SlideShare a Scribd company logo
1 of 2
Threat Detector
 Threat Detector

                       Then most effective jamming occurs when
                       the frequency of the jammer is at or around
                       the threat.
                       The DRF Threat Detector detects a frequency
                       through one of three filters covering the
                       bandwidth of each jammer plug-in. When a
                       threat arises the synthesizer is set to
                       transmit a jamming signal equal to the
                       bandwidth of the filter in which the threat is
                       received. If more than one threat is detected
                       or there is a threat outside the filter
                       bandwidths then the jammer will sweep
                       across the complete bandwidth of the
                       jammer.
In a quiet period the Threat Detector is in
listening mode. On receiving a threat the
frequency of the threat is detected and the
jammer transmits for 15 seconds around
the threat. After 15 seconds the Threat
Detector listens for 1 second and if the
threat still exists the jammer transmits for
another 15 seconds. This mode continues
until the threat has ceased.
If during the listening mode the frequency
of the threat changes the frequency of the
jammer will follow the threat. If two
threats occur or a threat occurs outside the
bands of the filters the Jammer will take
the safe option and transmit across its full
bandwidth. If there is no longer a threat the Detector remains in
listening mode and the jammer transmit amplifier is turned
off to conserve the battery.
Bandwidth of Jammers and typical filters available within each
band

Band   1    25Mhz — 125Mhz
Band   2    125Mhz — 250Mhz
Band   3    250Mhz — 500Mhz
Band   4    500Mhz — 1000Mhz
Band   5    1000Mhz—2000Mhz
Band   6    850-965MHz and 1800-1920MHz GSM Low and High
Band   7    2000MHz—3000MHz 3G / Wifi / Wimax
Band   8+   3000MHz—18000MHz in 1GHz or 2GHz bandwidth

Frequency MHz          Application
of typical filters -
in each band

29-50                  Radio controlled toys, cordless telephones, radio bells
66-88                  Walky Talky
88-125                 Radio controlled aeroplanes
135-170                VHF Walky Talky
430-470                UHF Walky Talky
850-965                CDMA
925-960                Low band Cellular GSM
1520-1560              GPS, Thuraya, Iridium
1805-1880              High band Cellular GSM/DCS
1930-1990              Cellular PCS
2110-2170              3G
2400-2500              WiFi, Wimax

Antennas    Monopole, sleeve dipole, patch
Dimension 140mm long x 94mm wide x 45mm high
Weight      Module 0.25Kg
Power       24VDC @ 0.3 amp per unit
Temperature -20ºC to 40ºC within few minutes of switch on

More Related Content

What's hot

1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protectionriskis
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protectionriskis
 
Jammers for Convoy protection
 Jammers for Convoy protection  Jammers for Convoy protection
Jammers for Convoy protection riskis
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerharrynik
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer workselprocus
 
New clarion mf1 marine rf remote control kit
New clarion mf1 marine rf remote control kitNew clarion mf1 marine rf remote control kit
New clarion mf1 marine rf remote control kitmathrixpolo
 
Lightning protection - Ukkossuojaus
Lightning protection - UkkossuojausLightning protection - Ukkossuojaus
Lightning protection - UkkossuojausAerial Oy
 

What's hot (8)

1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protection
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protection
 
Band number
Band numberBand number
Band number
 
Jammers for Convoy protection
 Jammers for Convoy protection  Jammers for Convoy protection
Jammers for Convoy protection
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
How mobile phone jammer works
How mobile phone jammer worksHow mobile phone jammer works
How mobile phone jammer works
 
New clarion mf1 marine rf remote control kit
New clarion mf1 marine rf remote control kitNew clarion mf1 marine rf remote control kit
New clarion mf1 marine rf remote control kit
 
Lightning protection - Ukkossuojaus
Lightning protection - UkkossuojausLightning protection - Ukkossuojaus
Lightning protection - Ukkossuojaus
 

Similar to Threat Detector

They Can Hear Your Heartbeats
They Can Hear Your HeartbeatsThey Can Hear Your Heartbeats
They Can Hear Your HeartbeatsJacob Blake
 
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMchpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMNanaAgyeman13
 
Enav222 prelim lecture
Enav222 prelim lectureEnav222 prelim lecture
Enav222 prelim lectureMoises Tenyosa
 
Jammer final report
Jammer final reportJammer final report
Jammer final reportalullah
 
Subsampling Multi-standard receiver design, Part-1
Subsampling Multi-standard receiver design, Part-1Subsampling Multi-standard receiver design, Part-1
Subsampling Multi-standard receiver design, Part-1Ahmed Sakr
 
ims-maritime-ocean-systems-resource-Helras.pdf
ims-maritime-ocean-systems-resource-Helras.pdfims-maritime-ocean-systems-resource-Helras.pdf
ims-maritime-ocean-systems-resource-Helras.pdfhenrique luiz neto
 
Fm Transmitter and receiver
 Fm Transmitter and receiver Fm Transmitter and receiver
Fm Transmitter and receivernurnaser1234
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrumSHALINI a
 
security system-converted.pdf
security system-converted.pdfsecurity system-converted.pdf
security system-converted.pdfAayushiS6
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protectionriskis
 
UAV detecting and jamming 2019 ALPHA
UAV detecting  and jamming   2019 ALPHAUAV detecting  and jamming   2019 ALPHA
UAV detecting and jamming 2019 ALPHA★ Sophie Guan
 

Similar to Threat Detector (20)

Broadband Jammer
Broadband JammerBroadband Jammer
Broadband Jammer
 
They Can Hear Your Heartbeats
They Can Hear Your HeartbeatsThey Can Hear Your Heartbeats
They Can Hear Your Heartbeats
 
Seminar ppt
Seminar pptSeminar ppt
Seminar ppt
 
Iff ppt
Iff pptIff ppt
Iff ppt
 
Report matter 2
Report matter 2Report matter 2
Report matter 2
 
VDI spectrum allocation
VDI spectrum allocationVDI spectrum allocation
VDI spectrum allocation
 
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMchpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
 
Spread spectrum technics
Spread spectrum technicsSpread spectrum technics
Spread spectrum technics
 
Enav222 prelim lecture
Enav222 prelim lectureEnav222 prelim lecture
Enav222 prelim lecture
 
Jammer final report
Jammer final reportJammer final report
Jammer final report
 
548 mw intro
548 mw intro548 mw intro
548 mw intro
 
Elios 2 rad
Elios 2 rad Elios 2 rad
Elios 2 rad
 
Subsampling Multi-standard receiver design, Part-1
Subsampling Multi-standard receiver design, Part-1Subsampling Multi-standard receiver design, Part-1
Subsampling Multi-standard receiver design, Part-1
 
ims-maritime-ocean-systems-resource-Helras.pdf
ims-maritime-ocean-systems-resource-Helras.pdfims-maritime-ocean-systems-resource-Helras.pdf
ims-maritime-ocean-systems-resource-Helras.pdf
 
Fm Transmitter and receiver
 Fm Transmitter and receiver Fm Transmitter and receiver
Fm Transmitter and receiver
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
security system-converted.pdf
security system-converted.pdfsecurity system-converted.pdf
security system-converted.pdf
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protection
 
UAV detecting and jamming 2019 ALPHA
UAV detecting  and jamming   2019 ALPHAUAV detecting  and jamming   2019 ALPHA
UAV detecting and jamming 2019 ALPHA
 
Study Guide
Study GuideStudy Guide
Study Guide
 

More from Firoze Hussain

Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013Firoze Hussain
 
totem Catalogue Sept 2012
totem Catalogue Sept 2012totem Catalogue Sept 2012
totem Catalogue Sept 2012Firoze Hussain
 
totem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securitytotem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securityFiroze Hussain
 
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...Firoze Hussain
 
Catalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementCatalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementFiroze Hussain
 
3rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 20113rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 2011Firoze Hussain
 
totem int Online Catalogue Sept11
totem int Online Catalogue Sept11totem int Online Catalogue Sept11
totem int Online Catalogue Sept11Firoze Hussain
 
Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)Firoze Hussain
 
Online Catalogue 9 July2011
Online Catalogue 9 July2011Online Catalogue 9 July2011
Online Catalogue 9 July2011Firoze Hussain
 
Africa 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security PdfAfrica 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security PdfFiroze Hussain
 
Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Firoze Hussain
 
24 6 2011 Port Security
24 6 2011 Port Security24 6 2011 Port Security
24 6 2011 Port SecurityFiroze Hussain
 
16 Page Catalogue 7 June11
16 Page Catalogue 7 June1116 Page Catalogue 7 June11
16 Page Catalogue 7 June11Firoze Hussain
 
Ecil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorEcil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorFiroze Hussain
 
PPE & Welding Accessories 2011
PPE & Welding Accessories 2011PPE & Welding Accessories 2011
PPE & Welding Accessories 2011Firoze Hussain
 

More from Firoze Hussain (20)

Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
 
Catalogue march 2013
Catalogue march 2013Catalogue march 2013
Catalogue march 2013
 
Homsec 2013
Homsec 2013Homsec 2013
Homsec 2013
 
totem Catalogue Sept 2012
totem Catalogue Sept 2012totem Catalogue Sept 2012
totem Catalogue Sept 2012
 
totem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securitytotem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety security
 
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
 
Catalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementCatalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality management
 
3rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 20113rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 2011
 
Catalogue 19 sept11
Catalogue 19 sept11Catalogue 19 sept11
Catalogue 19 sept11
 
totem int Online Catalogue Sept11
totem int Online Catalogue Sept11totem int Online Catalogue Sept11
totem int Online Catalogue Sept11
 
Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)
 
Online Catalogue 9 July2011
Online Catalogue 9 July2011Online Catalogue 9 July2011
Online Catalogue 9 July2011
 
Africa 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security PdfAfrica 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security Pdf
 
Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)
 
24 6 2011 Port Security
24 6 2011 Port Security24 6 2011 Port Security
24 6 2011 Port Security
 
16 Page Catalogue 7 June11
16 Page Catalogue 7 June1116 Page Catalogue 7 June11
16 Page Catalogue 7 June11
 
Kerala Ti C 9.3.11
Kerala  Ti C 9.3.11Kerala  Ti C 9.3.11
Kerala Ti C 9.3.11
 
16 Catalogue 24 Mar11
16 Catalogue  24 Mar1116 Catalogue  24 Mar11
16 Catalogue 24 Mar11
 
Ecil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorEcil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitor
 
PPE & Welding Accessories 2011
PPE & Welding Accessories 2011PPE & Welding Accessories 2011
PPE & Welding Accessories 2011
 

Threat Detector

  • 1. Threat Detector Threat Detector Then most effective jamming occurs when the frequency of the jammer is at or around the threat. The DRF Threat Detector detects a frequency through one of three filters covering the bandwidth of each jammer plug-in. When a threat arises the synthesizer is set to transmit a jamming signal equal to the bandwidth of the filter in which the threat is received. If more than one threat is detected or there is a threat outside the filter bandwidths then the jammer will sweep across the complete bandwidth of the jammer. In a quiet period the Threat Detector is in listening mode. On receiving a threat the frequency of the threat is detected and the jammer transmits for 15 seconds around the threat. After 15 seconds the Threat Detector listens for 1 second and if the threat still exists the jammer transmits for another 15 seconds. This mode continues until the threat has ceased. If during the listening mode the frequency of the threat changes the frequency of the jammer will follow the threat. If two threats occur or a threat occurs outside the bands of the filters the Jammer will take the safe option and transmit across its full bandwidth. If there is no longer a threat the Detector remains in listening mode and the jammer transmit amplifier is turned off to conserve the battery.
  • 2. Bandwidth of Jammers and typical filters available within each band Band 1 25Mhz — 125Mhz Band 2 125Mhz — 250Mhz Band 3 250Mhz — 500Mhz Band 4 500Mhz — 1000Mhz Band 5 1000Mhz—2000Mhz Band 6 850-965MHz and 1800-1920MHz GSM Low and High Band 7 2000MHz—3000MHz 3G / Wifi / Wimax Band 8+ 3000MHz—18000MHz in 1GHz or 2GHz bandwidth Frequency MHz Application of typical filters - in each band 29-50 Radio controlled toys, cordless telephones, radio bells 66-88 Walky Talky 88-125 Radio controlled aeroplanes 135-170 VHF Walky Talky 430-470 UHF Walky Talky 850-965 CDMA 925-960 Low band Cellular GSM 1520-1560 GPS, Thuraya, Iridium 1805-1880 High band Cellular GSM/DCS 1930-1990 Cellular PCS 2110-2170 3G 2400-2500 WiFi, Wimax Antennas Monopole, sleeve dipole, patch Dimension 140mm long x 94mm wide x 45mm high Weight Module 0.25Kg Power 24VDC @ 0.3 amp per unit Temperature -20ºC to 40ºC within few minutes of switch on