Implementation of MINER Act for Communication and Tracking Using MSHA’s Program Policy Letter (PPL) P09-V-01 as Guidance Salwa El-Bassioni Electrical Engineer.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

Introduction to Network
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
Technician Licensing Class Supplement T4, Questions Only Amateur Radio Practices 2 Exam Questions, 2 Groups.
MSHA APPROVAL PROCESS Steven Luzik Chief, Approval and Certification Center Chief, Approval and Certification Center.
Georgia Interoperability Network
March 13, 2006 Location Tracking System & Sensor Based Communications For Mining Response to RIN 1219-AB44.
Communication and Tracking Technologies MSHA Communication and Tracking Workshop March 17, 2010.
NIOSH Emergency Technologies Research and Development WJU International Mining Health & Safety Symposium David Snyder, MS, PE Office of Mine Safety and.
Mine Emergency Communication: Options, Issues & Status Randall Harris W. Va. Office of Miners’ Health Safety and Training June 7, 2007 West Virginia Coal.
Stakeholder Meeting July 11, 2012 MSHA Headquarters Arlington, VA New Technologies For Mine Rescue.
1 Communications & Tracking Plan Development Workshops July 9, 11 &
Multi-Mode Two-Way Radio Communication and Tracking System for Use Under Emergency and Operational Conditions in Underground Mines Presented by Stolar.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Amplifier in Wireless World Prepared by :Reem R. Hussein Prof. Issam Rashid Ashqer An-Najah National university Faculty of science Physics department.
(part 4).  Gateways  A gateway is responsible for translating information from one format to another and can run at any layer of the OSI model, depending.
Ideas for Today and Tomorrow Presented by Mark D. Rose Advances in Mine Wireless Communications Solutions That Work Tunnel Radio of America, Inc
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Three Police Technology Wireless Communications.
Communication Links Communication Link = Physical connection or Physical Medium Types: Wire Pair or Twisted Pair Coaxial Cable Fiber Optics Bandwidth,
Networks “Each time you use the telephone you use the world’s largest computer network – the telephone system”
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless Access Points (WAPs) or (APs)
Chapter 8 COMMUNICATION AND COMPUTER NETWORK
MSHA COMMUNICATIONS AND TRACKING GUIDANCE PPL Stakeholders Meeting.
Distributed Control Systems Emad Ali Chemical Engineering Department King SAUD University.
Chapter 14: Inspection and Maintenance
20 Years of Mining Innovation Underground Communication and Tracking Systems 20 Years of Mining Innovation Australia: Sydney-Kalgoorlie-Mt.
Network Topologies.
Wireless Technology Wireless devices transmit information via Electromagnetic waves Early wireless devices –Radios – often called wireless in.
1 Lecture Network Media Media refers to the means used to link a network's nodes together communications channel is the transmission media on which.
Communications & Networks
Fourth Annual International Mining Health & Safety Symposium MSHA Communications and Tracking Update Approval and Certification Center April 8, 2011.
InSeT System Inertial Sensor Tracking System Underground Mine Safety For Personnel Utilizing Inertial Sensors Technical Presentation.
Chapter 5: Computer Networks
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
Communications and Tracking Approvals Past – Present - Future MSHA Communications and Tracking Workshop March 17, 2010.
We help you tag out safe and healthy after a productive day.
American Mine Research, Inc. MINE NET TM Tagging, Tracking & Two Way Communication System.
Distributed antenna system
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-in 5 NETWORKS and TELECOMMUNICATIONS.
Data Communication. 2 Data Communications Data communication system components: Message Message Information (data) to be communicated. Sender Sender Device.
Module 2: Information Technology Infrastructure
MSHA Communications and Tracking Workshop March 17, 2010.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
SYSTEM ADMINISTRATION Chapter 1 Logical and Physical Network Topologies.
DIRECTIONAL LIFELINES Kenneth A. Sproul MSHA Approval & Certification Center Mine Escape Planning and Emergency Shelters Workshop April 18, 2006.
COMON NETWORK STRUCTURES BY :Karla Barragán. STAR topology Star networks are one of the most common computer network topologies. In its simplest form,
DO YOU UNDERSTAND MINE EMERGENCIES? ARE YOU PREPARED FOR A MINE EMERGENCY? MARK C. RADOMSKY The Pennsylvania State University.
Geo-localisation in CERN’s underground facilities CERN has recently deployed a digital radio network, based on TETRA technology, to be used by the Fire.
On-Shift Examination Scenario Continuous Miner Section What you will need: Pencil and paper to take notes or perform calculations Calculator to calculate.
ERP Status Overview Steve Gigliotti Chief, Division of Safety Coal Mine Safety & Health.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Transmission Media Unguided Media
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Mine Emergency Communication: Options, Issues, & Futures Randall Harris W. Va. Office of Miners’ Health Safety and Training May 5, 2007 West Virginia Coal.
The Emergence Of XBee In Building Automation And Industrial Control
NETWORK TOPOLOGY Network topology is the study of the arrangement or mapping of the elements of a network,especially the physical.
Chapter 1 : Computer Networks.
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Data Communication & Networking. Data communication Not to be confused with telecommunication –Any process that permits the passage from a sender to one.
P.73#21 a.C=($2.35n + $500)/n b.C approaches $2.35 c.$3› ($2.35n + $500)/n 3n – 2.35n › n › 500 n › 500/0.65 n › 769 chips must be made in order.
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
LAN Topologies Part 1. What is topology? Topology is the physical or logical interconnection of communicating devices Physical Topology: LANtopology,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Korea University Ubiquitous LAB. Chapter 11. RFID peripherals Ph.D Chang-Duk Jung.
Importance of Wireless Processes of Wireless Internet Known now as WiFi Very similar to how radio and television signals work Information gets coded.
InSeT System Inertial Sensor Tracking System
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Presentation transcript:

Implementation of MINER Act for Communication and Tracking Using MSHA’s Program Policy Letter (PPL) P09-V-01 as Guidance Salwa El-Bassioni Electrical Engineer May 14, 2009

MINER Act Requirements June 15, 2006 A redundant means of communication with the surface, such as secondary telephone or equivalent two-way communication. Above ground personnel to determine the current, or immediately pre-accident location of all underground personnel.

MINER Act Requirements June 15, 2009 Post-accident communication between underground and surface personnel via wireless or alternative to wireless, PPL provisions. Electronic tracking system to determine location of persons trapped underground

Untethered Devices One device for each group of miners working or traveling together. One device for any miner working or traveling alone. How many would we need on a working section? –One device for each group working or traveling together and one device for each miner working or traveling alone. For example; on advancing sections, each CM operator, roof bolter crew, and scoop operator would need their own device.

Untethered Communications Device Miner Continuous Miner Section Feeder Advancing Section

Longwall Miner Untethered Communications Device Longwall

Coverage for Two-Way Communications Throughout the working section. –Miners inby the loading point are able to communicate with the surface. Continuous in each escapeway. –Primary and secondary. 200 foot zone inby and outby strategic areas. –Strategic areas = where miners are normally required to work or likely to congregate in an emergency.

Coverage Compliance Mesh System Components of a mesh system: Untethered devices (radios). Nodes (wired/wireless or both). Antennas Power supplies. Gateway nodes, hub or controller on the surface. Communication facility on the surface for monitoring network. Note: power supplies used in areas where permissible equipment is required must be IS or in X/P enclosures.

Mesh System If a node fails the system reconfigures itself and determines a new route

Mesh System A power supply and/or battery backup required at each node Power Source

Two-way Communication Coverage Advancing Section Primary Escapeway Secondary Escapeway Node/ Antenna Feeder Belt

Two-Way Communications: Longwall Node / Antenna

Coverage Compliance LF System Components of a Leaky Feeder: UHF and VHF Radios Power supplies UHF amplifier VHF amplifier Surface base stations Splitters Antennas Termination units Note: power supplies used in areas where permissible equipment is required must be IS or in X/P enclosures.

Leaky Feeder Miner 1 Transmitting Miner 2 Receiving Radiating Mode Coupled Mode Functions as a power line, communications link, and a distributed antenna

Leaky Feeder: CM Section Advancing Section Primary Escapeway Secondary Escapeway Feeder Antenna Belt Leaky Feeder

Leaky Feeder: Longwall Primary Escapeway Secondary Escapeway Antenna Leaky Feeder Longwall

Coverage Compliance Medium Frequency (MF) System Components of MF system: Conductors in a mine (track, metal pipes..) Hand held radios Base transmitter (transceiver in central area) Repeaters (transfers frequency) Node (repeater used in a network)

Coal Seam Metal Pipes/Conduits Tracks/Rails Medium Frequency (MF) Radio Communications Doesn’t require special cable. Radio signal couples to other conductors to increase range.

UHF signal is converted to/from MF signal MF Signal is carried by un- powered conductive infrastructure in mine Medium Frequency Repeater

Survivability Redundant pathways to surface: One system with two or more pathway to the surface. Two or more systems installed in two or more entries and different pathways to the surface.

Survivability = Redundancy One system, two Pathways

Mine Shafts Leaky Feeder Primary Base Station Secondary Base Station Overland Link

One Node-Based Mesh System with two pathways

Belt Track Antenna UHF LF Cable - Trunk 1 Escapeway Two Leaky Feeder systems in multiple entries UHF LF Cable - Trunk 2

Belt Track Low-cost LF Cable Antenna UHF LF Cable Escapeway Coverage extension using low-cost cables and antennas

Electronic Tracking Coverage Types of tracking: Zone-based –RFID tags and readers RSSI -based –Using nodes as those from communication system.

Conventional Tracking Miner wears a tag: Radio frequency ID (RFID) Needs ‘readers’ of tags

Miner A Miner B RFID Reader Operation of conventional RFID: Reader senses tags that are within range Tag transmits a unique ID Detected tag IDs are sent to the surface Tag location is associated with the reader’s known location and displayed on the tracking computer Tag

Miner A Miner B RFID Reader Tag Operation of reverse RFID: Tags transmit RFIDs Reader receive RFID from tag(s) RFID from reader & tag transmitted to comms system Comms system relays reader and tag information to surface Tracking computer calculates and displays reader positions Leaky Feeder

Electronic Tracking Guidance Coverage in working section within 200 feet –Readers or nodes are 400 feet apart. Coverage in escapeways –Readers or nodes every 2000 feet Coverage in strategic areas –Within 200 feet of where miners are normally required to work or likely congregate in an emergency. –Belt drives, loading points, SCSR caches, etc.

RSSI-Based Tracking (Node-based Systems) Error = difference between estimated and actual location. MSHA expects that errors in tracking locations may exist and will work with mine operators until compliance with the MINER Act is gained.

Zone-Based Tracking (Reader-based Systems) Conventional and Reverse RFID Error = difference between reported and actual position Accuracy of tracking is affected by: –tracking system update rate –motion of miners –reader or tag spacing –Interference

Advancing Section 2,000 ft. 400 ft. Feeder Secondary Escapeway Primary Escapeway Node / Reader Belt Electronic Tracking Coverage

Electronic Tracking Coverage: Longwall 2,000 ft. 400 ft. Secondary Escapeway Primary Escapeway Node / Reader

Emergency Response Plan ERP No later than June 15, 2009 the ERP must, among other things, provide for: Post accident two-way communications Electronic tracking

Content of ERP ERP will be reviewed on a mine-by-mine bases. Reviewers will be evaluating the following: Wireless communication systems Type of system (LF, mesh, Wi-Fi, MF) Survivability, how it provides redundancy

Content of ERP (continued) –Provisions for untethered devices Accessibility to miners Text, voice or both Standby power Approved (approval #)

Content of ERP (continued) –Provisions for infrastructure Type of components (LF, nodes, AP) Approved components (approval # if applicable) Location in the working section Location in escapeways Location relative to strategic areas Power supply evaluation # if applicable.

Content of ERP (continued) Electronic tracking system Type of system, reader or node-based –Location of tags –Location of readers or nodes in working section –Location of readers or nodes in escapeways –Location in strategic areas Vendor if known Model number if known Approval number if known Standby power for infrastructure Standby power for tags

Content of ERP (continued) Surface provisions to address: Standby power Communication with and monitoring of undergrond personnel Uniquely identifying each miner Location data is associated with time How long the data is stored Frequency of updating location data

Content of ERP Continued Maintenance provisions –Manufacturer plan –Restoring backup power Examination provisions –Weekly examination for infrastructure –Daily examination of tags and radios Backup plans –Communication system fails –Tracking system fails

Summary Survivability can be achieved by hardening the system or providing redundancy. One way to provide redundancy is to mix and match a primary (LF or mesh system) system with a secondary system ( MF or TTS). Error factors depend on system design, system installation, and computer algorithm being used.

Any Questions?