Professional Documents
Culture Documents
Cellphone Jamming Circuit
Cellphone Jamming Circuit
IMPLEMENTATON
BY
Supervisor
A REPORT SUBMITTED TO
UNIVERSITY OF KHARTOUM
(ELECTRONICS ENGINEERING)
Faculty Engineering
October 2017
DECLARATION OF ORIGINALINTY
I declare that this report entitled “Cell phone Jammers Circuit Design and implementation” is
my own work except as cited in the references. This report had not been accepted for any degree
and was not being submitted concurrently in candidature for any degree or another award.
Name:
Signature:
Date: / / 2017
ii
ACKNOWLEDGEMENTS
I would first like to thank my thesis advisor Prof. Sharief Fadul Babiker of
the Faculty of Engineering – Department of Electrical and Electronic Engineering
at University of Khartoum. He kept an open mind to my thoughts and provided
more than the required knowledge and guide into making this report happen.
I would also like to thank the experts who were involved in the educational
process for this research project: Prof. Sami Mohamed Sharief (Communication
Engineering), Prof. Mustafa Omer Nawri (Control Engineering), Dr. Iman
AbuAlMaali AbdalRahaman (Communication Engineering), Dr. Samah Omer
Hashem (Electronics Engineering), Mr. Mohannad Ahmed AlHassan
(Electronics Engineering) and Dr. Hiba Hassan Imam. Without their passionate
participation and input, the thesis could not have been successfully conducted.
iii
DEDICATION
My Father, being the provider and the generous man he is with his thoughts and feelings
Hanaa Salah Musa, being the wall to lean on at times of need just to hold me straight back on my
feet.
iv
ABSTRACT
This research presents the design, implementation, and testing of the design. This project have
implemented the First section of the device due limitations of obtaining the rest of the required
components but the design and the calculations have been measured to achieve the full design.
The design if manufactured correctly shall be capable of jamming the GSM 900 and GSM 1800
simultaneously and therefore jams the three well-known carriers in Sudan (Zain, Sudani, and
Mtn).
Phase one: studying the GSM-system to learn about signals and distortions in circuits, and how
does the GSM-system filter them.
Phase two: studying the Radio frequency methodology and acknowledge its participation in our
project and design
Phase three: collecting the parts and studying their behaviour in real-time systems
The design came out as a success and we even manufactured the IF part and obtained the desired
results, but failed to obtain VCO’s of the RF part for it to be manufactured as well.
v
المستخلص
يعرض هذا التقرير تصميم و محاكاة و تطبيق جهاز تشويش مزدوج التردد وسوف يشوش على تردد 900ميغاهرتز و 1800
ميغاهرتز للهواتف الخلوية .
تم تطبيق الجزء االول من المشروع بصفة كاملة وتعذر تطبيق الجزء الثاني بسبب عدم توفر القطع الالزمة في السودان .
التصميم اذا تم تصنيعه بطريقة صحيحة تباعا ً للتصميم سوف يكون الجهاز قابالً على تشويش على الترديدن 900و 1800
ميغاهرتز .
وبذلك سوف يشوش على شركات االتصاالت المعروفة في السودان (زين ,ام ت ن ,سوداني )
نجح التصميم في مرحلة المحاكاة وتم تصنيع الجزء االول من الجهاز(التردد المنخفض) واجتاز مرحلة االختبار بنجاح ايضاً.
وبسبب عدم القدرة على التحصل على القطع المطلوبة لتطبيق جزء التردد الراديوي لم يتم تطبيقه.
vi
TABLE OF CONTENTS
DECLARATION OF ORIGINALINTY ........................................................................................ ii
ACKNOWLEDGEMENTS ........................................................................................................... iii
DEDICATION ............................................................................................................................... iv
ABSTRACT .................................................................................................................................... v
المستخلص......................................................................................................................................... vi
TABLE OF CONTENTS .............................................................................................................. vii
LIST OF FIGURES ........................................................................................................................ x
LIST OF ABBREVIATIONS ....................................................................................................... xii
1 Chapter One: INTRODUCTION .......................................................................................... 14
1.1 Overview ....................................................................................................................... 14
1.2 Problem Statement ........................................................................................................ 15
1.3 Background and Motivation ......................................................................................... 16
1.4 Objectives of the Project ............................................................................................... 17
1.5 Thesis Layout ................................................................................................................ 18
2 Chapter Two: LITERATURE REVIEW .............................................................................. 19
2.1 Overview ....................................................................................................................... 19
2.2 Introduction to GSM/DCS Systems .............................................................................. 19
2.2.1 GSM 900 ................................................................................................................. 20
2.2.2 GSM 1800 (DCS) ................................................................................................... 21
2.3 How cell phones work .................................................................................................. 21
2.3.1 TDMA ..................................................................................................................... 21
2.3.2 CDMA..................................................................................................................... 22
2.3.3 TDMA vs. CDMA .................................................................................................. 23
2.4 Cell phone Jammers Circuit .......................................................................................... 23
2.5 Jamming Techniques .................................................................................................... 24
2.5.1 Noise Strategy ......................................................................................................... 24
2.5.2 Phase Strategy ......................................................................................................... 24
2.5.3 Techniques .............................................................................................................. 24
2.5.3.1 Spoofing........................................................................................................... 24
2.5.3.2 Shielding Attacks ............................................................................................. 24
vii
2.5.3.3 Denial of Service ............................................................................................. 24
2.6 Avalanche Breakdown .................................................................................................. 25
2.6.1 Avalanche Noise ..................................................................................................... 26
2.7 Voltage Control Oscillators .......................................................................................... 27
2.8 555Timer ....................................................................................................................... 29
2.8.1 NE555B................................................................................................................... 30
2.8.1.1 Features:........................................................................................................... 30
2.8.1.2 A-stable mode .................................................................................................. 31
2.9 LM741........................................................................................................................... 33
2.10 LM386........................................................................................................................... 33
2.11 Monopole Antenna........................................................................................................ 35
3 Chapter Three: METHODOLOGY AND IMPLEMENTATION ........................................ 37
3.1 Introduction ................................................................................................................... 38
3.2 Design parameters ......................................................................................................... 38
3.2.1 The distance to be jammed (D) ............................................................................... 38
3.2.2 Frequency bands ..................................................................................................... 38
3.2.3 Jamming to signal Ratio.......................................................................................... 40
3.2.4 Free space loss (FSPL)............................................................................................ 42
3.3 System design ............................................................................................................... 42
3.3.1 Power calculations .................................................................................................. 42
3.3.2 Parts of the jammers device .................................................................................... 43
3.3.2.1 The power supply ............................................................................................ 43
3.3.2.2 The IF-Section ................................................................................................. 44
3.3.2.2.1 Triangle wave generator .............................................................................. 45
3.3.2.2.2 Noise generator ........................................................................................... 46
3.3.2.2.3 The mixer .................................................................................................... 47
3.3.2.2.4 Clamper ....................................................................................................... 48
3.3.2.3 The RF-Section ................................................................................................ 50
3.3.2.3.1 Voltage Control oscillators.......................................................................... 50
3.3.2.3.2 Power amplifier ........................................................................................... 51
3.3.2.3.3 Antenna ....................................................................................................... 51
viii
4 Chapter Four: RESULTS AND DISCUSSION .................................................................... 53
4.1 Summary ....................................................................................................................... 53
4.2 IF-Section ...................................................................................................................... 54
4.2.1 Triangle wave generator ......................................................................................... 54
4.2.2 Noise Generator ...................................................................................................... 55
4.2.3 Mixer ....................................................................................................................... 56
4.2.4 Clamper ................................................................................................................... 57
4.3 Schematic, PCB layout, and Implementation ............................................................... 58
4.4 RF-Section .................................................................................................................... 60
5 Chapter Five: CONCLUSION AND FUTURE WORK ...................................................... 61
5.1 The problem .................................................................................................................. 61
5.2 The approach ................................................................................................................. 61
5.3 Future work and Alternative solutions.......................................................................... 62
5.4 Solutions and tryouts: ................................................................................................... 62
6 REFRENCES ........................................................................................................................ 63
Appendix A ................................................................................................................................... 64
Appendix B ................................................................................................................................... 65
Appendix C ................................................................................................................................... 66
Appendix D ................................................................................................................................... 68
ix
LIST OF FIGURES
Figure 2.1Cell phones working on the GSM 900 bands ............................................................... 21
Figure 2.2 TDMA to CDMA ........................................................................................................ 23
Figure 2.3 Avalanche breakdown mechanism .............................................................................. 25
Figure 2.4 Avalanche breakdown ................................................................................................. 26
Figure 2.5 Avalanche Noise generator example ........................................................................... 27
Figure 2.6Voltage Control Oscillator ........................................................................................... 27
Figure 2.7 Graph of Constant voltage applied to Oscillator ......................................................... 28
Figure 2.8 555timer in Monostable mode ..................................................................................... 29
Figure 2.9 555timer in A-Stable mode ......................................................................................... 30
Figure 2.10 Functional block diagram of a NE555B .................................................................... 31
Figure 2.11 Circuit for Astable mode ........................................................................................... 32
Figure 2.12 Application Information ............................................................................................ 32
Figure 2.13 LM741 Schematic Diagram ...................................................................................... 33
Figure 3.1 GSM used bands .......................................................................................................... 38
Figure 3.2Jammer main blocks ..................................................................................................... 43
Figure 3.3power supply blocks ..................................................................................................... 43
Figure 3.4PC power supply Input Voltages .................................................................................. 44
Figure 3.5A-stable 555timer ......................................................................................................... 45
Figure 3.6 Implementation of the NE555B................................................................................... 46
Figure 3.7 Implementatin of the Noise generator ......................................................................... 46
Figure 3.9 Implementation of the LM741..................................................................................... 48
Figure 3.8 OP-Amp Summer circuit ............................................................................................. 47
Figure 3.10Positive clamper ......................................................................................................... 48
Figure 3.11 Implementation of the clamper .................................................................................. 49
Figure 4.1PCB triangle wave generator ........................................................................................ 54
Figure 4.2 saw tooth generated signal (sweep signal) .................................................................. 55
Figure 4.3The noise generator and its output on an oscillator ...................................................... 56
Figure 4.4 Output after the mixer of the signals ........................................................................... 57
Figure 4.5 Output after the Clamper ............................................................................................. 57
Figure 4.6 The schematic of the IF-Section .................................................................................. 58
x
Figure 4.7 PCB IF-Section Fabrication ........................................................................................ 58
Figure 4.8FootPrint ....................................................................................................................... 59
Figure 4.9 photo view of PCB Top layer ...................................................................................... 59
Figure 4.10photo view of PCB bottom layer ................................................................................ 60
Figure 4.11RF-Section schematic ................................................................................................. 60
Figure 0.1 Appendix B: Specifications of PF08109B .................................................................. 65
Figure 0.2 Appendix B: Pins location forPF08109B .................................................................... 65
Figure 0.1 Appendix C: Performance specifications of CVCO55BE........................................... 66
Figure 0.2 Appendix C: Pin locations ........................................................................................... 67
Figure 0.1 Appendix D: performance specifications of CVCO55CL........................................... 68
Figure 0.2 Appendix D: Pins locations ......................................................................................... 69
xi
LIST OF ABBREVIATIONS
xii
𝑡𝐻 High level duration
xiii
CHAPTER ONE: INTRODUCTION
Overview
Problem Statement
Thesis layout
1.1 Overview
Mobile Jammers were originally developed for law enforcement and the military to
interrupt communications by criminals and terrorists to foil the use of certain remotely detonated
explosives. The civilian applications were apparent with growing public resentment over usage
of mobile phones in public areas on the rise & reckless invasion of privacy.
Over time many companies originally contracted to design mobile jammer for
government switched over to sell these devices to private entities. As with other radio jamming,
mobile jammer blocks mobile phone use by sending out radio waves along the same frequencies
that mobile phones use. This causes enough interference with the communication between
mobile phones and communicating towers to render the phones unusable. Upon activating
14
CHAPTER ONE: INTRODUCTION
mobile jammer, all mobile phones will indicate "NO NETWORK”. Incoming calls are blocked
as if the mobile phones were off. When the Mobile jammers are turned off, all mobile phones
will automatically re-establish communications and provide full service.
Mobile jammers' effect can vary widely based on factors such as proximity to towers,
indoor and outdoor settings, presence of buildings and landscape, even temperature and humidity
play a role. The choice of mobile jammers is based on the required range starting with the
personal pocket mobile jammer that can be carried along with you to ensure undisrupted meeting
with your client or a personal portable mobile jammer for your room or medium power mobile
jammer or high power mobile jammer for your organization to very high power military jammers
to jam large campuses.
A cell phone jammer is an instrument used to prevent cellular phones from receiving
signals from base stations. When used, the jammer effectively disables cellular phones. These
devices can be used in practically any location, but are found primarily in places where a phone
call would be particularly disruptive because silence is expected.
Various Signal jamming devices may be used by different people or groups to block
various frequencies, and hospitals are not an exception. Pacemakers can really interfere with
jammers, but both jammers and pace-maker manufacturers are constantly make sure that such
situation would be avoided any way.
The only jammer that blocks this spectrum is model of UHF/VHF jammers, and they
block 140-180MHz and 450-480MHz frequencies, thus its jamming signal is near but not in the
interfered frequency range.
15
CHAPTER ONE: INTRODUCTION
Military strategists are constantly seeking ways to increase the effectiveness of their force
while reducing the risk of casualties. In any adversarial environment, an important goal is always
to neutralize the communication system of the enemy. In this work, we are interested in jamming
a wireless communication network. Specifically, we introduce and study the problem of
determining the optimal number and placement for a set of jamming devices in order to
neutralize communication on the network. This is known as the WIRELESS NETWORK
JAMMING PROBLEM (WNJP). Despite the enormous amount of research on optimization in
telecommunications, this important problem for military analysts has received little attention by
the research community.
The idea was brought to our knowledge when last year during the high school diploma
students were caught using cell phones with Bluetooth headset to cheat through the exam.
16
CHAPTER ONE: INTRODUCTION
During World War II, ground radio operators would attempt to mislead pilots by false
instructions in their own language, in what was more precisely a spoofing attack than jamming.
Radar jamming is also important to disrupt use of radar used to guide an enemy's missiles or
aircraft. Modern secure communication techniques use such methods as spread spectrum
modulation to resist the deleterious effects of jamming.
Jamming has also occasionally been used by the governments of Germany (during
WW2), Israel, Cuba, Iraq, Iran (Iraq and Iran war, 1980–1988), China, North and South Korea
and several Latin American countries, as well as by Ireland against pirate radio stations such as
Radio Nova. The United Kingdom government used two coordinated, separately located
transmitters to jam the offshore radio ship, Radio North Sea International off the coast of Britain
in 1970, and without forgetting, the Nazis attempt to jam broadcasts to the continent from the
BBC and other allied stations.
Legality Owning, manufacturing, marketing, offering for sale or operating a cell phone
jammer is punishable by an $11,000 fine and up to a year in prison for each offense, which
opposes a great deal to develop such a device as defensive weapon.
The main objective of this project is to design a cell phone jammer circuit with hardware
part with high flexibility and minimum cost for University of Khartoum, Educational ground
station and making it available for use or modification by students, graduates and researchers.
17
CHAPTER ONE: INTRODUCTION
Chapter two (Literature Review about Cell phone Jammer Circuit): This chapter
will introduce an overview of the GSM/CDMA methodology, a brief understanding on
how cell phone operates , an general idea about jammer circuits and the most famous
jamming techniques .
Chapter three (Design and Implementation of the Cell phone Jammer Circuit): This
chapter includes all assumptions and considerations for the project. It represents the
scope of the project, requirements and presenting all the details of the design and
implementations.
Chapter four (Results and Discussions): This Chapter presents all results obtained from
testing the stages of the project and overall project work, and discusses each one.
Chapter five (Conclusions): By the end of this chapter project is reviewed, objectives
achieved is mentioned, objectives not achieved is discussed and finally future work of the
project.
Appendix A: Components and Quantity
Appendix B:PF08109B
Appendix C: CVCO55BE
Appendix D: CVCO55CL
18
CHAPTER TWO: LITERATURE REVIEW
Overview
Jamming Techniques
Avalanche Breakdown
555Timer
LM741
LM386
2.1 Overview
19
CHAPTER TWO: LITERATURE REVIEW
The key technologies used in cellular mobile radio include cellular frequency reuse1,
analogue cellular (First Generation) include Advanced Mobile Phone Service (AMPS) was the
original analogue cellular system in the United States.
The frequency bands for the AMPS system are 824 MHz to 849 MHz (uplink) and 869
MHz to 894 MHz (downlink). After that, in First Generation the Total Access Communication
System (TACS) was deployed with difference than AMPS in radio channel frequency
bandwidth. Then, the Second Generation was implemented includes Global System for Mobile
Communication (GSM) that will explain in details later in this chapter, also in the same
generation the North American TDMA (IS136 TDMA) and Code Division Multiple Access
(CDMA) was deployed. The development in Second Generation was appearing in Packet based
digital radio (2.5 generation) include General Packet Radio Service (GPRS) and Enhanced Data
Rates for Global Evolution (EDGE). Finally, the CDMA2000 and Wideband Code Division
Multiple Access (WCDMA) includes in Third Generation.
In Sudan, there are two types of (GSM), the GSM 900 and GSM 1800. This system also
called digital cellular network system (DCS), so that this project is focusing only on GSM and
DCS systems to design our intelligent jamming system.
Duplex spacing of 45 MHz is in use. In some countries the GSM-900 band has been extended to
cover a larger frequency range which gave birth to the ‘extended GSM'.
E-GSM, uses frequency range 880 - 915 MHz for the uplink and 925 - 960 MHz for the
downlink, adding 50 channels extra (channel numbers 975 to 1023 and 0) to the original GSM-
900 band..[1]
20
CHAPTER TWO: LITERATURE REVIEW
2.3.1 TDMA
Is a channel access method for shared medium used usually in RF networks, it allows multiple
users to use the same channel by dividing the signal into different time slots.
21
CHAPTER TWO: LITERATURE REVIEW
2.3.2 CDMA
Takes an entirely different approach from TDMA. CDMA, it digitalizes data then spread it over
the whole available Bandwidth. Multiple calls are laid over each other on the channel, but each
assigned a unique code, in other words CDMA is a form of spread spectrum.
Simply this means that data is sent in small pieces over a number of the discrete frequencies that
are available within the bandwidth.
Verizon, Sprint and most other U.S. carriers use CDMA, which require no simcard.
22
CHAPTER TWO: LITERATURE REVIEW
All of the users send in the same wide-band chunk of spectrum. Each user's signal is spread
through the entire bandwidth signed with a unique spreading code.
The jamming device broadcasts an RF signal in the frequency range reserved for cell
phones that interferes with the cell phone signal, which results in a "no network available"
display on the cell phone screen.
23
CHAPTER TWO: LITERATURE REVIEW
2.5.3 Techniques
2.5.3.1 Spoofing
In this kind of jamming, the device forces the mobile to turn off itself. This type is very
difficult to be implemented since the jamming device first detects any mobile phone in a specific
area, then the device sends the signal to disable the mobile phone. Some types of this technique
can detect if a nearby mobile phone is there and sends a message to tell the user to switch the
phone to the silent mode (Intelligent Beacon Disablers).
A diode that operates in the reverse bias mode, in zener diodes a zener diode has a highly doped
n and p region which leads to a narrow depletion region and a high electric field across the
depletion region .
What happens inside the depletion region is that the high reverse bias voltage increases the
velocity of minority carriers across the junction.
25
CHAPTER TWO: LITERATURE REVIEW
Avalanche breakdown occurs in semiconductors where a very high potential gradient exists.
When this occurs electrons rapidly gain momentum and may hit the crystal lattice through which
they travel with such energy that they can dislodge other charge carriers creating hole electron
pairs. In turn these carriers are accelerated and may similarly hit the lattice and dislodge further
carriers.[3]
Avalanche diodes generate large quantities of radio frequency noise. As a result they are widely
used noise sources for RF measurements, e.g. for RF for antenna analyser bridges and also in
other items such as random number generators.
26
CHAPTER TWO: LITERATURE REVIEW
In these applications either avalanche diodes or even voltage regulator (Zener) diodes may be
used. When Zener diodes are used, the diodes must have breakdown voltages above about 5.5
volts because diodes with voltages above this value chiefly use avalanche breakdown, below this
value Zener breakdown is the chief mode.[4]
The relationship between the input voltage and the oscillator frequency is rather very simple
27
CHAPTER TWO: LITERATURE REVIEW
𝑑∅(𝑡)
= 𝜔 = 𝑓(𝑉𝑐)
𝑑𝑡
Therefore if the applied voltage to the oscillator is a constant Voltage with respect to time the
output would be a constant Frequency.
Ideally, the relationship between the input voltage and the output frequency can be written as a
first-order polynomial equation:
𝜔 = 𝑓(𝑉𝑐) = 𝐾𝑣𝑉𝑐 + 𝜔°
Where 𝐾𝑣 is a constant.
The graph has a slope = Kv and it’s a linear relation between the Voltage applied and the output
of the frequency.
28
CHAPTER TWO: LITERATURE REVIEW
2.8 555Timer
These devices are precision timing circuits capable of producing accurate time delays or
oscillation.
A. Monostable mode:
The time interval is controlled by a single external resistor and capacitor network
produces one pulse of a set length in response to a trigger input such as a push button. The output
of the circuit stays in the low state until there is a trigger input, hence the name Monostable.[5]
B. A-Stable mode:
A free running mode, No stable state hence the name Astable. The output continually
switches state between high and low without any intervention from the user.
29
CHAPTER TWO: LITERATURE REVIEW
2.8.1 NE555B
2.8.1.1 Features:
Timing from microseconds to hours
Adjustable duty cycle
A-Stable and Monostable mode
The threshold and trigger levels normally are two-thirds and one-third, respectively, of VCC.[6]
The output circuit is capable of sinking or sourcing current up to 200mA. Operations is specified
fir supplies of 5V to 15V.
30
CHAPTER TWO: LITERATURE REVIEW
31
CHAPTER TWO: LITERATURE REVIEW
32
CHAPTER TWO: LITERATURE REVIEW
2.9 LM741
Single Operational Amplifier.
The LM741 is a general purpose operational amplifier, it is intended for a wide range of analog
applications. The high gain and wide range of operating voltage provide superior performance in
integrator, summing amplifier and general feedback applications.[7]
2.10 LM386
Low Voltage Audio Power Amplifier, The LM386 is a power amplifier designed for use in low
voltage consumer applications. The gain is internally set to 20 to keep external part count low,
but the addition of an external resistor and capacitor between pins 1 and 8 will increase the gain
to any value from 20 to 200.The inputs are ground referenced while the output automatically
biases to one-half the supply voltage. The quiescent power drain is only 24 milliwatts when
operating from a 6 volt supply, making the LM386 ideal for battery operation. [8]
33
CHAPTER TWO: LITERATURE REVIEW
Features
Minimum external parts
Wide supply voltage range: 4V–12V or 5V–18V
Low quiescent current drain: 4mA
Voltage gains from 20 to 200
Ground referenced input
Self-centering output quiescent voltage
Low distortion: 0.2% (AV= 20, VS=6V,RL=8ΩPO=125mW, f = 1kHz)
Available in 8 pin MSOP package
GAIN CONTROL
To make the LM386 a more versatile amplifier, two pins (1and 8) are provided for gain control.
With pins 1 and 8 open the 1.35 kΩ resistor sets the gain at 20 (26 dB). If a capacitor is put from
pin 1 to 8, bypassing the 1.35 kΩ resistor, the gain will go up to 200 (46 dB). If a resistor is
placed in series with the capacitor, the gain can be set to any value from 20 to 200. Gain control
can also be done by capacitive coupling a resistor (or FET) from pin 1 to ground. Additional
external components can be placed in parallel with the internal feedback resistors to tailor the
gain and frequency response for individual applications. For example, we can compensate poor
speaker bass response by frequency shaping the feedback path. This is done with a series RC
from pin 1 to 5 (paralleling the internal 15 kΩ resistor).
For 6 dB effective bass boost: R15 kΩ, the lowest value for good stable operation is R = 10kΩ if
pin 8 is open. If pins 1 and 8 are bypassed then R as low as 2 kΩ can be used.
This restriction is because the amplifier is only compensated for closed-loop gains greater than 9.
34
CHAPTER TWO: LITERATURE REVIEW
The length of the monopole PCB trace mainly determines the resonant frequency of the antenna,
but because of the very wide gain bandwidth of a quarter wave monopole, the antenna length is
not too critical. But like any other antenna types, the gain of a quarter wave monopole will vary
if parameters in the surroundings
, such as case/box materials, distance to the ground plane, size of the ground plane, width and
thickness of the PCB trace are varied. If any of these parameters are changed, a retuning of the
monopole PCB trace length may be necessary for optimum performance in each application.
Some of the main features required for antennas for the application of UWB technology
are as follows.
35
CHAPTER TWO: LITERATURE REVIEW
Microstrip is a type of electrical transmission line used to transmit RF signals and is commonly
fabricated using printed circuit board (PCB) technology. Compared to waveguides, microstrip is
generally has a lower power handling capacity, and higher losses due to the fact that it is not
enclosed.
36
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
Introduction
Design parameters
System design
37
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
3.1 Introduction
Based on the above our device is related to the DOS technique in which we will generate
a noise and sum it to a signal and then amplify it through the RF section of the circuit to
be transmitted and traverse over the required frequency.
𝑃𝑂𝑈𝑇 ∝ 𝑅𝐽
And since DCS 1800 consume more power almost double the GSM 900
38
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
The device will jam the downlink since it’s the establisher for the signal and thus it needs lower
power.
And jamming the uplink will cause to jam the whole station and that’s not our aim in this project
and design
39
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
Usability is denied when the error rate of the transmission cannot be compensated by error
correction.
J/S Ratio sets a measure to how powerful the jamming signal is, compared to the original signal.
Where:
𝑃𝑗 : Power of jammer
𝑃𝑡 : Power of transmitter
𝐵𝑟 : Bandwidth of receiver
𝐵𝑗 : Bandwidth of jammer
40
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
𝐶 𝑉𝑐
𝐶𝑁𝑅 = = ( )2
𝑁 𝑉𝑛
And it will be used as the worst case scenario for error detection.
41
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
As the signal traverse through the environment it collides and come in contact with a lot of
objects which will weaken the signal.
Worst case (F) happens when the Maximum Frequency is used in the above equation.
By the above considerations we can obtain the output power from the device as follows:
Setting SNR to 9 dB
The maximum output power signal for the mobile receiver = -15dBm
It yields J=-24dBm
In order to find the output power from the device we add the free space loss to come to an
understanding of how much power do we need to actually cover the distance needed:
42
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
We needed to find a suitable power supply to comply with what might be needed and will be
needed
In this project we want to use +9,-9 ,+5 and 3.3 v just to soon find out that we would need an
additional regulator therefore we constructed the circuit to work at +12v , -12v , +5v , and 3.3v
and such voltages are provided via the PC power supply
43
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
Here we will generate a signal via the tuning section to sweep the VCO through the desired
range of frequencies , in other words a simple saw tooth-wave generator , an offset to the
generated wave so that offset take the signal from minimum frequency to maximum .
44
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
In our design we used NE555b operating in a-stable mode to generate the sweeping signal (
triangle wave ) .[5]
The output frequency depends on the charging and discharging timing, resistor values and power
supply for the NE555b, the figure bellow shows the 555timer in a-stable mode and the resistors
and capacitor we refer to
45
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
Thus we need to mix the output of the Triangle wave generator to the output of the circuit we
about to discuss and implement .
To generate the noise we made a use out of the phenomena Avalanche Break down, thus we shall
design a circuit where a zener diode is operating in its reverse mode which will cause a wide
band noise where a large number of free minority carriers suddenly increase in the reverse
current flow.
46
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
Signal where:
47
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
3.3.2.2.4 Clamper
After we have studied the VCO’s required to achieve such a circuit we landed on two VCO’s
that are the most popular and they have 50 OHM load impedance.
We need to bound the input to those VCO’s to vary from 0 to 3.3 V to achieve the needed
frequency range thus a clamber that consists of a capacitor in series with a resistor and a diode
that are in parallel would follow the mixer
48
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
49
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
Voltage control oscillators are devices that their output frequency is proportional to the input
voltage thus it can be controlled via the voltage applied.
Therefore if a DC voltage is applied on a VCO it’s only rational we get a constant fixed
frequency and since the input of the VCO is a triangular waveform then the output of the VCO
will span over a specific range.
Since this is a cell phone dual band jammers its only rational the VCO’s to be needed are the
ones that work on GSM 900 and GSM 1800 ,but that’s not enough one of the most important
aspects in choosing a VCO is it should run on a low power consumption .
Finally after a lot of search over the internet we found those VCO’s manufactured by Crystek
Microwave
CVCO55BE: An 1800 GSM, output frequency is 1785 – 1900 MHz and output power is almost
5dBm
50
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
CVCO55CL: a 900 GSM, output frequency is 925 – 970 MHz and output power is almost at
8dBm
We found that the PF08109B is the most suitable amplifier due the fact it is
3.3.2.3.3 Antenna
A proper antenna is a very tricky part due the fact we only had simulation to run with at this
section of the design.
An antenna is necessary to traverse the jamming signal and the antenna system and design must
match the transmission part in impedance.
We decided to go with a monopole antenna since it’s the simplest form it consists of a straight
rod –shaped conductor mounted over a conductive surface.
The length of the antenna is determined by the wave length of the radio waves it is used with the
most common form and it’s the form we will go with the ‘quarter-wave monopole’ with 50 ohm
input impedance so that the antennas are matched to the system.
We assumed for the batch to be fabricated on dielectric substrate, a very thick air dielectric
substrate (𝜀𝑟 = 1).
51
CHAPTER THREE: METHODOLOGY AND IMPLEMENTATION
7.2
𝐹𝐿 = 𝐺𝐻𝑧
((𝐿 + 𝑟 + 𝑝) × 𝑘)
𝑆
𝐿 = 𝑆, 𝑟=
2𝜋
52
CHAPTER FOUR: RESULTS AND DISCUSSION
Summary
IF-Section
RF-Section
4.1 Summary
After constructing the IF section of the project and got it working in the low frequency
(intermediate frequency) and obtained an output signal bounded to theoretically work efficiently
at the VCO inputs we believe it’s a success after all.
We tried to gather the VCO’s and the power amplifier required since Sudan couldn’t provide any
to fail as well to obtain them from aboard so we built up the theory on an old cell phone we
bought 3310 Nokia and after it got shipped and delivered to us we faced the problem that the
power amplifier isn’t the one we require nor the VCO’s as it was a different version of the
phone, we didn’t stop looking but we honestly failed to obtain such chips.
We tried to have them delivered from US but Sudan falls under restricted areas when it comes to
manufacturing IC’s therefore we tried to ship them somewhere just to face the problem we need
a clearance from the Telecommunication provider in the country .
We ended with theoretically developing the RF section of this device meeting all requirements
and doing all calculations needed to work not just in an ideal theoretical world but in the real-
time applications and the real world.
53
CHAPTER FOUR: RESULTS AND DISCUSSION
4.2 IF-Section
From the calculation above you can state that we used Ra = Rb = 750 ohm and C=0.1uF
and our output frequency was 10 kHz which was very suitable for the IF section
The NE555b requires a voltage as high as 12v therefore our Vcc for the circuit was
supplied with 12v bounding our output signal to
𝑉𝑐𝑐
𝐿𝑖𝑚𝑖𝑡+ = = 4𝑣
3
2𝑉𝑐𝑐
𝐿𝑖𝑚𝑖𝑡− = = 8𝑣
3
The figure in the next page shows the all the components used in the above
The figure in the next page shows the generated signal in an Oscilloscope:
54
CHAPTER FOUR: RESULTS AND DISCUSSION
Due the fact the Avalanche breakdown generates a noise in the mV’s value which was extremely
very low from what we can mix with the generated sweeping signal.
The first stage we used 2N3904 with gain of 100 at collector current of 10mA.
For the second stage we used the LM386 with gain from 20 to 200 we used this IC for its low
distortion, high gain and the fact it’s an audio amplifier IC.
55
CHAPTER FOUR: RESULTS AND DISCUSSION
4.2.3 Mixer
We needed to accomplish a ratio of the noise to the sweep of 2:1 via the mixer of the two input
signals V1 and V2,
R2= 1K
Rf = 2K
56
CHAPTER FOUR: RESULTS AND DISCUSSION
4.2.4 Clamper
Node analysis has been applied to the positive clamber circuit to obtain values for the capacitor
and resistor in order to achieve the bounded limit to the input of the VCO’s 0 to 3.3v.
57
CHAPTER FOUR: RESULTS AND DISCUSSION
58
CHAPTER FOUR: RESULTS AND DISCUSSION
We tested the IF section of the circuit and we obtained the desired results as shown in this
chapter at the previous section.
Figure 4.8FootPrint
59
CHAPTER FOUR: RESULTS AND DISCUSSION
4.4 RF-Section
We couldn’t obtain the VCO’s and the power amplifier required to implement this section of the
device therefore we ran simulations and calculations and this is the outcome schematic with the
antenna calculation shown.
60
Chapter Five: Conclusion and Future Work
The Problem
The Approach
We considered all the options we had from metal detectors to actually come to the realization we
can simply jam a signal to enter in a certain area (10 meters is a standard classroom size).
Therefore we constructed an IF circuit that will generate a sweep signal in the waveform of a
saw tooth summing this generated signal to the noise generator signal resulting in sweep signal
with distortion in it enough to over ride other signals .
61
Chapter Five: Conclusion and Future Work
Studied the jamming techniques and the GSM system to find the best jamming methods.
We searched for the components and didn’t stop as we divided the components into two
section IF and RF therefore once we obtained the IF components we started constructing
the circuit in hope for the RF components to get delivered in time.
The schematic was drawn and simulation tests were applied.
Soon after we started designing the footprint and the PCB layout of the IF section
Then we applied all efforts into obtaining the RF parts which we have failed to do.
We started running calculations on the RF section to find all acceptable components,
wave lengths and type of antennas.
We hope this project was helpful and it serves the purpose of it under the ethical terms
applied by IEEE.
In a lot of ways we can simply build a thick wall that can and will prevent signals from entering
or the use of metal detectors at the gate.
62
REFERENCES
6 REFRENCES
[1] “Standardizations for GSM.” [Online]. Available:
http://webapp.etsi.org/exchangefolder/tr_101075v040104p.pdf.
[2] J. T. & J. L. Marshall Brain, “How Cell Phones Work.” [Online]. Available:
http://electronics.howstuffworks.com/cell-phone8.htm.
Donald A. Neamen, john W. (n.d.). Electronic Circuit Analysis and Design (Second edi).
63
APPENDIX: PARTS AND QUANTITY
Appendix A
Part and Quantity
Part QTY
PE08109B 2 unit(s)
CVCO55BE 1 unit(s)
CVCO55CL 1 unit(s)
NE555P 1 unit(s)
750ohm 2 unit(s)
0.1uF 5 unit(s)
2Kohm 3 unit(s)
1Kohm 2 unit(s)
10uF 1 unit(s)
LM386 1 unit(s)
10 uF 1 unit(s)
10 ohm 1 unit(s)
2N3904 1 unit(s)
22Kohm 1 unit(s)
1uF 1 unit(s)
0.1uF 1 unit(s)
100Kohm 1 unit(s)
LM741CN 1 unit(s)
1N4148 2 unit(s)
6.8v zener diode 1 unit(s)
1nF 1 unit(s)
Figure Appendix A: Parts and Quantity
64
APPENDIX: PF08109B
Appendix B
PF08109B
65
APPENDIX: CVCO55BE
Appendix C
CVCO55BE
66
APPENDIX: CVCO55BE
67
APPENDIX: CVCO55CL
Appendix D
CVCO55CL
68
APPENDIX: CVCO55CL
69