Overtaking rules - traffic congestion, Other Subject

Assignment Help:

Overtaking Rules - Traffic Congestion

Overtaking needs an appropriate consideration and efficiency because the driver will use the other lane and increase the speed. The negligence in overtaking can cause accident between the overtaking vehicle, overtaken vehicle and oncoming vehicle. There are some conditions where overtaking is not allowed such as in a hill top, corners, blind turns, where there are overtaking prohibited signs, at pedestrian crossing, at double line paint marking and at the area where the view is limited.

Overtaking vehicle should be on the right lane of the overtaken vehicle when committing overtaking movement. When the lead vehicle decides to take a right turn, it is allowed to overtake on the left lane. It is essential for the driver to make sure they have a safe distance and enough time to return to their own lane when decided to overtake the other vehicles. Before overtaking the lead vehicle, the driver should set their eyes on the rear mirror and side mirror. Then, they must give a signal and look in the rear mirror once again to avoid blind spot situation. Figure (1) shows the correct overtaking principle.

1603_Overtaking Rules – Traffic Congestion.png

Figure: Overtaking Principle

It is recommended to overtake other vehicle as far as point A rather than a random round detour (shown by a dotted line). The driver can increase their speed in the process of overtaking but should not over accelerate and skid. From point A, the driver must accelerate as fast as possible by keeping straight as far as B. When reaching point B, the driver still failed to overtake in the straight line, he should brake and fall back behind the overtaking car. After point B, it is almost certain that he must go on as attempting to drop back would be a risky decision. From point B, the driver must get balanced and going straight to meet acceptable safety gap.


Related Discussions:- Overtaking rules - traffic congestion

Describe drug addiction, Problem 1: (a) Critically show the following ...

Problem 1: (a) Critically show the following concepts: drug addict, dependency and tolerance. Use relevant examples to support your answer. (b) Critically discuss the d

Wastage and stagnation, what are the factors affecting wastage and stagnati...

what are the factors affecting wastage and stagnation

History of new media, History of New media: The term has actually been use...

History of New media: The term has actually been used since the 1970s by researchers conducting social, psychological, economic, political and cultural studies of information and

Post-feminism, Post-feminism: Post-feminism describes a range of viewpoint...

Post-feminism: Post-feminism describes a range of viewpoints reacting to feminism. While not being "anti-feminist," post-feminists believe that women have achieved second wave goa

Religion, how did the periods of persecution cause the church to think abou...

how did the periods of persecution cause the church to think about the doctrines of salvation and church?

Describe the guidelines for using acceptance sampling, Question 1 i) What ...

Question 1 i) What is Statistical Process Control? Distinguish between Statistical Quality Control and Statistical Process Control ii) List out Dr. Edward Deming's contribution

Motion in a straight line under gravity, a stone is dropped from a roof of ...

a stone is dropped from a roof of a house and falls past window 6m high in 1/4 seconds; find the height of the house above the window?

Education, aims of education in the present scenario

aims of education in the present scenario

Setting aims and objectives for an academic project, One source of confusio...

One source of confusion for students is the difference between an aim and an objective . The two are different although they are in fact linked. Unfortunately, the two terms are

Security protocols, SECURITY PROTOCOLS A security protocol (encryption ...

SECURITY PROTOCOLS A security protocol (encryption protocol or cryptographic protocol) is a conceptual or actual protocol that performs a security-related utility and applies c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd