Bandyopadhyay / Chaulya / Mishra | Wireless Communication in Underground Mines | E-Book | www.sack.de
E-Book

E-Book, Englisch, 477 Seiten

Bandyopadhyay / Chaulya / Mishra Wireless Communication in Underground Mines

RFID-based Sensor Networking
1. Auflage 2009
ISBN: 978-0-387-98165-9
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

RFID-based Sensor Networking

E-Book, Englisch, 477 Seiten

ISBN: 978-0-387-98165-9
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



Wireless communication has emerged as an independent discipline in the past decades. Everything from cellular voice telephony to wireless data transmission using wireless sensor networks has profoundly impacted the safety, production, and productivity of industries and our lifestyle as well. After a decade of exponential growth, the wireless industry is one of the largest industries in the world. Therefore, it would be an injustice if the wireless communication is not explored for mining industry. Underground mines, which are characterized by their tough working conditions and hazardous environments, require fool-proof mine-wide communication systems for smooth functioning of mine workings and ensuring better safety. Proper and re- able communication systems not only save the machine breakdown time but also help in immediate passing of messages from the vicinity of underground working area to the surface for day-to-day normal mining operations as well as for speedy rescue operations in case of disaster. Therefore, a reliable and effective commu- cation system is an essential requisite for safe working, and maintaining requisite production and productivity of underground mines. Most of the existing systems generally available in underground mines are based on line (wired) communication principle, hence these are unable to withstand in the disaster conditions and dif?cult to deploy in inaccessible places. Therefore, wireless communication is an indispe- able, reliable, and convenient system and essential in case of day-to-day normal duty or disaster situations.

Bandyopadhyay / Chaulya / Mishra Wireless Communication in Underground Mines jetzt bestellen!

Weitere Infos & Material


1;Preface;5
2;Acknowledgment;9
3;Contents;11
4;Abbreviations;19
5;Symbols;23
6;About the Authors;25
7;Mine Communication Technique;28
7.1;1.1 Introduction;28
7.2;1.2 Wired Communication Services;29
7.3;1.3 Semi-wireless Communication System;37
7.4;1.4 Through-the-Earth Communication System;41
7.5;1.5 Wireless Communication Services;50
7.6;1.6 Rescue Systems for Disaster Management;72
7.7;1.7 Conclusions;77
7.8;References;82
8;Evaluation of Suitable Frequency;92
8.1;2.1 Introduction;92
8.2;2.2 Wave Propagation Through Medium;93
8.3;2.3 Laboratory Experiment;94
8.4;2.4 Results and Discussion;97
8.5;2.5 Conclusions;97
8.6;References;98
9;Trapped Miner Communication;99
9.1;3.1 Introduction;99
9.2;3.2 System Description;99
9.3;3.3 Transmitter Unit;100
9.4;3.4 Receiver Unit;103
9.5;3.5 Technical Description;106
9.6;3.6 Safety Analysis;108
9.7;3.7 Component Details;111
9.8;3.8 Capabilities of the System;113
9.9;3.9 Field Trial;114
9.10;3.10 Conclusions;115
9.11;References;115
10;Shaft Communication;117
10.1;4.1 Introduction;117
10.2;4.2 Theory;117
10.3;4.3 Principle;121
10.4;4.4 System Description;121
10.5;4.5 Technical Details;125
10.6;4.6 Field Installation Procedure;126
10.7;4.7 Laboratory and Field Trials;127
10.8;4.8 Capabilities of the System;129
10.9;4.9 Conclusions;130
10.10;References;130
11;Line-of-Sight Communication;131
11.1;5.1 Introduction;131
11.2;5.2 Propagation of UHF RadioWaves in Coal Mine Tunnels;131
11.3;5.3 Expected Communication Range in a Mine and Propagation Loss;139
11.4;5.4 System Description;140
11.5;5.5 Circuit Diagram;141
11.6;5.6 Specification;142
11.7;5.7 Field Trial;143
11.8;5.8 Capabilities;144
11.9;5.9 Conclusions;145
11.10;References;145
12;Mine-Wide Communication;147
12.1;6.1 Introduction;147
12.2;6.2 The System;148
12.3;6.3 Specifications of Leaky Feeder System;150
12.4;6.4 Working Technique;152
12.5;6.5 Advantages;153
12.6;6.6 Types of Cables;153
12.7;6.7 Drawbacks;155
12.8;6.8 Field Trial;155
12.9;6.9 Development of Passive Amplifier;157
12.10;6.10 Conclusions;163
12.11;References;163
13;Web-Based Information and Decision Support System for Mining Industry;167
13.1;7.1 Introduction;167
13.2;7.2 Required Areas of IT Application in Coal Mines;167
13.3;7.3 System Description;172
13.4;7.4 Conclusions;175
13.5;References;177
14;ZigBee Technology: A UniqueWireless Sensor Networking Solution;178
14.1;8.1 Introduction;178
14.2;8.2 ZigBee Technology;180
14.3;8.3 Specialty of ZigBee Technology;190
14.4;8.4 Comparison of ZigBee with Other Wireless Technologies;191
14.5;8.5 Features of ZigBee;194
14.6;8.6 Application Areas;195
14.7;8.7 Manufacturers of ZigBee Devices;195
14.8;8.8 Conclusions;195
14.9;References;198
15;Wireless Information and Safety System for Mines;200
15.1;9.1 Introduction;200
15.2;9.2 Function;200
15.3;9.3 The System;203
15.4;9.4 Principle and Operating Procedure;262
15.5;9.5 System Installation Procedure;272
15.6;9.6 Capabilities of the System;275
15.7;9.7 Performance Analysis of RFID Devices in Underground Mines;276
15.8;9.8 Conclusions;285
15.9;References;286
16;Programming of RFID Devices;288
16.1;10.1 Introduction;288
16.2;10.2 Function of RFID Devices;288
16.3;10.3 CC2430 Chip;289
16.4;10.4 CC2430 Modules;291
16.5;10.5 Programming of RFID Devices;293
16.6;10.6 Network Creation;294
16.7;10.7 Network Topologies;295
16.8;10.8 Network Layers;296
16.9;10.9 Wireless Application Protocol;298
16.10;10.10 Medium Access Control;300
16.11;10.11 Programming and Functionality of RFID Devices;304
16.12;10.12 Conclusions;306
16.13;References;306
17;Tracking and Monitoring Software;308
17.1;11.1 Introduction;308
17.2;11.2 Application Software;308
17.3;11.3 Operating Mode;309
17.4;11.4 Flowchart and Algorithm;310
17.5;11.5 Installation and Operation Procedures;310
17.6;11.6 Conclusions;323
18;Intrinsic Safety for Hazardous Area;324
18.1;12.1 Introduction;324
18.2;12.2 Concept of Intrinsic Safety;325
18.3;12.3 Classifications;327
18.4;12.4 Standards Related to Intrinsic Safety;330
18.5;12.5 Important Definitions;334
18.6;12.6 Grouping and Classification of IS and Associated Apparatus;336
18.7;12.7 Designing of Intrinsically Safe Apparatus;337
18.8;12.8 Parameters Considered for Intrinsic Safety;372
18.9;12.9 Infallible Components;376
18.10;12.10 Use of Shunt Safety Assemblies;378
18.11;12.11 Electromagnetic and Ultrasonic Energy Radiating Equipment;384
18.12;12.12 Advice to the First-Time Designer;385
18.13;12.13 Guidelines for Designing Intrinsic Safety Circuit;392
18.14;12.14 Basic Protection Concepts of Intrinsic Safety;395
18.15;12.15 Conclusions;397
18.16;References;399
19;Program for RFID Devices;404
19.1;1 Programming for Coordinator;404
19.2;2 Programming for Router;427
19.3;3 Programming for End Device;440
19.4;4 Programming for ProximityWarning Device;451
19.5;5 Programming for Router with Sensor Device;454
19.6;6 Programming for End Device with Data Logger;464
19.7;7 Programming for Messaging Device;467
20;Algorithm of Different Modules of TMS Software;489
21;Index;494



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.