South East Central Railway zone

The South East Central Railway is one of the 18 railway zones in India. It is headquartered at Bilaspur and comprises the Bilaspur and Nagpur divisions (formerly part of the South Eastern Railway) and the new Raipur division.

South East Central Railway
14-South East Central Railway
Overview
HeadquartersBilaspur Junction
LocaleChhattisgarh
Madhya Pradesh
Maharashtra
Odisha
Dates of operation2003 (2003)
PredecessorSouth Eastern Railway Zone
Technical
Track gaugeBroad Gauge, Narrow Gauge
ElectrificationYes
Other
Websitewww.secr.indianrailways.gov.in

History

This Zone was formerly part of the South Eastern Railway. It was inaugurated on 20 September 1998 and dedicated to the nation on 1 April 2003.

Infrastructure

Bilaspur Railway Station is a regional hub for the system. It is the busiest junction in Chhattisgarh and the fourth-busiest in Central India. The zone's major stations are Itwari railway station (ITR), Gondia (G), Bhandara Road (BRD), Dongargarh (DGG), Rajnandgaon (RJN), Durg Junction railway station (DURG), Bhilai Power House railway station (BPHB), Raipur (R), Bhatapara (BYT), Tilda (TLD), Bilaspur (BSP), Gevra Road (GAD), Champa (CPH), Raigarh (RIG), and Anuppur (APR), all of which lie on the Mumbai-Howrah and Mumbai-Katni-Bilaspur main lines. Bilaspur, Gondia, Durg and Raipur are the zone's major junctions. By 2007, SECR had added a third rail line between Durg and Raigarh, And a tender has been passed in October 2019 to add the fourth line between Raigarh and Durg due to the heavy freight contranment.

gollark: Oh, my bot has a "telephone" system using webhooks.
gollark: SPUDNET is used in a lot of places where people want to not bother with that much and just shove secured communications between some endpoints.
gollark: I did have a thing with ingame modems and some ECC library on older versions, which ensured that you couldn't fake a message from the remote debugging (not backdoor) computer.
gollark: It's technically websockets, but those are *basically* HTTP.
gollark: It's the potatOS remote debugging (totally not a backdoor) backend.

See also

References


    This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.