SlideShare a Scribd company logo
1 of 50
Building
Management
System
An Overview to BMS
2 File Number
What is BMS ?
3 File Number
What is BMS?
- A micro-processor based system which centralizes and simplifies…
 controlling
 monitoring
 operation and…
 management
…of heating, air-conditioning, ventilation & other building services to
achieve…
» safe and comfortable working environment
» energy saving & efficient operation
» at reduced time & cost
4 File Number
BMS provides…
Comfortable & safe environment
for your building
by controlling…..
 Air Handling Units
 Fan Coil Units
 Chillers
 Pumps
 Boilers
 VFD’s
and many more…..
5 File Number
Components of BMS
- Centralized WorkStation Computer
 With powerful user-friendly software.
 Used for everyday building operation.
- Field devices
 Temperature, Humidity, Pressure sensors
 Valves, Actuators
- DDC Controllers
 Micro-processor based
 Fully programmable
 Controls the HVAC equipment of the building
6 File Number
LOG-IN
BMS Features….
• Man / Machine Interface
- Interact with the connected
technical building equipment.
- User friendly for
Operators/Engineers
• User-friendly data presentation
- Co-ordination of the flow of
information through the
system by implementing
customized graphics.
- Floor plans of the building
- Graphical representation of
the equipment.
• System Security
- To prevent unauthorized use
- Password protection
- Operator specific access
- Operator log summary
• Reporting
- present customized subsets of data
- actual or historical state
- export as a word or excel document or..
- to a printer.
• Data Logging
- The automatic gathering and storage of
data from the field equipment for later
analysis and reporting
- Dynamically or historical
- Customized charts and graphs
- Tabular reports
• Remote connectivity
- provide remote access to the system
with full functionality through..
 local area network
 dial-up
 internet via web browser
7 File Number
BMS Features….
• Alarm Management
- the presentation in the sequence of importance and
time of..
 potentially dangerous situations
 process value deviations
- guiding the operator to take appropriate action
through..
 audible and visual indications
 Email, SMS
- alarm summary
 Time, date, priority and description
• Time Scheduling
- time-based start/stop of the equipment
- saves energy cost and efficient operation
- effective for lighting, occupancy control
- can be as daily, weekly, for holidays or
events
• Event recording
- automatic logging of…
 operator activities and commands
 processes related to connected
devices
 workstations and printers.
8 File Number
Why we need this?
9 File Number
Why we need this?
• Improved indoor environment quality
- Comfortable living and working environment
– domestic or commercial
- Better temperature and humidity control
- Good air quality
• Faster response to ..
- occupant needs
- end-user complaints
- trouble conditions
• Maintenance Savings.
- efficient control gives less wear and strain of mechanical
equipment.
- provides longer life
- runtime monitoring alerts timely maintenance of equipment
- avoids expensive failures
• Energy Savings
- eliminates unnecessary system operation.
- accurate energy usage information
- helps you to take steps to reduce energy consumption
like…
 Optimum-Start
 Night-Purging
 Time-Scheduling
10 File Number
Why we need this?
• Reduced operator training
- on-screen instructions
- user-friendly graphic displays
- simpler operation programmed for routine
and repetitive operation
• Consolidater Facility Control…
- One point centralized operation
- Simpler operation
- Reduces time and resources
• Maintenance Savings.
- efficient control gives less wear and strain of mechanical
equipment.
- provides longer life
- runtime monitoring alerts timely maintenance of equipment
- avoids expensive failures
11 File Number
Almost all applications in building automation are based on a
common functionality
I/O functions
(field devices)
Processing
functions
Management
functions
Operator
functions Paging
Help
Operation
Set point range
Calculation
y = f(x)
Closed loop ctrl.
Recording Supervision
Networking
Alarming
Operat.hours
0 0 0 9 7 8 h
Backup power
control
Counting
Characteristics
Measuring
J
Time program
Techn. alarm
Maintenance
Engineering
Interlocks
Peak dem. limit
kWh
s
0 0 2 9 7 3 8
Safety alarm
Data analyses
Man. operation
Positioning
M
Reporting
+ -
Signaling Switching
M
Documentation
12 File Number
Honeywell/Trend Introduction –
Corporate-ACS-E&ES
13 File Number
Honeywell/Trend Introduction – Corporate-ACS-E&ES
14 File Number
HVAC Design Criteria
15 File Number
HVAC Design Criteria
Typical Architecture for HVAC
Disadvantage of Standalone System
1. Centralized Control is not Possible.
2. Alarms cannot be monitored.
3. Optimization of the system is not possible.
4. Cloud based cannot be implement.
5. New Strategies using Energy Management Software's for increasing the building efficiency cannot implement.
HVAC systems can interface
to Building Automation System (BAS) to allow the
building owners to have more control over the
heating or cooling units. The building owner can
monitor the system and respond to alarms
generated by the system from local or remote
locations. The system can be scheduled for
occupancy or the configuration can be changed
from the BAS. Sometimes the BAS is directly
controlling the HVAC components. Depending on
the BAS different interfaces can be used
Today, there are also dedicated
gateways that connect advanced VRV / VRF and
Split HVAC Systems with Home Automation and
BMS (Building Management Systems) controllers
for centralized control and monitoring, obviating
the need to purchase more complex and
expensive HVAC systems. In addition, such
gateway solutions are capable of providing remote
control operation of all HVAC indoor units over the
internet incorporating a simple and friendly user
interface
16 File Number
Smart Building
17 File Number
What is Smart building?
Smart building technologies can improve buildings’ energy efficiency and indoor
environmental quality.
Smart Building:
A building that provides a productive and cost-effective
environment through optimization of its four basic
components - structure, systems, services and
management - and the interrelationships between them."
18 File Number
BMS Software
19 File Number
BMS Software
 Generally BMS Software can be divided into following types –
 Programming / Configuration Tool
 HMI Software for Visualization the Process Parameters
 Energy Management Software
HMI Software
20 File Number
BMS Software
Programming / Configuration Tool
21 File Number
BMS Software
Energy Management Software
22 File Number
Plant Controllers
23 File Number
Plant Controllers
• Plant Controller’s are as below-
Ex. TREND IQ4E Ex. TREND IQ4NC
 Plant Controllers are used to control the HVAC Equipment's like Chillers, Boilers,
Pumps, Complex AHU’s etc..
 Using Plant Controller one can easily control the complex loops of all the HVAC
Equipment's.
 IO Extension is possible in Plant controllers, whatever would be the IO Count of the
HVAC Equipment.
 Easy Integration with the Supervisory Systems
24 File Number
Features of Plant Controllers
 Bacnet over MSTP/IP
 Expandable IO Modules
 Faster Processor
 Faster Webpages
 Ability to process more programs per second
 Touch Screen Displays can be easily
connected
 Real Time Clock
 Sequencing
 Scheduling
25 File Number
Unitary Controllers
- Unitary Controllers are used to control the HVAC Equipment's like Fan Coil Units,
VAV’s, AHU’s etc..
- Unitary Controllers cannot directly be connected to Ethernet TCP/IP Protocol it
communicates to Supervisory system by TREND Integration Controller IQ4NC on
Bacnet Protocol
- All the programs are loaded in the Unitary Controllers of their respected HVAC
Equipment.
• Unitary Controller’s are as below-
Ex. TREND IQ411/422 Ex. TREND IQ ECO
26 File Number
TREND IQ System Architecture
27 File Number
Network Display
28 File Number
Network Display
Features
 Color graphics pages (schematic)
 Viewing of inputs, outputs, directories, alarms, and plots
 Adjustment of knobs, switches, and time zones.
 Graphing of logged data
 Configurable users to ensure system security
 Communicates with all controllers on network (not autodialed networks)
 DHCP enabled
 Ethernet, current loop LAN, or RS232 network connection
 Panel, surface, or embedded mounting
 Color touch screen LCD display
29 File Number
Network Display - Functionality
User Menu Schematics
Graphs Controls Browser Alarm Handling
Operating Times
30 File Number
Cyber Security
31 File Number
What is Cyber Security?
•It is referred as Information Technology Security
•Focusing on protecting:
•Computers
•Networks
•Programs and Data
•From unintended or unauthorized access, change or destruction.
32 File Number
Why is Cyber Security Important?
•Who uses the Internet?
•Big Businesses
•Financial Institutions
•Hospitals
•Governments
•Military
•What do they do and what do they do with the information?
•Collect, process and store confidential information on computers
•Transmit that data across networks to other computers
•What do they/we need to do?
Protect sensitive business and personal information.
33 File Number
How On-line attacks damage consumer trust?
• Customers are making more transactions online and trust in a brand is
paramount
• What happens if your information ends up in the wrong hands?
• Would you shop on-line with them again?
• The challenge is being able to identify the risks and take action
• Currently, brand owners only know about approximately 10% of the threats.
34 File Number
Cyber Attacks
Microsoft has revealed
it had its computer
system hacked
Royal Bank of Scotland has said its websites
fell victim to a cyber attack after customers
were unable to access online banking
NatWest victim of cyber
attack after site crashes
for the second time
UK retailer Lakeland revealed it
was forced the firm to reset all
customer passwords as a
precaution
Adobe Systems Inc said it was the victim of
sophisticated cyber attacks on its networks by
hackers who accessed data belonging to
millions of customers along with the source code
to some of its popular software titles
The data breach of Sony's PlayStation Network resulted from
a "very carefully planned, very professional, highly
sophisticated criminal cyber attack designed to steal personal
and credit card information for illegal purposes”
Facebook and technology giant Apple have also admitted to being hacked.
35 File Number
So what’s the Risk..?
 What’s the worst that could happen?
 Switch the lights off in a supermarket
 Shut down the HVAC plant in a server room
 Or interact with the system in some ingenious manner
 Perspective is important!
36 File Number
IT Networking basic - VLAN
37 File Number
Understanding Basic IP Addressing
Network Address
128.1
An IP address would look something like this
128.1.73.21 and is made up of two distinct parts.
The first part of the address, 128.1 is the Network
Address, this connects us to the correct network (like
the area code).
Host Address
73.21
The second part of the IP address, 73.21 is called the
Host address and this connects us to the correct device
(or Host).
The numbers used to make up an IP address are
normally between 0 and 254 (8 bit Logic).
38 File Number
Understanding Basic IP Addressing - Classes
Many different sizes of network are needed in the IT
world, from small home networks that maybe have 3
or 4 devices sharing an internet connection to huge
multinational companies, with thousands of PCs in
just one building.
To account for varying size of networks, the IP
address can be formatted in a number of different
ways.
In the previous example, we split the IP address in
the middle.
This is referred to as a Class B Network, we can
have 16,384 networks each with 65,534 addresses.
Network Address
128.1
Host Address
73.21
Host Address
73.21
Network Address
128.1
39 File Number
Understanding Basic IP Addressing – Subnet Mask
Wherever there is an IP address, there is something called
a Subnet Mask and it’s this that shows where the IP
address is divided.
The numbers used are normally only 255 or 0.
The subnet mask is compared with the IP address.
A subnet mask may look like this 255.0.0.0
IP Address
126. 168. 73. 21
Subnet mask
255. 0. 0. 0
Where the subnet mask has 255, it indicates the Network
part of the IP address
IP Address
128. 168. 73. 21
Subnet mask
225.255. 0. 0
Host Address
168.73.21
Network Address
126.
40 File Number
ADSL Connectivity and Remote
Connectivity
41 File Number
ADSL Connectivity and Remote Connectivity
• A typical connectivity solution that uses
mobile communications to make a
connection to a building automation
control network via Ethernet, allowing
building automation software (e.g. HMI
and Programming) to connect.
• A modem is used to provide a secure and
reliable network connection via a Virtual
Private Network (VPN). The connection
uses High-Speed Packet Access (HSPA),
or General Packet Radio Service (GPRS)
connection where 3G connectivity is
unavailable.
• Features
Remote Ethernet connection to
Building Automation Network
Easily installed and commissioned
Secure on-demand network
• Typical Data Transfer Speeds
GPRS Upload: up to 24 Kb/s
Download: up to 48 Kb/s
EDGE Upload: up to 120 Kb/s
Download: up to 236 Kb/s
UMTS (3G) Upload: up to 384 Kb/s
Download: up to 384 Kb/s
HSDPA Upload: up to 384 Kb/s
Download: up to 3.6 Mbit/s
HSUPA Upload: up to 5.2 Mbit/s
Download: up to 7.2 Mbit/s
42 File Number
VPN Agent v/s VPN Client Solution
• VPN Agent • VPN Client
43 File Number
VPN Agent & VPN Client
VPN Client
• The VPN Client requires Windows 8, Windows 8.1, Windows 2000 Service Pack 3 or
later, Windows XP or Windows 2003 Server (including SBS 2003).
• If the VPN Client is behind a NAT device, the following updates are required:
Windows 2000 requires NAT-T (Nat-Traversal) update (see Microsoft KB 818043).
The NAT-T update for Windows 2000 can be downloaded from Microsoft at
http://v4.windowsupdate.microsoft.com/catalog (Windows Update Catalog). Install
the Update Catalog. Select ‘Find updates for Microsoft Windows operating systems’
and the select the ‘Advanced Search’ option. Enter 818043 as then search term
which will provide a link to the NAT-T update.
Windows XP requires Service Pack 2
No updates are required for Windows 2003 Servers
VPN Agent
The VPN Agent requires Windows 8, Windows 8.1, Windows 2000 Service Pack 3 or
later, Windows XP, Windows 7, Windows Vista, Windows Server 2003, Windows Server
2008 or Windows Small Business Server. Both 32-bit and 64-bit versions are supported.
The VPN Agent runs as a background Windows task and has minimal space and
memory requirements.
44 File Number
Field Devices
45 File Number
Field Devices
Sensors
Switches
Variable Speed Drives
Pressure Independent Control Valves
Rotary Actuators
Linear Valve Actuators
Rotary Damper Actuators
Rotary Damper
Actuator
Linear Valve
Actuator
Room Sensor
Temperature Sensor
Rotary Actuator
Pressure Switch
Pressure Independent
Control Valves
Variable Speed Drives
46 File Number
Energy Manager
47 File Number
Energy Manager
 Flexible
Energy Manager Software's can be used for any building
where you wish to show real-time energy performance to
occupants and visitors.
 Web-based
Energy Manager Software can be run as a stand-alone
application on a networked computer.
 Intuitive
Implement the solution immediately after installation.
 Custom Solution
A variety of targets with multiple options for graphic
displays allow your building’s Energy Manager Software to
look completely unique to your building.
 Energy Behavior Changes Through User Education
The Energy Manager Software shares energy-saving
measures and performance against set targets with tenants
and visitors, and encourages employee buying and
participation in those efforts.
48 File Number
Cloud Based Solutions
49 File Number
Cloud based solutions
IT Service Portal
World Wide Access
Internet
Firewall
IT Network
Network Building
Automation
Central setup of the server hardware and
BMS application in the DEOS AG data
center with central server environment,
backup, etc. for IT and BMS applications
Permanent connection to the
central BMS via secured VPN
connections
Mobile secured access to the
BMS for monitoring and alarm
and fault processing, etc.
• Advantages of BMS Cloud Solutions
- Comprehensive – all buildings at a glance
- Cost-effective – cost-intensive IT
infrastructure only centrally installed and
maintained once
- Synergy – combining an in-house IT network
and a building automation network saves
costs
- Security – high IT security standard for
maximum protection
- Core competence – implement IT network
and security with DEOS AG
- Worldwide – monitoring and operating BMS
applications
- Flexible – fast resource booking for this if
necessary
- Distinction – new professional BMS solution
50 File Number
Thanks!!

More Related Content

What's hot

Industrial communication
Industrial communicationIndustrial communication
Industrial communicationMahmoud Hussein
 
Characteristics of Embedded Systems
Characteristics of Embedded Systems Characteristics of Embedded Systems
Characteristics of Embedded Systems VijayKumar5738
 
Modbus introduction
Modbus introductionModbus introduction
Modbus introductionPrem Sanil
 
Interrupt latency and its measurements methods
Interrupt latency and its measurements methodsInterrupt latency and its measurements methods
Interrupt latency and its measurements methodss60030
 
Embedded System Practical Workshop using the ARM Processor
Embedded System Practical Workshop using the ARM ProcessorEmbedded System Practical Workshop using the ARM Processor
Embedded System Practical Workshop using the ARM ProcessorMomenMostafa
 
Project report on embedded system using 8051 microcontroller
Project  report on embedded system using 8051 microcontrollerProject  report on embedded system using 8051 microcontroller
Project report on embedded system using 8051 microcontrollerVandna Sambyal
 
Thermal and airflow modeling methodology for Desktop PC
Thermal and airflow modeling methodology for Desktop PCThermal and airflow modeling methodology for Desktop PC
Thermal and airflow modeling methodology for Desktop PCJeehoon Choi
 
Embedded systems - UNIT-1 - Mtech
Embedded systems - UNIT-1 - MtechEmbedded systems - UNIT-1 - Mtech
Embedded systems - UNIT-1 - Mtechsangeetha rakhi
 
training report on embedded system and AVR
training report on embedded system and AVRtraining report on embedded system and AVR
training report on embedded system and AVRUrvashi Khandelwal
 
Fieldbus Tutorial Part 4 - Installation of Fieldbus
Fieldbus Tutorial Part 4 - Installation of FieldbusFieldbus Tutorial Part 4 - Installation of Fieldbus
Fieldbus Tutorial Part 4 - Installation of FieldbusEmerson Exchange
 
Introduction to embedded systems
Introduction to embedded systemsIntroduction to embedded systems
Introduction to embedded systemsDileep Kumar Tiwari
 
Fieldbus Tutorial Part 7 - Fieldbus Communication
Fieldbus Tutorial Part 7 - Fieldbus CommunicationFieldbus Tutorial Part 7 - Fieldbus Communication
Fieldbus Tutorial Part 7 - Fieldbus CommunicationEmerson Exchange
 
Seccion 13340 sistema de control distribuido
Seccion 13340 sistema de control distribuidoSeccion 13340 sistema de control distribuido
Seccion 13340 sistema de control distribuidoMICITT
 

What's hot (20)

Industrial communication
Industrial communicationIndustrial communication
Industrial communication
 
Characteristics of Embedded Systems
Characteristics of Embedded Systems Characteristics of Embedded Systems
Characteristics of Embedded Systems
 
Modbus introduction
Modbus introductionModbus introduction
Modbus introduction
 
Interrupt latency and its measurements methods
Interrupt latency and its measurements methodsInterrupt latency and its measurements methods
Interrupt latency and its measurements methods
 
Embedded System Practical Workshop using the ARM Processor
Embedded System Practical Workshop using the ARM ProcessorEmbedded System Practical Workshop using the ARM Processor
Embedded System Practical Workshop using the ARM Processor
 
Project report on embedded system using 8051 microcontroller
Project  report on embedded system using 8051 microcontrollerProject  report on embedded system using 8051 microcontroller
Project report on embedded system using 8051 microcontroller
 
Unit2 arm
Unit2 armUnit2 arm
Unit2 arm
 
Cfc for s7_e
Cfc for s7_eCfc for s7_e
Cfc for s7_e
 
Thermal and airflow modeling methodology for Desktop PC
Thermal and airflow modeling methodology for Desktop PCThermal and airflow modeling methodology for Desktop PC
Thermal and airflow modeling methodology for Desktop PC
 
Embedded systems - UNIT-1 - Mtech
Embedded systems - UNIT-1 - MtechEmbedded systems - UNIT-1 - Mtech
Embedded systems - UNIT-1 - Mtech
 
scada VS bms
scada VS bmsscada VS bms
scada VS bms
 
training report on embedded system and AVR
training report on embedded system and AVRtraining report on embedded system and AVR
training report on embedded system and AVR
 
Fieldbus Tutorial Part 4 - Installation of Fieldbus
Fieldbus Tutorial Part 4 - Installation of FieldbusFieldbus Tutorial Part 4 - Installation of Fieldbus
Fieldbus Tutorial Part 4 - Installation of Fieldbus
 
Introduction to embedded systems
Introduction to embedded systemsIntroduction to embedded systems
Introduction to embedded systems
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
Micaz and TelosB
Micaz and TelosBMicaz and TelosB
Micaz and TelosB
 
Fieldbus Tutorial Part 7 - Fieldbus Communication
Fieldbus Tutorial Part 7 - Fieldbus CommunicationFieldbus Tutorial Part 7 - Fieldbus Communication
Fieldbus Tutorial Part 7 - Fieldbus Communication
 
Seccion 13340 sistema de control distribuido
Seccion 13340 sistema de control distribuidoSeccion 13340 sistema de control distribuido
Seccion 13340 sistema de control distribuido
 
Asi presentation 08
Asi presentation 08Asi presentation 08
Asi presentation 08
 

Similar to 1.ppt

Building management system from link vue system
Building management system  from link vue systemBuilding management system  from link vue system
Building management system from link vue systemMahesh Chandra Manav
 
Asset Management - what are some of your top priorties?
Asset Management - what are some of your top priorties?Asset Management - what are some of your top priorties?
Asset Management - what are some of your top priorties?Schneider Electric
 
IRJET- Building Management System and its Network Design
IRJET- Building Management System and its Network DesignIRJET- Building Management System and its Network Design
IRJET- Building Management System and its Network DesignIRJET Journal
 
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...IJTET Journal
 
Introduction to Digital Computer Control System
Introduction to Digital Computer Control SystemIntroduction to Digital Computer Control System
Introduction to Digital Computer Control Systemturna67
 
Tutorial 1 Solution IBMS ET1521.pdf
Tutorial  1 Solution IBMS ET1521.pdfTutorial  1 Solution IBMS ET1521.pdf
Tutorial 1 Solution IBMS ET1521.pdfOoiYeongLih1
 
Distributed control system
Distributed control systemDistributed control system
Distributed control systemTilahun Shibru
 
VET4SBO Level 1 module 2 - unit 1 - v0.9 en
VET4SBO Level 1   module 2 - unit 1 - v0.9 enVET4SBO Level 1   module 2 - unit 1 - v0.9 en
VET4SBO Level 1 module 2 - unit 1 - v0.9 enKarel Van Isacker
 
Building intelligence with Smart Building Automation System (SBAS)
Building intelligence with Smart Building Automation System (SBAS)Building intelligence with Smart Building Automation System (SBAS)
Building intelligence with Smart Building Automation System (SBAS)Mistral Solutions
 
Intelligent instrumentation and power plant simulators
Intelligent instrumentation and power plant simulatorsIntelligent instrumentation and power plant simulators
Intelligent instrumentation and power plant simulatorsSelvam Sethurathinam
 
InSource 2017 IIoT Roadshow: Collecting and Moving Data
InSource 2017 IIoT Roadshow: Collecting and Moving DataInSource 2017 IIoT Roadshow: Collecting and Moving Data
InSource 2017 IIoT Roadshow: Collecting and Moving DataInSource Solutions
 
Basics of Automation, PLC and SCADA
Basics of Automation, PLC and SCADABasics of Automation, PLC and SCADA
Basics of Automation, PLC and SCADAIndira Kundu
 
Automation presentation
Automation presentationAutomation presentation
Automation presentationAKANSHA GURELE
 
Automation presentation 141227094725-conversion-gate02
Automation presentation 141227094725-conversion-gate02Automation presentation 141227094725-conversion-gate02
Automation presentation 141227094725-conversion-gate02Sahithya Mahesh
 

Similar to 1.ppt (20)

Bms overview
Bms overviewBms overview
Bms overview
 
Building management system from link vue system
Building management system  from link vue systemBuilding management system  from link vue system
Building management system from link vue system
 
Asset Management - what are some of your top priorties?
Asset Management - what are some of your top priorties?Asset Management - what are some of your top priorties?
Asset Management - what are some of your top priorties?
 
IRJET- Building Management System and its Network Design
IRJET- Building Management System and its Network DesignIRJET- Building Management System and its Network Design
IRJET- Building Management System and its Network Design
 
IO-Summary-for-IBMS-Service.pdf
IO-Summary-for-IBMS-Service.pdfIO-Summary-for-IBMS-Service.pdf
IO-Summary-for-IBMS-Service.pdf
 
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
 
Introduction to Digital Computer Control System
Introduction to Digital Computer Control SystemIntroduction to Digital Computer Control System
Introduction to Digital Computer Control System
 
Tutorial 1 Solution IBMS ET1521.pdf
Tutorial  1 Solution IBMS ET1521.pdfTutorial  1 Solution IBMS ET1521.pdf
Tutorial 1 Solution IBMS ET1521.pdf
 
Distributed control system
Distributed control systemDistributed control system
Distributed control system
 
VET4SBO Level 1 module 2 - unit 1 - v0.9 en
VET4SBO Level 1   module 2 - unit 1 - v0.9 enVET4SBO Level 1   module 2 - unit 1 - v0.9 en
VET4SBO Level 1 module 2 - unit 1 - v0.9 en
 
Building intelligence with Smart Building Automation System (SBAS)
Building intelligence with Smart Building Automation System (SBAS)Building intelligence with Smart Building Automation System (SBAS)
Building intelligence with Smart Building Automation System (SBAS)
 
Intelligent instrumentation and power plant simulators
Intelligent instrumentation and power plant simulatorsIntelligent instrumentation and power plant simulators
Intelligent instrumentation and power plant simulators
 
Automation
AutomationAutomation
Automation
 
Unit 1 - Introduction
Unit 1 - IntroductionUnit 1 - Introduction
Unit 1 - Introduction
 
InSource 2017 IIoT Roadshow: Collecting and Moving Data
InSource 2017 IIoT Roadshow: Collecting and Moving DataInSource 2017 IIoT Roadshow: Collecting and Moving Data
InSource 2017 IIoT Roadshow: Collecting and Moving Data
 
CHILLER PLANT MANAGER
CHILLER PLANT MANAGERCHILLER PLANT MANAGER
CHILLER PLANT MANAGER
 
Advanced facility management
Advanced facility managementAdvanced facility management
Advanced facility management
 
Basics of Automation, PLC and SCADA
Basics of Automation, PLC and SCADABasics of Automation, PLC and SCADA
Basics of Automation, PLC and SCADA
 
Automation presentation
Automation presentationAutomation presentation
Automation presentation
 
Automation presentation 141227094725-conversion-gate02
Automation presentation 141227094725-conversion-gate02Automation presentation 141227094725-conversion-gate02
Automation presentation 141227094725-conversion-gate02
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

1.ppt

  • 3. 3 File Number What is BMS? - A micro-processor based system which centralizes and simplifies…  controlling  monitoring  operation and…  management …of heating, air-conditioning, ventilation & other building services to achieve… » safe and comfortable working environment » energy saving & efficient operation » at reduced time & cost
  • 4. 4 File Number BMS provides… Comfortable & safe environment for your building by controlling…..  Air Handling Units  Fan Coil Units  Chillers  Pumps  Boilers  VFD’s and many more…..
  • 5. 5 File Number Components of BMS - Centralized WorkStation Computer  With powerful user-friendly software.  Used for everyday building operation. - Field devices  Temperature, Humidity, Pressure sensors  Valves, Actuators - DDC Controllers  Micro-processor based  Fully programmable  Controls the HVAC equipment of the building
  • 6. 6 File Number LOG-IN BMS Features…. • Man / Machine Interface - Interact with the connected technical building equipment. - User friendly for Operators/Engineers • User-friendly data presentation - Co-ordination of the flow of information through the system by implementing customized graphics. - Floor plans of the building - Graphical representation of the equipment. • System Security - To prevent unauthorized use - Password protection - Operator specific access - Operator log summary • Reporting - present customized subsets of data - actual or historical state - export as a word or excel document or.. - to a printer. • Data Logging - The automatic gathering and storage of data from the field equipment for later analysis and reporting - Dynamically or historical - Customized charts and graphs - Tabular reports • Remote connectivity - provide remote access to the system with full functionality through..  local area network  dial-up  internet via web browser
  • 7. 7 File Number BMS Features…. • Alarm Management - the presentation in the sequence of importance and time of..  potentially dangerous situations  process value deviations - guiding the operator to take appropriate action through..  audible and visual indications  Email, SMS - alarm summary  Time, date, priority and description • Time Scheduling - time-based start/stop of the equipment - saves energy cost and efficient operation - effective for lighting, occupancy control - can be as daily, weekly, for holidays or events • Event recording - automatic logging of…  operator activities and commands  processes related to connected devices  workstations and printers.
  • 8. 8 File Number Why we need this?
  • 9. 9 File Number Why we need this? • Improved indoor environment quality - Comfortable living and working environment – domestic or commercial - Better temperature and humidity control - Good air quality • Faster response to .. - occupant needs - end-user complaints - trouble conditions • Maintenance Savings. - efficient control gives less wear and strain of mechanical equipment. - provides longer life - runtime monitoring alerts timely maintenance of equipment - avoids expensive failures • Energy Savings - eliminates unnecessary system operation. - accurate energy usage information - helps you to take steps to reduce energy consumption like…  Optimum-Start  Night-Purging  Time-Scheduling
  • 10. 10 File Number Why we need this? • Reduced operator training - on-screen instructions - user-friendly graphic displays - simpler operation programmed for routine and repetitive operation • Consolidater Facility Control… - One point centralized operation - Simpler operation - Reduces time and resources • Maintenance Savings. - efficient control gives less wear and strain of mechanical equipment. - provides longer life - runtime monitoring alerts timely maintenance of equipment - avoids expensive failures
  • 11. 11 File Number Almost all applications in building automation are based on a common functionality I/O functions (field devices) Processing functions Management functions Operator functions Paging Help Operation Set point range Calculation y = f(x) Closed loop ctrl. Recording Supervision Networking Alarming Operat.hours 0 0 0 9 7 8 h Backup power control Counting Characteristics Measuring J Time program Techn. alarm Maintenance Engineering Interlocks Peak dem. limit kWh s 0 0 2 9 7 3 8 Safety alarm Data analyses Man. operation Positioning M Reporting + - Signaling Switching M Documentation
  • 12. 12 File Number Honeywell/Trend Introduction – Corporate-ACS-E&ES
  • 13. 13 File Number Honeywell/Trend Introduction – Corporate-ACS-E&ES
  • 14. 14 File Number HVAC Design Criteria
  • 15. 15 File Number HVAC Design Criteria Typical Architecture for HVAC Disadvantage of Standalone System 1. Centralized Control is not Possible. 2. Alarms cannot be monitored. 3. Optimization of the system is not possible. 4. Cloud based cannot be implement. 5. New Strategies using Energy Management Software's for increasing the building efficiency cannot implement. HVAC systems can interface to Building Automation System (BAS) to allow the building owners to have more control over the heating or cooling units. The building owner can monitor the system and respond to alarms generated by the system from local or remote locations. The system can be scheduled for occupancy or the configuration can be changed from the BAS. Sometimes the BAS is directly controlling the HVAC components. Depending on the BAS different interfaces can be used Today, there are also dedicated gateways that connect advanced VRV / VRF and Split HVAC Systems with Home Automation and BMS (Building Management Systems) controllers for centralized control and monitoring, obviating the need to purchase more complex and expensive HVAC systems. In addition, such gateway solutions are capable of providing remote control operation of all HVAC indoor units over the internet incorporating a simple and friendly user interface
  • 17. 17 File Number What is Smart building? Smart building technologies can improve buildings’ energy efficiency and indoor environmental quality. Smart Building: A building that provides a productive and cost-effective environment through optimization of its four basic components - structure, systems, services and management - and the interrelationships between them."
  • 18. 18 File Number BMS Software
  • 19. 19 File Number BMS Software  Generally BMS Software can be divided into following types –  Programming / Configuration Tool  HMI Software for Visualization the Process Parameters  Energy Management Software HMI Software
  • 20. 20 File Number BMS Software Programming / Configuration Tool
  • 21. 21 File Number BMS Software Energy Management Software
  • 22. 22 File Number Plant Controllers
  • 23. 23 File Number Plant Controllers • Plant Controller’s are as below- Ex. TREND IQ4E Ex. TREND IQ4NC  Plant Controllers are used to control the HVAC Equipment's like Chillers, Boilers, Pumps, Complex AHU’s etc..  Using Plant Controller one can easily control the complex loops of all the HVAC Equipment's.  IO Extension is possible in Plant controllers, whatever would be the IO Count of the HVAC Equipment.  Easy Integration with the Supervisory Systems
  • 24. 24 File Number Features of Plant Controllers  Bacnet over MSTP/IP  Expandable IO Modules  Faster Processor  Faster Webpages  Ability to process more programs per second  Touch Screen Displays can be easily connected  Real Time Clock  Sequencing  Scheduling
  • 25. 25 File Number Unitary Controllers - Unitary Controllers are used to control the HVAC Equipment's like Fan Coil Units, VAV’s, AHU’s etc.. - Unitary Controllers cannot directly be connected to Ethernet TCP/IP Protocol it communicates to Supervisory system by TREND Integration Controller IQ4NC on Bacnet Protocol - All the programs are loaded in the Unitary Controllers of their respected HVAC Equipment. • Unitary Controller’s are as below- Ex. TREND IQ411/422 Ex. TREND IQ ECO
  • 26. 26 File Number TREND IQ System Architecture
  • 28. 28 File Number Network Display Features  Color graphics pages (schematic)  Viewing of inputs, outputs, directories, alarms, and plots  Adjustment of knobs, switches, and time zones.  Graphing of logged data  Configurable users to ensure system security  Communicates with all controllers on network (not autodialed networks)  DHCP enabled  Ethernet, current loop LAN, or RS232 network connection  Panel, surface, or embedded mounting  Color touch screen LCD display
  • 29. 29 File Number Network Display - Functionality User Menu Schematics Graphs Controls Browser Alarm Handling Operating Times
  • 31. 31 File Number What is Cyber Security? •It is referred as Information Technology Security •Focusing on protecting: •Computers •Networks •Programs and Data •From unintended or unauthorized access, change or destruction.
  • 32. 32 File Number Why is Cyber Security Important? •Who uses the Internet? •Big Businesses •Financial Institutions •Hospitals •Governments •Military •What do they do and what do they do with the information? •Collect, process and store confidential information on computers •Transmit that data across networks to other computers •What do they/we need to do? Protect sensitive business and personal information.
  • 33. 33 File Number How On-line attacks damage consumer trust? • Customers are making more transactions online and trust in a brand is paramount • What happens if your information ends up in the wrong hands? • Would you shop on-line with them again? • The challenge is being able to identify the risks and take action • Currently, brand owners only know about approximately 10% of the threats.
  • 34. 34 File Number Cyber Attacks Microsoft has revealed it had its computer system hacked Royal Bank of Scotland has said its websites fell victim to a cyber attack after customers were unable to access online banking NatWest victim of cyber attack after site crashes for the second time UK retailer Lakeland revealed it was forced the firm to reset all customer passwords as a precaution Adobe Systems Inc said it was the victim of sophisticated cyber attacks on its networks by hackers who accessed data belonging to millions of customers along with the source code to some of its popular software titles The data breach of Sony's PlayStation Network resulted from a "very carefully planned, very professional, highly sophisticated criminal cyber attack designed to steal personal and credit card information for illegal purposes” Facebook and technology giant Apple have also admitted to being hacked.
  • 35. 35 File Number So what’s the Risk..?  What’s the worst that could happen?  Switch the lights off in a supermarket  Shut down the HVAC plant in a server room  Or interact with the system in some ingenious manner  Perspective is important!
  • 36. 36 File Number IT Networking basic - VLAN
  • 37. 37 File Number Understanding Basic IP Addressing Network Address 128.1 An IP address would look something like this 128.1.73.21 and is made up of two distinct parts. The first part of the address, 128.1 is the Network Address, this connects us to the correct network (like the area code). Host Address 73.21 The second part of the IP address, 73.21 is called the Host address and this connects us to the correct device (or Host). The numbers used to make up an IP address are normally between 0 and 254 (8 bit Logic).
  • 38. 38 File Number Understanding Basic IP Addressing - Classes Many different sizes of network are needed in the IT world, from small home networks that maybe have 3 or 4 devices sharing an internet connection to huge multinational companies, with thousands of PCs in just one building. To account for varying size of networks, the IP address can be formatted in a number of different ways. In the previous example, we split the IP address in the middle. This is referred to as a Class B Network, we can have 16,384 networks each with 65,534 addresses. Network Address 128.1 Host Address 73.21 Host Address 73.21 Network Address 128.1
  • 39. 39 File Number Understanding Basic IP Addressing – Subnet Mask Wherever there is an IP address, there is something called a Subnet Mask and it’s this that shows where the IP address is divided. The numbers used are normally only 255 or 0. The subnet mask is compared with the IP address. A subnet mask may look like this 255.0.0.0 IP Address 126. 168. 73. 21 Subnet mask 255. 0. 0. 0 Where the subnet mask has 255, it indicates the Network part of the IP address IP Address 128. 168. 73. 21 Subnet mask 225.255. 0. 0 Host Address 168.73.21 Network Address 126.
  • 40. 40 File Number ADSL Connectivity and Remote Connectivity
  • 41. 41 File Number ADSL Connectivity and Remote Connectivity • A typical connectivity solution that uses mobile communications to make a connection to a building automation control network via Ethernet, allowing building automation software (e.g. HMI and Programming) to connect. • A modem is used to provide a secure and reliable network connection via a Virtual Private Network (VPN). The connection uses High-Speed Packet Access (HSPA), or General Packet Radio Service (GPRS) connection where 3G connectivity is unavailable. • Features Remote Ethernet connection to Building Automation Network Easily installed and commissioned Secure on-demand network • Typical Data Transfer Speeds GPRS Upload: up to 24 Kb/s Download: up to 48 Kb/s EDGE Upload: up to 120 Kb/s Download: up to 236 Kb/s UMTS (3G) Upload: up to 384 Kb/s Download: up to 384 Kb/s HSDPA Upload: up to 384 Kb/s Download: up to 3.6 Mbit/s HSUPA Upload: up to 5.2 Mbit/s Download: up to 7.2 Mbit/s
  • 42. 42 File Number VPN Agent v/s VPN Client Solution • VPN Agent • VPN Client
  • 43. 43 File Number VPN Agent & VPN Client VPN Client • The VPN Client requires Windows 8, Windows 8.1, Windows 2000 Service Pack 3 or later, Windows XP or Windows 2003 Server (including SBS 2003). • If the VPN Client is behind a NAT device, the following updates are required: Windows 2000 requires NAT-T (Nat-Traversal) update (see Microsoft KB 818043). The NAT-T update for Windows 2000 can be downloaded from Microsoft at http://v4.windowsupdate.microsoft.com/catalog (Windows Update Catalog). Install the Update Catalog. Select ‘Find updates for Microsoft Windows operating systems’ and the select the ‘Advanced Search’ option. Enter 818043 as then search term which will provide a link to the NAT-T update. Windows XP requires Service Pack 2 No updates are required for Windows 2003 Servers VPN Agent The VPN Agent requires Windows 8, Windows 8.1, Windows 2000 Service Pack 3 or later, Windows XP, Windows 7, Windows Vista, Windows Server 2003, Windows Server 2008 or Windows Small Business Server. Both 32-bit and 64-bit versions are supported. The VPN Agent runs as a background Windows task and has minimal space and memory requirements.
  • 45. 45 File Number Field Devices Sensors Switches Variable Speed Drives Pressure Independent Control Valves Rotary Actuators Linear Valve Actuators Rotary Damper Actuators Rotary Damper Actuator Linear Valve Actuator Room Sensor Temperature Sensor Rotary Actuator Pressure Switch Pressure Independent Control Valves Variable Speed Drives
  • 47. 47 File Number Energy Manager  Flexible Energy Manager Software's can be used for any building where you wish to show real-time energy performance to occupants and visitors.  Web-based Energy Manager Software can be run as a stand-alone application on a networked computer.  Intuitive Implement the solution immediately after installation.  Custom Solution A variety of targets with multiple options for graphic displays allow your building’s Energy Manager Software to look completely unique to your building.  Energy Behavior Changes Through User Education The Energy Manager Software shares energy-saving measures and performance against set targets with tenants and visitors, and encourages employee buying and participation in those efforts.
  • 48. 48 File Number Cloud Based Solutions
  • 49. 49 File Number Cloud based solutions IT Service Portal World Wide Access Internet Firewall IT Network Network Building Automation Central setup of the server hardware and BMS application in the DEOS AG data center with central server environment, backup, etc. for IT and BMS applications Permanent connection to the central BMS via secured VPN connections Mobile secured access to the BMS for monitoring and alarm and fault processing, etc. • Advantages of BMS Cloud Solutions - Comprehensive – all buildings at a glance - Cost-effective – cost-intensive IT infrastructure only centrally installed and maintained once - Synergy – combining an in-house IT network and a building automation network saves costs - Security – high IT security standard for maximum protection - Core competence – implement IT network and security with DEOS AG - Worldwide – monitoring and operating BMS applications - Flexible – fast resource booking for this if necessary - Distinction – new professional BMS solution

Editor's Notes

  1. Building automation is the automatic centralized control of a building's heating, ventilation and air conditioning, lighting and other systems through a building management system or building automation system (BAS). The objectives of building automation are improved occupant comfort, efficient operation of building systems, and reduction in energy consumption and operating costs and improve life cycle of utilities
  2. Automation and Control Solutions is made of six business units. Trend is within the Environmental & Combustion Controls (ECC) business unit. You will notice that each business unit has a peer to peer relationship and reports equally to the overall ACS division. Since Trend was acquired in 2005 the question has come up from time to time “If Trend is a Honeywell company, then why don’t I just buy from Honeywell?” If you are interested in purchasing a home security system you likely could be interested in purchasing an ADI security system from the Honeywell ACS Security business unit. If you run a laboratory and are looking for fume hood controls, you likely would purchase lab controls from Phoenix Controls within the ECC business unit. Maybe you oversee a county courthouse. You have a limited budget and are in need of major renovations. You may want to work with Honeywell Building Solutions (HBS) on a performance based contract to renovate mechanical systems, provide energy efficient lighting, EMS, and bundle in a new roof. You may be looking to deploy infrastructure for a local or multi-site national / international energy monitoring and management initiative. Trend within the ECC business unit of ACS would be the right place to go and the next few slides will tell you why.
  3. HMI software is a graphical, real-time, user interface for the building control system. It enables the user to monitor plant or building services, and make changes to the way the building is controlled from a graphical display. All pages and actions are accessible using a mouse. The security system ensures that the user is only presented with information and functions that are relevant to their authority or task.
  4. Programming / Configuration tool is graphical method of configuring the controllers and writhing the programs within the controllers. It gives a powerful way of creating the Programs and support documentation. In some cases the configuration and programming tool may be different. It may also have a simulation and Live value commissioning features, with the help of which one can reduce the errors easily.
  5. Nowadays, Most Energy Management Software have the capability to record and track the real-time energy usage of a building or floor, and to store that information for later analysis. Features are explained in Energy Manager Section.
  6. The Network Display would be a touch screen display which provides an interface to the Building Management system or any part of Building Management System. Network Display enables the user to view and adjust operating times, monitor alarms, make adjustments to controller parameters, and display graphs of logged data. Schematic displays provide the ability to view, change and graph data from colour graphics pages. Alarms can be sent directly to the IQView8 where they appear on a special display, an audible, and visual indication of the alarm is given. The unit is panel or wall mountable with surface and embedded mounting options available enabling the IQView8 to be mounted in a way suitable for its environment and use.
  7. Slide Shows the typical Pages which may be present on the Network Display. Schematics :- The pages may contain a backdrop, graphic images, animations. multi state graphics (ON, OFF, waiting, error, alarm, overridden ON, and overridden OFF), and static text. The security system enables access to particular pages to be restricted so that users are only presented with the necessary information. Operating Times :- The interface provides a common view for all types of controllers. An easy to follow wizard guides the user through the process of changing times and configuring exceptions. Graphs :- Graphs can accessed from the schematic pages, from a list of values on the system (Controls Browser), or from the display and directory navigation (Views Browser). It is possible to zoom in on selected parts of the graph, display spot values, or view the underlying data. Controls Browser :- The Controls Browser displays a list of sensor, digital input, critical alarm, knob, switch, time zone, driver, and loop modules Once the values are displayed they can be viewed, adjusted, or graphed as appropriate depending on the type of value. Alarm Handling :- Alarm handling features available in the Alarm Browser notify the user of alarms that have occurred, A flashing alarm icon in the Title Bar indicates that an alarm has been received. Alarms are grouped into categories. The alarm actions for each category can be configured.
  8. What is Cyber Security? Trainer: Pose question - Think about the term cyber security and what does it mean to you? Let them think about the question and then ask for answers around the class. Reveal the answers and talk through them
  9. Why is Cyber Security Important? Trainer: Ask the question – Who uses the internet? Let them think about the question and then ask for answers around the class. Reveal the answers and talk through them   Ask the question – What do they do? Let them think about the question and then ask for answers around the class. Reveal the answers and talk through them   Ask the question – What do they/you need to do? Let them think about the question and then ask for answers around the class. Reveal the answers and talk through them
  10. The web is now one of the main channels that constantly connected consumers use to interact with brands   Customers are making more transactions online and trust in a brand can take a severe hit if sensitive information ends up in the wrong hands   Trainer: Ask the questions – What happens if your information ends up in the wrong hands? Would you shop on-line with them again?   Let them think about the question and then ask for answers around the class.   The challenge for brands is being able to identify the risks facing their brand online and taking action to protect against the threats they are facing   Currently, brand owners only know about approximately 10% of the threats facing their brand online   As a result, it is imperative that organizations adopt a proactive, precautionary attitude and introduce measures to expose the threats targeting their brand. To reduce the risks, brands must implement robust security measures and proactively monitor any online attacks or infringements so that threats can be addressed early, before any significant damage is done.
  11. Trainer: So what’s the risk? Systems that are Internet facing and which may be vulnerable to a cyber intrusion which may be a result of weak system configuration, software that has not been updated to the most current version, and/or lack of additional security such as use of a VPN.   What’s the worst that could happen? Switch the lights off in a supermarket? Shut down the HVAC plant in a server room? Or interact with the system in some ingenious manner?   Perspective is important! Every system has different security considerations and risks It is even important to remember on some sites it is easier to walk to the plant room and switch the plant off rather than attack the BMS system As such different options & applications of the products should be considered Unauthorised access can have financial ramifications.
  12. VPN Agent Solution This solution allows connection over the internet to the site via a secure VPN. A PC running HMI Software, Programming Software tool can access the remote site over the VPN. The VPN Agent automatically connects to the remote site every time the PC on which it is installed is switched on. This is useful for remote alarm monitoring using 963. With this solution, a modem is connected continuously connected to the remote site and all that is required on the PC is an internet connection and the VPN Agent software. There is only 1 license included in the VPN Agent software package, however additional licenses can be obtained on request (extra charges apply). The diagram below illustrates the VPN Agent connected to remote TREND’s IQ4 controllers. VPN Client Solution This solution connects to the remote network in the same way as the VPN Agent. The only difference is that the VPN connection to the remote site is not made automatically when the PC is switched on; the user must connect to the VPN Client manually if they wish to access the remote site. With this solution, a modem is connected using a time limited connection to the site and all that is required on the PC is an internet connection and the VPN Client software. There is 1 license included for the VPN Client solution with each individually purchased modem, however additional licenses can be obtained on request (extra charges apply). The diagram below illustrates the VPN Client connected to a remote TREND’s XTEND.
  13. Field Devices are the foundation of the company’s Smart Structure. They enable efficiency and contribute to the overall value of these Buildings Management System (BMS). If measurement of control at the Field Device Level is not happening, the Buildings Management System is not performing at its most efficient and optimal level. In HVAC there are lot of Field Devices depending upon the need all are being installed to meet the specific requirement. Slide shows some field devices and yes there are many more addition to this, again depending upon the requirement it is been installed.
  14. Nowadays, Most Energy Management Software have the capability to record and track the real-time energy usage of a building or floor, and to store that information for later analysis. Increasingly though, energy management systems are being used to supplement the energy monitoring and tracking of EMS with functions including weather information, pricing structures, and more sophisticated real-time energy usage data. An Energy Management Software can enable a company to further reduce energy costs by integrating factors such as weather and energy prices into energy management decision making.
  15. Every building owner aims to achieve the cost-effective operation of their building. High synergy effects and vast savings potential frequently go unused. When designing new or modernizing building management systems, cloud solutions and other IT services provided, present a new compelling cost-effective approach. BMS cloud solutions – the server hardware, BMS application software, data backup, etc. is centralized here and thus efficiently consolidated: secure and central in the cloud.