The Design And Construction Of A Radio Frequency Jammer Complete Project Material (PDF/DOC)
ABSTRACT
A Radio Frequency jammer is a device used to disrupt or prevent communication via a broadcasted RF signal. Simultaneously, they can block all commercial FM broadcast bank (87.5 MHz to 108 MHz) and GSM signal transmissions within the jammer’s transmission range. The device can possibly block these frequencies by transmitting a dirty signal (like noise) on the same frequency at which the GSM and radio system operates. A Radio Frequency jammer transmits a radio frequency signal on the same frequency at which the radio system operates and the jamming succeeds when the radio sets in the area where the jammer is located are disabled.
TABLE OF CONTENTS
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
- INTRODUCTION
- AIM/OBJECTIVE OF THE PROJECT
- SIGNIFICANCE OF THE PROJECT
- SCOPE OF THE PROJECT
- LIMITATIONS OF THE PROJECT
- APPLICATION OF T HE PROJECT.
- ADVANTAGES OF THE PROJECT
- PROJECT ORGANISATION
CHAPTER TWO
2.0 LITERATURE REVIEW
2.1 HISTORICAL BACKGROUND OF THE PROJECT
2.2 DESCRIPTION OF RADIO FREQUENCY
2.3 RADIO COMMUNICATION
2.4 SPECIAL PROPERTIES OF RF CURRENT
CHAPTER THREE
3.0 CONSTRUCTION OF METHOLOGY
3.1 BLOCK DIAGRAM OF THE SYSTEM
3.2 CIRCUIT DIAGRAM
3.3 CIRCUIT DESCRIPTION
3.4 SYSTEM OPERATION
3.5 JAMMING TO SIGNAL RATIO EQUATION
3.6 COMPONENTS LIST
3.7 DESCRIPTION OF MAJOR COMPONENTS USED
CHAPTER FOUR
4.0 RESULT ANALYSIS
4.1 CONSTRUCTION PROCEDURE ANDD TESTING
4.2 ASSEMBLING OF SECTIONS
4.3 CONSTRUCTION OF THE CASING
4.4 TESTING
4.5 INSTALLATION OF THE COMPLETED DESIGN
4.6 SYSTEM TROUBLESHOOTING METHOD
CHAPTER FIVE
5.0 CONCLUSIONS
5.1 RECOMMENDATION
5.2 REFERENCES
CHAPTER ONE
1.1 INTRODUCTION
A radio jammer is any device that deliberately blocks, jams or interferes with authorized wireless communications. In the United States, jammers are illegal and their use can result in large fines. In some cases jammers work by the transmission of radio signals that disrupt communications by decreasing the signal-to-noise ratio.
The concept can be used in wireless data networks to disrupt information flow. It is a common form of censorship in totalitarian countries, in order to prevent foreign radio stations in border areas from reaching the country.
Jamming is usually distinguished from interference that can occur due to device malfunctions or other accidental circumstances. Devices that simply cause interference are regulated under different regulations. Unintentional ‘jamming’ occurs when a n operator transmit on a busy frequency without first checking if its in use, or without being able to hear stations using the frequency. Another form of unintentional jamming occurs when equipment accidently radiates a signal, such as a cable television plant that accidentally emits on an aircraft emergency frequency.
Intentional communication jamming is usually aimed at radio signals to disrupt control of a battle. A transmitter turned to the same frequency as the opponents’ receiving equipment and with the same type of modulation, can, with enough power, override any signal at the receiver. Digital wireless jamming for signals such as Bluetooth and WIFI is possible with very low power.
The most common types of this form of signal jamming are random noise, random pulse, stepped tones, warbler, random keyed modulated CW, tone, rotary, pulse, spark, recorded sounds, gulls, and sweep-through. These can be divided into two groups – obvious and subtle.
Obvious jamming is easy to detect because it can be heard on the receiving equipment. It usually is some type of noise such as stepped tones (bagpipes), random-keyed code, pulses, music (often distorted), erratically warbling tones, highly distorted speech, random noise (hiss) and recorded sounds. Various combinations of these methods may be used often accompanied by regular morse identification signal to enable individual.
Transmit to be identified in order to assess their effectiveness.
This work covers RF jammer basics, technical specifications, types of jamming techniques, jamming to signal ratio equation, mobile jammer block diagram and RF jammer manufactures.
RF jamming is the concept used to disrupt the transmission of a particular radio / satellite station so that the signal is not received / decoded properly at the receiving station.
1.2 OBJECTIVE OF THE PROJECT
The objective of this work is design a device that deliberately blocks, jams or interferes with authorized radio signal, precisely Fm Signal.
1.3 PURPOSE OF THE PROJECT
The purpose of this type of jamming is to block reception of transmitted signals and to cause a nuisance to the receiving operator.
1.4 SCOPE OF THE PROJECT
The concept came into existence from military when one country during war situation do not want their radio transmission to be intercepted by enemy. They use RF jammers which does jamming near border areas. Following points should be considered for RF jammer design:
- Frequency of the RF jammer should be equal to the receiving station frequency; which need to be disrupted.
- Modulation type of RF jammer should be higher than disrupting station.
Power of the RF jammer should be higher than disrupting station. There are various different approaches followed in RF jamming to prevent mobile phone from ringing in a specific region or area. It is mainly used in worship place and in national border areas or during wars.
1.5 SIGNIFICANCE OF THE PROJECT
Frequency jamming is the disruption of radio signals through use of an over-powered signal in the same frequency range.
However, any communication that uses radio frequencies can be jammed by a strong radio signal in the same frequency. In this manner, WI-FI may be attacked with a network jamming attack, reducing signal quality until it becomes unusable or disconnects occur. With very similar methods, a focused and aimed signal can actually break access point hardware, as with equipment destruction attacks.
Frequency jamming can be benign or malicious. Police and the military often use jamming devices to limit or disrupt communications during hostage situations, bomb threats or when military action is underway. Less Portable personal jammers are available to enable their owners to prevent others iin their immediate vicinity (up to 60-80 feet away)
1.6 LIMITATION OF THE PROJECT
The main disadvantages of the radio signal jammer is that the transmission of the jamming signal is prohibited by the law in many countries.
1.7 RESEARCH METHODOLOGY
In the course of carrying this study, numerous sources were used which most of them are by visiting libraries, consulting journal and news papers and online research which Google was the major source that was used.
1.8 PROJECT ORGANISATION
The work is organized as follows: chapter one discuses the introductory part of the work, chapter two presents the literature review of the study, chapter three describes the methods applied, chapter four discusses the results of the work, chapter five summarizes the research outcomes and the recommendations.The second limitations of the project are, the device only can block the four main operators which are ETISALAT, MTN, AIRTEL and GLOBACOM. This is because, the lines are only for Nigerian users and the frequency band range is between 935 to 960 MHz. These r
2.0 LITERATURE REVIEW
2.1 Introduction
The chapter presents a review of related literature that supports the current research on the Design And Construction Of A Radio Frequency Jammer, systematically identifying documents with relevant analyzed information to help the researcher understand existing knowledge, identify gaps, and outline research strategies, procedures, instruments, and their outcomes…
This Research Work On “Design And Construction Of A Radio Frequency Jammer” Complete Material Can Be Downloaded Through Whatsapp, Email Or Download Link. Click The Below Button To Proceed:
This study on the Design And Construction Of A Radio Frequency Jammer is solely for academic research purposes only and should be used as a research guideline or source of ideas. Copying word-for-word or submitting the entire project work to your school is unethical academic behavior and “UniProjects” is not part of it.