3. 3 File Number
What is BMS?
- A micro-processor based system which centralizes and simplifies…
controlling
monitoring
operation and…
management
…of heating, air-conditioning, ventilation & other building services to
achieve…
» safe and comfortable working environment
» energy saving & efficient operation
» at reduced time & cost
4. 4 File Number
BMS provides…
Comfortable & safe environment
for your building
by controlling…..
Air Handling Units
Fan Coil Units
Chillers
Pumps
Boilers
VFD’s
and many more…..
5. 5 File Number
Components of BMS
- Centralized WorkStation Computer
With powerful user-friendly software.
Used for everyday building operation.
- Field devices
Temperature, Humidity, Pressure sensors
Valves, Actuators
- DDC Controllers
Micro-processor based
Fully programmable
Controls the HVAC equipment of the building
6. 6 File Number
LOG-IN
BMS Features….
• Man / Machine Interface
- Interact with the connected
technical building equipment.
- User friendly for
Operators/Engineers
• User-friendly data presentation
- Co-ordination of the flow of
information through the
system by implementing
customized graphics.
- Floor plans of the building
- Graphical representation of
the equipment.
• System Security
- To prevent unauthorized use
- Password protection
- Operator specific access
- Operator log summary
• Reporting
- present customized subsets of data
- actual or historical state
- export as a word or excel document or..
- to a printer.
• Data Logging
- The automatic gathering and storage of
data from the field equipment for later
analysis and reporting
- Dynamically or historical
- Customized charts and graphs
- Tabular reports
• Remote connectivity
- provide remote access to the system
with full functionality through..
local area network
dial-up
internet via web browser
7. 7 File Number
BMS Features….
• Alarm Management
- the presentation in the sequence of importance and
time of..
potentially dangerous situations
process value deviations
- guiding the operator to take appropriate action
through..
audible and visual indications
Email, SMS
- alarm summary
Time, date, priority and description
• Time Scheduling
- time-based start/stop of the equipment
- saves energy cost and efficient operation
- effective for lighting, occupancy control
- can be as daily, weekly, for holidays or
events
• Event recording
- automatic logging of…
operator activities and commands
processes related to connected
devices
workstations and printers.
9. 9 File Number
Why we need this?
• Improved indoor environment quality
- Comfortable living and working environment
– domestic or commercial
- Better temperature and humidity control
- Good air quality
• Faster response to ..
- occupant needs
- end-user complaints
- trouble conditions
• Maintenance Savings.
- efficient control gives less wear and strain of mechanical
equipment.
- provides longer life
- runtime monitoring alerts timely maintenance of equipment
- avoids expensive failures
• Energy Savings
- eliminates unnecessary system operation.
- accurate energy usage information
- helps you to take steps to reduce energy consumption
like…
Optimum-Start
Night-Purging
Time-Scheduling
10. 10 File Number
Why we need this?
• Reduced operator training
- on-screen instructions
- user-friendly graphic displays
- simpler operation programmed for routine
and repetitive operation
• Consolidater Facility Control…
- One point centralized operation
- Simpler operation
- Reduces time and resources
• Maintenance Savings.
- efficient control gives less wear and strain of mechanical
equipment.
- provides longer life
- runtime monitoring alerts timely maintenance of equipment
- avoids expensive failures
11. 11 File Number
Almost all applications in building automation are based on a
common functionality
I/O functions
(field devices)
Processing
functions
Management
functions
Operator
functions Paging
Help
Operation
Set point range
Calculation
y = f(x)
Closed loop ctrl.
Recording Supervision
Networking
Alarming
Operat.hours
0 0 0 9 7 8 h
Backup power
control
Counting
Characteristics
Measuring
J
Time program
Techn. alarm
Maintenance
Engineering
Interlocks
Peak dem. limit
kWh
s
0 0 2 9 7 3 8
Safety alarm
Data analyses
Man. operation
Positioning
M
Reporting
+ -
Signaling Switching
M
Documentation
15. 15 File Number
HVAC Design Criteria
Typical Architecture for HVAC
Disadvantage of Standalone System
1. Centralized Control is not Possible.
2. Alarms cannot be monitored.
3. Optimization of the system is not possible.
4. Cloud based cannot be implement.
5. New Strategies using Energy Management Software's for increasing the building efficiency cannot implement.
HVAC systems can interface
to Building Automation System (BAS) to allow the
building owners to have more control over the
heating or cooling units. The building owner can
monitor the system and respond to alarms
generated by the system from local or remote
locations. The system can be scheduled for
occupancy or the configuration can be changed
from the BAS. Sometimes the BAS is directly
controlling the HVAC components. Depending on
the BAS different interfaces can be used
Today, there are also dedicated
gateways that connect advanced VRV / VRF and
Split HVAC Systems with Home Automation and
BMS (Building Management Systems) controllers
for centralized control and monitoring, obviating
the need to purchase more complex and
expensive HVAC systems. In addition, such
gateway solutions are capable of providing remote
control operation of all HVAC indoor units over the
internet incorporating a simple and friendly user
interface
17. 17 File Number
What is Smart building?
Smart building technologies can improve buildings’ energy efficiency and indoor
environmental quality.
Smart Building:
A building that provides a productive and cost-effective
environment through optimization of its four basic
components - structure, systems, services and
management - and the interrelationships between them."
19. 19 File Number
BMS Software
Generally BMS Software can be divided into following types –
Programming / Configuration Tool
HMI Software for Visualization the Process Parameters
Energy Management Software
HMI Software
23. 23 File Number
Plant Controllers
• Plant Controller’s are as below-
Ex. TREND IQ4E Ex. TREND IQ4NC
Plant Controllers are used to control the HVAC Equipment's like Chillers, Boilers,
Pumps, Complex AHU’s etc..
Using Plant Controller one can easily control the complex loops of all the HVAC
Equipment's.
IO Extension is possible in Plant controllers, whatever would be the IO Count of the
HVAC Equipment.
Easy Integration with the Supervisory Systems
24. 24 File Number
Features of Plant Controllers
Bacnet over MSTP/IP
Expandable IO Modules
Faster Processor
Faster Webpages
Ability to process more programs per second
Touch Screen Displays can be easily
connected
Real Time Clock
Sequencing
Scheduling
25. 25 File Number
Unitary Controllers
- Unitary Controllers are used to control the HVAC Equipment's like Fan Coil Units,
VAV’s, AHU’s etc..
- Unitary Controllers cannot directly be connected to Ethernet TCP/IP Protocol it
communicates to Supervisory system by TREND Integration Controller IQ4NC on
Bacnet Protocol
- All the programs are loaded in the Unitary Controllers of their respected HVAC
Equipment.
• Unitary Controller’s are as below-
Ex. TREND IQ411/422 Ex. TREND IQ ECO
28. 28 File Number
Network Display
Features
Color graphics pages (schematic)
Viewing of inputs, outputs, directories, alarms, and plots
Adjustment of knobs, switches, and time zones.
Graphing of logged data
Configurable users to ensure system security
Communicates with all controllers on network (not autodialed networks)
DHCP enabled
Ethernet, current loop LAN, or RS232 network connection
Panel, surface, or embedded mounting
Color touch screen LCD display
29. 29 File Number
Network Display - Functionality
User Menu Schematics
Graphs Controls Browser Alarm Handling
Operating Times
31. 31 File Number
What is Cyber Security?
•It is referred as Information Technology Security
•Focusing on protecting:
•Computers
•Networks
•Programs and Data
•From unintended or unauthorized access, change or destruction.
32. 32 File Number
Why is Cyber Security Important?
•Who uses the Internet?
•Big Businesses
•Financial Institutions
•Hospitals
•Governments
•Military
•What do they do and what do they do with the information?
•Collect, process and store confidential information on computers
•Transmit that data across networks to other computers
•What do they/we need to do?
Protect sensitive business and personal information.
33. 33 File Number
How On-line attacks damage consumer trust?
• Customers are making more transactions online and trust in a brand is
paramount
• What happens if your information ends up in the wrong hands?
• Would you shop on-line with them again?
• The challenge is being able to identify the risks and take action
• Currently, brand owners only know about approximately 10% of the threats.
34. 34 File Number
Cyber Attacks
Microsoft has revealed
it had its computer
system hacked
Royal Bank of Scotland has said its websites
fell victim to a cyber attack after customers
were unable to access online banking
NatWest victim of cyber
attack after site crashes
for the second time
UK retailer Lakeland revealed it
was forced the firm to reset all
customer passwords as a
precaution
Adobe Systems Inc said it was the victim of
sophisticated cyber attacks on its networks by
hackers who accessed data belonging to
millions of customers along with the source code
to some of its popular software titles
The data breach of Sony's PlayStation Network resulted from
a "very carefully planned, very professional, highly
sophisticated criminal cyber attack designed to steal personal
and credit card information for illegal purposes”
Facebook and technology giant Apple have also admitted to being hacked.
35. 35 File Number
So what’s the Risk..?
What’s the worst that could happen?
Switch the lights off in a supermarket
Shut down the HVAC plant in a server room
Or interact with the system in some ingenious manner
Perspective is important!
37. 37 File Number
Understanding Basic IP Addressing
Network Address
128.1
An IP address would look something like this
128.1.73.21 and is made up of two distinct parts.
The first part of the address, 128.1 is the Network
Address, this connects us to the correct network (like
the area code).
Host Address
73.21
The second part of the IP address, 73.21 is called the
Host address and this connects us to the correct device
(or Host).
The numbers used to make up an IP address are
normally between 0 and 254 (8 bit Logic).
38. 38 File Number
Understanding Basic IP Addressing - Classes
Many different sizes of network are needed in the IT
world, from small home networks that maybe have 3
or 4 devices sharing an internet connection to huge
multinational companies, with thousands of PCs in
just one building.
To account for varying size of networks, the IP
address can be formatted in a number of different
ways.
In the previous example, we split the IP address in
the middle.
This is referred to as a Class B Network, we can
have 16,384 networks each with 65,534 addresses.
Network Address
128.1
Host Address
73.21
Host Address
73.21
Network Address
128.1
39. 39 File Number
Understanding Basic IP Addressing – Subnet Mask
Wherever there is an IP address, there is something called
a Subnet Mask and it’s this that shows where the IP
address is divided.
The numbers used are normally only 255 or 0.
The subnet mask is compared with the IP address.
A subnet mask may look like this 255.0.0.0
IP Address
126. 168. 73. 21
Subnet mask
255. 0. 0. 0
Where the subnet mask has 255, it indicates the Network
part of the IP address
IP Address
128. 168. 73. 21
Subnet mask
225.255. 0. 0
Host Address
168.73.21
Network Address
126.
41. 41 File Number
ADSL Connectivity and Remote Connectivity
• A typical connectivity solution that uses
mobile communications to make a
connection to a building automation
control network via Ethernet, allowing
building automation software (e.g. HMI
and Programming) to connect.
• A modem is used to provide a secure and
reliable network connection via a Virtual
Private Network (VPN). The connection
uses High-Speed Packet Access (HSPA),
or General Packet Radio Service (GPRS)
connection where 3G connectivity is
unavailable.
• Features
Remote Ethernet connection to
Building Automation Network
Easily installed and commissioned
Secure on-demand network
• Typical Data Transfer Speeds
GPRS Upload: up to 24 Kb/s
Download: up to 48 Kb/s
EDGE Upload: up to 120 Kb/s
Download: up to 236 Kb/s
UMTS (3G) Upload: up to 384 Kb/s
Download: up to 384 Kb/s
HSDPA Upload: up to 384 Kb/s
Download: up to 3.6 Mbit/s
HSUPA Upload: up to 5.2 Mbit/s
Download: up to 7.2 Mbit/s
43. 43 File Number
VPN Agent & VPN Client
VPN Client
• The VPN Client requires Windows 8, Windows 8.1, Windows 2000 Service Pack 3 or
later, Windows XP or Windows 2003 Server (including SBS 2003).
• If the VPN Client is behind a NAT device, the following updates are required:
Windows 2000 requires NAT-T (Nat-Traversal) update (see Microsoft KB 818043).
The NAT-T update for Windows 2000 can be downloaded from Microsoft at
http://v4.windowsupdate.microsoft.com/catalog (Windows Update Catalog). Install
the Update Catalog. Select ‘Find updates for Microsoft Windows operating systems’
and the select the ‘Advanced Search’ option. Enter 818043 as then search term
which will provide a link to the NAT-T update.
Windows XP requires Service Pack 2
No updates are required for Windows 2003 Servers
VPN Agent
The VPN Agent requires Windows 8, Windows 8.1, Windows 2000 Service Pack 3 or
later, Windows XP, Windows 7, Windows Vista, Windows Server 2003, Windows Server
2008 or Windows Small Business Server. Both 32-bit and 64-bit versions are supported.
The VPN Agent runs as a background Windows task and has minimal space and
memory requirements.
47. 47 File Number
Energy Manager
Flexible
Energy Manager Software's can be used for any building
where you wish to show real-time energy performance to
occupants and visitors.
Web-based
Energy Manager Software can be run as a stand-alone
application on a networked computer.
Intuitive
Implement the solution immediately after installation.
Custom Solution
A variety of targets with multiple options for graphic
displays allow your building’s Energy Manager Software to
look completely unique to your building.
Energy Behavior Changes Through User Education
The Energy Manager Software shares energy-saving
measures and performance against set targets with tenants
and visitors, and encourages employee buying and
participation in those efforts.
49. 49 File Number
Cloud based solutions
IT Service Portal
World Wide Access
Internet
Firewall
IT Network
Network Building
Automation
Central setup of the server hardware and
BMS application in the DEOS AG data
center with central server environment,
backup, etc. for IT and BMS applications
Permanent connection to the
central BMS via secured VPN
connections
Mobile secured access to the
BMS for monitoring and alarm
and fault processing, etc.
• Advantages of BMS Cloud Solutions
- Comprehensive – all buildings at a glance
- Cost-effective – cost-intensive IT
infrastructure only centrally installed and
maintained once
- Synergy – combining an in-house IT network
and a building automation network saves
costs
- Security – high IT security standard for
maximum protection
- Core competence – implement IT network
and security with DEOS AG
- Worldwide – monitoring and operating BMS
applications
- Flexible – fast resource booking for this if
necessary
- Distinction – new professional BMS solution
Building automation is the automatic centralized control of a building's heating, ventilation and air conditioning, lighting and other systems through a building management system or building automation system (BAS). The objectives of building automation are improved occupant comfort, efficient operation of building systems, and reduction in energy consumption and operating costs and improve life cycle of utilities
Automation and Control Solutions is made of six business units. Trend is within the Environmental & Combustion Controls (ECC) business unit.
You will notice that each business unit has a peer to peer relationship and reports equally to the overall ACS division.
Since Trend was acquired in 2005 the question has come up from time to time “If Trend is a Honeywell company, then why don’t I just buy from Honeywell?”
If you are interested in purchasing a home security system you likely could be interested in purchasing an ADI security system from the Honeywell ACS Security business unit.
If you run a laboratory and are looking for fume hood controls, you likely would purchase lab controls from Phoenix Controls within the ECC business unit.
Maybe you oversee a county courthouse. You have a limited budget and are in need of major renovations. You may want to work with Honeywell Building Solutions (HBS) on a performance based contract to renovate mechanical systems, provide energy efficient lighting, EMS, and bundle in a new roof.
You may be looking to deploy infrastructure for a local or multi-site national / international energy monitoring and management initiative. Trend within the ECC business unit of ACS would be the right place to go and the next few slides will tell you why.
HMI software is a graphical, real-time, user interface for the building control system.
It enables the user to monitor plant or building services, and make changes to the way the building is controlled from a graphical display. All pages and actions are accessible using a mouse.
The security system ensures that the user is only presented with information and functions that are relevant to their authority or task.
Programming / Configuration tool is graphical method of configuring the controllers and writhing the programs within the controllers. It gives a powerful way of creating the Programs and support documentation.
In some cases the configuration and programming tool may be different.
It may also have a simulation and Live value commissioning features, with the help of which one can reduce the errors easily.
Nowadays, Most Energy Management Software have the capability to record and track the real-time energy usage of a building or floor, and to store that information for later analysis.
Features are explained in Energy Manager Section.
The Network Display would be a touch screen display which provides an interface to the Building Management system or any part of Building Management System. Network Display enables the user to view and adjust operating times, monitor alarms, make adjustments to controller parameters, and display graphs of logged data. Schematic displays provide the ability to view, change and graph data from colour graphics pages. Alarms can be sent directly to the IQView8 where they appear on a special display, an audible, and visual indication of the alarm is given.
The unit is panel or wall mountable with surface and embedded mounting options available enabling the IQView8 to be mounted in a way suitable for its environment and use.
Slide Shows the typical Pages which may be present on the Network Display.
Schematics :- The pages may contain a backdrop, graphic images, animations. multi state graphics (ON, OFF, waiting, error, alarm, overridden ON, and overridden OFF), and static text. The security system enables access to particular pages to be restricted so that users are only presented with the necessary information.
Operating Times :- The interface provides a common view for all types of controllers. An easy to follow wizard guides the user through the process of changing times and configuring exceptions.
Graphs :- Graphs can accessed from the schematic pages, from a list of values on the system (Controls Browser), or from the display and directory navigation (Views Browser). It is possible to zoom in on selected parts of the graph, display spot values, or view the underlying data.
Controls Browser :- The Controls Browser displays a list of sensor, digital input, critical alarm, knob, switch, time zone, driver, and loop modules Once the values are displayed they can be viewed, adjusted, or graphed as appropriate depending on the type of value.
Alarm Handling :- Alarm handling features available in the Alarm Browser notify the user of alarms that have occurred, A flashing alarm icon in the Title Bar indicates that an alarm has been received. Alarms are grouped into categories. The alarm actions for each category can be configured.
What is Cyber Security?
Trainer:
Pose question - Think about the term cyber security and what does it mean to you?
Let them think about the question and then ask for answers around the class.
Reveal the answers and talk through them
Why is Cyber Security Important?
Trainer:
Ask the question – Who uses the internet?
Let them think about the question and then ask for answers around the class.
Reveal the answers and talk through them
Ask the question – What do they do?
Let them think about the question and then ask for answers around the class.
Reveal the answers and talk through them
Ask the question – What do they/you need to do?
Let them think about the question and then ask for answers around the class.
Reveal the answers and talk through them
The web is now one of the main channels that constantly connected consumers use to interact with brands
Customers are making more transactions online and trust in a brand can take a severe hit if sensitive information ends up in the wrong hands
Trainer:
Ask the questions –
What happens if your information ends up in the wrong hands?
Would you shop on-line with them again?
Let them think about the question and then ask for answers around the class.
The challenge for brands is being able to identify the risks facing their brand online and taking action to protect against the threats they are facing
Currently, brand owners only know about approximately 10% of the threats facing their brand online
As a result, it is imperative that organizations adopt a proactive, precautionary attitude and introduce measures to expose the threats targeting their brand. To reduce the risks, brands must implement robust security measures and proactively monitor any online attacks or infringements so that threats can be addressed early, before any significant damage is done.
Trainer:
So what’s the risk?
Systems that are Internet facing and which may be vulnerable to a cyber intrusion which may be a result of weak system configuration, software that has not been updated to the most current version, and/or lack of additional security such as use of a VPN.
What’s the worst that could happen?
Switch the lights off in a supermarket?
Shut down the HVAC plant in a server room?
Or interact with the system in some ingenious manner?
Perspective is important!
Every system has different security considerations and risks
It is even important to remember on some sites it is easier to walk to the plant room and switch the plant off rather than attack the BMS system
As such different options & applications of the products should be considered
Unauthorised access can have financial ramifications.
VPN Agent Solution
This solution allows connection over the internet to the site via a secure VPN.
A PC running HMI Software, Programming Software tool can access the remote site over the VPN. The VPN Agent automatically connects to the remote site every time the PC on which it is installed is switched on. This is useful for remote alarm monitoring using 963.
With this solution, a modem is connected continuously connected to the remote site and all that is
required on the PC is an internet connection and the VPN Agent software. There is only 1 license included in the VPN Agent
software package, however additional licenses can be obtained on request (extra charges apply).
The diagram below illustrates the VPN Agent connected to remote TREND’s IQ4 controllers.
VPN Client Solution
This solution connects to the remote network in the same way as the VPN Agent. The only difference is that the VPN connection
to the remote site is not made automatically when the PC is switched on; the user must connect to the VPN Client manually
if they wish to access the remote site.
With this solution, a modem is connected using a time limited connection to the site and all that is
required on the PC is an internet connection and the VPN Client software.
There is 1 license included for the VPN Client solution with each individually purchased modem, however
additional licenses can be obtained on request (extra charges apply).
The diagram below illustrates the VPN Client connected to a remote TREND’s XTEND.
Field Devices are the foundation of the company’s Smart Structure. They enable efficiency and contribute to the overall value of these Buildings Management System (BMS). If measurement of control at the Field Device Level is not happening, the Buildings Management System is not performing at its most efficient and optimal level.
In HVAC there are lot of Field Devices depending upon the need all are being installed to meet the specific requirement. Slide shows some field devices and yes there are many more addition to this, again depending upon the requirement it is been installed.
Nowadays, Most Energy Management Software have the capability to record and track the real-time energy usage of a building or floor, and to store that information for later analysis. Increasingly though, energy management systems are being used to supplement the energy monitoring and tracking of EMS with functions including weather information, pricing structures, and more sophisticated real-time energy usage data. An Energy Management Software can enable a company to further reduce energy costs by integrating factors such as weather and energy prices into energy management decision making.
Every building owner aims to achieve the cost-effective operation of their building. High synergy effects and vast savings potential frequently go unused. When designing new or modernizing building management systems, cloud solutions and other IT services provided, present a new compelling cost-effective approach.
BMS cloud solutions – the server hardware, BMS application software, data backup, etc. is centralized here and thus efficiently consolidated: secure and central in the cloud.