Underground/overground low latency communication

SMART Mining Security Solutions 2023 Infrastructure, Mining (Industry)

In the age of smart mining, where technology is used to optimise operations, enhance safety, and increase efficiency, reliable communication is absolutely vital. From 5G networks to secure and reliable underground and open cast (M2M) communications, the mining industry is embracing digital transformation to improve the flow of information across sites, streamline decision-making, and enable safe, secure remote operations.


Willem Wentzel.

“The smart mining discussion has been going on for a few years, but technology could only address certain underlying mining communication requirements. The introduction of low latency, high bandwidth 5G (especially) ORAN communication means the complete set of communications requirements can be addressed. The next step is to make sure the business case is solid,” says Willem Wentzel, head of Wireless at NEC XON.

“The industry is hungry for low latency networks that enable control of machinery, reduce the risk of human injury, and increase productivity. The technology can work 24x7. A lot of mines can’t currently work at sunset because of safety concerns,” says Wentzel. Innovative 5G OpenRAN (ORAN) solutions enable mines to use the RAN network on multi-vendor platforms. It’s an opportunity to maximise the benefits of smart mining on cost-effective infrastructure.

Physical location challenges

Due to the often-unique location and layout of mines, radio frequency network planning can be complex. In this regard, NEC XON is developing a unique panel which deflects 3.7 GHz signals into specific areas where coverage is limited but required – underground, for example.

In terms of security, there are two levels that mining executives must think about. Data integrity, which is dealt with in the communication layer of the 5G ORAN technology, and data security, which implies appropriate access control of information to a large workforce. NEC XON has effective biometric solutions that facilitate this. “From a security perspective, the infrastructure must underpin a layer of trusted data which forms part of the solution,” says Wentzel.

The ability to privatise 5G ORAN will enable machine-to-machine (M2M), business to business (B2B), and push-to-talk communication on campus or anywhere in the country (or the world) where the customer has a presence using ORAN as a foundation. Wentzel says finding the right operation and business support system (OSS/BSS) is vital to the value proposition. This is especially important in mining where the network coverage need is intricate, a reality that impacts on cost.

Business optimising communications

To help ensure that network performance meets the mining industry’s exacting standards, NEC XON has adopted a methodology which includes end to end network assurance complimented by optimising power consumption to adhere to carbon reduction. This enables NEC XON to identify any weak points and optimise network usage on any vendor’s solution. That doesn’t just improve the network itself, but it reduces total cost of ownership by allowing for predictive maintenance, for example. The solution will tell support workers what to look for and what spares to take with them to effect repairs, allowing a suitably qualified technician to simply replace the part as indicated.

The plethora of sensors, devices, and machines generating data in real-time, means the ability to communicate information quickly and accurately is critical to optimising processes, reducing downtime, and improving safety. Effective communication systems allow for remote monitoring and control of operations, enabling mining companies to operate in hazardous environments without putting workers at undue risk. As such, the integration of advanced communication technologies has become essential futureproofing for the mining industry.

Find out more at www.nec.xon.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...
Partnership delivers 40% storage savings for surveillance
Surveillance Infrastructure
Large-scale video surveillance users and applications demanding extended storage periods will benefit from up to 40% savings on video storage hardware stacks thanks to a new partnership between IDIS and Secure Logiq.

Read more...
How smart video is transforming storage at the edge
Infrastructure Surveillance
As these technologies come together, they are impacting the architecture of the edge and what we require from data storage. More specifically, they are driving a demand for specialised storage.

Read more...
VPS hosting set to dominate in 2025
Infrastructure
SME market growth and the increasing need for a digital footprint are pushing VPS growth in South Africa, especially since it is now perceived as a viable business tool, scalable by nature, with improved performance.

Read more...
Risk-IO manages mining security risks
Zulu Consulting Security Services & Risk Management Mining (Industry)
[Sponsored] A local mining company with three large operations experienced increased security costs. The liability included no standardised risk assessment, poor management of the efforts to mitigate hazards, and unauthorised access with subsequent theft. The reactive approach to security was not only expensive but also wasteful in the sense that the costs were poorly managed, and there were no metrics to show improvement or trends in incidents.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...