Radio Systems for Machine Control. Contents 1.What are we trying to do and Why. 2.Physical Constraints of Mine Sites. 3.Data Flow Requirements. 4.Existing.

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

CENG 3331 Introduction to Telecommunications and Networks.
Wide Area Wi-Fi Sam Bhoot. Wide Area Wi-Fi  Definition: Wi-Fi (Wireless Fidelity) n. – popular term for high frequency wireless local area networks operating.
IE 419/519 Wireless Networks Lecture Notes #6 Spread Spectrum.
Interconnect throughput modeling. Important network performance metrics Throughput – Point to point (link bandwidth + end host software overheads) – Aggregate.
Multiple Access Techniques for wireless communication
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
C ISCO ’ S W IRELESS T ECHNOLOGIES :. Introduction to Wireless Technology Wireless LANs (WLANs) use radio frequencies (RFs) that are radiated into air.
Wireless Networks and Spread Spectrum Technologies.
FHSS vs. DSSS Presented by Ali Alhajhouj. Presentation Outline Introduce the issues involved in the system behaviors for FHSS and DSSS systems used in.
Wireless networking technology By Abbas Izadpanah January 2007.
Wireless and going mobile Browsing via low energy photons.
Which telecommunication service is better for you?
6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non-mobile) or.
Wireless Networking (WLAN) Reina Trujillo Nathan Ekenberg.
Conducted and Wireless Media (Part II) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 7, Tuesday 2/21/2007)
2002 MURI Minisymposium Cooperative Control of Distributed Autonomous Vehicles in Adversarial Environments 2002 MURI Minisymposium Ameesh Pandya Prof.
Module contents Technologies overview Spread Spectrum Modulation
VULCAN Vs MERCURY TECHNOLOGICAL DIFFERENCES AND APPLICATIONS.
WLAN b a Johan Montelius
1 Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Monday March 12, 2007 Acknowledgement:
Sharif University of Technology Physical layer: Wireless Transmission.
Bluetooth Introduction The Bluetooth Technology
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
Chapter 10 Remote Access and Wireless Networking Business Issues Logical & Physical Topology Technology: Hardware & Software, & Wireless Personnel Communication.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Wireless I. Six Modes of Wireless Six Modes of Wireless – Notes Master ▫Access Point or base station Managed ▫Aka Infrastructure Mode ▫Access point or.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 6 Information System Networks and the Internet.
Wireless LAN Pertemuan 16 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Bluetooth & WPAN. 2 Bluetooth/WPAN WPAN (Wireless Personal Area Network) has a smaller area of coverage, say, 2.5 mW transmitter power, distance
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
 Midterm 30%  Final 40%  LAB 15%  Assignment 15%  Text Book – Designing and Deploying n Wireless Networks  Jim Geier (ciscopress)
KARTIK DABBIRU Roll # EE
Bluetooth Address or Name Sharing By Joseph Charboneau.
How is radio signal propagated. 2 Comparison of wired and wireless transmissions WiredWireless BandwidthDepending on the media used, can be large Narrow.
Wireless LANs Wireless Technologies for LANs –Radio –Infrared light (as in TV remote control) –Ideal for mobile devices –Useful when wiring would.
1 The Leader in Industrial Data Communication Solutions Training: Wireless Introduction.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
Overview Overview  Skills of AMERICAN TECHNOLOGIES Inc. CapabilitiesCapabilities  What is Spread Spectrum Technology?  ACT’s Products and Services.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards Modified.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lectures Cellular and PCS Systems.
Teaching and Learning with Technology ck to edit Master title style  Allyn and Bacon 2002 Teaching and Learning with Technology k to edit Master title.
Why Wireless is Different Herb Little Research In Motion.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 11 Cellular and PCS Systems Dr. Stewart D. Personick Drexel.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
Technician License Course Chapter 2 Lesson Plan Module 3 – Modulation and Bandwidth.
Wireless Ethernet Technologies. Wireless Ethernet Technology Industry technologies & market trends Choosing the right radio technology for the job Why.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Confidential ORiNOCO Mesh.  Webster’s  A highly interconnected network of computers or networking hardware  An upcoming IEEE standard (802.11s)
Interconnect Networks Basics. Generic parallel/distributed system architecture On-chip interconnects (manycore processor) Off-chip interconnects (clusters.
Pertemuan 4 Bandwidth.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
CDMA X EV-DO by S.Vidhya. CDMA 2000 CDMA2000 (also known as C2K or IMT Multi ‑ Carrier (IMT ‑ MC)) is a family of 3G[1] mobile technology standards,
System Study of the Wireless Multimedia Ad-hoc Network based on IEEE g Authors Chung-Wei Lee Jonathan C.L. Liu & Kun Chen Yu-Chee Tseng & S.P. Kuo.
Homework 1 solutions. Question 1 Solution Q1 Question 2.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
Pritee Parwekar. Requirements and Standards Some requirements for WSN deployment include: –Fault tolerance –Lifetime –Scalability –Real-time data.
Wireless Mesh Networking Nathaniel Wilson 4/13/2007.
Wireless LAN 1.
Multiple Access Techniques for Wireless Communication
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
Wired and wireless Frequency spectrum
Wireless I.
An Enhancement of WirelessHART Protocol
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Conducted and Wireless Media (Part II)
Terminologies in Wireless Communication Group Members Munib Ahmed Rehan Khan.
Presentation transcript:

Radio Systems for Machine Control

Contents 1.What are we trying to do and Why. 2.Physical Constraints of Mine Sites. 3.Data Flow Requirements. 4.Existing Radio Systems. 5.Security. 6.Where Will it End.

What are we trying to do and Why What Optimize machine use. Maximize Mine resources. Simplify Communications to Field Operations. Why To Save Money For Better Communications To Make Life Easier

Physical Constraints of Mines Large spoil piles. Deep pits. Large areas. Constant change of both operations and the mines topography. Constant blasting.

Data Flow Requirements General monitoring of production. 0ne truck about 300 kilobytes/day Draglines are heavy users Design files for operations to and from machines. Size can vary from 2meg to 20k per file RTK corrections. 1,550 kilobytes per day CMR messages every second for 24 hours

Existing Radio Systems

UHF data radios 450 to 520 mhz 2400 baud rate 240 characters per second These radios work with a tone di = 0, dr = 1 UHF will reflect off walls ie it can bend around a pit extented by multipath Narrow bandwith – High Power, Long Distance, minimal data

900 Mhz Spread Spectrum Data Radio 915 to 928 mhz baud rate characters per second Data files are compressed by between 3 and 10 to 1 The radio works on Time Division Multiple Access Each Link has a master and 2 slaves The Master synchronizes the signal so that hopping tables can be used One link can have a maximum of 40 machines

900 Mhz Spread Spectrum RTK Radio 915 to 928 mhz baud rate The RTK signal can be repeated 14 times. Each message takes up 330 milliseconds Security is provided by a lack of knowledge of the hopping tables  1 watt power output from radio allowable under ACA. Wide bandwidth – low power, short distance, large amounts of data Some multipath (Coal absorbs signal, hard rock does not)

TDMA

data radios 2.4 Ghz baud rate G has 54mhz band width B has 11mhz band width This system can work as a mesh where all radios are repeaters The radios know how to route the message to its destination

Approximate Throughput Comparison for a, b, and g Data Rate (Mbps) Approximate Throughput (Mbps) Throughput as a Percentage of b Throughput b116100% g (802.11b clients in cell)548133% g (no b clients in cell) % a %

data radios For security the system has an encryption key Any computer running a wireless link can be connected to the network if it has the encryption key. There will most likely be some other security measures put in place at the server end.

New systems for the future Where are we heading. What will our needs be. How many uses can we think of. Is it the best way to do it.