1 Building Management System
An Overview to BMS
3 What is BMS? safe and comfortable working environment
A micro-processor based system which centralizes and simplifies… controlling monitoring operation and… management …of heating, air-conditioning, ventilation & other building services to achieve… safe and comfortable working environment energy saving & efficient operation at reduced time & cost Building automation is the automatic centralized control of a building's heating, ventilation and air conditioning, lighting and other systems through a building management system or building automation system (BAS). The objectives of building automation are improved occupant comfort, efficient operation of building systems, and reduction in energy consumption and operating costs and improve life cycle of utilities
4 BMS provides… Comfortable & safe environment for your building
by controlling….. Air Handling Units Fan Coil Units Chillers Pumps Boilers VFD’s and many more…..
5 Components of BMS DDC Controllers Field devices
Centralized WorkStation Computer With powerful user-friendly software. Used for everyday building operation. DDC Controllers Micro-processor based Fully programmable Controls the HVAC equipment of the building Field devices Temperature, Humidity, Pressure sensors Valves, Actuators
6 BMS Features…. LOG-IN Reporting present customized subsets of data
actual or historical state export as a word or excel document or.. to a printer. Data Logging The automatic gathering and storage of data from the field equipment for later analysis and reporting Dynamically or historical Customized charts and graphs Tabular reports Man / Machine Interface Interact with the connected technical building equipment. User friendly for Operators/Engineers LOG-IN System Security To prevent unauthorized use Password protection Operator specific access Operator log summary User-friendly data presentation Co-ordination of the flow of information through the system by implementing customized graphics. Floor plans of the building Graphical representation of the equipment. Remote connectivity provide remote access to the system with full functionality through.. local area network dial-up internet via web browser
7 BMS Features…. Alarm Management
the presentation in the sequence of importance and time of.. potentially dangerous situations process value deviations guiding the operator to take appropriate action through.. audible and visual indications , SMS alarm summary Time, date, priority and description Time Scheduling time-based start/stop of the equipment saves energy cost and efficient operation effective for lighting, occupancy control can be as daily, weekly, for holidays or events Event recording automatic logging of… operator activities and commands processes related to connected devices workstations and printers.
8 Why we need this?
9 Why we need this? Improved indoor environment quality
Comfortable living and working environment – domestic or commercial Better temperature and humidity control Good air quality Faster response to .. occupant needs end-user complaints trouble conditions Maintenance Savings. efficient control gives less wear and strain of mechanical equipment. provides longer life runtime monitoring alerts timely maintenance of equipment avoids expensive failures Energy Savings eliminates unnecessary system operation. accurate energy usage information helps you to take steps to reduce energy consumption like… Optimum-Start Night-Purging Time-Scheduling
10 Why we need this? Consolidater Facility Control…
One point centralized operation Simpler operation Reduces time and resources Reduced operator training on-screen instructions user-friendly graphic displays simpler operation programmed for routine and repetitive operation Maintenance Savings. efficient control gives less wear and strain of mechanical equipment. provides longer life runtime monitoring alerts timely maintenance of equipment avoids expensive failures
11 Operator functions Management functions Processing functions
Almost all applications in building automation are based on a common functionality Operator functions Operation Alarming Reporting Help Paging Management functions Data analyses Documentation Engineering Maintenance Networking Processing functions Techn. alarm Safety alarm Backup power control + - Peak dem. limit Time program kWh s Interlocks Closed loop ctrl. Calculation Set point range y = f(x) h Operat.hours Characteristics Recording Supervision Counting Man. operation I/O functions (field devices) Measuring J Signaling Switching M Positioning M
12 Honeywell/Trend Introduction – Corporate-ACS-E&ES
13 Honeywell/Trend Introduction – Corporate-ACS-E&ES
Automation and Control Solutions is made of six business units. Trend is within the Environmental & Combustion Controls (ECC) business unit. You will notice that each business unit has a peer to peer relationship and reports equally to the overall ACS division. Since Trend was acquired in 2005 the question has come up from time to time “If Trend is a Honeywell company, then why don’t I just buy from Honeywell?” If you are interested in purchasing a home security system you likely could be interested in purchasing an ADI security system from the Honeywell ACS Security business unit. If you run a laboratory and are looking for fume hood controls, you likely would purchase lab controls from Phoenix Controls within the ECC business unit. Maybe you oversee a county courthouse. You have a limited budget and are in need of major renovations. You may want to work with Honeywell Building Solutions (HBS) on a performance based contract to renovate mechanical systems, provide energy efficient lighting, EMS, and bundle in a new roof. You may be looking to deploy infrastructure for a local or multi-site national / international energy monitoring and management initiative. Trend within the ECC business unit of ACS would be the right place to go and the next few slides will tell you why.
14 HVAC Design Criteria
15 HVAC Design Criteria Disadvantage of Standalone System
HVAC systems can interface to Building Automation System (BAS) to allow the building owners to have more control over the heating or cooling units. The building owner can monitor the system and respond to alarms generated by the system from local or remote locations. The system can be scheduled for occupancy or the configuration can be changed from the BAS. Sometimes the BAS is directly controlling the HVAC components. Depending on the BAS different interfaces can be used Today, there are also dedicated gateways that connect advanced VRV / VRF and Split HVAC Systems with Home Automation and BMS (Building Management Systems) controllers for centralized control and monitoring, obviating the need to purchase more complex and expensive HVAC systems. In addition, such gateway solutions are capable of providing remote control operation of all HVAC indoor units over the internet incorporating a simple and friendly user interface Typical Architecture for HVAC Disadvantage of Standalone System 1. Centralized Control is not Possible. 2. Alarms cannot be monitored. 3. Optimization of the system is not possible. 4. Cloud based cannot be implement. 5. New Strategies using Energy Management Software's for increasing the building efficiency cannot implement.
17 What is Smart building? Smart building technologies can improve buildings’ energy efficiency and indoor environmental quality. Smart Building: A building that provides a productive and cost-effective environment through optimization of its four basic components - structure, systems, services and management - and the interrelationships between them."
19 BMS Software Generally BMS Software can be divided into following types – Programming / Configuration Tool HMI Software for Visualization the Process Parameters Energy Management Software HMI software is a graphical, real-time, user interface for the building control system. It enables the user to monitor plant or building services, and make changes to the way the building is controlled from a graphical display. All pages and actions are accessible using a mouse. The security system ensures that the user is only presented with information and functions that are relevant to their authority or task. HMI Software
20 BMS Software Programming / Configuration Tool
Programming / Configuration tool is graphical method of configuring the controllers and writhing the programs within the controllers. It gives a powerful way of creating the Programs and support documentation. In some cases the configuration and programming tool may be different. It may also have a simulation and Live value commissioning features, with the help of which one can reduce the errors easily. Programming / Configuration Tool
21 BMS Software Energy Management Software
Nowadays, Most Energy Management Software have the capability to record and track the real-time energy usage of a building or floor, and to store that information for later analysis. Features are explained in Energy Manager Section. Energy Management Software
23 Plant Controllers Plant Controllers are used to control the HVAC Equipment's like Chillers, Boilers, Pumps, Complex AHU’s etc.. Using Plant Controller one can easily control the complex loops of all the HVAC Equipment's. IO Extension is possible in Plant controllers, whatever would be the IO Count of the HVAC Equipment. Easy Integration with the Supervisory Systems Plant Controller’s are as below- Ex. TREND IQ4E Ex. TREND IQ4NC
24 Features of Plant Controllers
Bacnet over MSTP/IP Expandable IO Modules Faster Processor Faster Webpages Ability to process more programs per second Touch Screen Displays can be easily connected Real Time Clock Sequencing Scheduling
25 Unitary Controllers Unitary Controllers are used to control the HVAC Equipment's like Fan Coil Units, VAV’s, AHU’s etc.. Unitary Controllers cannot directly be connected to Ethernet TCP/IP Protocol it communicates to Supervisory system by TREND Integration Controller IQ4NC on Bacnet Protocol All the programs are loaded in the Unitary Controllers of their respected HVAC Equipment. Unitary Controller’s are as below- Ex. TREND IQ411/422 Ex. TREND IQ ECO
26 TREND IQ System Architecture
28 Network Display Features Color graphics pages (schematic)
Viewing of inputs, outputs, directories, alarms, and plots Adjustment of knobs, switches, and time zones. Graphing of logged data Configurable users to ensure system security Communicates with all controllers on network (not autodialed networks) DHCP enabled Ethernet, current loop LAN, or RS232 network connection Panel, surface, or embedded mounting Color touch screen LCD display The Network Display would be a touch screen display which provides an interface to the Building Management system or any part of Building Management System. Network Display enables the user to view and adjust operating times, monitor alarms, make adjustments to controller parameters, and display graphs of logged data. Schematic displays provide the ability to view, change and graph data from colour graphics pages. Alarms can be sent directly to the IQView8 where they appear on a special display, an audible, and visual indication of the alarm is given. The unit is panel or wall mountable with surface and embedded mounting options available enabling the IQView8 to be mounted in a way suitable for its environment and use.
29 Network Display - Functionality
User Menu Schematics Operating Times Slide Shows the typical Pages which may be present on the Network Display. Schematics :- The pages may contain a backdrop, graphic images, animations. multi state graphics (ON, OFF, waiting, error, alarm, overridden ON, and overridden OFF), and static text. The security system enables access to particular pages to be restricted so that users are only presented with the necessary information. Operating Times :- The interface provides a common view for all types of controllers. An easy to follow wizard guides the user through the process of changing times and configuring exceptions. Graphs :- Graphs can accessed from the schematic pages, from a list of values on the system (Controls Browser), or from the display and directory navigation (Views Browser). It is possible to zoom in on selected parts of the graph, display spot values, or view the underlying data. Controls Browser :- The Controls Browser displays a list of sensor, digital input, critical alarm, knob, switch, time zone, driver, and loop modules Once the values are displayed they can be viewed, adjusted, or graphed as appropriate depending on the type of value. Alarm Handling :- Alarm handling features available in the Alarm Browser notify the user of alarms that have occurred, A flashing alarm icon in the Title Bar indicates that an alarm has been received. Alarms are grouped into categories. The alarm actions for each category can be configured. Graphs Controls Browser Alarm Handling
31 What is Cyber Security? It is referred as Information Technology Security Focusing on protecting: Computers Networks Programs and Data From unintended or unauthorized access, change or destruction. What is Cyber Security? Trainer: Pose question - Think about the term cyber security and what does it mean to you? Let them think about the question and then ask for answers around the class. Reveal the answers and talk through them
32 Why is Cyber Security Important?
Who uses the Internet? Big Businesses Financial Institutions Hospitals Governments Military What do they do and what do they do with the information? Collect, process and store confidential information on computers Transmit that data across networks to other computers What do they/we need to do? Protect sensitive business and personal information. Why is Cyber Security Important? Trainer: Ask the question – Who uses the internet? Let them think about the question and then ask for answers around the class. Reveal the answers and talk through them Ask the question – What do they do? Ask the question – What do they/you need to do?
33 How On-line attacks damage consumer trust?
Customers are making more transactions online and trust in a brand is paramount What happens if your information ends up in the wrong hands? Would you shop on-line with them again? The challenge is being able to identify the risks and take action Currently, brand owners only know about approximately 10% of the threats. The web is now one of the main channels that constantly connected consumers use to interact with brands Customers are making more transactions online and trust in a brand can take a severe hit if sensitive information ends up in the wrong hands Trainer: Ask the questions – What happens if your information ends up in the wrong hands? Would you shop on-line with them again? Let them think about the question and then ask for answers around the class. The challenge for brands is being able to identify the risks facing their brand online and taking action to protect against the threats they are facing Currently, brand owners only know about approximately 10% of the threats facing their brand online As a result, it is imperative that organizations adopt a proactive, precautionary attitude and introduce measures to expose the threats targeting their brand. To reduce the risks, brands must implement robust security measures and proactively monitor any online attacks or infringements so that threats can be addressed early, before any significant damage is done.
34 Cyber Attacks Adobe Systems Inc said it was the victim of sophisticated cyber attacks on its networks by hackers who accessed data belonging to millions of customers along with the source code to some of its popular software titles Microsoft has revealed it had its computer system hacked Royal Bank of Scotland has said its websites fell victim to a cyber attack after customers were unable to access online banking UK retailer Lakeland revealed it was forced the firm to reset all customer passwords as a precaution NatWest victim of cyber attack after site crashes for the second time The data breach of Sony's PlayStation Network resulted from a "very carefully planned, very professional, highly sophisticated criminal cyber attack designed to steal personal and credit card information for illegal purposes” Facebook and technology giant Apple have also admitted to being hacked.
35 So what’s the Risk. What’s the worst that could happen?
Switch the lights off in a supermarket Shut down the HVAC plant in a server room Or interact with the system in some ingenious manner Perspective is important! Trainer: So what’s the risk? Systems that are Internet facing and which may be vulnerable to a cyber intrusion which may be a result of weak system configuration, software that has not been updated to the most current version, and/or lack of additional security such as use of a VPN. What’s the worst that could happen? Switch the lights off in a supermarket? Shut down the HVAC plant in a server room? Or interact with the system in some ingenious manner? Perspective is important! Every system has different security considerations and risks It is even important to remember on some sites it is easier to walk to the plant room and switch the plant off rather than attack the BMS system As such different options & applications of the products should be considered Unauthorised access can have financial ramifications.
36 IT Networking basic - VLAN
37 Understanding Basic IP Addressing
Network Address 128.1 An IP address would look something like this and is made up of two distinct parts. The first part of the address, is the Network Address, this connects us to the correct network (like the area code). Host Address 73.21 The second part of the IP address, is called the Host address and this connects us to the correct device (or Host). The numbers used to make up an IP address are normally between 0 and 254 (8 bit Logic).
38 Understanding Basic IP Addressing - Classes
Many different sizes of network are needed in the IT world, from small home networks that maybe have 3 or 4 devices sharing an internet connection to huge multinational companies, with thousands of PCs in just one building. To account for varying size of networks, the IP address can be formatted in a number of different ways. In the previous example, we split the IP address in the middle. This is referred to as a Class B Network, we can have 16,384 networks each with 65,534 addresses. Network Address 128.1 Host Address 73.21 Network Address 128.1 Host Address 73.21
39 Understanding Basic IP Addressing – Subnet Mask
Wherever there is an IP address, there is something called a Subnet Mask and it’s this that shows where the IP address is divided. The numbers used are normally only 255 or 0. The subnet mask is compared with the IP address. A subnet mask may look like this IP Address Subnet mask Where the subnet mask has 255, it indicates the Network part of the IP address Network Address 126. Host Address
40 ADSL Connectivity and Remote Connectivity
41 ADSL Connectivity and Remote Connectivity
Typical Data Transfer Speeds GPRS Upload: up to 24 Kb/s Download: up to 48 Kb/s EDGE Upload: up to 120 Kb/s Download: up to 236 Kb/s UMTS (3G) Upload: up to 384 Kb/s Download: up to 384 Kb/s HSDPA Upload: up to 384 Kb/s Download: up to 3.6 Mbit/s HSUPA Upload: up to 5.2 Mbit/s Download: up to 7.2 Mbit/s A typical connectivity solution that uses mobile communications to make a connection to a building automation control network via Ethernet, allowing building automation software (e.g. HMI and Programming) to connect. A modem is used to provide a secure and reliable network connection via a Virtual Private Network (VPN). The connection uses High-Speed Packet Access (HSPA), or General Packet Radio Service (GPRS) connection where 3G connectivity is unavailable. Features Remote Ethernet connection to Building Automation Network Easily installed and commissioned Secure on-demand network
42 VPN Agent v/s VPN Client Solution
VPN Agent Solution This solution allows connection over the internet to the site via a secure VPN. A PC running HMI Software, Programming Software tool can access the remote site over the VPN. The VPN Agent automatically connects to the remote site every time the PC on which it is installed is switched on. This is useful for remote alarm monitoring using 963. With this solution, a modem is connected continuously connected to the remote site and all that is required on the PC is an internet connection and the VPN Agent software. There is only 1 license included in the VPN Agent software package, however additional licenses can be obtained on request (extra charges apply). The diagram below illustrates the VPN Agent connected to remote TREND’s IQ4 controllers. VPN Client Solution This solution connects to the remote network in the same way as the VPN Agent. The only difference is that the VPN connection to the remote site is not made automatically when the PC is switched on; the user must connect to the VPN Client manually if they wish to access the remote site. With this solution, a modem is connected using a time limited connection to the site and all that is required on the PC is an internet connection and the VPN Client software. There is 1 license included for the VPN Client solution with each individually purchased modem, however additional licenses can be obtained on request (extra charges apply). The diagram below illustrates the VPN Client connected to a remote TREND’s XTEND.
43 VPN Agent & VPN Client VPN Agent
The VPN Agent requires Windows 8, Windows 8.1, Windows 2000 Service Pack 3 or later, Windows XP, Windows 7, Windows Vista, Windows Server 2003, Windows Server 2008 or Windows Small Business Server. Both 32-bit and 64-bit versions are supported. The VPN Agent runs as a background Windows task and has minimal space and memory requirements. VPN Client The VPN Client requires Windows 8, Windows 8.1, Windows 2000 Service Pack 3 or later, Windows XP or Windows 2003 Server (including SBS 2003). If the VPN Client is behind a NAT device, the following updates are required: Windows 2000 requires NAT-T (Nat-Traversal) update (see Microsoft KB ). The NAT-T update for Windows 2000 can be downloaded from Microsoft at (Windows Update Catalog). Install the Update Catalog. Select ‘Find updates for Microsoft Windows operating systems’ and the select the ‘Advanced Search’ option. Enter as then search term which will provide a link to the NAT-T update. Windows XP requires Service Pack 2 No updates are required for Windows 2003 Servers
45 Rotary Damper Actuator Pressure Independent Control Valves
Field Devices Sensors Switches Variable Speed Drives Pressure Independent Control Valves Rotary Actuators Linear Valve Actuators Rotary Damper Actuators Room Sensor Rotary Damper Actuator Temperature Sensor Linear Valve Actuator Field Devices are the foundation of the company’s Smart Structure. They enable efficiency and contribute to the overall value of these Buildings Management System (BMS). If measurement of control at the Field Device Level is not happening, the Buildings Management System is not performing at its most efficient and optimal level. In HVAC there are lot of Field Devices depending upon the need all are being installed to meet the specific requirement. Slide shows some field devices and yes there are many more addition to this, again depending upon the requirement it is been installed. Pressure Switch Pressure Independent Control Valves Rotary Actuator Variable Speed Drives
47 Energy Manager Flexible
Energy Manager Software's can be used for any building where you wish to show real-time energy performance to occupants and visitors. Web-based Energy Manager Software can be run as a stand-alone application on a networked computer. Intuitive Implement the solution immediately after installation. Custom Solution A variety of targets with multiple options for graphic displays allow your building’s Energy Manager Software to look completely unique to your building. Energy Behavior Changes Through User Education The Energy Manager Software shares energy-saving measures and performance against set targets with tenants and visitors, and encourages employee buying and participation in those efforts. Nowadays, Most Energy Management Software have the capability to record and track the real-time energy usage of a building or floor, and to store that information for later analysis. Increasingly though, energy management systems are being used to supplement the energy monitoring and tracking of EMS with functions including weather information, pricing structures, and more sophisticated real-time energy usage data. An Energy Management Software can enable a company to further reduce energy costs by integrating factors such as weather and energy prices into energy management decision making.
48 Cloud Based Solutions
49 Cloud based solutions Advantages of BMS Cloud Solutions
IT Service Portal World Wide Access Internet Firewall IT Network Network Building Automation Central setup of the server hardware and BMS application in the DEOS AG data center with central server environment, backup, etc. for IT and BMS applications Permanent connection to the central BMS via secured VPN connections Mobile secured access to the BMS for monitoring and alarm and fault processing, etc. Advantages of BMS Cloud Solutions Comprehensive – all buildings at a glance Cost-effective – cost-intensive IT infrastructure only centrally installed and maintained once Synergy – combining an in-house IT network and a building automation network saves costs Security – high IT security standard for maximum protection Core competence – implement IT network and security with DEOS AG Worldwide – monitoring and operating BMS applications Flexible – fast resource booking for this if necessary Distinction – new professional BMS solution Every building owner aims to achieve the cost-effective operation of their building. High synergy effects and vast savings potential frequently go unused. When designing new or modernizing building management systems, cloud solutions and other IT services provided, present a new compelling cost-effective approach. BMS cloud solutions – the server hardware, BMS application software, data backup, etc. is centralized here and thus efficiently consolidated: secure and central in the cloud.