the help of simple while (1) or for (;;) loop as they are going to run infinitely.
We have to add header file for controller you are using, otherwise you will not be able to
access registers related to peripherals.
#include <18F452.h> // header file for PIC 18F452//
#include <16F73.h> // header file for PIC 16F73//
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 31
6.3 Proteus:
Proteus is software which accepts only hex files. Once the machine code is converted into
hex code, that hex code has to be dumped into the microcontroller and this is done by the Proteus.
Proteus is a programmer which itself contains a microcontroller in it other than the one which is to
be programmed. This microcontroller has a program in it written in such a way that it accepts the
hex file from the pic compiler and dumps this hex file into the microcontroller which is to be
programmed. As the Proteus programmer requires power supply to be operated, this power supply
is given from the power supply circuit designed and connected to the microcontroller in proteus.
The program which is to be dumped in to the microcontroller is edited in proteus and is compiled
and executed to check any errors and hence after the successful compilation of the program the
program is dumped in to the microcontroller using a dumper.
6.4 Procedural steps for compilation, simulation and dumping:
6.4.1 Compilation and simulation steps:
For PIC microcontroller, PIC C compiler is used for compilation. The compilation steps
are as follows:
 Open PIC C compiler.
 You will be prompted to choose a name for the new project, so create a separate
folder where all the files of your project will be stored, choose a name and click save.
Fig 6.2: Picture of opening a new file using PIC C compiler
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 32
 Click Project, New, and something the box named 'Text1' is where your code should
be written later.
Fig 6.3: Picture of compiling a new file using PIC C compiler
 Now you have to click 'File, Save as' and choose a file name for your source code
ending with the letter '.c'. You can name as 'project.c' for example and click save.
Then you have to add this file to your project work
Fig 6.4: Picture of compiling a project.c file using PIC C compiler
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 33
 You can then start to write the source code in the window titled 'project.c' then before
testing your source code; you have to compile your source code, and correct eventual
syntax errors.
Fig 6.5: Picture of checking errors and warnings using PIC C compiler
 By clicking on compile option .hex file is generated automatically.
 This is how we compile a program for checking errors and hence the compiled
program is saved in the file where we initiated the program.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 34
Fig 6.6: Picture of .hex file existing using PIC C compiler
After compilation, next step is simulation. Here first circuit is designed in Express PCB
using Proteus 7 software and then simulation takes place followed by dumping. The simulation
steps are as follows:
 Open Proteus 7 and click on IS1S6.
 Now it displays PCB where circuit is designed using microcontroller. To design
circuit components are required. So click on component option.
 Now click on letter ’p’, then under that select PIC18F452,other components related
to the project and click OK. The PIC 18F452 will be called your “'Target device”,
which is the final destination of your source code.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 35
6.4.2 Dumping steps:
The steps involved in dumping the program edited in proteus 7 to microcontroller are
shown below:
1. Initially before connecting the program dumper to the microcontroller kit the window is
appeared as shown below.
Fig 6.7: Picture of program dumper window
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 36
2. Select Tools option and click on Check Communication for establishing a connection as
shown in below window
Fig 6.8: Picture of checking communications before dumping program into
microcontroller
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 37
3. After connecting the dumper properly to the microcontroller kit the window is appeared
as shown below.
Fig 6.9: Picture after connecting the dumper to microcontroller
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 38
4. Again by selecting the Tools option and clicking on Check Communication the
microcontroller gets recognized by the dumper and hence the window is as shown
below.
Fig 6.10: Picture of dumper recognition to microcontroller
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 39
5. Import the program which is ‘.hex’ file from the saved location by selecting File option
and clicking on ‘Import Hex’ as shown in below window.
Fig 6.11: Picture of program importing into the microcontroller
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 40
6. After clicking on ‘Import Hex’ option we need to browse the location of our program
and click the ‘prog.hex’ and click on ‘open’ for dumping the program into the microcontroller.
Fig 6.12: Picture of program browsing which is to be dumped
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 41
7. After the successful dumping of program the window is as shown below.
Fig 6.13: Picture after program dumped into the microcontroller
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 42
6.5 PROGRAM CODE:
The program code which is dumped in the microcontroller of our project is shown below.
#include <Wire.h>
#include <LiquidCrystal.h>
#include <EEPROM.h>
#include <ds1307.h>
int on=0;
int off=0;
byte value;
byte value1;
void setup() {
Wire.begin();
ds1307_init();
Serial.begin(9600);
delay(2000); // This delay allows the MCU to read the current date and time.
pinMode(13, OUTPUT);
pinMode(2, INPUT);
pinMode(3, INPUT);
pinMode(10, INPUT);
lcd.begin(16, 2);
lcd.clear();
// Print a message to the LCD.
lcd.print(" Automatic ");
lcd.setCursor(0, 1);
lcd.print(" Signal Jammer ");
delay(3000);
}
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 43
void loop() {
int b1 = digitalRead(2);
int b2 = digitalRead(3);
if(b1 == LOW)
{
lcd.clear();
// Print a message to the LCD.
lcd.print("EVENT MODE ");
on=0;
off=0;
for (int i = 0; i < 10; i++)
{
EEPROM.write(i, 0);
}
while(1)
{
int b1 = digitalRead(2);
int b2 = digitalRead(3);
int b3 = digitalRead(10);
if(b1 == LOW)
{
on++;
}
else if(b3 == LOW)
{
off++;
}
else if(b2 == LOW)
{
EEPROM.write(0, on);
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 44
EEPROM.write(2, off);
lcd.clear();
lcd.print("SETTING DONE");
delay(1000);
break;
}
lcd.clear();
lcd.print("ON Time:");
lcd.print(on);
lcd.setCursor(0,1);
lcd.print("OFF Time:");
lcd.print(off);
delay(1000);
}
}
Serial.print("The current date and time is now: ");
printTime();
value = EEPROM.read(0);
value1 = EEPROM.read(2);
if(minute == value )
{
digitalWrite(13, HIGH);
}
else if(minute == value1)
{
digitalWrite(13, LOW);
}
delay(1000);
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 45
}
}
void printTime()
{
read_Time();
lcd.clear();
lcd.print(days[weekday]);
lcd.print(",");
lcd.print(months);
lcd.print(" ");
lcd.print(monthday);
lcd.print(", 20");
lcd.print(year);
if (hour > 12) {
hour -= 12;
AMPM = " PM";
}
else if (hour == 12)
{
AMPM = " PM";
}
else AMPM = " AM";
lcd.setCursor(0, 1);
lcd.print(hour);
lcd.print(":");
lcd.print(minute);
lcd.print(":");
lcd.print(second);
lcd.print(AMPM);
}
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 46
CHAPTER 7: ADVANTAGES AND DISADVANTAGES
Advantages:
1. Easy to operate.
2. Low power consumption.
3. Efficient design.
4. Eliminates button operations.
5. No need for training.
6. Fast response.
7. Sophisticated security
8. Simple and Reliable Design
Disadvantages:
i. Cost oriented.
ii. Requires special hardware.
iii. People feel inconvenience.
iv. V.I.P.‘s may lose some important calls.
v. Careful handling of LCD is required.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 47
CHAPTER 8:APPLICATIONS
 Gas stations, the air entrainment station, the fuel depot and the flammable
explosive chemical warehouse, the refinery, the petrified factory and so on need safely to
protect place: May avoid changing suddenly the detonation which the signal radiative generation
static electricity spark but causes, the fire. Posts the prohibition to dial the handset sign, does
not have the initiative, this kind of accident all has the appearance in national many gas
stations, in order to safeguard these important situations the security to be supposed to take the
precautionary measure.
 Governments, enterprise's each kind of conference room: May avoid the
handset ting disturbs and answers when the telephone breaking the leader to speak but interrupts
its person to hold a meeting.
 Armies, public security department's important conference rooms: Might avoid
the attending personnel divulging the military and the government using the handset is secret, at
present the new spy science and technology, already used the handset interception, the monitor
environment sound, therefore to important conference place, it is necessary to take effective
also of security the initiative.
 Hospitals: Might avoid the goon machine-hour but causing doctor to the hospital
precision instrument equipment disturbance to misdiagnose, has delayed the rescue patient, as
well as was surgery doctor to answer the handset telephone disturbance attention, underwent the
surgery to doctor to the patient to be extremely disadvantageous.
 Courts: May avoid the handset ting the disturbance, maintains the court conference
site the dignity and the sacredness.
 Libraries, New Bookstore: May avoid the handset ting and answer the telephone the
noise, builds to study the study peaceful environment.
 Theaters: As the upscale recreation area, eliminates the handset ting noise to be
possible to maintain the audience to appreciate the program the interest.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 48
 Tests places, examination center: May cease the examinee, monitor an exam the
personnel to cheat using the modern communication facilities.
 Schools classrooms and training organization classroom: May avoid the handset
ting and answers when the handset telephone to attending class student's disturbance.
 Instead fears the unit: Locking goal of tendency by handset telecontrolled bomb.
 Coast defense unit: May prevent the seacoast smuggling member discloses secret
information using the handset, effectively attacks smuggling criminal offender's smuggling.
 The jail, detains the place: Prevented the criminal, the news media, the visit
personnel, the prison tube does not collude with according to the stipulation inside and outside,
forms conspires to get the story straight.
 Temples, Mosques and Churches: May eliminate the handset signal noise, by
maintains the religious place solemn and respectful.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 49
CHAPTER 9 : RESULTS
9.1 Result:
The project “Cellphone RF Signal detector and Jammer” was designed to help for
security reasons and a friendly hardware interaction for the user. The device is designed by
interfacing mobile jammer and buttons. The activation and deactivation time schedules can be
programmed with microcontroller.
9.2 Conclusion:
Integrating features of all the hardware components used have been developed in it.
Presence of every module has been reasoned out and placed carefully, thus contributing to the best
working of the unit. Secondly, using highly advanced IC’s with the help of growing technology,
the project has been successfully implemented. Thus the project has been successfully designed and
tested.
9.3 Future Scope:
Our project “Mobile Signal detector and Jammer” is mainly intended to provide an
interaction with mobile phone using GSM and Jammer are helpful for security based operation
regions.
Microcontroller interfaces with Jammer device, LCD and relay switch. RTC interfacing is
done using Serial Communication I2C bus. This system also consists of a 16x2 LCD for better
visibility. This displays the time duration of activation and deactivation of jammer information.
This project can be extended by using GPS and 3G technologies. Through GPS, we can
monitor the location from anywhere in the world and 3G technologies can be jammed at some
particular security timings.
RF Signal Detector & Jammer
Dept. of E&CE, B.K.I.T, Bhalki Page 50
BIBLIOGRAPHY
BOOKS:
[1] Telecommunication Switching, Traffic and Networks – J.E.Flood
[2] K.Feher, ―Wireless Digital Communication‖, prentice Hall of India, New Delhi.
[3] Programming and customizing the PIC microcontroller: Third edition by Mike Predko
Tata McGraw-Hill Education Pvt. Ltd, 7 West Patel Nagar, New Delhi 11008.
[4] An Embedded Software Primer by David E. Simon Dorling Kindersley (India) 7th
floor, Knowledge Boulevard, A-8(A), Sector-62, Noida 201309, India.
WEBSITE LINKS:
[5] http://en.wikipedia.org/wiki/Mobile_phone_jammer
[6] http://www.howstuffworks.com/cell-phone-jammer.htm
[7] http://hatchfromeggs.blogspot.in/2012/03/detail-cell-phone-jammer-schematic.html
[8] http://en.wikipedia.org/wiki/PIC_microcontroller
[9] http://en.wikibooks.org/wiki/Embedded_Systems/Embedded_System_Basics
[10] http://www.mikroe.com/mikroc/pic/

More Related Content

What's hot

Li-Fi Audio Transmission Project Documentation/Report
Li-Fi Audio Transmission Project Documentation/ReportLi-Fi Audio Transmission Project Documentation/Report
Li-Fi Audio Transmission Project Documentation/ReportTSriyaSharma
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt Sameer Gupta
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerMohamed Atef
 
Mobile phone detector pdf
Mobile phone detector pdfMobile phone detector pdf
Mobile phone detector pdfVamshi Varun
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammerARYAN KUMAR
 
Wireless charging of mobile phones using microwaves
Wireless charging of mobile phones using microwavesWireless charging of mobile phones using microwaves
Wireless charging of mobile phones using microwavesSara Shagufta
 
Wireless charging of mobilephones
Wireless charging of  mobilephonesWireless charging of  mobilephones
Wireless charging of mobilephonesPRADEEP Cheekatla
 
Wireless communication and cellular concept
Wireless communication and cellular conceptWireless communication and cellular concept
Wireless communication and cellular conceptsaam123
 
Wireless charging of mobile phones using microwaves ppt
Wireless charging of mobile phones using microwaves pptWireless charging of mobile phones using microwaves ppt
Wireless charging of mobile phones using microwaves pptHarish N Nayak
 

What's hot (20)

Li-Fi Audio Transmission Project Documentation/Report
Li-Fi Audio Transmission Project Documentation/ReportLi-Fi Audio Transmission Project Documentation/Report
Li-Fi Audio Transmission Project Documentation/Report
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Mobile Jammer_2
Mobile Jammer_2Mobile Jammer_2
Mobile Jammer_2
 
Mobile detector
Mobile detectorMobile detector
Mobile detector
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone Jammer
 
Mobile phone detector pdf
Mobile phone detector pdfMobile phone detector pdf
Mobile phone detector pdf
 
Project report on signal jammer
Project report on signal jammerProject report on signal jammer
Project report on signal jammer
 
Wireless charging of mobile phones using microwaves
Wireless charging of mobile phones using microwavesWireless charging of mobile phones using microwaves
Wireless charging of mobile phones using microwaves
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
M voting
M votingM voting
M voting
 
Wireless charging of mobilephones
Wireless charging of  mobilephonesWireless charging of  mobilephones
Wireless charging of mobilephones
 
Wireless communication and cellular concept
Wireless communication and cellular conceptWireless communication and cellular concept
Wireless communication and cellular concept
 
Walkie talkie
Walkie talkieWalkie talkie
Walkie talkie
 
Cell phone detector
Cell phone detectorCell phone detector
Cell phone detector
 
Wireless charging of mobile phones using microwaves ppt
Wireless charging of mobile phones using microwaves pptWireless charging of mobile phones using microwaves ppt
Wireless charging of mobile phones using microwaves ppt
 
Home automation ppt
Home automation pptHome automation ppt
Home automation ppt
 
BSNL Training Report
BSNL Training ReportBSNL Training Report
BSNL Training Report
 

Viewers also liked

Project report of Cell phone detector circuit
Project report of Cell phone detector circuitProject report of Cell phone detector circuit
Project report of Cell phone detector circuitMoin Aman
 
MINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTORMINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTORPrannoy Chakravarthi
 
Cellphone detector report
Cellphone detector reportCellphone detector report
Cellphone detector reportvenu13
 
DESIGN & WORKING OF A MOBILE PHONE DETECTOR
DESIGN & WORKING OF A MOBILE PHONE DETECTORDESIGN & WORKING OF A MOBILE PHONE DETECTOR
DESIGN & WORKING OF A MOBILE PHONE DETECTORpgayatrinaidu
 
cellphone detector
cellphone detectorcellphone detector
cellphone detectorvenu13
 
Mobille phone detector
Mobille phone detectorMobille phone detector
Mobille phone detectorJitendra Malav
 
Smart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector RobotSmart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector RobotPunit Tiwari
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentationManikandan Jeeva
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammerncct
 
Research paper on cognitive radio network
Research paper on cognitive radio networkResearch paper on cognitive radio network
Research paper on cognitive radio networkbkmishra21
 
Catapult Project Powerpoint
Catapult Project PowerpointCatapult Project Powerpoint
Catapult Project PowerpointJacob Emge
 

Viewers also liked (17)

Project report of Cell phone detector circuit
Project report of Cell phone detector circuitProject report of Cell phone detector circuit
Project report of Cell phone detector circuit
 
MINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTORMINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTOR
 
Cellphone detector report
Cellphone detector reportCellphone detector report
Cellphone detector report
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
DESIGN & WORKING OF A MOBILE PHONE DETECTOR
DESIGN & WORKING OF A MOBILE PHONE DETECTORDESIGN & WORKING OF A MOBILE PHONE DETECTOR
DESIGN & WORKING OF A MOBILE PHONE DETECTOR
 
Cell phone detector
Cell phone detectorCell phone detector
Cell phone detector
 
Simple cell phone jammer
Simple cell phone jammerSimple cell phone jammer
Simple cell phone jammer
 
cellphone detector
cellphone detectorcellphone detector
cellphone detector
 
Mobille phone detector
Mobille phone detectorMobille phone detector
Mobille phone detector
 
Smart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector RobotSmart Autonomous Mobile detector Robot
Smart Autonomous Mobile detector Robot
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Research paper on cognitive radio network
Research paper on cognitive radio networkResearch paper on cognitive radio network
Research paper on cognitive radio network
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Drone Jammer
Drone JammerDrone Jammer
Drone Jammer
 
Catapult Project Powerpoint
Catapult Project PowerpointCatapult Project Powerpoint
Catapult Project Powerpoint
 

Similar to B.Tech Project Report on Cellphone RF Signal Detector & Jammer

Mobile phone detector
Mobile phone detectorMobile phone detector
Mobile phone detectorSumedh Vartak
 
Circular shape proximity feed microstrip antenna
Circular shape proximity feed microstrip antennaCircular shape proximity feed microstrip antenna
Circular shape proximity feed microstrip antennaAmitesh Raikwar
 
GSM BASED DEVICES CONTROL SYSTEM PROJECT REPORT
GSM BASED DEVICES CONTROL SYSTEM PROJECT REPORTGSM BASED DEVICES CONTROL SYSTEM PROJECT REPORT
GSM BASED DEVICES CONTROL SYSTEM PROJECT REPORTAvinash Kannojia
 
Full report on WIMAX Network Planning by Yubraj gupta
Full report on WIMAX Network Planning by Yubraj guptaFull report on WIMAX Network Planning by Yubraj gupta
Full report on WIMAX Network Planning by Yubraj guptaYubraj Gupta
 
manzoorali.project engg
manzoorali.project engg manzoorali.project engg
manzoorali.project engg manzoor ali
 
HOME AUTOMATION USING ANDROID PHONE OVER BLUETOOTH
HOME AUTOMATION USING ANDROID PHONE OVER BLUETOOTHHOME AUTOMATION USING ANDROID PHONE OVER BLUETOOTH
HOME AUTOMATION USING ANDROID PHONE OVER BLUETOOTHSubhash Kumar Yadav
 
Smart Home Automation
Smart Home AutomationSmart Home Automation
Smart Home AutomationMitul Lakhani
 
Report star topology using noc router
Report star topology using noc router Report star topology using noc router
Report star topology using noc router Vikas Tiwari
 
How cell phone work?(mobile communication)
How cell phone work?(mobile communication)How cell phone work?(mobile communication)
How cell phone work?(mobile communication)kgaurav113
 
Internship PPT template.pptx
Internship PPT template.pptxInternship PPT template.pptx
Internship PPT template.pptxNutanPrasad6
 
1.government college of engineering
1.government college of engineering1.government college of engineering
1.government college of engineeringAzhar Syed
 
102642452 infrared-remote-switch-project-report
102642452 infrared-remote-switch-project-report102642452 infrared-remote-switch-project-report
102642452 infrared-remote-switch-project-reportisnadh
 
Performance improvement of mimo mc cdma system using equalization, beamformin...
Performance improvement of mimo mc cdma system using equalization, beamformin...Performance improvement of mimo mc cdma system using equalization, beamformin...
Performance improvement of mimo mc cdma system using equalization, beamformin...Tamilarasan N
 

Similar to B.Tech Project Report on Cellphone RF Signal Detector & Jammer (20)

Mobile phone detector
Mobile phone detectorMobile phone detector
Mobile phone detector
 
Resume
ResumeResume
Resume
 
Mobile Sniffer
Mobile SnifferMobile Sniffer
Mobile Sniffer
 
Abstract
AbstractAbstract
Abstract
 
Circular shape proximity feed microstrip antenna
Circular shape proximity feed microstrip antennaCircular shape proximity feed microstrip antenna
Circular shape proximity feed microstrip antenna
 
Resume
ResumeResume
Resume
 
pbit Certificate
pbit Certificatepbit Certificate
pbit Certificate
 
GSM BASED DEVICES CONTROL SYSTEM PROJECT REPORT
GSM BASED DEVICES CONTROL SYSTEM PROJECT REPORTGSM BASED DEVICES CONTROL SYSTEM PROJECT REPORT
GSM BASED DEVICES CONTROL SYSTEM PROJECT REPORT
 
Full report on WIMAX Network Planning by Yubraj gupta
Full report on WIMAX Network Planning by Yubraj guptaFull report on WIMAX Network Planning by Yubraj gupta
Full report on WIMAX Network Planning by Yubraj gupta
 
Report on CRN
Report on CRNReport on CRN
Report on CRN
 
manzoorali.project engg
manzoorali.project engg manzoorali.project engg
manzoorali.project engg
 
HOME AUTOMATION USING ANDROID PHONE OVER BLUETOOTH
HOME AUTOMATION USING ANDROID PHONE OVER BLUETOOTHHOME AUTOMATION USING ANDROID PHONE OVER BLUETOOTH
HOME AUTOMATION USING ANDROID PHONE OVER BLUETOOTH
 
Smart Home Automation
Smart Home AutomationSmart Home Automation
Smart Home Automation
 
Report star topology using noc router
Report star topology using noc router Report star topology using noc router
Report star topology using noc router
 
How cell phone work?(mobile communication)
How cell phone work?(mobile communication)How cell phone work?(mobile communication)
How cell phone work?(mobile communication)
 
Btech Thesis
Btech ThesisBtech Thesis
Btech Thesis
 
Internship PPT template.pptx
Internship PPT template.pptxInternship PPT template.pptx
Internship PPT template.pptx
 
1.government college of engineering
1.government college of engineering1.government college of engineering
1.government college of engineering
 
102642452 infrared-remote-switch-project-report
102642452 infrared-remote-switch-project-report102642452 infrared-remote-switch-project-report
102642452 infrared-remote-switch-project-report
 
Performance improvement of mimo mc cdma system using equalization, beamformin...
Performance improvement of mimo mc cdma system using equalization, beamformin...Performance improvement of mimo mc cdma system using equalization, beamformin...
Performance improvement of mimo mc cdma system using equalization, beamformin...
 

Recently uploaded

9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 

Recently uploaded (7)

9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 

B.Tech Project Report on Cellphone RF Signal Detector & Jammer

  • 1. A Project Report On “CELLPHONE RF SIGNAL DETECTOR & JAMMER” Submitted in partial fulfillment of the requirements for the award of the Degree of BACHELOR OF ENGINEERING In ELECTRONICS & COMMUNICATION ENGINEERING of VISVESVARAYA TECHNOLOGICAL UNIVERSITY Jnana Sangama, Belagavi Submitted by: AMAN KUMAR 3RB09EC100 Under the guidance of MR.DHIRAJ DESHPANDE. Assistant Professor Department of Electronics & Communication Engineering Department of Electronics & Communication Engineering BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI Dist. Bidar, Karnataka 2014-2015
  • 2. BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI Dist. Bidar, Karnataka Department of Electronics & Communication Engineering CERTIFICATE Certified that the Project Work entitled “CELLPHONE RF SIGNAL DETECTOR & JAMMER” has been successfully carried out by AMAN KUMAR (3RB09EC100) in partial fulfillment of the requirements for the award of degree of Bachelor of Engineering in Electronics & Communication Engineering of Visvesvaraya Technological University, Belagavi during the academic year 2014-2015. It is certified that all the corrections/suggestions indicated for internal assessment have been incorporated in the report deposited in the departmental library. The Project Report has been approved as it satisfies the academic requirements in respect of Project Work prescribed for the said degree. Project Guide Project Coordinator Mr.Dhiraj Deshpande. Mr. Nagshetty Biradar Assistant Professor Associate Professor Head of Department Principal Dr. T. S. Vishwanath Dr. BIPIN BIHARI LAL Name of the examiners Signature with Date 1. 2. BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI Dist. Bidar, Karnataka Department of Electronics & Communication Engineering CERTIFICATE Certified that the Project Work entitled “CELLPHONE RF SIGNAL DETECTOR & JAMMER” has been successfully carried out by AMAN KUMAR (3RB09EC100) in partial fulfillment of the requirements for the award of degree of Bachelor of Engineering in Electronics & Communication Engineering of Visvesvaraya Technological University, Belagavi during the academic year 2014-2015. It is certified that all the corrections/suggestions indicated for internal assessment have been incorporated in the report deposited in the departmental library. The Project Report has been approved as it satisfies the academic requirements in respect of Project Work prescribed for the said degree. Project Guide Project Coordinator Mr.Dhiraj Deshpande. Mr. Nagshetty Biradar Assistant Professor Associate Professor Head of Department Principal Dr. T. S. Vishwanath Dr. BIPIN BIHARI LAL Name of the examiners Signature with Date 1. 2. BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI Dist. Bidar, Karnataka Department of Electronics & Communication Engineering CERTIFICATE Certified that the Project Work entitled “CELLPHONE RF SIGNAL DETECTOR & JAMMER” has been successfully carried out by AMAN KUMAR (3RB09EC100) in partial fulfillment of the requirements for the award of degree of Bachelor of Engineering in Electronics & Communication Engineering of Visvesvaraya Technological University, Belagavi during the academic year 2014-2015. It is certified that all the corrections/suggestions indicated for internal assessment have been incorporated in the report deposited in the departmental library. The Project Report has been approved as it satisfies the academic requirements in respect of Project Work prescribed for the said degree. Project Guide Project Coordinator Mr.Dhiraj Deshpande. Mr. Nagshetty Biradar Assistant Professor Associate Professor Head of Department Principal Dr. T. S. Vishwanath Dr. BIPIN BIHARI LAL Name of the examiners Signature with Date 1. 2.
  • 3. BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI Dist. Bidar, Karnataka Department of Electronics & Communication Engineering DECLARATION I, Aman Kumar declare that the project entitled “CELLPHONE RF SIGNAL DETECTOR & JAMMER” has been carried out by us and submitted in partial fulfillment of the course requirements for the award of degree in Bachelor of Engineering in Electronics & Communication Engineering of Visvesvaraya Technological University, Belagavi during the academic year 2014-2015. The matter embodied in this report has not been submitted to any other university or institution for the award of any other degree. Yours Sincerely, Aman Kumar BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI Dist. Bidar, Karnataka Department of Electronics & Communication Engineering DECLARATION I, Aman Kumar declare that the project entitled “CELLPHONE RF SIGNAL DETECTOR & JAMMER” has been carried out by us and submitted in partial fulfillment of the course requirements for the award of degree in Bachelor of Engineering in Electronics & Communication Engineering of Visvesvaraya Technological University, Belagavi during the academic year 2014-2015. The matter embodied in this report has not been submitted to any other university or institution for the award of any other degree. Yours Sincerely, Aman Kumar BHEEMANNA KHANDRE INSTITUTE OF TECHNOLOGY, BHALKI Dist. Bidar, Karnataka Department of Electronics & Communication Engineering DECLARATION I, Aman Kumar declare that the project entitled “CELLPHONE RF SIGNAL DETECTOR & JAMMER” has been carried out by us and submitted in partial fulfillment of the course requirements for the award of degree in Bachelor of Engineering in Electronics & Communication Engineering of Visvesvaraya Technological University, Belagavi during the academic year 2014-2015. The matter embodied in this report has not been submitted to any other university or institution for the award of any other degree. Yours Sincerely, Aman Kumar
  • 4. Acknowledgements First and foremost, we are grateful to our guide Mr. Dhiraj Deshpande, Assistant Professor, for his positive criticism, valuable suggestions and inevitable support. We felt extremely privileged and experienced an enthusiastic interest from his side. This fueled our enthusiasm to step in even further and encouraged us a lot. We take this opportunity to express our sincere thanks to Dr. T. S. Vishwanath, HOD for providing the necessary facilities in the department and every other possible support. The support and motivation from our project coordinator, Mr. Nagshetty Biradar, Associate Professor and staff members and our Principal also need to be mentioned. Last but not the least; I extend my gratitude to the Almighty for giving me strength and wisdom in completing this report. Yours Sincerely, Aman Kumar
  • 5. ABSTRACT Mobile jammer is used to prevent mobile phones from receiving or transmitting signals with the base stations. Mobile jammers effectively disable mobile phones within the defined regulated zones without causing any interference to other communication means. Mobile jammers can be used in practically any location, but are used in places where a phone call would be particularly disruptive like temples, libraries, hospitals, cinema halls, schools & colleges etc. As with other radio jamming, mobile jammers block mobile phone use by sending out radio waves along the same frequencies that mobile phones use. This causes enough interference with the communication between mobile phones and communicating towers to render the phones unusable. Upon activating mobile jammers, all mobile phones will indicate "NO NETWORK”. Incoming calls are blocked as if the mobile phone were off. When the mobile jammers are turned off, all mobile phones will automatically re-establish communications and provide full service. Some countries prevent the use of jamming systems in civilian places; because it is radiates the jamming signals at all time that may be effect on human health. The proposed intelligent system solves this problem by designing a mobile detector which can decide if there is mobile around or not, to make the jamming system work only when the cell phone is making or receiving any calls or SMS. This mobile detector or sniffer can sense the presence of an activated mobile cell phone from a distance of one and-a-half meters. So it can be used to prevent use of mobile phones in examination halls, confidential rooms, etc. It is also useful for detecting the use of mobile phone for Spying and unauthorized video transmission. The circuit can detect the incoming and outgoing calls, SMS and video transmission even if the mobile phone is kept in the silent mode.
  • 6. Table of Contents Chapter 1: Introduction ………………………. 01 1.1 Introduction ………………………. 01 1.2 Thesis overview ………………………. 02 Chapter 2: History ………………………. 03 Chapter 3:Project Overview ………………………. 04 3.1 Block Diagram ………………………. 04 3.2 Description of Block Diagram ………………………. 05 3.2.1 Regulated power Supply ………………………. 05 3.2.2 Microcontroller ………………………. 06 3.2.3 Crystal oscillator ………………………. 09 3.2.4 On cip RTC ………………………. 09 3.2.5 LCD Screen ………………………. 10 3.2.6 Relay ………………………. 10 3.2.7 jammer Blocks ………………………. 11 3.2.8 Detector ckt ………………………. 11 Chapter 4 : Literature Survey ………………………. 13 4.1 jamming Techniques ………………………. 13 4.1.1 Spoofing ………………………. 13 4.1.2 Shield Attack ………………………. 13 4.1.3 Denial of Service ………………………. 13 4.2 Design Parameters ………………………. 14 4.2.1 The distance to be jammed (D) ………………………. 14 4.2.2 The frequency Bands ………………………. 14 4.2.3 Jamming-to-signal ratio {J/S} ………………………. 15 4.2.4 Free space loss {F} ………………………. 15
  • 7. 4.2.5 Power calculations ………………………. 15 Chapter 5 : System Design ………………………. 16 5.1 Cell Phone Jammer Schematic ………………………. 16 5.1.1 Power Supply ………………………. 17 5.1.2 IF Section ………………………. 17 5.1.3 RF Section ………………………. 21 5.2 Basic Concept and Working of Cell phone Detector………………………. 25 5.2.1 Purpose of the Circuit ………………………. 25 5.2.2 Concept ………………………. 25 5.2.3 How the Circuit Works? ………………………. 26 Chapter 6 : Software Description ………………………. 27 6.1 Express PCB ………………………. 27 6.1.1 Preparing Express PCB for First Use ………………………. 27 6.1.2 The Interface ………………………. 28 6.1.3 Design Considerations ………………………. 29 6.2 PIC Compiler ………………………. 30 6.3 Proteus ………………………. 31 6.4 Procedural steps for compilation, simulation and dumping………….. 31 6.4.1 Compilation and simulation steps ………………………. 31 6.4.2 Dumping steps ………………………. 35 6.5 Program Code ………………………. 42 Chapter 7: Advantages and Disadvantages ………………………. 46 Chapter 8: Applications ………………………. 47 Chapter 9: Results ………………………. 49 Bibliography ………………………. 50
  • 8. LIST OF FIGURES Figure No. Name Of Figure Page No. 3.1. Block diagram of jammer with controller .............................. 04 3.2. Jamming Block Diagram .............................. 05 3.3. Circuit diagram of Regulated Power Supply with Led connection .................. 06 3.4. Microcontrollers .............................. 06 3.5. Microcontroller pin diagram .............................. 07 3.6. Crystal oscillator .............................. 09 3.7. LCD screen .............................. 10 3.8. Relay .............................. 10 3.9. Detector Circuit .............................. 11 5.1. Schematic representation of cell phone jammer .............................. 16 5.2. Power Supply .............................. 17 5.3. Block diagram of IF section .............................. 18 5.4. Simple function generator circuit .............................. 19 5.5. Op – amp summer circuit .............................. 20 5.6. Positive diode – clamper with bias .............................. 20 5.7. Block diagram of RF section .............................. 21 5.8. Ckt dia of Detector .............................. 26 6.1. Tool bar necessary for the interface .............................. 28 6.2. Picture of opening a new file using PIC C compiler .............................. 31 6.3. Picture of compiling a new file using PIC C compiler .............................. 32 6.4. Picture of compiling a project.C file using PIC C compiler .............................. 32 6.5. Picture of checking errors and warnings using PIC C compiler .......................... 33 6.6. Picture of .hex file existing using PIC C compiler .............................. 34 6.7. Picture of program dumper window .............................. 35 6.8. Picture of checking communications before dumping program into microcontroller .... 36 6.9. Picture after connecting the dumper to microcontroller .............................. 37 6.10. Picture of dumper recognition to microcontroller .............................. 38 6.11. Picture of program importing into the microcontroller .............................. 39 6.12. Picture of program browsing which is to be dumped .............................. 40 6.13. Picture after program dumped into the microcontroller .............................. 41
  • 9. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 1 CHAPTER 1: INTRODUCTION 1.1 Introduction: Mobile jammer is used to prevent mobile phones from receiving or transmitting signals with the base stations. Mobile jammers effectively disable mobile phones within the defined regulated zones without causing any interference to other communication means Mobile jammers can be used in practically any location, but are used in places where a phone call would be particularly disruptive like Temples, Libraries, Hospitals, Cinema halls, schools & colleges etc. As with other radio jamming, mobile jammers block mobile phone use by sending out radio waves along the same frequencies that mobile phones use. This causes enough interference with the communication between mobile phones and communicating towers to render the phones unusable. Upon activating mobile jammers, all mobile phones will indicate "NO NETWORK". Incoming calls are blocked as if the mobile phone were off. When the mobile jammers are turned off, all mobile phones will automatically re-establish communications and provide full service. The activation and deactivation time schedules can be programmed with microcontroller. This project uses regulated 5V, 500mA power supply. Unregulated 12V DC is used for relay. 7805 three terminal voltage regulator is used for voltage regulation. Bridge type full wave rectifier is used to rectify the ac output of secondary of 230/12V step down transformer. The cell phone detector can sense the presence of an activated mobile cell phone from a distance of about one and half meters. So it can be used to prevent use of mobile phone in the examination halls, confidential rooms, etc. it is also useful for detecting the use of mobile phone for spying and unauthorised video transmission. The Ckt can detect both the incoming and outgoing calls, SMS and video transmission even if the mobile phone is kept in the silent mode. The moment the detector detect the RF transmission signal from an activated mobile phone, it starts sound a beep alarm and the LED blinks. The alarm continuous until the signal transmission ceases.
  • 10. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 2 The main features of this project are: 1. User friendly operation. 2. Very easy to operate. 3. LCD with driver. 4. Activities display on LCD. 5. Jammer activation using relay switch 1.2 Thesis Overview: Chapter 1 Presents introduction to the overall thesis and the overview of the project. In the project overview a brief introduction of “Cellphone RF Signal detector and Jammer” and its applications are discussed. Chapter 2 Presents the history about the jammer and detector. Chapter 3 Presents the overview about the project. It explains the block diagram of the jammer and detector and a short explanation about each block of these. Chapter 4 Presents the literature survey. It shortly describes the jamming techniques, and details about the design parameters of the ckt. Chapter 5 Presents the system design. It consist of jammer schematics diagram and basic concept of cell phone detector ckt. Chapter 6 Presents the software description. It consist of details regarding Express PCB, PIC controller and details about compilation, simulation and dumping. Chapter 7 Presents the advantages and disadvantages of the project. Chapter 8 Presents the application of the project. Chapter 9 Presents the result of the project.
  • 11. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 3 CHAPTER 2: HISTORY The technique used in most of the commercial jammers is based on noise attack. In the previously designed cell-phone jammers, designers came up with an electronic device that acts as a transmitter to transmit electromagnetic signals of respective frequency and higher power as used by GSM/DCS systems. In this technique voltage controlled oscillator (VCO) plays a major role in generating the jamming frequency. In our research we found that the above technique is complex one as compared to our technique because our idea of jamming through spectrum distortion proves to be simpler, easier to fabricate and cost effective. The rapid proliferation of cell phones at the beginning of the 21st century to near ubiquitous status eventually raised problems, such as their potential use to invade privacy or contribute to academic cheating. In addition, public backlash was growing against the disruption cell phones introduced in daily life. While older analog cell phones often suffered from poor reception and could even be disconnected by simple interference such as high frequency noise, increasingly sophisticated digital phones have led to more elaborate counters. Cell phone jamming devices are an alternative to more expensive measures against cell phones, such as Faraday cages, which are mostly suitable as built in protection for structures. They were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists. Some were also designed to foil the use of certain remotely detonated explosives. The civilian applications were apparent, so over time many companies originally contracted to design jammers for government use switched over to sell these devices to private entities. Since then, there has been a slow but steady increase in their purchase and use, especially in major metropolitan areas.
  • 12. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 4 Mobile signal detector and jammer Micro controller Regulated power supply LCD driver LCD Relay driver LED indicators Crystal Oscillator Detector circuit Relay Reset Jammer circuit CHAPTER 3: PROJECT OVERVIEW In Cell phone jammer we can have various blocks like control switch set, LCD, RPS etc., each block has its own functions. Heart of the project is jammer block, which is explained in subsequent chapters. The various blocks of cell phone jammer and controller is as shown in Figure 3.1 3.1 Block diagram Figure 3.1: Block diagram of jammer with controller The various blocks of cell phone jammer is shown in below Figure 3.1.
  • 13. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 5 Figure 3.2: Jamming Block Diagram 3.2 DESCRIPTION OF BLOCK DIAGRAM The main parts of this schematic diagram are: 1) REGULATED POWER SUPPLY. 2) MICROCONTROLLER 3) CRYSTAL OSCILLATOR 4) ON CHIP RTC 5) LCD DISPLAY 6) RELAY 7) JAMMER BLOCK 8) DETECTOR CIRCUIT 3.2.1 Regulated Power Supply A variable regulated power supply block shown in Figure 2.1, is also called a variable bench power supply, is one where one can continuously adjust the output voltage as per the requirements. Most digital logic circuits and processors need a 5 volt power supply. To use these parts we need to build a regulated 5 volt source. To make a 5 volt power supply, we use a LM7805 voltage regulator IC. The basic block diagram of the regulated power supply is as follows:
  • 14. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 6 The basic circuit diagram of a regulated power supply (DC O/P) with led connected as load is shown in fig: 3.3. Fig 3.3 Circuit diagram of Regulated Power Supply with Led connection 3.2.2 Microcontroller Fig: 3.4 Microcontrollers A Microcontroller is a programmable digital processor with necessary peripherals. Both microcontrollers and microprocessors are complex sequential digital circuits meant to carry out job according to the program / instructions. Sometimes analog input/output interface makes a part of microcontroller circuit of mixed mode (both analog and digital nature). Peripheral Interface Controllers (PIC) is one of the advanced microcontrollers developed by microchip technologies. These microcontrollers are widely used in modern electronics applications. A PIC controller integrates all type of advanced interfacing ports and memory modules. The first PIC chip was announced in 1975 (PIC1650). As like normal microcontroller, the PIC chip also combines a microcontroller unit called CPU and is integrated with various types of memory modules (RAM, ROM, EEPROM, etc), I/O ports, timers/counters, communication ports, etc.
  • 15. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 7 PIC16F877A is one of the most advanced microcontrollers from Microchip. This controller is widely used for experimental and modern applications because of its low price, wide range of applications, high quality, and ease of availability. Pin description: PIC16F72 has a total of 28 pins. It is most frequently found in a DIP28 type of case but can also be found in SMD case which is smaller from a DIP. DIP is an abbreviation for Dual In Package. SMD is an abbreviation for Surface Mount Devices suggesting that holes for pins to go through when mounting aren't necessary in soldering this type of a component. Pins on PIC16F72 microcontroller have the following meaning: There are 28 pins on PIC16F72. Most of them can be used as an IO pin. Others are already for specific functions.
  • 16. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 8 These are the pin functions. 1. MCLR – to reset the PIC 2. RA0 – port A pin 0 3. RA1 – port A pin 1 4. RA2 – port A pin 2 5. RA3 – port A pin 3 6. RA4 – port A pin 4 7. RA5 – port A pin 5 8. VSS – ground 9. OSC1 – connect to oscillator 10. OSC2 – connect to oscillator 11. RC0 – port C pin 0 VDD – power supply 12. RC1 – port C pin 1 13. RC2 – port C pin 2 14. RC3 – port C pin 3 15. RC4 - port C pin 4 16. RC5 - port C pin 5 17. RC6 - port C pin 6 18. RC7 - port C pin 7 19. VSS - ground 20. VDD – power supply 21. RB0 - port B pin 0 22. RB1 - port B pin 1 23. RB2 - port B pin 2 24. RB3 - port B pin 3 25. RB4 - port B pin 4 26. RB5 - port B pin 5 27. RB6 - port B pin 6 28. RB7 - port B pin 7 By utilizing all of this pin so many application can be done such as: 1. LCD – connect to Port B pin. 2. LED – connect to any pin declared as output.
  • 17. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 9 3. Relay and Motor - connect to any pin declared as output. 4. External EEPROM – connect to I2C interface pin – RC3 and RC4 (SCL and SDA) 5. LDR, Potentiometer and sensor – connect to analogue input pin such as RA0. 6. GSM modem dial up modem – connect to RC6 and RC7 – the serial communication interface using RS232 protocol. For more detail function for each specific pin please refer to the device datasheet from Microchip 3.2.3 Crystal oscillator Crystal oscillator is made up of quartz crystal with the desired value of resonant frequency forms part of the frequency-selective feedback network. Crystal oscillator is the natural choice when the accuracy and stability of frequency. The crystal oscillator speed that can be connected to the PIC microcontroller range from DC to 20Mhz. Using the CCS C compiler normally 20Mhz oscillator will be used and the price is very cheap. The 20 MHz crystal oscillator should be connected with about 22pF capacitor.There are 5 input/output ports on PIC microcontroller namely port A, port B, port C, port D and port E. Each port has different function. Most of them can be used as I/O port. 3.2.4 On chip RTC The real time clock (RTC) is a widely used device that provides accurate time and date for many applications. The RTC chip present in the PC provides time components of hour, minute and second. The RTC chip uses an internal battery that keeps the time and date even when the power is off. One of the most widely used RTC chips is the DS1307 from Dallas semiconductor.
  • 18. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 10 3.2.5 LCD screen LCD screen consists of two lines with 16 characters each. Each character consists of 5x7dot matrix. Contrast on display depends on the power supply voltage and whether messages are displayed in one or two lines. For that reason, variable voltage 0-Vdd is applied on pin marked as Vee. Trimmer potentiometer is usually used for that purpose. Some versions of displays have built in backlight (blue or green diodes). When used during operating, a resistor for current limitation should be used (like with any LE diode). 3.2.6 Relay A relay is an electrically operated switch. Current flowing through the coil of the relay creates a magnetic field which attracts a lever and changes the switch contacts. The coil current can be on or off so relays have two switch positions and they are double throw (changeover) switches. Relays allow one circuit to switch and second circuit which can be completely separate from the first. For example a low voltage battery circuit can use a relay to switch a 230V AC mains circuit. There is no electrical connection inside the relay between the two circuits; the link
  • 19. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 11 is magnetic and mechanical. The coil of a relay passes a relatively large current, typically 30mA for a 12Vrelay, but it can be as much as 100mA for relays designed to operate from lower voltages. Most ICs (chips) cannot provide this current and transistors usually used to amplify the small IC current to the larger value required for the relay coil. Relays are usually SPDT (single pole double throw) or DPDT (double pole double throw) but they can have many more sets of switch contacts, for example relays with 4 sets of changeover contacts are readily available. Relays used in our project have got a Coil rating of 12V. 3.2.7 Jammer blocks Jammer block mainly consists of three parts, they are i. Power supply. ii. IF section. iii.RF section. About these we have discussed in chapter .................. 3.2.8 Detector Circuit
  • 20. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 12 Mobile phone uses RF with a wavelength of 30cm at 872 to 2170 MHz. That is the signal is high frequency with huge energy. When the mobile phone is active, it transmits the signal in the form of sine wave which passes through the space. The encoded audio/video signal contains electromagnetic radiation which is picked up by the receiver in the base station. Ordinary LC (Coil-Capacitor) circuits are used to detect low frequency radiation in the AM and FM bands. The tuned tank circuit having a coil and a variable capacitor retrieve the signal from the carrier wave. But such LC circuits cannot detect high frequency waves near the microwave region. Hence in the circuit, a capacitor is used to detect RF from mobile phone considering that, a capacitor can store energy even from an outside source and oscillate like LC circuit.
  • 21. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 13 CHAPTER 4: Literature Survey 4.1 Jamming Techniques: There are several ways to jam an RF device. The three most common techniques can be categorized as follows: 4.1.1 Spoofing In this kind of jamming, the device forces the mobile to turn off itself. This type is very difficult to be implemented since the jamming device first detects any mobile phone in a specific area, then the device sends the signal to disable the mobile phone. Some types of this technique can detect if a nearby mobile phone is there and sends a message to tell the user to switch the phone to the silent mode (Intelligent Beacon Disablers). 4.1.2 Shielding Attacks This is known as TEMPEST or EMF shielding. This kind requires closing an area in a faraday cage so that any device inside this cage cannot transmit or receive RF signal from outside of the cage. This area can be as large as buildings, for example. 4.1.3 Denial of Service This technique is referred to DOS. In this technique, the device transmits a noise signal at the same operating frequency of the mobile phone in order to decrease the signal-to-noise ratio (SNR) of the mobile under its minimum value. This kind of jamming technique is the simplest one since the device is always on. Our device is of this type.
  • 22. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 14 4.2 Design Parameters: Based on the above, our device which is related to the DOS technique is transmitting noise on the same frequencies of the two bands GSM 900 MHz, and GSM 1.8 GHz (known also as DCS 1800 band). We focused on some design parameters to establish the device specifications. These parameters are as follows: 4.2.1. The distance to be jammed (D) This parameter is very important in our design, since the amount of the output power of the jammer depends on the area that we need to jam. Later on we will see the relationship between the output power and the distance D. Our design is established upon D=10 meters for DCS 1800 band and D=20 meters for GSM 900 band. 4.2.2. The frequency bands GSM900: Uplink: 890-915 MHz Down link: 935-960 MHz DCS 1800: Uplink: 1710-1785MHz-1785 MHz Downlink: 1805-1880 MHz In our design, the jamming frequency must be the same as the downlink, because it needs lower power to do jamming than the uplink range and there is no need to jam the base station itself. So, our frequency design will be as follows: GSM 900 935-960 MHz GSM 1800 1805-1880 MHz
  • 23. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 15 4.2.3. Jamming–to-signal ratio {J/S} Jamming is successful when the jamming signal denies the usability of the communication transmission. In digital communications, the usability is denied when the error rate of the transmission cannot be compensated by error correction. Usually, a successful jamming attack requires that the jammer power is roughly equal to signal power at the receiver (mobile device). The general equation of the jamming-to-signal ratio is given as follows: where: Pj=jammer power, Gjr= antenna gain from jammer to receiver, Grj=antenna gain from receiver to jammer, Rtr=range between communication transmitter and receiver, Br=communication receiver bandwidth, Lr =communication signal loss, Pt=transmitter power, Gtr= antenna gain from transmitter to receiver, Grt=antenna gain from receiver to transmitter, Rjr=range between jammer and communication receiver, Bj=jammer bandwidth, and Lj=jamming signal loss. For GSM, the specified system SNRmin is 9 dB which will be used as the worst case scenario for the jammer. The maximum power at the mobile device Pr is -15 dBm. 4.2.4 Free space loss {F} The free-space loss (or path loss) is given by: The maximum free space loss (worst case F) happens when the maximum frequency is used in the above equation. Using 1880 MHz gives: F (dB) =32.44+20 log 0.01 + 20 log 1880 which gives F =58 dB. 4.2.5 Power calculations Here, we need to find the power that is needed to be transmitted to jam any cell phone within a distance of around 10 meters for DCS. From the above considerations, we can find the required output power from the device, as follows: Using SNR=9 dB and the maximum power signal for mobile receiver=-15 dBm, gives J=- 24 dBm. But, our goal is to find the output power from the device, so when we add the free space loss to the amount of power at the mobile receiver we get our target: Output power=-24dBm+58dB = 34 dBm
  • 24. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 16 CHAPTER 5:SYSTEM DESIGN 5.1 CELL PHONE JAMMER SCHEMATIC Fig. 5.1 schematic representation of cell phone jammer.
  • 25. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 17 The schematic consists of mainly 1 Power supply. 2 IF section. 3. RF section 5.1.1 POWER SUPPLY The power supply consists of the following main parts as shown in the Figure 5.2. fig 5.2 Power Supply Transformer: Is used to transform the 220VAC to other levels of voltages. Rectification: This part is to convert the AC voltage to a DC one. We have two methods for rectification: Half wave-rectification: the output voltage appears only during positive cycles of the input signal. Full wave –rectification: a rectified output voltage occurs during both the positive and negative cycles of the input signal. The Filter: Used to eliminate the fluctuations in the output of the full wave rectifier―eliminate the noise‖ so that a constant DC voltage is produced. This filter is just a large capacitor used to minimize the ripple in the output. 5.1.2 IF SECTION The block diagram of IF section is as shown in Figure 5.3. The function of the IF-section of the Mobile jammer is to generate the tuning signal for the VCO in the RF- Section, which will sweep the VCO through the desired range of frequencies. This tuning signal is generated by a triangular wave generator (1 10 KHz) along with noise generator, and then offset by proper amount so as to sweep the VCO output from the minimum desired frequency to a maximum.
  • 26. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 18 Figure 5.3: Block diagram of IF section The IF section consists of three main parts i. Triangle wave generator. (To tune the VCO in the RF section). ii. Noise generator (provides the output noise). iii. Signal mixer and DC offset circuits (to mix the triangle and the noise waves). i. Triangle wave generator The triangle wave generator consists of op-amp LM1458. Its block diagram and description is as shown in Figure 5.4. The next op amp IC 1b is wired as an integrator.R5 is the feedback resistor and C2 is the integrating capacitor. Non inverting input of IC 1b (pin6) is tied to ground using resistor R7. The output of IC 1a which is a square wave is applied to the inverting input of IC 1b (pin 5) through R4 which is the input resistance of IC 1b.The output of IC 1b will be a triangular wave form, because integrating a square wave will result in a triangular waveform. IC 2a forms another integrator, where R11 is its feedback resistor and C3 is the integrating capacitor.R6 is the input resistance of IC 2a. Non inverting input of IC 2a (pin 3) is tied to ground using the 10K resistor R8. IC 2b forms an inverting amplifier where R9 is its input resistor and R10 the feedback resistor. With the values of R10 & R9, the gain of the inverting amplifier stage will be 27, (AV = -Rf/Rin) The triangular output waveform from the IC 1b is further integrated using IC 2a inverter using IC 2b circuit diagram.
  • 27. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 19 Figure 5.4 : Simple function generator circuit ii. Noise Generator To achieve jamming a noise signal is mixed with the triangle wave signal to produce the tuning voltage for the VCO. The noise will help in masking the jamming transmission, making it look like random “noise” to an outside observer .Without the noise generator, the jamming signal is just a sweeping, unmodulated Continuous Wave RF carrier. The noise generator used in this design is based on the avalanche noise generated by a Zener breakdown phenomenon. It is created when a PN junction is operated in the reverse breakdown mode. The avalanche noise is very similar to shot noise, but much more intense and has a flat frequency spectrum (white). The magnitude of the noise is difficult to predict due to its dependence on the materials. Basically the noise generator circuit consists of a standard 6.8 volt zener diode with a small reverse current, a transistor buffer, and The National LM386 audio amplifier which acts as a natural band-pass filter and mall-signal amplifier.
  • 28. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 20 iii. Signal mixer and DC offset circuits Figure 5.5 : Op – amp summer circuit The triangle wave and noise signals are mixed using OP-Amp configured as summer shown in Figure 5.5, then a dc voltage is added to the resulted signal to obtain the required tuning voltage using diode-clamper circuit that is shown in Figure 5.6. To gain good clamping the RC time constant selected so that it‘s more than ten times the period of the input frequency, also a potentiometer was added to control the biasing voltage so as to get the desired tuning voltage. Figure 5.6 : Positive diode – clamper with bias
  • 29. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 21 5.1.3 RF SECTION The block diagram of RF section is as shown in Figure 5.7 Figure 5.7 : Block diagram of RF section The RF-section is the most important part of the mobile jammer it consists of i. Voltage Controlled Oscillator (VCO). ii. RF Power amplifier. iii. Antenna. These components were selected according to the desired specification of the jammer such as the frequency range and the coverage range. It‘s important to note that all the components used has 50 ohm input/output impedance, so 50 ohm micro strip was needed for matching between the components. Power requirements To successfully jam a particular region, we need to consider a very important parameter the signal to noise ratio, referred to as the SNR. Every device working on radio communication principles can only tolerate noise in a signal up to a particular level. This is called the SNR
  • 30. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 22 handling capability of the device. Most cellular devices have a SNR handling capability of around 12dB. A very good device might have a value of 9dB, although it is highly unlikely. To ensure jamming of these devices, we need to reduce the SNR of the carrier signal to below the 9dB level.For this, we consider the worst-case scenario from a jammers point of view. This would mean maximum transmitted power Smax from the tower, along with the lowest value of the SNR handling capability of a mobile device. So, mathematically J = -24dBm Since SNRmin = S/J Where J is the power of the jamming signal. So we need to have jamming signal strength of -24dBm at the mobile device‘s reception to effectively jam it. However, our radiated signal will undergo some attenuation in being transmitted from the antenna of the jammer to the antenna of the mobile device. This path loss can be calculated using the simple free space path loss approximation: Here f is the frequency in MHz, and D the distance traveled in kilometers. Using the GSM downlink center frequency (947.5MHz) and a jamming radius of 20m, we get the value of path loss to be 58dBm. This ideal path loss is for free space only, and the path losses in air will me much greater. This means that the jamming radius will be less than the 20m used to calculate this value. So, including the power lost in path loss, we need to transmit a signal with strength of: JT = 58 - 24 = 34dBm Now, the power output of our VCO is -3dBm, which needs to be amplified by 37dBm to meet our requirements. For this, we used a two-stage amplification mechanism. The first stage is the MAR-4SM pre-amplifier, which provides a 8dBm power gain. This takes the power level to 5dBm. To match the power to the input recommendation of the second amplification stage (the PF08103B), we need to attenuate this by 4dB, for which a pi- attenuator is used. Now the power level is 1dB, which is amplified by a gain of 33dB by the PF08103B to an output power level of 34dBm. Voltage controlled oscillator The voltage controlled oscillator (VCO) is the heart of the RF-section. It is the device that generates the RF signal which will interfere with the cell phone. The output of the VCO has a frequency which is proportional to the input voltage, thus, we can control the output frequency by changing the input voltage. When the input voltage is DC, the output is a specific frequency, while
  • 31. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 23 if the input is a triangular waveform, the output will span a specific frequency range. In our design, we need to find a VCO for GSM 900 and GSM 1800. There are three selection criteria for selecting a VCO for this application. Most importantly, it should cover the bands that we need, secondly, it should be readily available at low cost, and finally, it should run at low power consumption. Moreover, we need to minimize the size of GSM-jammer. So, we started to search through the internet for VCO's that work for GSM 900 & GSM 1800 bands. Finally, we found the following VCO IC’s:- CVCO55BE; this is for GSM 1800. The output frequency is 1785-1900 MHz and the output power is up to 5 dBm. CVCO55CL; this is for GSM 900. The output frequency is 925-970 MHz and the output power is up to 8 dBm. We chose these IC’s for the following reasons:- [A] Surface mount, which reduces the size of product. [B] Having large output power that reduces the number of amplification stages that we need. [C] Having same value of power supply which is typically equal to 5 volt. [D] Having same noise properties. The power amplifier: Since 5 dBm output powers from the VCO do not achieve the desired output power of the GSM jammer, we had to add an amplifier with a suitable gain to increase the VCO output to 34 dBm. We obtained our amplifier IC (PF08109B) from an old mobile as it was the most suitable, cheapest and easiest way to get one. The PF08109B, shown in Figure 15, has high gain of 35 dB. As datasheets illustrated that this IC is designed to work in dual band GSM & DCS, we firstly designed and built our circuit using only one power amplifier IC. Upon testing, the jammer didn’t work properly. It was concluded that amplifier IC does not work at the two bands simultaneously. Such a fact was not
  • 32. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 24 indicated in the datasheets. This result was really a big shock, but easily solved by changing the whole RF design. The new design uses two power amplifier IC’s instead of one amplifier. Antenna: A proper antenna is necessary to transmit the jamming signal. In order to have optimal power transfer, the antenna system must be matched to the transmission system. In this project, we used two 1/4 wavelength monopole antennas, with 50 Ω input impedance so that the antennas are matched to the system. We used monopole antenna since the radiation pattern is omni-directional. Figure 17 shows the DCS 1800 antenna, while Figure 18 shows the GSM 900 antenna. DCS antenna Specifications: 1. Frequency: 1700-1900MHz 2. Input impedance 50Ω GSM 900 antenna Specifications: 1. Frequency: 850MHz-1GHz 2. Input impedance 50Ω 3. VSWR<2
  • 33. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 25 5.2 BASIC CONCEPT AND WORKING OF CELLPHONE DETECTOR 5.2.1 PURPOSE OF THE CIRCUIT This circuit is intended to detect unauthorized use of mobile phones in examination halls, confidential rooms etc. It also helps to detect unauthorized video and audio recordings. It detects the signal from mobile phones even if it is kept in the silent mode. It also detects SMS. 5.2.2. CONCEPT Mobile phone uses RF with a wavelength of 30cm at 872 to 2170 MHz. That is the signal is high frequency with huge energy. When the mobile phone is active, it transmits the signal in the form of sine wave which passes through the space. The encoded audio/video signal contains electromagnetic radiation which is picked up by the receiver in the base station. Mobile phone system is referred to as “Cellular Telephone system” because the coverage area is divided into “cells” each of which has a base station. The transmitter power of the modern 2G antenna in the base station is 20-100 watts. When a GSM (Global System of Mobile communication) digital phone is transmitting, the signal is time shared with 7 other users. That is at any one second, each of the 8 users on the same frequency is allotted 1/8 of the time and the signal is reconstituted by the receiver to form the speech. Peak power output of a mobile phone corresponds to 2 watts with an average of 250 milli watts of continuous power. Each handset with in a ‘cell’ is allotted a particular frequency for its use. The mobile phone transmits short signals at regular intervals to register its availability to the nearest base station. The network data base stores the information transmitted by the mobile phone. If the mobile phone moves from one cell to another, it will keep the connection with the base station having strongest transmission. Mobile phone always tries to make connection with the available base station. That is why, the back light of the phone turns on intermittently while travelling. This will cause severe battery drain. So in long journeys, battery will flat within a few hours. AM Radio uses frequencies between 180 kHz and 1.6 MHz, FM radio uses 88 to 180 MHz, TV uses 470 to 854 MHz. Waves at higher frequencies but within the RF region is called Micro waves. Mobile phone uses high frequency RF wave in the micro wave region carrying huge amount of electromagnetic energy. That is why burning sensation develops in the ear if the mobile is used for a long period. Just like a micro wave oven, mobile phone is ‘cooking’ the tissues in the ear. RF radiation from the phone causes oscillation of polar molecules like water in the tissues. This
  • 34. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 26 generates heat through friction just like the principle of microwave oven. The strongest radiation from the mobile phone is about 2 watts which can make connection with a base station located 2 to 3 km away. 5.2.3 HOW THE CIRCUIT WORKS? Ordinary LC (Coil-Capacitor) circuits are used to detect low frequency radiation in the AM and FM bands. The tuned tank circuit having a coil and a variable capacitor retrieve the signal from the carrier wave. But such LC circuits cannot detect high frequency waves near the microwave region. Hence in the circuit, a capacitor is used to detect RF from mobile phone considering that, a capacitor can store energy even from an outside source and oscillate like LC circuit. Figure 5.8 Circuit diagram R1 3.9 M R2 100K R3 1 M LED Red 9 V Battery + C1 0.22 UF C2 100 25V UF IC1 IC1 CA 3130 2 3 4 7 6 0.1 R4 100 R R5 100R BUZZER C
  • 35. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 27 CHAPTER 6: SOFTWARE DESCRIPTION This project is implemented using following software’s:  Express PCB – for designing circuit  PIC C compiler - for compilation part  Proteus 7 (Embedded C) – for simulation part 6.1 Express PCB: Breadboards are great for prototyping equipment as it allows great flexibility to modify a design when needed; however the final product of a project, ideally should have a neat PCB, few cables, and survive a shake test. Not only is a proper PCB neater but it is also more durable as there are no cables which can yank loose. Express PCB is a software tool to design PCBs specifically for manufacture by the company Express PCB (no other PCB maker accepts Express PCB files). It is very easy to use, but it does have several limitations. *It can be likened to more of a toy then a professional CAD program. *It has a poor part library (which we can work around) *It cannot import or export files in different formats *It cannot be used to make prepare boards for DIY production Express PCB has been used to design many PCBs (some layered and with surface-mount parts. Print out PCB patterns and use the toner transfer method with an Etch Resistant Pen to make boards. However, Express PCB does not have a nice print layout. Here is the procedure to design in Express PCB and clean up the patterns so they print nicely. 6.1.1 Preparing Express PCB for First Use: Express PCB comes with a less then exciting list of parts. So before any project is started head over to Audio logic and grab the additional parts by morsel, ppl, and tangent, and extract them into your Express PCB directory. At this point start the program and get ready to setup the workspace to suit your style.
  • 36. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 28 Click View -> Options. In this menu, setup the units for “mm” or “in” depending on how you think, and click “see through the top copper layer” at the bottom. The standard color scheme of red and green is generally used but it is not as pleasing as red and blue. 6.1.2 The Interface: When a project is first started you will be greeted with a yellow outline. This yellow outline is the dimension of the PCB. Typically after positioning of parts and traces, move them to their final position and then crop the PCB to the correct size. However, in designing a board with a certain size constraint, crop the PCB to the correct size before starting.Fig: 4.1 show the toolbar in which the each button has the following functions: Fig 6.1: Tool bar necessary for the interface  The select tool: It is fairly obvious what this does. It allows you to move and manipulate parts. When this tool is selected the top toolbar will show buttons to move traces to the top / bottom copper layer, and rotate buttons.  The zoom to selection tool: does just that.  The place pad: button allows you to place small soldier pads which are useful for board connections or if a part is not in the part library but the part dimensions are available. When this tool is selected the top toolbar will give you a large selection of round holes, square holes and surface mount pads.  The place component: tool allows you to select a component from the top toolbar and then by clicking in the workspace places that component in the orientation chosen using the buttons next to the component list. The components can always be rotated afterwards with the select tool if the orientation is wrong.  The place trace: tool allows you to place a solid trace on the board of varying thicknesses. The top toolbar allows you to select the top or bottom layer to place the trace on.  The Insert Corner in trace: button does exactly what it says. When this tool is selected, clicking on a trace will insert a corner which can be moved to route around components and other traces.
  • 37. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 29  The remove a trace button is not very important since the delete key will achieve the same result. 6.1.3 Design Considerations: Before starting a project there are several ways to design a PCB and one must be chosen to suit the project’s needs. Single sided, or double sided? When making a PCB you have the option of making a single sided board, or a double sided board. Single sided boards are cheaper to produce and easier to etch, but much harder to design for large projects. If a lot of parts are being used in a small space it may be difficult to make a single sided board without jumper over traces with a cable. While there’s technically nothing wrong with this, it should be avoided if the signal travelling over the traces is sensitive (e.g. audio signals). A double sided board is more expensive to produce professionally, more difficult to etch on a DIY board, but makes the layout of components a lot smaller and easier. It should be noted that if a trace is running on the top layer, check with the components to make sure you can get to its pins with a soldering iron. Large capacitors, relays, and similar parts which don’t have axial leads can NOT have traces on top unless boards are plated professionally. Ground-plane or other special purposes for one side. When using a double sided board you must consider which traces should be on what side of the board. Generally, put power traces on the top of the board, jumping only to the bottom if a part cannot be soldiered onto the top plane (like a relay), and vice- versa. Some projects like power supplies or amps can benefit from having a solid plane to use for ground. In power supplies this can reduce noise, and in amps it minimizes the distance between parts and their ground connections, and keeps the ground signal as simple as possible. However, care must be taken with stubborn chips such as the TPA6120 amplifier from TI. The TPA6120 datasheet specifies not to run a ground plane under the pins or signal traces of this chip as the capacitance generated could effect performance negatively.
  • 38. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 30 6.2 PIC Compiler: PIC compiler is software used where the machine language code is written and compiled. After compilation, the machine source code is converted into hex code which is to be dumped into the microcontroller for further processing. PIC compiler also supports C language code. It’s important that you know C language for microcontroller which is commonly known as Embedded C. As we are going to use PIC Compiler, hence we also call it PIC C. The PCB, PCM, and PCH are separate compilers. PCB is for 12-bit opcodes, PCM is for 14 bitopcodes, and PCH is for 16-bit opcode PIC microcontrollers. Due to many similarities, all three compilers are covered in this reference manual. Features and limitations that apply to only specific microcontrollers are indicated within. These compilers are specifically designed to meet the unique needs of the PIC microcontroller. This allows developers to quickly design applications software in a more readable, high-level language. When compared to a more traditional C compiler, PCB, PCM, and PCH have some limitations. As an example of the limitations, function recursion is not allowed. This is due to the fact that the PIC has no stack to push variables onto, and also because of the way the compilers optimize the code. The compilers can efficiently implement normal C constructs, input/output operations, and bit twiddling operations. All normal C data types are supported along with pointers to constant arrays, fixed point decimal, and arrays of bits. PIC C is not much different from a normal C program. If you know assembly, writing a C program is not a crisis. In PIC, we will have a main function, in which all your application specific work will be defined. In case of embedded C, you do not have any operating system running in there. So you have to make sure that your program or main file should never exit. This can be done with the help of simple while (1) or for (;;) loop as they are going to run infinitely. We have to add header file for controller you are using, otherwise you will not be able to access registers related to peripherals. #include <18F452.h> // header file for PIC 18F452// #include <16F73.h> // header file for PIC 16F73//
  • 39. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 31 6.3 Proteus: Proteus is software which accepts only hex files. Once the machine code is converted into hex code, that hex code has to be dumped into the microcontroller and this is done by the Proteus. Proteus is a programmer which itself contains a microcontroller in it other than the one which is to be programmed. This microcontroller has a program in it written in such a way that it accepts the hex file from the pic compiler and dumps this hex file into the microcontroller which is to be programmed. As the Proteus programmer requires power supply to be operated, this power supply is given from the power supply circuit designed and connected to the microcontroller in proteus. The program which is to be dumped in to the microcontroller is edited in proteus and is compiled and executed to check any errors and hence after the successful compilation of the program the program is dumped in to the microcontroller using a dumper. 6.4 Procedural steps for compilation, simulation and dumping: 6.4.1 Compilation and simulation steps: For PIC microcontroller, PIC C compiler is used for compilation. The compilation steps are as follows:  Open PIC C compiler.  You will be prompted to choose a name for the new project, so create a separate folder where all the files of your project will be stored, choose a name and click save. Fig 6.2: Picture of opening a new file using PIC C compiler
  • 40. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 32  Click Project, New, and something the box named 'Text1' is where your code should be written later. Fig 6.3: Picture of compiling a new file using PIC C compiler  Now you have to click 'File, Save as' and choose a file name for your source code ending with the letter '.c'. You can name as 'project.c' for example and click save. Then you have to add this file to your project work Fig 6.4: Picture of compiling a project.c file using PIC C compiler
  • 41. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 33  You can then start to write the source code in the window titled 'project.c' then before testing your source code; you have to compile your source code, and correct eventual syntax errors. Fig 6.5: Picture of checking errors and warnings using PIC C compiler  By clicking on compile option .hex file is generated automatically.  This is how we compile a program for checking errors and hence the compiled program is saved in the file where we initiated the program.
  • 42. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 34 Fig 6.6: Picture of .hex file existing using PIC C compiler After compilation, next step is simulation. Here first circuit is designed in Express PCB using Proteus 7 software and then simulation takes place followed by dumping. The simulation steps are as follows:  Open Proteus 7 and click on IS1S6.  Now it displays PCB where circuit is designed using microcontroller. To design circuit components are required. So click on component option.  Now click on letter ’p’, then under that select PIC18F452,other components related to the project and click OK. The PIC 18F452 will be called your “'Target device”, which is the final destination of your source code.
  • 43. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 35 6.4.2 Dumping steps: The steps involved in dumping the program edited in proteus 7 to microcontroller are shown below: 1. Initially before connecting the program dumper to the microcontroller kit the window is appeared as shown below. Fig 6.7: Picture of program dumper window
  • 44. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 36 2. Select Tools option and click on Check Communication for establishing a connection as shown in below window Fig 6.8: Picture of checking communications before dumping program into microcontroller
  • 45. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 37 3. After connecting the dumper properly to the microcontroller kit the window is appeared as shown below. Fig 6.9: Picture after connecting the dumper to microcontroller
  • 46. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 38 4. Again by selecting the Tools option and clicking on Check Communication the microcontroller gets recognized by the dumper and hence the window is as shown below. Fig 6.10: Picture of dumper recognition to microcontroller
  • 47. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 39 5. Import the program which is ‘.hex’ file from the saved location by selecting File option and clicking on ‘Import Hex’ as shown in below window. Fig 6.11: Picture of program importing into the microcontroller
  • 48. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 40 6. After clicking on ‘Import Hex’ option we need to browse the location of our program and click the ‘prog.hex’ and click on ‘open’ for dumping the program into the microcontroller. Fig 6.12: Picture of program browsing which is to be dumped
  • 49. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 41 7. After the successful dumping of program the window is as shown below. Fig 6.13: Picture after program dumped into the microcontroller
  • 50. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 42 6.5 PROGRAM CODE: The program code which is dumped in the microcontroller of our project is shown below. #include <Wire.h> #include <LiquidCrystal.h> #include <EEPROM.h> #include <ds1307.h> int on=0; int off=0; byte value; byte value1; void setup() { Wire.begin(); ds1307_init(); Serial.begin(9600); delay(2000); // This delay allows the MCU to read the current date and time. pinMode(13, OUTPUT); pinMode(2, INPUT); pinMode(3, INPUT); pinMode(10, INPUT); lcd.begin(16, 2); lcd.clear(); // Print a message to the LCD. lcd.print(" Automatic "); lcd.setCursor(0, 1); lcd.print(" Signal Jammer "); delay(3000); }
  • 51. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 43 void loop() { int b1 = digitalRead(2); int b2 = digitalRead(3); if(b1 == LOW) { lcd.clear(); // Print a message to the LCD. lcd.print("EVENT MODE "); on=0; off=0; for (int i = 0; i < 10; i++) { EEPROM.write(i, 0); } while(1) { int b1 = digitalRead(2); int b2 = digitalRead(3); int b3 = digitalRead(10); if(b1 == LOW) { on++; } else if(b3 == LOW) { off++; } else if(b2 == LOW) { EEPROM.write(0, on);
  • 52. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 44 EEPROM.write(2, off); lcd.clear(); lcd.print("SETTING DONE"); delay(1000); break; } lcd.clear(); lcd.print("ON Time:"); lcd.print(on); lcd.setCursor(0,1); lcd.print("OFF Time:"); lcd.print(off); delay(1000); } } Serial.print("The current date and time is now: "); printTime(); value = EEPROM.read(0); value1 = EEPROM.read(2); if(minute == value ) { digitalWrite(13, HIGH); } else if(minute == value1) { digitalWrite(13, LOW); } delay(1000);
  • 53. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 45 } } void printTime() { read_Time(); lcd.clear(); lcd.print(days[weekday]); lcd.print(","); lcd.print(months); lcd.print(" "); lcd.print(monthday); lcd.print(", 20"); lcd.print(year); if (hour > 12) { hour -= 12; AMPM = " PM"; } else if (hour == 12) { AMPM = " PM"; } else AMPM = " AM"; lcd.setCursor(0, 1); lcd.print(hour); lcd.print(":"); lcd.print(minute); lcd.print(":"); lcd.print(second); lcd.print(AMPM); }
  • 54. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 46 CHAPTER 7: ADVANTAGES AND DISADVANTAGES Advantages: 1. Easy to operate. 2. Low power consumption. 3. Efficient design. 4. Eliminates button operations. 5. No need for training. 6. Fast response. 7. Sophisticated security 8. Simple and Reliable Design Disadvantages: i. Cost oriented. ii. Requires special hardware. iii. People feel inconvenience. iv. V.I.P.‘s may lose some important calls. v. Careful handling of LCD is required.
  • 55. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 47 CHAPTER 8:APPLICATIONS  Gas stations, the air entrainment station, the fuel depot and the flammable explosive chemical warehouse, the refinery, the petrified factory and so on need safely to protect place: May avoid changing suddenly the detonation which the signal radiative generation static electricity spark but causes, the fire. Posts the prohibition to dial the handset sign, does not have the initiative, this kind of accident all has the appearance in national many gas stations, in order to safeguard these important situations the security to be supposed to take the precautionary measure.  Governments, enterprise's each kind of conference room: May avoid the handset ting disturbs and answers when the telephone breaking the leader to speak but interrupts its person to hold a meeting.  Armies, public security department's important conference rooms: Might avoid the attending personnel divulging the military and the government using the handset is secret, at present the new spy science and technology, already used the handset interception, the monitor environment sound, therefore to important conference place, it is necessary to take effective also of security the initiative.  Hospitals: Might avoid the goon machine-hour but causing doctor to the hospital precision instrument equipment disturbance to misdiagnose, has delayed the rescue patient, as well as was surgery doctor to answer the handset telephone disturbance attention, underwent the surgery to doctor to the patient to be extremely disadvantageous.  Courts: May avoid the handset ting the disturbance, maintains the court conference site the dignity and the sacredness.  Libraries, New Bookstore: May avoid the handset ting and answer the telephone the noise, builds to study the study peaceful environment.  Theaters: As the upscale recreation area, eliminates the handset ting noise to be possible to maintain the audience to appreciate the program the interest.
  • 56. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 48  Tests places, examination center: May cease the examinee, monitor an exam the personnel to cheat using the modern communication facilities.  Schools classrooms and training organization classroom: May avoid the handset ting and answers when the handset telephone to attending class student's disturbance.  Instead fears the unit: Locking goal of tendency by handset telecontrolled bomb.  Coast defense unit: May prevent the seacoast smuggling member discloses secret information using the handset, effectively attacks smuggling criminal offender's smuggling.  The jail, detains the place: Prevented the criminal, the news media, the visit personnel, the prison tube does not collude with according to the stipulation inside and outside, forms conspires to get the story straight.  Temples, Mosques and Churches: May eliminate the handset signal noise, by maintains the religious place solemn and respectful.
  • 57. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 49 CHAPTER 9 : RESULTS 9.1 Result: The project “Cellphone RF Signal detector and Jammer” was designed to help for security reasons and a friendly hardware interaction for the user. The device is designed by interfacing mobile jammer and buttons. The activation and deactivation time schedules can be programmed with microcontroller. 9.2 Conclusion: Integrating features of all the hardware components used have been developed in it. Presence of every module has been reasoned out and placed carefully, thus contributing to the best working of the unit. Secondly, using highly advanced IC’s with the help of growing technology, the project has been successfully implemented. Thus the project has been successfully designed and tested. 9.3 Future Scope: Our project “Mobile Signal detector and Jammer” is mainly intended to provide an interaction with mobile phone using GSM and Jammer are helpful for security based operation regions. Microcontroller interfaces with Jammer device, LCD and relay switch. RTC interfacing is done using Serial Communication I2C bus. This system also consists of a 16x2 LCD for better visibility. This displays the time duration of activation and deactivation of jammer information. This project can be extended by using GPS and 3G technologies. Through GPS, we can monitor the location from anywhere in the world and 3G technologies can be jammed at some particular security timings.
  • 58. RF Signal Detector & Jammer Dept. of E&CE, B.K.I.T, Bhalki Page 50 BIBLIOGRAPHY BOOKS: [1] Telecommunication Switching, Traffic and Networks – J.E.Flood [2] K.Feher, ―Wireless Digital Communication‖, prentice Hall of India, New Delhi. [3] Programming and customizing the PIC microcontroller: Third edition by Mike Predko Tata McGraw-Hill Education Pvt. Ltd, 7 West Patel Nagar, New Delhi 11008. [4] An Embedded Software Primer by David E. Simon Dorling Kindersley (India) 7th floor, Knowledge Boulevard, A-8(A), Sector-62, Noida 201309, India. WEBSITE LINKS: [5] http://en.wikipedia.org/wiki/Mobile_phone_jammer [6] http://www.howstuffworks.com/cell-phone-jammer.htm [7] http://hatchfromeggs.blogspot.in/2012/03/detail-cell-phone-jammer-schematic.html [8] http://en.wikipedia.org/wiki/PIC_microcontroller [9] http://en.wikibooks.org/wiki/Embedded_Systems/Embedded_System_Basics [10] http://www.mikroe.com/mikroc/pic/