FIELD OF THE INVENTIONThe invention generally relates to a roadway access hole cutter that reduces the chance of rupturing a utility buried close to the roadway and a method of cutting a square or rectangular access hole in a roadway that avoids rupturing the buried utility.
BACKGROUND OF THE INVENTIONDuring installation of the optical fiber, a microtrench is cut in a roadway, the optical fiber and/or innerduct/microduct is laid in the microtrench and then a fill and sealant are applied over the optical fiber and/or innerduct/microduct to protect them from the environment. Methods of microtenching that can be utilized in the present invention include the methods described in my previous U.S. Pat. Nos. 10,641,414; 10,571,047; 10,571,045; 10,781,942; 10,808,379; 10,808,377 and U.S. patent publication Nos. 20180292027; 20180156357, and 20180106015, the complete disclosures of which are incorporated in their entirety herein by reference.
Before cutting a microtrench in a roadway, the city must be notified. The city personnel will locate and mark buried utilities on the roadway. When a microtrench must cross a buried utility, the buried utility must first be exposed, which requires cutting an access hole through the roadway and then removing the dirt below the roadway through the roadway access hole. Currently, core saws, concrete saws, core drills and jack hammers are used to break through the roadway.
The city roadways are asphalt and/or concrete. Utilities, such as natural gas, water, telecommunications, and/or electric, are typically buried in the dirt or bedding below the roadway. Natural gas lines are usually required to have 12-36 inches of cover above them. For example, a 2 inch natural gas line would have to be buried 14 inches below the roadway in order to have 12 inches of cover (dirt or bedding) above the natural gas line.
However, often times codes are not followed by installers and natural gas lines can be installed just below the roadway. A jackhammer is usually used to form the access hole in the roadway. However, if the buried utility, such a natural gas line is not buried according to code and is just below the roadway, the jackhammer can cause the natural gas line to rupture causing a fire and serious injury or death. Furthermore, conventional core saws, concrete saws, and core drills can also damage the shallowly buried utility. There is a great need for a softer way of cutting an access hole that reduces the chances of rupturing a buried utility that is not to code, i.e. just below the roadway.
Even with marking of the buried utilities, crews are still damaging buried utilities at an alarming rate. There is a great need for an automated safety device to reduce damaging buried utilities.
SUMMARY OF THE INVENTIONAn objective of the invention is to provide an improved roadway access hole drilling device and a safer method of microtrenching to avoid unintentionally cutting buried utilities.
The present invention utilizes a roadway access hole saw comprising a four saws and associated saw drives to rotate the saws, to provide a square or rectangular access hole in a roadway above the buried utility. The novel use of the roadway access hole saw provides a far faster and safer method to expose the buried utility, especially when the utility is not buried to code and is just below the roadway.
The objectives of the invention and other objectives can be obtained by a method of installing optical fiber, innerduct or microduct under a roadway comprising:
- drilling a square or rectangular access hole in a roadway above a buried utility using a roadway access four saw head comprising a first saw opposing a second saw and a third saw opposing a fourth saw;
- removing dirt below the roadway through the access hole to expose the buried utility;
- cutting a microtrench in the roadway using a microtrencher so that the microtrench crosses the buried utility and does not damage the buried utility;
- laying the optical fiber, innerduct or microduct in the microtrench; and
- filling the microtrench with a fill material to cover and protect the optical fiber, innerduct or microduct.
The objectives can also be obtained by a roadway access drill configured to reduce damage to a utility buried under a roadway comprising:
- a four saw head comprising a first saw opposing a second saw and a third saw opposing a fourth saw, wherein the four saw head is configured to cut a square or rectangular roadway access hole;
- at least one motor configured to drive the first, second, third and fourth saws; and a lifting device for lifting and lowering the roadway access drill.
BRIEF DESCRIPTION OF THE DRAWINGSFIG.1A illustrates a roadway access hole drill located over the roadway above a buried utility.
FIG.1B illustrates a roadway access hole drill located over the roadway above a buried utility.
FIG.1C illustrates a roadway access hole saw located over the roadway above a buried utility.
FIG.2 illustrates hole in the roadway cut by the roadway access hole drill to expose the buried utility.
FIG.3 illustrates a microtrencher cutting a microtrench in the roadway that crosses the exposed previously buried utility.
FIG.4A illustrates an optical fiber sealed in the microtrench by a fill.
FIG.4B illustrates a buried utility sealed in the microtrench by a fill.
FIG.5A illustrates a view of a saw.
FIG.5B illustrates a view of a saw.
FIG.5C illustrates a view of a saw head comprising four saws cutting a square or rectangular access hole in a roadway.
FIG.5D illustrates a view of a saw head comprising four saws cutting a square or rectangular access hole in a roadway.
FIG.5E illustrates a saw movably mounted to the four saw head.
FIG.5F illustrates a saw rotatably mounted to the four saw head.
FIG.5G illustrates a saw moving along a cutting plane in the square orrectangular access hole3 being cut.
FIG.6A illustrates a flow chart of a method of cutting a square or rectangular roadway access hole.
FIG.6B illustrates a flow chart of a method of cutting a square or rectangular roadway access hole.
DETAILED DESCRIPTION OF THE INVENTIONThe invention will be explained by reference to the attached non-limiting Figs. In the description, for purposes of explanation and not limitation, specific details are set forth, such as particular networks, communication systems, computers, terminals, devices, components, techniques, storage devices, data and network protocols, software products and systems, operating systems, development interfaces, hardware, etc. in order to provide a thorough understanding of the present invention. However, it will be apparent to one skilled in the art that the present invention can be practiced in other embodiments that depart from these specific details. Detailed descriptions of well-known networks, computers, digital devices, storage devices, components, techniques, data and network protocols, software products and systems, development interfaces, operating systems, and hardware are omitted so as not to obscure the description of the present invention. All use of the word “example” are intended to describe non-limiting examples of the invention.
The operations described in the figures and herein can be implemented as executable code stored on a computer or machine readable non-transitory tangible storage medium (e.g., floppy disk, hard disk, ROM, EEPROM, nonvolatile RAM, CD-ROM, etc.) that are completed based on execution of the code by a processor circuit implemented using one or more integrated circuits; the operations described herein also can be implemented as executable logic that is encoded in one or more non-transitory tangible media for execution (e.g., programmable logic arrays or devices, field programmable gate arrays, programmable array logic, application specific integrated circuits, etc.).
To facilitate an understanding of the principles and features of the various embodiments of the present invention, various illustrative embodiments are explained below. Although example embodiments of the present invention are explained in detail, it is to be understood that other embodiments are contemplated. Accordingly, it is not intended that the present invention is limited in its scope to the details of construction and arrangement of components set forth in the following description or examples. The present invention is capable of other embodiments and of being practiced or carried out in various ways.
As used in the specification and the appended claims, the singular forms “a,” “an” and “the” include plural references unless the context clearly dictates otherwise. For example, reference to a component is intended also to include composition of a plurality of components. References to a composition containing “a” constituent is intended to include other constituents in addition to the one named.
Also, in describing the example embodiments, terminology will be resorted to for the sake of clarity. It is intended that each term contemplates its broadest meaning as understood by those skilled in the art and includes all technical equivalents that operate in a similar manner to accomplish a similar purpose.
It is also to be understood that the mention of one or more method steps does not preclude the presence of additional method steps or intervening method steps between those steps expressly identified. Similarly, it is also to be understood that the mention of one or more components in a composition does not preclude the presence of additional components than those expressly identified. Such other components or steps not described herein can include, but are not limited to, for example, similar components or steps that are developed after development of the disclosed technology.
As illustrated, lines or arrows between elements can denote communications between the different elements. These communications can take any form known by those of skill in the art, including digital, telephonic, or paper. The communications can be through a WAN, LAN, analog phone line, etc. The information communicated can be in any format appropriate for the transmission medium.
“Data storage” can be non-transitory tangible memory, such as any one or a combination of a hard drive, random access memory, flash memory, read-only memory and a memory cache, among other possibilities. The data storage can include a database, implemented as relational database tables or structured XML documents or any other format. Such a database can be used to store the information gathered from transaction records and Thing Records. Non-volatile memory is preferred.
“Processor” can refer to a single data processor on a single computing device or a collection of data processors. The collection of data processors can reside on a single computing device or be spread across multiple computing devices. The processor can execute computer program code stored in the data storage or a memory. In one example, the processor can execute computer program code representative of functionalities of various components of the system.
While certain implementations of the disclosed technology have been described in connection with what is presently considered to be the most practical and various implementations, it is to be understood that the disclosed technology is not to be limited to the disclosed implementations, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Certain implementations of the disclosed technology are described above with reference to block and flow diagrams of systems and methods and/or computer program products according to example implementations of the disclosed technology. It will be understood that one or more blocks of the block diagrams and flow diagrams, and combinations of blocks in the block diagrams and flow diagrams, respectively, can be implemented by computer-executable program instructions. Likewise, some blocks of the block diagrams and flow diagrams do not have to be performed in the order presented or if at all, according to some implementations of the disclosed technology.
Computer program instructions can also be stored in a non-transient computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means that implement one or more functions specified in the flow diagram block or blocks.
FIGS.1A and1B describe an example of a system for cutting a roadway access hole. The system comprisesuser interface devices120, aserver150, andcomputer system702, all interconnected via acommunication network140. All interconnections can be direct, indirect, wireless and/or wired as desired.
Thenetwork140 can be any desired network including the internet or telephone network. Various networks800 can be implemented in accordance with embodiments of the invention, including a wired or wireless local area network (LAN) and a wide area network (WAN), wireless personal area network (PAN) and other types of networks that comprise or are connected to the Internet. When used in a LAN networking environment, computers can be connected to the LAN through a network interface or adapter. When used in a WAN networking environment, computers typically include a modem, router, switch, or other communication mechanism. Modems can be internal or external, and can be connected to the system bus via the user-input interface, or other appropriate mechanism. Computers can be connected over the Internet, an Intranet, Extranet, Ethernet, or any other system that provides communications, such as by the network. Some suitable communications protocols can include TCP/IP, UDP, OSI, Ethernet, WAP, IEEE 802.11, Bluetooth, Zigbee, IrDa, WebRTC, or any other desired protocol. Furthermore, components of the system can communicate through a combination of wired or wireless paths, including the telephone networks.
The systems can be accessed via anyuser interface device120 that is capable of connecting to theserver150 via thenetwork140. A plurality ofuser interface devices120 can be connected to theserver150. An exampleuser interface device120 contains a web browser and display. This includesuser interface devices120 such as internet connected televisions and projectors, tablets, iPads, Mac OS computers, Windows computers, e-readers, and mobile user devices such as the smartphones, iPhone, Android, and Windows Phone, and other communication devices. Theuser interface device120 preferably is a smartphone. Thesmartphone120 can be in any form, such as a hand held device, wristband, or part of another device, such as vehicle.
The computer processing unit (CPU) of theuser interface device120 can be implemented as a conventional microprocessor, application specific integrated circuit (ASIC), digital signal processor (DSP), programmable gate array (PGA), or the like. The CPU executes the instructions that are stored in order to process data. The set of instructions can include various instructions that perform a particular task or tasks, such as those shown in the appended flowchart. Such a set of instructions for performing a particular task can be characterized as a program, software program, software, engine, module, component, mechanism, or tool. The non-transitory memory can include random access memory (RAM), ready-only memory (ROM), programmable memory, flash memory, and the like. The memory, include application programs, OS, application data etc.
Theserver150 and/orcomputer system702 described herein can include one or more computer systems directly connected to one another and/or connected over thenetwork140. Each computer system can include a processor, non-transitory memory, user input and user output mechanisms, a network interface, and executable program code (software) comprising computer executable instructions stored in non-transitory tangible memory that executes to control the operation of theserver150 and/orcomputer system702. Similarly, the processors functional components formed of one or more modules of program code executing on one or more computers. Various commercially available computer systems and operating system software can be used to implement the hardware and software. The components of each server can be co-located or distributed. In addition, all or portions of the same software and/or hardware can be used to implement two or more of the functional servers (or processors) shown. Theserver150 and/orcomputer system702 can run any desired operating system, such as Windows, Mac OS X, Solaris or any other server based operating systems. Other embodiments can include different functional components. In addition, the present invention is not limited to a particular environment orserver150 and/orcomputer system702 configuration. Preferably, theserver150 is a cloud based computer system. If desired for the particular application, theserver150 or portions of theserver150 can be incorporated within one or more of the other devices of the system, including but not limited to auser interface device120.
Theserver150 includes at least one web server and the query processing unit. The web server receives the user query and sends the user query to the query processing unit. The query processing unit processes the user query and responds back to theuser interface device150 and/orcomputer system702 via the web server. The query processing unit fetches data from the database server if additional information is needed for processing the user query. The database is stored in a non-transitory tangible memory, and preferably a non-volatile memory. The term “database” includes a single database and a plurality of separate databases. Theserver150 can comprise the non-volatile memory or theserver150 can be in communication with the non-volatile memory storing the database. The database can be stored at different locations.
Software program modules and data stored in the non-transitory memory theserver150 and/or non-volatile memory of theuser interface device150 and/orcomputer system702 can be arranged in logical collections of related information on a plurality of computer systems having associated non-volatile memories. The software and data can be stored using any data structures known in the art including files, arrays, linked lists, relational database tables and the like. Theserver150,computer system702 andmobile user device150 can be programmed to perform the processes described herein.
Saw head utility avoidance safety device.
Modern cities require an extensive range of utilities to function. The buried utilities include at least water, electricity, gas, telephone, and fiber optics. These utilities are typically provided through underground conduits. In theory, the location of the utilities is carefully recorded and held centrally by city authorities. In practice this does not universally occur and the location of many utilities can be unrecorded or recorded incorrectly. The determined location of the utility may be acquired by underground imaging, which is commonly accomplished by the use of ground penetrating radar (GPR). Typically, the location of buried utilities are separately determined by GPR and the location marked for later cutting or digging.
The present drill systems for installing optical fiber and/or innerduct microduct, or for installing a new utility, having a four saw head utility avoidance safety device greatly reduces the chances of damaging a buried utility caused by operator error, errors in four saw head location, errors in the buried utility location, and other errors. The utility avoidance safety device includes an under-roadway detection unit700, which can be a GPR, connected to thecomputer system702 that controls forward movement of the four sawhead27 during drilling. Thecomputer system702 can further comprise adrill control system716.
A conventional GPR system comprises an electromagnetic detection unit, a computer system that receives detection data from the detection unit; a user interface device coupled to the computer system; and a display coupled to the computer system. The computer system interprets the detection data to provide a visual representation of the underground on the display. Computer systems are now well known and any suitable computer system comprising a processor in communication with non-volatile, non-transitory memory can be utilized.
U.S. patent publication No. 2003/0012411 (Sjostrom), discloses a system and method for displaying and collecting GPR data. U.S. Pat. No. 6,617,996 (Johansson), discloses a GPR system to provide an audible signal regarding size and how deep. My previous U.S. Pat. No. 10,571,047 discloses a GPR system for use in microtrenching. The complete disclosures of these patents and publications are incorporated herein by reference. Ditch Witch 2450R GPR is commercial example of a GPR machine that can detect at suitable speeds of 5.6 mph. Geophysical Survey Systems, Inc. also commercially sells suitable GPRs that can be utilized in the present invention.
In place of the usual GPR used to locate buried utilities, the invention can utilize other means of revealing buried utilizes or any tomography, including but not limited to, radio frequency identification, sound waves, electrons, hydraulic, vibration, magnetic, sonar, ultrasound, microwaves, xrays, gamma rays, neutrons, electrical resistivity tomography, Multi-channels Analysis of Surface Waves (MASW), and/or Frequency-domain Electro Magnetics (FDEM) induction. Any of these alternatives and later developed alternatives can be utilized. Thus, the under-roadway detection unit700 can comprise GPR and/or any other alternative for detecting objects buried under the roadway. Preferably, the under-roadway detection unit700 comprises a GPR.
As shown inFIGS.1A-4A, the claimed invention utilizes an under-roadway detection unit700 in a novel utility avoidance device for use on a roadway accesshole drilling device22 to create anaccess hole3 in a city street (also referred to as a roadway2) to install an optical fiber or innerduct/microduct5 under theroadway2.FIG.4B shows a buriednew utility9 in place of the buried optical fiber or innerduct/microduct5. Examples of thenew utility9 include electrical devices, including but not limited to coax cable, coper cable, low voltage cable and power cable.
As shown inFIG.1A, the under-roadway detection unit700 is configured to survey under theroadway2 during drilling using thedrilling device22. Roadwayaccess drilling devices22 are now well known and any suitable access hole drilling device can be utilized in the present invention. However, the present invention utilizes a novel four sawhead27 in place of a normal drill head.
The four sawhead27 comprises afirst saw53 opposing asecond saw54 and athird saw55 opposing afourth saw56. Preferably, each of the foursaws53,54,55,56 can each havecircular blade36 driven by anindividual motor34 and asaw blade shroud37 as shown inFIGS.5A-5C. Thesaw blade shroud37 protects an exposed surface of theblade36. Each of the foursaws53,54,55,56 cut an inside surface of the square orrectangular access hole3.
The four sawhead27 can cut a square orrectangular access hole3 in aroadway2, such as asphalt or concrete. In a preferred embodiment, the first, second, third and fourth saws operate simultaneously to simultaneously cut the four sides of the square orrectangular access hole3. Examples of suitable sizes for asquare access hole3 are each of the four sides being from 4 inches×4 inches to 16 inches×16 inches and depths ranging from 1 inch to 16 inches. Examples of suitable sizes for arectangular access hole3 are sides being from 4 to 16 inches and depths ranging from 1 inch to 16 inches.
As shown inFIGS.5E,5F,5F each of the four sawblades36 can move along the axis to cut thecorners35. If thesaw blades36 do not reach thecorners35, thecorners35 can be busted out after cutting theaccess hole3.
Each of the foursaws53,54,55,56 are preferably mounted in the four sawhead27 so that the positions of thesaws53,54,55,56 does not change in relation to the four sawhead27. The inner walls of the square orrectangular access hole3 are thus the same size as the diameter of thesaw blades36, as shown inFIGS.5C and5D. If a saw breaks, it is easily replaceable.
Alternatively, the foursaws53,54,55,56 can be mounted on associated sawmovable mounts45 as shown inFIG.5E that allow thesaw blade36 to move along a cuttingplane47, shown at33, that creates an inner wall of the square or rectangularroadway access hole3.FIG.5G shows an example of how thesaw36 can move along a cuttingplane47, shown at33, that creates an inner wall of the square or rectangularroadway access hole3. Cutting two adjacent inner walls of the square or rectangularroadway access hole3 forms thecorner35. In this manner, the inner walls of the square orrectangular access hole3 can be made larger in size than the diameter of thesaw blades36.
In another alternative, the foursaws53,54,55,56 can be mounted on associated saw rotatable mounts46 as shown inFIG.5E that allow thesaw blade36 to move along a cuttingplane47, shown at33, that creates an inner wall of the square or rectangularroadway access hole3.FIG.5G shows an example of how thesaw36 can move along a cuttingplane47, shown at33, that creates an inner wall of the square or rectangularroadway access hole3. Cutting two adjacent inner walls of the square or rectangularroadway access hole3 forms thecorner35. In this manner, the inner walls of the square orrectangular access hole3 can be made larger in size than the diameter of thesaw blades36.
Thedevice18 is designed for making a neat clean cutout (roadway access hole3) to help locate utilities or install a small utility handhole for various utility services such as telecommunications. Thedevice18 can be driven with fourindividual motors34, each driving an associatedsaw blade36, or onemotor32 powering all four sawblades36. The four sawhead27 can have awater attachment28 to keep thesaw blades36 cool while cutting or apressurized air attachment29 to provide air cooling to thesaw blades36. Asaw blade shroud37 can cover an exposed part of thesaw blade36 for safety as well as having a vacuum attachment for collecting all dust and debris.
Detection data from the under-roadway detection unit700 can be sent to acomputer system702. Thecomputer system702 can send display information to thedisplay704 to display what is under theroadway2 in the same manner as conventional GPR systems. Thecomputer system702 can also interpret the detection data in real time to identify objects under the roadway. For example, thecomputer system702 can distinguish betweenutilities4 under theroadway2 and other objects under the roadway, such as reinforcing steel. The interpretation, i.e. a buriedutility4, can also be displayed on thedisplay704 for the drill operator, or on auser interface device120. Thecomputer system702 determines the location of the identifiedutility4, or object, to be avoided, such as depth and/or size in real time as the four sawhead27 is cutting through theroadway2. Thecomputer system702 determines the distance between the four sawhead27 and the buriedutility4 in real time as the four sawhead27 is cutting through theroadway2, which is shown at706. Auser interface device120 can be coupled to thecomputer system702 for the operator to control the under-roadway detection unit700. Thecomputer system702 can also determine the distance between theroadway2 and the buriedutility4, shown at709.
When thecomputer system702 identifies a buriedutility4 in the path of the four sawhead27, thecomputer system702 can send an alert714 to the drill and/or stop forward movement of the four sawhead27. In this manner, there is added protection against undesirable cutting of buriedutilities4 by the four sawhead27.
Drill control systems716 for controlling forward movement and/or directional control of the four sawhead27 are now well known. Thecomputer system702 is connected to thedrill control system716 to override control of the four sawhead27 when necessary to avoid damaging a buriedutility4. For example, forward movement of the four sawhead27 can be automatically stopped by thecomputer system702 and/ordrill control system716 at aset distance706, such as from 2-24 inches, preferably 4-12 inches.
The under-roadway detection unit700 can be connected to thecomputer system702 by wireless and/or wired connection, and/or indirectly by anetwork140. Additional attachments can be connected to thecomputer system702 as desired. Examples of additional attachments are shown inFIG.1A. The connections between the additional attachments can be wired and/or wireless directly and/or indirectly by thenetwork140. Examples of additional attachments includeuser interface devices120 and/or aserver150.
Thecomputer system702 can comprise a global positioning device or other positioning device to map the location of themicrotrench12, buriedutilities4 detected by the under-roadway detection unit700, and the buried optical fiber and/or innerduct/microduct5, or buriednew utility9.
Thecomputer system702 can be connected to anetwork140 for transmitting drilling data to theserver150 connected to thenetwork140 and/oruser interface devices120 connected to thenetwork140. The drilling data can include, for example, the measurements of theaccess hole3, video of thehole3, location of thehole3, location of the buriedutilities4 detected by the under-roadway detection unit700, location of the buried optical fiber and/or innerduct/microduct, speed of microtrenching, and any other information as desired, in real time. The drilling data can also be stored on thecomputer system702, or by any other means, such as USB, flash drives, etc., for later uploading or accessing.
With the present method and system, as described in the flow diagrams ofFIGS.6A and6B, the location of buriedutilities4 can be accurately determined in real time, theaccess hole3 drilled in a manner that avoids the four sawhead27 damaging the buriedutilities4, amicrotrench12 cut, spoil vacuumed out of themicrotrench12, the measurements of the microtrench12 measured720,722, the optical fiber and/or innerduct/microduct5 or buriednew utility9 can be installed in themicrotrench12, and the microtrench12 filled withfill7, all conducted simultaneously and continuously at the rates disclosed herein above, which are far faster rates than previously. The drilling information can be uploaded in real time to a central database for use by the city, managers, traffic controllers, supervisors, and any others as desired. In this manner, the actual location of buried utilities can be more precisely mapped and stored in city records.
Anysuitable microtrencher14 can be utilized in the present invention. Non-limiting examples of suitable micro trenchers include those made and sold by Ditch Witch, Vermeer, and Marais. A Vermeer RTX 1250 tractor can be used as the motorized vehicle for themicrotrencher14. Amicrotrencher14 has is a “small rock wheel” specially designed for work in rural or urban areas. Themicrotrencher14 is fitted with amicrotrencher blade15 that cuts a microtrench12 with smaller dimensions than can be achieved with conventional trench digging equipment.Microtrench12 widths usually range from about 6 mm to 130 mm (¼ to 5 inches) with a depth of 750 mm (about 30 inches) or less. Other widths and depths can be used as desired.
With amicrotrencher14, the structure of the road, sidewalk, driveway, or path is maintained and there is no associated damage to the road. Owing to the reducedmicrotrench12 size, the volume of waste material (spoil) excavated is also reduced.Microtrenchers14 are used to minimize traffic or pedestrian disturbance during cable laying. Themicrotrencher14 can work on sidewalks or in narrow streets of cities, and can cut harder ground than a chain trencher, including cutting through for example but not limited to solid stone, concrete, and asphalt.
A debris containment shroud40 can be placed on theroadway2 over the buriedutility4 to be exposed. The debris containment shroud40 can be attached to a vacuum hose48 attached to a source of vacuum50. The debris containment shroud40 is configured to provide a vacuum to a hollow chamber44 during use. During use, the debris containment shroud40 rests on theroadway2 surface and the debris, such as dust, chips, particles, etc., and water if present are vacuumed away through the vacuum hose48 and into a vacuum storage container52. The vacuum hose48 can be any size as desired, such as from 4 to 12 inches in diameter. Sources of vacuum50 are now well known and any suitable vacuum source can be utilized, such as those made by SCAG Giant Vac., DR Power, Vermeer, and Billy Goat.
As shown inFIGS.2 and3, once the buriedutility4 is exposed, amicrotrencher14 is used to cut a microtrench12 in the roadway so that the microtrench12 crosses the buriedutility4 without damaging the buriedutility4. As shown inFIG.4A, the optical fiber, innerduct, ormicroduct5 can be laid in themicrotrench12, and the afill7 can be applied to cover thehole3 and fill themicrotrench12 to cover and protect the optical fiber, innerduct, ormicroduct5. As shown inFIG.4B, thenew utility9 can be laid in themicrotrench12, and thefill7 can be applied to cover thehole3 and fill themicrotrench12 to cover and protect thenew utility9.
ExampleOn 19 Nov. 2020, one of my crews struck a buried gas line while installing optical fiber. The gas line The Gas line was mismarked by approximately twenty-one (21) inches and buried approximately six (6) inches deep. 911 and 811 were contacted. This type of accident happens far too often and the chances of this type of accident happening can be greatly reduced using the present invention. The following information is the ticket:
- 811 Ticket #2082405236 (11/19/2020)
- Dig Up Tkt #2082843411
- When did it happen: 3:00 PM
- Impact to residents: 2
- Evacuation?: No
- Main line: No
- Service line: Yes
- Scope of work: Microtrenching—2213 Rountree Dr.
- Positive Locate: Mismarked
- Reason for strike: Mismarked by 21″
- Repair status: Gas has been contained; TGS On Site
- ConEx Ticket Number: 174074741
REFERENCE NUMBERS- 2 Roadway
- 3 Square or rectangular access hole
- 4 Buried utility
- 5 Optical fiber, innerduct, microduct
- 6 Dirt
- 7 Fill
- 9 New utility
- 12 Microtrench
- 14 Microtrencher
- 15 Microtrencher blade
- 18 Drilling Device
- 22 Roadway access drilling device
- 27 Four saw head
- 28 Water attachment
- 29 Pressurized air attachment
- 30 Saw blade shroud
- 32 Motor
- 33 Movement ofblade36 along cuttingplane47
- 34 Individual motor
- 35 Corner of square or rectangular access hole
- 36 Saw blade
- 37 Saw blade shroud
- 40 Debris containment shroud
- 44 Hollow chamber
- 45 Saw movable mount
- 46 Saw rotatable mount
- 47 Cutting plane
- 48 Vacuum hose
- 50 Source of vacuum
- 52 Vacuum storage container
- 53 First saw
- 54 Second saw
- 55 Third saw
- 56 Fourth saw
- 120 User interface device
- 140 Network
- 150 Server
- 700 Under-Roadway Detection Unit
- 702 Computer System
- 704 Display
- 706 Distance between buriedutility4 and four sawhead27 during cutting
- 707 Distance between buriedutility4 androadway2
- 714 Alert to Drill Operator
- 716 Drill control system
It is to be understood that the foregoing illustrative embodiments have been provided merely for the purpose of explanation and are in no way to be construed as limiting of the invention. Words used herein are words of description and illustration, rather than words of limitation. In addition, the advantages and objectives described herein may not be realized by each and every embodiment practicing the present invention. Further, although the invention has been described herein with reference to particular structure, steps and/or embodiments, the invention is not intended to be limited to the particulars disclosed herein. Rather, the invention extends to all functionally equivalent structures, processes and uses, such as are within the scope of the appended claims. Those skilled in the art, having the benefit of the teachings of this specification, may affect numerous modifications thereto and changes may be made without departing from the scope and spirit of the invention. While the invention has been described to provide an access hole over a buried utility, the invention can be utilized wherever an access hole in the roadway is required.