SlideShare una empresa de Scribd logo
1 de 22
Visvesvaraya Technological University
Jnana Sangama, Belgaum
Seminar On
SNIFFERS
Under the guidance of By,
Department of Information Science and Engineering
Rajiv Gandhi Institute of Technology
Cholanagar, R T Nagar Post, Bangalore-32
SNIFFER FOR
DETECTING LOST
MOBILE PHONES
Presented by,
CONTENTS
• Introduction
• What sniffer is ?
• IMEI
• Designing for the sniffer
 Sniffer base station
 Unidirectional Antenna
 Software Tracking
• Working of sniffer device
• Advantages
• Conclusion
• References
DEPT OF ISE RGIT,B'LORE 3
INTRODUCTION
• The main scope is to detect the lost mobiles.
• Each and every day thousands of mobiles get
misplaced or lost, though effective way for the
blocking of the lost mobile.
• To prevent unauthorized person from making and
receiving the calls has been done by the
manufacturers of the mobile with the help of IMEI
number.
DEPT OF ISE RGIT,B'LORE 4
CONT’D….
• For the detection of lost mobile SNIFFER plays a vital role .
• The sniffer device has to be designed precisely and size should
be reduced for easy mobility for the purpose of detection .
DEPT OF ISE RGIT,B'LORE 5
What a SNIFFER is?
• The sniffer is basically a transceiver that works in the frequency
which is in the special unused range that is operated by the
service provided or it can designed to operate at a frequency
that is of much different frequency than the one that is being
used.
DEPT OF ISE RGIT,B'LORE 6
INTRODUCTION TO IMEI
• Each mobile device has a globally unique IMEI
(International Mobile Equipment Identity)
• IMEI (International Mobile Equipment Identity)
numbering system is a 15 digit unique code that is
used to identify the GSM phone
• To know the IMEI number the *#06# has to be
pressed, the number will be displayed in the LCD
screen
DEPT OF ISE RGIT,B'LORE 7
CONT’D….
• When a phone is switched on, this unique IMEI number is
transmitted and checked against a data base of black
listed or grey listed phones in the network’s EIR
• Grey listing will allow the phone to be used, but it can be
tracked to see who has it (via the SIM information).
• Black listing the phone from being used on any network
where there is an EIR match.
DEPT OF ISE RGIT,B'LORE 8
DESIGNING FOR THE SNIFFER
• The sniffer device can be called as a mobile base station that
includes the following important components:
 Sniffer base station
 Unidirectional antenna
 Tracking software
DEPT OF ISE RGIT,B'LORE 9
SNIFFER BASE STATION
• The sniffer is a small base station, it includes transceiver section.
• It should operate at a frequency that is much different from the
frequency of the current cell in which the operation of detection
is being carried out.
DEPT OF ISE RGIT,B'LORE 10
UNIDIRECTIONAL ANTENNA
• The directional antenna acts as the eyes for the sniffer for the
purpose of the detecting the lost mobile phones.
• Antenna is a device which works at specified frequencies range
for transmitting or receiving the data signal.
• In general, antennas transmit power depending on lobe pattern
which varies from one antenna to the other.
DEPT OF ISE RGIT,B'LORE 11
DEPT OF ISE RGIT,B'LORE 12
RADIATION
PATTERN
SOFTWARE FOR THE TRACKING
• The software is used for the tracking of the lost mobile phone
• The programming is done with C or Java. However the C is most
preferred as it is easily embedded with the chips.
DEPT OF ISE RGIT,B'LORE 13
WORKING OF SNIFFERS
• The working of sniffers is of two phases
Before Sniffer increases the frequency
After Sniffer increases the frequency
DEPT OF ISE RGIT,B'LORE 14
BEFORE SNIFFER INCREASES THE
FREQUENCY
DEPT OF ISE RGIT,B'LORE 15
AFTER SNIFFER INCREASES THE
FREQUENCY
DEPT OF ISE RGIT,B'LORE 16
EXPLANATION
• From the above figure we have clearly observed the racing of
the lost mobile.
• We have identified the lost mobile using IMEI.
But,
• The location where it is present can be known by seeing at the
output of the software.
DEPT OF ISE RGIT,B'LORE 17
ADVANTAGES
• This method is used for finding the lost mobiles effectively
• Cost effective
• low power consumption
• Easy to design
DEPT OF ISE RGIT,B'LORE 18
CONCLUSION
• There are certain boundary conditions that have to be qualified
for the identification of lost mobile like the power of the mobile
should be good enough, the mobile phone should not be in the
shadow region but however this method using modern
technologies and devices.
DEPT OF ISE RGIT,B'LORE 19
REFERENCES
• Schiller, “Mobile Communication”, Pearson Education
1 Edition, 7th reprint -2003.
• John D Kraus, “Electromagnetic”, TMH
• Jordan et al, “Electromagnetic waves and radiation
system” , Printice Hall
• www.gsmworld.com
• http://ericsson.com
DEPT OF ISE RGIT,B'LORE 20
DEPT OF ISE RGIT,B'LORE 21
DEPT OF ISE RGIT,B'LORE 22

Más contenido relacionado

La actualidad más candente (20)

seminar on invisible eye
seminar on invisible eyeseminar on invisible eye
seminar on invisible eye
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
 
Brain fingerprinting technology seminar presentation
Brain fingerprinting technology seminar presentationBrain fingerprinting technology seminar presentation
Brain fingerprinting technology seminar presentation
 
Sniffer ppt
Sniffer pptSniffer ppt
Sniffer ppt
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Brain chips
Brain chipsBrain chips
Brain chips
 
Speed Detection Of Moving Vehicles (Using Traffic Enforcement Camera)
Speed Detection Of Moving Vehicles (Using Traffic Enforcement Camera) Speed Detection Of Moving Vehicles (Using Traffic Enforcement Camera)
Speed Detection Of Moving Vehicles (Using Traffic Enforcement Camera)
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
smart quill pen
smart quill pensmart quill pen
smart quill pen
 
Abstract Silent Sound Technology
Abstract   Silent Sound TechnologyAbstract   Silent Sound Technology
Abstract Silent Sound Technology
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
 
Accident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMSAccident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMS
 
women safety
women safetywomen safety
women safety
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Vehicle Theft control system
Vehicle Theft control systemVehicle Theft control system
Vehicle Theft control system
 

Destacado

Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein TechnologyPapun Papun
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer vilss
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology pptdeepakmarndi
 
Sniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesSniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesRuqeya Afshan
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSumaiya Arjumand
 
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone UsageWhen Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone UsageMartin Pielot
 
SOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsSOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsAkhil Kumar
 

Destacado (18)

Sniffer
SnifferSniffer
Sniffer
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Smart note-taker
Smart note-takerSmart note-taker
Smart note-taker
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 
Sniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesSniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobiles
 
Seminar on sniffers
Seminar on sniffersSeminar on sniffers
Seminar on sniffers
 
venkat (1)
venkat (1)venkat (1)
venkat (1)
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost Mobiles
 
Sos ppt
Sos pptSos ppt
Sos ppt
 
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone UsageWhen Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
 
Blue brain
Blue brainBlue brain
Blue brain
 
DRM Powerpoint
DRM PowerpointDRM Powerpoint
DRM Powerpoint
 
SOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsSOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victims
 
Wireless usb
Wireless usbWireless usb
Wireless usb
 

Similar a Sniffer for detecting lost mobiles

sniffer technology.pptx
sniffer technology.pptxsniffer technology.pptx
sniffer technology.pptxDivyaDewkathe
 
Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Anjali Verma
 
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Edwin Manuel
 
GSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensorsGSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensorsRahul Sidhu
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
SPY Mobile Software
SPY Mobile SoftwareSPY Mobile Software
SPY Mobile SoftwarePooja Seo
 
project presentation on cell phone operated land rover
project presentation on cell phone operated land roverproject presentation on cell phone operated land rover
project presentation on cell phone operated land roversunanda kothari
 
SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt aryayidegev626
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01puja kumari
 
Caller ID Android Application
 Caller ID Android Application Caller ID Android Application
Caller ID Android ApplicationSmitakshi Sen
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile devices hardware characteristics
Mobile devices hardware characteristicsMobile devices hardware characteristics
Mobile devices hardware characteristicsHectorMolarGamboa
 
IOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDIOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDMaheshMoses
 
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...Yole Developpement
 

Similar a Sniffer for detecting lost mobiles (20)

sniffer technology.pptx
sniffer technology.pptxsniffer technology.pptx
sniffer technology.pptx
 
Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02
 
Sniffer
SnifferSniffer
Sniffer
 
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
 
GSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensorsGSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensors
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
SPY Mobile Software
SPY Mobile SoftwareSPY Mobile Software
SPY Mobile Software
 
project presentation on cell phone operated land rover
project presentation on cell phone operated land roverproject presentation on cell phone operated land rover
project presentation on cell phone operated land rover
 
SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt arya
 
car accident.pptx
car accident.pptxcar accident.pptx
car accident.pptx
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01
 
Caller ID Android Application
 Caller ID Android Application Caller ID Android Application
Caller ID Android Application
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile devices hardware characteristics
Mobile devices hardware characteristicsMobile devices hardware characteristics
Mobile devices hardware characteristics
 
IOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDIOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFID
 
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Sniffer for detecting lost mobiles

  • 1. Visvesvaraya Technological University Jnana Sangama, Belgaum Seminar On SNIFFERS Under the guidance of By, Department of Information Science and Engineering Rajiv Gandhi Institute of Technology Cholanagar, R T Nagar Post, Bangalore-32
  • 2. SNIFFER FOR DETECTING LOST MOBILE PHONES Presented by,
  • 3. CONTENTS • Introduction • What sniffer is ? • IMEI • Designing for the sniffer  Sniffer base station  Unidirectional Antenna  Software Tracking • Working of sniffer device • Advantages • Conclusion • References DEPT OF ISE RGIT,B'LORE 3
  • 4. INTRODUCTION • The main scope is to detect the lost mobiles. • Each and every day thousands of mobiles get misplaced or lost, though effective way for the blocking of the lost mobile. • To prevent unauthorized person from making and receiving the calls has been done by the manufacturers of the mobile with the help of IMEI number. DEPT OF ISE RGIT,B'LORE 4
  • 5. CONT’D…. • For the detection of lost mobile SNIFFER plays a vital role . • The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection . DEPT OF ISE RGIT,B'LORE 5
  • 6. What a SNIFFER is? • The sniffer is basically a transceiver that works in the frequency which is in the special unused range that is operated by the service provided or it can designed to operate at a frequency that is of much different frequency than the one that is being used. DEPT OF ISE RGIT,B'LORE 6
  • 7. INTRODUCTION TO IMEI • Each mobile device has a globally unique IMEI (International Mobile Equipment Identity) • IMEI (International Mobile Equipment Identity) numbering system is a 15 digit unique code that is used to identify the GSM phone • To know the IMEI number the *#06# has to be pressed, the number will be displayed in the LCD screen DEPT OF ISE RGIT,B'LORE 7
  • 8. CONT’D…. • When a phone is switched on, this unique IMEI number is transmitted and checked against a data base of black listed or grey listed phones in the network’s EIR • Grey listing will allow the phone to be used, but it can be tracked to see who has it (via the SIM information). • Black listing the phone from being used on any network where there is an EIR match. DEPT OF ISE RGIT,B'LORE 8
  • 9. DESIGNING FOR THE SNIFFER • The sniffer device can be called as a mobile base station that includes the following important components:  Sniffer base station  Unidirectional antenna  Tracking software DEPT OF ISE RGIT,B'LORE 9
  • 10. SNIFFER BASE STATION • The sniffer is a small base station, it includes transceiver section. • It should operate at a frequency that is much different from the frequency of the current cell in which the operation of detection is being carried out. DEPT OF ISE RGIT,B'LORE 10
  • 11. UNIDIRECTIONAL ANTENNA • The directional antenna acts as the eyes for the sniffer for the purpose of the detecting the lost mobile phones. • Antenna is a device which works at specified frequencies range for transmitting or receiving the data signal. • In general, antennas transmit power depending on lobe pattern which varies from one antenna to the other. DEPT OF ISE RGIT,B'LORE 11
  • 12. DEPT OF ISE RGIT,B'LORE 12 RADIATION PATTERN
  • 13. SOFTWARE FOR THE TRACKING • The software is used for the tracking of the lost mobile phone • The programming is done with C or Java. However the C is most preferred as it is easily embedded with the chips. DEPT OF ISE RGIT,B'LORE 13
  • 14. WORKING OF SNIFFERS • The working of sniffers is of two phases Before Sniffer increases the frequency After Sniffer increases the frequency DEPT OF ISE RGIT,B'LORE 14
  • 15. BEFORE SNIFFER INCREASES THE FREQUENCY DEPT OF ISE RGIT,B'LORE 15
  • 16. AFTER SNIFFER INCREASES THE FREQUENCY DEPT OF ISE RGIT,B'LORE 16
  • 17. EXPLANATION • From the above figure we have clearly observed the racing of the lost mobile. • We have identified the lost mobile using IMEI. But, • The location where it is present can be known by seeing at the output of the software. DEPT OF ISE RGIT,B'LORE 17
  • 18. ADVANTAGES • This method is used for finding the lost mobiles effectively • Cost effective • low power consumption • Easy to design DEPT OF ISE RGIT,B'LORE 18
  • 19. CONCLUSION • There are certain boundary conditions that have to be qualified for the identification of lost mobile like the power of the mobile should be good enough, the mobile phone should not be in the shadow region but however this method using modern technologies and devices. DEPT OF ISE RGIT,B'LORE 19
  • 20. REFERENCES • Schiller, “Mobile Communication”, Pearson Education 1 Edition, 7th reprint -2003. • John D Kraus, “Electromagnetic”, TMH • Jordan et al, “Electromagnetic waves and radiation system” , Printice Hall • www.gsmworld.com • http://ericsson.com DEPT OF ISE RGIT,B'LORE 20
  • 21. DEPT OF ISE RGIT,B'LORE 21
  • 22. DEPT OF ISE RGIT,B'LORE 22