RailCorp begins train safety system rollout

 

First stage on NSW central coast.

Novo Rail Alliance has installed the first section of an automatic train protection (ATP) system to be rolled across the entire RailCorp train network in NSW.

The first stage of the RailCorp ATP program will run on an approximately 60-kilometre section of track between Berowra, on the northern edge of Sydney, and Wyong on the NSW central coast.

The rollout is expected to occur over 11 months on RailCorp "possession weekends" - scheduled periods where trains do not run so that maintenance and other batched work can occur.

Main North Enabling Works that kicked off last month concentrated on a section of track between Gosford and Warnervale.

The alliance rolled out 76 balises - electronic beacons - on the section of track.

Balises transmit track and signalling data to onboard automatic train protection (ATP) computers on the trains, which process and display the information to the driver.

If the data is ignored, the ATP system can trigger braking to prevent the train from exceeding the speed limit for that part of the track, passing a red signal or travelling beyond its "permitted movement authority".

The start of full rollout of the ATP came after a $13 million trial of the technology by RailCorp in the Blue Mountains, which began in 2007.

Novo Rail is an alliance of RailCorp, Aurecon, Laing O'Rourke and O'Donnell Griffin.

Copyright © iTnews.com.au . All rights reserved.


RailCorp begins train safety system rollout
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 762

Vote