University
stringclasses
19 values
Text
stringlengths
458
20.7k
Curtain
Curtin University WASM 7.1 THESIS SUMMARY AND CONTRIBUTION TO KNOWLEDGE Traditionally, open-pit mining and underground mining have been studied as a separately project in cases where shallow deposits extend to a considerable depth. For shallow deposits, usually, open-pit mining acts as a primary mining method in the beginning of the project. When open-pit mining is approaching its end of mine life, the ‘transition problem’ becomes apparent. It is a decision-making process of whether to extend the pit or make the transition from open-pit mining to underground mining. If open-pit is no longer an economic mining method for the remaining mineral resource, the decision is to make the transition to underground mining. If the final decision is to make the transition to underground mining, a combination of open-pit and underground mining strategy is then adopted by the mining project. In the practice of combination of open-pit and underground mining strategy, the inability to maximize project value (discounted or/and undiscounted) and resource utilization using open-pit mining and underground mining are studied independently. The main contributions for the failures are arbitrary crown pillar location and over-mined pit. Literature shows the significance of considering both open-pit and underground concurrently in the mine planning and optimization process. This research used mathematical modelling techniques to approach the transition problem and proposed mathematical models for generating the transition point, transition period and crown pillar placement to solve the transition problem. The proposed models can provide a clear guidance on where an operation should consider making the transition from open-pit to underground mining. Given the computation complexity of the problem, this research utilized data clustering techniques in open-pit mining and stope-based methodology for underground mining. The main reason was to decrease the size of the problem for both open-pit mining and underground mining. For open-pit mining, the data clustering technique was used to aggregate blocks with similar properties in order to decrease the number of entities. Meanwhile, the size reduction strategy for underground mining aims to retain the profitable stopes and eliminate the unprofitable stopes. 77 | P age
Curtain
Curtin University WASM In this research, two mathematical models were developed and presented. The first model is Transition Point Model which is used to generate the optimal transition point by maximizing the undiscounted cashflow of the mine operation. Following that, the modelling process expands to achieve optimal transition point and period by maximizing the discounted cashflow of the mine operation by developing the Transition Period Model. The expansion considers the underground mining advancement, operation capacities, blending, capital expenditure for making the transition, underground mine design parameters, etc. The results generated by this expanded model provide a comprehensive transition plan to the engineers. These two models were tested with a simplified two- dimensional dataset for verification purposes. The results showed that all constraints were satisfied. The two models were implemented on a synthetic block model which consists of 7,200 blocks. Upon solving the mathematical models, the optimal transition point, optimal crown pillar placement, and/or optimal transition period were generated. The Transition Point Model provides the optimal mining layout along with maximized undiscounted cashflow of $3.74 billion. One the other hand, Transition Period Model provides the optimal mining layout along with maximized discounted cashflow of $2.60 billion without considering any delay period when transitioning from open-pit to underground. In contrast, while considering a two-delay period, the discounted cashflow is $2.51 billion. Although the implementations demonstrate the capability of the models, it is unable to be implemented in a real case study. This is due to the computational complexity of real cases. A series of case studies were presented to show the limitation of the proposed models. The hierarchical clustering algorithm was proposed to handle the computational complexity and reduce the size of the problem for open-pit mining. The proposed hierarchical clustering utilized the similarity index to perform the clustering action. The similarity index is calculated based on coordinate, slope factor, grade factor, neighborhood factor and level factor. A two-dimensional case study was utilized to test the validity of the model. The two models along with the hierarchical clustering algorithm were implemented on a larger scale dataset which consists of 83,025 blocks. The open-pit blocks were 78 | P age
Curtain
Curtin University WASM clustered into 1,507 cluster groups and underground mining generated 2,136 profitable stopes. The proposed clustering algorithm successfully reduced the size of the problem for open-pit mining by approximately 85%. The implementation of the hierarchical clustering algorithm along with the proposed transition models were successful. The solution time for the Transition Point Model and Transition Period Model reduced significantly. In conclusion, a new methodology for solving the transition problem was developed, verified, and implemented. It can optimize the undiscounted cashflow and NPV of a mining project and can provide the optimal mining strategy for the project. 7.2 RECOMMENDATIONS The first area of enhancement is a stochastic mining model which can generate a high confidence mining plan. Geological uncertainty has remained as a topical discussion within the mining industry and it will directly affect the mine planning and optimization process. As presented by Chung, Topal, and Erten (2015), geological uncertainty will affect the transition problem significantly. Hence, a ‘grey area’ will appear which is named as the ‘Transition envelope’. Future studies could consider transforming the model into a stochastic mining model where it can handle multiple inputs and generate a result with higher confidence levels. Furthermore, future improvement by introducing flexibility for underground mining advancement can be considered. In the current model, the underground mining advancement is top-down approach. In the future studies, it can consider expanding the underground mining advancement into bottom-up and complete flexibility. Besides, the model has the potential to further improve to allow for simultaneous open-pit and underground mining operation/production. Next, the aspect that should be concerned with in future studies is the underground development mining schedule. Underground development scheduling can directly affect the stope mining sequence and accessibility. Hence, it will help to generate a more detailed and practical mining plan if there are dependencies/links between development and stopes. Moreover, the sublevel stoping cycle should be involved in the future studies. 79 | P age
Curtain
III I would like to express my appreciation to my supervisors Associate Professor Mostafa Sharifzadeh and Professor Youhei Kawamura (Akita University, Japan) for their invaluable supervision, support, and encouragement. Without their support, this research would not have come to its current stage of development. I wish to express my gratitude to Associate Professor Emmanuel Knox Chikutwe Chanda (The University of Adelaide), Dr. Hyong Doo Jang (Curtin University), and Dr. Markus Wagner (The University of Adelaide) who served as a co-operation to our teamwork. Their support, guidance, and inspiration were greatly supportive during the course of research. I also want to give my thanks to Professor Roger Thompson (Curtin University) as the thesis chairperson, who makes my earlier scientific connections with my supervisors and provides invaluable supports to my field trips, conferences attending, and other administrative assistants. I would like to thank the managements of Angas Zinc Mine (South of Australia) and Nickel West Leinster (Western Australia) for permission to use the mines as experiment site and to publish this thesis. Also, the assistance of their staff in setting up the underground experiments is hereby acknowledged. I would also like to convey my sincere thanks to the managers of Hokkaido electronic equipment (HDK Company, Japan), Mr. Kamijima and Mr. Sawada, for the software and hardware developments and other technical supports about electronic devices. I am very grateful to all of academic and support staffs of the Western Australian School of Mines (WASM) in Kalgoorlie Campus and thanks to my co-research fellows. Special thanks to my siblings and in-laws for their encouragements and devotions.
Curtain
VI In the challenging environment and dynamic topology of an underground mine, reliable and effective communication is a high-stake issue, along with the objectives of safe and efficient mining operations. Automation through remote and automatic systems has delivered improvements in workplace health and safety for employees, operational management, energy and cost-effectiveness, and real-time response to events. In this context, Wireless Sensor Networks (WSNs) have been widely employed in underground monitoring and communication systems for the purpose of environmental monitoring, the positioning of workers and equipment, operational monitoring and communication system. Considering the capabilities of WSNs, a ZigBee network is adopted in this study. The aim of this study is to propose a reliable and effective monitoring and communication system in underground environments, using new technologies. To achieve this, a ZigBee network-assisted Geographic Information System (GIS) is analysed to establish an integrated system for monitoring underground environment features, thereby preventing underground incidents, and facilitating bilateral emergency communications between surface operators and underground miners. It is demonstrated how ZigBee network performance is optimised for such environments. ZigBee radio wave attenuation is investigated to evaluate a stable communication distance between ZigBee nodes at straight and curved tunnels in a real mine scenario. Experimental measurements of ZigBee radio wave attenuation are validated by simulation results. Based on the analysis of the experimental and simulation results, factors affecting radio waves attenuation in the junctions, curvatures and fields near and far from the source are also assessed. Stable wireless communication distances between developed ZigBee nodes in the experiments of underground Angas Zinc Mine were obtained 100 m and 70 m for straight and curved tunnels, respectively. Various sensor node arrangements of ZigBee networks for underground space monitoring and communication systems are also investigated. The performance of ZigBee topologies is analysed in 12, 20, 30, 40 and 50-node scenarios for stationary
Curtain
VII node deployment in underground environments. The metrics used for the performance evaluation include throughput, packet delivery ratio (PDR), end-to-end delay, energy consumption and network security. The results of evaluation confirm that the mesh topology is preferable in WSN design in relation to higher throughput, packet delivery ratio, and network security, whereas the cluster-tree topology is preferable in relation to lower end-to-end delay and lower energy consumption. Attempts are made to make the system more effective and smarter in order to process and manage underground ZigBee data received into a control centre database using the GIS. ZigBee nodes are developed to sense environmental attributes such as temperature, humidity, and gases concentration, switching ON and OFF ventilation fans, and texting emergency messages. A trigger action plan for attributes monitored above the normal or threshold value limits is programmed into the surface GIS management server. It is designed to turn the auxiliary fans on remotely or automatically in orange (caution) conditions, and to send evacuation messages to underground miners in red (unsafe) conditions. The approaches are generalised by modelling ZigBee networks with the more comprehensive and realistic representations of a monitoring and communication system for underground mines. A system design and model is developed based on the classification of results from an experiment undertaken at an underground mine in Western Australia.
Curtain
1 INTRODUCTION BACKGROUND Mining is one of the earliest industries to contribute to human civilisation (Hartman & Mutmansky, 2002). The importance of mining as a foundation for most industries has led to rapid progress, utilising the latest technological advancements. Increased demand for mineral products continues to drive global expansion of the underground mining sector, even though the substantial majority of ore deposits have already been exploited from the near-surface. Underground mining is a risky operation due to its workplace characteristics. Many research papers have investigated factors leading to human casualties and injuries, recurring hazards, and unexpected costs in underground mines (Khanzode et al., 2011; Molina et al., 2011; Saleh & Cummings, 2011). Typical hazards associated with underground mining are poor lighting conditions, narrow spaces, rock falls, poor ventilation, wet conditions, communication constraints and structural complexity. Some studies have focused on operational problems such as fleet management including dispatching, routing and scheduling (Gamache et al., 2005). Others have explored geotechnical considerations such as ground movement and tunnel collapse (Ghorbani et al., 2012; Li et al., 2010) in order to improve safety and management efficiency in underground mining. In the challenging environment and changing topology of a mine, reliable and effective communication is a high-stake issue, along with the objectives of safe and efficient mining operations. Automation through remote and automatic systems has delivered improvements in workplace health and safety for employees, operational management, energy and cost-effectiveness, and real-time response to events. In this context, Wireless Sensor Networks (WSNs) have been widely employed in underground monitoring and communication systems for the purpose of environmental monitoring, the positioning of workers and equipment, operational monitoring and communication systems. WSNs form one of the most stimulating fields of computer science research and have contributed to home and industry communication and monitoring solutions over the CHAPTER 1 INTRODUCTION
Curtain
2 past five decades (Silicon-Laboratories, 2012). However, they have only been appraised and applied in the mining industry during the last two decades. Research on WSNs in underground mines has advanced for in the areas of gas detection and predicting collapses in coal mines. This industry has high event statistics. Reported annual statistics of fatalities from coal mines, especially in the USA and China, underpin the importance of utilising WSNs to minimise injuries, deaths, damage to equipment and unexpected costs (Li & Liu, 2009; Molina, 2011). Underground mining has benefited from the implementation of WSNs for strategic positioning of miners and equipment (Chehri et al., 2008; Tadisetty et al., 2003; Yin, 2011) and communication both in vocal and visual formats (Müller & Noack, 2011; Sicignano et al., 2013). Considering the capabilities of WSNs, a ZigBee network is adopted in this study. ZigBee, based on IEEE 802.15.4 standard, is a new wireless technology which delivers greater benefits for monitoring and communication systems in underground spaces, compared to other WSNs. The first version of a ZigBee node was developed by ZigBee Alliance in 2004 (Longkang et al., 2011). It has acceptable communication distances between nodes, substantial node capacity within a network, low energy consumption by sensor nodes and low overall complexity. Also, ZigBee nodes, network installation and maintenance are very cost-effective compared with other underground WSNs. ZigBee does not require any access point or central node to transmit data between clusters. Although ZigBee network has very low data rate (250 kbps) for image, voice and video communication, it can deliver high-performance networking applications for data transmission between nodes (node to node relays) based on multiple wireless hops (Sharifzadeh et al., 2015). The proposed system integrates a ZigBee network with a geographic information system (GIS) to enable the monitoring and control of underground mining applications from a surface office. GIS is a new technology and is used for spatial data analysis in order to capture, store, analyse, manage, and present data that is linked to locations (ESRI, 2012). GIS allows users to view, understand, question, interpret, and visualise data in many ways, revealing relationships, patterns, and trends in the form of maps, globes, reports, and charts. CHAPTER 1 INTRODUCTION
Curtain
3 This study demonstrates the innovative integration of ZigBee and GIS technologies into one system for communication and monitoring in mine tunnels. Underground safety and health concerns are significantly ameliorated through enhanced ventilation management and improved emergency text messaging. The integrated system receives data from developed ZigBee nodes and maps information in the GIS management server. The system can sense the mine tunnel environment and can communicate, and control the operation of the ventilations. Temporal ZigBee environment data including temperature, humidity and gas concentration readings are processed in the surface GIS management server. A trigger action plan is programmed to sound the alarm and remotely turn on auxiliary fans to clear the unsafe conditions when the monitored parameters exceed threshold values. The system enables emergency text messages to be communicated between underground tunnels and the surface. PROBLEM STATEMENT The core problems addressed in this study are the mitigation of underground mining incidents and the management of underground mining operations from a surface office by an effective monitoring and communication system. The death toll in the underground mining industry over the last decade is presented in Figure 1-1. The narratives of the fatalities occurring between 2003 and 2010 were obtained for three countries (USA, India and China). It is obvious that despite the progress of safety technology over recent years, there are still considerable fatalities in this industry. Therefore, underground mining remains one of the most dangerous occupations (Chakraborty, 2012; MSHA, 2014; Wu et al., 2011). In this study, an integrated system for underground mine monitoring and communication based on new technologies using ZigBee and GIS is proposed. ZigBee network is employed to sense the environmental attributes of tunnels and to manage ventilation system as well as establishing emergency communication with underground miners by texting message. This is merged with GIS services to create an automated system to provide 3D visualisation, programmed trigger action plans and multi-user operation. CHAPTER 1 INTRODUCTION
Curtain
4 Figure 1-1 Death toll in the underground mining industry The high quality of service and reliable message transmission through the network are crucial issues in dense industrial WSNs. This study also investigates an adequate sensor node arrangement of ZigBee networks for underground space monitoring and communication systems. OBJECTIVES In order to achieve a reliable system integration in the underground mines as a remedy for the difficulties and issues mentioned in the problem statement, the objectives of this study are as follows: • Review the state of the art regarding the use of WSNs and particularly ZigBee networks in underground mines. • Evaluate common WSNs for applications in underground mines and demonstrate how a ZigBee network performance is suitable for such environments. ZigBee radio wave attenuation is investigated to evaluate stable communication ranges between ZigBee nodes at straight and curved tunnels in a real mining scenario. Moreover, experimental measurements of ZigBee radio wave attenuation are validated by simulation results. Based on the analysis of the experimental and simulation results, factors affecting radio waves attenuation in the junctions, curvatures and fields near and far from the source are also assessed. Finally, CHAPTER 1 INTRODUCTION
Curtain
5 stable wireless communication ranges between developed ZigBee nodes in the underground Angas Zinc Mine is posited to be 100 m and 70 m for straight and curved tunnels respectively. The development of a ZigBee network application compared to other WSNs in underground mines is also endorsed. • Investigate various sensor node arrangements of ZigBee network for underground space monitoring and communication systems. The performance of ZigBee topologies is analysed in 12, 20, 30, 40 and 50-node scenarios for stationary node deployment in underground environments. The metrics used for the performance evaluation include throughput, packet delivery ratio (PDR), end- to-end delay, energy consumption and network security. The results of evaluation confirm that the mesh topology is preferable in WSN design in relation to higher throughput, packet delivery ratio, and network security, whereas the cluster-tree topology is preferable in relation to lower end-to-end delay and lower energy consumption. The analyses show that the mesh topology creates a more reliable monitoring and communication network with an adequate quality of service in underground spaces and tunnels. Therefore, greater end-to-end delay and energy consumption are not major concerns for the mesh topology in underground mine applications, based on the acceptable data latency and the use of mine power. • Analyse an automated underground mine monitoring and communication system based on the integration of new technologies to promote safety and health, operational management and cost-effectiveness. The proposed system integration of a WSN-assisted GIS enables monitoring and control of underground mining applications from a surface office. Based on the capabilities of WSNs, a ZigBee network is adopted for near real-time monitoring, ventilation system control and emergency communication in an underground mine. ZigBee nodes are developed to sense environmental attributes such as temperature, humidity, and gases concentration, switching ON and OFF ventilation fans, and texting emergency messages. A trigger action plan for attributes monitored above the normal or threshold value limits is programmed into the surface GIS management server. It is designed to turn the auxiliary fans on remotely or automatically in orange (caution) conditions, and to send evacuation messages to underground CHAPTER 1 INTRODUCTION
Curtain
6 miners in red (unsafe) conditions. Multi-user operation and 3D visualisations are other benefits achieved in the proposed system. • Assess the controllable and uncontrollable parameters for the establishment of a ZigBee network for underground mines. Accordingly, the methodology for designing and modelling an underground mine monitoring and communication system is generalised. Further procedures for a ZigBee network implementation in an underground mine are proposed. For the physical verification of these procedures, an experiment is carried out to design a ZigBee network model based on the results obtained in an underground mine in Western Australia for communication distances under different conditions. In addition, another experiment is performed to validate this model by testing system functions and applications including temperature, humidity and illumination readings, message texting, and the control of ventilation fans through the tunnels of this underground mine. The system operates successfully and demonstrates the reliable outcomes of the system functions and applications. SCOPE AND LIMITATIONS This investigation was conducted to develop underground mining monitoring and communication systems so as to promote safety and health, operational management and cost-effectiveness. The proposed system integration of a ZigBee network-assisted GIS enables monitoring and control of underground environment attributes. The potential functions and applications of the ZigBee networks for underground communication and monitoring is illustrated in Figure 1-2. These functions and applications assessing sensor nodes’ abilities are classified as follows. (a) Safety and health approach • Air quality and quantity measurements • Determination of workers’ locations • Emergency and safety communications • Gas detector and fire alarm • Geotechnical monitoring (b) Operations management and control CHAPTER 1 INTRODUCTION
Curtain
7 • Real-time monitoring of underground mine operations from a surface control centre • Improving the underground operation cycles (scheduling) • Traffic control (signals) Consequently, approaching high security in the safety and health matters and improving operation management based on the proposed system will considerably increase the cost-effectiveness in underground mining projects. Figure 1-2 Potential functions and applications of the ZigBee network in underground mines The limitation of the study is first concerning about ZigBee nodes employed in the tests. These are laboratory version which have less ability in the feature of antenna gain compared with updated industrial ones. Second, the outcomes are generalised based on the underground mine sites of the case studies. Finally, there is an uncertainty where uncontrollable parameters such as tunnel wall distortion and roughness, the detail of the dielectric constant and conductivity of rock mass effect on findings. Also, within the scope of the research topic, there is little prior research on using system integration of ZigBee and GIS for the applied functions and applications in underground mines. CHAPTER 1 INTRODUCTION
Curtain
8 SIGNIFICANCE AND RELEVANCE The study proposes a new system integration for the monitoring and communication of underground mines using ZigBee and GIS. This will significantly improve health and safety issues and management difficulties in underground mining. The finding of this study will benefit the engineering profession, considering the important role it plays in the development of today’s industries. Hence, the greater worldwide demand for ore deposits has necessitated safer and more productive approaches through the automation of mining techniques. Therefore, the significance of the study is summarised as follows: • This study could be beneficial in this era of system integration engineering where new technologies are being utilised. • The study could contribute to the expansion of knowledge of WSNs. The emerging functions and applications of smart wireless sensors in mining activities could influence relevant research in fields such as modern computer science, wireless communication and mobile computing. • Furthermore, the study could promote mining automation and mitigate the current predicament of safety and health issues in underground mining. • The study demonstrates and confirms a reliable system for underground mines to sense environmental attributes such as temperature, humidity and gases concentration, to manage ventilation fans, and to text emergency messages as a supportive communication system. • The results pave the way for future researchers to think about utilising WSNs for other functions and applications in underground mining and similar industries. THESIS STRUCTURE The logical structure of the thesis is shown in Figure 1-3. The thesis comprises seven chapters, summarised as follows: Chapter 1 presents an introductory statement regarding the enhancement of safety and health, as well as operation management in underground mines. It also includes the objectives, scope and limitations of the research and offers conclusive and significant research contributions to the mining industry. CHAPTER 1 INTRODUCTION
Curtain
10 Chapter 2 presents the state of the art of WSNs in underground mines, in relation to the innovation of remote and automatic systems against the backdrop of fewer skilled and unskilled mining personnel. It also surveys the essential features of ZigBee networks in underground environments compared to other WSNs, and presents the relative strengths and weaknesses of ZigBee networks in these environments. Chapter 3 analyses the attenuation theory of radio waves in underground mines. It investigates the influences of openings, features and operations of underground mines on the behaviour of WSNs’ radio wave propagation. Then, it discusses the measurement of ZigBee communication distances by comparing experiments and simulations results obtained in an underground mine. Chapter 4 highlights the placement of the sensing nodes, an important factor in allowing efficient transmission as well as maximum security throughout the wireless network. It also investigates an optimal arrangement of ZigBee nodes by creating various scenarios of mesh and cluster-tree configurations, as well as LQI-related metrics evaluation in mine tunnels using simulation programmes to assess ZigBee network performance and security in underground mines. Chapter 5 provides a design of system integration based on the ZigBee and GIS for the underground mines monitoring and communication. It develops a trigger action plan, programmed in the surface GIS management server, for the automatic response when monitored underground mine attributes exceed normal or threshold value limits. It also includes a design to turn the auxiliary fans on remotely or automatically in orange (caution) conditions, and to send evacuation messages to underground miners in red (unsafe) conditions. Chapter 6 generalises the ZigBee network model for underground mines. It demonstrates what controllable and uncontrollable parameters influence a ZigBee network model design and how a ZigBee network is physically established in an underground mine. Then it presents a verification of the system design by physical experiments in the underground mine. Chapter 7 concludes the study by re-presenting the essential findings, methods and designs for the establishment of ZigBee networks in underground mines. It then offers a contribution to the direction of future research. CHAPTER 1 INTRODUCTION
Curtain
13 STATE OF ART OF WSNS IN UNDERGROUND MINES INTRODUCTION Underground mining is the process of extracting deep ore-materials from the ground. Operations could be improved through a more comprehensive means of interaction between underground and surface communication networks. This two-way interaction would cover information regarding operations, risk and hazard analysis, safety management, and service and maintenance supports. Owing to the dangerous nature of underground mining, techniques of communication to monitor, control and ameliorate incidents are considered. It is claimed that monitoring and communication systems in underground spaces can be developed entirely using ZigBee networks, one of the WSN technologies. However, the reliability and performance of such systems are analysed in chapters to follow. The conceptual process of the literature survey of WSNs focusing ZigBee network is illustrated in Figure 2-1. According to this process, a critical survey of prior research on WSNs for underground mines is carried out before reasoning how ZigBee networks are adopted for underground mines in this study and pervious research. The claim is supported by reviewing and classifying the features of ZigBee networks and developed with arguments on the strengths of such networks in underground mines. The result of this process is the promotion of safety and operational management in underground mines through ZigBee network developments. The remainder of this chapter is organised as follows: WSNs’ architecture designs and applications in underground mines are surveyed in the second section. Then, common underground WSNs are evaluated and compared in order to assess an efficient WSN. The third section is a survey of essential features of ZigBee networks in underground environments. Finally, the related strengths and weaknesses of a ZigBee network establishment are presented. CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
15 equipment such as telephones (1913), and Walkie-Talkies (1966), supported mining operations considerably and reduced potential risks in underground spaces. Today communication systems are an integral part of mining and assist underground mining operations in achieving a greater degree of safety. In fact, assets have been maximised with the addition of advanced communication techniques compared to the traditional methods of exchanging information between sub-surface and ground- level offices. Remote and automatic systems, operated by fewer skilled and unskilled workers, have brought more dependable health and safety to the workplace. This has meant greater cost-effectiveness, better management of technical problems, energy savings, more real-time responses to accidents, and better environmental monitoring of underground mines (Fisher & Schnittger, 2012). The study of wireless sensor networks (WSNs) is one of the most stimulating fields of computer science research. This has contributed to home and industry communication and monitoring solutions over the past five decades (Silicon- Laboratories, 2012), whereas WSNs have only been appraised in the mining industry during the past twenty years. They are built from a considerable number of low cost and low power consumption nodes. These nodes are able to collect data and relay it to the base station or sink. Then, all base stations or sinks transfer the received data to a coordinator in the control room. These attributes of WSNs’ nodes bring significant benefits to underground mine monitoring and operations. They are able to sense underground environmental variations, perform video surveillance, vocal or message communications, and trace miners and equipment location and operation. Research on WSNs in underground mines has advanced for gas detection and collapse prediction in the coal mine industry. This industry has recorded a large number of events. Reported annual statistics of fatalities from coal mines, especially in the USA and China, underpin the importance of utilising WSNs to reduce the number of injuries, deaths and damage to equipment in order to minimise unexpected costs (Molina, 2011). Underground mining has benefited by the implementation of WSNs for strategic positioning of miners and equipment (Chehri, CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
16 2008; Wan et al., 2013) and communication in both vocal and visual formats (Junhua & Xiaozhou, 2012; Li & Lu, 2011). Studies about the application of WSNs in the underground mining industry started gaining attention in 2003. The prominence of WSNs in academic and commercial publications from 2003 to 2013 is illustrated in Figure 2-2. This is based on an extensive electronic survey of over 382 peer review journal papers, 97 conference papers, 30 books, 367 dissertations, and 64 newspaper articles and trade materials. From the survey, it was realised that WSNs have mainly attracted research attention on the evaluation of WSNs’ performance and their possible applications in underground mines. As seen in Figure 2-2, students also made an increasing contribution to the WSN benefits during these years. In particular, journals and conferences papers as contemporary sources of WSN investigation reached a zenith of 71 in 2012. These statistics demonstrate that significant academic and commercial investment has been placed in assessing WSNs over the past decade. 80 70 60 Type of Document: 50 Newspaper and Trade 40 Journal Paper 30 Conf. Paper Dissertation 20 Book 10 0 Figure 2-2 Studies on wireless sensor network (WSN) in underground mines from 2003 to 2013 Why WSN in underground mines Increasing safety and health in underground operations is a priority in mining automation. WSNs have played a significant role in applying automation in the CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES stnemucoD fo rebmuN 3002 4002 5002 6002 7002 8002 9002 0102 1102 2102 3102
Curtain
17 underground mining industry and are able to collect and transmit information that is characterized by physical and environmental attributes (Wei et al., 2007). WSN capability can also increase by attaching a variety of sensors for different applications such as mechanical, thermal, biological, chemical, optical, and magnetic monitoring. Sensor features can also benefit underground mine networks (Karl & Willig, 2005) and are largely involved in wireless communication, self-organisation and flexible topology. They allow easy expansion following mining progression as well (Haifeng et al., 2011). I) Ad-hoc network ability: WSNs can be structured as autonomous networks by automatically setting up a considerable number of nodes via wireless links as well as not requiring technical infrastructure in establishing WSNs (Buratti et al., 2009). Every node can be a router for the nearby nodes simultaneously while it runs its performing standard functions. Such a structure supports a robust monitoring and communication system comprising many nodes compared with a wired network which is very likely to fail due to cable damage in harsh and narrow underground spaces. II) Self-configuration and self-healing: WSNs provide flexible topology arrangements and fault management. In the case of node failures or any disconnection in the network coverage, the system will enable other possible routes to maintain network functionalities. The self-configuration and self-healing abilities have removed the dilemma of diagnosing and frequent repairing and monitoring network failure without compromising mining operations. III) Scalability: the number of sensor nodes deployed in a WSN can range from hundreds to thousands in one network. This sensor networking is sufficient to cover all required underground mine monitoring and communication applications (Al- Karaki & Kamal, 2004). In such a wide network, data transmission can proceed in a well-arranged node deployment when an event occurs anywhere within the mine. IV) Power usage: WSN nodes are usually battery-powered. This enables them to continue monitoring and communicating regardless of mine site power fluctuations. There are substantial challenges regarding energy-saving mechanisms such as radio CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
18 optimisation, data reduction, sleep/wake scheduling, energy-efficient routing, and battery depletion. Furthermore, recently manufactured batteries can operate on either DC or AC power based on their battery charge or the mine site power supply, respectively. Switching between battery and the mine site power results in extended battery life, and nodes are thus able to continue longer data transmission during power outages (Moridi et al., 2015). V) Sensor nodes capability: sensors are responsible for sensing environment features while nodes act as wireless data transmitters through the network and these combined operations centralise in a single device called a sensor node. Low cost, low power consumption are prominent capabilities of WSNs sensors providing the sensing the surrounding environments and interacting through wireless communication nodes (actors). More importantly, WSN nodes have a reliable transmission capability with small size, low power, and low complexity of establishment (Akyildiz & Kasimoglu, 2004). Hence, WSNs are advantageous and profitable for underground mining. The primary advantages of wireless networks compared with other communication techniques are real-time data transfer, and simple and cost-effective establishment without the need for wire-transmission. Therefore, wireless communication mitigates problems of line breakage through underground collapse or machinery malfunction whilst stabilising operational functions. WSNs architecture design in underground mines Functional practicality is an advantage of the individual node system architecture of WSNs in underground mining. As main tunnels in underground mines are kilometres long, a WSN can enable connections of small branch tunnels networks to the main tunnel network. Moreover, the network architecture of WSNs is based on restrictions, sensor node features, and required applications within the system. Each node sensor performs a sensing task for detecting specific events. For example, a single ZigBee node can contain up to 240 sensors and run multiple applications (Daintree-Networks, 2006). A sink which also is a specific node is responsible for collecting sensing data reported from all the sensor nodes located in branch tunnels and transmits data to a CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
20 The architecture design of recent underground WSNs is based mainly on the technology chosen. For example, ZigBee technology is selected for communication between nodes and gateways (or sinks) in the high frequency range, while Wi-Fi or UWB are employed for medium frequency communication. Alternatively, for the purpose of reducing risks associated with power cables in underground mines, long- range technologies such as internet or WiMAX have been adopted for the communication between a control centre and clients’ operators (Gisbert et al., 2013). WSNs applications in underground mines The applications of WSNs have to some extent brought significant improvements to safety and health, risk assessment, enhanced production, and operating costs reduction in most underground mining aspects. WSNs’ applications directly rely on sensor technology capability for detecting physical environment attributes. It is also notable that the ability of real-time data telemetry makes WSNs’ applications vital in predicting and preventing incidents. Based on the author’s literature review, applications in underground mines are classified into three groups: monitoring, communication and tracking. Figure 2-4 illustrates the proportion of WSN application studies in underground mines. Figure 2-4 Percentage of conducted studies on WSNs’ applications in underground mines CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
21 As shown in this chart, 47% and 36% of these studies have concentrated on monitoring and tracking, whereas only 17% on communication because of numerous required underground applications in monitoring and tracking. This was impractical using technologies that existed before WSNs. In addition, the importance of monitoring and tracking is becoming more evident as they have delivered an integrated solution to the major concerns in underground mine management, particularly in coal mines. On the other hand, the successful use of semi-wireless communication systems such as Leaky Feeder-Based System and Ethernet, and wireless communication services like Walkie-Talkie System and Bluetooth reduces research in the area of WSNs. The possible WSNs’ applications in underground mines that were examined and classified in studies during the last decade are illustrated in Figure 2-5. The details of each area are investigated in the sections that follow. Figure 2-5 Possible WSNs’ applications in underground mines during last decade Environmental monitoring The most important application of WSNs in underground mines is to help minimise the effects of natural disasters by monitoring the environment. Various types of CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
22 sensors are being used to measure environment attributes, such as gas concentration, temperature, humidity, and ground acceleration (geotechnical instrument), to provide real-time safety and health data from underground operations. Analysis of the data is vital in mining management and incident prevention. Although other monitoring systems could be utilised in underground tunnels, WSNs significantly refine the surveillance for overall care of mining personnel. For example, sensors can be more easily and densely installed compared with wired ones, and managing a specified underground area in emergency conditions will be more efficient, based on the received local detailed data. Minute sensor nodes also render WSNs more useful to sense dark, dusty and narrow underground spaces which are travel paths for large mine machinery. These nodes could be deployed in top corners or ceiling of tunnels. In addition, deploying sensor nodes, that are in places distant from incidents, helps maintain a durable and sustainable wireless network. Monitoring the concentration of toxic gases particularly in coal mines is another beneficial application of these sensors. As they are able to be developed and employed in wet areas, advantages of WSNs become more conspicuous in the presence of aquifers and mining operation water by which chemical or mechanical devices lose their sensitivity. Studies in underground monitoring using WSNs have widely focused on evaluating applications of fire detection, concentration of noxious gases, and other environmental features such as temperature, humidity and air pressure in mines (Pandit & Rane, 2013; Sun et al., 2010). Continually measuring dangerous gases such as methane, carbon dioxide and monoxide which can lead to explosions or fire in coal mines makes WSN research important in the context of underground mining. Operation management is another perspective of WSN research in underground mines. In 2009, Li & Liu suggested a Structure-Aware Self-Adaptive (SASA) WSN system for rapid structure variation detection, caused by collapses in underground mines, regulating mesh deployment of sensors. As fires are still a major factor causing fatalities and injuries in the mining industries, research has examined various methods and WSN types for abrupt fires in underground coal mines (Bhattacharjee et al., 2012; Wei, 2007). El Kouche Alma'aitah, Hassanein, & Obaia (2013) investigated CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
23 a WSN platform to monitor the erosion conditions of mining machinery to prevent ignitable sparks. Zhang, Yang, Han, & Kim, (2014) also introduced an integrated system capable of repeating inspections based on the WSNs and Cable Monitoring System (CMS) to improve underground coal mine safety. Operational monitoring through WSNs is also considered to improve safety issues and operation management in underground mines. For example, Yin (2011) simulated a program to evaluate underground scrapers’ tele control autonomous walking, merging WLAN and ZigBee technologies. In addition, Wan et al. (2013) presented a derailment monitoring system in endless rope continuous tractors. Real- time monitoring of shuttle car operations, derailment detection, alarming and parking were expected from this system. The ability of audio sensors equipped with powerful, high-sensitivity and low-consumption microphones, also supports search of trapped miners after collapses in tunnels (Akyildiz & Stuntebeck, 2006; Molina, 2011). Furthermore, since air ventilation deficiency in underground mines is a critical issue to the occupational safety and health for mine personnel, air quality is improved by adding auxiliary fans to the ventilation system equipped by the automatic or remote reaction of sensor nodes (Moridi, 2015). It is generally recognized that studies focusing on operational monitoring should be performed in actual cases to achieve meaningful results in mine production scheduling. Finally, an efficient underground monitoring system is usually designed with multiple requirements of sensing and reacting applications to prevent gas explosions and collapse (Bhattacharjee, 2012; Li & Liu, 2009; Pandit & Rane, 2013; Wei, 2007). Communications Leaky Feeder (LF) is a semi-wireless communication system which has been recently used for the distribution of voice and data in underground mines. This system has very costly network establishment and maintenance and lacks standardization. Furthermore, its functionality to transmit data is limited to line-of-sight transmissions as transmission cannot pass through solid rock. It also becomes damaged and inoperative as a result of underground collapses or accidents. CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
24 An alternative solution for underground communication systems based on WSNs are to incorporate video, picture, voice and text messaging communications (Pandit & Rane, 2013; Qu et al., 2012; Yarkan et al., 2009). The proposed optical WSNs for underground communication systems are not reliable for emergency situations due to the presence of smoke and dust, and the shortage of lighting. Expensive cameras are also required. Hence, studies have focused more in the ability of voice communication (Sicignano, 2011) and text messaging (Moridi, 2015) using WSNs in underground mines. Researchers have dealt with signal propagation techniques of WSNs in confined environments like tunnels and underground mines to propose real-time response as well as provide communication effectiveness in emergency situations. Specific conditions of tunnels such as rough surface, different shapes, sharpness edges and curvatures have an influence on signal strength reduction. Under these conditions, cost-effective designs on the software and hardware of underground voice communication can be investigated using Wi-Fi under the IEEE 802.11 standard (Müller & Noack, 2011; VAMVU & BARBU, 2013), and ZigBee under the IEEE 802.15.4 standard (Pandit & Rane, 2013; Yin, 2011). Tracking Tracking to estimate miners’ and equipment location in underground mines has been another challenge. Since WSNs have a potential ability to include such applications, some theoretical models of sensor node localization have been proposed for environment monitoring, miners’ localisation and vehicle tracking (Song et al., 2011). In order to achieve these purposes, sensor deployment strategy involves creating extensive and dense monitoring and tracking systems. Improvement in the energy efficiency of nodes in order to prolong the lifespan of WSNs is achieved by this strategy (Chen et al., 2008; Haifeng, 2011; Wu et al., 2010). In addition, an optimal positioning algorithm will effectively make the network secure and time saving (Salap et al., 2009). There are several factors such as communication mode, location method, topology and routing protocol which would be considered when estimating methods of CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
25 stationary and mobile node locations (Chen et al., 2009). Thus, positioning algorithms are categorized using a triangle measuring method based on triangulating arrival signals parameters, or employing the scene fingerprint method through scene features and the adjacent method to determine the zone of any moving node. The triangle measuring methods including signal intensity (RSSI), time of arrival of signal (TOA), time difference of arrival (TDOA) and angle of arrival (AOA) are widely used for positioning systems in underground mines (Longkang, 2011). Analysing studies on localization show that RSSI and TOA methods are also pertinent because of their precision and their suitable hardware. The RSSI method is cost- effective and generally used with a DV-Hop algorithm to calculate the distance for a mobile node from closed anchor nodes in underground mines (Chen, 2009; Wang & Shen, 2009; Xu et al., 2012). The TOA method has also been investigated for higher positioning precision (Chehri et al., 2009). Underground WSNs evaluation Wireless sensor networks (WSNs) have been utilised in underground mines as a way to enhance safety and productivity and reduce operational costs (Bhattacharjee, 2012; Chehri, 2009). The common WSNs for monitoring and communication systems in underground mining are mainly comprised of Bluetooth technology, ultra- wideband (UWB) technology, Wi-Fi technology and ZigBee technology. The system architecture of these WSNs in underground mines is illustrated Figure 2-6. For the investigation of applicable and reliable wireless systems, the main features of underground WSNs are illustrated in Table 2-1 (Bandyopadhyay et al., 2009; Bluetooth SIG Inc, 2013; Jinyun et al., 2009; Kawamura et al., 2013). As shown in the Table 2-1, Bluetooth has a limited applicability because of its short communication distance between nodes (i.e. requiring a high number of nodes per tunnel) and its low network capacity. However, UWB meets a sufficient data rate, network capacity and low power consumption per node but the communication distance restriction can cause congestion of nodes in tunnels. Thus, traffic routing would be a major problem in utilising a UWB system. CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
27 Table 2-1 Comparison of common underground WSNs Parameters Bluetooth UWB Wi-Fi ZigBee Communication distance 10 < 10 50-100 50-500 (m) Frequency range (GHz) 2.4 3.1 - 10.6 2.4 or 5 2.4 Data rate (Mbps) 1 100-500 11 250 10-3 Network capacity (nodes) 7 10-500 32 65×536 Power consumption 1-100 30 500 -1000 20-40 (mW) Complexity High Medium - High High Low On the other hand, Wi-Fi is a common wireless technology utilised in underground mines because it has adequate communication distance and a high communication speed. Some negative aspects of this network are high power consumption nodes, the need for infrastructure access points for clusters, continuous power supply and access point connections for cabling. Additionally, there is no multi-hop network topology between Wi-Fi nodes even though data is capable of being transmitted between nodes and access point. ZigBee is a new wireless technology which combines current technical advances compared with other WSNs for monitoring and communication systems in underground mines. It has greater communication distances between nodes, substantial node network, low energy consumption and low complexity, as shown in Table 1. Also, ZigBee technology has very cost-effective nodes, network installation and maintenance compared with other underground WSNs. nor does it require any access point or central node to transmit data between clusters. Although ZigBee network has very low data rate (250 kbps) for image, voice and video communication, it is capable in providing networking applications for data transmission between nodes (node to node relays) with high performance based on numerous hops. Recently, ZigBee has been used in the field of mine safety for a range of applications mostly in underground coal mines as an automatic meter reading system, security CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
28 system and for remote control whilst supporting other WSNs (Chehri et al., 2011; Hongjiang & Shuangyou, 2008). This study proposes a monitoring and communication system for underground mines based on ZigBee network performance without other supporting WSNs. In fact, utilising central (sink) nodes or access points through another WSNs because of high power consumption and cable damage risk is eliminated. ZigBee is selected for its powerful networking capability through ad-hoc and multi-hop topology and considerable network capacity and cost- effectiveness. Based on this system, data from sensors (fixed nodes) and workers and vehicles (mobile nodes) locations in an underground mine could be transferred to a surface gateway for monitoring and bilateral communication. A SURVEY OF ZIGBEE NETWORK IN UNDERGROUND MINES ZigBee is a new wireless communication technology based on the IEEE 802.15.4 standard. This standard introduces ZigBee as a low rate and low power consumption technology for wireless personal area network (WPAN). The first ZigBee node was developed by ZigBee union in 2004 (Longkang, 2011). Due to the benefits of the features detailed below, ZigBee network is adopted for underground mine communication systems ZigBee nodes can last six months up to two years. They are also very low-cost compared with other WSN nodes and qualify for a free licence in the frequency bands, with the flexible range in operating frequency of 2.4 GHz around the world and regional bands of 868 MHz in Europe and 915 MHz in the USA. ZigBee provides reliable infrastructure based on a mechanism of collision avoidance to prevent competition and conflict in sending data. It also avoids interference with other ZigBee networks which communicate on the same frequency nearby (Longkang, 2011). ZigBee networks can support up to 65,536 sensor nodes in one system. Real- time data aggregation enables it to provide bounded delay guarantees, so it is capable of collecting, processing and transmitting data in a very short delay time. It is capable of ad-hoc networking. In other words, sensor nodes including stationary and mobile ones can join the network autonomously and communicate together without existing infrastructure and central control. In addition, ZigBee nodes commonly have self-organization and self-healing abilities. Another prominent CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
29 feature of ZigBee is multi-hop communications. Some ZigBee network topologies such as mesh networking are promoted with multi-hop ability. This allows a wireless network to forward data by hopping node to node until it will be securely received by the destination node. This ability, indeed, increases fault tolerance through the network, as well as having alternative routes for more secure and effective communications particularly in emergency conditions. These significant features of ZigBee networks have substantially drawn researchers’ attention of this technology to the area of underground mining. Figure 2-7 illustrates the trend of different studies in underground mines using ZigBee between 2003 and 2013. The bar chart is extracted from 23 newspapers and magazines, 138 journal papers, 86 conferences papers, 34 university dissertations, and 19 books including book chapters. Therefore, in the earlier years of ZigBee development, underground applications were introduced primarily via newspapers and trading company advertisements. However, research papers and conferences started to focus on this technology. There also have been substantial publications in this period such as dissertations and books on ZigBee, specifically focusing on the context of underground mining. The trend of studies has still increased after 2013 because of the electronical development of the ZigBee nodes in terms of functions and the considerable extension of antenna gain. 40 35 30 Type of Document: 25 Newspaper and Trade 20 Journal Paper 15 Conf. Paper 10 Dissertation 5 Book 0 Figure 2-7 Studies on ZigBee in underground mines CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES stnemucoD fo rebmuN 3002 4002 5002 6002 7002 8002 9002 0102 1102 2102 3102
Curtain
30 In these studies, it is clearly observed that safety was the major aspect considered in a considerable number of research works on ZigBee technology for underground mining, particularly coal mines. The main investigations of these studies are analysed in the following sections. ZigBee applications This research presents three categories of underground ZigBee network applications including environmental monitoring, tracking and communication. Figure 2-8 chronologically illustrates the description of these applications based on analysing studies from 2003 to 2013. 11% Environmental monitoring Tracking 50% Communication 39% Figure 2-8 Breakdown of studies conducted on ZigBee applications in underground mines As seen in Figure 2-8, more than 50% of studies have mostly focused on monitoring underground mine coal environment attributes, and 39% of studies investigated the most accurate algorithms as well as efficient and cost-effective methods for the positioning of mobile and stationary ZigBee nodes. Lastly, only less than 11% of studies examined the communication between surface and underground personnel by ZigBee network. Further explanation with regard to academic work on the ZigBee network follows. CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
31 The application of ZigBee networks relies on the sensor network applications which are able to communicate with physical layers of the ZigBee protocol. Sensor networks may consist of many different types of sensors which can be used for continuous sensing, event detection, event ID, location sensing, and local control of actuators (Leccese et al., 2014). The concept of micro-sensing and wireless connection of these nodes is a promising area for new applications. Underground mine applications based on stationary and mobile sensor nodes can be categorised as follows: a) Potential applications of stationary sensor nodes (positioning): • Secondary (supportive) Communication: based on voice communication or message texting in emergency conditions • Environmental monitoring: measuring air quality and quantity as well as detecting gas and fire • Ground movement monitoring: the periodic transmission of geotechnical instrumentation data • Production management: the real-time transmission of equipment operational information b) Potential applications of mobile sensor nodes : • Emergency mustering: tracking miners and tagging systems • Traffic management: monitoring mobile plant equipment and using traffic signals control • Production measurement: improving the trip cycle for jumbo drills and longwalls, or configuring the payload of production vehicles ZigBee stack The protocol stack of ZigBee networks is comprised of four main layers. The logical arrangement of these layers is illustrated in Figure 2-9. The application layer and the network layer are supported under a ZigBee specification, and the media access control (MAC) and the physical layers (PHY) are supported through the IEEE 802.15.4 standard. ZigBee layers are often formed as upper layers of a ZigBee stack. There are sublayers, each of which have different functions. CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
32 Figure 2-9 Logical arrangement of a ZigBee stack I) Application layer: This layer provides a framework for distributed applications and it is divided into three sub-layers comprised of the application objects, the ZigBee device object (ZDO) and the application sub-layer. The application objects are the endpoint software which includes the tasks of each ZigBee node, for example, periodic reading of environmental conditions. A single ZigBee node can support between 1 to 240 application objects. At the same time, the ZDO defines the different roles of ZigBee communication within the network like coordinator, full function device or end device. It also allows nodes to detect each other and establish a reliable network. The application sub-layer supports a data delivery service and secures links for the application objects and the ZigBee device object. II) Network layer: this layer is responsible for ZigBee network addressing and routing by broadcasting through a MAC layer. So, this layer makes sure that sent data packets are being received by the destination node, and joining or re-joining is secure. III) IEEE 802.15.4: This standard, defined in 2003, specifies two layers of MAC and PHY for low-rate wireless personal area networks (LR-WPANs). CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
33 IV) Media access control (MAC): The MAC layer provides addressing and channel access control mechanisms (16 channel) that make it possible for several terminals or network nodes to communicate within a multiple access network. V) Physical layer (PHY): Defines the means of transmitting raw bits rather than logical data packets through a physical link connecting network nodes and converts data packets to wireless signals (over-the-air) and vice versa. This layer supports three frequency bands of 2.400 GHz-2.484 GHz globally at a maximum rate of 250 kbps, 902 MHz-928 MHz at 40 kbps of data rate in the United States, and 780.0 MHz -868.6 MHz at 20 kbps in Europe. Link quality and energy detection measurement are also other functionalities of a PHY layer (Lu, 2011). ZigBee routing protocols A routing protocol determines the routes selected between sensor nodes in order to communicate. Routing as mentioned above is one of the major functions of the ZigBee network layer which is highly influenced by lower layers of MAC and PHY layers. Therefore, analysing these lower layers, such as the required communication range between nodes, plays a significant role in designing an efficient and reliable routing protocol for WSNs. Routing protocols are commonly categorized into two groups called proactive and reactive routing. Under the proactive routing, also known as table-driven route discovery, nodes have to be set up in a certain topology before establishing the network. Each node ought to aware of nearby nodes in advance. Thus, nodes become active to discover surrounding destination nodes before transmitting data packets. Although this is a very efficient and reliable way to communicate, energy consumption and bandwidth occupancy are increased as all nodes are automatically updated and are always discovering other available routes. The reactive routing, also known as on-demand route discovery, is where a node discovers routes on demand. Here, a node initiates a route discovery and adopts a path to a destination node when it as the source node has a packet to deliver. It is suitable for mobile nodes which have to alter communication topologies and paths over time through the network. As a result, the lesser consumption of energy and CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
34 bandwidth is a salient feature of this routing protocol, but packet delivery becomes longer owing to routes discoveries for each transmission (Hamid et al., 2013). These challenges have drawn academics’ attention to investigate a wide range of new algorithms and solutions on ZigBee routing optimization largely for decreasing cost and power consumption and improve the reliability of packet delivery through the network. ZigBee network topologies Topology refers to the configuration of nodes (hardware) that establish a wireless network and how the data is transmitted within the network. ZigBee networks under the IEEE 802.15.4 standard support three different node functions including coordinator (gateway), full-function (router) and end-device. These functionalities are as follows: I) Coordinator: This node sets up and controls the network as well as storing information required from other nodes. It operates as a terminal for other nodes through the network and is also referred to as a personal area network (PAN) coordinator. II) Full-function: This node relays data transmission between the coordinator and other participating nodes as well as fulfilling duties such as environmental sensing. This type of node extends network area coverage and strives to maintain communication routes despite network congestion or possible node failure. III) End-device: This node only can receive or transmit data. Accordingly, it must be set up for direct communication with the nearest full-function node or coordinator. Because of the function of these nodes types, three network topologies namely star, cluster-tree and mesh (peer-to-peer) are predominantly supported by ZigBee specifications. Figure 2-10 illustrates how these topologies are differentiated to establish a network between nodes. First, in the star topology, a PAN coordinator has a responsibility to communicate with every single node through the network. This topology is appropriate for systems which need centralized and real-time communicable applications. Second, in the cluster-tree topology, every full-function CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
36 ZigBee network reliability Ensuring the reliability of WSNs is mainly concerned with the possibility of temporary or permanent node failure within the network largely resulting from the deficiencies of battery-power and radio-based communication. This is of particular importance when designing an extensive and reliable ZigBee network for underground mine monitoring and communication systems. To provide higher degree accuracy and more reliable exchange of data through such a robust network, it needs to be secured and equipped along several possible routes. To avoid an unreliable communication in the linkage of sensor nodes, network design is not commonly focused on each single end-to-end delivery. In fact, the adjustment of network features and higher layers of application and network layers in a ZigBee stack can definitively improve the reliability of lower layers of the PHY and MAC layers. For example, different intervals of periodic readings must be managed for the application layers in order to avoid overloading or data-remembering failure by lower layers. It also is essential for sensor node applications to remove unnecessary data records and aggregation. Consequently, a number of characters such as worth-data priority, reading intervals management, and environmental effects on radio wave propagation all influence the network reliability (Baronti et al., 2007). ZigBee network security Sensor nodes in a wireless sensor network are limited in their computational power and communication resources. Due to these strict resource constraints, present network security mechanisms are inappropriate for this field of operation. Efficient encryption of measured data can be achieved at the cost of increased overheads in the length of the message. However, radio communications are the most energy consuming function performed by these nodes, hence the communications overheads have to be minimised to achieve system longevity. The security requirements of wireless sensor networks are defined as data confidentiality, authenticity, integrity and current validity. I) Data confidentiality: Data confidentiality means keeping important transmitted information undisclosed from unauthorised personnel. This is particularly important CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
37 in the case of wireless networks where data is transmitted using a radio frequency whereby any radio receiver can intercept data. Data confidentiality is usually achieved by encrypting the information before transmission so that only authorised personnel can decrypt transmitted information. Encryption is therefore classified into two categories: symmetric encryption and asymmetric encryption. In symmetric encryption, a secret key is shared between the authorised parties, while in asymmetric encryption, the sender encrypts the data with a public key and the receiver decrypts it using a private key. A strong encryption mechanism not only prevents message recovery but also prevents uncategorised parties from decoding even partial information about the message. This property is called semantic security, which implies that the encryption of the same plaintext two different times should give two different cipher texts (Perrig et al., 2002). II) Data authenticity: Data authenticity provides a means to detect messages from unauthorised nodes thereby preventing such nodes engaging the network, that is, data authentication allows a receiver to verify that the data is sent by the claimed sender. This is particularly important in sensor networks where a hostile node can easily implant a large number of messages into the network (Baronti, 2007) causing other nodes to process these messages thereby decreasing their power resources. Therefore, a receiver of these messages should ensure that the message is desired from an authorised source. Data authentication can be achieved by calculating a Message Authentication Code1 (MAC) using a shared secret key for the transmitted data. This MAC is also sent simultaneously with the data. The receiver would also calculate the MAC for the received data using the shared key, and then compare this computed MAC value to the one sent by the sender of the data. If the two match, then the receiver recognises that the data has been sent from a valid sender (Perrig, 2002). This affirms message authenticity. III) Data integrity: Communications in wireless sensor networks are based on broadcasts, hence messages can be easily intercepted and/or tampered via audio reception through the wireless medium. Data integrity provides a way for the receiver of the message to know if the data has been tampered while in transit by an attacker (Perrig, 2002). Data integrity is closely related to data authentication since CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
38 the MAC also provides data integrity. The receiver of the data calculates the MAC and compares it to the one transmitted by the sender. If the two MACs match then it ensures that the data was not tampered with. In other words, if an adversary has tampered with the message then the MAC calculated by the receiver cannot be equal to the MAC that was initially calculated by the sender at the time of sending the message. IV) Data freshness: Data freshness ensures that the received data is recent and that an adversary has not repeated old messages subsequently. Data freshness can be divided into two categories: weak freshness and strong freshness (Perrig, 2002). Weak freshness provides partial data ordering which prevents data from being replayed but carries no delay information (Baronti, 2007). Strong freshness, on the other hand, uses a request-response model to provide complete ordering of messages and delay estimation to prevent the data being held by an unauthorised user. Weak freshness is required for sensor measurements while strong freshness is required for time synchronisation within the network. One of the most common methods to provide data freshness is to use a monotonically increasing counter with every message and reject any messages with old counter values. However, every recipient would need to maintain a table of the last counter value from every sender. This method may be unfeasible in wireless sensor networks where the sensor nodes are memory constrained and would not be able to store such a table for even a moderately sized network. DISCUSSION It is strongly believed that the advantages of ZigBee networks to underground mining outweigh its disadvantages. On one hand, there are some negative viewpoints in using ZigBee networks in underground environments. The significant infirmity of it through WSNs is that it is capable of data transmission with a very low data rate of 250 kbps. Although this is efficient for digital data telemetry, text messages and to some extent voice messages, video-data transmission might be impossible. This is because photo and video streams in dusty and dark environments is normally impractical in underground spaces. CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
39 Another concern regarding an extended ZigBee network might be an increase in multi-hops. As a result of the lack of central routers and gateways (coordinators), nodes are themselves routers. Thus, packets follow multi-hop routes and pass via mobile nodes before arriving at their final destination. This feature causes a serious vulnerability of wireless communications in underground mines owing to the possibility of violation of such nodes. Nevertheless, a ZigBee network possesses various features that enable it to mitigate these dilemmas in underground mines. The features of ZigBee are analysed in the following paragraphs. I) Energy-effective: ZigBee is known for very low power consumption in WSNs. For one thing, a ZigBee network is very low energy-consuming both for node and protocol (IEEE 802.14.5) alike; see Figure 2-9. A ZigBee node also is much more energy-efficient with 20-40 mW power usage, compared to a Wi-Fi node with 500-1000 mW power usage, as shown in Table 1. This key feature definitely prioritises ZigBee with a debatable alternative choice of Wi-Fi for wireless network installation in industries and in particular, underground mining. In addition, the recent manufacture of new ZigBee nodes are associated with the lower power consumption of 1 mW. ZigBee nodes are known for low power consumption because of efficient energy usage while transmitting radio signals, and more importantly due to intelligent battery power management in sleep mode. Such ability enables any ZigBee node to be programmed so as to switch automatically to the sleep mode when it does not need to record or transmit data. Power consumption during waiting time to communicate with surrounding nodes, while it is in the sleep mode, is even negligible. For example, for an output power of 1 mW of radio transmission, a ZigBee node normally consumes 75 mA at 3.3 V whereas it increases to 150 mA at 3.3 V for an output power of 100 mW. In other words, a high-power node consumes twice the power to transmit a data packet compared with a low-power node (Cirronet, 2007). In this situation, if these ZigBee nodes are awake only 5% of the time that is very active period of radio telemetry, the approximate average power consumption would be 5% as well for both cases. The battery, as the result of this, will have a life span of five years with a low-power node (1 mW) and four years and nine months with a high- CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
40 power node (100 mW). Now, it is clear why it is claimed that ZigBee nodes with such a battery power can last many months to several years. II) Cost-effective: ZigBee technology is most cost-effective for several reasons. Firstly, it has inexpensive modules compared with Wi-Fi modules. The details of this are illustrated in Table 2-2, (Rahman, 2014). As seen in this table, the establishment of a ZigBee network not requiring any access point is a more cost- effective solution for wireless networking in underground mines. Table 2-2 Comparison of costs between ZigBee and Wi-Fi networks WSN Costs Module: ~ $2.75 - $3.5 Cable: $0 ZigBee Access point: $0/switch Module: ~ $8 - $16 Cable: $0 Wi-Fi Access point/switch: $20 - 50 There are different kinds of ZigBee nodes which give the flexibility to design even more cost-effective wireless networks. There is a low-cost node with a minimal memory requirement called Reduce Function Device (RFD). It can only function as a network device to record and send data, but unable to receive data or data telemetry. Secondly, a ZigBee network also comes with free licences to broadcast in the frequency spectrum. Finally, it provides very low maintenance costs owing to facilities with an inherent configuration and redundancy of nodes within the network. That is why a ZigBee network is introduced as a low-cost system for monitoring and communication in underground mines. III) Frequency range Flexibility: ZigBee utilises the 2.4 GHz frequency band to support global operation, and affords other regional operations such as 868MHz in Europe and 915 MHz in the USA. Such flexibility contributes to improve the ZigBee network adaptability to the specified applications that need stronger output power or where less energy consumption is required. CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
41 IV) Multi-hop: ZigBee utilises a multi-hop routing that enables nodes to operate as a relay in order to deliver data from nearby nodes, and pass it to the final node (coordinator). This means that the range of communication between a node and coordinator can be extended. Therefore, it is one fundamental component in underground spaces for long distance wireless communication(Qandour et al., 2014). V) Ad-hoc network: a ZigBee network is established spontaneously as nodes turn on and connect, and does not rely on base stations to coordinate the routes of communication between nodes. As a result, the nodes can be placed anywhere taking into account the restrictions of underground mine activities and environments, and the ZigBee network will automatically figure out the routes to communicate. ZigBee nodes also have self-organization and self-healing abilities to rebuild wireless networking at high potential node failure in underground tunnels. Furthermore, this fortifies the advantage of such a dynamic system for more underground mining applications based on the mobile nodes connecting together or alternatively to the fixed nodes through the underground wireless network. VI) Large network capacity: ZigBee connection and communication among 65,536 wireless sensor nodes in one system is another proficient ability compared to other WSNs used in underground mines. This considerably reduces the costs of network establishment and maintenance and energy consumption, as well as eliminating locations and services of system infrastructure through the narrow environments. However, node capacity is restricted by network coverage, topology structure, and bandwidth requirements based on the types of applications. VII) Reliable infrastructure: This is one of the most significant features of ZigBee networks considered for underground mines. Within such a network, each node provides reassessing relevant and alternative routes to ensure successful data delivery to the master point (coordinator). In fact, it includes a mechanism of collision avoidance to prevent competition and conflict in sending data. This ability of nodes allows ZigBee to provide a reliable network infrastructure in interference-rich environments. CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
42 VIII) Real-time data communication: ZigBee is capable of providing bounded delay guarantees on data delivery that is technically named real-time data delivery in WSNs. It takes almost 15 ms to complete a bilateral communication between two adjacent nodes (Li & Zhao, 2009). Such a network performance could certainly revolutionise underground mining management and safety, particularly in emergency conditions. IX) Safety: ZigBee provides a data integrity check and authentication function. Therefore, it is absolutely convincing that the weaknesses of ZigBee for underground monitoring and communication systems are outweighed by the strengths. These benefits not only promote health and safety difficulties in underground mines, particularly in coal mining, but also revolutionise management in underground mining operations. CONCLUSION This chapter made an attempt to discuss and summarize most of the pioneer and the recent approaches of WSNs’ architecture designs and applications in underground mines. Clearly, the approaches have undergone an evolution to reach the state of the art, but there is still a long way to go for a robust and reliable underground space monitoring and communication system. However, the correlation and linkage between knowledge scope, existing techniques and practical experiments based on the past works have been established to prove the possibility of ZigBee networks for such a vital system in underground mines. It has been found that ZigBee features and its applications are adapted to the damp, dark and hazardous underground environments, and they can certainly make an improvement in safety and operations management in these environments. CHAPTER 2. STATE OF ART OF WSNS IN UNDERGROUND MINES
Curtain
43 ZIGBEE RADIO WAVE PROPAGATION INVESTIGATION IN UNDERGROUND MINES INTRODUCTION The radio waves of WSNs’ communication are more complex in underground mine environments. As the reliable communication is an effective element for safe and efficient mining, the analysis of the electromagnetic fields and the investigation of radio waves attenuation evaluating underground effective factors are essential. In this chapter, a monitoring and communication system for underground mines based on ZigBee network performance without supporting other WSNs is proposed. Use of central (sink) nodes or access points is eliminated because of high power consumption and cable damage risk. In fact, ZigBee is selected for its powerful networking capability through ad-hoc and multi-hop topology, its considerable network capacity and cost-effectiveness. Based on this system, data from sensors (fixed nodes) and workers and vehicles (mobile nodes) locations in underground mine could be transferred to a surface gateway for monitoring and bilateral communication. Wireless network coverage for long distance is mandatory considering the spatial positions between the surface gateway and ZigBee nodes in underground mines. Therefore, investigations to prove the proposed system as a reliable and secure network are delineated as below: • Stable communication distance for packet delivery • Evaluation of network metrics • Accuracy of the position of mobile nodes Based on expanded knowledge of underground WSNs, the stable communication distance between ZigBee nodes is analysed in this chapter. The conceptual procedure of the investigation of ZigBee radio wave propagation in underground mine in underground mines is illustrated in Figure 3-1. To investigate the stable communication distance between ZigBee nodes, first the theory of radio waves propagation models to simulate experimental measurements in the tunnel is described. Then, the methodology of experimental measurements and simulations CHAPTER 3. ZIGBEE RADIO WAVE PROPAGATION INVESTIGATION IN UNDERGROUND MINES
Curtain
45 (Boutin et al., 2008; Lamminmaki & Lempiainen, 1998). Figure 3-2 illustrates typically practical measurements for attenuation trend and a theoretical model in a tunnel channel at the frequency of 2.4 GHz [after Hrovat and Javornik, 2013]. Figure 3-2 Typical attenuation trend for practical measurements and theoretical model in tunnel [after Hrovat and Javornik, 2013] In this study, multimode waveguide model is investigated to simulate both near and far regions from the source by summing the power of rays received from reflections on the tunnel walls and the source. The excitation plane is used in the geometrical optics (GO) model of Shooting and Bouncing Ray (SBR) method to analyse different field distributions and attenuation coefficients (Zhi & Akyildiz, 2010). Based on this method, rays are first traced from the source then reflected rays from tunnel walls are calculated. According to this technique, Maxwell’s equations and eigenfunctions, the received signal power at the coordinate would be obtained by Eq. 3-1: (𝑃𝑃𝑟𝑟 ) (𝑥𝑥,𝑦𝑦,𝑧𝑧) Eq. 3-1 2 1 𝑒𝑒𝑒𝑒𝑒𝑒𝑛𝑛 −(𝛼𝛼𝑚𝑚𝑚𝑚+𝑗𝑗𝛽𝛽𝑚𝑚𝑚𝑚). 𝑧𝑧 w𝑃𝑃𝑟𝑟 h (e𝑥𝑥r,e𝑦𝑦 ,𝑧𝑧)is =th e𝑃𝑃 t𝑡𝑡 r 𝐺𝐺an𝑡𝑡 s𝐺𝐺m𝑟𝑟 i�tt𝐸𝐸e0r ∑po𝑚𝑚 w,𝑛𝑛 e𝐶𝐶r;𝑚𝑚 ,𝑛𝑛 a.𝐸𝐸n𝑚𝑚d ,𝑛𝑛 (a𝑥𝑥r,e𝑦𝑦 t)h.e𝑒𝑒 antenna gains �of the transmitter and the 𝑃𝑃 𝑡𝑡r eceiver, respectively. a 𝐺𝐺n𝑡𝑡 d in 𝐺𝐺d𝑟𝑟 icate the field of all significant modes. 𝑚𝑚 𝑛𝑛 CHAPTER 3. ZIGBEE RADIO WAVE PROPAGATION INVESTIGATION IN UNDERGROUND MINES
Curtain
46 , , and are the mode intensity in the excitation plane, 𝑒𝑒𝑒𝑒𝑒𝑒𝑛𝑛 𝐶𝐶ei𝑚𝑚ge,𝑛𝑛n fu 𝐸𝐸n𝑚𝑚ct,𝑛𝑛ions, 𝛼𝛼 t𝑚𝑚he𝑛𝑛 attenu 𝛽𝛽a𝑚𝑚ti𝑛𝑛on coefficient and the phase-shift coefficient, as given by Eqs. 3-2, 3, 4 and 5: Eq. 3-2 𝐸𝐸0𝜋𝜋 𝑚𝑚𝜋𝜋 𝑛𝑛𝜋𝜋 𝐶𝐶𝑚𝑚,𝑛𝑛 = 𝑚𝑚𝑚𝑚 2 𝑚𝑚𝑚𝑚 2 sin( 2𝑎𝑎 𝑥𝑥0 + 𝜑𝜑𝑥𝑥).cos(2𝑎𝑎𝑦𝑦0 + 𝜑𝜑𝑦𝑦) 𝑎𝑎𝑎𝑎�1−(2𝑎𝑎𝑎𝑎) − (2𝑏𝑏𝑎𝑎) Eq. 3-3 𝑒𝑒𝑒𝑒𝑒𝑒𝑛𝑛 𝑚𝑚𝜋𝜋 𝑛𝑛𝜋𝜋 𝐸𝐸𝑚𝑚,𝑛𝑛 (𝑥𝑥,𝑦𝑦) ≅ sin( 2𝑎𝑎 𝑥𝑥0 + 𝜑𝜑𝑥𝑥).cos(2𝑎𝑎𝑦𝑦0 + 𝜑𝜑𝑦𝑦) Eq. 3-4 1 𝑚𝑚𝜋𝜋 2 𝑎𝑎𝑣𝑣 1 𝑛𝑛𝜋𝜋 2 1 𝛼𝛼𝑚𝑚𝑛𝑛 = 𝑎𝑎 (2𝑎𝑎𝑎𝑎) 𝑅𝑅𝑒𝑒 +𝑎𝑎 (2𝑎𝑎𝑎𝑎) 𝑅𝑅𝑒𝑒 �𝑎𝑎𝑣𝑣−1 �𝑎𝑎𝑣𝑣−1 Eq. 3-5 𝑚𝑚𝜋𝜋 𝑛𝑛𝜋𝜋 2 2 2 𝛽𝛽𝑚𝑚𝑛𝑛 = �𝑘𝑘 − (2𝑎𝑎𝑎𝑎) − (2𝑎𝑎𝑎𝑎) In these formulas, if is even number; if is odd number; if 𝜋𝜋 is odd number a𝜑𝜑n𝑥𝑥 d = 0 𝑚𝑚 if is even numb𝜑𝜑e𝑥𝑥 r.= Th2e t𝑚𝑚unnel cross sectio𝜑𝜑n𝑦𝑦 o=f t0he 𝜋𝜋 𝑛𝑛model is a rectangle sh𝜑𝜑ap𝑦𝑦e= wi2th 𝑛𝑛 width and height, and the origin of a Cartesian coordinate system is mounted a2t 𝑎𝑎the centre of2 t𝑏𝑏unnel. , and are indicated for the relative electrical parameters for vertical/horizonta 𝑘𝑘l𝑣𝑣 w 𝑘𝑘aℎlls of t 𝑘𝑘he tunnel and the wave number as defined by Eqs. 3-6, 7 and 8: 𝜎𝜎𝑣𝑣 Eq. 3-6 𝑎𝑎𝑣𝑣 𝜀𝜀0𝜀𝜀𝑣𝑣+𝑗𝑗2𝑚𝑚𝜋𝜋0 𝑘𝑘𝑣𝑣 = 𝑎𝑎𝑎𝑎 = 𝜀𝜀0𝜀𝜀𝑎𝑎+𝑗𝑗2𝜎𝜎 𝑚𝑚𝑎𝑎 𝜋𝜋0 𝜎𝜎ℎ Eq. 3-7 𝑎𝑎ℎ 𝜀𝜀0𝜀𝜀ℎ+𝑗𝑗2𝑚𝑚𝜋𝜋0 𝑘𝑘ℎ = 𝑎𝑎𝑎𝑎 = 𝜀𝜀0𝜀𝜀𝑎𝑎+𝑗𝑗2𝜎𝜎 𝑚𝑚𝑎𝑎 𝜋𝜋0 Eq. 3-8 𝑘𝑘 wh= e re2 𝜋𝜋𝜋𝜋0 �𝜇𝜇 , 0𝜀𝜀0𝜀𝜀𝑎𝑎 and denote the complex electrical parameters for vertical/h 𝑘𝑘o𝑣𝑣rizon 𝑘𝑘tℎal walls a 𝑘𝑘n𝑎𝑎d the air in the tunnel; , and are the relative permittivity for vertical/horizontal walls and the air in 𝜀𝜀𝑣𝑣 th 𝜀𝜀eℎ tunne 𝜀𝜀l;𝑎𝑎 , and are their conductivity; is the permittivity in vacuum space; and 𝜎𝜎𝑣𝑣 i 𝜎𝜎s ℎthe c 𝜎𝜎e𝑎𝑎ntral frequency of the 𝜀𝜀s0ignal. The three areas are assumed to 𝜋𝜋h0ave the same permeability . As seen in Fig𝜇𝜇u0 re 3-2, the intensity of received signal strength indication (RSSI) is one of the parameter to analyse the attenuation of radio waves (Chehri et al., 2010). RSSI CHAPTER 3. ZIGBEE RADIO WAVE PROPAGATION INVESTIGATION IN UNDERGROUND MINES
Curtain
47 is an indication of received signal power by a wireless node’s antenna. The unit conversion between RSSI and received signal power is formulated as Eq. 3-9: Eq. 3-9 w𝑌𝑌h=er1e0 𝑙𝑙i𝑙𝑙s 𝑙𝑙d1 e0 fi𝑋𝑋ned as RSSI unit in decibels milliwatt (dBm) and is unit for the power of the received signal in milliwatt (mW) The unit conversion was used to create Y X positive values of RSSIs to calculate logarithmical average in this study. The intensity of the transmitted signal power is also expressed with dBm. The experiments of RSSI measurements were performed at Angas Zinc Mine in South Australia to evaluate stable communication distance between ZigBee nodes in underground mines. EXPERIMENTAL MEASUREMENTS IN TUNNELS Study area description Understanding the experimental environment properties is a crucial aspect for the measurements and simulations of the radio waves attenuation in the underground mine. Angas Zinc Mine located near Adelaide in South Australia was selected as the study area. Figure 3-3 illustrates a section view of active and inactive zones in this mine. The experiments of RSSI measurements were completed in two tunnels of the inactive mining zones at -160 level and -75 level to avoid any interruption with mining operations. Tunnel cross sections are arch-shaped with 5.5 m height and 5.5 m width. The environment properties of the experiments were recorded to evaluate effective factors on the radio waves attenuation. The tunnels are hosted by the Angas Garnet Member of the Tapanappa Formation, and the ore-body is mostly composed of zinc and lead. There is not support system in the most parts of the tunnels due to surround by hard rocks. The long experiments lines show there are some wet areas caused by underground water inflow to the tunnels. Also, there are no other facilities such as cables, pipes, ventilation duct and vehicle access which may affect the propagation of radio waves. Apparatus and Setup ZigBee networks generally consist of apparatus such as coordinators (gateway), routers and end devices. Coordinator can transmit, receive signals, storage all CHAPTER 3. ZIGBEE RADIO WAVE PROPAGATION INVESTIGATION IN UNDERGROUND MINES
Curtain
49 Experimental procedure The GSC was connected to the laptop (PC), and the GSRs (GSR1 and GSR2) were mounted on the tripods with a 1.5 m height to minimize the effect of radio waves distortion from the surface roughness of the tunnel’s floor and walls. This provides to present clearly the radio waves behaviours in straight and curved tunnels in the prototype experiment. Likewise, in real case, sensor nodes would be mounted on the walls or crown of the tunnel with special spacer to reduce negative effects of surface on the radio waves propagation. Then, the RSSI measurement between GSR1 and GSR2 was recorded for a distance of 5 m. The measurements were continued by increasing the distance between GSR2 and GSR1 at 5 m intervals. For consistency of the results, the measurements were repeated at least 5 times per each interval. Figure 3-5 illustrates the procedure of RSSI measurements in the tunnels of Angas Zinc Mine. The measurements were continued until the power of the received signal between GSRs was disappeared. The experiments were performed to measure RSSIs at different openings in straight and curved tunnels. Figure 3-5 Experiments procedure to obtain RSSIs in Angas Zinc Mine tunnels Experimental results The attenuation of ZigBee radio waves in the underground mine was investigated at bandwidth 2.4 GHz. The experiments were conducted in straight and curved tunnels at different levels. Results and interpretations of these experiments are stated as following sections. CHAPTER 3. ZIGBEE RADIO WAVE PROPAGATION INVESTIGATION IN UNDERGROUND MINES
Curtain
51 The RSSIs trend starts from -44 dBm at the shortest distance between GSRs to -64 dBm at 60 m apart. As a normal procedure, the graph indicates a gradual reduction of RSSIs at the other points along tunnel. There are two abnormalities in RSSIs trend in the locations of the junctions and two distribution fields that are discussed in section 3.5. Straight tunnel In the second experiment, the data was collected in a curved tunnel at the -75 level for up to 100 m length. Figure 3-8 and Figure 3-9 illustrate the layout and results of radio waves attenuation in this experiment. As shown in Figure 3-8, the line of the experiment was passing through a NLOS at 0-25 m, LOS at 25-60 m and several NLOSs between 60 and 100 m. There is an opening at 35-40 m. As seen in Figure 3-9, the logarithmic average of RSSI values in the curved areas of the tunnel declines sharply from -45 dBm at the starting point to -63 dBm at 25 m. It is because of the curvature and the effect of multiple modes in the near region. There is a sudden drop in RSSIs trend at around 35 m mainly due to the presence of the junction area in the opening location. The trend of a slow decrease in RSSI values continues in a straight tunnel of NLOS from 45 to 55 m. After that, there are two main falls in measured RSSIs at 60 m and 70 m due to the sharp corners of the curvatures. On the right side of the graph, the decline in RSSIs trend continues gradually due to the field with lower mode energy in the far region of the source. Figure 3-8 Layout of radio waves attenuation experiment in curved tunnel CHAPTER 3. ZIGBEE RADIO WAVE PROPAGATION INVESTIGATION IN UNDERGROUND MINES
Curtain
53 summation of rays’ reflections on the walls’ surface and the source. To decrease significantly the runtime of the calculation, the study area boundary was assumed adjusting the tunnel walls. The SBR method was employed to trace ray paths through tunnel geometry solving Maxwell’s equations for consideration of the boundary conditions. Figure 3-10 Model geometry and radio waves attenuation in the Angas Zinc Mine tunnels. (a) Model for straight tunnel and (b) model for curved tunnel DISCUSSION Comparison between experiments and simulations The experimental measurements are validated by simulation results for both experiments. The comparisons of the results confirm that the junctions of the branches and the curvatures have a major impact on radio signal propagation. The extra loss of RSSI values in the junctions occurs because of the sudden fluctuation and polarization changes in the waves caused by the larger cross section in tunnel dimension and sharp edges. The tunnel curvatures affect the radio waves propagation by preventing direct visibility between the transmitter and receiver and increasing multi-path components. The comparison of the experimental and simulation results for straight and curved tunnels is illustrated in Figure 3-11. The curves of the RSSI results could be separated into two parts: the region near the source with fast attenuation of the signals and the region far from the source with gradual attenuation. In the former case, fast attenuation may have occurred because CHAPTER 3. ZIGBEE RADIO WAVE PROPAGATION INVESTIGATION IN UNDERGROUND MINES
Curtain
55 Comparison of the measured results The experimental measurements in straight and curved tunnels are compared to analysis curves trends for the investigation of stable communication between wireless nodes. The comparison of the measurements obtained from the experiments in both tunnels based on the logarithmic trend lines of the RSSI values via distance are illustrated in Figure 3-12. In these trend lines, a gradual reduction of RSSI values as a function of distance in both tunnels is concluded. However, in the curved tunnel the RSSI values are reduced more sharply than in the straight tunnel as caused mainly by curvatures. According to the trend line equations, the radio waves attenuation in the curved tunnel is 3.1 times more than in the straight tunnel. Figure 3-12 Comparison between RSSI measurements in straight and curved tunnels According to the RSSI measurements as shown in Figure 3-12, A stable communication distance between ZigBee nodes is calculated in the underground mine tunnels. It is desirable to have RSSI values over -80 dBm for a stable wireless communication with the GSR. Based on this information and the trend lines, the stable wireless communication distances between developed ZigBee nodes by our group research are determined up to 100 m along straight tunnels and 70 m in the curved tunnels. These approaches are verified with the calculation of RSSI values at - 80 dBm for the longest distance between GSRs shown in Figure 3-12. Therefore, a CHAPTER 3. ZIGBEE RADIO WAVE PROPAGATION INVESTIGATION IN UNDERGROUND MINES
Curtain
56 stable communication distance for packet delivery as one of the proposed system proofs based on ZigBee network was verified. Also, it is concluded that 104 GSRs are required to create stable wireless network for covering the whole levels in Angas Zinc Mine according to the excavated straight and curved tunnels and decline. CONCLUSION Underground wireless sensor networks could significantly improve the efficiency of environmental monitoring, workers and equipment locations, operational readings and communication system. In this research was shown that ZigBee is more suitable for underground wireless monitoring and communication system than the other underground mine WSNs. The stable communication distance between ZigBee nodes in underground mine based on the attenuation of radio waves was analysed. To this end, RSSI experiments in straight and curved tunnels at Angas Zinc Mine were performed and the results were compared with the simulations of radio waves attenuation in the tunnels. Evaluation of the experimental and theoretical results confirmed that the junctions of the branches and the curvatures of the tunnels have major effects on radio waves propagation. However, in the curved tunnel the RSSI measurements declined sharply than in the straight tunnel, caused mainly by curvatures. Regions of the experiments divided into the field near the source with fast attenuation of the signals due to the congested multiple modes in the near source and the field far from the source with the gradual attenuation due to the arrived lower-order modes to the receiver. Finally, the results showed the stable communication distances between developed ZigBee nodes up to 100 m and 70 m in straight and curved tunnels, respectively. Consequently, the experiments in this study prove a stable communication of packet deliveries between ZigBee nodes for underground monitoring and communication system. CHAPTER 3. ZIGBEE RADIO WAVE PROPAGATION INVESTIGATION IN UNDERGROUND MINES
Curtain
57 PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES INTRODUCTION Wireless sensor networks (WSNs) have recently been proposed for underground mine monitoring and communication to enhance safety and productivity and so as to reduce operational costs. Typically, the underground WSNs consist of a few to several hundred nodes between a surface gateway and specified sensor nodes in the underground levels. Each node can connect to one or more nodes in order to transmit data. In particular, the placement of the sensing nodes plays a very important role to allow for efficient transmission as well as providing maximum security through the network. It is inevitable for underground WSNs to perform at a high level of network efficiency with lower energy-consumption and the most cost-effective establishment and maintenance. Despite the progress of WSNs technologies, they still rely on infrastructure such as so-called sinks to transfer data from underground sensors to the management server at the surface. According to the experiments of developed ZigBee nodes (Moridi, 2015), the study focuses on the reliability of multi-hop data transmission between nodes in underground mines. In the following, PAN is technically defined as a low rate-wireless personal area network (LR-WPAN) in an ad-hoc and self-organising network designed to serve a variety of applications especially in WSNs. ZigBee, based on IEEE 802.15.4 standard (Chandane et al., 2012), is comprised of PAN Coordinator, coordinator (full- function device) and end-device. A ZigBee PAN Coordinator forms the only root of the network. First, it creates the network, and then waits for automatic joining connections of other nodes. It enables all nodes to communicate within the network and stores data. Due to a limited communication distance, intermediate coordinator nodes (full-function devices) are involved to transfer data between sensor nodes (the actual end-device) and the PAN Coordinator through multi-hop routing. As it is shown in Figure 2-10 the network architecture of different ZigBee topologies. A full-function device can sense the environment, as well as communicate with the other nodes. An end-device is only capable of sensing and sending data to the PAN Coordinator or CHAPTER 4. PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES
Curtain
58 nearest coordinator node. The PAN Coordinator is usually AC powered, while routers and end-devices are typically battery powered. ZigBee based on the IEEE 802.15.4 standard has three main types of network topology for data transmission (the star, the cluster-tree and the peer-to-peer mesh) as illustrated in Figure 2-10. As seen, end-device nodes may be more beneficial in the cluster-tree topologies considering energy saving during sleep times, while more full- function devices have to be employed in mesh topologies as they need to relay the data of nearby nodes. A key factor to evaluate the efficiency of the WSNs performance is the routing protocol. The protocol provides routes for each node (Bhat.M. Subramanya et al., 2011). Routing is the process of selecting paths within a network to send data from one node to the nearby nodes. This chapter aims to evaluate ZigBee network performance and security in underground mines based on the link quality indication (LQI) for each received signal or packet using QualNet® 7.3 1. For this purpose, we investigate an optimal arrangement of ZigBee nodes by creating various scenarios of mesh and cluster-tree configurations, and LQI-related metrics evaluation in mine tunnels. In the scenarios, all nodes including the Pan Coordinator, the full-function devices and the end-devices are assumed to remain stationary. The procedure and methodology of an optimum arrangement of ZigBee nodes for underground mines is illustrated in Figure 4-1. We analyse the simulations of the mesh and cluster-tree topologies based on the network performance metrics of throughput, packet delivery ratio, end-to-end delay, energy consumption and network security. BACKGROUND ZigBee network performance in the perspective of nodes positioning design has theoretically been developed by numerous research solutions (Chatterjee et al., 2013; 1 QualNet®: http://web.scalable-networks.com/content/qualnet (last accessed 7 September 2015) CHAPTER 4. PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES
Curtain
60 The routing protocols simulation is analysed for the improvement of ZigBee network performance and applications to select optimal paths to transfer data to the destination (Narmada & Sudhakara Rao, 2011; Roberts et al., 2013; Sharma & Kumar, 2012; Bhat.M Subramanya et al., 2011; Zen et al., 2008). Routing evaluation is an important task in ad-hoc networks that do not rely on a pre-existing infrastructure where the nodes are mobile through the environment. Other studies simulated different topologies to optimise ZigBee network performance for industrial systems using stationary nodes (Chandane, 2012; Khan et al., 2013; LAVRIC et al., 2013; Moridi, 2015; Ullo, 2010; Yasin et al., 2013). Reliable and cost-effective networks of ZigBee topologies require an analysis of quality of services (QoS) metrics such as throughput, packet delivery ratio, end-to-end delay, energy consumption and network security. However, even though there are some performance evaluations of ZigBee networks in underground mines (Bo et al., 2012; Chehri, 2011), the simulation of node positioning comparing different topologies in such environments is hardly investigated. In this work ZigBee nodes arrangement considering the mesh and cluster-tree topologies in underground spaces is analysed based on the analysis of QoS metrics. ZIGBEE NETWORK PERFORMANCE METRICS ZigBee network topologies for the analysis study of optimum nodes arrangement including the mesh (Peer-to-Peer) and cluster-tree which are challenged in industry applications are evaluated. Typically, the performance of network topologies are assessed on the basis of metrics that mainly consist of throughput, packet delivery ratio, end-to-end delay and energy consumption. In particular any topology involved with higher throughput and packet delivery ratio, and lower end-to-end delay and energy consumption is more adequate for ZigBee applications. In these concepts, a packet is defined as a formatted unit of data carried along a communication channel, and each packet carries the information that will help it get to its destination. In the following, we define the basic metrics: I) Throughput: It is defined as the ability of data packets successfully sent from source node to destination node in the unit time. In our study, the throughput (bits per CHAPTER 4. PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES
Curtain
61 second) is generated by the ZigBee application within scenario simulation times and is calculated as Eq. 4-1: Eq. 4-1 𝑇𝑇𝑝𝑝𝑝𝑝×8 𝑇𝑇 = 𝑇𝑇𝑇𝑇𝑝𝑝𝑝𝑝−𝑇𝑇𝑇𝑇𝑝𝑝𝑝𝑝 where the total packet sent, the time last packet sent and the time first packet sent are denoted as T, Tlps and Tfps, respectively. II) Packet delivery ratio: The ratio between the packet number received at the destination node and the packet number sent by the source node is defined as packet delivery ratio (PDR). III) End-to-End delay: Delay or latency through wireless networks is time taken by the packets to propagate from the source to the destination. The end-to-end packet delay is comprised of the summation of route discovery (source-processing delay), queuing (network delay), propagation and transfer time (destination delay). The end- to-end delay is one of the most critical and fundamental issues for WSNs. Many applications of sensor networks require an end-to-end delay guarantee for time sensitive data. The average end-to-end delay of ZigBee applications for different scenarios is computed based on the Eqs. 4-2 and 3: Eq. 4-2 𝑇𝑇𝑡𝑡 𝐴𝐴𝐴𝐴 = 𝑁𝑁𝑝𝑝𝑟𝑟 where the average end-to-end delay, the total of transmission delay of all received packets and the number of packets received are denoted as AD, Tt and Npr, respectively. Eq. 4-3 𝑇𝑇w𝑇𝑇h𝑇𝑇er=e t𝑇𝑇h𝑇𝑇e𝑇𝑇 t−ran𝑇𝑇s𝑇𝑇m𝑇𝑇ission delay of a packet, the time packet received at destination node and the time packet transmitted at source node are denoted as Tdp, Tpr and Tpt, respectively. IV) Energy consumption: Energy efficiency is another critical aspect in the QoS of WSNs, because nodes are powered by batteries and require time and costs in recharging once they deployed. Energy consumption of a node in any network CHAPTER 4. PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES
Curtain
63 Coordinator and 12, 20, 30, 40 and 50 nodes located in the shaft and tunnels. The nodes are selected as coordinator (router) or end device depending on the required use in the network topology. These scenarios are to simulate a real underground mine, covering an area of 1000m length and 1000m depth. The remaining simulation parameters are listed in Table 4-1. Table 4-1 Simulation parameters and node configurations Parameter Details Node placement Stationary Number of nodes 12, 20, 30, 40 and 50 Network topology Mesh and Cluster-tree Area of simulation 1000m*1000m Channel frequency and data rate 2.4GHz and 250kbps Physical and MAC models 802.15.4 radio Energy model MicaZ Battery model Simple linear,1200 mAh Transmission Power 3 dBm Antenna model Omnidirectional Modulation scheme O-QPSK Routing protocol AODV Path loss model Two Ray model Traffic ZigBee application No. of items and Payload Size 100 and 127bytes Simulation time 10mins In the scenarios, the MicaZ model (QualNet7.3, 2014) for the radio interface is employed. All the nodes in the scenarios are battery-operated devices, and we use a simple linear battery model for the comparison of the scenarios. Therefore energy is consumed by those interfaces according to the energy specification of MicaZ model shown in Table 4-2. Table 4-2 Specifications of MicaZ energy model Mode Radio mode Power @ 3V (mW) Active TX 48.0 Active RX 56.5 Active Idle 10.79 Sleep Sleep 1.50 CHAPTER 4. PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES
Curtain
64 Only one PAN co-ordinator is considered as a final sink server to communicate with other source nodes for data processing and delivery in this multi-hop system. In other words, a wireless network between the surface PAN coordinator and the underground sensor are created. The PAN Coordinator and other sensor nodes including the full function and end devices remain stationary. Scenarios are separately designed for the mesh and cluster-tree topologies associated with the different network size including the densities of 12, 20, 30, 40 and 50 nodes given in Table 4-3. Table 4-3 Simulation scenarios of ZigBee topologies with different network size Topology Network size (nodes) 12 20 Mesh 30 40 50 12 20 Cluster-tree 30 40 50 Screenshots from the QualNet simulator on 12-node scenarios of the mesh and cluster- tree topologies are illustrated in Figure 4-2. In these topologies, full-function devices act as routers to transfer (or relay) data for next source nodes and as a sensor node to also sense the surrounding environment. An end-device only senses and sends to nearby nodes. The nodes in the scenarios are manually arranged based on the previous underground experiments. ZigBee applications defined in the software are used to evaluate traffic loads between nodes pair with the capability of sending 100 packets, each packet size having 512 bytes which are active during simulation time. CHAPTER 4. PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES
Curtain
66 RESULTS AND DATA ANALYSIS The simulation results can be evaluated through various performance metrics in both the mesh and cluster-tree topologies. By using similar traffic loads, an optimum ZigBee node arrangement is found for different underground mines. As mentioned above, the results are analysed based on the performance network metrics of throughput, packet delivery ratio, end-to-end delay and energy consumption (see Section 4.3 for the definitions). I) Throughput The throughputs between nodes in 12-node scenarios are illustrated in Figure 4-3. The throughput between source node (SN) and destination node (DN) of (2,1), (3,2), (4,3), (5,3) in either the mesh or cluster-tree topology is a maximum of 4137 bits/s, with significant reductions in throughput in the cluster-tree topology compared to the mesh topology. This is due to simultaneous increase in receiving packets at the destination nodes (Yasin, 2013). WSNs based on the IEEE 802.15.4 standard commonly act as displays from sharp throughput drops at higher loads. Figure 4-3 Throughput versus 12-node scenarios of the mesh and cluster-tree topologies The comparison of changes in the number of nodes at the scenarios of 12, 20, 30, 40, and 50-node with the average throughputs are illustrated in Figure 4-4. The figure CHAPTER 4. PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES
Curtain
67 shows that average throughputs of 3866 and 2079 bits/s are moderately reduced as the number of nodes increases, with a minimum of 2918 and 1178 bits/s for the mesh and cluster-tree topologies, respectively. It is also observed that there is an acceptable throughput within the network for both topologies, however, the mesh topology performs a better throughput from SNs to DNs due to its path finding techniques. A drop of throughputs after 12-node scenarios among the mesh topology has occurred because of rising congestion of packets delivery in full function devices (coordinators) and because of an increase in the choices of links to nearby nodes and thus paths through the network. Figure 4-4 Average throughputs versus varying nodes numbers for the mesh and cluster-tree topologies II) Packet delivery ratio The packet delivery ratios (PDRs) are computed based on a percentage denotes a ratio between total packets received by DNs and total packets sent from SNs. The PDRs results for the varying numbers of nodes of the mesh and cluster-tree topologies are illustrated in Figure 4-5. The PDR in the mesh topology changes slightly from 81.8% for the 12-node scenario to 77.2% for the 50-node scenario, but it drops considerably in the cluster-tree topology from 64.5% for the 12-node scenario to 23.4% for the 50-node scenario. A higher PDR value shows better performance within the network. Therefore, a visual comparison of the results indicates that the mesh CHAPTER 4. PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES
Curtain
68 topology has a higher network performance at the same traffic loads for the ZigBee applications. Figure 4-5 Packet delivery ratios versus varying nodes numbers for the mesh and cluster-tree topologies III) End-to-End delay The average end-to-end delays at each destination node for 12-node scenarios are illustrated in Figure 4-6. In these bar charts, the node IDs are those as specified in Figure 4-3. The charts show that end-to-end delays occur at nine destination nodes in the mesh topology, while it reduces to seven destination nodes in the cluster-tree topology with the same traffic load. It therefore causes a greater data latency through the network as a result of the increase in the number of hops, which results in queuing, channel access delays and transmission delays. As seen in Figure 4-6, there is no delay for node IDs 5, 9 and 12 in the 12-node scenario of the mesh topology, while it also does not occur for node IDs of 4, 5, 8, 9 and 12 in the 12-node scenario of the cluster-tree topology. In fact, the amount of the total delay is reduced with the increasing number of end-devices through the network. The tendency of total end-to-end delay of the mesh and cluster-tree network topologies versus varying number of nodes is illustrated in Figure 4-7. The curves clearly show that the tendency of end-to-end delay is enhanced with increasing node CHAPTER 4. PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES
Curtain
70 IV) Energy consumption Next step is evaluating the efficiency of the network by measuring the energy consumption. Figure 4-8 illustrates the total energy consumption for the mesh and cluster-tree topologies of ZigBee network versus varying number of nodes. The trends of the curves in the graph show an increase in energy consumed for more dense networks. It is also observed that total the energy consumed of 18.4 mWh for 12-node scenario increases to 99.44 mWh for 50-node scenario in the mesh topology, and it climbs from 15.7mWh for 12-node scenario to 64.2 mWh for 50-node scenario in the cluster-tree topology. Thus, the cluster-tree topology is more energy efficient than the mesh topology. This is due to the fact that more end-devices remaining in sleep mode in the cluster-tree topology. On the other hand, a considerable number of full-function destination nodes are more engaged in the mesh topology, which causes higher energy overall consumption. First, such destination nodes have to be largely in idle mode in order to communicate with nearby nodes. Secondly, the number of nodes predicted to receive data (receive mode) within a network of the mesh topology is more necessary than those in the cluster-tree topology. Figure 4-8 Energy consumption versus varying nodes numbers for the mesh and cluster-tree topologies CHAPTER 4. PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES
Curtain
71 V) Network security In a network with mesh (peer-to-peer) topology, all the devices that participate in relaying the messages are usually full-function devices because end-devices cannot be as a router and support bilateral communication. The PAN Coordinator might often be mains powered, while the devices will most likely be battery powered. Multiple hop communication of the mesh topology with a variety of routing alternative between nodes provides a higher network security for data delivery within the network. Underground mine applications such as environment attributes monitoring and bilateral communication under emergency condition are beneficial from a higher security of such network topology. DISCUSSION The performance investigations of different ZigBee topologies in underground spaces (mines) are summarised in Table 4-4. The simulation results show that the mesh (peer-to-peer) topology provides more reliable networking for the arrangement of ZigBee nodes in underground mine tunnels. This network topology has higher throughput, packet delivery ratio and network security. Although the cluster-tree topology is involved with lower end-to-end delay and energy consumption through the network, such benefits do not play significant roles for underground ZigBee network communication. Table 4-4 Comparison of the simulation results of ZigBee topologies reliability in underground spaces Metric The reliability of ZigBee network topologies Mesh Cluster-tree Throughput Packet delivery ratio End-to-end delay Energy consumption Network security As seen in Figure 4-7, the delay time of packet deliveries from the source nodes to the destination nodes for 12, 20, 30, 40 and 50-node scenarios in the mesh topology are 3, 6, 11, 16, 19 µs longer than the similar scenarios with the same conditions CHAPTER 4. PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES
Curtain
72 created with the cluster-tree topology, respectively. For actual underground operations, such a small increase in the end-to-end delay of the mesh topology would not be a major. In addition, the greater energy consumed through the network will not be as bad a negative aspect for the mesh topologies, as ZigBee nodes that are currently in development will be able to switch between battery power and mine power. CONCLUSION The selection of an appropriate network topology is crucial for the nodes arrangement of the industrial wireless WSNs. In this chapter, the performance of different network topologies for ZigBee-based WSNs are analysed for underground mine applications. Then scenarios of the ZigBee mesh and cluster-tree topologies under the IEEE 802.15.4 standard are investigated in the light of most important network metrics. Throughput, packet delivery ratio, end-to-end delay, and energy consumption are evaluated during simulations for varying nodes number including 12, 20, 30, 40 and 50-node scenarios. In many sensitive industrial applications, the arrangement of wireless sensor nodes mostly depends on achieving higher throughput, packet delivery ratio and network security as well as lower latency data and energy consumption. While the cluster-tree topology meets advantages of lower latency data and energy consumption, the benefits of the mesh topology are higher throughput, packet delivery ratio and network security, which are the most significant features for the underground ZigBee node arrangements. The larger data latency and the slight increase in energy consumption through the network are no major concerns for underground mines projects, as the delay increases by only a few µs and future ZigBee nodes will be able to switch power between battery and mine power. Thus, it is concluded that the mesh topology enables ZigBee nodes to create an underground space wireless network that is more secure and delivers a higher quality of service than cluster-tree topology networks. CHAPTER 4. PERFORMANCE ANALYSIS OF ZIGBEE NETWORK IN UNDERGROUND MINES
Curtain
73 UNDERGROUND COMMUNICATION SYSTEM INTEGRATION INTRODUCTION Underground mine safety and health remain challenging issues in the mining industry. Death toll statistics in China’s coal mines have gradually reduced from 5798 to 2631 between 2000 and 2009 (Wu, 2011) but fatality still occurs. The number of occupational mining fatalities in the United States’ underground metal mines has fluctuated from 40 to 46 during the years 2001 to 2010. Most importantly, 33.8% of the deaths have resulted from ignitions and explosions of gas or dust (CDC, 2012), in underground mining. In April 2014, two men were killed when a wall collapsed in an underground coal mine in New South Wales, Australia. Human errors were concluded from reports as the most significant reasons for mining fatalities. Thus, safety is always a significant concern in mining operation. Some studies have recently focused on improving the health for underground miners. Laney and Attfield (2010) have drawn attention to the fact that the prevalence of coal workers’ pneumoconiosis or progressive massive fibrosis increased from 1990 to 2000 among United States underground miners. Therefore, specific consideration of both safety and health issues deserves priority in mine operation management and engineering designs to provide and maintain a safe and healthy workplace. In response to these challenges, mine automation by new technologies such as wireless sensor network (WSN) assisted with geographic information system (GIS) has been widely utilised in underground mines to enhance safety and health, productivity and reduce operational costs (Bhattacharjee, 2012; Chehri, 2009). To this end, an integration system is developed to mitigate underground safety and health concerns. This system based on the development of ZigBee nodes is introduced to sense the underground mine environment, to regulate ventilation system and to communicate between surface offices and miners. Thus, reduced power consumption, near real-time monitoring of the environment and bilateral communicating between surface and underground personnel are achieved. Experimental tests were carried out to verify network reliability and security of the packet delivery in underground mines. The architecture of underground monitoring CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
74 and communication for the system integration is illustrated in Figure 5-1. Temporal ZigBee data including messages, operation orders, and environmental attribute readings such as temperature, humidity and gases concentration are transferred to GIS management server in the surface control centre. The transmitted data is received and stored by ZigBee program then provided for manipulation in the control centre. Risk situations are immediately identified and responded through a logical process of data analysis in the GIS management server before reaching dangerous (unsafe) levels and accidents occurring. The ventilation system management is also used for the workplace health and safety compliance and the optimisation of mine site power usage. Figure 5-1 Architecture of monitoring and communication system in underground mines The remainder of the chapter is organised as follows. The fundamental knowledge of ZigBee technology and GIS are first described. Then, the implementation and structure of system integration are demonstrated. Finally, the strategic process of combining ZigBee data and map information through the GIS management server is modelled for monitoring, communication and controlling the environmental attributes in an underground mine. In this chapter, the applications and functions of the underground mine monitoring and communication systems are considered based on the capability of developed ZigBee nodes. CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
75 BACKGROUND The underground WSNs consist of a few to several hundred nodes between a surface gateway and specified sensor nodes at underground levels (Karl & Willig, 2005). ZigBee based on IEEE 802.15.4 protocol is a new wireless sensor technology which has more benefits than other WSNs for underground monitoring and communication systems (Chen et al., 2012). Even though ZigBee technology provides only a low data rate, its benefits are low power consumption, very cost-effective nodes, network installation and maintenance (Shu-guang, 2011). It is also capable of providing networking applications for data transmission between nodes (node to node relays) with high performance based on many wireless hops. It does not require any access point or central node to transmit data between clusters. Significance of ZigBee in underground mines compared to other WSNs was evaluated in the recent publication of authors (Moridi et al., 2014). GIS is new technology used for spatial data analysis in order to capture, store, analyse, manage, and present data that is linked to locations (ESRI, 2012). GIS allows users to view, understand, question, interpret, and visualize data in many ways that reveal relationships, patterns, and trends in the form of maps, globes, reports, and charts. Web-GIS is an inevitable trend which helps solve the problems of spatial information integration and sharing in technical aspect of web media (Ghorbani, 2012; Huang et al., 2010). Recently, researchers have technically focused on the GIS supports for the management of emergency and unsafe conditions (Kawamura, 2013; Salap, 2009; Sharifzadeh et al., 2008). USE OF GIS IN UNDERGROUND MINES GIS is based on computer programs used for storage, modelling, retrieval, mapping and analysis of geographic data. In this system, spatial features of a specified environment are stored and manipulated in a coordinate system, which refers to a specific place. GIS merges multi-layers of required geographic and spatial data for the user evaluation, and helps determine the locations and times of possible incidents in advance. Figure 5-2 illustrates a cycle of GIS to process data and layers for the purpose of risk assessment in underground mine sites. GIS server is capable of CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
76 managing and processing data for a substantial number of attributes coming from different sources. It also is able to distribute and share data between users based on internet or intranet, and data could be saved, manipulated or informed by other users. Therefore, GIS can decrease the time and cost of sharing geographic data and its attributes. Figure 5-2 GIS data process cycle and geographic layers in an underground mine ZIGBEE AND GIS SYSTEM INTEGRATION In the challenging environment and changing topology of a mine, reliable and simplified communication is a high-stake issue with the objectives of safe and efficient mining operations. Automation of remote and automatic systems has improved workplace safety and health for miners, yielded cost-effectiveness, management improvement of technical problems, energy savings, real-time response to incidents. In response to these challenges, integration of technologies has a significant role in underground mining automation. According to WSNs’ specific features of high reliability and multi-hop networking, ZigBee can create an integrated wireless network between nodes in the underground mine tunnels and the surface gateway. In this study, ZigBee’s capability of monitoring underground environmental attributes is combined with geographic information to provide potential applications in communication, operational and environmental monitoring systems of underground mining. In order to achieve such smart underground mine system, integrating maps information and spatio-temporal data from ZigBee nodes into a database at a control CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
78 The network demanded in an underground mine must be capable of providing bilateral communications between the surface control centre and all underground wireless nodes interactively. According to the threshold limit values for the different variable parameters (V1, V2, …, Vn) of underground mine environment, the conditions of safe, transient and unsafe were set. Thus, the remote or automatic countermeasures in a GIS management server were arranged in order to control ventilation fans and send alert or alarm messages to relevant authorities. Additionally, immediate texting messages are bilaterally communicated between underground personnel and the surface operator in emergency conditions. Based on this system, near real-time monitoring data, remote and automatic controls, and communication by texting messages have achieved the required safety and health outcomes and improving underground mining operations. Such achievements are more efficient for emergency management when system configuration enables control, monitoring and communication between users in various places connected by internet medium access. SYSTEM STRUCTURE Wireless network setup The entire system of the tested underground WSN is composed of different ZigBee nodes such as coordinator, routers and end devices. These products were developed in collaboration with Tokyo Cosmos Electric Co., Ltd. The JN5148-EK010 kit (Jennic) stacks were employed to create ZigBee network. The wireless network initially is created by coordinator (gateway) to join other nodes. A ZigBee coordinator connected to laptop (PC) using in the experiments is illustrated in Figure 5-4. Bilateral communication was provided between the coordinator and end devices to send and receive messages and readings instantaneously taken by their sensors. Routers with the ability of sensing the environment were employed to relay communication through the network. In addition, sending and receiving messages and remote control of ventilation fans are enabled by the surface coordinator based on the designed software (Figure 5-4). CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
79 Figure 5-4 ZigBee coordinator connected to laptop (PC) To setup WSNs, power consumption and high reliability of packet delivery are the most concerns. For the former case, ZigBee nodes are configured to transmit data in longer periods when the mine is in safe and transient conditions which it is caused to extend the life of batteries. In latter case, different time intervals are considered for data delivery of environment sensing to avoid network congestion and possibility of packets loss. The power usage of direct and alternating currents (DC/AC) for the ZigBee nodes (except the coordinator) were designed to operate under battery and mine site power supply, respectively. Thus, alternating currents power usage is resulted in the extension of battery life, and ZigBee nodes are enabled to continue long-time data telemetry during power outages at any accident. The ZigBee nodes can last a few days to several months depends on their data rate and applications. Sensing environment The safety and health of coal and metal/non-metal mining operations were raised considerably as the result of the wireless monitoring of environment attributes. Digital temperature-humidity compound sensor on-board of each JN5148 with advanced sensitivity and long-term stability for mine sites is utilised in the system. Methane, Oxygen, CO2, CO, NOX and SO2 concentration sensors (readers) are easily CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
80 connected to ZigBee nodes to sense the environment. The sensors were configured the single-line communication to transmit real-time data to the nodes. The measurement of CO2 concentration in this study was considered to manage safety and health risks nearby coal strata in coal mines or fumes-filled spaces in metal/non- metal mines. Text messaging operators Developed ZigBee nodes are enabled to connect with laptops and mobile phones for sending and receiving text messages. Figure 5-5 illustrates portable radio stations to connect laptop (Tablet) which are designed to be placed in an underground refuge chamber and mobile phones for emergency purposes. The radio station is getting a significant role for wireless communication with surface operator during accidents particularly when cable damage or power outage occurs. Even though, its primary role is the remote control of ventilation fans. ZigBee nodes were placed in the boxes to minimise environmental effects on their operation. Figure 5-5 Portable ZigBee radio stations to communicate between laptop and mobile phones Ventilation control Air ventilation deficiency in underground mines is a critical issue to the occupational safety and health of mine personnel. Moreover, optimization of the fans power consumption to supply underground fresh air is considered on ventilation system design. Therefore, adding auxiliary fans to the ventilation system is economically required to improve air quality during hot seasons, blasting, any gas leakages and CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
82 Figure 5-7 Designed computer interface to switch ON/OFF the (auxiliary) fans and receiving/sending messages Input data The first step of our designed management server is to communicate with the outside world to receive required information. Figure 5-8 illustrates data flow sheet and the variety of input data for the GIS management server. Input datasets in the database are comprised of map information, ZigBee nodes data, ZigBee text messages, ZigBee node positions, threshold limit values and contact details. Map query is primary process of map information to merge and display required features in GIS server to represent the fundamental layers of underground tunnels, geographically. These layers are revised according to the progress of underground mining activities. Then, other input data is analysed and located on the layers for further manipulation. The quality of input dataset is considered to process and analyse at any particular database. Consequently, the quality of input data in our designed GIS management server is divided between long-term and short-term datasets. Maps, ZigBee node positions, threshold limit values and contact details are determined to be long-term input data into the database which may be periodically updated. These data are CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
83 stored in attribute tables that are associated with ArcGIS geo-processing models. ZigBee node data which measured environmental properties of mine tunnels is derived as short-term (temporal) data. In this case, the datasets of environmental phenomena such as temperature, humidity and gas concentrations change from time to time or remain relatively continuous. Therefore, spatio-temporal data models, which show both spatial and temporal characteristics of environment, are considered as input data in the GIS management server. The spatio-temporal data is stored and manipulated in the ArcGIS geo-processing based on the related or joined table command to digital tables of data collection by ZigBee gateway software. Figure 5-8 Data flow sheet of integrated system in GIS server Process strategy Real-time process strategy for safe working environments involves the combination of data models and programs in GIS management server to monitor and communicate underground mine automatically and remotely. A pattern of decision making in managing spatio-temporal data was modelled as a procedure to monitor the environment attributes of underground mine tunnels (Figure 5-3). To this end, near real-time and flexible scheduling strategy was planned to apply the performance of ZigBee network in an emergency status. An experiment was simulated on real maps of underground mine with developed ZigBee nodes to control ventilation fans CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
84 (ON/OFF) and text emergency messages from surface control office. A section view of an underground mine and ZigBee node positions in ArcGIS screen are illustrated in Figure 5-9. In this model a gateway was located in the surface control office to receive and transmit data through the underground network. The network is extended by ZigBee routers between the surface gateway and underground end devices based on optimised communication ranges. ZigBee End devices were divided to three groups in this experiment. One is connected to the auxiliary fans to switch them on or off automatically or remotely. Another is attached to a radio station which enables to write and read messages. The radio station can be portable or located in underground refuge room. Lastly, sensor nodes are mounted in working area which sense environment attributes such as temperature, humidity and gas concentration. Figure 5-9 A thematic map of an underground mine and ZigBee node positions in ArcGIS The transmitted data firstly is stored in the GIS management server located at control centre. The ability of the map visualisation on GIS (ArcGIS) allows the position and component of the attributes in underground mine environment to be visually displayed on the screen. Then, the spatio-temporal data tables stored by ZigBee software in the database were joined or related to the attribute tables of node geographic positions in the geo-processing services of GIS management server. A joining table of spatio-temporal data and geographic node position created in ArcGIS (ArcMap) is illustrated in Table 5-1. In other words, in this joining table each node CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
85 position is connected to the related and measured variable parameters including temperature, humidity and gas concentration. Table 5-1 Storage of transmitted data by ZigBee gateway Following this, the spatio-temporal data was analysed, modelled and retrieved in the GIS management server. A geo-processing model based on Python (ArcPy) was designed to track and control the environmental attributes in different conditions. Normal and threshold limit values to assess environmental attributes according to underground mining standards were then derived. Normal and threshold limit values for the discrete conditions of safe and unsafe statues are presented in Table 5-2. According to the normal and threshold limit values, the status of working environment in underground mine were assessed in three conditions of safe (green), transient (orange) and unsafe (red). Table 5-2 Threshold limit values for working environments in underground mine Event procedure conditions Variables (V i) Transient Unsafe Safe (Green) (Orange) (Red) Temperature (T , T , …, T ), 1 2 n Ti ≤28 28 < Ti < 40 Ti ≥40 Humidity (H , H , …, H ), Hi ≤75 75 < Hi < 85 Hi ≥85 ℃ 1 2 n Gas concentration for Co 2% Gi ≤2000 2000 <Gi< 5000 Gi ≥5000 (G , G , …, G ), 1 2 n 𝐩𝐩𝐩𝐩𝐩𝐩 CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
86 Finally, a loop of conditional procedures and trigger actions were set. The measured parameters (spatio-temporal data) were stored while these data are less than or equal normal limit values (safe condition). The loop was periodically retrieved each 30 minutes in order to consume less power and to extend the battery life of ZigBee nodes and reduce congestion through the network. Otherwise, a trigger plan was set for the values mounted in the range of between normal and threshold limits (transient condition) or greater than threshold limit (unsafe condition). The trigger action plan applied in the GIS management server to respond the deviation of values from normality is presented in Table 5-3. In the transient (orange) condition, the auxiliary fans which had designed for emergency ventilation system would be automatically or remotely turned on. In this state, the model was also setup to send alert messages to shift supervisors. The periodic time of data reading in orange state is reduced to 15 min to ensure the safe and health conditions of underground environment in the shorter time possible. Emergency (alarm) messages in the event of unsafe (red) condition would be texted to surface authorise and to underground personnel for immediate evacuee from the hazardous places. The cycle time of data acquisition is minimised to 5 minutes in this situation. Table 5-3 Trigger action response plan Counter measure implements Variables (V ) Safe Transient Unsafe i (Green) (Orange) (Red) Reading time interval (min) 30 15 5 • Turn the Temperature (T 1, T 2, …, T n) • Text message auxiliary fan(s) to all to on Humidity (H 1, H 2, …, H n) • Next evacuate from • Text message to reading unsafe the shift Gas concentration (G 1, G 2, place(s) supervisors …, G n) • Next reading • Next reading Output Mine safety and health were improved by intelligent maps supporting spatio– temporal data and coordinate of ZigBee nodes in this experiment. The schematic representation of integrated system outputs for underground monitoring and communication is illustrated in Figure 5-10. The final outputs of GIS management CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
87 server are comprised of 3D visualization monitoring of underground mine tunnels and messages texting for alert and alarm conditions. The web-GIS is another application supporting the GIS management server to promote the underground monitoring and communication system. Figure 5-10 Schematic representation of integrated system outputs for underground monitoring and communication Data storage Data storage and management in the central data repository of server is an essential part of the integrated system. In fact, all geographic and spatial data are stored and managed in ArcMap’s geodatabase which accesses to the database at any time over the long-term. In the geodatabase, organisational structure for storing datasets and creating relationships between datasets were also provided for further analysis and interpretation. In addition, a multi-user access is enabled to work and command orders from different mine site offices. An integrated data management and documentation to generate geospatial metadata was another approach of geodatabase automation. Metadata can create geospatial data document to investigate any genuine or non-genuine claims. CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
88 CONCLUSION An integrated system based on the WSNs and GIS was introduced to automate underground mine monitoring and communication. The proposed system enhances safety and health, operational management and reduces capital costs. Considering the capability of ZigBee network and ArcGIS, the applications of real-time underground monitoring (temperature, humidity and gas concentration), ventilation system control and communication in emergency conditions by surface user would be achievable. The system is equipped with automatic or remote triggers action plans for measured environmental attributes. The measured data were classified to three categorises consisting of normal (green), transient (orange) and unsafe (red) conditions based on their values compared to normal and threshold limit values. At normal (green) condition, the measured attributes are below the normal value limits. The mining operation is continuing as it was and readings are recorded with 30 minute intervals. At the transient (orange) condition, the measurements are between normal and threshold value limits. In this state, trigger actions are become automatically active to switch the auxiliary fan on and texting message to shift supervisors. In addition, reading’s intervals are reduced to 15 minutes in this situation. At unsafe (red) condition, the measurements are getting greater than threshold value limits and the system texts messages to all underground personnel for immediate evacuee from the hazardous places. Reading’s intervals are reduced to 5 minutes. Furthermore, the system provides multi-users surface operation and 3D visualization for realistic understanding of underground environment and miners’ conditions, and it could be a useful approach for high-tech underground mining. CHAPTER 5. UNDERGROUND COMMUNICATION SYSTEM INTEGRATION
Curtain
89 ZIGBEE NETWORK MODEL GENERALISATION FOR UNDERGROUND MINES INTRODUCTION The development of a generalised ZigBee network model is hugely beneficial for the design of a wireless underground mine monitoring and communication systems. This is owing to the large variety of networking variables, the rapid technological advancement of ZigBee nodes, and considerable changes in environmental parameters from one mine site to another one. Thus, the recognition of entire variables is a key component for the evaluation of the reliability of the ZigBee functions and applications in an underground mine. In fact, a system design and a model of ZigBee network are proposed for the verification of the reliability of required underground functions and applications. Ben Maissa et al. (2013) emphasised the necessity of investing WSNs’ performance, based on model analysis and validation, before handling critical functions by such systems. Stanley- Marbell et al. (2008) observed the influences of the WSNs’ operation considering the variables of the hardware, software and physical limits. They focused on the importance of the recognition of the uncontrollable parameters of the environment and run-time parameters alike to develop a more realistic model and evaluate the performance of WSNs under a system model. These works attempted to provide models of WSNs to predict system properties and challenges associated with cost and time effectiveness on a real project. This chapter will demonstrate that practical investigations to confirm and calibrate the results of such system models, in order to sensibly evaluate controllable and uncontrollable parameters, are crucial in a heterogeneous environment such as underground excavations. Having selected and simulated ZigBee networks for monitoring and communication systems in underground environments, Moridi, Kawamura, Sharifzadeh, Chanda, and Jang (2014) concluded that recognising and assessing the effective parameters is crucial in designing a ZigBee network. The efforts of (Zarei et al., 2013) posit a method for assessing the principal parameters of tunnels water inflow. Accordingly, the CHAPTER 6. ZIGBEE NETWORK MODEL GENERALISATION FOR UNDERGROUND MINES
Curtain
90 controllable and uncontrollable parameters of a ZigBee network and the surrounding environment are illustrated in Figure 6-1. There are a considerable number of and localization of nodes and the metrics of the network, are adjustable for better data telemetry in underground mines. The uncontrollable parameters are the number of hops, network congestion and infrequent failures in the reception of data packets. It might be possible to render these parameters controllable within confined spaces. There are also environmental variables of tunnels that are uncontrollable in ZigBee network design as opposed to the known or controllable parameters of tunnel geometry, layout and employed system support. Such uncontrollable parameters include the rate of water inflow fluctuation, the degree of wall surface distortion and roughness, the radio frequency interferences of operating and communication systems, obstacles like dump trucks, boggers, and air compressors, as well as the variation rate of permeability, dielectric constants, and conductivity in the surrounding rock mass along openings. Therefore, a ZigBee network can efficiently be established after determining the underground effective parameters influencing ZigBee communication signals, and finding the maximum reliable communication distance between nodes in different underground openings with all variables. Thus, quantifying all of the above parameters is a prerequisite for the design of a reliable ZigBee network for underground openings. The purpose of this chapter is to generalise a ZigBee network model with a more comprehensive and realistic representation of a communication and monitoring system in underground mines. First, the procedure for the establishment of a ZigBee network in an underground mine is described. Then, a system design and model is developed based on the classification of results from an experiment undertaken at an underground mine in Western Australia (an analytical study). After that, another experiment was designed to physically verify the reliability of the proposed ZigBee network model in the underground mine. CHAPTER 6. ZIGBEE NETWORK MODEL GENERALISATION FOR UNDERGROUND MINES
Curtain
92 This was be done by the testing system’s functions and applications, for example, messages texting and controlling ventilation fan operations as a model testing. Finally, the results of the analytical study and verified experiments are discussed with a subsequent. ZIGBEE NETWORK MODELLING IN UNDERGROUND MINES In order to implement an underground monitoring and communication system, building a model, considering the determination of required functions and applications and the recognition of the variables of network metrics and environmental variables, is necessary for the assessment of technical and economic evaluations. System design and modelling In order to design Input, process and output for an underground monitoring and communication system design and model are illustrated in Figure 6-2. Access to basic information including utilising ZigBee nodes technology, desired applications (such as environmental monitoring, ventilation management, or type of communication) as well as mine site details is mandatory for system design and modelling. Normally, for the verification of a system design, system modelling is utilised (Robinson, 2012). Therefore, a pilot experiment must be conducted to operationalise the principles governing the system design and modelling of an underground ZigBee network. The output of the model will lead to a reliable outcome for the required functions and applications. CHAPTER 6. ZIGBEE NETWORK MODEL GENERALISATION FOR UNDERGROUND MINES
Curtain
93 Figure 6-2 Diagram of system design and model of an underground mine monitoring and communication system Generalising a model The aim of generalising the ZigBee model in underground mines is to be able to implement a systematic feasibility study of technical and economic evaluations, based on the system design and modelled results. This procedure is illustrated in Figure 6-3. Investigations of the ZigBee network model applied in underground spaces are empirically verified. Numerous runs and adjustment ZigBee functions and applications may be required before an adequate and reliable system design is achieved. Results documentation of the process would undoubtedly be valuable for the investment justification and to convince mine managers of the benefits of such an innovative system. AN UNDERGROUND ENVIRONMENT EXPERIMENT FOR SYSTEM DESIGN An experiment is designed to investigate the reliability of a wireless underground mine monitoring and communication system. To this end, the maximum distance of radio communication is evaluated in different conditions of underground environments and ZigBee nodes arrangement and location. After analysis of the measurements and classification of results, the system design for a reliable ZigBee network can be developed for an underground concept. CHAPTER 6. ZIGBEE NETWORK MODEL GENERALISATION FOR UNDERGROUND MINES
Curtain
96 Experiment setup The underground attenuation of ZigBee nodes was considered in this experiment. The measurement of WSN’s communication distance is attained based on the acceptable radio signal strength of a received data packet in terms of the LQI value. Ha et al. (2013) held that although RSSI provides a traditional metric for radio transceivers, LQI is an effective metric which has become more common in the latest ZigBee transceivers such as Chipcon’s CC2420. LQI values indicate that they are more reliable for link quality estimation and have a higher correlation with the distance between two ZigBee nodes compared with RSSI values. The LQI is an integer in the range 0-255 where 255 represents the strongest signal. The relationship between the LQI value and the detected power, P, in dBm for the ZigBee node in this experiment (JN5148), is approximately given by Eq. 6-1. Eq. 6-1 7×𝐿𝐿𝐿𝐿𝐿𝐿 – 1970 𝑃𝑃 = 20 Eq. 6-1 is valid for 0 < LQI < 255. According to the preceding approach described in 3.5.2, reliable LQI for certain data transmission between ZigBee nodes is assumed to be greater than 50 (-80 dBm). Therefore, the recorded information in this experiment would be analysed on this basis. Experiment methodology The experiment investigated the attenuation tendency of radio wave intensity. This includes the estimation method of the maximum distance between ZigBee nodes in the different underground conditions based on appropriate LQI for being cognisant of identifiable variables. To this purpose, the test lines were designed where the distance between the two ZigBee nodes increases continuously at certain intervals until the LQI drops lower than the specified limit. The procedure for LQI measurements in Tunnel 11 of the nickel mine are illustrated in Figure 6-5. In this procedure, the coordinator was connected to the laptop (PC) for recording data while the ZigBee nodes were mounted on tripods to gauge signal strength. For consistency of the results, the measurements were repeated at least 5 times for each interval. CHAPTER 6. ZIGBEE NETWORK MODEL GENERALISATION FOR UNDERGROUND MINES
Curtain
103 system in every underground environment considering the unique nature and circumstance of each. Table 6-2 Experiment results - Summary of the maximum communication distance between ZigBee nodes under different conditions Descriptions Communication Tunnel plan view distance (m) Test line Test line Node positions Straight line in the tunnel axis 380 Straight line on the tunnel wall 180 Diagonal on the opposite 240 straight line tunnel walls on the floor of Straight line 120 tunnel in the middle of Curved line 120 curved tunnel The results are analysed and classified to develop a more rigorous system design of a ZigBee network taking into account relevant factors in the underground openings. The effect of tunnel curvature on communication distance is indicated in Table 6-3. Communication distance leads to a dramatic drop from 380m in a line of sight of radio propagation compared with 120m in a non-line of sight under the similar conditions with respect to support system, test line position from the walls and the floor and the level of the ZigBee nodes. However, tunnel water inflow caused greater attenuation in the line of sight test. Table 6-3 Classification of results based on the passageway effect Radio Commun Test line propagat Tunnel Support Test line Node Water ication view ion layout system position level conditions distance regions (m) water line of mesh in the 1.5m inflow sight straight shotcrete tunnel 380 height through a (LOS) rock bolt axis ditch non-line curved mesh in the 1.5m of sight and shotcrete tunnel dry 120 height (NLOS) inclined rock bolt axis CHAPTER 6. ZIGBEE NETWORK MODEL GENERALISATION FOR UNDERGROUND MINES
Curtain
104 Classification of results based on the tunnel walls effect is indicated in Table 6-4. The communication distance between two ZigBee nodes in a straight tunnel falls rapidly from 380 m to 180 m where the test line changes the location from the middle of the tunnel to nearby the walls. This occurred when the tests were performed where there were similar conditions of tunnel layout, support system, ZigBee node height, and water inflow through a ditch. Table 6-4 Classification of results based on the tunnel walls effect Test line Test line Tunnel Support Node Water Communication view position layout system level conditions distance (m) water in the mesh straight 1.5m inflow tunnel shotcrete 380 tunnel height through a axis rock bolt ditch on the mesh water flow straight 1.5m tunnel shotcrete through a 180 tunnel height wall rock bolt ditch Results classified according to the evaluation of ZigBee nodes level- height effect is indicated in Table 6-5. ZigBee communication distance in this test reduced significantly from 380m to 120m mainly because of nodes placed in close proximity to the floor. In addition to the effect of floor unevenness (increases attenuation), the tunnel floor has an inclination of 0.3%. For this reason, any line of sight tests where the distance between ZigBee nodes was greater than 100 m may have been considered as a non-line of sight test. This explains why the height of nodes placement becomes an important factor in the system design of a ZigBee network in underground excavations. Table 6-5 Classification of results based on the ZigBee nodes level - height effect Test line Node Test line Tunnel Support Water Communication view level position layout system conditions distance (m) water 1.5m in the mesh straight inflow heigh tunnel shotcrete 380 tunnel through a t axis rock bolt ditch on in the mesh water flow straight the tunnel shotcrete through a 120 tunnel floor axis rock bolt ditch Results classified from the evaluation of ZigBee nodes arrangement is indicated in Table 6-6. The communication distance increases from 180m to 240 m provided that CHAPTER 6. ZIGBEE NETWORK MODEL GENERALISATION FOR UNDERGROUND MINES
Curtain
105 the test line changes from a straight to a diagonal one. This derives from conducting tests in similar conditions and ZigBee node levels. Thus, the relative positioning of ZigBee nodes to each other could certainly be a definitive item in optimising an underground system design in terms of cost and energy efficiency. Table 6-6 Classification of results based on the nodes arrangement effect Commun Nodes Test line Tunnel Test line Support Water ication arrang node level view layout position system conditions distance ement (m) on the mesh water flow straight straight 1.5m tunnel shotcrete through a 180 line tunnel height wall rock bolt ditch on the Water mesh diagon straight opposite 1.5m inflow shotcrete 240 al line tunnel tunnel height through a rock bolt walls ditch Therefore, it is confirmed that factors such as the passageway, the walls and the floor of a tunnel and the level and arrangement of ZigBee nodes have major impacts on radio wave attenuation and consequently on the distance of communication. On the basis of such experiment results, the design of a ZigBee network becomes more sensible taking into account a variety of parameters in an underground context. AN UNDERGROUND ENVIRONMENT EXPERIMENT FOR VERIFYING THE SYSTEM DESIGN The purpose of this experiment is to verify the system design of a ZigBee network that has been based on the classified results obtained from the communication distance experiment. This experiment also includes an investigation into the reliability of ZigBee functions and applications, specifically those involving the ZigBee nodes developed by our research group for bilateral underground mine communication (via message texting) as well as remote control of ventilation system. The ZigBee nodes applicable to this experiment are illustrated in Figure 6-16. Experiment apparatus The system tested is composed entirely of different ZigBee nodes such as coordinator, routers and end nodes. These products were developed in collaboration with Tokyo Cosmos Electric Co., Ltd. The JN5148-EK010 kit (Jennic) stacks were employed to CHAPTER 6. ZIGBEE NETWORK MODEL GENERALISATION FOR UNDERGROUND MINES
Curtain
106 create the ZigBee network. The wireless network is initially generated by the coordinator (gateway) which invites other nodes to join the network. A ZigBee coordinator (gateway) connected to the laptop (PC) used in the experiments is illustrated in Figure 6-16. The coordinator would normally be located in the surface office to allow users to monitor the underground mine, but was located in the tunnel for this experiment. Sending and receiving messages and remote control of ventilation fans are also normally enabled by the surface coordinator. Figure 6-16 Applicable ZigBee nodes for underground environments Bilateral communication provides wireless connections between the coordinator and a radio station (end device) to send and receive messages and data readings taken and delivered by sensors. It is advantageous to locate the radio station including a ZigBee node and a tablet in a refugee chamber in the event of an emergency, particularly where there is a failure of primary communication systems such as telephones or leaky feeders. The extended capability of the ZigBee node connection to a cell phone is another communication support option between miners and refugee chambers or surface operators. Ventilation fan control is also provided by the ZigBee node using the ability to wirelessly connect to the fans. A screenshot of the designed program showing on PCs (laptop and tablet) with ON/OFF switches and receiving/sending messages is CHAPTER 6. ZIGBEE NETWORK MODEL GENERALISATION FOR UNDERGROUND MINES
Curtain
107 illustrated in Figure 6-18. There are separate command icons for each auxiliary fan in the program. Routers are manufactured with the ability of real-time sensing of the environment as well as relaying communication signals throughout the network. A digital temperature, humidity and luminance compound sensor on board of each JN5148, with advanced sensitivity and continued stability, were utilised for the experiment. ZigBee nodes were placed in the boxes to minimise adverse environmental effects on their operation. Alternating current (AC) power was required for the ZigBee coordinator and radio station (end-device). Therefore, the test line to establish the ZigBee network selected based on the availability of power points on level 11. Routers were used which were compatible with direct current (DC) power between 9 and 32 volts. In this experiment, a 12-volt battery was used. Experiment setup To set up the experiment, the coordinator was first turned on and connected to the laptop to save and monitor data and also to establish an automatic wireless network to join routers and end devices to the network. The applicable ZigBee nodes were arranged at level 11 based on the classification of results of the last experiment to verify the design of the system. This is illustrated in Figure 6-17. Also, the coordinator was located in refugee chamber connecting to the power point which was supplied with 220 volts. The first router’s preferred location is in a line of sight from the coordinator at the specified maximum distance. Otherwise, an imbalance in the number of nodes in the system design will affect network performance negatively. For example, if a ZigBee network with a high density of nodes is used, the ability to control traffic congestion will be affected as well as impact overall economic costs. On the other hand, if there are fewer nodes over a greater communication distance, the reliability of communication would be the main concern for network performance. As a result, an accurate appraisal of optimally arranged nodes for the ZigBee network, as was done during the system design experiment, must include consideration of the controllable and uncontrollable parameters. The ZigBee network was constructed in accordance with the outcomes that appraisal the total length of CHAPTER 6. ZIGBEE NETWORK MODEL GENERALISATION FOR UNDERGROUND MINES
Curtain
108 the ZigBee network was 365 m and had a total of 5 nodes through the level 11 as shown in Figure 6-17. Figure 6-17 Arrangement of ZigBee nodes for the verification of the system design Experiment results The radio station was mounted at the end of the test line to communicate with the coordinator through the other nodes. Successful communication between coordinator and radio station is illustrated in Figure 6-18 where the messages sent (as red) and received (as blue) were transmitted from the coordinator to the radio station. As shown in Figure 6-18, the ControlTerm program was configured both on the laptop which was connected to the coordinator as well as the tablet connected to the radio station. In summary, these experiments demonstrated that wireless sensor networks can significantly improve the efficiency of underground monitoring regarding personnel, plant, and equipment location, operational readings, and communications. They also verified that ZigBee network performance of a carefully designed system is reliable for underground wireless monitoring and communication systems. The results show that stable communication distances for ZigBee nodes are sustainable up to 360 m and up to 120 m in straight and curved tunnels, respectively. Additionally, the following outcomes were successfully achieved: the real-time monitoring of underground spaces in terms of temperature, humidity and CHAPTER 6. ZIGBEE NETWORK MODEL GENERALISATION FOR UNDERGROUND MINES
Curtain
111 CONCLUSIONS AND FUTURE WORK The study set out to explore a reliable monitoring and communication system for underground mines. The reasons were to make a contribution to mining automation so as to improve mining safety and health as well as operational management in such adverse environments. To this end, an integrated system considering new technologies of wireless sensor networks (WSNs) and GIS was proposed. The main findings of the thesis and connections across the chapters are illustrated in Figure 7-1. These findings can be classified as theoretical and empirical discoveries. Theoretical findings on WSNs in underground environments in the second and third chapters were illustrated where the selection of an adequate networking through reviewing the literature and investigating the radio wave propagation and attenuation in underground openings were performed. The empirical findings of the performance evaluation, system integration design, and generalising model for ZigBee networks were examined and analysed in the fourth, fifth and sixth chapters respectively. The aim of the second chapter of the study clearly sought to answer two questions. First, what is the history of WSNs in underground mines? As ZigBee network is one technology of WSNs, it is crucial to review past work utilising other technologies in underground mines. The evaluation of sensors’ ability for underground mining in the literature strengthened the importance of this study on the subject. The services of WSNs were classified in monitoring environmental features, communication, and target tracking which enable mitigating significant concerns in underground mines. Second, how ZigBee technology was proposed and how it significantly benefits the improvement of monitoring and communication systems for underground mines. It also attempted to analyse the applications, stack, routeing protocols, topologies, reliability, and the security of ZigBee network. Then, the strengths and weaknesses of ZigBee network to establish such system in underground spaces were examined. CHAPTER 7. CONCLUSIONS AND FUTURE WORK
Curtain
113 some factors of underground environments affect the behaviour of radio waves and what is the methodology and simulation of investigating a stable communication distance in tunnels. Although certain ZigBee nodes that were used in the experiments with a limited number of tunnels, they did show a certain distance of a stable communication and the consistency of experimental and simulation results supports the validity of radio wave equations for underground mine environments. The evaluation of network performance and security is another attempt that has to become a precedent in developing a monitoring and communication system in underground mines. Chapter four covered the answers of which network topology makes the ZigBee system more secure with appropriate network metrics for the purpose of underground mine operations. The simulation results showed that mesh topology is a better option for greater throughput, packet delivery ratio and network security with lower latency data and energy consumption. The approaches represent the optimal arrangement of nodes in terms of the economic and technical assessments for underground mine monitoring and communication systems. An information system for data collection and a process is required to quickly respond to underground events when ZigBee network is transferring data. Thus, the ZigBee network integrated with GIS was proposed in chapter five. It explains how the system integration utilising ZigBee and GIS for underground mine monitoring and communication operates. Additionally, automatic and remote trigger action plans for measured environmental attributes to control mining operations are developed. Multi-users surface operation and 3D visualisation for the realistic understanding of the underground environment and miners’ conditions could also have other obvious implications of this system integration. To this point, all experimental and simulation results that propose an underground mine monitoring and communication system were analysed based on the data collection limited to the certain types of ZigBee nodes for the certain underground mines. In other words, every underground mine site has its own environmental and operational parameters which affect radio wave propagation. Also, the progress of technology in ZigBee node’s features is significant. Therefore, chapter six generalises a model for monitoring and communication systems at any underground CHAPTER 7. CONCLUSIONS AND FUTURE WORK
Curtain
114 environment using ZigBee networks. This model was then verified by conducting experiments in an underground nickel mine in Western Australia. The first experiment was carried out to find maximum and stable communication distance between ZigBee nodes in the presence of the surrounding parameters. This was the basis in designing the monitoring and communication system for that underground mine. The second experiment was performed to evaluate specified ZigBee functions and applications in the levels of that underground mine in order to verify the system design in the first experiment. Finally, the generalisation of the model was approved the reliability of establishment of ZigBee networks in underground mines through achieving the successful experimental findings. The future work for the establishment of a reliable monitoring and communication system must interact between surface and underground operators so it covers all mobile and fixed functions and applications based on the ZigBee technology. The prospect of a proposed ZigBee communications system is illustrated in Figure 7-2. Figure 7-2 Prospect of proposed communications system in underground mine site This system enables for real-time monitoring and communication between surface operators and the functions and applications of underground mines. That is, it is able to join all stationary and mobile sensors with different duties such as data-reading of CHAPTER 7. CONCLUSIONS AND FUTURE WORK
Curtain
115 the geotechnical instrument, tracking of the miners and the plant machinery, controlling the ventilation system, and managing the traffic signals from the surface. It is an essential tool for underground mine automation to improve project management in the era of safety, health, economic, cost and operations. These approaches consider the sensor node’s abilities and the applications requirement, and are generally classified as follows: (a) Safety and health approaches • Air quality and quantity measurements • Determination of workers’ locations • Emergency and safety communications • Gas detector and fire alarm • Geotechnical instrumentation (b) Operations management and control • Real-time monitoring of underground mining from a surface control centre • Improving the underground operation cycles (scheduling) • Traffic control (Signals) As seen in Figure 7-2, some functions and applications which were not covered in this study are marked for further investigation. Furthermore, to establish such a robust and reliable monitoring and communication system on the basis of data telemetry using ZigBee nodes (without access points), there are still more concepts to be tested and verified. Particularly, there is a need to analyse the reliability and accuracy of the ZigBee network for tracking mobile nodes. CHAPTER 7. CONCLUSIONS AND FUTURE WORK
Curtain
127 A simulation program of REMCOM was used to calculate the RSSI values based on the received power of rays’ reflections on the walls’ surface of tunnels and the source. Wireless InSite 2.7.0 (June 2013) was utilised as an electromagnetic modelling tool for predicting the effects of buildings and terrain on the propagation of electromagnetic waves. It predicts how the locations of the transmitters and receivers within an urban area affect signal strength. Wireless InSite is capable of modelling signal propagation for virtually any indoor environment. Floor plans may be read into Wireless InSite from CAD files, such as DXF, or they can be created from scratch using the Wireless InSite Floor Plan Editor. This editor allows the user to create a custom indoor environment by specifying wall locations, wall heights, ceilings, floors, windows, and doorways. The material properties of each of these structures can be changed to accurately reflect the real environment. The calculations are made by shooting rays from the transmitters, and propagating them through the defined environment. These rays interact with environmental features and make their way to receivers. Interactions include reflections from feature faces, diffractions around objects, and transmissions through features. Wireless InSite uses advanced high-frequency electromagnetic methods to provide accurate results over a frequency range from approximately 50 MHz to 100 GHz. The effects of each interaction along a rays’ path to the receiver are evaluated to determine the rays’ electric field. At each receiver location, contributions from arriving ray paths are combined and evaluated to determine predicted quantities such as electric and magnetic field strength, received power, interference measures, path loss, delay spread, direction of arrival, impulse response, electric field vs. time, electric field vs. frequency, and power delay profile. APPENDIX A
Curtain
128 Radio wave propagation model in tunnel: To simulate radio wave propagation in our cases (tunnels), Full 3D Model in REMCOM was selected because two ray tracing methods are available with the FULL 3D model including the Shooting and Bouncing Ray (SBR) method and the Eigenray method. Ray tracing models based on a geometrical optics (GO) approach is investigated in this study for simulation results. The excitation plane is used in the GO model based on Sun (2010) study on the evaluation of EM field distribution. According to this method, the summation of all rays’ powers receiving from all reflection points and the source are computed. Tunnel environment model: The tunnel cross section size is defined with a height of 5.5 and a width of 5.5 ; the tunnel wall, ceiling, and floor are made of the same material with electrical 𝑚𝑚 𝑚𝑚 parameters (permittivity) = 4 , (conductivity) = 0.01 / ; the tunnel interior is 0 filled with air ( = , = 0 / ). The transmitting power is 3 dBm with the central 𝜀𝜀 0 𝜀𝜀 𝜎𝜎 𝑆𝑆 𝑚𝑚 frequency of 2.4 GHz band. The transmitting and receiving antennas are horizontally 𝜀𝜀 𝜀𝜀 𝜎𝜎 𝑆𝑆 𝑚𝑚 polarized dipoles at the same height. Both antennas of the transmitter and receiver in the model are defined approximately at the centre of the tunnel width, and the walls of mine tunnels are presumed smooth. Simulations: A. Straight tunnel Indoor design is used for radio wave investigation for tunnel channel in Wireless InSite (REMCOM software). In the tunnel case, thickness of walls, floors and ceilings are assumed 100 m. 2.4 GHz narrowband Sinusoid waveform and a Half-wave dipole antenna are created in the project. Transmitter point and receiver routs are designed 1.5m above the floor. APPENDIX A
Curtain
Abstract Planners and managers tasked with strategic open pit scheduling in real indus- trial situations are faced with two key dilemmas. Firstly, findingoptimalanswersfortheOpenPitProductionSchedulingProb- lem requires the solution of large combinatorial optimisation problems. Unfor- tunately, and despite a lot of effort, progress has been slow in finding ways to solve these large problems satisfactorily (or at all) in a reasonable amount of time through mathematical programming approaches. The second issue is that until recently, most analysts and planners have relied on deterministic inputs to their models and have ignored parameter uncertainty. In doing this they have assumed in effect that information related to geological and grade variability, as well as the future behaviour of commodity prices and other economic factors (amongst many others), are known at the time that the decision is made. In reality these inputs are highly uncertain and depending on which specific instances are selected, could lead to vastly different results in pit designs and mining schedules. With reference to the first issue, the size problem is commonly dealt with by either reducing the size of the input data set or by implementing clever formula- tion and solution strategies. From the data perspective, a quick and easy strategy with drastic effects is to remove such data from the model upfront which are superfluous from a geo- metric point of view. In other cases, an attempt is made to lift the burden of dealing with large models by re-blocking or aggregating blocks into data sets with a smaller more manageable number of blocks. This makes it easier to solve the problem but potentially dilutes the resolution of the input data and results. ix
Curtain
PAGEx Fromthesolutionangle, heuristicmethodsareoftenusedtosolvelargemodels faster than exact mathematical methods but this sacrifices accuracy and the abil- ity to prove optimality. Some encouraging advances have been made over the last decade using mathematical programming methods such as mixed integer linear programming(MILP)intheformulationandsolvingoftheproblemwithoutjeop- ardising the resolution of the input data. Key improvements include intelligent data pre-processing, removing obsolete variables with respect to earliest and lat- est start times, the use of branching algorithms with relaxed integer constraints, exploitingstrongbranchingcharacteristicsoftheproblem, theintroductionofim- provedcuttingplanes, anddecompositionmethodssuchasLagrangianrelaxation. Thesecondproblem(inputuncertainty)hasreceivedlessattention. Apromis- ing simulation method (Conditional Simulation) has enabled decision makers in theminingindustrytogeneratemultiplerealisationsrepresentingthespatialvari- ability of geological features and attributes such as metal grades and densities of a deposit. When such simulations are considered together they provide insights into the estimation of the uncertainty inherent in the geological or grade model due to limited information. Similarly, the stochastic behaviour of commodity prices resulting in limitations in accurate forecasting has been captured by meth- ods such as Monte Carlo simulation and Real Option Valuation. Unfortunately many of these methods, although bestowing massive improve- ments compared to historical deterministic models, still result in multiple out- comes (or scenarios) which ultimately leave the decision maker with the dilemma of having to select the best option. In this thesis we first draw on some basic advancements made in the field of mathematical programming to construct a simplistic MILP formulation for a small instance of the Open Pit Production Scheduling Problem. We then in- troduce multiple Conditional Simulation data sets which are successively solved using the MILP formulation generating candidate solutions to the problem. We alsointroduceaninterpretativeframeworkwhichcomparesaveragevaluesagainst accompanying standard deviation. We combine these two metrics into a single indicator, the coefficient of variation (CV), which we propose to be used to find a suitable trade off between risk (standard deviation of values) and return (average of values). This metric can then be used to make sense of candidate solutions and OptimisedDecision-MakingunderGradeUncertaintyinSurfaceMining
Curtain
PAGExi optimisation results derived from multiple grade instances based on Conditional Simulations. This framework enables the identification of a single or a select number of most ’attractive’ options by considering the trade off between risk and return (expressed as the CV). We then use a version of the MILP formulation to incorporate a Scenario Op- timisation approach which was developed in the 90’s and applied to projects in power generation and financial portfolio optimisation. The approach can be used to solve a stochastic model based on a particular method for combining scenario solutions into a single feasible and ’robust’ strategy. The results from this ap- proach are then similarly tested for viability by using the interpretive framework. Thisthesiscombinesadvancementsmadeinexactmathematicalmethodswith a probabilistic scenario optimisation approach which incorporates and considers grade uncertainty while arriving at a single ’best’ or most attractive solution (al- though not necessarily highest value or lowest risk). The resultant methodology is tested on a case study of 40 conditional simulations. The three key contributions of this thesis are: 1. Scenario Optimisation By combining an exact deterministic MILP optimisation approach based on Caccetta and Hill (2003) with multiple conditional simulation inputs we utilised a modified two-stage scenario optimisation approach to generate a unique solution to an open pit scheduling case study. This approach has an initial stage during which optimised solutions are generated using a MILP objective function maximisation. This is then followed in a second stage by finding a solution which minimises the sum of the absolute differences between the original solutions derived in stage one and the current solution applied to the equivalent simulation data set. This two-stage scenario optimisation approach was modified from Dembo (1992) who used it in financial portfolio optimisation and in hydroelectric power generation. Our research indicates that this is the first time this approach has been used in a mining context. 2. Interpretive Framework using Coefficient of Variation OptimisedDecision-MakingunderGradeUncertaintyinSurfaceMining
Curtain
PAGExii In order to incorporate both risk minimisation and value maximisation into the decision making criteria when comparing various ‘competing’ candidate solutions, we developed an interpretive framework which utilises the coef- ficient of variation (CV) as a measure which includes both factors. The framework based on the CV enables comparison of multiple optimisation results and their associated statistics when compared against the underly- ing data. Further, it provides an intuitive and easy way of identifying those solutions that offer a favourable trade-off between risk and return. Although the coefficient of variation is a well known statistical metric for normalising and comparing different scenarios and options with different means and standard deviations, our research indicates that this is the first time the CV has been used in such an interpretive framework and certainly the first time it has been used in the mining context for comparing optimi- sation solutions derived from conditional simulations. 3. Data Perturbations We conducted early exploratory research with a concept that we call ‘data perturbation’ and that we believe has a lot of merit for further research and investigation. Generally, a number of ways can be utilised to generate valid candidate mining schedules. These can be as basic as starting from the top of a depositandminingnaivelydownwardsbenchbybench,andassophisticated as following a true holistically optimised solution. As long as certain requirements are fulfilled, such as adherence with prede- termined precedence constraints (or pit slope angles) and compliance with minimum and maximum annual production capacity constraints, any such schedule will qualify as a ‘valid’ solution. Of course it could be a partic- ularly poor economic solution (it might even have a negative NPV) but it would be permissible as a solution. One way of generating such a permissible solution is to use a slightly per- turbed version of the underlying conditional simulation data set to gener- ate an optimised solution. This can for instance be achieved by applying a small random modifying factor (for example a uniformly selected factor that varies between -5 and +5 percent) on the true block value. Although such a modification is not permitted in generating valid condi- tional simulation data sets during geo-statistical estimation, it could never- OptimisedDecision-MakingunderGradeUncertaintyinSurfaceMining
Curtain
1.1.OVERVIEW PAGE2 considerations. There are many areas within such operations where Operations Researchingeneralandoptimisationtechniquesspecificallycanbesuccessfullyin- troducedtogainthemaximumbenefit. Thesetechniquesaremostlyimplemented on the development and exploitation stages of mining projects and operations. Areas of application include ore-body modelling and ore reserve estimation, the design and scheduling of optimum pits, determining optimum blends and cut off policies, equipment maintenance and fleet optimisation studies to name but a few. This thesis however occupies itself with the Open Pit Mining Production Scheduling Problem. A strategic solution to this particular problem involves the decision on: (a) which of the available blocks in a mining block model to extract by surface mining methods (i.e. mine them or leave them in the ground), (b) when (in which time period) should the extraction take place, and (c) what to do with them (send a mined block to waste, to the processing plant for treatment or to a stockpile for later consideration). All these decisions need to be made with the objective of maximising the economic value of such an exercise while satisfying safe wall-slope (precedence) restrictions, production capacity, market factor and environmental constraints. Problems such as these are routinely formulated as mathematical models with pre-determined input values, decision variables and technical or capac- ity constraints. Such problems are then solved as linear programming (LP) or integer/mixed-integer programming (IP or MIP) formulations using commercial software. One of the key limitations of these models is the high level of uncertainty in the input values (e.g. prices and ore/metal grades) and assumptions used to construct the models originally as well as the extent to which this is taken into account or ignored. In some cases this can be further exacerbated due to the size of the models and the number of variables required to be solved for models reaching anything close to realistic sizes. OptimisedDecision-MakingunderGradeUncertaintyinSurfaceMining
Curtain
1.2.PROBLEMSTATEMENT PAGE3 1.2 Problem statement The issue that we are trying to address in relation to the uncertainty problem can be stated as follows: Many of the current mine scheduling optimisation approaches ignore the un- certainty around input data (e.g. grade values, density) thus failing to assess the inherent risk or robustness of derived solutions. Often when they do incorporate risk through methods like Conditional Simulation, they provide no method to interpret results or isolate a single or few most suitable options. 1.3 Previous research Over the last few decades the Open Pit Mine Production and Scheduling Problem has been approached from many angles. Sequential methods divide the problem into components by first generating a solution to the ultimate pit problem, fo- llowed by generating periodic phases (also called ‘push backs’) and only then finding schedule solutions to the individual subcomponents. Pioneering work usingasequentialapproachandfocussingonsolvingtheultimatepitproblemwas done by Lerchs and Grossmann (1964) in the 60’s using Graph Theory, Dynamic Programming and Network Flow methods. Numerous researchers subsequently builton2-Dand3-DversionsandmodificationsofLerchsandGrossman’soriginal work. Original literature utilising a Network Flow method was proposed by Picard (1976) and expanded on by various others. Heuristic methods have also been used to solve the ultimate pit problem with one of the most well known being the Moving (Floating) Cone Method. Early solutions using the Moving Cone Method were proposed by David et al. (1974) and Lemieux (1979) and modifications to the method has been proposed by many others. More holistic or integrated methods considered the problem as a whole and attempted to solve the problem without subdivision into parts. These meth- ods include linear (LP) and mixed integer linear programming (MILP) methods combined with solution strategies such as branch and bound and cut generation, as well as decompositions methods such as Lagarangian relaxation. Key liter- ature from within this genre include Caccetta and Hill (2003), Gaupp (2008), Askari-Nasab et al. (2010), Darby-Dowman and Wilson (2002), Ramazan and Dimitrakopoulos (2004), Gershon (1982) and Weintraub et al. (2008). Compared to the volume of work done on deterministic mine planning and schedule optimisation, research done on introducing uncertainty into mine plan- OptimisedDecision-MakingunderGradeUncertaintyinSurfaceMining
Curtain
1.4.RESEARCHOBJECTIVESANDMOTIVATION PAGE4 ning has been relatively sparse. Since the early 90’s Dimitrakopoulos and various contributors have been exploring the use of Conditional Simulation as a way to incorporate uncertainty into the ultimate pit design and production schedul- ing problem e.g. Journel and Huijbregts (1978), Dimitrakopoulos (1990), Dimi- trakopoulos (1994) and Armstrong and Dowd (1994). An interesting approach for incorporating uncertainty using Scenario Optimi- sation was suggested by Ron Dembo (Dembo, 1992) in the 90’s but never applied to the mining industry. In this thesis we build on his approach. 1.4 Research Objectives and Motivation The primary objective of this study can be stated as: To devise an effective method which enables the inclusion of geological (grade) uncertainty into the problem formulation to derive a risk-adjusted ‘robust’ solu- tion (i.e. a solution that involves and acceptable trade off between risk and return) and to develop an interpretive framework to make sense of the results as an aid to decision making. The motivation for this research is that grade variability and uncertainty is routinely ignored in the compilation of mine planning models. In the cases where grade risk is introduced through conditional simulations, the exercise involves the generation of multiple simulations with limited sense-making occurring in the interpretation of the results often still leaving the decision maker with multiple options without the capacity to select the ‘best’ or most attractive solution(s). 1.5 Research Methodology The research methodology is as follows: (a) Review literature and approaches used in the past to deal with the primary problem under review. (b) Forasuitablebasemetaldeposit, formulateadeterministicMILPmodelfor a small to medium size block model (1,000 to 50,000 blocks) based on pre- vious research and solve the problem using a commercial solver (CPLEX). Performpre-processingoninputdatainordertoreducethesizeoftheblock model and data inputs as much as possible. OptimisedDecision-MakingunderGradeUncertaintyinSurfaceMining