Академический Документы
Профессиональный Документы
Культура Документы
ii
ABSTRACT
Today safety of miners is a major challenge. Miner’s health and life is vulnerable to several
critical issues, which includes not only the working environment, but also the after effect of
it. Mining activities release harmful and toxic gases in turn exposing the associated workers
into the danger of survival. This puts a lot of pressure on the mining industry. To increase the
productivity and reduce the cost of mining along with consideration of the safety of workers,
an innovative approach is required.
Miner’s health is in danger mainly because of the toxic gases which are very often
released in underground mines. These gases cannot be detected easily by human senses. This
thesis investigates the presence of toxic gases in critical regions and their effects on miners. A
real time monitoring system using wireless sensor network, which includes multiple sensors,
is developed. This system monitors surrounding environmental parameters such as
temperature, humidity and multiple toxic gases. This system also provides an early warning,
which will be helpful to all miners present inside the mine to save their life before any
casualty occurs. The system uses GSM technology to establish wireless sensor network. It is
wireless networking standard IEEE 802.21, which is suitable for operation in harsh
environment.
iii
CONTENTS
iv
LIST OF FIGURES
LIST OF TABLES
v
S.No Table.No Table Caption
1 4.1 Health effects and Pollutant concentration breakpoints caused by NO2
7 5.3 Connectors
vi
CHAPTER – 1
INTRODUCTION
This chapter serves as introduction to the report. It presents the problems of communication
in underground mines and safety issues. The need for the detection and real time monitoring
of the system is also discussed briefly. It also presents objectives and organization of the
report.
1.1 Introduction
Underground mining operations proves to be a risky venture as far as the safety and health of
workers are concerned. These risks are due to different techniques used for extracting
different minerals. The deeper the mine, the greater is the risk. These safety issues are of
grave concern especially in case of coal industries. Thus, safety of workers should always be
of major consideration in any form of mining, whether it is coal or any other minerals.
Underground coal mining involves a higher risk than open pit mining due to the problems of
ventilation and potential for collapse. However, the utilization of heavy machinery and the
methods performed during excavations result into safety risks in all types of mining.
Modern mines often implement several safety procedures, education and training for workers,
health and safety standards, which lead to substantial changes and improvements and safety
level both in opencast and underground mining.
Coal has always been the primary resource of energy in India, which has significantly
contributed to the rapid industrial development of the country. About 70% of the power
generation is dependent on it thus , the importance of coal in energy sector is indispensable.
But the production brings with it the other by-products, which proves to be a potential threat
to the environment and the people associated with it. In lieu of that the present work is a
sincere attempt in analysing the graveness and designing a real time monitoring system of
detection by using the GSM Technology.
In underground mine, ventilation systems are critical to supply adequate oxygen, keeping up
non-dangerous and non-lethal environments and an effective working mine. To monitor an
1
underground mine, can help killing high hazard environments. Primitive procedures of
monitoring a mine's air can be followed back to the utilization of canaries and different
creatures to ready diggers when the climate gets to be lethal. Incorporating ventilation
monitoring systems empowers a mine to insightfully roll out ventilation improvements in
view of the far reaching information given by the monitoring systems. Sudden changes in the
ventilation system are identified by the monitoring system, permitting quick move to be
made. New and creating correspondence and following systems can be used to monitor mines
more proficiently and transfer the information to the surface.
The progression of technology has allowed mine monitoring techniques to become more
sophisticated, yet explosions in underground coal mines still occur. The safety issues of coal
mines have gradually turned into a major concern for the society and nation. The occurrence
of disasters in coal mines is mainly due to the harsh environment and variability of working
conditions. So, it makes the implementation of mine monitoring systems essential for the
safety purpose. Wired network systems used to be a trend for traditional coal mines, which
have really played a significant role in safely production in coal mines. With the continuous
enlargement of exploiting areas and depth expansion, laneways have become blind zones,
where numerous unseen dangers are hidden out. Moreover, it is not possible there to lay
expensive cables, which is also time consuming. So, it is essential to have a wireless sensor
network mine monitoring system, which can be disposed in such mines in order to have a
safe production within.
Wireless sensor networks (WSNs) have earned a significant worldwide attention in current
scenario. A WSN is a special ad-hoc, multi-hop and self-organizing network that consists of a
large number of nodes arranged in a wide area in order to monitor the phenomena of interest.
It can be useful for medical, environmental, scientific and military applications. Wireless
sensor networks mainly consist of sensor nodes or motes responsible for sensing a
phenomenon and base nodes, which are responsible for managing the network and collecting
data from remote nodes. The design of the sensor network is influenced by many factors,
including
2
scalability, operation system, fault tolerance, sensor network topology, hardware constraints,
transmission media and power consumption.
These small sized sensors are quite inexpensive compared to traditional sensors and also
require limited computing and processing resources. These sensor nodes can detect, measure
and collect information from the environment and based on some local statistical decision
process, they can convey the collected data to the control room.
1. There is no need of cables to lay and easy installation in blind areas, reducing cost of the
monitoring system. The number of nodes can be increased to eliminate blind areas. Also, it
offers a general communication and allocation of the goal.
2. The dense nodes ensure the data acquisition with high accuracy and optimum data
transmission, and further realization of real-time monitoring system for mine environment.
3. A little computing ability, storage capacity with data fusion of sensor nodes make them
suitable for the remote monitoring system.
The above mentioned advantages make wireless sensor network ideal for monitoring of
safely production of coal mines.
1.3 Objective
Mining environment often has hidden dangers within such as toxic gases, which may present
severe health exposures to the people working within mining. These gases need to be
detected at times and informed the dangerous situation in right time for the safety of miners.
Wired network monitoring systems have assisted the mine safety significantly, but it is not
idea for all types of mining environment.
A real-time monitoring systems may assist in monitoring and control over the mining
environment. GSM technology offers its most of the advantages ideal for the real-time
monitoring system. Thus, the primary objective of this project is decided to design an
efficient real-time monitoring system so that various leaked mine gases could be identified at
times and preventive measures could be devised accordingly. The research investigations to
be carried out with the following objectives:
3
2. Communication establishment between sensors and GSM
The present work is an attempt to analyse the safety scenario of a mine. The idea is an
improvisation on previous related works where WSN is used to detect the toxic gases present
in the mine. The real time monitoring which is the requirement now a days is designed for the
purpose. The thesis presents all the related technologies such as GSM and embedded
designing etc. the work can be summarized as follows:
Introduction
Literature Review
Mine gases and their Impacts
System Design
Experiments and Results
Conclusion
4
Chapter 2
Literature Review
These are the previous research work on different systems using different
technologies for the safety of the environment.
Yu et al. (2005) proposed a real-time forest fire detection system based on wireless
sensor network. The system collects the data and processes it in the WSN for
detecting the forest fire. They designed the monitoring and detecting sensor networks
using neural network.
Joseph et al. (2007) focused on the problems and hazards of fire in libraries or
archives and described the necessary preventive steps to be adopted. They identified
the diverse parts which are applied for fire detection and alert system and also
provided necessary strategies for the selection and installation of an ideal fire alarm
system.
Fischer (2007) considered the simulation technique and applied this technique to
design a fire detection system. This system detects the fire as well as differentiates
fire and non-fire spot to decrease the false alarm rate in the non-fire event.
Tan et al. (2007) designed a system, which is applied for mine safety monitoring.
They called the system WSN based Mine Safety System. This system is capable of
5
real time monitoring of the mine environment and provide the pre-warning for the
fire or explosion.
Niu Xiaoguang et al. (2007) presented a distributed heterogeneous hierarchal mine
safety monitoring prototype system (HHMSM) which is based on features of the
underground mine gallery and necessities of mine safety. This system monitors the
methane concentration and the location of miner. They proposed an overhearing-
based adaptive data collecting system, which makes use of the redundancy and the
correlation of the sampling readings in both time and space to ease the traffic and
control.
He Hongjiang et al. (2008) designed a system using low power ARM (Advanced
RISC Machines) processor chip S3C2410 as the control of core and Zigbee as a
communication platform of WSN. This system composed of network mode,
communication network of CAN BUS as well as monitoring sensors.
Zheng Sun et al. (2008) analysed the problems of mine safety monitoring and an
improved Tiny OS Beaconing-based WSN. This protocol can not only aware Energy
and repair route automatically, but also can prevent the number of child nodes and
that of system levels. The features are small routing Table, high stabilization, high
self-repairing and long lifetime. It may be suitable for coal mine data acquisition and
applied to mine safety monitoring.
Lin-Song Weng et al. (2009) planned a framework, which is viably observing all
circumstances in mine, particularly for the wellbeing of mineworkers. They named
the system the real-time mine auxiliary monitoring system (RMAMS), which is
embraced for a real-time mine-monitoring system. Mine auxiliary sensor system
(MASS) consists of an intelligent activity sensor and repeater and arrives at decision
to resolve the procedure of processing.
Hua Fu et al. (2009) studied the fuzzy theory and neural network technology and by
using this information they designed an intelligent fuzzy neural network sensor
system for coal mine. This technology can make accurate detection of different
parameters.
Shi Wei et al. (2009) designed a multi parameter monitoring system for coal mine
tunnel, which is based on WSN network. This system uses the RS-485
communication protocol and hardware modular. It automatically sends warning
signals to the main control room and accomplishes corresponding control.
6
Wenge Li et al. (2009) designed a system for remote monitoring and analysis of
mines using virtual instrument technology, network technology and database
technology. This organization consists of sensors, remote clients, the ground
monitoring center and the underground substation. The remote client, through internet
explorer, can browse the real time monitoring data of mine safety such as
temperature, gasoline, wind velocity, carbon monoxide and so on. The system stored
the data using ADO in LabVIEW.
Shao Chang’an et al. (2009) studied the coal mine safety information and based on
this information such as dynamic changes, activity, closely related to the space, they
used special data mining and GIS technology for designing a coal mine safety
monitoring.
Hongmei Wu et al. (2010) proposed a remote monitoring system for mine vehicle
based on wireless sensor technology. This scheme uses the sensor nodes, deployed on
the vehicles to collect speed, mileage, pressure, oil level value, and data to the ARM
based information processing terminal.
Li-Chien Huang et al. (2011) designed a system for building electrical safety. No-
fuse breakers (NFBs) and electrical wall plugs are the main components of traditional
distribution, which is used for power transmission and overload protection. NFBs
have the utilization of over-burden security and are not completely compelling in
forestalling electrical flames created by poor contact or dust pollution. This plan is
built with assurance instruments so as to upgrade the parts of customary circulation
frameworks. The effects on other equipment in the same branch circuit can be avoided
by the threshold limit of the system when the outlet disconnects the power.
Ge Bin et al. (2011) suggested a method for monitoring coal mine using Zigbee
technology. This system measures the various safety factor of production such as gas,
temperature, humidity and other environmental indicators.
Cheng Bo et al. (2012) proposed a restful web services mashup improved coal mine
safety monitoring and control automation using WSN network. This system can
collect the values of methane, temperature, humidity and personal position
information inside the mine.
Rajkumar Boddu et al. (2012) designed a coal mine monitoring system using Zigbee
based on GSM technology. The degree of monitoring safety can be improved using
this scheme and reduce misfortune in the coal mine. They purposed a solution suitable
for mine wireless communication, and safety monitoring using this scheme.
7
Isaac O. Osunmakinde (2012) studied the different types of toxic fumes in
dangerous regions and their conditions and trends in the air for preventing miners
from contracting diseases. They developed an autonomous remote monitoring system
of WSNs which combines Ohm‘s law and mobile sensing coupled with ambient
intelligence governing decision-making for mine workers. The system has been
monitored the indoor scenarios which is successfully deployed in underground mines.
The system provides pre warning for safety purpose.
Mohit Kumar et al. (2013) proposes a wireless control and monitoring system for an
induction motor based on Zigbee communication protocol for safe and economic data
communication in industrial fields, where the wired communication is more
expensive or impossible due to physical conditions. This system monitors the
parameters of induction machine and transmit the data. A microcontroller based
system is used for collecting and storing data and accordingly generating a control
signal to stop or start the induction machine wireless through a computer interface
developed with Zigbee.
Mr. Kumarsagar et al. (2013) designed a wireless sensor network with the help of
MSP430xx controller, which is monitor the smoke, gas, temperature and humidity in
an underground mine. This system also controls the ventilation demand to miners
depending using upon the monitoring data from the mine. This system utilizes a
wireless Zigbee transceiver for remote logging of data at a central location to control
the environmental state with the assistance of a motor and valve control circuitry.
Berardo Naticchia et al. (2013) proposed the infrastructure less real-time monitoring
system to provide prompt support for inspecting the health and safety management on
construction sites. They tested the specific applications of monitoring, interference
between teams working on large construction sites. The system is capable of alert in
the occurrence of interference and to log any unexpected behaviour.
Zhang Xiaodong et al. (2014) presented the problems and faultiness of current coal
mine monitoring system. They examined the plan and implementation of a platform to
remotely monitor and control coal mine production processes over Industrial Ethernet
based on the embedded engineering. Integrated with each lower computer terminal are
S3C2410 microprocessors that can be utilized for linking up to the monitoring
network effectively.
8
CHAPTER 3
EMBEDDED SYSTEMS
Since the embedded system is dedicated to specific tasks, design engineers can
optimize it, reducing the size and cost of the product, or increasing the reliability and
performance. Some embedded systems are mass-produced, benefiting from economies of
scale.
Physically, embedded systems range from portable devices such as digital watches
and MP3 players, to large stationary installations like traffic lights, factory controllers, or the
systems controlling nuclear power plants. Complexity varies from low, with a single
microcontroller chip, to very high with multiple units, peripherals and networks mounted
inside a large chassis or enclosure.
In general, "embedded system" is not an exactly defined term, as many systems have
some element of programmability. For example, Handheld computers share some elements
with embedded systems — such as the operating systems and microprocessors which power
them — but are not truly embedded systems, because they allow different applications to be
loaded and peripherals to be connected.
9
Certain operating systems or language platforms are tailored for the embedded
market, such as Embedded Java and Windows XP Embedded. However, some low-end
consumer products use very inexpensive microprocessors and limited storage, with the
application and operating system both part of a single program. The program is written
permanently into the system's memory in this case, rather than being loaded into RAM
(random access memory), as programs on a personal computer are.
The uses of embedded systems are virtually limitless, because every day new products
are introduced to the market that utilizes embedded computers in novel ways. In recent years,
hardware such as microprocessors, microcontrollers, and FPGA chips have become much
cheaper. So when implementing a new form of control, it's wiser to just buy the generic chip
and write your own custom software for it. Producing a custom-made chip to handle a
particular task or set of tasks costs far more time and money. Many embedded computers
even come with extensive libraries, so that "writing your own software" becomes a very
trivial task indeed. From an implementation viewpoint, there is a major difference between a
computer and an embedded system. Embedded systems are often required to provide Real-
Time response. The main elements that make embedded systems unique are its reliability and
ease in debugging.
3.2.1 Debugging
10
An in-circuit emulator replaces the microprocessor with a simulated equivalent,
providing full control over all aspects of the microprocessor.
A complete emulator provides a simulation of all aspects of the hardware, allowing all
of it to be controlled and modified and allowing debugging on a normal PC.
Unless restricted to external debugging, the programmer can typically load and run
software through the tools, view the code running in the processor, and start or stop its
operation. The view of the code may be as assembly code or source-code.
3.2.2 Reliability:
Embedded systems often reside in machines that are expected to run continuously for
years without errors and in some cases recover by them if an error occurs. Therefore the
software is usually developed and tested more carefully than that for personal computers, and
unreliable mechanical moving parts such as disk drives, switches or buttons are avoided.
Specific reliability issues may include:
The system cannot safely be shut down for repair, or it is too inaccessible to repair.
Examples include space systems, undersea cables, navigational beacons, bore-hole
systems, and automobiles.
The system must be kept running for safety reasons. "Limp modes" are less tolerable.
Often backup s are selected by an operator. Examples include aircraft navigation,
reactor control systems, safety-critical chemical factory controls, train signals, engines
on single-engine aircraft.
The system will lose large amounts of money when shut down: Telephone switches,
factory controls, bridge and elevator controls, funds transfer and market making,
automated sales and service.
11
A variety of techniques are used, sometimes in combination, to recover from errors both
software bugs such as memory leaks, and also soft errors in the hardware:
Watchdog timer that resets the computer unless the software periodically notifies the
watchdog
Subsystems with redundant spares that can be switched over to
software "limp modes" that provide partial function
Designing with a Trusted Computing Base (TCB) architecture[6] ensures a highly
secure & reliable system environment
An Embedded Hypervisor is able to provide secure encapsulation for any subsystem
component, so that a compromised software component cannot interfere with other
subsystems, or privileged-level system software. This encapsulation keeps faults from
propagating from one subsystem to another, improving reliability. This may also
allow a subsystem to be automatically shut down and restarted on fault detection.
Immunity Aware Programming.
We are living in the Embedded World. You are surrounded with many embedded
products and your daily life largely depends on the proper functioning of these gadgets.
Television, Radio, CD player of your living room, Washing Machine or Microwave Oven in
your kitchen, Card readers, Access Controllers, Palm devices of your work space enable you
to do many of your tasks very effectively. Apart from all these, many controllers embedded
in your car take care of car operations between the bumpers and most of the times you tend to
ignore all these controllers.
In recent days, you are showered with variety of information about these embedded
controllers in many places. All kinds of magazines and journals regularly dish out details
about latest technologies, new devices; fast applications which make you believe that your
basic survival is controlled by these embedded products. Now you can agree to the fact that
these embedded products have successfully invaded into our world. You must be wondering
about these embedded controllers or systems. What is this Embedded System?
The computer you use to compose your mails, or create a document or analyze the
database is known as the standard desktop computer. These desktop computers are
manufactured to serve many purposes and applications.
12
You need to install the relevant software to get the required processing facility. So,
these desktop computers can do many things. In contrast, embedded controllers carryout a
specific work for which they are designed. Most of the time, engineers design these
embedded controllers with a specific goal in mind. So these controllers cannot be used in any
other place.
In the 8 bit segment, the most popular and used architecture is Intel's 8031. Market
acceptance of this particular family has driven many semiconductor manufacturers to develop
something new based on this particular architecture. Even after 25 years of existence,
semiconductor manufacturers still come out with some kind of device using this 8031 core.
From in-orbit embedded systems to jumbo jets to vital battlefield networks, designers of
mission-critical aerospace and defence systems requiring real-time performance, scalability,
and high-availability facilities consistently turn to the LynxOS® RTOS and the LynxOS-178
RTOS for software certification to DO-178B.
The LynxOS-178 RTOS for software certification, based on the RTCA DO-178B
standard, assists developers in gaining certification for their mission- and safety-critical
systems. Real-time systems programmers get a boost with LynuxWorks' DO-178B RTOS
training courses.
13
3.3.2 Communications applications:
"Five-nine" availability, CompactPCI hot swap support, and hard real-time response—
LynxOS delivers on these key requirements and more for today's carrier-class systems.
Scalable kernel configurations, distributed computing capabilities, integrated
communications stacks, and fault-management facilities make LynxOS the ideal choice for
companies looking for a single operating system for all embedded telecommunications
applications—from complex central controllers to simple line/trunk cards.
The Lynx Certifiable Stack (LCS) is a secure TCP/IP protocol stack designed especially
for applications where standards certification is required.
And as the wireless appliance revolution rolls on, web-enabled navigation systems,
radios, personal communication devices, phones and PDAs all benefit from the cost-effective
dependability, proven stability and full product life-cycle support opportunities associated
with BlueCat embedded Linux. BlueCat has teamed up with industry leaders to make it easier
to build Linux mobile phones with Java integration.
For makers of low-cost consumer electronic devices who wish to integrate the LynxOS
real-time operating system into their products, we offer special MSRP-based pricing to
reduce royalty fees to a negligible portion of the device's MSRP.
Designers of industrial and process control systems know from experience that
LynuxWorks operating systems provide the security and reliability that their industrial
applications require.
14
From ISO 9001 certification to fault-tolerance, POSIX conformance, secure partitioning
and high availability, we've got it all. Take advantage of our 20 years of experience.
In many applications, for example a TV remote control, there is no need for the
computing power of a 486 or even an 8086 microprocessor. These applications most often
require some I/O operations to read signals and turn on and off certain bits.
15
CHAPTER 4
MINE GASES AND THEIR IMPACTS
The air of the atmosphere that we breathe is a mixture of several gases and its
composition is practically constant over the whole surface of the earth. Because air is mixture
and not a chemical substance, the components can be separated.
When referring to noxious and poisonous gases met with in a mine the commonly
used names are as follows:
used either as synonymous with methane or referring to the mechanical mixture of the
gases, chiefly inflammable, given off naturally from coal and consisting for the most
part of methane.
Whitedamp: It is synonymous with carbon monoxide.
Stinkdamp: It is synonymous with sulphureted hydrogen (H2S).
Afterdamp: This is a mechanical mixture of gases existing in a mine after an
explosion of firedamp or coal dust. Its composition is extremely variable, but usually
includes carbon monoxide, carbon dioxide, nitrogen and sometimes H2S and SO2
with a very small percentage of oxygen.
The necessities for gas distinguishing proof can move massively, on the other hand,
there are five fundamental sources of hazardous gas in mining applications.
1. Gasses from Blasting: Blasting generates toxic and harmful gases. These harmful
gasses include carbon monoxide and nitrogen dioxide. As a result of the utilization of oxygen
in any such impact, oxygen deficiency might likewise be an outcome.
16
2. Methane from Coal Beds: Profoundly flammable methane (CH4) or firedamp, as
it is brought in numerous coalfields, is framed in the last phases of coal arrangement, and due
to the profundities and weights, it gets to be imbedded in the coal. As unearthings are made,
methane gas is freed into the air. Gas is transmitted from the purpose of unearthing, as well as
from the coal being transported to the surface.
3. Vehicle Exhaust: Vehicles are also generated various toxic and poisonous gases.
These poisonous gases are an aftereffect of the operation of burning motors.
5. Penetrating into Stagnant Water: Pockets of stagnant water can contain a lot of
hydrogen sulfide coming about essentially from the breakdown of pyrites.
NO2 is a reddish brown gas with a sharp and chafing scent. It changes noticeable all
around to shape vaporous nitric corrosive and harmful natural nitrates. NO2 additionally
assumes a noteworthy part in climatic responses that create ground-level ozone, a noteworthy
segment of brown haze. It is additionally an antecedent to nitrates, which add to expanded
respirable molecule levels in the climate.
Sources of NO2
All burning in air produces oxides of nitrogen (NOx) such as NO, NO2, N2O3 and
have choking smell. These oxides are easily dissolved by moisture in the mine air. NO2 are
formed during the blasting of explosives containing nitroglycerine as one of the constituents
if the explosives is not detonated completely.
Impacts of NO2
NO2 can chafe the lungs and lower impervious to respiratory contamination.
Affectability increments for individuals with asthma and bronchitis. NO2 artificially changes
into nitric corrosive and, when stored, adds to Lake Acidification. NO2, when artificially
changed to nitric corrosive, can consume metals, blur fabrics and corrupt elastic. It can harm
trees and products, bringing about considerable misfortunes.
17
Table 4.1. Health effects and Pollutant concentration breakpoints caused by NO2
SO2 is a colourless gas with a strong sulphurous smell, neither combustible nor a
supporter of combustion. It is 2.21 times heavier than air. It can be oxidized to sulfur trioxide,
which in the region of water vapor is instantly changed to sulphuric corrosive fog. SO2 can
be oxidized to shape corrosive vaporizers. SO2 is a forerunner to sulfates, which are one of
the principal segments of respirable particles in the air.
Sources of SO2
It may be produced in small quantities during blasting in mines, and after a fire or
coal dust explosion.
Impacts of SO2
This gas is very poisonous and extremely irritating to the eyes and respiratory
passages. Health impacts brought about by the presentation to abnormal amounts of SO2
incorporate breathing issues, respiratory sickness, changes in the lung's safeguards, and
intensifying respiratory and cardiovascular ailment. Individuals with asthma or perpetual lung
or coronary illness are the most delicate to SO2. It also harms trees and harvests. SO2,
alongside nitrogen oxides, is the principle antecedents of corrosive downpour. This adds to
the fermentation of lakes and streams, quickened consumption of structures and diminished
deceivability. SO2 additionally causes development of minute corrosive mist concentrates,
which have genuine wellbeing ramifications and adding to environmental change.
18
Table 4.2. Health effects and Pollutant concentration breakpoints caused by SO2
Sources of CO
The production of the CO in a mine may be due to any one or more of the following
cases:
Oxidation of coal and other carbonaceous matter: Incomplete oxidation may result in
its formation and under normal mining condition, the percentage found is negligible
and harmless in return of a coal mine.
Explosives: Explosives contain the amount of oxygen required for complete chemical
reaction, but the chemical reaction when the explosive is blasted is seldom perfect and
this results in the formation of CO.
Spontaneous Combustion: This is a main source of production of dangerous
percentage of CO in a coal mine. Active fire in an underground mine also forms CO
in dangerous percentage.
Methane or Coal dust Explosion: Gases produced by the explosion of methane coal
dust invariably contain a large percentage of CO.
Underground Machinery: Air compressor, run faultily, and exhaust gas of internal
combustion engines like diesel locomotives, are common sources of production of
CO. In fact, every machine some CO if proper lubricants are not used.
19
Impacts of CO
CO is a very poisonous gas and its affinity for the hemoglobin of the blood is nearly
300 times that of oxygen. If CO is present even in small quantities in the inhaled air, it is
difficult for blood to absorb proper quantities of oxygen to support life. CO enters the
circulation system and lessens oxygen conveyance to the organs and tissues. Individuals with
coronary illness are especially touchy. Introduction to abnormal states is connected with
weakness of vision, work limit, learning capacity and execution of troublesome undertakings.
Typical sickness symptoms due to the high concentration of the CO are mild
headache, fatigue, nausea and dizziness. A CO concentration of 12-13000 ppm is dead after
1-3 minutes. A CO concentration of 1600 ppm is deadly after one hour.
Sources of CH4
20
3. From an abandoned or closed mines, from which methane may leak out through the
vent holes or through fissures or crevices in the earth
5. Fugitive emissions from post-mining operations, in which coal keeps on give off
methane as it is stacked away in pores and transported.
Impacts of CH4
Methane is a very poisonous gas. Methane gas causes headaches, reduces the oxygen
level in the physical structure. If the oxygen level reduces to less than 12%, the individual can
get to be unconscious and turn out to be dead in some cases. This gas symptoms are Nausea
and vomiting, heart palpitations (which causes a painful sensation of the heart beating),
memory loss, poor judgment, dizziness and blurred vision. Some patients also display flu-like
symptoms. Methane gas is extremely inflammable. When it is burnt, carbon monoxide will be
brought forth.
21
STEL-- Short-term exposure limit (TWA concentration occurring more than 15 min).
Ceiling limit is the concentration that should not be exceeded at any time. This is
relevant for the most toxic substances or those that produce in an immediate irritant effect.
Conclusion
The chapter deals with generation and the effects of mine gases. Different hazardous
gases such as NO, SO2, CO, CH4 etc. has been discussed at length. The health impacts and
the maximum exposure limit of each of them is described. In lieu of that a suitable
monitoring system for these gases has been designed, which is mentioned in the next chapter.
22
CHAPTER 5
SYSTEM DESIGN
This chapter consists of the design of the system. This chapter mainly contains the
details of required hardware and software. The appropriate working environment is setup
with all required components to develop the system. After developing the system, it tested in
the particular environment. This chapter explains the step-by-step development of hardware
system followed by software development and its implementation.
23
Figure 5.1 Structure of Arduino Board
Looking at the board from the top down, this is an outline of what you will see (parts
of the board you might interact with in the course of normal use are highlighted)
24
Starting clockwise from the top center:
Analog Reference pin (orange)
Digital Ground (light green)
Digital Pins 2-13 (green)
Digital Pins 0-1/Serial In/Out - TX/RX (dark green) - These pins cannot be used for
digital i/o (Digital Read and Digital Write) if you are also using serial communication
(e.g. Serial.begin).
Reset Button - S1 (dark blue)
In-circuit Serial Programmer (blue-green)
Analog In Pins 0-5 (light blue)
Power and Ground Pins (power: orange, grounds: light orange)
External Power Supply In (9-12VDC) - X1 (pink)
Toggles External Power and USB Power (place jumper on two pins closest to desired
supply) - SV1 (purple)
USB (used for uploading sketches to the board and for serial communication between
the board and the computer; can be used to power the board) (yellow)
25
PWM: 3, 5, 6, 9, 10, and 11 Provide 8-bit PWM output with the analog Write()
function. On boards with an ATmega8, PWM output is available only on pins 9, 10,
and 11.
BT Reset: 7. (Arduino BT-only) Connected to the reset line of the bluetooth module.
SPI: 10 (SS), 11 (MOSI), 12 (MISO), 13 (SCK). These pins support SPI
communication, which, although provided by the underlying hardware, is not
currently included in the Arduino language.
LED: 13. On the Diecimila and LilyPad, there is a built-in LED connected to digital
pin 13. When the pin is HIGH value, the LED is on, when the pin is LOW, it's off.
5.1.3 Analog Pins
In addition to the specific functions listed below, the analog input pins support 10-bit
analog-to-digital conversion (ADC) using the analog Read() function. Most of the analog
inputs can also be used as digital pins: analog input 0 as digital pin 14 through analog input 5
as digital pin 19. Analog inputs 6 and 7 (present on the Mini and BT) cannot be used as
digital pins.
I2C: 4 (SDA) and 5 (SCL). Support I2C (TWI) communication using the Wire library
(documentation on the Wiring website).
5.1.4 Power Pins
VIN (sometimes labeled "9V"): The input voltage to the Arduino board when it's
using an external power source (as opposed to 5 volts from the USB connection or
other regulated power source). You can supply voltage through this pin, or, if
supplying voltage via the power jack, access it through this pin. Also note that the
Lily Pad has no VIN pin and accepts only a regulated input.
5V: The regulated power supply used to power the microcontroller and other
components on the board. This can come either from VIN via an on-board regulator,
or be supplied by USB or another regulated 5V supply.
3V3 (Diecimila-only) : A 3.3 volt supply generated by the on-board FTDI chip.
GND: Ground pins.
5.1.5 Other Pins
AREF: Reference voltage for the analog inputs. Used with analog Reference().
Reset: (Diecimila-only) Bring this line LOW to reset the microcontroller. Typically
used to add a reset button to shields which block the one on the board.
26
5.2 Atmega328
5.2.1 Pin diagram
Pin Description
VCC: Digital supply voltage.
GND: Ground.
Port A (PA7-PA0): Port A serves as the analog inputs to the A/D Converter. Port A also
serves as an 8-bit bi-directional I/O port, if the A/D Converter is not used. Port pins can
provide internal pull-up resistors (selected for each bit). The Port A output buffers have
symmetrical drive characteristics with both high sink and source capability. When pins PA0
to PA7 are used as inputs and are externally pulled low, they will source current if the
internal pull-up resistors are activated. The Port A pins are tri-stated when a reset condition
becomes active, even if the clock is not running.
27
Port B (PB7-PB0):Port B is an 8-bit bi-directional I/O port with internal pull-up resistors
(selected for each bit). The Port B output buffers have symmetrical drive characteristics with
both high sink and source capability. As inputs, Port B pins that are externally pulled low will
source current if the pull-up resistors are activated. The Port B pins are tri-stated when a reset
condition becomes active, even if the clock is not running. Port B also serves the functions of
various special features of the ATmega32.
Port C (PC7-PC0): Port C is an 8-bit bi-directional I/O port with internal pull-up resistors
(selected for each bit). The Port C output buffers have symmetrical drive characteristics with
both high sink and source capability. As inputs, Port C pins that are externally pulled low will
source current if the pull-up resistors are activated. The Port C pins are tri-stated when a reset
condition becomes active, even if the clock is not running. If the JTAG interface is enabled,
the pull-up resistors on pins PC5(TDI), PC3(TMS) and PC2(TCK) will be activated even if a
reset occurs. The TD0 pin is tri-stated unless TAP states that shift out data are entered. Port C
also serves the functions of the JTAG interface.
Port D (PD7-PD0): Port D is an 8-bit bi-directional I/O port with internal pull-up resistors
(selected for each bit). The Port D output buffers have symmetrical drive characteristics with
both high sink and source capability. As inputs, Port D pins that are externally pulled low will
source current if the pull-up resistors are activated. The Port D pins are tri-stated when a reset
condition becomes active, even if the clock is not running. Port D also serves the functions of
various special features of the ATmega32.
Reset (Reset Input): A low level on this pin for longer than the minimum pulse length will
generate a reset, even if the clock is not running. Shorter pulses are not guaranteed to
generate a reset.
XTAL1:Input to the inverting Oscillator amplifier and input to the internal clock operating
circuit.
28
AVCC: AVCC is the supply voltage pin for Port A and the A/D Converter. It should be
externally connected to VCC, even if the ADC is not used. If the ADC is used, it should be
connected to VCC through a low-pass filter.
AREF: AREF is the analog reference pin for the A/D Converter.
5.2.2 Features
1.8-5.5V operating range
Up to 20MHz
Part: ATMEGA328P-AU
32kB Flash program memory
1kB EEPROM
2kB Internal SRAM
2 8-bit Timer/Counters
16-bit Timer/Counter
RTC with separate oscillator
6 PWM Channels
8 Channel 10-bit ADC
Serial USART
Master/Slave SPI interface
2-wire (I2C) interface
Watchdog timer
Analog comparator
23 IO lines
Data retention: 20 years at 85C/ 100 years at 25C
Digital I/O Pins are 14 (out of which 6 provide PWM output)
Analog Input Pins are 6.
DC Current per I/O is 40 mA
DC Current for 3.3V Pin is 50mA
29
5.3 Arduino with ATmega328
The Arduino Uno is a microcontroller board based on the ATmega328 (datasheet). It
has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a
16 MHz ceramic resonator, a USB connection, a power jack, an ICSP header, and a reset
button. It contains everything needed to support the microcontroller; simply connect it to a
computer with a USB cable or power it with a AC-to-DC adapter or battery to get started.
The Uno differs from all preceding boards in that it does not use the FTDI USB-to-
serial driver chip. Instead, it features the Atmega16U2 (Atmega8U2 up to versionR2)
programmed as a USB-to-serial converter.
Pin out: Added SDA and SCL pins that are near to the AREF pin and two other new
pins placed near to the RESET pin, the IOREF that allow the shields to adapt to the
voltage provided from the board. In future, shields will be compatible with both the
board that uses the AVR, which operates with 5V and with the Arduino. Due that
operates with 3.3V. The second one is a not connected pin that is reserved for future
purposes.
Stronger RESET circuit.
Atmega 16U2 replace the 8U2.
"Uno" means one in Italian and is named to mark the upcoming release of Arduino
1.0. The Uno and version 1.0 will be the reference versions of Arduino, moving forward. The
Uno is the latest in a series of USB Arduino boards, and the reference model for the Arduino
platform; for a comparison with previous versions, see the index of Arduino boards.
30
VIN: The input voltage to the Arduino board when it's using an external power source
(as opposed to 5 volts from the USB connection or other regulated power source).
You can supply voltage through this pin, or, if supplying voltage via the power jack,
access it through this pin.
5V: This pin outputs a regulated 5V from the regulator on the board. The board can
be supplied with power either from the DC power jack (7 - 12V), the USB connector
(5V), or the VIN pin of the board (7-12V). Supplying voltage via the 5V or 3.3V pins
bypasses the regulator, and can damage your board. We don't advise it.
3V3. A 3.3 volt supply generated by the on-board regulator. Maximum current draw
is 50 mA.
GND. Ground pins.
IOREF. This pin on the Arduino board provides the voltage reference with which the
microcontroller operates. A properly configured shield can read the IOREF pin
voltage and select the appropriate power source or enable voltage translators on the
outputs for working with the 5V or 3.3V.
Memory:
The ATmega328 has 32 KB (with 0.5 KB used for the boot loader). It also has 2 KB
of SRAM and 1 KB of EEPROM (which can be read and written with the EEPROM library).
Serial Communication:
The Arduino Uno has a number of facilities for communicating with a computer,
another Arduino, or other microcontrollers. The ATmega328 provides UART TTL (5V)
serial communication, which is available on digital pins 0 (RX) and 1 (TX). An
ATmega16U2 on the board channels this serial communication over USB and appears as a
virtual com port to software on the computer. The '16U2 firmware uses the standard USB
COM drivers, and no external driver is needed. However, on Windows, a .inf file is required.
The Arduino software includes a serial monitor which allows simple textual data to be sent to
and from the Arduino board. The RX and TX LEDs on the board will flash when data is
being transmitted via the USB-to-serial chip and USB connection to the computer (but not for
serial communication on pins 0 and 1).
A Software Serial library allows for serial communication on any of the Uno's digital
pins. The ATmega328 also supports I2C (TWI) and SPI communication. The Arduino
software includes a Wire library to simplify use of the I2C bus. For SPI communication, use
the SPI library.
31
5.4 Regulated power supply:
5.4.1 Introduction:
Conversion of one form of electrical power to another desired form and voltage,
typically involving converting AC line voltage to a well-regulated lower-
voltage DC for electronic devices.
Low voltage, low power DC power supply units are commonly integrated with the
devices they supply, such as computers and household electronics.
Batteries.
Chemical fuel cells and other forms of energy storage systems.
Solar power.
Generators or alternators.
The basic circuit diagram of a regulated power supply (DC O/P) with led connected as
load
32
Figure 5.5 Circuit diagram of Regulated Power Supply with Led
connection
230v AC mains
Transformer
Bridge rectifier(diodes)
Capacitor
Resistor
5.4.3 Transformation:
Transformers:
A transformer is a device that transfers electrical energy from one circuit to another
through inductively coupled conductors without changing its frequency. A varying current in
the first or primary winding creates a varying magnetic flux in the transformer's core, and
thus a varying magnetic field through the secondary winding. This varying magnetic
field induces a varying electromotive force (EMF) or "voltage" in the secondary winding.
This effect is called mutual induction.
If a load is connected to the secondary, an electric current will flow in the secondary
winding and electrical energy will be transferred from the primary circuit through the
33
transformer to the load. This field is made up from lines of force and has the same shape as a
bar magnet.
If another coil is placed adjacent to the first coil then, as the field moves out or in, the
moving lines of force will "cut" the turns of the second coil. As it does this, a voltage is
induced in the second coil. With the 50 Hz AC mains supply, this will happen 50 times a
second. This is called MUTUAL INDUCTION and forms the basis of the transformer.
The input coil is called the PRIMARY WINDING; the output coil is the
SECONDARY WINDING.
For example, if the secondary has half the primary turns; the secondary will have half
the primary voltage.
Another example is if the primary has 5000 turns and the secondary has 500 turns,
then the turn‘s ratio is 10:1.
If the primary voltage is 240 volts then the secondary voltage will be x 10 smaller =
24 volts. Assuming a perfect transformer, the power provided by the primary must equal the
power taken by a load on the secondary. If a 24-watt lamp is connected across a 24 volt
secondary, then the primary must supply 24 watts.
34
To aid magnetic coupling between primary and secondary, the coils are wound on a
metal CORE. Since the primary would induce power, called EDDY CURRENTS, into this
core, the core is LAMINATED. This means that it is made up from metal sheets insulated
from each other. Transformers to work at higher frequencies have an iron dust core or no core
at all.
Note that the transformer only works on AC, which has a constantly changing current
and moving field. DC has a steady current and therefore a steady field and there would be no
induction.
Some transformers have an electrostatic screen between primary and secondary. This
is to prevent some types of interference being fed from the equipment down into the mains
supply, or in the other direction. Transformers are sometimes used for IMPEDANCE
MATCHING.
Step Up transformer:
In case of step down transformer, Primary winding induces more flux than the
secondary winding, and secondary winding is having less number of turns because of that it
accepts less number of flux, and releases less amount of voltage.
A battery is a type of linear power supply that offers benefits that traditional line-
operated power supplies lack: mobility, portability and reliability. A battery consists of
multiple electrochemical cells connected to provide the voltage desired. Fig: 5.7 shows Hi-
Watt 9V battery
35
Figure 5.7 Hi-Watt 9V Battery
The most commonly used dry-cell battery is the carbon-zinc dry cell battery. Dry-cell
batteries are made by stacking a carbon plate, a layer of electrolyte paste, and a zinc plate
alternately until the desired total voltage is achieved. The most common dry-cell batteries
have one of the following voltages: 1.5, 3, 6, 9, 22.5, 45, and 90. During the discharge of a
carbon-zinc battery, the zinc metal is converted to a zinc salt in the electrolyte, and
magnesium dioxide is reduced at the carbon electrode. These actions establish a voltage of
approximately 1.5 V.
The lead-acid storage battery may be used. This battery is rechargeable; it consists of
lead and lead/dioxide electrodes which are immersed in sulfuric acid. When fully charged,
this type of battery has a 2.06-2.14 V potential (A 12 volt car battery uses 6 cells in series).
During discharge, the lead is converted to lead sulfate and the sulfuric acid is converted to
water. When the battery is charging, the lead sulfate is converted back to lead and lead
dioxide A nickel-cadmium battery has become more popular in recent years. This battery cell
is completely sealed and rechargeable. The electrolyte is not involved in the electrode
reaction, making the voltage constant over the span of the batteries long service life. During
the charging process, nickel oxide is oxidized to its higher oxidation state and cadmium oxide
is reduced. The nickel-cadmium batteries have many benefits. They can be stored both
charged and uncharged. They have a long service life, high current availabilities, constant
voltage, and the ability to be recharged. Fig:5.8 shows pencil battery of 1.5V.
36
Figure 5.8 Pencil Battery of 1.5V
5.4.5 Rectification:
Rectifiers:
When only one diode is used to rectify AC (by blocking the negative or positive
portion of the waveform), the difference between the term diode and the term rectifier is
merely one of usage, i.e., the term rectifier describes a diode that is being used to convert AC
to DC. Almost all rectifiers comprise a number of diodes in a specific arrangement for more
efficiently converting AC to DC than is possible with only one diode. Before the
development of silicon semiconductor rectifiers, vacuum tube diodes and copper (I) oxide or
selenium rectifier stacks were used.
The Bridge rectifier circuit is shown in fig: 3.10, which converts an ac voltage to dc
voltage using both half cycles of the input ac voltage. The Bridge rectifier circuit is shown in
the figure. The circuit has four diodes connected to form a bridge. The ac input voltage is
applied to the diagonally opposite ends of the bridge. The load resistance is connected
between the other two ends of the bridge.
37
For the positive half cycle of the input ac voltage, diodes D1 and D3 conduct, whereas
diodes D2 and D4 remain in the OFF state. The conducting diodes will be in series with the
load resistance RL and hence the load current flows through RL.
For the negative half cycle of the input ac voltage, diodes D2 and D4 conduct
whereas, D1 and D3 remain OFF. The conducting diodes D2 and D4 will be in series with the
load resistance RL and hence the current flows through RL in the same direction as in the
previous half cycle. Thus a bi-directional wave is converted into a unidirectional wave.
Input Output
5.4.6 Filtration:
The process of converting a pulsating direct current to a pure direct current using
filters is called as filtration.
Filters:
Regulation:
A voltage regulator (also called a ‗regulator‘) with only three terminals appears to be
a simple device, but it is in fact a very complex integrated circuit. It converts a varying input
38
voltage into a constant ‗regulated‘ output voltage. Voltage Regulators are available in a
variety of outputs like 5V, 6V, 9V, 12V and 15V. The LM78XX series of voltage regulators
are designed for positive input. For applications requiring negative input, the LM79XX series
is used. Using a pair of ‗voltage-divider‘ resistors can increase the output voltage of a
regulator circuit.
It is not possible to obtain a voltage lower than the stated rating. You cannot use a
12V regulator to make a 5V power supply. Voltage regulators are very robust. These can
withstand over-current draw due to short circuits and also over-heating. In both cases, the
regulator will cut off before any damage occurs. The only way to destroy a regulator is to
apply reverse voltage to its input. Reverse polarity destroys the regulator almost instantly.
Fig: 5.10 shows voltage regulator.
Global System for Mobile Communication (GSM) is a set of ETSI standards specifying the
infrastructure for a digital cellular service. The standard is used in approx. 85 countries in the
world including such locations as Europe, Japan and Australia1.
39
5.5.2 GSM Call Routing
When a mobile subscriber roams into a new location area (new VLR), the VLR automatically
determines that it must update the HLR with the new location information, which it does
using an SS7 Location Update Request Message. The Location Update Message is routed to
the HLR through the SS7 network, based on the global title translation of the IMSI that is
stored within the SCCP Called Party Address portion of the message. The HLR responds
with a message that informs the VLR whether the subscriber should be provided service in
the new location.
When a user dials a GSM mobile subscriber's MSISDN, the PSTN routes the call to the
Home MSC based on the dialed telephone number. The MSC must then query the HLR based
on the MSISDN, to attain routing information required to route the call to the subscribers'
current location.
The MSC stores global title translation tables that are used to determine the HLR associated
with the MSISDN. When only one HLR exists, the translation tables are trivial. When more
than one HLR is used however, the translations become extremely challenging; with one
translation record per subscriber (see the example below). Having determined the appropriate
HLR address, the MSC sends a Routing Information Request to it.
When the HLR receives the Routing Information Request, it maps the MSISDN to the IMSI,
and ascertains the subscribers' profile including the current VLR at which the subscriber is
registered. The HLR then queries the VLR for a Mobile Station Roaming Number (MSRN).
The MSRN is essentially an ISDN telephone number at which the mobile subscriber can
currently be reached. The MSRN is a temporary number that is valid only for the duration of
a single call.
The HLR generates a response message, which includes the MSRN, and sends it back across
the SS7 network to the MSC. Finally, the MSC attempts to complete the call using the MSRN
provided
40
Figure 5.11 GSM Module
GSM (Global System for Mobile communication) is a digital mobile telephone system that is
widely used in many parts of the world. GSM uses a variation of Time Division Multiple Access
(TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA,
GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other
streams of user data, each in its own time slot. GSM operates in the 900MHz, 1800MHz, or 1900
MHz frequency bands.
GSM has been the backbone of the phenomenal success in mobile telecoms over the last
decade. Now, at the dawn of the era of true broadband services, GSM continues to evolve to meet
new demands. One of GSM's great strengths is its international roaming capability, giving consumers
a seamless service. This has been a vital driver in growth, with around 300 million. In the Americas,
today's 7 million subscribers are set to grow rapidly, with market potential of 500 million in
population, due to the introduction of GSM 800, which allows operators using the 800 MHz band to
have access to GSM technology too.
41
Service(UMTS). GSM security issues such as theft of service, privacy, and legal interception continue
to raise significant interest in the GSM community. The purpose of this portal is to raise awareness
of these issues with GSM security.
The mobile communications has become one of the driving forces of the digital revolution.
Everyday, millions of people are making phone calls by pressing a few buttons. Little is known about
how one person's voice reaches the other person's phone that is thousands of miles away. Even less
is known about the security measures and protection behind the system. The complexity of the cell
phone is increasing as people begin sending text messages and digital pictures to their friends and
family. The cell phone is slowly turning into a handheld computer. All the features and
advancements in cell phone technology require a backbone to support it. The system has to provide
security and the capability for growth to accommodate future enhancements. General System for
Mobile Communications, GSM, is one of the many solutions out there. GSM has been dubbed the
"Wireless Revolution" and it doesn't take much to realize why GSM provides a secure and
confidential method of communication.
Scalability
Micro transactions/Micro payments compatibility
Content channel neutrality (heterogeneous networks, unicast /multicast/broadcast etc)
Possibility of DRM
Consumer anonymity Etc.
A GSM modem can be an external modem device, such as the Wavecom FASTRACK
Modem. Insert a GSM SIM card into this modem, and connect the modem to an available
serial port on your computer.
A GSM modem can be a PC Card installed in a notebook computer, such as the Nokia Card
Phone.
A GSM modem could also be a standard GSM mobile phone with the appropriate cable and
software driver to connect to a serial port on your computer. Phones such as the Nokia 7110
with a DLR-3 cable, or various Ericsson phones, are often used for this purpose.
42
A dedicated GSM modem (external or PC Card) is usually preferable to a GSM mobile
phone. This is because of some compatibility issues that can exist with mobile phones. For
example, if you wish to be able to receive inbound MMS messages with your gateway, and
you are using a mobile phone as your modem, you must utilize a mobile phone that does not
support WAP push or MMS. This is because the mobile phone automatically processes these
messages, without forwarding them via the modem interface. Similarly some mobile phones
will not allow you to correctly receive SMS text messages longer than 160 bytes (known as
―concatenated SMS‖ or ―long SMS‖). This is because these long messages are actually sent as
separate SMS messages, and the phone attempts to reassemble the message before
forwarding via the modem interface. (We‘ve observed this latter problem utilizing the
Ericsson R380, while it does not appear to be a problem with many other Ericsson models.)
When you install your GSM modem, or connect your GSM mobile phone to the computer, be
sure to install the appropriate Windows modem driver from the device manufacturer. To
simplify configuration, the Now SMS/MMS Gateway will communicate with the device via
this driver. An additional benefit of utilizing this driver is that you can use Windows
diagnostics to ensure that the modem is communicating properly with the computer.
The Now SMS/MMS gateway can simultaneously support multiple modems, provided that
your computer hardware has the available communications port resources.
INTRODUCTION :
Analogic‘s GSM Smart Modem is a multi-functional, ready to use, rugged and versatile
modem that can be embedded or plugged into any application. The Smart Modem can be
43
customized to various applications by using the standard AT commands. The modem is fully
type-approved and can directly be integrated into your projects with any or all the features of
Voice, Data, Fax, SMS, and Internet etc.
User Manual
PRODUCT DESCRIPTION:
The connectors integrated to the body, guarantee the reliable output and input connections.
An extractible holder is used to insert the SIM card (Micro-SIM type). Status LED indicates
the operating mode.
Physical Characteristics
44
Temperature Range:
To install the modem, plug the device on to the supplied SMPS Adapter. For Automotive
applications fix the modem permanently using the mounting slots (optional as per your
requirement dimensions).
To insert or Remove the SIM Card, it is necessary to press the SIM holder ejector button with
Sharp edged object like a pen or a needle. With this, the SIM holder comes out a little, then
pulls it out and insert or remove the SIM Card
45
Make sure that the ejector is pushed out completely before accessing the SIM Card holder do
not remove the SIM card holder by force or tamper it (it may permanently damage). Place the
SIM Card Properly as per the direction of the installation. It is very important that the SIM is
placed in the right direction for its proper working condition
Connect GSM Smart Modem to the external antenna with cable end with SMA male. The
Frequency of the antenna may be GSM 900/1800 MHz. The antenna may be ( 0 dbi, 3 dbi or
short length L-type antenna) as per the field conditions and signal conditions.
DC Supply Connection
The Modem will automatically turn ON when connection is given to it. The following is the
Power Supply Requirement:
RS232 can be used to connect to the external device through the D-SUB/ USB (for USB
model only) device that is provided in the modem.
Connectors:
Connector Function
SMA RF Antenna connector
15 pin or 9 pin D-SUB USB (optional) RS232 link Audio link (only for 15 D-
SUB) Reset (only for 15 D-SUB) USB
46
communication port (optional)
2 pin Phoenix tm Power Supply Connector
SIM Connector SIM Card Connection
RJ11 (For 9 D-SUB and USB only) Audio link Simple hand set connection
(4 wire) 2 wire desktop phone
connection
47
3 Rx Receive Data Output
4 DSR Data Set Ready Output
5 GND Ground Ground
6 DTR Data Terminal Ready Input
7 CTS Clear to send Output
8 RTS Request to send Input
9 X None NC NC
Protecting Modem:
Do not expose to the modem to extreme conditions such as High temperatures, direct
sunlight, High Humidity, Rain, Chemicals, Water, Dust etc. For these details see the
specifications given.
AT commands features:
Line settings:
A serial link handler is set with the following default values Autobaud, 8 bits data, 1 stop bit,
no parity, flow control.
Command line
Commands always start with AT (which means attention) and finish with a <CR> character.
48
If command syntax is incorrect, an ERROR string is returned.
If command syntax is correct but with some incorrect parameters, the +CME ERROR: <Err>
or +CMS ERROR: <SmsErr> strings are returned with different error codes.
In some cases, such as ―AT+CPIN?‖ or (unsolicited) incoming events, the product does not
return the OK string as a response.
GSM was designed having interoperability with ISDN in mind, and the services provided by
GSM are a subset of the standard ISDN services. Speech is the most basic, and most
important, teleservice provided by GSM.
In addition, various data services are supported, with user bit rates up to 9600 bps. Specially
equipped GSM terminals can connect with PSTN, ISDN, Packet Switched and Circuit
Switched Public Data Networks, through several possible methods, using synchronous or
asynchronous transmission. Also supported are Group 3 facsimile service, videotex, and
teletex. Other GSM services include a cell broadcast service, where messages such as traffic
reports, are broadcast to users in particular cells.
A service unique to GSM, the Short Message Service, allows users to send and receive point-
to-point alphanumeric messages up to a few tens of bytes. It is similar to paging services, but
much more comprehensive, allowing bi-directional messages, store-and-forward delivery,
and acknowledgement of successful delivery.
Supplementary services enhance the set of basic teleservices. In the Phase I specifications,
supplementary services include variations of call forwarding and call barring, such as Call
Forward on Busy or Barring of Outgoing International Calls. Many more supplementary
services, including multiparty calls, advice of charge, call waiting, and calling line
identification presentation will be offered in the Phase 2 specifications.
49
Architecture of the GSM network
A GSM network is composed of several functional entities, whose functions and interfaces
are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can
be divided into three broad parts. The Mobile Station is carried by the subscriber. The Base
Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem,
the main part of which is the Mobile services Switching Center (MSC), performs the
switching of calls between the mobile users, and between mobile and fixed network users.
The MSC also handles the mobility management operations. Not shown are the Operations
A GSM network is composed of several functional entities, whose functions and interfaces
are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can
be divided into three broad parts. Subscriber carries the Mobile Station. The Base Station
Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main
part of which is the Mobile services Switching Center (MSC), performs the switching of calls
between the mobile users, and between mobile and fixed network users. The MSC also
handles the mobility management operations. Not shown is the Operations intendance Center,
which oversees the proper operation and setup of the network. The Mobile Station and the
Base Station Subsystem communicate across the Um interface, also known as the air
interface or radio link. The Base Station Subsystem communicates with the Mobile services
Switching Center across the A interface.
50
Mobile Station:
The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card
called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the
user can have access to subscribed services irrespective of a specific terminal. By inserting
the SIM card into another GSM terminal, the user is able to receive calls at that terminal,
make calls from that terminal, and receive other subscribed services.
The mobile equipment is uniquely identified by the International Mobile Equipment Identity
(IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to
identify the subscriber to the system, a secret key for authentication, and other information.
The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card
may be protected against unauthorized use by a password or personal identity number.
The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS)
and the Base Station Controller (BSC). These communicate across the standardized Abis
interface, allowing (as in the rest of the system) operation between components made by
different suppliers.
The Base Transceiver Station houses the radio transceivers that define a cell and handles the
radio-link protocols with the Mobile Station. In a large urban area, there will potentially be a
large number of BTSs deployed, thus the requirements for a BTS are ruggedness, reliability,
portability, and minimum cost.
The Base Station Controller manages the radio resources for one or more BTSs. It handles
radio-channel setup, frequency hopping, and handovers, as described below. The BSC is the
connection between the mobile station and the Mobile service Switching Center (MSC).
Network Subsystem
The central component of the Network Subsystem is the Mobile services Switching Center
(MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally provides
all the functionality needed to handle a mobile subscriber, such as registration, authentication,
location updating, handovers, and call routing to a roaming subscriber. These services are
51
provided in conjunction with several functional entities, which together form the Network
Subsystem. The MSC provides the connection to the fixed networks (such as the PSTN or
ISDN). Signalling between functional entities in the Network Subsystem uses Signalling
System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public
networks.
The Home Location Register (HLR) and Visitor Location Register (VLR), together with the
MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains all the
administrative information of each subscriber registered in the corresponding GSM network,
along with the current location of the mobile. The location of the mobile is typically in the
form of the signaling address of the VLR associated with the mobile as a distributed database
station. The actual routing procedure will be described later. There is logically one HLR per
GSM network, although it may be implemented
The Visitor Location Register (VLR) contains selected administrative information from the
HLR, necessary for call control and provision of the subscribed services, for each mobile
currently located in the geographical area controlled by the VLR. Although each functional
entity can be implemented as an independent unit, all manufacturers of switching equipment
to date implement the VLR together with the MSC, so that the geographical area controlled
by the MSC corresponds to that controlled by the VLR, thus simplifying the signalling
required. Note that the MSC contains no information about particular mobile stations --- this
information is stored in the location registers.
The other two registers are used for authentication and security purposes. The Equipment
Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the
network, where each mobile station is identified by its International Mobile Equipment
Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type
approved. The Authentication Center (AuC) is a protected database that stores a copy of the
secret key stored in each subscriber's SIM card, which is used for authentication and
encryption over the radio channel.
52
5.6. Sensors
Introduction
This DFRobot DHT11 Temperature & Humidity Sensor features a temperature & humidity
sensor complex with a calibrated digital signal output. By using the exclusive digital-signal-
acquisition technique and temperature & humidity sensing technology, it ensures high
reliability and excellent long-term stability. This sensor includes a resistive-type humidity
measurement component and an NTC temperature measurement component, and connects to
a high-performance 8-bit microcontroller, offering excellent quality, fast response, anti-
interference ability and cost-effectiveness.
53
Technical Specifications:
Detailed Specifications:
54
send any instruction to the sensor in within one second in order to pass the unstable
status. One capacitor valued 100nF can be added between VDD and GND for power
filtering.
55
Electrical Characteristics
VDD=5V, T = 25℃ (unless otherwise stated)
Conditions Minimum Typical Maximum
Power Supply DC 3V 5V 5.5V
Current Measuring 0.5mA 2.5mA
Supply
Average 0.2mA 1mA
Standby 100uA 150uA
Sampling Second 1
period
Table 5.7.Electrical Characteristics of DHT Sensor
There are several types of flame detector. The optical flame detector is a detector that uses
optical sensors to detect flames. There are also ionization flame detectors, which use current
flow in the flame to detect flame presence, and thermocouple flame detectors.
Types
Ultraviolet
Ultraviolet (UV) detectors work with wavelengths shorter than 300 nm. These detectors
detect fires and explosions within 3–4 milliseconds due to the UV radiation emitted at the
instant of their ignition. False alarms can be triggered by UV sources such as lightning, arc
56
welding, radiation, and sunlight. In order to reduce false alarm a time delay of 2-3 seconds is
often included in the UV flame detector design.
Near IR Array
Near infrared (IR) array flame detectors, also known as visual flame detectors, employ flame
recognition technology to confirm fire by analyzing near IR radiation via the pixel array of a
charge-coupled device (CCD).
Infrared
Infrared (IR) flame detectors work within the infrared spectral band. Hot gases emit a specific
spectral pattern in the infrared region, which can be sensed with a thermal imaging camera
(TIC) a type of thermographic camera. False alarms can be caused by other hot surfaces and
background thermal radiation in the area as well as blinding from water and solar energy. A
typical frequency where single frequency IR flame detector is sensitive is in the 4.4
micrometre range. Typical response time is 3-5 seconds.
UV/IR
UV and IR flame detectors compare the threshold signal in two ranges in "AND"
configuration and their ratio to each other to confirm the fire signal and minimize false
alarms.
57
Most IR detectors are designed to ignore constant background IR radiation, which is present
in all environments. Instead they measure the modulated part of the radiation. When exposed
to modulated non flame IR radiation, IR and UV/IR detectors become more prone to false
alarms, while IR3 detectors become somewhat less sensitive, and more immune to false
alarms. Triple IR, like other IR detector types, is susceptible to blinding by a layer of water
on the detector's window.
Visible sensors
In some detectors a sensor for visible radiation is added to the design in order to be able to
discriminate against false alarms better or improve the detection range. Example: UV/IR/vis,
IR/IR/vis, IR/IR/IR/vis flame detectors.
Video
Closed-circuit television or a web camera can be used for video detection (wavelength
between 0.4 and 0.7 µm). Like humans, the camera can be blinded by smoke or fog.[1]
Other types
Ionization current flame detection
The intense ionization within the body of a flame can be measured by means of the current
which will flow when a voltage is applied. This current can be used to verify flame presence
and quality. They are normally used in large industrial process gas heaters and are connected
to the flame control system and act as both the flame quality monitor and the "flame failure
device".
58
Applications
UV/IR flame detectors are used on hydrogen stations.
Gas fuelled cookers
Industrial heating and drying systems
Domestic heating systems
Industrial gas turbines
A sensor is a technological device that detects / senses a signal, physical condition and
chemical compounds. It is also defined as any device that converts a signal from one form to
another. Sensors are mostly electrical or electronic
Environmental monitoring
Boiler control
Fire detection
Home safety
59
Figure 5.20 Gas sensor
LCD stands for Liquid Crystal Display. LCD is finding wide spread use replacing LEDs
(seven segment LEDs or other multi segment LEDs) because of the following reasons:
These components are ―specialized‖ for being used with the microcontrollers, which
means that they cannot be activated by standard IC circuits. They are used for writing
different messages on a miniature LCD.
A model described here is for its low price and great possibilities most frequently used in
practice. It is based on the HD44780 microcontroller (Hitachi) and can display messages in
60
two lines with 16 characters each . It displays all the alphabets, Greek letters, punctuation
marks, mathematical symbols etc. In addition, it is possible to display symbols that user
makes up on its own. Automatic shifting message on display (shift left and right), appearance
of the pointer, backlight etc. are considered as useful characteristics.
PINS FUNCTIONS
There are pins along one side of the small printed board used for connection to the
microcontroller. There are total of 14 pins marked with numbers (16 in case the background
Ground 1 Vss - 0V
8 D1 0/1 Bit 1
Data / commands
9 D2 0/1 Bit 2
10 D3 0/1 Bit 3
61
11 D4 0/1 Bit 4
12 D5 0/1 Bit 5
13 D6 0/1 Bit 6
LCD SCREEN:
LCD screen consists of two lines with 16 characters each. Each character consists of
5x7 dot matrix. Contrast on display depends on the power supply voltage and whether
messages are displayed in one or two lines. For that reason, variable voltage 0-Vdd is applied
on pin marked as Vee. Trimmer potentiometer is usually used for that purpose. Some
versions of displays have built in backlight (blue or green diodes). When used during
operating, a resistor for current limitation should be used (like with any LE diode).
62
LCD BASIC COMMANDS
All data transferred to LCD through outputs D0-D7 will be interpreted as commands
or as data, which depends on logic state on pin RS:
63
0 = Decrement (by 1) 0 = Shift left
1. Display Unit
2. Transmitter Unit
64
Display unit consist of the Arduino board, sensors and the LCD. The transmitter unit consists
of a router and the sensors.
Power Supply
RF Module
Gas Sensor
Temperature LCD
& Humidity
Light
This chapter deals with the hardware implemented for the real time monitoring system.
The details of each components used were described briefly based on its functionality and
specifications. The flow chart and block diagram shows the organization and working of
65
the system. The above mentioned hardware and design plan has been described in the
subsequent chapter which explains the implementation part.
66
CHAPTER 6
EXPERIMENT AND RESULTS
6.1 Hardware Implementation
To test the designed real time monitoring system using wireless sensor network, an artificial
mining environment is simulated inside the laboratory.
67
Figure 6.2 Different sensors value using Arduino IDE Software
68
CHAPTER 7
CONCLUSION
The study on real time monitoring of toxic gases and other parameters present in underground
mine has analysed using wireless sensor network. A real time monitoring system is developed
to provide clearer and more point to point perspective of the underground mine. This system
is displaying the parameters on the LCD at the underground section where sensor unit is
installed as well as on the monitoring unit; it will be helpful to all miners present inside the
mine to save their life before any casualty occurs. Alarm triggers when sensor values crosses
the threshold level.
This system also stores all the data in the computer for future inspection. From the
experiments and observations, the following conclusion can be drawn:
(i) Each node in a particular framework functions as the pioneer robot when all its parameters
are configured properly.
(ii) Sensor nodes can reconfigure remotely over a wireless network and most of the
processing done in software on computer side.
(iii) The calibration equations of gas sensors may have affected the accuracy of the ppm
results.
This is a low cost and lifelong system.
Future Scope
1. Using additional sensors all possible safety issues could be monitored such as gases, dust,
vibrations, fire etc.
2. The other important data can be communicated through this system making it feasible
where wired communication is a hindrance.
3. The control can be governed from the surface itself as the system provides easy access.
69
CHAPTER 8
REFERENCES
[1] Bin, G., Huizong, L. (2011), ―The research on ZigBee-based Mine Safety Monitoring
System‖.
[2] Bo, C., Xiuqan, Q., Budan, W., Xiaokun, W. et al. (2012), ―Restful Web Service Mashup
Based Coal Mine Safety Monitoring and Control Automation with Wireless Sensor
Network‖.
[3] Boddu, R., Balanagu, P., Babu, N.S. (2012), ―Zigbee based mine safety monitoring
system with GSM‖.
[4] Borkar, C., ―Development of wireless sensor network system for indoor air quality
monitoring‖
[5] Dange, K.M., Patil, R.T. (2013), ―Design of Monitoring System for Coal Mine Safety
Based on MSP430‖.
[6] Dubaniewicz, T.H., Chilton, T.H., Doboroski (1993), ―Fiber optic for atmospheric mine
monitoring. IEEE Transactions on Industry Applications‖.
[7] Fu, H., Wang, T., Yuang, C. (2009), ―Intelligent Fuzzy Sensing System in Coal Mine
Safety Monitoring‖.
[8] Gottuk, D.T., PeAtross, M.J., Roby, R.J., Beyler, C.L. (2002), ―Advanced fire detection
using multi-signature alarm algorithms‖.
[9] Giglio, L., Discloitres, J., Justice, C.O., Kaufman, Y.J. (2003), ―An enhanced contextual
fire detection algorithm for MODIS, Remote Sensing of Environment‖.
[10] Hongjiang, H., Shuangyou, W. (2008), ―The Application of ARM and ZigBee
Technology Wireless Networks in Monitoring Mine Safety System‖.
70
[1] Huang, L.C., Chang, H.C., Chen, C.C., Kuo, C.C. (2011), ―A ZigBee-based monitoring
and protection system for building electrical safety‖.
[12] Kumar, M., Sharma, M., Narayan, R., Joshi, S., Kumar, S. (2013), ―Zigbee based
parameter monitoring and controlling system for induction machine‖.
71
APPENDIX
Source Code
#include <LiquidCrystal.h>
#include<SoftwareSerial.h>
/* Macrodefine Begin*/
#include "DHT.h"
/* Macrodefine End*/
#define DHTPIN 7
#define gas A0
#define Flame A1
#define Buzzer 5
char Receive_Channel;
void setup()
72
Serial.begin(9600);
gsm.begin(9600);
pinMode(Buzzer, OUTPUT);
lcd.begin(16, 2);
delay(1500);
lcd.clear();
lcd.setCursor(0, 1);
delay(1500);
Ptime = millis();
void loop()
// {
int h = dht.readHumidity();
int t = dht.readTemperature();
int g = analogRead(gas);
int F = !digitalRead(Flame);
lcd.clear();
lcd.setCursor(0, 1);
lcd.print(F("Gas:"));
lcd.print(g);
73
lcd.print(F(" Fire: "));
lcd.print(F);
lcd.setCursor(5, 0);
lcd.print(t);
lcd.setCursor(12, 0);
lcd.print(h);
Serial.println("T:" +String(t));
Serial.println("Hum:"+String(h));
delay(500);
lcd.setCursor(0,1);
Buzz();
lcd.setCursor(0,1);
// delay(2000);
74
//delay(2000);
// delay(2000);
if(F)
// delay(2000);
void Buzz()
digitalWrite(Buzzer, HIGH);
delay(3000);
digitalWrite(Buzzer, LOW);
delay(3000);
// Serial.println("in send");
gsm.println(F("AT+CMGF=1"));
delay(1200);
75
gsm.print(F("AT+CMGS=\""));
gsm.print(Num);
gsm.println(F("\""));
delay(1500);
gsm.println(msgTosend);
delay(100);
gsm.write(0x1a);
delay(4000);
76