Vehicle-to-office connectivity

Issue 2 2021 Infrastructure, Mining (Industry)

One of the major issues faced by a large coal and heavy minerals mining company in South Africa was the inability to maintain consistent and reliable communication on its widespread operations. The organisation required a communications solution that would address the shortcomings of its existing network as well as provide robust and reliable communication between the main administration/management hub and its onsite mining vehicles.

Anriko Opperman, enterprise divisional manager at SS Telecoms (SST), an Elvey Group company, says that SST was approached by the mine’s management and has spent the past two years rolling out a mine-wide wireless digital connectivity networking solution that interconnects the various employees’ mobile devices to monitoring systems on vehicles, mining equipment and conveyor belts throughout the mine. The goal was to help increase productivity, ensure employee safety and streamline the health and safety reporting process.

Once the network was installed, SST was tasked with deploying a mobile communications solution that would enable complete connectivity with the 100-plus mine vehicles. “We determined that the Billion M120N high-performance, all-in-one fixed wireless communications platform would best fulfil the role by providing a hub for the different on-board vehicle systems to plug into and relay data back to the mine’s central network,” says Opperman.

The M120N is designed for in-vehicle applications that require LTE wireless connections with high availability. It offers LTE broadband connectivity, dual-WAN failover/failback and GPS for real-time location tracking.

The compact, ruggedised steel enclosure design of the Billion M120N integrates dual SIMs, a four-port Gigabit switch, a Wi-Fi access point, embedded multi-GNSS receiver for GPS or GLONASS, and ignition sensing for in-vehicle applications. It can be operated at a wide temperature range of -40°C and 60°C as well as humidity levels between 20% and 95% (non-condensing), making it highly suited to operation in the mining sector, where harsh and demanding conditions are common.

Opperman says that the Billion router is used as a mobile hotspot, allowing uninterrupted communication between the vehicles’ operators and the mine offices. The system provides regular feedback that includes engine monitoring for maximised uptime as well as data from a Proximity Detection System (PDS) that ensures the safety of on-site employees and vehicles.

“Mine vehicles are typically very large and the ability to see a pedestrian is severely compromised. The use of the PDS, together with cameras installed at various points on the outside of the vehicles, provides for excellent operator visibility of the surrounding environment. The vehicle operator is alerted to the proximity of pedestrians via a ruggedised tablet located in the cabin,” says Opperman.

In the event of a connectivity failure of the primary WAN interface, traffic is automatically redirected to the secondary WAN interface, and it will perform failback when the primary interface connection is restored. The M120N also supports dual SIMs for redundancy between various carrier networks and features four gigabit Ethernet ports, an RS-232 serial port and 802.11n AP to enable LTE data connectivity.

Security of communication is provided with a Virtual Private Network (VPN), built-in Network Address Translation (NAT) firewall, password protection for system management and the system’s ability to prevent DoS attacks including Land Attack and Ping of Death.

Opperman says that great interest has been exhibited by other mining operations that have seen the success of the Billion deployment in the coal mine’s vehicles.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Understanding shared responsibility
Infrastructure
Data management is increasingly coming under the governance spotlight, yet a significant vulnerability often goes unnoticed. Many businesses operating on Microsoft 365 assume their data is comprehensively backed up.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.