Detect the Illegal Wireless Transmission with the help of Micro-Controller.
wireless transmission.docx (Size: 69.32 KB / Downloads: 50)
The objective of this project is to detect the illegal wireless transmission with the help of micro-controller. This project is very useful in manufacturing industries, jewels, vehicles, cash etc, detect and transmission through micro-controller. Stealing of others property is common now-a-days. The property may be any one among the following things; it may be vehicle, jewel, cash, documents, company secrets etc. The transmitting data can be received by others also who uses the same frequency code. In order to overcome this problem, we have designed and developed a system called “DETECTION OF ILLEGAL WIRELESS TRANSMISSION”.
In the micro-controller an algorithm should be specified that, for this particular frequency range. If someone uses the above mentioned frequency range, the signal is transmitted to micro-controller which in turn enables the driver circuit to drive the alarm.The receiver placed in our system continuously receives the frequency range. If the receiver receives the same frequency range say from 1 KHz to 100MHz which is the frequency range of military department. The frequency range is given to frequency convertor unit.
The frequency convertor output is fed to the pulse convertor. The pulse convertor transmits the frequency signal I the form of pulses. The pulsed input is given to micro-controller unit for display. If the micro-controller sends the signal to enable the alarm. We can change the frequency range through keypad interfaced with micro-controller.
A RFID tag consists of a microchip and a coiled antenna.RFID tags may be either active or passive. Active tags tend to be larger and more expensive than passive tags as they contain more electronics due to the fact that they actively transmit data to a reader. In comparison, passive tags draw power from the magnetic field generated between itself and a reader to power its microchip’s circuits, allowing it to reflect the RF signal transmitted to them from a reader, adding information by modulating the reflected signal. Tags can also be either read-only, volatile read/write, or write one/read many. In order for communication to occur between a tag and a reader, they must be tuned to the same frequency.