MODULE DETAILS |
Leaky Feeder Systems DMNLFS611
Nominal duration in hours: 24 hours total time commitment
This time commitment includes the structured activities, preparation reading, and attendance at each webinar, completing exercises, practical assessments and proctored assessments. It is also expected that students spend additional time on readings, personal study, independent research and learning, practicing on remote labs and required software and working on any projects and assignments.
This module covers the concept of leaky feeder communication systems, typical system specifications, topologies used, characteristics of leaky feeder coaxial cable, VHF vs UHF systems, intrinsic safety of leaky feeder systems, implementation of ethernet and VoIP, and mining applications.
|
||
MODULE PURPOSE
|
The purpose of this module is for participants to develop knowledge of leaky feeder characteristics and its implementation in mining industries. |
||
MODIFICATION HISTORY |
Original module approved in 2011 (52438WA); December 2014 (52727WA). This version is Version 3. |
||
PREREQUISITE AND/OR CO‑REQUISITE MODULES
|
Modules that must be delivered and assessed before this module: Data Communications DMNDCO607 Modules that must be delivered concurrently with this module: N/A |
||
SUMMARY OF LEARNING OUTCOMES
|
On successful completion of this module students will be able to: 1. Explain fundamental characteristics of leaky feeder systems 2. Interpret implementation and application examples of leaky feeder systems |
||
LEARNING OUTCOMES |
ASSESSMENT CRITERIA |
||
Learning outcomes specify what students will be able to do as a result of the learning. |
Assessment criteria provide the criteria by which achievement of the learning outcomes will be judged. |
||
1 |
Explain fundamental characteristics of leaky feeder systems |
1.1 |
Explain the leaky feeder concept |
1.2 |
Produce basic examples of leaky feeder system specifications |
||
1.3 |
Outline network topologies used in leaky feeder systems |
||
1.4 |
Outline features of leaky feeder coax |
||
1.5 |
Identify and outline components of leaky feeder systems |
||
2 |
Interpret implementation and application examples of leaky feeder systems |
2.1 |
Compare strengths and weaknesses of VHF and UHF leaky feeder systems |
2.2 |
Outline basic intrinsic safety concerns regarding leaky feeder systems |
||
2.3 |
Outline requirements for implementation of ethernet over leaky feeder |
||
2.4 |
Outline the features of transportation of voice and data over leaky feeder |
||
2.5 |
Summarise the applications of leaky feeder in mining |
||
DELIVERY MODE
|
Online and/or face-to-face. |
||
SPECIALISED RESOURCES
|
N/A |
||
ASSESSMENT STRATEGY
|
METHODS OF ASSESSMENT Assessors should gather a range of evidence that is valid, sufficient, current and authentic. Evidence can be gathered through a variety of ways including direct observation, supervisor's reports, project work, structured assessments, samples and questioning. This will include short answer questions on the knowledge content, the use of remote and virtual labs, and writing tasks to apply the learning to academic tasks.
CONDITIONS OF ASSESSMENT Assessor Requirements: Assessors must satisfy the assessor requirements in the standards for registered training organisation (RTOs) current at the time of assessment.
Assessors must also hold a tertiary qualification in engineering or related field.
The RTO must also ensure that trainers and assessors keep their industry knowledge up to date through ongoing professional development. Assessment Conditions:
Questioning techniques should not require language, literacy and numeracy skills beyond those required in this module. The candidate must have access to all tools, equipment, materials and documentation required.
The candidate must be permitted to refer to any relevant workplace procedures, product and manufacturing specifications, codes, standards, manuals and reference materials.
Assessments may be open book assessment and may be completed off campus. Invigilation software will be used for some assessments to ensure authenticity of work completed.
Model answers must be provided for all knowledge-based assessments to ensure reliability of assessment judgements when marking is undertaken by different assessors.
|
Software/Hardware Used
Software
-
N/A
Hardware
- N/A