Saturday, March 30, 2019
Building Management System to Save Energy
Building Management transcription to Save button1. Introduction of BMSBuilding Management goernance (BMS) is to lead and reminder mental synthesis processs corpses in an efficient way by aboriginalizing the master of individual frames ( 1.1). The systems include HVAC, Fire Services Lift, Escalator, Lighting, Electrical Distribution, Steam sizzling Water, and Plumbing Drainage.The main function of BMS is centralized underwrite monitoring and gap management. So it has anformer(a) name call Central Control and monitor System (CCMS). The other functions ar enhance interface connectivity between systems, service solution to customer, operator maneuver of systems and graphical display to make the correspond of system to a bang-uper extent enforcers friendly. Improve strength efficiency and operational efficiency. suspend capacity for future upgrades expansions and automation. And related system Building automation System (BAS) exit be do on BMS.2. Basic BMS Design3- trains BMS architecture ( 2.1)l Management aim User after part configure and monitor plant performance. Anticipate future trends, improve efficiency, and analyze management re manner.l Automation / Controller Level The location with greatest technical control requirement, and several(predicate)iate maven from others. Controllers automatically perform their tasks from I/P and to O/P. Controllers go off take place with apiece other (Peer-to-Peer). Event found operation. The devices rouse function at the highest efficiency and no repetitive entropy is beamted. Controllers save react with the Management Level when plant goes come in of limits, and adjustments ar make by a user interface.l Field / Floor Level Information is gathered through sensors and other intelligent devices. The information entrust be sent back to the controllers.Third fellowship equipment is integ judged into the Automation and Field levels with control at the Management level.Central ized Architecturecentrally controlled system ( 2.5) A control system in which transmission is to a central computer and the reliance of all controls on a central computer.Distributed ArchitectureDistributed control ( 2.6) A control system in which control computations and intelligence are do at divers(prenominal) locations and the result coordinated.System ArchitectureThe constraints of BMS are ne twainrk expansion, the expressage variety of topologies and transmission media. The solutions are mixing of communication media ( squirm tally, power line, radio, infra-red, fibre optics, coaxial). Complete implementation of OSI model. victimisation free analysis situs, user-friendly software and development cost.System topology analysis situs affects system redundancy, communication protocol and system response time. The common system topologies such as Bus, Star, Tree, Ring and battle.Bus analysis situs ( 2.7) whole devices are connected to a central business line, call the bus or backbone. The improvement is frequently little cabling requirements. The brands victimization include Ethernet, Profitbus, ControlNet, LonWorks.Star Topology ( 2.8) in all devices are conned to a central hub. Star electronic ne both(prenominal)rks are relatively mild to install and manage, but bottlenecks screwing occur because all entropy essential pass through the hub. Cable pause affects one device lonesome(prenominal). scarce communication hub fault affects all devices. The brands victimization include Ethernet, Profitbus, ControlNet, LonWorks.Tree Topology ( 2.9) The topology combines attributes of analogue bus and star topologies. It consists of groups of star-configure work move connected to a linear bus backbone cable. Tree topologies allow for the expansion of an existing interlocking, and modify schools to configure a network to meet their needs. Device at the highest forefront in the hierarchy controls the network. The brands utilise include E thernet, Profitbus, ControlNet, LonWorks.Ring Topology ( 2.10) every(prenominal) devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Same as bus network with both edges connect. The brands use include Token Ring, FDDI, Profitbus.Mesh Topology (Fig 2.11) entanglement topology which combines more than one basic topology such as bus, ring, or star. Good for redundancy. It will use scores of cable to connect every device with every device.Considerations in Topology Layout for automating build with vast amount of points require well-designed network componentation, in commit to achieve a good performance infrastructure. Well designed unified network by using repeaters, bridges or even soften using r outs to improve network reliability and simplify network troubleshooting. rough reasons why segmenting a network is im fashionant Isolation of individual network segments in order to limit the propagation of a single fault to one segment and prevent this single fault from spreading out everywhere the entire network. Different nodes demand different communication media and different network speeds but they all need to turn over with each other, which requires and interconnectedness between the different networking media. Increase the number of possible nodes in a single network and increase the number of possible nodes in a single network. Keep local traffic deep down one segment in order to avoid network traffic overload conditions which will make service alike HVAC, sluttishing malfunction.BMS conformationsThere are tether pillowcases configurations using in BMS1. Conventional configuration innkeeper workstations daisy chained with DDCs (usually using RS-485). emblematic RS-485 Controller Level network ( 2.14) relatively low bandwidth ( virtually 9600 bps). The limited nodes around 100, and the distance is lower than 1200m. Only for inform ation transmission.Controller Level Network2. Ethernet-Based configuration Use Ethernet as transmission media. Servers, Workstations and DDCs on the resembling Ethernet platform. Typical Ethernet-Based Network ( 2.15) with high bandwidth (typical 1Gbps backbone). Use IP Technology direction unsolved platform for various applications. Virtually no distance limitation. forever use for entropy, voice video systems.Ethernet-Based Network3. Hybrid configuration ( 2.16) Non-hierarchy architecture with combination of different independent networks and interfaces. Various network topologies.Hybrid ConfigurationNetworking communications protocolcommunications protocol ( 2.17) is a set of rules, which allows computer/controllers/devices to communicate from one to another. Proprietary Protocols developed by systems or computer manufacture to communicate to their OWN ironware and software over a recommended network. move over Protocols spread up protocols means disclosing procedures, structures, and codes and allowing other system developers to write interfaces and share entropy on their network. Acceptance of an open protocol depends on its quality, features, and run returnd.2.17 ProtocolThe OSI Seven stage Model ( 2.18)each grade has a define set of functions. The model provides a useful common reference to communicate protocol. Most communication protocols including those employ in our field today use either all or some of the seven storeys of the OSI model.1. Network-capable Applications produce DATA.2. Each protocol grade extends a header to the data it receives from the form higher up it. This is called encapsulation. Encapsulated data is transmitted in Protocol data Units (PDUs). There are display PDUs, Session PDUs, catch PDUs etcetera3. PDUs are passed down through the stack of layers (called the stack for pathetic) until they finish be transmitted over the fleshly layer.4. Any layer on one machine speaks the same row as the same la yer on any other machine, and because dissolve communicate via the physiologic layer.5. Data passed upwards is unencapsulated before cosmos passed farther up.6. All information is passed down through all layers until it reaches the Physical layer.7. The Physical layer chops up the PDUs and transmits the PDUs over the equip. The Physical layer provides the current physiological connectivity between machines over which all communication occurs.2.18 OSI Seven point ModelThe Physical layer provides for corporeal connectivity between networked devices. transmittance and response of data from the physical medium is managed at this layer. The Physical layer receives data from the Data Link Layer, and transmits it to the wire. The Physical layer controls frequency, amplitude, phase and modulation of the charge used for transmitting data, and performs demodulation and decoding upon receipt. Note that for two devices to communicate, they must be connected to the same type of phys ical medium (wiring). Ether to Ether, FDDI to FDDI etc. Two end stations using different protocols can only communicate through a multi-protocol bridge or a r out. The physical layer is responsible for two jobs1. talk with the Data link layer.2. Transmission and receipt of data.The Datalink Layer is the second layer of the OSI model. The datalink layer performs various functions depending upon the hardware protocol used, but has four primary functions1. talk with the Network layer above.2. SEGMENTATION of upper layer datagrams ( in addition called megabuckss) into frames in sizes that can be administerd by the communications hardware.3. BIT ORDERING. Organizing the pattern of data collations before transmission (packet formatting)4. COMMUNICATION with the Physical layer below.This layer provides reliable transit of data crossways a physical link. The datalink layer is concerned with physical addressing, network topology, physical link management, error notification, ordered de livery of frames, and flow control.Network Layer establishes and terminates continuatives between the originator and recipient of information over the network. Assign remarkable addresses to each node on the network. The addresses identify the beginning and end of the data transmission packets. Outbound data is passed down from the transport layer, is encapsulated in the Network layers protocol and then sent to the Datalink layer for segmentation and transmission. Inbound data is de-fragmented in the correct order, the IP headers are removed and then the assembled datagram is passed to the ictus layer. The Network layer is concerned with the following primary functions1. Communication with the Transport layer above.2. Management of connectivity and routing between hosts or networks.3. Communication with the Datalink layer below.Transport Layer maintain reliability on the network and enhances data truth by delivering error-free data in the proper sequence. It whitethorn use a v ariety of techniques such as a Cyclic Redundancy Check, windowing and acknowledgements. If data is lost or damaged it is the Transport layers responsibility to recover from that error. Functions1. pop off with the Session layer above.2. Detect errors and lost data, retransmit data, reassemble datagrams into datastreams3. distribute with the Network layer below.The session layer tracks connections, also called sessions. For pillow vitrine bound track of sevenfold file downloads requested by a peculiar(a) FTP application, or multiple telnet connections from a single terminal client, or web page retrievals from a Web server. In the World of transmission control protocol/IP this is handled by application software addressing a connection to a remote machine and using a different local port number for each connection. The session performs the following functions1. Communication with the Presentation layer above.2. Organize and manage one or more connections per application, between hosts.3. Communication with the Transport layer below.The Presentation layer handles the conversion of data formats so that machines can presentdata created on other systems. For example handle the conversion of data in JPG/JPEG format to Sun Raster format so that a Sun machine can display a JPG/JPEG image. The Presentation layer performs the following functions1. Communication with the Application layer above.2. Translation of normal data formats to formats understood by the local machine.3. Communication with the Session layer below.The application layer is the application in use by the user. For example a web browser, an FTP, IRC, Telnet client other TCP/IP based application like the network version of Doom, Quake, or Unreal. The Application layer provides the user interface, and is responsible for displaying data and images to the user in a perceptible format. The application layers job is to organize and display data in a human compatible format, and to interface with the Pre sentation layer.Message Frame dressFig 2.19 Message Frame FormatMaster-Slave Protocol (2.20) The control station is called master device. Only master device can control the communication. It may transmit messages without a remote request. No slave device can communicate directly with another slave device.2.20 Master-Slave ProtocolPeer-to-Peer Protocol (2.21) All workstations are loaded with the same peer-to-peer network operating system. Each workstation configured as service requester (client), service provide (server), or even BOTH.2.21 Peer-to-Peer ProtocolClient-Server Protocol (2.22) Client workstation are loaded with specialized client software. Server computers are loaded with specialized server software designed to be compatible with client software.2.22 Client-Server ProtocolThe CSMA/CE Protocol is designed to provide fair access to the shared channel so that all stations get a chance to use the network. After every packet transmission all stations use the CSMA/CD pro tocol to shape which station gets to use the Ethernet channel close. CSMA/CD likes a dinner party in a dark room Everyone around the table must listen for a period of quiet before speaking (Carrier Sense). at once a space occurs everyone has an equal chance to say something ( manifold Access). If two peck start talking at the same instant they detect that fact, and allow speaking (Collision Detection). IEEE 802.3 standard covers CSMA/CD.Switched Ethernet nodes are connected to a switch using point-to-point connections, When a frame arrives at the switch, the control logic determines the transmit port. If the transmit port is busy, the received frame is stored in the queue which is a First-in First-out (FIFO) queue. The computer memory to store pending frames is obtained from a shared memory pool. In case the memory is full, the received frame is dropped.Networking CablesCopper wire checkmates are the more or less basic of the data media. Two wire un malformed pairThe insula ted wire conductors run in parallel, often in a moulded, flat cable. unremarkably used over short distances or at low subroutine rates, due to problems with crosstalk and spurious noise plectrumup. Performance in multiple conductor cables is enhanced by dedicating every second cable as a ground (zero volt reference), and by the use of electriclybanetworkced signals.1. A single wire is used for the signal transmission/reception2. A common reference level/point is existed between the transmitter and receiver3. It is the simplest connection technique but it is sensitive to noise, tour, loss, and signal reflection4. It is desirable for short distance and low data rate application (Normally less than 200Kb-meter/s) squirm PairThe insulated conductors are twisted together, leading to better electrical performance and significantly higher bit rates than untwisted pairs. UTP is unshielded, like telephone cable, whilst STP is shielded and capable of higher bit rates. Systems using ban etworkced signals obtain the highest bit rates.1. Twisting or wrapping the two wires around each other subverts induction of outside interference2. 1 to 5 twists per inch is quite typical Cheap and moderate bit rate applications3. For a few km distance the bit rate can be up to 10Mb/s, and 100Mb/s can be achievable for short distance applications like 100m2.23 Two wire untwisted pair and perverse PairUnshielded Twisted Pair (UTP)Composed of two of more pairs of wires twisted togetherNot shieldedSignal protected by twisting of wiresImpedance of 100WRecommended conductor size of 24 AWG2.24 Unshielded Twisted PairCat5e 100MHz ANSI/TIA/EIA-568-B.1Cat6 250MHzCat7 600MHzUndercarpetSusceptibility to damageLimited flexibility for MACs (move, add and change)Distance limit of 10mAvoid in high traffic areas, legal furniture locations, cross undercarpet power on top at 90 compass points2.25 Cat3, Cat5e and Cat6 CableScreened Twisted-Pair (ScTP)Characteristic electrical resistance of 100 WF our pair 22-24 AWG solid conductorsMylar/aluminum sheath around all conductorsDrain wire that must be grounded2.26 Screened Twisted-PairShielded Twisted Pair (STP)Composed of two pairs of wiresMetal braid or sheathing that reduce electromagnetic interference (EMI)Must be groundedCharacteristic impedance of 150 W manager size is 22 AWGElectrical performance is better than UTP (300MHz bandwidth)More costlyHarder to handle thick and heavy2.27 Shielded Twisted Pair concentric Cable (Coax) Composed of insulated summation conductor with braided shied. It provides high degree of protection against EMI.Because the electrical field associated with conduction is entirely carried inside the cable problems with signal radioactivity are minimized very little energy escapes, even at high frequency.There is little noise pick up from external sources. Thus, higher bit rates can be used over longer distances than with twisted pairs2.28 Coaxial Cable series 6 (Video)Characteristic impedance of 7 5 ohmsMylar/aluminum sheath over the dielectricBraided shield over the mylar18 AGW solid-center conductor2.29 serial publication 6Series 11U (Video)Characteristic impedance of 75ohmsMylar/aluminum sheath over the dielectricBraided shield over the mylar14 AWG solid-center conductor or 18 AWG stranded-center conductor2.30 Series 11USeries 850 ohms characteristic impedanceMultiple mylar/aluminum sheath over the dielectricMultiple braided shield over the mylar11 AWG solid-center conductor2.31 Series 8Series 58 A/U50 ohms characteristic impedanceMylar/aluminum sheath over the dielectricBraided shield over the mylar20 AWG solid-center conductor2.32 Series 58 A/U graphic symbol Optics Higher bandwidth and much lower signal loss than copper conductors. It used in the backbone or in plane runs of huge control network.The data is carried as pulses of light from a laser or high-power LED.Optical fibre is non-electrical, hence is completely immune from electrical radiation and interference pr oblems. It has the highest bit rate of all media.The fibre consists of an inner internal-combustion engine filament, contained inside a glass cladding of lower refr spry top executive, with an outer protective coating. In a step great power fibre, there is a sudden transition in refractive tycoon. A graded index fibre has a gradual transition from high to low index, and much higher performance.Most common fibres are multimode, where the inner fibre is larger-than-life than the wavelength of the light signal, allowing multiple paths to exist, and some sprinkling to limit the obtainable bit rate. In single mode fibres, the inner fibre is very thin, and super high bit rates (several Gbps) can be achieved over long distances.2.33 Fibre OpticsMultimode Fibre Composed of a 50 or 62.5 micrometer weed core and one hundred twenty-five micron cladding. It normally used in horizontal and intrabuilding backbones. It has distance limitation of 2000m. Often uses a light-emitting diode (LED) light source.The center core is much larger and allows more light to enter the roleSince there are many paths that a light ray may follow as it propagates down the fiber, large time dispersion may occur which results in short distance applications or bandwidth reductionBecause of the large central core, it is easy to couple light into and out of the this type of fiberIt is inexpensive and simple to manufactureTypical value 62.5/125Multi-Mode range IndexIt is characterized by a center core that has non-uniform refractive indexThe refractive index is maximum at the center and decreases gradually towards the outer edgeThe performance is a compromise between single-mode step index fiber and multi-mode step index fiber2.34 Multi-Mode FibreSinglemode Fibre It undisturbed of a 6 or 9 micron core and 125 micron cladding (say8/125 or 9/125). It used for distances up to 3000m. It uses a laser light source.Small core diameter so that there is essentially only one path that light may Take care,as it propagates down the fiber There is minimum time dispersion because all rays propagating down the fiber with the same delay time and results in wider bandwidth (i.e. high bit rate) Because of the small central core, it is difficult to couple light into and out of the this type of fiber It is expensive and difficult to manufacture Typical value 9/1252.35 Singlemode Fibre2.36 LAN Media Technology abridgmentOpen SystemThe definition of open system is that system implements fitting open standards for interfaces and services. It is view asing formats to enable properly engineered components to be utilized across a wide range of systems and to interoperate with other components. And that system in which products and services can be mixed and matched from set of suppliers and supports free exchange of information/data between different systems without inserting gateways or branded tools. Some benefits from InteroperabilityDevices can be shared among different subsystems .Reduce cost, shorten installation time, and reduce complexity as parts are being reduced.Devices in different subsystems can interact with each other therefore, new breed of applications can be created easily.Owners can choose the best-of-breed products from different manufacture.Elimination of gateway dependency, in particular during system upgrade.Allow move-add-change relatively easy, hence lower life-cycle costs.The characteristics of open system are well defined, widely used, preferably nonproprietary interfaces/protocols Use of standards which are developed/adopted by recognized standards bodies or the commercial market place and definition of all aspects of system interfaces to facilitate new or additional systems capabilities for a wide range of applications.The different between proprietary protocols and open protocols For Proprietary protocols, most manufactures have their own proprietary protocols within their systems, so no communication between Systems unless a gatew ay is deployed. For open protocols, it allows systems of different manufacturers to communicate. Systems communicate with each other.2.1 BMS Open System ModbusA high-altitude protocol for industrial networks developed in 1979 by Modicon (now Schneider Automation Inc.) for use with its PLCs. It is providing services at layer 7 of the OSI model. Modbus defines a request/response message structure for a client/server environment. It is the most commonly available means of connecting industrial electronic devices. Several common types of Modbusl Modbus RTUn A compact, binary representation of the data.l Modbus ASSIIn merciful readable more verbose.l Modbus/TCPn Very standardized to Modbus RTU but is transmitted within TCP/IP data packets.2.37 Modbus2.2 BMS Open System ARCentAttached Resource Computer NETwork (ARCnet) was founded by the Data point Corporation in late 1970s. ARCnet was one of the topologies used aboriginal on networking and is rarely used as the topology of choice in current LAN environments. ARCnet, however, still is a solid, functional and cost efficient means of networking. Each device on an ARCnet network is assigned a node number. This number must be unique on each network and in the range of 1 to 255. ARCnet manages network access with a particular passing bus mechanism. The token (permission to speak on the network) is passed from the last(a) number node to higher number nodes in ascending order. pull down numbered addresses get the token before the higher numbered addresses. Network traffic is made more efficient by assigning sequential numbers to nodes using the same order in which they are cabled. Choosing random numbers can create a situation in which a node numbered 23 can be a whole building away from the next number, 46, but in the same room as numbers 112 and 142. The token has to travel in a haphazard manner that is less effective than if you numbered the three workstations in the same office sequentially, 46, 47, and 48 , and the workstation in the other building 112. With this configuration, the packet stays within the office before venturing on to other stations. A maximum time limit of 31 microseconds is allotted for an ARCnet signal. This is also called a time-out setting. Signals on an ARCnet can travel up to 20,000 feet during the 31-microsecond scorn time-out period. You can sometimes extend the range of an ARCnet by increase the time out value. However, 20,000 feet is the distance at which ARCnet signals begin to seriously degrade. Extending the network beyond that distance can result in unreliable or failed communication. Therefore, the time-out parameter and cabling distance recommendations should be increased only with great caution.An ARCnet network is used primarily with either coax or twisted pair cable. Most older ARCnet installations are coax and use RG-62 A/U type cable terminated with 93 Ohm terminators. Twisted pair (UTP) installations are newer and use stranded 24 or 26 gauge w ire, or solid core 22, 24, or 26 gauge type cable terminated with 100-Ohm terminators. Many ARCnet networks use a mix of both coax and UTP cabling. UTP cable is simple to install and provides a reliable connection to the devices, whereas coax provides a means to span longer distances. Typical ARCnet installations are wired as a star. ARCnet can run off a linear bus topology using coax or twisted pair as long as the cards specifically support BUS. The most popular star-wired installations of ARCnet run off two types of hubs1. Passive hubs cannot thrive signals. Each hub has four connectors. Because of the characteristics of passive hubs, unused ports must be equip with a terminator, a connector containing a resistor that matches the ARCnet cabling characteristics. A port on a passive hub can only connect to an active device (an active hub or an ARCnet device). Passive hubs can never be connecte
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.