Storage networking is the collective processes of interconnecting external storage resources and devices over a network to all connected computers/nodes. Storage networking makes it possible to share one or more storage resources on a network in an IT environment, where a single storage server can be used to provide storage capacity to multiple...
In mobile computing, a jammer is a mobile communications device that transmits on the same frequency range as a cellphone to create strong cell tower interference and block cellphone signals and call transmission. Jammers are usually undetectable, and users may experience minimal effects such as poor signal reception. Jamming devices may be used in any location but are typically deployed where cellphone use may be disruptive, such as in libraries and restaurants.
A working cellphone must be in constant communication with its network provider via a cell tower or base station. By sending out radio waves in cellphone frequencies, jammers launch denial-of-service attacks (DoS), causing mobile devices to lose base station communication. Jammers come in a variety of shapes and sizes, including:
All jamming device types have three main parts, as follows:
Handheld jammers are capable of disrupting signals within nine to 30 meters, while more powerful jammers create a huge bubble stretching as far as a mile or 1.6 kilometers. In many countries, jammers are illegal, except in the military, law enforcement and other government agencies, where jammers are largely used to prevent bomb detonation or to isolate suspects in hostage situations.
Read More »
Join 138,000+ IT pros on our weekly newsletter
Home | Advertising Info | Write for Us | About | Contact Us
2010 - 2014
Partner Sites :