Cutting-edge Technology for Data and Communications PAGE 1 Guido Perez Business Development Manager 617-671-5747 g.perez@mstglobal.com
Table of Contents TUNNEL & COMMUNICATION EVOLUTION CHALLENGES IN TUNNELS CURRENT TECHNOLOGIES APPLICATIONS IN TUNNELS Q & A PAGE 2
PAGE 3 TUNNEL CONSTRUCTION
ORIGINS OF UNDERGROUND COMMUNICATION COMMUNICATION TIME LINE PAGE 4
CHALLENGES IN TUNNELS Restricted space, mobile equipment, and people create risks that must be mitigated People and equipment location Ground movements Air regulation Energy Consumption False Break Glass Events and Evacuation of Tunnels Communications (operational & emergency) TBM Guidance Data, Video Surveillance, Gas Monitoring, etc. PAGE 5
CURRENT TECHNOLOGIES There are various backbone technologies to enable voice and data to be transported to the surface and displayed on its monitoring and control system. Leaky Feeder Radio Systems (VDV) Wi-Fi based Systems Flexible voice and data communications infrastructure that is robust and easy to deploy,that can provide redundancy during the harsh construction stage. PAGE 6
CURRENT TECHNOLOGIES VDV Leaky Feeder Radio System Provides a high quality, two way voice communications to underground projects. The leaky coax antenna allows the use of a variety of digital and analogue radios from all major radio manufacturers, such as Tait, Motorola, icom, Kenwood and others. The productivity and safety benefits associated with a VDV installation make it a cost effective solution to your underground communication requirements 8 & 16 CHANNELS EXPANDABLE LOCAL & REMOTE PC BASED DIAGNOSTICS BUILT IN VOLTAGE REGULATORS COMPATIBLE WITH MOST EXISTING SYSTEMS AUTOMATIC LEVEL CONTROL MODULAR AMPLIFIER CONSTRUCTION SUBMERSIBLE HOUSINGS & TERMINATIONS PAGE 7
CURRENT TECHNOLOGIES Digital Technology Secure and reliable networks that delivers operational technology platforms Multi-service communications, enable collaboration and rapid decision-making High reliability infrastructure with a redundant design Personnel, machine and equipment positioning High speed data access to TBMs and Roadheaders for optimization PAGE 8
Digital Technology The Wifi technology suite is designed to lead tunneling communications and digital network infrastructure into the future. The Wifi infrastructure has been specifically developed for the tunneling and mining industries to operate within the harsh environments encountered in all underground operations. WiFi Networks Enable: Personal & Asset Tracking Emergency Messaging Telephony Proximity Detection Mobile Machine Telemetry Environmental Monitoring Video Surveillance PAGE 9
Digital Technology MOBILE DEVICE DATA DOWNLOADS POWER OVER ETHERNET (POE) SUPPORT CAPABILITY PORTABLE WIRELESS NETWORK ELEMENTS OPERATES ON TOUCH VOLTAGE MULTI FUNCTION DEVICE WITH TAG READING ABILITY PLUG AND PLAY SYSTEM MANAGED ETHERNET NETWORK SUPPORTING QOS, SNMP & VLANS GIGABIT BACKBONE PAGE 10
Digital Technology NS50 Wireless Network Switch The NS50 is a fiber optic Ethernet switch that is designed for easy plug and play relocation by tunnel personnel, providing network coverage wherever it is required. Tunnel VoIP Phone Mobile VoIP telephones can be integrated into the site IP PBX phone system, providing seamless communications for site operations. Emergency Call Point Highly visible, vandal resistant unit, designed for simple one button operation, and to connect to a control room or supervisor phone. Electronic Tagboard Using Access Control, always know who is in or out of the tunnel at all times. Tracking Tags Lightweight, rugged tags have 2.4GHz transmitters and 125 khz receivers with internal antennas, and are designed for harsh tunnel operations and environments. Fiber Power Composite Cable Specially made composite cable that includes optic fiber cores (for data) and coper cores (for power). This simple concept with connectors at each end make the network a true plug and play solution. PAGE 11
PAGE 12 ImPact Digital Technology
Digital Technology -Network Radiating Cable LEAKY WIFI PAGE 13
WRN wireless repeater node The WRN (Wireless Repeater Node) is the industry leading mobile self-meshing network extender/ access point. Flexible Optimization Safe Features and Benefits WIRELESS MESHING Allows full Wi-Fi connectivity without any power or data cables PORTABLE Light weight with multiple hanging and mounting options LACHLAN WHEEL Simple, safe battery change out FLEXIBLE ANTENNA ARRANGEMENTS Fixed internal antennas, or can use variety of external antennas for special applications or signal requirements PAGE 14
Wireless Mesh Telemetry - Wireless Sensor Network Cutterhead intervention PAGE 15 15
OTHER APPLICATIONS IN TUNNELS Tunnel Access Control Tracking Personal Proximity Detection Ventilation, Fan and Pump Control Emergency Alerting Systems and Fixed Telephone Points Environmental Monitoring Conveyor Belt Monitoring PAGE 16
Electronic Tagboard vs. Traditional Tagboard Traditional brass tag tagboards can compromise tunnel workers safety and reduce productivity Electronic Access Control at each entrance and exit displays workers in/out of the tunnel on an Electronic Tagboard screen Access control and the Electronic Tagboard provide automated reporting of employee and subcontractor time in/out of the tunnel Traditional Tagboard MST Access Control Electronic Tagboard PAGE 17
Tracking of Personnel, Vehicles, and Equipment Tunnel dashboard software provides superior situational awareness, with real-time positioning of personnel, vehicles, and equipment on a map Wi-Fi tags are lightweight, rugged, & designed for harsh environments Tunneling activities can be monitored to identify operational issues Quickly take measures to minimize downtime and avoid bottlenecks Automate access and surveillance of dangerous areas with geofences Around heavy machinery, Areas with dangerous gases Unsecure areas, etc. PAGE 18
Proximity Detection MST proximity solutions: 1. Inner Zone Only 2. Inner Zone + Outer Zone PAGE 19
VENTILATION Reduce energy and maintenance costs by adding a Responsible Ventilation system. Utilizing monitoring and control systems, the location of personnel and equipment in the mine can be determined and utilized to create zones to control the auxiliary fans of the ventilation system. This fully automated system utilizes tagging and tracking components to determine the real-time location of personnel and mobile equipment and idle fans in areas where miners and diesel machines are not present. PAGE 20
Emergency Call Point vs. Break Glass Alarms False emergency evacuations cost job sites hundreds of thousands of dollars each year Example: A site has 12 emergency evacuations (break glass events) per year and only 20% constitute real emergencies. Each evac costs an average loss of six production hours (evac time, validate emergency, return to work time). With 100 workers this represents cost of $18k per incident, or nearly $200k/year (100 workers x 6 hrs x $30/hr = $18k) With the Emergency Call Point Press the EMERGENCY button Call is routed to supervisor phone or control room Determination made to evacuate or to send aid Supervisor or control room can remotely activate the full evacuation protocol (sirens, strobes, instructions) PAGE 21
TBM Guidance, Video Surveillance, Gas Monitoring, etc. Underground and surface fiber optic networks provide a highspeed data highway for all construction and subcontractor needs Guidance and Tunneling Process Control data for TBM s Video Monitoring through the Security Centre Remote ventilation control and ventilation on demand Use of Tablets for Engineers and Supervisors Fixed IP Phones for permanent operations Automated environmental monitoring (O2, CO, NO, NO2, SO2, H2S & Tempurature) Vehicle Intelligence Platform (VIP) for vehicle telemetry PAGE 22
PAGE 23 TBM Guidance, Video Surveillance, Gas Monitoring, etc. MST fiber optic networks provide a highspeed data highway for all construction and subcontractor needs Secondary divider text goes Guidance and Tunneling Process Control data for TBM s Video Monitoring through MST Security Center Remote ventilation control and ventilation on demand Use of Tablets for Engineers and Supervisors Fixed IP Phones for permanent operations Automated environmental monitoring (O2, CO, NO, NO2, SO2, H2S & Tempurature) Vehicle Intelligence Platform (VIP) for vehicle telemetry Guido Perez THANK YOU Business Development Manager +1-617-671-5747 / g.perez@mstglobal.com MST s vision k to add Our vision is to be the preferred globa partner for mission-critical unified communications and asset managem solutions in harsh industrial environm www.mstglobal.com
APPENDIX - TUNNEL PHONES - ACCESS CONTROL / KIOSK - VIP - PROXIMITY DETECTION - CROSS PASSAGES TUNNEL DATA TRANSFER - TELEMETRY PAGE 24 24
VoIP Phone Communications Voice over Internet Protocol (VoIP) phones connect directly to the MST tunnel and surface network giving users the ability to: Call direct to any user Push-to-talk to any user Use up to 24 channels Initiate an emergency broadcast Make calls to outside telephones Restrictions can be enabled based on each user, and call groups established as required Over 10,000 MST Phones are currently in use in underground tunneling and mining environments around the world PAGE 25
PAGE 26 Enrol, In and Out Kiosks
PAGE 27 Tunnel Face Data Network Dedicated access for machine data and guidance systems information from tunnel face mobile machinery to the surface
Inner Zone Proximity Detection vs. Outer Zone Tracking Two technologies operating independently but integrated from a user perspective MST proximity solutions: 1. Inner Zone Only 2. Inner Zone + Outer Zone Inner Zone Outer Zone Range Short (up to 25m) Long (up to 80m) Accuracy High (0.5m) Medium (10-50m) Response Time Rapid (0.2secs avg.) Medium (2 secs avg.) Technology Low Frequency Electro-Magnetic Ranging RFID (Wi-Fi access points using RSSI field ) Purpose AVOIDANCE: Critical hazards requiring the operator to take action AWARENESS: Notification to the operator of objects in the vicinity PAGE 28
PAGE 29 Inner Zone - Components
Inner Zone Field Generation Components CONTROLLER TRANSMITTER PANEL Primary logic processor Radio communications coordinator System management: Web server; Wi-Fi access; Firmware upgrades; Audit Logging. Interfaces to external control and display systems Generates an encoded, pulsed magnetic field Processes messages from tags on the backup radio channel Provides the machine operator with audible and visual alerts Contains a small transmitter, which creates a safe zone in the cabin PAGE 30
Inner Zone Field Detection Components PERSONNEL TAG VEHICLE TAG CAP LAMP TAG Rechargeable, portable tag Provides the tag holder with audible and visual alerts Powered from the vehicle s electrical system Drives electrical outputs, which can interface to external systems for: Vehicle control Operator display Integrates the personnel tag into the lamp housing Powered from the lamp battery Controls an alarm unit (a red light) in the head piece PAGE 31
Outer Zone Component Overlay Outer Zone capability leverages the Wi-Fi tracking infrastructure (IMPACT NS50) PAGE 32
PAGE 33 Tunnel Data Network How do we build the network? NS50, WAP, PSU and Composite Cable. All centrally managed by the MST control system on the surface
Wireless Mesh Telemetry - Wireless Sensor Network MST Wireless Sensor Network (WSN) provides a wireless mesh extension to our core ImPact Network to provide a easily deployable, highly reliable data link to remote sensors and transducers. A common application is to stream data from Geotechnical monitoring sensors back to the mine s network without the need for any data or power cabling. WIRELESS REPEATER NODE WSN GATEWAY UNIT REMOTE TELEMETRY UNIT PAGE 34 34
WSN wireless sensor network Wireless connection to sensors Open architecture Reliable meshing Low power consumption Multiple mounting options Robust and high IP rated The IMPACT technology suite is an industry leader in tunneling communications and digital infrastructure. The Wireless Sensor Network (WSN) utilizes the latest in wireless meshing technology to optimize communication and safety systems in hazardous mine environments. PAGE 35 35
Wireless Mesh Telemetry - Wireless Sensor Network A seamless system PAGE 36 36