SlideShare uma empresa Scribd logo
1 de 36
Topic: Wireless communication
technology.
. Wireless communication involves the transmission
of information over a distance without help of
wires, cables or any other forms of electrical
conductors. The transmitted distance can be
anywhere between a few meters.
 Infrared (IR) wireless communication.
satellite communication.
broadcast radio communication system.
Microwave wireless communication.
Wi-Fi & Bluetooth.
Infrared band of the electromagnet corresponds to 430THz
to 300GHz and a wavelength of 980nm. The propagation of
light waves in this band can be used for a communication
system (for transmission and reception) of data. This
communication can be between two portable devices or
between a portable device and a fixed device.
A communication satellite is an artificial satellite used
specifically as a communication transmitter/receiver in orbit.
It behaves like a radio relay station above the earth to
receive, amplify, and redirect analog and digital signals
carried on a specific radio frequency.
US launched the first GEO satellite, Relay-1 in 1962.
Satellite communication
Basically an audio broadcasting service, radio broadcasts sound
through the air as radio waves. It uses a transmitter to transmit radio
waves to a receiving antenna. Radio broadcasting can also be done
via cable FM, the internet and satellites. A radio broadcast sends
data over long distances (across countries) at up to 2 megabits per
second (AM/FM Radio).
Microwave transmission involves the transfer of voice
and data through the atmosphere as super high-
frequency radio waves called microwaves. Microwave
transmission is mainly used to transmit messages
between ground-based stations and satellite
communications systems.
Wi-Fi: Wi-Fi is a popular
wireless networking
technology. Wi-Fi stands for
“wireless fidelity”. The Wi-
Fi was invented NCR
corporation/AT&T in
Netherlands in 1991. By
using this technology we
can exchange the
information between two or
more devices.
Bluetooth is a wireless technology
standard for exchanging data over
short distances (using short-
wavelength UHF radio waves)
between two device for personal
area network. Invented by telecom
vendor Ericsson in 1994.
For example mobile Bluetooth
headphone.
Television Remote Control – Modern televisions use wireless
remote control. Currently radio waves are also used.
Wi-Fi – This is a wireless local area network that establishes
internet connection with the portable computers.
Security systems – For homes and office buildings, hard wired
implementation security systems are replaced by the Wireless
technology.
Wireless energy transfer – A process where a power source
transmits electrical energy to electrical load which does not have
built-in power source wirelessly
When the wireless signals are transferred sometime signal
are blocked by the certain obstacles as walls, gates and
other material.
wireless technology does not provide the same bandwidth
guarantees as a wired connection
Flexibility: The internet can be accessed from anywhere
without any wire connection.
Easy to use: we can setup and connected device easily also
transfer data & information.
Any data or information can be transmitted faster and
with a high speed
Maintenance and installation is less cost for these
networks.
More user supported - cable device have limited slots
whereas wireless does not.
An unauthorized person can easily capture the wireless signals
which spread through the air.
Wi-Fi generates radiations which can harm the human health.
There are some limits to transfer the data, we cant able to
transfer the data for long distance.
Wi-Fi implementation is very expensive when compared to the
wired connection.
Contents
 Introduction
 Types of Jammer
 How Jammer Works
 What inside Jammer
 Applications of Jammer
 Future scope of Jamming Technology
 Cell Phone Detector Introduction
 Block Diagram
 Application
 Conclusion
Shri Mata Vaishno Devi University, Katra 19
Introduction
 Cell phone jammers are devices that create a
temporary "dead zone" to all cell
phone traffic in their immediate proximity.
 A jamming device transmits - same radio frequencies
of greater power as the
cell phone, disrupting the communication between
the phone and the cell-
phone base station in the tower.
 It's a called a denial-of-service attack.
8/12/2016 20
Introduction ( Continued . . )
 Disrupting a cell phone is the same as jamming any
other type of radio
communication.
 A cell phone works by communicating with the
service network through a cell
tower as base station.
 Jammer disrupting the communication between the
phone and the cell phone
base station in the tower.8/12/2016 21
Jamming Device
 Jamming devices overpower the cell phone by
transmitting a signal on the
same frequency.
 Power of the signal should be high enough so that the
two signals collide and
cancel each other out.
 The phone is tricked into thinking there is no service
because it can receive
only one of the frequencies.8/12/2016 22
Jamming Device ( Continued . . )
 Less complex devices block only one group of
frequencies, Some of the high-
end devices block all frequencies at once.
 Low-powered jammers block calls in a range of about
30 feet (9 m).
 Higher - powered units - as large as a football field.
 Law enforcement jammer units - up to 1 mile
(1.6 km) from the device.
8/12/2016 23
Components of Jamming Device
 The simplest just have an on/off switch and a light
that indicates it's on.
 Complex devices have switches to activate jamming at
different frequencies.
 Main Components :
 Power Supply
 Circuitry
 Antenna
8/12/2016 24
Components ( Continued . . )
 Circuitry
 The main electronic components of a jammer are:
 Voltage-controlled oscillator
 Tuning circuit
 Noise generator
 RF amplification
8/12/2016 25
Block Diagram
Shri Mata Vaishno Devi University, Katra 26
If section Rf section
Jamming
signals
Power supply
How Jammers Work ?
 Jammers work in a similar way to radio jammers by sending
out the
same radio frequencies that cell phones operate on.
 This creates enough interference so that a call cannot connect
with a device.
 2 types of jammers. The first type are usually smaller devices
that block the
signals coming from towers to individual.
8/12/2016 27
How Jammers Work ? ( Continued
. . )
 Can block signals within about a 30-foot radius. Cell
phones within this range
simply show no signal.
 The second type of cell phone jammer is usually
much larger in size and more
powerful.
 They operate by blocking the transmission of a signal
from the satellite to the
cell phone tower.
8/12/2016 28
How Jammers Work ? ( Continued
. . )
8/12/2016 29
Types of jammer device
 Cell Phone Jammer
 Portable Jammer
 Remote Control Jammer
 Adjustable Cell Phone Jammer
 School & Prison Phone Jammer
 Explosion - Proof Jammer
 Police & Military Jammer for victim’s security
8/12/2016 30
Application
of Jammers in Edu systems
 To maintain the complete silence in library and lecture
hall
 To avoid fraud in examination hall
 To avoid disturbance in class room
 For providing security in business conference, board of
directors rooms, seminars, etc.,
 For providing calm and peaceful atmosphere in
Hospitals
Shri Mata Vaishno Devi University, Katra 31
Applications
 Cell-phone alerter (detector) is useful that
indicate the presence of a cell-phone signal. These
can be used in hospitals where cell-phone signals
could interfere with sensitive medical equipment.
When a signal is detected, users are asked to turn
off their phones or Jamming can be used.
 It is useful airport.
 It is useful wherever cell phone can disturb.
Shri Mata Vaishno Devi University, Katra 32
Future scope of Jamming Technology
 While the law clearly prohibits using a device to
actively disrupt a cell-phone signal, there are no
rules against passive cell-phone blocking.
 Companies are working on devices that control a
cell phone but do not "jam the signal.
Shri Mata Vaishno Devi University, Katra 33
Conclusion
 We can say every device is acts as good aspects as well
as bad aspects.
 Operating or even owning a cell phone jammer is
illegal in most municipalities
and specifically so in the United States.
 Jamming is seen as Property Theft, Safety Hazard.
 In many place cell phone jammer is useful but at
many place it is a problem .
 But it’s overall performance is very good and helpful
8/12/2016 34
The Presentations are best to our
efforts
8/12/2016 36

Mais conteúdo relacionado

Mais procurados

Ch 02 telecommunications terminology
Ch 02 telecommunications terminology Ch 02 telecommunications terminology
Ch 02 telecommunications terminology sakariachromabook
 
Ch 04 analog and digital communications
Ch 04 analog and digital communicationsCh 04 analog and digital communications
Ch 04 analog and digital communicationssakariachromabook
 
Ch 01 part 2 - history of telecommunications and regulations
Ch 01    part 2 - history of telecommunications and regulations Ch 01    part 2 - history of telecommunications and regulations
Ch 01 part 2 - history of telecommunications and regulations sakariachromabook
 
Wired Transmission Media
Wired Transmission MediaWired Transmission Media
Wired Transmission Medianimx106
 
Ch 01 part 1 - basic elements of telecommunication systems
Ch 01   part 1 - basic elements of telecommunication systemsCh 01   part 1 - basic elements of telecommunication systems
Ch 01 part 1 - basic elements of telecommunication systemssakariachromabook
 
Final Wireless communication PPT
Final Wireless communication PPTFinal Wireless communication PPT
Final Wireless communication PPTMelkamu Deressa
 
Chapter 6 contemporary telecommunication technologies
Chapter 6  contemporary telecommunication technologiesChapter 6  contemporary telecommunication technologies
Chapter 6 contemporary telecommunication technologiessakariachromabook
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentationManikandan Jeeva
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationLiton Ahmed
 
Introduction wireless communication network
Introduction wireless communication networkIntroduction wireless communication network
Introduction wireless communication networkRiazul Islam
 
Wireless communication
Wireless communication Wireless communication
Wireless communication arpit joshi
 
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.IOSR Journals
 
Wireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu GebeyeawWireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu GebeyeawMulatu Gebeyaw
 
WIRELESS COMMUNICATION
WIRELESS COMMUNICATIONWIRELESS COMMUNICATION
WIRELESS COMMUNICATIONMehedi Hasan
 

Mais procurados (20)

Ch 02 telecommunications terminology
Ch 02 telecommunications terminology Ch 02 telecommunications terminology
Ch 02 telecommunications terminology
 
Ch 04 analog and digital communications
Ch 04 analog and digital communicationsCh 04 analog and digital communications
Ch 04 analog and digital communications
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 
Ch 01 part 2 - history of telecommunications and regulations
Ch 01    part 2 - history of telecommunications and regulations Ch 01    part 2 - history of telecommunications and regulations
Ch 01 part 2 - history of telecommunications and regulations
 
Wired Transmission Media
Wired Transmission MediaWired Transmission Media
Wired Transmission Media
 
Ch 01 part 1 - basic elements of telecommunication systems
Ch 01   part 1 - basic elements of telecommunication systemsCh 01   part 1 - basic elements of telecommunication systems
Ch 01 part 1 - basic elements of telecommunication systems
 
Final Wireless communication PPT
Final Wireless communication PPTFinal Wireless communication PPT
Final Wireless communication PPT
 
Mobile Technology 3
Mobile Technology 3Mobile Technology 3
Mobile Technology 3
 
emc
emcemc
emc
 
Chapter 6 contemporary telecommunication technologies
Chapter 6  contemporary telecommunication technologiesChapter 6  contemporary telecommunication technologies
Chapter 6 contemporary telecommunication technologies
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Introduction wireless communication network
Introduction wireless communication networkIntroduction wireless communication network
Introduction wireless communication network
 
Wireless communication
Wireless communication Wireless communication
Wireless communication
 
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.
 
Wireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu GebeyeawWireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu Gebeyeaw
 
Generaltec power line-en
Generaltec power line-enGeneraltec power line-en
Generaltec power line-en
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
WIRELESS COMMUNICATION
WIRELESS COMMUNICATIONWIRELESS COMMUNICATION
WIRELESS COMMUNICATION
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 

Destaque

Destaque (7)

Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Hospital management system
Hospital management systemHospital management system
Hospital management system
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdf
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 

Semelhante a Violent gesture

Wireless communication
Wireless communicationWireless communication
Wireless communicationizhar ul haq
 
Module 1_ Introduction to Mobile Computing.pptx
Module 1_  Introduction to Mobile Computing.pptxModule 1_  Introduction to Mobile Computing.pptx
Module 1_ Introduction to Mobile Computing.pptxnikshaikh786
 
CHAPTER #1.pptx
CHAPTER #1.pptxCHAPTER #1.pptx
CHAPTER #1.pptxOmar91305
 
CHAPTER #1.pptx
CHAPTER #1.pptxCHAPTER #1.pptx
CHAPTER #1.pptxOmar91305
 
A project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copyA project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copyPranoosh T
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd Iaetsd
 
The use and importance of radio waves
The use and importance of radio wavesThe use and importance of radio waves
The use and importance of radio wavesShelisaRaffingtonPaul
 
Wireless_communication_1st unit.pptx
Wireless_communication_1st unit.pptxWireless_communication_1st unit.pptx
Wireless_communication_1st unit.pptxAshishChandrakar12
 
Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer reportAmit sundaray
 
Wireless Energy Transfer
Wireless Energy TransferWireless Energy Transfer
Wireless Energy TransferIOSR Journals
 
Best abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libreBest abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libreNavin Mishra
 
chapter 1.pptx
chapter 1.pptxchapter 1.pptx
chapter 1.pptxKabadaSori
 
Mobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in IndiaMobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in IndiaNishu Vora
 
Mobile Tower Radiations & its effects
Mobile Tower Radiations & its effectsMobile Tower Radiations & its effects
Mobile Tower Radiations & its effectsNishu Vora
 
Mobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in IndiaMobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in IndiaNishu Vora
 

Semelhante a Violent gesture (20)

Wireless communication
Wireless communicationWireless communication
Wireless communication
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Wireless communaction
Wireless communactionWireless communaction
Wireless communaction
 
Module 1_ Introduction to Mobile Computing.pptx
Module 1_  Introduction to Mobile Computing.pptxModule 1_  Introduction to Mobile Computing.pptx
Module 1_ Introduction to Mobile Computing.pptx
 
CHAPTER #1.pptx
CHAPTER #1.pptxCHAPTER #1.pptx
CHAPTER #1.pptx
 
CHAPTER #1.pptx
CHAPTER #1.pptxCHAPTER #1.pptx
CHAPTER #1.pptx
 
A project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copyA project report_at_cell_phone_detector - copy
A project report_at_cell_phone_detector - copy
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
The use and importance of radio waves
The use and importance of radio wavesThe use and importance of radio waves
The use and importance of radio waves
 
Wireless_communication_1st unit.pptx
Wireless_communication_1st unit.pptxWireless_communication_1st unit.pptx
Wireless_communication_1st unit.pptx
 
I010346366
I010346366I010346366
I010346366
 
14A81A05A0
14A81A05A014A81A05A0
14A81A05A0
 
Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
 
Wireless commication
Wireless commicationWireless commication
Wireless commication
 
Wireless Energy Transfer
Wireless Energy TransferWireless Energy Transfer
Wireless Energy Transfer
 
Best abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libreBest abdulmajeed extended_abstract-libre
Best abdulmajeed extended_abstract-libre
 
chapter 1.pptx
chapter 1.pptxchapter 1.pptx
chapter 1.pptx
 
Mobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in IndiaMobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in India
 
Mobile Tower Radiations & its effects
Mobile Tower Radiations & its effectsMobile Tower Radiations & its effects
Mobile Tower Radiations & its effects
 
Mobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in IndiaMobile Tower Radiations & its effects in India
Mobile Tower Radiations & its effects in India
 

Último

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Último (20)

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

Violent gesture

  • 2. . Wireless communication involves the transmission of information over a distance without help of wires, cables or any other forms of electrical conductors. The transmitted distance can be anywhere between a few meters.
  • 3.  Infrared (IR) wireless communication. satellite communication. broadcast radio communication system. Microwave wireless communication. Wi-Fi & Bluetooth.
  • 4. Infrared band of the electromagnet corresponds to 430THz to 300GHz and a wavelength of 980nm. The propagation of light waves in this band can be used for a communication system (for transmission and reception) of data. This communication can be between two portable devices or between a portable device and a fixed device.
  • 5. A communication satellite is an artificial satellite used specifically as a communication transmitter/receiver in orbit. It behaves like a radio relay station above the earth to receive, amplify, and redirect analog and digital signals carried on a specific radio frequency. US launched the first GEO satellite, Relay-1 in 1962.
  • 6.
  • 8. Basically an audio broadcasting service, radio broadcasts sound through the air as radio waves. It uses a transmitter to transmit radio waves to a receiving antenna. Radio broadcasting can also be done via cable FM, the internet and satellites. A radio broadcast sends data over long distances (across countries) at up to 2 megabits per second (AM/FM Radio).
  • 9. Microwave transmission involves the transfer of voice and data through the atmosphere as super high- frequency radio waves called microwaves. Microwave transmission is mainly used to transmit messages between ground-based stations and satellite communications systems.
  • 10.
  • 11. Wi-Fi: Wi-Fi is a popular wireless networking technology. Wi-Fi stands for “wireless fidelity”. The Wi- Fi was invented NCR corporation/AT&T in Netherlands in 1991. By using this technology we can exchange the information between two or more devices.
  • 12. Bluetooth is a wireless technology standard for exchanging data over short distances (using short- wavelength UHF radio waves) between two device for personal area network. Invented by telecom vendor Ericsson in 1994. For example mobile Bluetooth headphone.
  • 13. Television Remote Control – Modern televisions use wireless remote control. Currently radio waves are also used. Wi-Fi – This is a wireless local area network that establishes internet connection with the portable computers. Security systems – For homes and office buildings, hard wired implementation security systems are replaced by the Wireless technology. Wireless energy transfer – A process where a power source transmits electrical energy to electrical load which does not have built-in power source wirelessly
  • 14.
  • 15.
  • 16. When the wireless signals are transferred sometime signal are blocked by the certain obstacles as walls, gates and other material. wireless technology does not provide the same bandwidth guarantees as a wired connection
  • 17. Flexibility: The internet can be accessed from anywhere without any wire connection. Easy to use: we can setup and connected device easily also transfer data & information. Any data or information can be transmitted faster and with a high speed Maintenance and installation is less cost for these networks. More user supported - cable device have limited slots whereas wireless does not.
  • 18. An unauthorized person can easily capture the wireless signals which spread through the air. Wi-Fi generates radiations which can harm the human health. There are some limits to transfer the data, we cant able to transfer the data for long distance. Wi-Fi implementation is very expensive when compared to the wired connection.
  • 19. Contents  Introduction  Types of Jammer  How Jammer Works  What inside Jammer  Applications of Jammer  Future scope of Jamming Technology  Cell Phone Detector Introduction  Block Diagram  Application  Conclusion Shri Mata Vaishno Devi University, Katra 19
  • 20. Introduction  Cell phone jammers are devices that create a temporary "dead zone" to all cell phone traffic in their immediate proximity.  A jamming device transmits - same radio frequencies of greater power as the cell phone, disrupting the communication between the phone and the cell- phone base station in the tower.  It's a called a denial-of-service attack. 8/12/2016 20
  • 21. Introduction ( Continued . . )  Disrupting a cell phone is the same as jamming any other type of radio communication.  A cell phone works by communicating with the service network through a cell tower as base station.  Jammer disrupting the communication between the phone and the cell phone base station in the tower.8/12/2016 21
  • 22. Jamming Device  Jamming devices overpower the cell phone by transmitting a signal on the same frequency.  Power of the signal should be high enough so that the two signals collide and cancel each other out.  The phone is tricked into thinking there is no service because it can receive only one of the frequencies.8/12/2016 22
  • 23. Jamming Device ( Continued . . )  Less complex devices block only one group of frequencies, Some of the high- end devices block all frequencies at once.  Low-powered jammers block calls in a range of about 30 feet (9 m).  Higher - powered units - as large as a football field.  Law enforcement jammer units - up to 1 mile (1.6 km) from the device. 8/12/2016 23
  • 24. Components of Jamming Device  The simplest just have an on/off switch and a light that indicates it's on.  Complex devices have switches to activate jamming at different frequencies.  Main Components :  Power Supply  Circuitry  Antenna 8/12/2016 24
  • 25. Components ( Continued . . )  Circuitry  The main electronic components of a jammer are:  Voltage-controlled oscillator  Tuning circuit  Noise generator  RF amplification 8/12/2016 25
  • 26. Block Diagram Shri Mata Vaishno Devi University, Katra 26 If section Rf section Jamming signals Power supply
  • 27. How Jammers Work ?  Jammers work in a similar way to radio jammers by sending out the same radio frequencies that cell phones operate on.  This creates enough interference so that a call cannot connect with a device.  2 types of jammers. The first type are usually smaller devices that block the signals coming from towers to individual. 8/12/2016 27
  • 28. How Jammers Work ? ( Continued . . )  Can block signals within about a 30-foot radius. Cell phones within this range simply show no signal.  The second type of cell phone jammer is usually much larger in size and more powerful.  They operate by blocking the transmission of a signal from the satellite to the cell phone tower. 8/12/2016 28
  • 29. How Jammers Work ? ( Continued . . ) 8/12/2016 29
  • 30. Types of jammer device  Cell Phone Jammer  Portable Jammer  Remote Control Jammer  Adjustable Cell Phone Jammer  School & Prison Phone Jammer  Explosion - Proof Jammer  Police & Military Jammer for victim’s security 8/12/2016 30
  • 31. Application of Jammers in Edu systems  To maintain the complete silence in library and lecture hall  To avoid fraud in examination hall  To avoid disturbance in class room  For providing security in business conference, board of directors rooms, seminars, etc.,  For providing calm and peaceful atmosphere in Hospitals Shri Mata Vaishno Devi University, Katra 31
  • 32. Applications  Cell-phone alerter (detector) is useful that indicate the presence of a cell-phone signal. These can be used in hospitals where cell-phone signals could interfere with sensitive medical equipment. When a signal is detected, users are asked to turn off their phones or Jamming can be used.  It is useful airport.  It is useful wherever cell phone can disturb. Shri Mata Vaishno Devi University, Katra 32
  • 33. Future scope of Jamming Technology  While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking.  Companies are working on devices that control a cell phone but do not "jam the signal. Shri Mata Vaishno Devi University, Katra 33
  • 34. Conclusion  We can say every device is acts as good aspects as well as bad aspects.  Operating or even owning a cell phone jammer is illegal in most municipalities and specifically so in the United States.  Jamming is seen as Property Theft, Safety Hazard.  In many place cell phone jammer is useful but at many place it is a problem .  But it’s overall performance is very good and helpful 8/12/2016 34
  • 35. The Presentations are best to our efforts

Notas do Editor

  1. Cell-phone users don't know they're being jammed. The phones just indicate that there's no service or no signal from the network. The jammer simply interrupts the phone's ability to establish a link with the nearest cell-phone tower.
  2. Cell phones are designed to add power if they experience low-level interference, so the jammer must recognize and match the power increase from the phone. The actual range of the jammer depends on its power and the local environment, which may include hills or walls of a building that block the jamming signal
  3. Jamming Devices are very basic devices. Power supply Smaller jamming devices are battery operated. Some look like cell phone and use cell-phone batteries. Stronger devices can be plugged into a standard outlet or wired into a vehicle's electrical system. Antenna Every jamming device has an antenna to send the signal. Some are contained rical cabinet. On stronger devices, antennas are external to provide longer range and may be tuned for individual frequencies.
  4. Voltage-controlled oscillator - Generates the radio signal that will interfere with the cell phone signal Tuning circuit - Controls the frequency at which the jammer broadcasts its signal by sending a particular voltage to the oscillator Noise generator - Produces random electronic output in a specified frequency range to jam the cell-phone network signal (part of the tuning circuit) RF amplification (gain stage) - Boosts the power of the radio frequency output to high enough levels to jam a signal
  5. The frequency blocked is somewhere between 800MHz and 1900MHz. Cell-phone users don't know they're being jammed. The phones just indicate that there's no service or no signal from the network. The jammer simply interrupts the phone's ability to establish a link with the nearest cell-phone tower.
  6. Some powerful models can block cell phone transmissions within a 5 mile radius. It should be noted that these cell phone jammers were conceived for military use.
  7. Jamming is seen as property theft, because a private company has purchased the rights to the radio spectrum, and jamming the spectrum is akin to stealing the property the company has purchased. a safety hazard because jamming blocks all calls in the area, not just the annoying ones. Jamming a signal could block the call of a babysitter frantically trying to contact a parent or a someone trying to call for an ambulance.