Project Report BCCL
Project Report BCCL
PROJECT REPORT
ELECTRONICS AND TELECOMMUNICATION
________________________ ____________________________
Student Signature (Signature)
PREFACE
CERTIFICATE
ACKNOWLEDGEMENT
INDEX
BCCL/Coal Industry
Sound power
telephone
(Magneto phone)
Radar Based O.B Monitoring
system Slope stability system
Land Hailing
Shaft Cage
communication
(Wireless)
Wi-Fi based
communication
7
Surface communication
Analog Digital
Mobiles
Very high frequency (VHF) :- VHF refers to the radio frequency of electromagnetic waves
ranging from 30 to 300 MHz with corresponding wavelengths ranging from 1 m to tens of
meters. VHF is widely used for FM broadcasting, television broadcasting, military and local
mobile radio transmissions, traffic control long communications, radars, radio modems, as
well as in marine and air navigation systems.
The frequency band of VHF Communication is 30 MHz to 300 MHZ. The frequency allotted
by Wireless Planning and Coordination (WPC) wing of ministry of communication in VHF in
the band for free and for paid -
Walkie-talkies resemble a telephone handset, with a speaker built into one end and a
microphone in the other (in some devices the speaker is also used as the microphone) and
an antenna mounted on the top of the unit. They are held up to the face to talk. A walkie-
talkie is a half-duplex communication device. Multiple walkie-talkies use a single radio
9
channel, and only one radio on the channel can transmit at a time, although any number
can listen. The transceiver is normally in receive mode; when the user wants to talk, they
must press a "push-to-talk" (PTT) button that turns off the receiver and turns on the
transmitter. Smaller versions of this device are also very popular among young children.
MARR consists of one Base Station Unit (BSU) and 36 Remote Subscriber Units (RSU).
2. MART-
(a) Analog- An analog signal is any continuous signal for which the time-varying feature of
the signal represents some other time-varying quantity, i.e., analogous to another time-
varying signal. For example, in an analog audio signal, the instantaneous voltage of the
signal varies continuously with the pressure of the sound waves.
(b) Digital- A digital signal is a signal that represents data as a sequence of discrete values;
at any given time, it can only take on, at most, one of a finite number of values. This
contrasts with an analog signal, which represents continuous values; at any given time, it
represents a real number within a continuous range of values.
11
UPS
D.P. Box
D.P. Box
12
The GPS does not require the user to transmit any data, and it operates independently of
any telephonic or internet reception, though these technologies can enhance the
usefulness of the GPS positioning information. The GPS provides critical positioning
capabilities to military, civil, and commercial users around the world.
The GPS concept is based on time and the known position of GPS specialized satellites. The
satellites carry very stable atomic clocks that are synchronized with one another and with
the ground clocks. Any drift from true time maintained on the ground is corrected daily. In
the same manner, the satellite locations are known with great precision. GPS receivers
have clocks as well, but they are less stable and less precise.
Each GPS satellite continuously transmits a radio signal containing the current time and
data about its position. Since the speed of radio waves is constant and independent of the
satellite speed, the time delay between when the satellite transmits a signal and the
receiver receives it is proportional to the distance from the satellite to the receiver.
Evolution of GPS
The Global Positioning System, formally known as the Navistar Global Positioning System,
was initiated as a joint civil/military technical program in 1973. The joint program
combined the best aspects of several service-centric capabilities including TRANSIT,
TIMATION, and Project 621B to reduce the proliferation of navigation aids. GPS became
attractive to a broad spectrum of users worldwide. The Global Positioning System has been
successful in virtually all navigation and timing applications, and because its capabilities
are accessible using small, inexpensive equipment, GPS is being used in a wide variety of
applications across the globe.
13
Trilateration
Trilateration is determining a position by knowing your distance from at least 3 known
points. In GPS those known points are the satellites themselves. It is important to
understand that this is a simple exercise in trilateration itself, and not an exact
representation of how the process of GPS positioning works
GPS positioning works on two basic mathematical concepts. The first is called trilateration,
which literally means positioning from three distances. The second concept is the
relationship between distance travelled, rate (speed) of travel and amount of time spent
traveling, or –
Weigh Bridge
A weighbridge or a truck scale is a set of scale which is used to weigh bulk items. It is a set
of scale which is mounted by the weighbridges manufacturer on a concrete surface. It has
an electronic or digital monitor which displays the weight of the vehicle weighed.
Weighbridges are mainly used for weighing large vehicles like trucks or rail containers
where movement of goods is done through vehicles. Reliable and accurate weighing helps
the industry by giving them the exact figures to maintain their goods inward and goods
outward.
Fully Electronic WB
Static WB In Motion WB Semi Electronic WB
Mechanical WB
Rail WB Rail WB
Road WB Road WB
(b) Road Weigh Bridge – Different size, different capacity, and different number of load
cell.
16
PC
Printer
Digitizer
Junction
Box
8m 8m
WB Platform
19
Scalable and protocol independent, this technique works with Internet Protocol (IP) and
Asynchronous Transport Mode (ATM).
When data enters a traditional IP network, it moves among network nodes based on long
network addresses. With this method, each router on which a data packet lands must make
its own decision, based on routing tables, about the packet’s next stop on the network.
MPLS, on the other hand, assigns a label to each packet to send it along a predetermined
path.
1. When a packet enters the network through a Label Edge Router (also known as an
“ingress node”), it is assigned to a Forwarding Equivalence Class (FEC), depending on
the type of data and its intended destination. FECs are used to identify packets with
similar or identical characteristics.
2. Based on the FEC, the ingress node will apply a label to the packet and encapsulate
it inside an LSP.
3. As the packet moves through the network’s “transit nodes” (also known as Label
Switch Routers), those routers continue to direct the data by the instructions in the
packet label. These in-between stops are based on the packet label, not additional
IP lookups.
4. At the “egress node,” or final router at the end of the LSP, the label is removed and
the packet is delivered via normal IP routing.
⚫ Label value: holds the information for routers to determine where the packet should
go next
⚫ Traffic class field: sets Quality of Service priority and Explicit Congestion Notification
⚫ Time-to-live (TTL) field: limits the lifespan of the data, or how many hops it can make
before it’s discarded
⚫ Labels can also be stacked. The top label controls packet delivery; when it reaches its
destination, that label is “popped,” and the label underneath takes over for direction.
MPLS Terminology
o Forwarding Equivalence Class (FEC) – As noted in RFC 3031(MPLS architecture), this
group of packets are forwarded in the same manner (over the same path with the
same forwarding treatment).
o MPLS Label Switch Router (LSR) – Performs the function of label switching; the LSR
receives a labelled packet and swaps the label with an outgoing label and forwards
the new labelled packet from the appropriate interface. The LSR, depending on its
location in the MPLS domain, can either perform label disposition (removal, also
called pop), label imposition (addition, also called push) or label swapping (replacing
the top label in a label stack with a new outgoing label value). The LSR, depending
on its location in the MPLS domain, might also perform label stack imposition or
disposition. The concept of a label stack is explained later in this section. During label
swapping, the LSR replaces only the top label in the label stack; the other labels in
the label stack are left untouched during label swapping and forwarding operation
at the LSR.
o MPLS Edge-Label Switch Router (E-LSR) – An LSR at the border of an MPLS domain.
The ingress Edge LSR performs the functions of label imposition (push) and
forwarding of a packet to destination through the MPLS-enabled domain. The egress
Edge LSR performs the functions of label disposition or removal (pop) and
forwarding an IP packet to the destination. Note that the imposition and disposition
processes on an Edge LSR might involve label stacks versus only labels.
o MPLS Label Switched Path (LSP) – The path from source to destination for a data
packet through an MPLS-enabled network. LSPs are unidirectional in nature. The LSP
is usually derived from IGP routing information but can diverge from the IGP's
preferred path to the destination (as in MPLS traffic engineering, which is discussed
21
in Chapter 9, "MPLS Traffic Engineering"). In Figure 1-4, the LSP for network
172.16.10.0/24 from R4 is R4-R3-R2-R1.
o Upstream and downstream – The concept of downstream and upstream are pivotal
in understanding the operation of label distribution (control plane) and data
forwarding in an MPLS domain. Both downstream and upstream are defined with
reference to the destination network: prefix or FEC. Data intended for a particular
destination network always flows downstream. Updates (routing protocol or label
distribution, LDP/TDP) pertaining to a specific prefix are always propagated
upstream. This is depicted in Figure 1-5 where downstream with reference to the
destination prefix 172.16.20.0/24 is in the path R1-R2-R3, and downstream with
reference to 172.16.10.0/24 is the path R3-R2-R1. Therefore, in Figure 1-5, R2 is
downstream to R1 for destination 172.16.20.0/24, and R1 is downstream to R2 for
destination 172.16.10.0/24
o MPLS labels and label stacks – An MPLS label is a 20-bit number that is assigned to
a destination prefix on a router that defines the properties of the
o prefix as well as forwarding mechanisms that will be performed for a packet destined
for the prefix.
MPLS Label
The 20-bit label value is a number assigned by the router that identifies the prefix in
question. Labels can be assigned either per interface or per chassis. The 3-bit experimental
field defines the QoS assigned to the FEC in question that has been assigned a label. For
example, the 3 experimental bits can map to the 7 IP precedence values to map the IP QoS
assigned to packets as they traverse an MPLS domain.
A label stack is an ordered set of labels where each label has a specific function. If the
router (Edge LSR) imposes more than one label on a single IP packet, it leads to what is
called a label stack, where multiple labels are imposed on a single IP packet. Therefore, the
bottom-of-stack indicator identifies if the label that has been encountered is the bottom
label of the label stack.
23
In industrial plants, CCTV equipment may be used to observe parts of a process from a
central control room, for example when the environment is not suitable for humans. CCTV
systems may operate continuously or only as required to monitor a particular event. A
more advanced form of CCTV, using digital video recorders (DVRs), provides recording for
possibly many years, with a variety of quality and performance options and extra features
(such as motion detection and email alerts). More recently, decentralized IP cameras,
perhaps equipped with megapixel sensors, support recording directly to network-attached
storage devices, or internal flash for completely stand-alone operation.
CCTV is finding increasing use in law-enforcement, for everything from traffic observation
(and automated ticketing) to observation of high-crime areas or neighbourhoods. Such use
of CCTV technology has fuelled privacy concerns in many parts of the world, particularly in
those areas in the UK and Europe where it has become a routine part of police procedure.
• Security
• Cables
• Video recorders
• Storage units
• Display
By deterring criminal activity, CCTV security systems reduce your home and property
insurance costs. You are less of a target, so the risk is lowered, which means the price of
your insurance decreases too.
3. Peace of mind –
A camera system provides people with an increased sense of security and reassurance,
particularly in areas where the crime rate is high. Many of the more sophisticated models
are wireless, meaning they can be viewed and monitored from your smartphone or tablet.
4. Cost effective –
A CCTV system is a cost-effective form of security. Once the system has been installed, they
are very easy to maintain and require little reparations. Ensure that your cameras are
cleaned in order to receive the best performance from your system. Other than this, CCTV
systems will keep your premises secure for years.
26
Types of CCTV:
Main benefits:
• Optical zoom on these cameras means you can focus closely in on subjects
• Pan and tilt feature provide 360-degree field of vision
• Image resolution is usually impeccable so facial features can be distinguished
• Security team have full control of recording and can react to live situations
EPBAX
EPABX stands for Electronic Private Automatic Branch Exchange which is a private
telephone network used by the organizations and the companies for various types of
communication, either between the employees or outside the clients. PBX which is Private
Brand Exchange is a telephone exchange which is used by a particular office or business,
opposite to the one that a common carrier or telephone company operates for many
companies and businesses for the general public. Private Branch Exchange (PBX) is also
known as (PABX) Private Automatic Branch Exchange and (EPABX) Electronic Private
Automatic Branch Exchange.
EPABX is essential equipment that has made daily working in the offices and organizations
much smoother and simpler, especially the area of communication. This system is a
switching system which has enabled both internal and external stitching functions for any
organization. To select an appropriate EPABX one need to have proper knowledge about
the traffic pattern inside the office.
With the right utilization of the EPABX, all the internal and external requirements of the
organization are adequately served. With the advancement in the field of computers along
with the advent of microprocessors, the EPABX incorporates a lot of helpful features. The
boss can establish a hotline with his or her immediate
subordinates.
This telephone system helps businesses to cut cost by using a private branch exchange.
With the help of this system, businesses aren’t required to run a line from every phone in
the building to the telephone company’s central office.
The PBX Setup: Initially during the 20th century, PBX used to run on Analog technology,
but today it has gone digital. The typical private branch exchanges incorporate several
phone lines from outside the building which terminates at the company exchange.
It also includes several internal lines that lead to the exchange for the inside phones.
A computer is used that manages the calls and switches them to one line to another based
on the number dialled. This digital PBX doesn’t require a human operator.
28
PBX functions:
Functionally, the PBX performs four main call processing duties:
• Establishing connections (circuits) between the telephone sets of two users (e.g.,
mapping a dialled number to a physical phone, ensuring the phone isn't already busy)
• Maintaining such connections as long as the users require them (i.e., channelling voice
signals between the users)
• Disconnecting those connections as per the user's requirement
• Providing information for accounting purposes (e.g., metering calls)
In addition to these basic functions, PBXs offer many other calling features and capabilities,
with different manufacturers providing different features in an effort to differentiate their
products.
Common capabilities include (manufacturers may have a different name for each
capability):
• Auto attendant
• Auto dialling
• Automated directory services (where callers can be routed to a given employee by
keying or speaking the letters of the employee's name)
• Automatic call distributor
• Automatic ring back
• Busy override
• Call blocking
• Call forwarding on busy or absence
29
• Call logging
• Call Park
• Call pick-up
• Call transfer
• Call waiting
• Camp-on
• Conference call
• Custom greetings
Profits of EPABX:
• Cost Reduction:
There is no need to buy extra boards or expensive add ons while sharing this system. It can
easygoing scale and it’s easier to add more lines or increase severe capacity. You can also
opt for different vendors by eliminating the need to buy from a single vendor and reducing
the cost on moves and changes to the system.
• Choice:
There are various options to choose from the Internet server to the vendors. You can
choose which server or device to use your system z. You can choose the operating system
and also a variety of phones from different manufacturers.
• Flexibility:
Expand the network when there is a need. Even when you move premises or expand to
different places., they can easily shift without a change in the number. It can easily connect
employees who work from home to the office network. This also helps employees connect
to the IP phone while travelling.
• Sharing of resources:
Within the office, the employees can share phone lines. Several extensions may be
connected to a single phone line, this reducing the overall phone expenses. In case of
external calls, they may be routed from a single incoming mode and directed to the client’s
extension number.
• Easy programming:
Construction of EPBAX
It doesn’t not provide other necessary features and it’s time consuming when it comes to
install a new feature.
This limits the capacity of businesses with a considerable amount of travelling employees.
A solution to this is to upgrade to this system with integrated gateways installed.
• The initial set up and configuring of the devices take a considerable amount of time
and money. This can be mitigated by the use of virtual applications or by installing
an optimal network that avoids unnecessary equipment.
32
1. Traditional PBX
The traditional PBX phone system is landline-based and relies on a physical hardware box.
The bulky conventional telephone lines enter your office and are then connected to a PBX
box. Then these phone lines are distributed to every desk in your office, thus achieving
efficient telephony.
Compared to the newer advancements, the Traditional PBX systems are extremely
expensive as compared to IP PBX systems to set up.
The traditional PBX phone system is a low-grade PBX that is sufficient for small businesses
only. It can’t handle the requirements of prominent companies operating from different
locations. Further, the components of PBX require adequate space and start wearing with
time. There is a requirement of regular maintenance to make it work effectively. Thus, a
shift to the digitization of PBX was realized to overcome the challenges of traditional PBX.
It is equipped with advanced functionalities such as call stability, better call quality,
voicemail to email, video calling, mobile integration, etc. Some additional features include
advanced call routing, call accounting, disaster recovery, etc.
Definitively, a PABX (Private Automatic Branch Exchange), commonly known simply as PBX,
enables a company to create its own internal phone network. Internal calling and re-
routing of calls may be simplified as a result. PBX audio, video, instant messaging, and other
business communications are processed by a switch system that functions in the same way
as a modified traditional switchboard does.
34
35
RFID tags can store a range of information from one serial number to several pages of data.
Readers can be mobile so that they can be carried by hand, or they can be mounted on a
post or overhead. Reader systems can also be built into the architecture of a cabinet, room,
or building.
Uses:
RFID systems use radio waves at several different frequencies to transfer data. In health
care and hospital settings, RFID technologies include the following applications:
• Inventory control
• Equipment tracking
• Out-of-bed detection and fall detection
• Personnel tracking
• Ensuring that patients receive the correct medications and medical devices
• Preventing the distribution of counterfeit drugs and medical devices
• Monitoring patients
• Providing data for electronic medical records systems
The FDA is not aware of any adverse events associated with RFID. However, there is
concern about the potential hazard of electromagnetic interference (EMI) to electronic
medical devices from radio frequency transmitters like RFID. EMI is a degradation of the
performance of equipment or systems (such as medical devices) caused by an
electromagnetic disturbance.
usable form of data. Information collected from the tags is then transferred through a
communications interface to a host computer system, where the data can be stored in a
database and analyzed at a later time.
As stated above, an RFID tag consists of an integrated circuit and an antenna. The tag is
also composed of a protective material that holds the pieces together and shields them
from various environmental conditions. The protective material depends on the
application. For example, employee ID badges containing RFID tags are typically made from
durable plastic, and the tag is embedded between the layers of plastic. RFID tags come in
a variety of shapes and sizes and are either passive or active. Passive tags are the most
widely used, as they are smaller and less expensive to implement. Passive tags must be
“powered up” by the RFID reader before they can transmit data. Unlike passive tags, active
RFID tags have an onboard power supply (e.g., a battery), thereby enabling them to
transmit data at all times.
Smart labels differ from RFID tags in that they incorporate both RFID and barcode
technologies. They’re made of an adhesive label embedded with an RFID tag inlay, and
they may also feature a barcode and/or other printed information. Smart labels can be
encoded and printed on-demand using desktop label printers, whereas programming RFID
tags are more time consuming and requires more advanced equipment.
RFID Applications-
Libraries-
Until the RFID technology appeared at the logistics scene, the inventories in libraries were
manual because barcode doesn’t identify a book but a complete edition of a title. From
then so on, books are automatically entered and removed from the library’s inventory
thanks to being identified with RFID labels one by one.
37
Underground Communication
Communication is important in every industry and field, it assumes critical importance
when the communication is required to be made underground; in fields like mining and
tunnelling etc. The underground communication systems are required for ensuring safety
of workers and increasing the productivity. In underground applications (mining etc.), the
disasters like collapse of mines (especially in coal mines) is a frequent incident and a
reliable and effective communication system is essential for identifying the location of
trapped miners and their rescue from the debris.
An effective underground communication system increases productivity and reduces
operational costs by saving the machine breakdown time and providing immediate passing
of message from hundreds of feet under the ground to the concerned resources and
personnel above the ground. In the absence of an effective communication system a miner
has to wait for the message to be delivered and the mining operation has to be suspended,
which results in lost production. If such a scenario of suspended operations is repeated
dozens or hundreds of times per week, the loss in production would be substantial.
Two-way communications (voice, video & data) between underground and surface
personnel, a tracking system that allows surface personnel to determine the location of
anyone trapped underground and a system that can withstand disasters are essential
requirements of an underground communication system .In addition to the basic
application of miner communication with the staff above the ground and location
38
information, the underground wireless systems are also used for a number of important
tasks, for instance, remote monitoring / control of mining equipment, data acquisition for
the various sensors throughout the mine (e.g. seismic monitoring) and real-time access to
mine operating information. These tasks involve communication with a mobile worker,
device or piece of equipment.
• In the past, almost all the underground communication systems were wired, which
posed serious limitations in meeting the essential requirements of an underground
communication system. The wired systems are difficult to deploy in inaccessible
places especially due to non-symmetric mine topology and complex mine structures.
Wired systems are also unable to withstand the disasters or accidents in
underground mines as the communication with the trapped miners is cut off.
• On the other hand, wireless communication systems are easy to deploy even at
inaccessible places under the ground and are able to withstand the disaster
conditions. Using appropriate wireless communication systems, location of each
trapped miner can be accurately determined resulting in successful search and
rescue operations. Therefore, wireless systems are the most optimal, convenient
and reliable communication systems for underground applications like mining and
tunnelling.
• However, the typical surface wireless communications do not work successfully in
underground scenarios, such as traditional cellular signals do not propagate through
rock. The radio waves for wireless communication, propagating underground suffer
39
• Magneto phones.
• Paging phones.
• Voice powered phones.
• Trolley carrier phone system.
• Hoist rope system.
RF (Radio Frequency) Transceivers- The RF transceivers are one of the most commonly
used and successful equipment in the underground mines especially for straight gallery
communications. Different frequency ranges from LF (Low Frequency) to VHF (Very High
Frequency) and UHF (Ultra High Frequency) are useful in different scenarios, especially
depending upon the structure of the mine and the type of mineral being extracted.
UHF (Ultra-High Frequency) Transceivers-In the UHF band, attenuation is relatively low in
the straight mine areas and is significantly higher when the signal propagates around a
corner or when a large machinery is in the propagation path. Corners and bends in
underground mine galleries act as obstacles to the propagation of UHF waves. The problem
cannot be resolved by adopting higher wattage of transceivers due to intrinsic safety limit
in hazardous areas (mines). To improve the communication, the signals are amplified by
placing active antennas near the turns of the path.
41
IRNSS SYSTEM
IRNSS ARCHITECTURE
The IRNSS architecture mainly consists of:
➢ Space Segment
➢ Ground Segment
➢ User Segment
Figure 1 depicts the IRNSS architecture
42
USER SEGMENT
The User segment mainly consists of:
➢ Single frequency IRNSS receiver capable of receiving SPS signal at L5 or S band
frequency.
➢ A dual frequency IRNSS receiver capable of receiving both L5 and S band frequencies.
➢ A receiver compatible to IRNSS and other GNSS signals.
Figure 2 specifies the radio frequency interface between space and user segments. Each
IRNSS satellite provides SPS signals in L5 and S bands.
IRNSS SERVICES
Standard Position Services (SPS), an open service without encryption and Restricted
Service (RS), an authorized with encryption are the basic services offered by IRNSS.