Assignment 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 36

1. Explain Centralized Air Conditioning?

Introduction : Centralized systems are defined as those in which the


cooling (chilled water) is generated in a chiller at one base location and
distributed to air-handling units or fan-coil units located through out the
building spaces. The air is cooled with secondary media
Central air conditioning systems serve multiple spaces from one base
location. These typically use chilled water as a cooling medium and use
extensive ductwork for air distribution.

Sub systems of centralized AC


a) Chilled water plant
b) Condenser water system
c) Air delivery system

Chilled Water System


The chilled water system supplies chilled water for the cooling needs of all the
buildings air-handling units (AHUs)

The system includes a chilled water pump which circulates the chilled water
through the chillers evaporator section and through the cooling coils of the
AHUs.
Condenser Water System
refrigeration system must also reject the heat that it removes.

There are two options for heat rejection:

1) air cooled &

2) water cooled

Air Cooled Unit Water Cooled Unit


Air cooled units absorb heat from the indoor space and rejects it to ambient air.

Parts:
a) Condenser
b) Compressor
c) Propellor fans &
d) Controls

These are the most common system used in residential and light commercial
applications. Water cooled units absorb the heat from the indoor space and
rejects that heat to water which in turn may either reject heat via fluid coolers
or cooling towers, or dry air coolers with adiabatic kits.

o higher coefficient of performance (COP).

o most common

o multistory offices, hotels, airports and shopping complexes.

Air Delivery System


Air is drawn into a buildings HVAC system through the air intake by the air
handling unit (AHU). Once in the system, supply air is filtered to remove
particulate matter (mold, allergens, and dust), heated or cooled, and then
circulated throughout the building via the air distribution system, which is
typically a system of supply ducts and registers.
System Types
The Central system category could be further broken down into the following:

Central systems with CAV air-handling units

Central systems with VAV air-handling units

Central systems with fan-coil units (All- Water systems).

CAV Systems (Constant Air Volume)

CAV system is an all-air system which accomplish cooling and heating by


varying the supply air temperature and keeping the air volume constant.

The system works well and maintains comfortable conditions in spaces with
uniform heating and cooling requirements.

VAV Systems (Variable Air Volume)

Variable Air Volume (VAV) system is an all air


system which can satisfy the individual cooling requirements of multiple
thermal zones.
This is achieved by supplying air at a constant temperature from central
plant to one or more VAV terminal units in each zone and adjusting the
amount of supply air to meet required cooling loads.

The primary benefit of VAV over constant volume systems (CV) is its ability
to simultaneously provide the required level of cooling to any number of
zones within a building.

2)Integrated Building Management System (IBMS) in Heating


ventilation air conditioning (HVAC)?
Chiller Plant Management

Chiller/pumps sequencing.

Chilled Water Return Header Temperature

Optimization of chiller use.

Integration with chiller microprocessor panel


BMS Integration for monitoring

Facility manager for Chillers to view the data remotely and in graphical
format

Includes field accessories such as sensors, valves Etc (Depends on project


specification)

chilled water is often used to cool a building's air and equipment, especially
in situations where many individual rooms must be controlled separately,
such as a hotel.

A chiller lowers water temperature to between 40 and 45F before the


water is pumped to the location to be cooled.

Air cooled chillers

A heat exchanger using air, refrigerant, water & evaporation to transfer


heat (BTUs) to produce air conditioning ( measured in tons).

Chiller is comprised of an evaporator, compressor, condenser & expansion


valve system

There are 3 primary pumps, two working & one stand by on a common pipe
line, Any pump should be workable with any chiller,

There are motorized isolating valves which should be activated across the
working chiller.

primary should should be started & then command should be given to the
motorized isolating valve to open.

After open position of the valve is identified, then the command to start
the chiller will be issued,

chiller must have a water flow switch which will finally determine to allow
the chiller to run or not.

plant manager is planned for the chillers & will be integrated with BMS to
monitor the chiller parameters.

Through BMS, chiller will be switched ON/OFF & will be hardwired.

chiller sequencing through differential temperatures on the supply &


return header.

the above data log will be used for BTU meter to be installed in return
water header after the de-coupler line from the chiller.

outside air temperature & humidity sensor will be installed as a global


reference for all HVAC measurements.

secondary pumps are run by VFDs,


pressure tranducers & the VFDs are packaged & supplied by the HVAC
contractors.

Air handler, or air handling unit (AHU)


An air handler, or air handling unit (often abbreviated to AHU), is a device used to
condition and circulate air as part of a heating, ventilating, and air-conditioning
(HVAC) system.

controls temperature,

controls humidity,

controls pressure & air exchange

Field device that has IBMS scope


a) Temperature sensors

b) Co2 sensors,

c) Differential pressure switch,


a) Temperature sensors
resistance temperature detectors (rtds), are sensors used to measure
temperature by correlating the resistance of the rtd element with
temperature.

Features & benefits


Monitors temperature, humidity, pressure, air quality and air velocity

Available in a wide range of sensing values,

Supports all popular control signals,

Provides high accuracy for best energy savings,

Offers high reliability for long sensor life,

Installs easily with flexible mounting accessories.

Quick-sensing response time,

Requires no calibration or maintenance,

Wires easily to terminal blocks.

b) Co2 sensors
A carbon dioxide sensor or CO2 sensor is an instrument for the
measurement of carbon dioxide gas. The most common principles for CO2
sensors are infrared gas sensors (NDIR) and chemical gas sensors.
Measuring carbon dioxide is important in monitoring indoor air quality and
many industrial processes.
Applications
Excellent performance CO2 Sensor, for use in a wide range of applications,
including air quality monitoring, smoke alarms, mine and tunnel warning
systems, greenhouses, etc.
The sensor is easy to use and can be easily incorporated in a small portable
unit.
Features
High Sensitivity
Detection Range: 0 - 10,000 ppm CO2
Response Time: <60s
Heater Voltage: 6.0V
Dimensions: 16mm Diameter, 15mm High excluding pins, Pins - 6mm High

C) Differential pressure switch

Filter monitor or flow switch for air, non-combustible, non aggressive


gases in air conditioning and ventilating installations.

APPLICATIONS
Monitoring air filters and ventilators

Monitoring industrial cooling-air circuits

Overheating protection for fan heaters

Monitoring flows in ventilation ducts

Controlling air and fire-protection dampers

Frost protection for heat exchanges

overpressure, relative
Kind of pressure

plastic connection piece for 5


Pressure connection
mm (internal) hose

AMP connector 6,3x0,8 (DIN


Electrical connection
46244) or screw terminals

Protection class IP54


Sensing element material ABS + Silicon

Media temp. -20 ... 85 oC

Ambient temperature -20 ... 85 oC

SPDT switch 240 Vac; 1,5 A


Switch function/capacity
(0.4)A

CE0085AR0013 according EC
Gas Appliance Directive
Certificates
EU/2009/142/EG and DIN EN
1854

Max. pressure 10000 Pa

BTU Metering
Air conditioner capacity is measured by "BTU". BTU stands for British Thermal
Units.

BTU Metering: Measurement is carried by placement matched pair temperature


sensors in the supply and return water lines of the AHU and flow is monitored.
The flow and temperature readings are used to evaluate the BTU consumed on a
continuous basis. All the parameters are transferred to the central system
through the M-BUS to monitor the AHUs efficiency / BTU Consumed.

Consists of

Flow meter inline turbined impellers / Jet type/Electro magnetic/ultrasonic


types

Heat Integrators

Matched pair temperature sensor with pocket for insertion

Local data logging


Local digit LCD display

M BUS O/P

M-BUS Automation Gateway


3)Perimeter Protection security
Outdoors mechanical and/or electronic systems conceived to protect the external
perimeter of a facility.

A F P
Access control Fence Physical
B Future Fibre security
Boundaries of Technologies R
Security G Restricted-
Report Glass break access barrier
C detector system
Chicane H Rope line
Crowd control Home safety S
barrier I Safety barrier
E Iron railing T
Electric fence M Temporary
Electric gates Mantrap fencing
(access W
control) Wattle
(construction)

GATES & BARRIERS CONTROL


Boom barrier controls entry & exit of vehicles.

if a vehicle wants to enter, the specific card has to be accessed &


information has to be sent to the panel.

The relay in panel which is usually in normal open ( NO) becomes normally
closed (NC) & thus boom barrier opens & allows the vehicle.
Main Benefits :
Single-user, un-manned automatic access control,

Indoor or outdoor perimeter security

Safe, simple and effective equipment for demanding, prolonged use,

Reduced maintenance and security costs,

Long-term investment based on exceptional durability

Swipe, proximity , biometric acceses control scanners can be used to


grant access to a secured site.

gates , barriers & traffic lights can also be linked to integrated security
systems & remote CCTV systems.

What is electric fence?


Electric fence is a physical and psychological barrier to deter animals or
people with high voltage pulsed shock.
There are two kinds of electric fence,one is for agricultural and the other
for home security.
Tongher offers home security fence energizer for integrated,such as
conjucted with CCTV camera,alarm system,sensor,etc.
Theory of electric fence
The shock current travels through the
body and into the earth ground where
they are standing.

The effect of the shock on the people


depends on the amount of shock
current, the duration of the shock, and
the body weight of the person.

How it works
1,Circuit complete
Pulsed voltage comes out from the energizer,to the fence wire,then goes through
the human body,to the ground,at last goes back to the energizer.
2,Factors affect the shock:Time of shock,Voltage,Current
Specification
Differential voltage output technology: every wire has
voltage, and differential voltage between the two adjacent
wires.
LCD or LED indicate the working state and the voltage on
every wire.
High/low voltage switch manually, long-distance auto switch
on/off.
Short circuit, break and tamper alarm, Self-inspection
System for equipment fault.
Waterproof casing and downward appearance design.
RS 485 bus control, keypad, computer, network and multiple
long distance management solution.
DC12V, NC/NO dry contact alarm output, can work with
other modern security products.

Solution

1,Self control smart solution


2,Keypad control solution
3,Computer control(Direct and network) solution

Benefit of using electric fence

1,Cost effective
2,Easy to install and maintain
3,Deter burglar and intrusion
4,Integrate with other security product
4) Advantages of IBMS

Key benefits & functions of Integrated Building Management System (IBMS)

Integrated building systems in a single, streamlined, multi-service network


infrastructure

IBMS integrated technology allows centralised and user-friendly control,


monitoring, maintenance, and management.

IBMS also allows efficient, streamlined data recording, reporting and


analysis.

IBMS also allows billing , building maintainance , security ,care ,


consumption trending & IT system maintainance for services.

IBMS allows data transmition that enables remote control & management
for data services.

IBMS also allows functional & safe environment & to save energy for users
& owners.

IBMS allows secure , solid data transmition & business transactions over
internet & e technologies.

IBMS modules allows autonomous measuring, control regulations,


scheduling & alarming functions .

IBMS sensors & actuators allows sensing, steering of HVAC device & local
user interfaces.
For highrise buildings Safety management in IBMS functions to monitored
and controlled by a computerized system where:

access card are required for entry into the building during or after office
hours.

other sensors such as motion or heat detectors, pressure sensors, door


switches and vibration sensors used to detect unauthorized entry.

All of these sensors and actuators are connected to field processors and
building management control.

A Building Management System (BMS) is a computer-based control system


installed in buildings that controls and monitors the buildings mechanical
and electrical equipment such as ventilation, lighting, power systems, fire
systems, and security systems.

A BMS is most common in a highrise building. Its core function is to


manage the environment within the building and may control temperature,
carbon dioxide levels and humidity within a building.

As a core function in most BMS systems, it controls heating and cooling,


manages the systems that distribute this air throughout the building (for
example by operating fans or opening/closing dampers), and then locally
controls the mixture of heating and cooling to achieve the desired room
temperature.

A secondary function sometimes is to monitor the level of human-


generated CO2, mixing in outside air with waste air to increase the amount
of oxygen while also minimizing heat/cooling losses.

Alarm management.

Better coordination of monitoring and control.

Facilitates quicker response time in respect to complaints.


Retaining central database for recording system history, information and
management pertaining to preventive maintenance.

improved administration and optimization of resources.

Graphic interface for controlling and commanding of all systems.

Perimeter fence or wall monitoring with video surveillance.

Building tenant/occupants
Good control of internal comfort conditions,

Possibility of individual room control ,

Increased staff productivity ,

Effective monitoring and targeting of energy consumption,

Improved plant reliability and life,

Effective response to HVAC-related complaints

Save time and money during the maintenance

Building owner
Higher rental value

Flexibility on change of building use

Individual tenant billing for services facilities manager

Central or remote control and monitoring of building

Increased level of comfort and time saving

Maintenance Companies
Ease of information availability problem diagnostics.
Computerized maintenance scheduling

Effective use of maintenance staff

Early detection of problems

More satisfied occupants

5)ACCESS CONTROL SYSTEM ( Biometric System)


Access control shall be implemented with proximity readers, control nodes,
electronic keys and electronic locks.

The access control system is connected to (BOS) Building Operating system for
full control and reporting, and integrated into the central user interface.

Electronic access control uses computers to solve the limitations of mechanical


locks and keys. A wide range of credentials can be used to replace mechanical
keys.

The electronic access control system grants access based on the credential
presented. When access is granted, the door is unlocked for a predetermined
time and the transaction is recorded. When access is refused, the door remains
locked and the attempted access is recorded.

The system will also monitor the door and alarm if the door is forced open or held
open too long after being unlocked

There are three types (factors) of authenticating information:


something the user knows, e.g. a password, pass-phrase or PIN,

something the user has, such as smart card,

something the user is, such as fingerprint, verified by biometric


measurement.

BIOMETRICS
Biometrics is the identification or verification of human identity through the
measurement of repeatable physiological and behavioral characteristics.

CATEGORIES OF BIOMETRICS:
Biometrics can be sorted into two classes: Physiological & behavioral.

Physiological : face , fingerprint , hand , iris , DNA.

Behavioural : key stroke, PIN, signature , voice.

Working & principle of biometrics


Biometric devices consist of a reader or scanning device software that converts
the gathered information into digital form, and a database that stores the
biometric data with comparison with existing records.

Fingerprint Verification
Finger print biometrics are the most widely adopted biometric technologies in the
industry.This is because the stability and uniqueness of the fingerprint are well
established, Fingerprint patterns: arch, loop, and whorl. Fingerprint landmarks
are also shown: core and delta.positions of scars and creases can also be used,
but are usually not used because they can be temporary or artificially introduced.

Hand Geometry verification


A biometric hand geometry device measures the shape and length of the
fingers and knuckles,

Such devices are useful for controlling access to a building with a limited
number of occupants,

They have also proven popular among time and attendance recording
applications

IRIS verification
Biometric technologies that analyze the eyes can be separated into two
categories: iris scanning and retinal scanning. The iris has a fine texture thatlike
fingerprintsis determined randomly during embryonic gestation Like the
fingerprint, it is very hard (if not impossible) to prove that the iris is unique.
However, there are so many factors that go into the formation of these textures
(the iris and fingerprint) that the chance of false matches for either is extremely
low.

Facial Recognition
Facial verification involves recognizing people by there:
Facial features.

Face geometry

Principle:
Analysis of unique shape, pattern and positioning of facial features.

DNA recognition
DNA has not been considered as a form of Biometric until recently. It dictates how
we look and develop; it serves as a full set of building blocks / 'blueprints' for each
person and is as unique as a fingerprint. DNA is short for Deoxyribonucleic Acid .

The use of DNA in biometric applications focuses on the nitrogenous bases which
are referred to as 'bases' for short. There are four distinct bases:
Adenine (A)

Cytosine (C)

Guanine (G)

Thymine (T)

Signature Verification
Biometric technologies that measure signature dynamics are often referred to as
dynamic signature verification (DSV) and they look at the way we sign our
names,.

DSV focuses on the method of signing rather than the finished signature and is
not based on a static image.

DSV can extract and measure a number of characteristics, such as the velocity
and acceleration of the signature, the pressure exerted when holding the pen, as
well as the number of times the pen is lifted from the paper,

The movement of the pen during the signing process rather than the static image
of the signature.

Many aspects of the signature in motion can be studied, such as pen pressure, the
sound the pen makes.

Voice Recognition
Voice recognition software that can recognize words and type a letter,

voice recognition biometric technologies measure the sound of a human voice


that is caused by resonance in the vocal tract, .

The sound of a human voice is based on the length of the vocal tract, as well as
the shape of the mouth and nasal cavities, Thus, these characteristics can
affect every sound made by a human.

ACCESS CONTROL SMART CARD


A smart card-based ID system also gives the cardholder control over who can
access personal information stored on the card.

A biometric further enhances this control, ensuring that only the rightful

cardholder can authorize access to personal information.

When used in combination with biometrics, a smart card ID becomes even more
personal and private. A biometric provides a strong and unique binding between
the cardholder and the personal database on the card, identifying the cardholder
as the rightful owner of this card.The biometric cannot be borrowed, lost, or
stolen like a PIN or a password, and so strengthens the authentication of an
individuals identity.

6) Types of CCTV, how it is installed and connected to single system?


CCTV, Closed Circuit Television, is a TV system that does not broadcast TV
signals to public but transmits them over to limited monitor(s).

CCTV utilizes video cameras(produce the video), cable (transmit the video),
and monitors(see the video).

CCTV system is applied mainly for the security and surveillance purpose

List of CCTV Parts and Accessories

1. Camera Package
* Camera body
* Lens

* Mounting Bracket
* Power source
* cable

Lens and Focal length


The focal length of a camera lens(convex) is the distance between the
center of the lens and the film or CCD pixel array.

The focal length of a camera lens is displayed on the barrel of the lens.

The focal length of a lens establishes the field of view of the camera. The
shorter the focal length is, the larger the field of view.

There are three types of lenses: standard, wideangle, and telephoto.

Lens mount

C-Mount Lens

CS-Mount Lens

Fixed Mount Lens

The distance between the rear flange of the lens to image sensor
is

17.5mm for C mount and 12.5 mm for CS mount

So we cannot use a CS mount lens in a Cmount camera but in a CS


mount camera we can use both CS mount lens and for C mount
lens we just use a 5mm spacer ring
Power source
12 V DC for dome camera

24 V AC for speed dome or PTZ camera

230 VAC for CCD Optix camera

Cables
Coaxial Cable is used to transmit video signals from camera to monitor.

RG59/U is commonly used.

It can run 450ft without loosing the video quality.

This cable is usually connected by BNC connectors at both ends.

Fiber-Optic Cable

It is not affected by electrical interference or high-voltage power. It


transmits video signals with high efficiency and can run upto miles. The
problem is that it is expensive and difficult to handle.

RCA Cable

It is not standard in the industry but used for short distances up to


250ft. Twisted wire is used for this purpose
Different types of cameras
Colour and B/W

NTSC and PAL

Fixed and Movable

C and CS mount

AC and DC camera

CCD and CMOS

Normal and wideangle

Working of video camera(CCD)


A CCD(charge coupled device) consists of several hundred thousand
individual picture elements (pixels) on a tiny 1/2", 1/3", or 1/4" chip.

Each pixel responds to light falling on it by storing a tiny charge of


electricity.

The pixels are arranged on a precise grid, with vertical and horizontal transfer
registers carrying the signals to the camera's video processing circuitry.

This transfer of signals occurs sixty or fifty times per second

NTSC [National Television Systems Committee] (in US) 30 frames per


second

PAL[Phase Alternating Line](in India)25 frames per second.

But according to persistence of vision 24 individual pictures is enough to


get a continuous motion

The 1/3" CCD chip is the most widely used sensor format these days; its size
is 5.5mm (diagonal), 4.4mm (horizontal) and 3.3mm (vertical).
REMOTE VIEWING through LAN
Using Tracerlite Enterprise S/W we can view the Cameras connected to Tracerlite

At a time Maximum of 5 clients can view Live (or) Recorded images.


Also can do the PAN /TILT operation

In our Example by sitting in the Mumbai office we can Pan/Tilt the


camera in the Chennai office

Closed-circuit television (CCTV)


Monitors, records, and control s more cameras ,

View video from anywhere using an Internet browser-enabled PC or


mobile phone,

Locate dates, times, or incidents in video archives quickly and easily


with intelligent search ,

Use intelligent event monitoring to track areas of interest, removal of


items, or the appearance of unsupervised objects
Closed-circuit digital photography (CCDP)
Closed-circuit digital photography (CCDP) is more suited for capturing and
saving recorded high-resolution photographs,

CCTV systems is the ability to take high resolution images of the camera
scene, e.g. on a time lapse or motion-detection basis.

Images may be monitored remotely when the computer is connected to a


network.

IP CAMERAS
IP cameras use the Internet Protocol (IP) used by most Local Area Networks
(LANs) to transmit video across data networks in digital form.

IP can optionally be transmitted across the public internet, allowing users


to view their camera(s) through any internet connection available through
a computer or a 3G phone

It Used For professional or public infrastructure security applications.

IP video is restricted to within a private network

INTEGRATED SYSTEMS
Integrated systems allow users to connect remotely from the internet and
view what their cameras are viewing remotely, similar to that of IP
cameras.

You might also like