EP2449730A1 - Réseau de communication et procédé de communication sécurisée dans des structures de tunnel et de mine - Google Patents
Réseau de communication et procédé de communication sécurisée dans des structures de tunnel et de mineInfo
- Publication number
- EP2449730A1 EP2449730A1 EP10721778A EP10721778A EP2449730A1 EP 2449730 A1 EP2449730 A1 EP 2449730A1 EP 10721778 A EP10721778 A EP 10721778A EP 10721778 A EP10721778 A EP 10721778A EP 2449730 A1 EP2449730 A1 EP 2449730A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- network
- computers
- computer
- communication
- emergency
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L12/437—Ring fault isolation or reconfiguration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
- H04L12/40169—Flexible bus arrangements
- H04L12/40176—Flexible bus arrangements involving redundancy
- H04L12/40202—Flexible bus arrangements involving redundancy by using a plurality of master stations
Definitions
- the present invention relates to a communication network in an underground structure, wherein underground network computers are arranged at a plurality of nodes, which are normally connected to a central system computer unit in a normal case, the network computers being adapted to cause an emergency by loss of connection to the central computer It also recognizes a central system computer unit and then initiate an emergency mode, and further relates to a communication element for such a network and a method for safety-related communication.
- the present invention seeks to provide a communication network, with which the mine safety is increased. Further, it is an object of the present invention to provide a method of operating a communication network that can be used to assist mine safety in an emergency.
- a communication network is characterized by the features of claim 1.
- a communication work in a downhole system comprises a subterranean ring network of network computers connected to an overground central system computer unit, each computer having an overview of the overall structure of the ring network and having an assigned network status.
- a plurality of these network computers are configured to search for an alternative communication path in the event of a connection break between network nodes to maintain the communication, wherein a plurality of the network computers are provided with or connected to at least one sensor for receiving and configuring information relating to the environment to pass this information to other network computers of the ring network and / or to the surface-mounted central system.
- the network computers pass current information relating to the environment to the overhead central system and to other network computers.
- the network computer with the master status can provide said information relating to the environment in emergency mode to all other network computers of the network island and is also designed to take over network administrative functions of the central system in the network island created by the connection interruption.
- a method for operating a communication network is characterized in claim 9.
- the method according to the invention avoids the disadvantages of traditional communication and relies on the philosophy of using a standard communication over Ethernet.
- all data and information generated in tunnel or mine operations is exchanged via network protocols, such as Weather data (ventilation speed, temperatures, pressures), gas information (e.g., CO, CH4, ...), operating data, machine information, control commands, video surveillance data, voice communication via PA (public address systems) or with stationary or mobile terminals (telephones), etc.
- a core of the invention is on the one hand the use of network information for security purposes and on the other hand, the use of the active network components as active
- the underground network functions as a dynamic, situation-dependent security system. This creates based on e.g. on the information from the "sensor” along with other safety-related information (such as gas or ventilation data) dynamic behavioral rules to the employees who are in the area of the "network islands” forming by interruptions.
- the devices also use information, e.g. about the locations of emergency exits, fire extinguishers, rescue chambers, etc., which were downloaded to the individual network devices during normal operation. This information is then passed on to the mobile devices either via displays on the device, via existing display devices such as PCs or TV monitors, or wirelessly.
- Each of the underground network nodes has a logical image of the network and the statuses of the individual connections. The ring or multiple redundancy ensures high reliability.
- each network node has access to environmental information (air speeds, gas measurements, etc.) which are exchanged over the network.
- Active network components such as switches and access points usually only fulfill passive network functions, ie they are not active part of any Applications.
- the invention is based on the fact that in each active network component, a control unit, eg as an additional computer, is installed or locally assigned (or one of the CPU's already present in the switch or access point), which makes the device an active component of the Applications specifically in terms of safety.
- a control unit eg as an additional computer
- other application functions can also be taken over by this "network computer” (such as the tracking of machines or persons).
- the second point mentioned above can be to initiate rescue operations both from the pit side and from the central side outside the mine.
- both sides can know about the possibly still existing connections and thus coordinatable measures "behind" an accident point, thus an interruption.
- the networks are designed to provide ring redundancy. However, if a ring is interrupted in two places, then u.U. an island that can not be reached anymore.
- the ring redundancy can be further secured by "cross-connections" similar to a spider web ("mesh").
- crosses-connections similar to a spider web (“mesh”. This can be used to set up a network infrastructure that corresponds exactly to the structure of a tunnel system, mine or large building complex: r
- the network is able to always look for alternative ways of maintaining the communication, should a connection fail ("self-healing network"), it also automatically creates an image of the physical structure of the (underground) building over the current status of all network connections.
- safety-relevant information such as data from the gas sensors or weather sensors (air speed, temperatures, etc.) are fed directly into the local grid at the point of origin.
- This can be done via direct connection of the sensors to the network computer, via sensor networks, via separate network-compatible connection devices or via the connection of a local weather computer.
- the sensor data is accessible to the nearest network computer. This possibly also carries out the pre-processing of the data and / or transforms it into human-readable
- the network computer forwards the information to "over-centered" central systems.
- each network computer within an island places its assigned
- each active network computer has a complete overview of the network's overall structure, or at least in its local catchment area, and thus has network status, by itself or in coordination with its neighbors, up to all relevant emergency exits and / or rescue equipment (rescue cabins, etc.).
- This status information about the active and available or unavailable network connections are permanently exchanged between the network computers in normal operation and in emergency mode
- the term "full overview" advantageously means that the actual local situation and the connections of all the individual computers are present and that these Data can be linked to each other. their content can be represented comprehensibly on a display for human observers.
- All individual computers here means logically linked “local Rechmer”, which means computers that belong to a connected shaft complex, so network computers, through their physical location could possibly cause an emergency route physically.
- the information in such an overview can be regularly updated safety information, information on locations of emergency exits, rescue rooms, etc., which are displayed in emergency mode priority and possibly automatically in change.
- Each network computer permanently keeps the logical or physical connections to its "neighbors.” This can be done by purely logical techniques and
- Control telegrams at IP level are made as well as by querying the link status via the in the
- Network computer installed or connected to the network computer switch.
- Queries are then preferably made via standardized methods, e.g. SNMP.
- the statuses are reported to the central office and / or to the accessible network computers during normal operation. This can e.g. via broadcast telegrams.
- the absence of the message from a network computer then leads to an error status and the system switches the
- These status messages may also include the environmental data associated with the network computer as well as information about the device itself (such as the battery status). This creates a self-monitoring of the network which is of great importance in emergency mode. In normal operation, for example, this is important for the maintenance and repair of the network.
- Each network computer also has the corresponding information about escape routes and safety equipment, which are eg loaded during booting from a central server and then permanently stored in the network computer and updated in case of changes, so that they are accessible in an emergency in the current form, even if the connection to the corresponding This information, which is available in the network computer, will provide important evacuation and emergency response functions for those in the emergency area, as described in the following sections: Splitting the networks in emergency mode:
- connection of the underground network to the central facilities e.g. is interrupted over days or in a control center, even if it is redundant.
- one or more network islands emerge, which then remain fully or partially functional.
- Such an island may consist of one or more active network computers.
- the emergency mode is recognized by the active network computers in the (or the) still functioning islands in that there is no longer any connection to the central systems.
- the network computers in an emergency mode in which they try even at certain time intervals to establish contact with the no longer existing "neighbors" in order to enlarge the island and possibly recognize when the contact with the Central systems is restored.
- a network computer in an island handles the important network administrative functions of the central system, such as:
- Which network computer takes over these additional administrative functions is negotiated by the network computers, for example via random principles: This can be done, for example, by a network computer which identifies the failure first by sending a broadcast telegram informing all others in the island that it itself network administrative central functions. Alternatively, the computer in the center of the island can always take over the central functions or determine which of its neighbors has which central function to take over. In this case, the one network computer becomes the master which is furthest from all end points of the network. This is the most sensible in terms of safety, as it can be largely ruled out that this computer is close to a danger point. In the calculations for determining the master computer can also enter the battery status of the network computer, so that it is avoided that a computer with a low battery capacity is named master. All other computers are thus automatically each a slave.
- Every network computer within an island can get a picture of the complete security situation even without a connection to a central system.
- This refers in particular to the location of emergency exits and the way there, as well as the condition of the routes to the emergency exits.
- an existing network connection is preferably interpreted as "this route is probably usable for an evacuation", whereby existing environmental sensors can point to dangers such as toxic gas concentrations or water penetration.
- This information will be passed on to the people using the procedures outlined below.
- basic information about the localities can thus also information about the length of routes and the position of other rescue equipment (oxygen, rescue masks, carrying, fire extinguisher etc) are made available.
- the computer can create a security information from the available information and display it visually or acoustically on a display or forward this security information via network / WLAN to other stationary or mobile subscribers.
- Dynamic evacuation aid :
- a processing unit in a network computer or in the central system interprets the values of the environmental sensors as well as the status of the connections to neighboring computers and recognizes e.g. the exceeding or falling below safety-relevant thresholds resulting from tables or functions. This will become one or more
- Derived output signals that indicate escape routes or refugee rooms and / or that are suitable to visualize such paths or rooms on connected display units or the likely blocking of a possible escape route (eg by the presence of very high temperatures and / or CO measurements) clues.
- the probable unavailability of the escape route is supported by the temporal connection with a termination of the network connection to a neighboring network computer.
- the processing unit generates a predefined data telegram, which all participants in the network can receive and possibly interpret.
- This telegram contains at least the position information of the sensor and / or connection signals entering the processing and the corresponding sensor value and / or the consequences to be drawn from this sensor value such as: “Presumably it burns here" or "This way is probably not available for evacuation "
- the processing unit sends the telegram to all subscribers in the network (per
- a processing unit in the receiving devices interprets the telegrams and displays them on a display or switches signs or light signals accordingly, so that employees can be directed in an alternative direction (see descriptions below, such as lighthouse function, display or mobile devices). If there is still a connection to the central systems, of course, corresponding behavior statements can be downloaded dynamically from the central devices to the network computers. This information can be passed on to all network computers in the corresponding island to the persons who are within their reach. This is done, for example, via the method steps shown in the following points:
- each network computer recognizes the transponders in its vicinity via the transponder reader or via WLAN.
- the network computer forwards this information to a central system.
- Movement information with transponder number and time stamp over a period of at least one shift in its own built-in memory is
- a master computer determines the most favorable meeting point for all persons in the area so that they can either come to the meeting point ("Muster Station") with a shortest possible distance or meet at a rescue point (rescue room or similar)
- the persons for example via the "lighthouse function" or displays and dynamic emergency signs are led to the meeting point.
- the persons should only continue if the network computers signal them (eg via changing colors of the lighthouse function) that there are no persons in the area "behind” them: the absence of black arrows in FIG. 4 signals person-free areas in a partially evacuated area Network island while the other black arrows are still people "behind” the network computers.
- the gray arrow indicates the likely best escape route.
- transponder information which may possibly take place at wavelengths other than the network communication, allows mapping of the evacuation situation and includes an advantageous embodiment of the invention.
- a flashing LED on a network computer signals the way to a rescue device such as a rescue cabin or an open emergency exit. This can apply to both normal operation and emergency operation.
- these "beacon functions" may be configured to convey the following messages based on colored flashes or flashing signals: Color coding could be constructed as follows:
- This network computer is connected to a device that has network contact with an emergency exit or a rescue device;
- the network computer has a connection to a device that has network contact with an emergency exit or a rescue device. At the same time there is a danger of gas on this way ("use rescue masks");
- the network computer is functional.
- color codes or flashing signals can serve to indicate or signal to persons-free areas that there are still persons in the area "behind" the network computer (see above) Details about the respective states can be displayed via a display (see below) or wirelessly via a display PDA or mobile phones (see below) are retrieved.
- a display can be installed (or connected to), which permanently or only at the touch of a button represents safety information or staff information.
- safety information or staff information Such information may e.g. dynamic emergency exit information: Depending on the network information on the condition of escape routes, the direction of an escape route is dynamically displayed.
- This standard arrow then changes the direction depending on the current state of the escape routes and thus always points in the direction of a probably available emergency exit and thus offers a significant advantage over the static symbols, which always
- the display can be activated at the push of a button to extend the battery life in case of emergency, thus leading the LED (see above) to one of the next emergency exits, although it could be blocked depending on the situation
- the device and detailed information are available at the push of a button via the display.
- the entire situation can be displayed, for example, in graphical form, whereby the routes to emergency exits as well as the positions of emergency equipment can be displayed in a schematic diagram or in a scale-accurate 3D image.
- additional information can be entered and provided to all persons, such as "the emergency exit indicated as blocked 1 but available (or was made available by us) etc. This information is then distributed in the network and affect the presentation of the situation image. This can also include the locations of people in the pit image (see above) Information transfer to mobile devices:
- the network computers can have WLAN access points or have network contact with them, in an emergency the relevant information can also be made accessible to mobile devices.
- the mobile terminals receive their information e.g. about environmental data such as gas sensor values or airspeed information from central servers.
- Each network computer or a central network computer in an island makes this information available to mobile devices. This is done e.g. via web technologies such as web browsers or JA VA applications, via XML datagrams, via SMS-like procedures or via specially defined datagrams.
- Each network computer can have a microphone unit consisting of loudspeaker and microphone as well as additional keys. This can be installed in the network computer or connected separately to this or to the network.
- PA Public Address
- the latter can also be generated automatically by the network computer, for example if a machine drives into the wireless area of a network computer, then this and the next network computer in the chain in front of the approaching machine warns via a sound signal similar to a start warning or via an automatically played voice message.
- the intercom stations are used to communicate the people who are in a network island or with a central office if there is still a connection.
- intercom stations are interconnected to a single group so that all persons in the island can overhear all conversations.
- voice communication capable mobile terminals and stationary phones are included so that even from these devices from a communication with all other people in the field is possible.
- the central functions of the voice communication (“SIP server") are taken over by the central device, which coordinates the administrative network functions or by another network computer in an island, if there is no connection to a central system (more).
- energy supply components must be switched off, if necessary far away.
- These can be connected to the network computer modules that are connected to the power switching devices via the network.
- the environmental information is shared, which were determined by the sensor associated with a network computer.
- the recognition of the sensor information or the derivation of safety-critical and Abschaltrelevanter states can be done by the network computer directly by software, if this is permitted by law. Otherwise, an external sensor unit assumes this task and the network computer provides security-relevant communication to the shutdown unit.
- the shutdown unit is conventionally either connected to or built into a (remote) network computer or directly attached to or installed in a power switch.
- Recognition and shutdown units are permanently in direct network contact with each other and exchange telegrams on the security status. These telegrams include sequence and timestamp information as well as authentication information. Your content is preferably secured against misuse by encryption. Will the network connection interrupted, the telegrams remain off and there is an immediate shutdown for safety reasons. The same occurs in the case of inconsistencies in the telegrams or if these signal a switch-off-relevant sensor information.
- the energy shutdown affects in particular medium voltages for supplying the mine with energy in productive use.
- the network elements which are used according to the invention or are used by the method according to the invention are on the one hand provided with housings protected against eg sparking and have either a battery-supported voltage supply for emergencies.
- a network computer may be connected directly or via a connected or networked peripheral device e.g. triggered by the position information of people and machines in the network trigger audiovisual warnings when e.g. Approach machinery or vehicles to the area or detect other potential hazards via sensors or data messages from the network.
- data messages may e.g. can also be generated by an employee dialing into one or more devices via specific telephone numbers and announcing a message himself or thereby triggering the playback of a prepared message via the public address system and / or display. This can also be e.g. via the sending of text messages generated manually by persons or automatically (e.g., by moving machines).
- rescue equipment can optionally be connected, which can be used by rescue teams, such as rescue teams. Fire or mine rescue can be used.
- This communication can then be e.g. also contain multimedia information from mobile cameras.
- connections for speech combinations may be present, which are e.g. are installed in rescue masks or full protective suits. This also allows for communication when individuals need to communicate with each other under respiratory protection conditions, as well as for rescue teams, and when rescue teams try to contact other people in the area, e.g. by using the speaker functions.
- connections for traditional communication lines can be present, as they are already today by rescue teams. used in mines such as e.g. Prickertechnischen.
- interface devices which can handle the VoIP-based voice communication of the network with the radio system, e.g. connect the fire department. Because the range of the radios is limited underground, the rescue teams can also communicate over a wider area, because parts of the radio link are covered in digital form over the network (for example via VoIP). On the other hand, direct communication from the rescue facilities to people in the network e.g. possible via the microphone units.
- These devices are either installed in a network computer or connected anywhere in the network. They can be permanently installed on the network, or they can be temporarily attached during a network deployment.
- Such a mobile unit consists of a cable drum with a rolled-up industrial fiber optic cable or with a copper-based network cable ( Figure 4).
- the electronics of a network computer as well as an access point and a switch are built into the core of the drum.
- a battery pack can either be installed and / or be connected mobile.
- a power supply via a hybrid cable is possible, in which both fiber optic and a supply line are included.
- the network cable of the drum is connected to a working switch or a network computer and rolled out.
- the cable drum is stored or suspended.
- the power supply and antennas as well as other peripheral devices are connected to the connections in the core of the cable drum.
- the built-in access point also allows wireless communication in the vicinity of the drum. This is needed for e.g. wireless voice communication devices, wireless sensor units for environmental measurements, cameras or devices which monitor the vital data of the persons in the rescue team and forward them to the operations management so as not to expose these persons to unnecessary health risks.
- the cable drum as an element of a communications network can also be used in other temporary networks, such as temporary L-ANs or where mobile communication must rely on temporary micro-transmitters.
- the next cable drum is then connected to the network ports of the switch in each cable drum. This allows a completely separate and mobile network - even over longer distances - be built.
- the drums can also be used to temporarily put defective network links of the permanently installed network back into operation in order to determine, for example, whether there are still persons in the newly connected island.
- the rescue teams have the ability to query via the connection with the stationary network computers, which mobile devices are currently in the area or which were in this area when the emergency mode was initiated.
- the device registers with the central system or actively searches for one or it is found automatically by the central system.
- a user After authorization, a user enters the locality (position) of the system in the corresponding pit coordinates on the central system.
- the user may set additional administrative initialization values.
- the device logs on after switching on and connecting the network to the central system
- the central system notes that a different hardware has been installed instead of a device previously located at this logical location of the network.
- the central system asks a user if the device has been installed as a direct replacement in the same position as the legacy system. If so, then work continues immediately with step 4. If not, then before the execution of step 4, a processing of steps 2 and 3 from the Managerinitialmaschine. 2.4.
- the network computer asks its "neighbors" for their positions and the
- the central system either loads the associated infrastructure data (length of the network connections and thus the tunnel route lengths) between the
- Network computers down to the network computer. These connect the information with their logical network data and thus know the distances between the individual network computers. Alternatively, the network computer can also request this data from the central system (or from an already installed "neighbor"), which avoids unnecessary data transfer across the entire network.
- the positions of emergency exits and rescue equipment are also downloaded from the central system or from the neighbor.
- special coordinate and position dependent applications can also be downloaded from central systems which give the device special tasks, e.g. depending on the position of the device, such as: playing certain text warnings via the loudspeaker system or turning on the display when people pass nearby or when vehicles or machines are approaching.
- the device goes into normal operation and can fulfill the tasks according to the method.
- the systems are thus prepared for their local tasks in support of mine safety.
- the configuration can also be done manually, for example via a web browser
- the device In emergency mode, the device writes all safety-relevant data in a tachograph, which is mounted in read-only memory. Thus, data on the behavior of persons and machines, their positions, etc., can be retrieved later, if necessary.
- the system consists of a computer, the connected local peripherals and the network connections between the local units and central systems.
- the overall system In normal operation, the overall system is a self-contained unit, which in itself facilitates the mining operation and optimizes the resources used for investment, installation, operation and maintenance by standardizing the communication.
- the Ethernet-based system is open to allow the coupling of future devices and systems.
- the overall system consists of a number of intelligent network computers underground, which, together with their associated peripherals, form the core of the functionality. These implement the method explained above.
- the necessary peripherals can be installed directly in the device or connected directly to the device via various interfaces or connected via the network.
- Fig. 1 A & B is a schematic representation of a ring network in normal operation and in
- FIG. 2 A & B a schematic representation of a meshed ring network during normal operation and in the event of a fault
- FIG. 3 shows a schematic representation of a pit area cut off by network interruptions with symbolic displays on the network computers (arrows) for dynamic evacuation and for indicating whether subregions are evacuated or not;
- Fig. 4 is a schematic representation of the side of a cable drum with a in
- FIG. 1A shows an example of a network in a schematic representation as a ring network in normal operation and in the event of a fault.
- the switch 10 is shown as a symbol image for the network structure arranged outside the underground facility.
- Each ring has, for example, eight Netzwwerkem felt Al to A8 or Bl to B 8, which are generically referred to as computer 20.
- computer 20 may include sensors for receiving environmental data such as temperature, gas concentrations, etc.
- computer can have conspicuous external display elements for the transmission of visual warnings and corresponding speakers.
- network interfaces are provided and an input unit such as a keyboard and a display, in particular for displaying information regarding, for example, the locations of rescue equipment, the state of dynamic evacuation and area release messages (see description of FIG. 3), etc.
- FIG. 1B now shows an accident, where at several points 22 the connections 21 are broken or destroyed.
- the hatched illustrated computer 23 are isolated and are no longer connected to the rest of the network work. You can call them as advertisers 23.
- the computers in Fig. 23 then enter an emergency mode, with one of the computers of each island A3 to A6 and B4 and B5, respectively, assuming a master status as described.
- FIG. 2A shows a ring according to FIG. 1A with wired or wireless cross-connections 41, 42, which are arranged in accordance with mining technology aspects.
- the connections 42 are activated, while the connections 42 remain optionally unconnected. Searching for the connections 41 (either wireless or wired), allowing the reconnects of the islands 31 and 32 computers, is one of the functions of the islands in the emergency mode and the respective master computer.
- the individual network computers are preferably connected together in rings or in vernaschten rings to ensure the greatest possible communication security.
- there is a network cable in each tunnel section which then logically covers an entire mine and the network redundancy corresponds exactly to the redundancy of the escape routes in a mine.
- the communication work in a downhole system comprises a subterranean ring network of individual network computers. At least one, preferably a plurality of network computers are connected via different lines to a surface mainframe computer unit.
- a cable is understood to be a cable-based Ethernet cable, a corresponding coaxial cable, an optical fiber cable or wireless radio links (WiFi, WLAN).
- Each computer has an overview of the overall structure of the ring network and an assigned network status. Overview of the overall structure is understood to mean the network structure according to FIG. 3 as well as the infrastructure of the underground structure itself, such as the distribution of safety-relevant locations and objects such as emergency rooms, fire extinguishers, emergency exit information etc. This also includes indoor climate data such as query options or display options of temperatures, gas concentrations, etc ..
- the network status corresponds to the capabilities of the device. It can have more substantial computers and smaller computer units in such a structure.
- Part of the status information is the variable status information normal operation or emergency operation.
- Immutable status information is information about whether the computer is due to take over network administrative tasks and whether it has taken over.
- the trigger for a change of status is the exceeding of a threshold value (such as gas concentration measured values of a sensor, temperature readings of a sensor of the computer) or of a triggering signal (termination of the connection to one of a group of certain other network computers, arrival of an emergency signal from another computer the network or a mobile device of an employee) etc.
- a threshold value such as gas concentration measured values of a sensor, temperature readings of a sensor of the computer
- a triggering signal termination of the connection to one of a group of certain other network computers, arrival of an emergency signal from another computer the network or a mobile device of an employee
- a plurality of the network computers are configured to search for an alternative communication path in the event of a connection interruption between network nodes in order to maintain the communication; everyone does not have to be able to do that.
- a plurality of the network computers are provided with at least one sensor or connected directly or via the network to receive environmental information and are adapted to relay this information to other network computers of the ring network and / or to the over-center system. This concerns the said temperatures; Gas concentrations; Air movements and ventilation information, etc., the network computers in normal operation such current environmental information to the over-surface central system and other network computers pass. If one or more interruptions corrupt the network structure; then arise so-called network islands.
- One of the said network computers with the network status emergency operation then assumes a master status and informs all other network computers of the network island that they should assume a slave status (slave status).
- slave status For the selection of the master computer, various features can be decisive. It can be one of the faster computers of the network island; the first computer that detects this circumstance; the central computer in the node of the formed island; etc. It is also designed to take over network administrative functions of the central system in the network island created by the connection interruption.
- This master-state network computer then receives said environmental-related information in emergency mode and communicates it to all network island network computers.
- all computers in the network island determine the status of the sensors assigned to them and communicate them to all network participants, for example via a broadcast telegram. This makes it possible for the at least one computer, in interaction with the Info ⁇ nationen still available in the island, dynamically on shelters, rescue routes; Dangers from environmental conditions, etc. should be pointed out. That can 2 then every slave calculator.
- the tradable information may also include telephony over Ethernet cable (VOIP), on the one hand as a telephony operation or as a broadcast, so that all persons concerned in such a network island with all other stakeholders whose number they may not need to know communicate; the location of people and material from registered handsets, which is recorded so that it is readable later.
- VOIP telephony over Ethernet cable
- the master computer process this environmental information.
- This processing can also be done distributed by the computers of the network to which the sensors are connected. This will also preferably be the case because even smaller network islands have the advantage of merging and processing the environmental information in one place.
- Another function is to attempt to self-heal the network by looking for alternate routing links 41, 42 to the central computer over days, as shown in FIG. 2B.
- Active ping signals are sent on the one hand to the known fixed addresses but also in the broadcast, in order to connect with mobile units, which are introduced, for example, by rescue workers into the underground system, which then establish the connection with the transmission network.
- FIG. 3 shows a schematic representation of a pit area 50 cut off by network interruptions with symbolic displays on the network computers (arrows 51) for dynamic evacuation and for indicating whether subregions are evacuated or not.
- the pit is represented by two shafts 5.
- the network system 6 is shown by a schematic diagram.
- the connections 21 extend through the shafts 5 in one or more lugs, of which in Fig. 3 is shown a schematic diagram.
- the computers 20 and the connections 21 underground are a schematic representation of the lugs of a particular sole mesh connections 41 and 42 may, for example, just a connection between two soles, so include two tunnel systems on underschidlichem Tiefennievau.
- Computers 20 in a region 50 are cut off from the transmission network 6 by three interruption points 55, 56 and 57. The result is a computer island 33 without connection to the outside.
- the computers 20 of the island organize themselves under a master computer 29, for the various criteria mentioned here are cumulative and weighted as appropriate.
- a computer 29 sufficient power with sufficient battery backup in the middle of the cut island.
- the master computer decides that the most meaningful rescue route goes in the direction of the computer 27 and an exit via the termination point 57 is the most promising.
- the computers 27 and 28 may be referred to as edge computers with respect to the existing island. Therefore, an arrow icon 51 is shown on all computers with a corresponding display, in which direction miners should go, appearing on one of the computer 20 with a corresponding display.
- Fig. 4 shows a schematic representation of the side of a cable drum 100 with a built-in core 101 of the cable drum 100 with fiber optic or hybrid cable network node with fiber optic (L WL) - 103 and wireless access 102, power supply 107 and additional peripheral ports 104 for temporary Rescue teams connect networks or self-rescue temporary networks to rescue operations This allows rescue teams to connect to underground network islands 50, since temporary connections between network islands 50 and a functioning external network 6 are restored.
- an industrial fiber optic cable 105 or a copper-based network cable is rolled up. The one end of the cable 105 can be plugged into a network computer 20 connected to the external computer, after which the users of the cable drum 100 then roll them out according to their advance.
- the drum 100 is laid down or erected, for example via a frame on the hub 106, to connect further components.
- the other end of the cable 105 is preferably already connected or spliced from the beginning with a de-energizing inside plug / socket of the cable drum.
- the elements 102, 103 and 104 are directly operational, especially if a power supply 107 is connected.
- a voltage supply can also be integrated in the drum 100.
- To the fiber optic interfaces or Ethernet interface 103 may then be connected to the post-drum 100 or, if an interruption point 57 has been overcome, the network island 50 may be connected.
- the core 101 of the drum 100 are preferably also the electronics of a network computer (so to speak, a computer with the possibilities of a slave computer 20) and a
- a battery pack can either be installed and / or be connected mobile. Also, a power supply via a hybrid cable is possible, in which both fiber optic and a supply line are included.
- Network cable of the drum is connected to a working switch or a network computer and rolled out.
- the drum of Fig. 4 can also without the
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Alarm Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
L'invention concerne un réseau de communication dans un système souterrain (5) qui comprend un réseau annulaire, disposé sous terre, d'ordinateurs (20) qui sont reliés à une unité informatique de système central (6) sur terre, chaque ordinateur ayant une vue d'ensemble de la structure totale du réseau annulaire et un statut qui lui est affecté. Une pluralité de ces ordinateurs de réseau (26, 27, 28) est conçue pour trouver une voie de communication alternative dans le cas d'une interruption de communication (55, 56, 57) entre noeuds de réseau pour maintenir la communication, une pluralité des ordinateurs de réseau (20) étant pourvue d'au moins un capteur ou reliée à au moins un capteur pour enregistrer des informations relatives à l'environnement et étant conçue pour transmettre ces informations à un autre ordinateur (20) du réseau annulaire et/ou au système central (6) sur terre. Les ordinateurs de réseau transmettent, en fonctionnement normal, des informations momentanées concernant l'environnement au système central (6) sur terre ainsi qu'à d'autres ordinateurs de réseau. Pour une pluralité des ordinateurs de réseau, ledit état passe du fonctionnement normal au fonctionnement d'urgence dans un îlot de réseau (50) engendré par une ou plusieurs interruptions de communication et un desdits ordinateurs (29) assume avec l'état de fonctionnement d'urgence un statut de maître et tous les autres ordinateurs de l'îlot de réseau assument un statut d'esclave. L'ordinateur de réseau (29) avec le statut de maître peut ainsi mettre à disposition de tous les autres ordinateurs de l'îlot de réseau lesdites informations concernant l'environnement en fonctionnement d'urgence et est également conçu pour prendre en charge des fonctions administratives de réseau du système central (6) dans l'îlot de réseau (50) engendré par l'interruption de communication.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102009030910 | 2009-06-28 | ||
PCT/EP2010/056825 WO2011000627A1 (fr) | 2009-06-28 | 2010-05-18 | Réseau de communication et procédé de communication sécurisée dans des structures de tunnel et de mine |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2449730A1 true EP2449730A1 (fr) | 2012-05-09 |
Family
ID=42562730
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP10721778A Withdrawn EP2449730A1 (fr) | 2009-06-28 | 2010-05-18 | Réseau de communication et procédé de communication sécurisée dans des structures de tunnel et de mine |
Country Status (7)
Country | Link |
---|---|
US (1) | US20120110373A1 (fr) |
EP (1) | EP2449730A1 (fr) |
AU (1) | AU2010268281A1 (fr) |
CA (1) | CA2765791A1 (fr) |
RU (1) | RU2012102065A (fr) |
UA (1) | UA105043C2 (fr) |
WO (1) | WO2011000627A1 (fr) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102013200815A1 (de) * | 2013-01-18 | 2014-07-24 | Siemens Aktiengesellschaft | Dynamische Fluchtwegkennzeichnung |
US9324120B2 (en) | 2013-06-07 | 2016-04-26 | Emergency University, Inc. | Method and apparatus for emergency response notification |
DE202013103146U1 (de) * | 2013-07-15 | 2014-10-16 | Hanning & Kahl Gmbh & Co. Kg | Gerätesystem |
CN103457816A (zh) * | 2013-08-29 | 2013-12-18 | 上海铁路通信有限公司 | 适用于轨道交通车辆的跳接环网系统 |
US10078671B2 (en) * | 2015-02-26 | 2018-09-18 | Red Hat, Inc. | Data hub architecture to provide actionable data from remote sensor feeds |
JP6925321B2 (ja) * | 2015-08-27 | 2021-08-25 | フォグホーン システムズ, インコーポレイテッドFoghorn Systems, Inc. | エッジインテリジェンスプラットフォーム、およびインターネット・オブ・シングス・センサストリームシステム |
CN105223318A (zh) * | 2015-10-20 | 2016-01-06 | 重庆光煦科技有限公司 | 一种矿业安全监控系统 |
CN107725109A (zh) * | 2017-10-16 | 2018-02-23 | 中国恩菲工程技术有限公司 | 用于地下矿中段内的环网系统和构建该环网系统的方法 |
CN109139115B (zh) * | 2018-10-16 | 2024-02-20 | 煤炭科学技术研究院有限公司 | 一种井下数据采集终端、处理系统及处理方法 |
CN111090518A (zh) * | 2019-12-04 | 2020-05-01 | 远景智能国际私人投资有限公司 | 边缘计算设备控制方法、装置及存储介质 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2173977B (en) * | 1985-04-20 | 1988-09-21 | Stc Plc | Local area network |
US6496941B1 (en) * | 1998-12-29 | 2002-12-17 | At&T Corp. | Network disaster recovery and analysis tool |
US7403980B2 (en) * | 2000-11-08 | 2008-07-22 | Sri International | Methods and apparatus for scalable, distributed management of virtual private networks |
EP1576528A4 (fr) * | 2002-10-09 | 2011-05-18 | California Inst Of Techn | Capteur web |
JP2005269059A (ja) * | 2004-03-17 | 2005-09-29 | Fujitsu Ltd | データ中継装置、データ中継方法およびデータ中継プログラム |
US7512841B2 (en) * | 2004-10-22 | 2009-03-31 | Hewlett-Packard Development Company, L.P. | Method and system for network fault analysis |
EP1713206A1 (fr) * | 2005-04-11 | 2006-10-18 | Last Mile Communications/Tivis Limited | Réséau de communication distribué comprenant des stations de base connectées sans fil |
US7447940B2 (en) * | 2005-11-15 | 2008-11-04 | Bea Systems, Inc. | System and method for providing singleton services in a cluster |
DE102006055889B3 (de) * | 2006-11-27 | 2008-05-29 | Beckhoff Automation Gmbh | Kommunikationssystem mit einer Master-Slave-Struktur |
ES2353551T3 (es) * | 2007-08-06 | 2011-03-03 | Nokia Siemens Networks Oy | Procedimiento y dispositivo para operar una red y sistema de comunicación que comprende tal dispositivo. |
US7801028B2 (en) * | 2007-12-31 | 2010-09-21 | Schneider Automation Inc. | Method and apparatus for transparent auto-recovery in chain and ring networks |
AU2009342637B2 (en) * | 2009-03-20 | 2015-07-16 | Innovative Wireless Technologies, Inc. | Method and apparatus for reliable communications in underground and hazardous areas |
-
2010
- 2010-05-18 EP EP10721778A patent/EP2449730A1/fr not_active Withdrawn
- 2010-05-18 WO PCT/EP2010/056825 patent/WO2011000627A1/fr active Application Filing
- 2010-05-18 RU RU2012102065/08A patent/RU2012102065A/ru unknown
- 2010-05-18 UA UAA201115466A patent/UA105043C2/uk unknown
- 2010-05-18 US US13/380,922 patent/US20120110373A1/en not_active Abandoned
- 2010-05-18 CA CA2765791A patent/CA2765791A1/fr not_active Abandoned
- 2010-05-18 AU AU2010268281A patent/AU2010268281A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO2011000627A1 * |
Also Published As
Publication number | Publication date |
---|---|
US20120110373A1 (en) | 2012-05-03 |
UA105043C2 (uk) | 2014-04-10 |
RU2012102065A (ru) | 2013-08-10 |
AU2010268281A1 (en) | 2012-02-16 |
WO2011000627A1 (fr) | 2011-01-06 |
CA2765791A1 (fr) | 2011-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2449730A1 (fr) | Réseau de communication et procédé de communication sécurisée dans des structures de tunnel et de mine | |
CN105035900A (zh) | 基于电力线传输的电梯物联网监控系统 | |
EP2769533B1 (fr) | Station de base pour la surveillance au moins un sensor | |
Lee et al. | Development of building fire safety system with automatic security firm monitoring capability | |
CN106097220A (zh) | 一种预案调派方法及装置 | |
CN107547868A (zh) | 一种监狱监舍管控系统及方法 | |
DE102016011538A1 (de) | Verfahren und Anordnung zur Optimierung des Informationsaustausches bei Notrufen | |
CN105872979A (zh) | 一种取得设定场所中人群信息的方法及装置 | |
CN101178835A (zh) | 安全监控集中装置 | |
CN106044440A (zh) | 一种电梯报警快速响应控制方法 | |
EP2637147B1 (fr) | Système d'alerte de danger et procédé de vérification de sa capacité de fonctionnement | |
CN205193537U (zh) | 一种消防控制室全程监控管理平台 | |
DE202018003909U1 (de) | Anordnung für IP basierte Rettungsprozesse bei Notrufen | |
CN105049809A (zh) | 一种智能远程监控系统 | |
DE10001252B4 (de) | Überwachungssystem | |
DE102015203670B4 (de) | Vorrichtung, System, Verfahren, Computerprogramm und Telekommunikationsnetz zum Lenken einer von einem Gefährdungsverursacher verursachten Gefahrensituation und zum Durchführen und/oder Unterstützen eines diesbezüglichen Einsatzes | |
EP2065863B1 (fr) | Estimation de la qualité d'une liaison de communication au sein d'un système de signalement de danger par radio à sauts multiples | |
CN209728811U (zh) | 一种基于bim实施的地铁隧道施工人员定位系统 | |
DE202012103265U1 (de) | Lokalisierungssystem | |
DE102005054099B4 (de) | Mobiles Überwachungssystem | |
EP0817147B1 (fr) | Système d'alarme sans fil à réception d'alarme à distance | |
DE10016987A1 (de) | Notfallinformationssystem, Komponenten eines Notfallinformationssystems und Verfahren zum Betreiben eines Notfallinformationssystems | |
EP1506795A2 (fr) | Procédé et dispositif pour réaliser des services de protection et communication sur les chantiers souterrains | |
Kent et al. | The convergence of all communication and data requirements onto a single IP backbone | |
Pelargonio et al. | Enhancing security in public transportation services of Roma: The PANDORA system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20120124 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20151012 |