Wireless Communication in Underground Mines (eBook)

RFID-based Sensor Networking
eBook Download: PDF
2009 | 2010
XXVII, 477 Seiten
Springer US (Verlag)
978-0-387-98165-9 (ISBN)

Lese- und Medienproben

Wireless Communication in Underground Mines -  L. K. Bandyopadhyay,  S. K. Chaulya,  P. K. Mishra
Systemvoraussetzungen
106,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Wireless communication has emerged as an independent discipline in the past decades. Everything from cellular voice telephony to wireless data transmission using wireless sensor networks has profoundly impacted the safety, production, and productivity of industries and our lifestyle as well. After a decade of exponential growth, the wireless industry is one of the largest industries in the world. Therefore, it would be an injustice if the wireless communication is not explored for mining industry. Underground mines, which are characterized by their tough working conditions and hazardous environments, require fool-proof mine-wide communication systems for smooth functioning of mine workings and ensuring better safety. Proper and re- able communication systems not only save the machine breakdown time but also help in immediate passing of messages from the vicinity of underground working area to the surface for day-to-day normal mining operations as well as for speedy rescue operations in case of disaster. Therefore, a reliable and effective commu- cation system is an essential requisite for safe working, and maintaining requisite production and productivity of underground mines. Most of the existing systems generally available in underground mines are based on line (wired) communication principle, hence these are unable to withstand in the disaster conditions and dif?cult to deploy in inaccessible places. Therefore, wireless communication is an indispe- able, reliable, and convenient system and essential in case of day-to-day normal duty or disaster situations.
Wireless communication has emerged as an independent discipline in the past decades. Everything from cellular voice telephony to wireless data transmission using wireless sensor networks has profoundly impacted the safety, production, and productivity of industries and our lifestyle as well. After a decade of exponential growth, the wireless industry is one of the largest industries in the world. Therefore, it would be an injustice if the wireless communication is not explored for mining industry. Underground mines, which are characterized by their tough working conditions and hazardous environments, require fool-proof mine-wide communication systems for smooth functioning of mine workings and ensuring better safety. Proper and re- able communication systems not only save the machine breakdown time but also help in immediate passing of messages from the vicinity of underground working area to the surface for day-to-day normal mining operations as well as for speedy rescue operations in case of disaster. Therefore, a reliable and effective commu- cation system is an essential requisite for safe working, and maintaining requisite production and productivity of underground mines. Most of the existing systems generally available in underground mines are based on line (wired) communication principle, hence these are unable to withstand in the disaster conditions and dif?cult to deploy in inaccessible places. Therefore, wireless communication is an indispe- able, reliable, and convenient system and essential in case of day-to-day normal duty or disaster situations.

Preface 5
Acknowledgment 9
Contents 11
Abbreviations 19
Symbols 23
About the Authors 25
Mine Communication Technique 28
1.1 Introduction 28
1.2 Wired Communication Services 29
1.3 Semi-wireless Communication System 37
1.4 Through-the-Earth Communication System 41
1.5 Wireless Communication Services 50
1.6 Rescue Systems for Disaster Management 72
1.7 Conclusions 77
References 82
Evaluation of Suitable Frequency 92
2.1 Introduction 92
2.2 Wave Propagation Through Medium 93
2.3 Laboratory Experiment 94
2.4 Results and Discussion 97
2.5 Conclusions 97
References 98
Trapped Miner Communication 99
3.1 Introduction 99
3.2 System Description 99
3.3 Transmitter Unit 100
3.4 Receiver Unit 103
3.5 Technical Description 106
3.6 Safety Analysis 108
3.7 Component Details 111
3.8 Capabilities of the System 113
3.9 Field Trial 114
3.10 Conclusions 115
References 115
Shaft Communication 117
4.1 Introduction 117
4.2 Theory 117
4.3 Principle 121
4.4 System Description 121
4.5 Technical Details 125
4.6 Field Installation Procedure 126
4.7 Laboratory and Field Trials 127
4.8 Capabilities of the System 129
4.9 Conclusions 130
References 130
Line-of-Sight Communication 131
5.1 Introduction 131
5.2 Propagation of UHF RadioWaves in Coal Mine Tunnels 131
5.3 Expected Communication Range in a Mine and Propagation Loss 139
5.4 System Description 140
5.5 Circuit Diagram 141
5.6 Specification 142
5.7 Field Trial 143
5.8 Capabilities 144
5.9 Conclusions 145
References 145
Mine-Wide Communication 147
6.1 Introduction 147
6.2 The System 148
6.3 Specifications of Leaky Feeder System 150
6.4 Working Technique 152
6.5 Advantages 153
6.6 Types of Cables 153
6.7 Drawbacks 155
6.8 Field Trial 155
6.9 Development of Passive Amplifier 157
6.10 Conclusions 163
References 163
Web-Based Information and Decision Support System for Mining Industry 167
7.1 Introduction 167
7.2 Required Areas of IT Application in Coal Mines 167
7.3 System Description 172
7.4 Conclusions 175
References 177
ZigBee Technology: A UniqueWireless Sensor Networking Solution 178
8.1 Introduction 178
8.2 ZigBee Technology 180
8.3 Specialty of ZigBee Technology 190
8.4 Comparison of ZigBee with Other Wireless Technologies 191
8.5 Features of ZigBee 194
8.6 Application Areas 195
8.7 Manufacturers of ZigBee Devices 195
8.8 Conclusions 195
References 198
Wireless Information and Safety System for Mines 200
9.1 Introduction 200
9.2 Function 200
9.3 The System 203
9.4 Principle and Operating Procedure 262
9.5 System Installation Procedure 272
9.6 Capabilities of the System 275
9.7 Performance Analysis of RFID Devices in Underground Mines 276
9.8 Conclusions 285
References 286
Programming of RFID Devices 288
10.1 Introduction 288
10.2 Function of RFID Devices 288
10.3 CC2430 Chip 289
10.4 CC2430 Modules 291
10.5 Programming of RFID Devices 293
10.6 Network Creation 294
10.7 Network Topologies 295
10.8 Network Layers 296
10.9 Wireless Application Protocol 298
10.10 Medium Access Control 300
10.11 Programming and Functionality of RFID Devices 304
10.12 Conclusions 306
References 306
Tracking and Monitoring Software 308
11.1 Introduction 308
11.2 Application Software 308
11.3 Operating Mode 309
11.4 Flowchart and Algorithm 310
11.5 Installation and Operation Procedures 310
11.6 Conclusions 323
Intrinsic Safety for Hazardous Area 324
12.1 Introduction 324
12.2 Concept of Intrinsic Safety 325
12.3 Classifications 327
12.4 Standards Related to Intrinsic Safety 330
12.5 Important Definitions 334
12.6 Grouping and Classification of IS and Associated Apparatus 336
12.7 Designing of Intrinsically Safe Apparatus 337
12.8 Parameters Considered for Intrinsic Safety 372
12.9 Infallible Components 376
12.10 Use of Shunt Safety Assemblies 378
12.11 Electromagnetic and Ultrasonic Energy Radiating Equipment 384
12.12 Advice to the First-Time Designer 385
12.13 Guidelines for Designing Intrinsic Safety Circuit 392
12.14 Basic Protection Concepts of Intrinsic Safety 395
12.15 Conclusions 397
References 399
Program for RFID Devices 404
1 Programming for Coordinator 404
2 Programming for Router 427
3 Programming for End Device 440
4 Programming for ProximityWarning Device 451
5 Programming for Router with Sensor Device 454
6 Programming for End Device with Data Logger 464
7 Programming for Messaging Device 467
Algorithm of Different Modules of TMS Software 489
Index 494

Erscheint lt. Verlag 29.8.2009
Zusatzinfo XXVII, 477 p.
Verlagsort New York
Sprache englisch
Themenwelt Mathematik / Informatik Informatik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Communication • Communication system • CompTIA RFID+ • Information • intrinsic safe • Mining • Radio-Frequency Identification (RFID) • RFID • sensor networking
ISBN-10 0-387-98165-9 / 0387981659
ISBN-13 978-0-387-98165-9 / 9780387981659
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 12,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Konzepte, Methoden, Lösungen und Arbeitshilfen für die Praxis

von Ernst Tiemeyer

eBook Download (2023)
Carl Hanser Verlag GmbH & Co. KG
69,99
Konzepte, Methoden, Lösungen und Arbeitshilfen für die Praxis

von Ernst Tiemeyer

eBook Download (2023)
Carl Hanser Verlag GmbH & Co. KG
69,99