StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Process Architectural Design - Essay Example

Cite this document
Summary
The writer of this document covers the definition of the fire monitoring system as well as the fire security equipment. The software described by the software requirements specification runs on the fire security equipment and control the equipment too…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Process Architectural Design
Read Text Preview

Extract of sample "Process Architectural Design"

Process Architectural Design The fire and security monitoring system is meant to manage, and to monitor the fire security alarms in a building. In order to best understand how this system works, it is only prudent to define its design both in terms of the software and the hardware components that it is made up of; we have to know how the systems components relate to each other and functions of every component involved in the working of the whole system that is controlled from the central point of security monitoring (Robinson 2009). This document covers the definition of the fire monitoring system as well as the fire security equipment. The software described by the software requirements specification runs on the fire security equipment and control the equipment too. When designing the system, we assumed that the system acts in real time and does not respond on false alarms. It is also assumed that the system is self-diagnostic and does not fail when in use (Bukowski 2009). A large building requires an automated alarm system to monitor and control all fire and security alarms within the building. The building is sub-divided into zones, and a given number of alarms are associated with each zone. Alert for a central manned control area is provided by the alarm. This centre may may respond personally or pass these on to the emergency services. Automated alarm system helps recognizing the risk and allows quick response. Fire and security alarm systems are often active to ensure that whenever there is a fire, the presence of the fire is immediately established and reported through the interactions of the software and hardware components of the whole system (BFPE International n.d.). The software components of the system work to manage the various different hardware components, which are associated with the alarm, which is installed to notify the necessary authorities to go to the attention of the fire and put it off. In modern equipped facilities, and in modern buildings, fire alarm and security systems are always associated with the whole security systems of the buildings. These systems work in tandem with them most of the time (Robinson 2009). This interaction is necessary to ensure that catastrophes do not happen; or in any case, they do happen, they can be attended to in due time. When a fire starts in such a building, one of the hardware components detects it through one way or another as will be discussed later on in this document. The component coordinates with another component in the system to notify or to activate something or an action of the surveillance system and even the security system. In a typical fire and security alarm system, components are installed in such a way that they are according to the specifications of the devices and make it easy to access them when the need arises (Robinson 2009). The hardware components that have to be in a fire alarm and security system include: 1. The control system – this is the central component of the entire fire alarm system. It is known as the fire alarm central. This component allows for the precise programming of the manner in which the other individual components behave, hence the behavior of the entire system can also be programmed. This makes sure that notification come in at the precise time and accurately as possible in case of an event. The fire alarm central has points of input; with which it receives signals from the devices that initiate notifications, as well as points of exit; that it uses to activate alarm systems. 2. The initiating and the alarm devices – the initiating devices can be automatic as smoke/fire detectors or can alternatively be manually actuated to notify the central. 3. The power supply and the cabling – it is critical to have a very reliable power supply for a fire and security system so that it remains on at all times. Power back up systems must be installed just in case the main power systems fail. The signal cables are the ones that make the connection and links between each and every component that the system has and the central. The fire alarm system is also integrated with the security systems. Communication between these systems can be made to work with notification tools that can be controlled remotely. 4. The suppression devices – these are the sprinklers and other devices that contain chemicals and gasses that put out fire. The software components of the fire and security alarm system include: 1. The status reporter interface – this shows what the status of the system is. Used at the central point of fire and security alarm monitoring system. 2. The input component – used by the administrator to turn the system on, and shut down the alarm in case of a false alarm. 3. The heat and smoke response components – these receive the stimuli and respond in case there is a fire or if there is smoke and send the necessary notifications to the other components of the system to start the alarm. They are found on the different hardware devices all around the building; for instance on the fire detector hardware devices and the smoke detector devices. 4. The component that controls the modes that the systems works in at any one time. The system can be in different operational modes depending on the state it was started in and depending on the response it receives from the hardware at any one time. Operating Modes: Start-up mode: This is when the system is turned on. The system will run various test to determine that the system is fully operational and fault free. Once all the start-up procedures are successfully completed, the system will run in activated mode. Activated mode: The system is in a state of constant, automatic monitoring and threat detecting. If a threat is detected then, the system will switch to operate in threat mode. Threat mode: The system identifies a threat and follows a set procedure. The system also takes into account that if a security threat has been detected it must make sure there is no current fire threat happening in the same zone. If a fire threat has been detected in the same zone, the security threat is cancelled until the fire threat has been completed. Update mode: The system is still running in activated mode while the update is in motion, but when the update is ready to be installed, the system is de-activated until the new software update has been installed, thus enabling the system again. The Reset mode: The system gets reset back into start-up mode. 5. The self-diagnosis unit or component – does the testing of the other components of the system to see if it works well without any problem at all. 6. The alert component – controls the alarm. It sets off the alarm depending on the mode in which the system is set to run on. 7. The critical shutdown component – shuts down the systems in case the electrical systems are in danger of getting compromised by sprinklers and water. Reusable elements and how ‘information hiding’ has been addressed The sensor controller element is a reusable component used in the fire alarm system, as well as the intruder alarm system, a timer device (Law 1999). This element can be both software and hardware. All the embedded devices that require time service in the entire fire and security alarm system can use the reusable element. Given this fact that the systems work in real time, the users do not need to put in any form of input apart from the time the system is turned on and the time it reboots after a crash or a breakdown. Information hiding is achieved through the fact that the system is able to work on its own without the need for explanations of how it works to the users and the other operators. Interface Specification User interface specification – security officers can use the system even if they are not trained or if they undergo a short training period. This is simple enough that, after the short training period, there can be no room for making errors. Hardware interface specification – the system receives signals from the fire detecting systems like heat and the smoke detectors that are installed in every room of the large building; the detection systems also include the manual buttons that the system has. The system also receives signals from the movement detectors so as to be able to confirm whether there are people in the lifts and other specific zones. The system also sends signal s to activate also to deactivate the various appropriate fire protection systems. The interaction of the system’s components is based on various true or false statements of the software. Communications Interface specification –the system is able to use the phone line in order to be able to alert the emergency services when necessary. Modular decomposition, control and data – The system is made up of various modules and objects. Among them, we have: 1. The security guards – they use the system to help them to detect intruders in the building. 2. The fire and smoke detection objects – they are responsible for the detection of the dangers; fire and security breach 3. The response, or emergency officers – respond when the alarms go off from the building. The non-functional units help us to get an idea of what the user of the system should gain from the system in the most appropriate way possible (Z. Liu 2001). These none—functional units like flexibility, reliability, ease of use, and so on are very important when thinking of the user. The system should respond in real time and within the given set of time without of failure. The need for such a system; a system that is timely and is reliable makes the design process easy as we know what requirements we need from the system (Grosshangler 1992). The system should be able to reboot in a period of not more than 5 minutes. When making the design this should be taken into consideration because alarm systems should not be down for long lest it be taken advantage of by burglars and notifications about a fire are not received in time. These are the performance requirements of the system. The other non-functional requirements that help in the design process are safety requirements of the system. According to these requirements, the system should not fail because of anything like a software crush. If there are any conflicts regarding procedures, the system should be able to contain it without any problem. Works Cited BFPE International, Fire Alarm Systems, viewed 25 February 2012, . Brandenburg, L 2009, How to create a user interface specification, viewed 25 february 2012, . Bukowski, R 2009, The History of Fire Alarm Systems, Hamptons Press, New York. Chan, S 1991, 'A Computer Vision Based Power Plant Monitoring', Power System Control, Operation and, November 1991. Cholin, JM 2006, 'Investigation into the Application of Duct Smoke Detectors in Heating, Ventilating and Air', Thesis, Fire Detection Institute, Cambridge. Grosshangler, WL 1992, 'An Assessment of Technologies for Advanced Fire Detection', Heat and Mass Transfer in Fire and Combustion Systems, December 1992, pp. 1-10. John, M 1994, 'International Developments in Fire Sensor Technology', Fire, February 1994, pp. 89-98. Law, T 1999, 'Options within Intelligent Fire Detection Systems', Fire Safety, June 1999. Robinson, JN 2009, Solving the System: Integrated Fire Alarm Monitoring, viewed 25 February 2012, . Shepard, L 2010, Commercial Fire Alarm Systems, viewed 25 February 2012, . Top Surveillance 2012, Security Surveillance System - Top Surveillance, viewed 24 February 2012, . Wang, AJ 2009, Component-Based Software Development Lab (CBSD), viewed 25 February 2012, . Z. Liu, JMAAKK 2001, 'Development of Fire Detection Systems in the Intelligent Building', Research, Institute for Research in Construction, Ottawa. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Process Architectural Design Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.org/architecture/1395440-process-architectural-design
(Process Architectural Design Essay Example | Topics and Well Written Essays - 2000 Words)
https://studentshare.org/architecture/1395440-process-architectural-design.
“Process Architectural Design Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/architecture/1395440-process-architectural-design.
  • Cited: 0 times

CHECK THESE SAMPLES OF Process Architectural Design

Impact of CAD Development on Architecture

The evolution and development of CAD has significantly impacted on architectural design.... This paper highlights the evolution as well as the transformational impact of computer aided design on the architectural design process.... Prior to the evolution and development of CAD, architectural design was primarily a hands-on process that involved a variety of manual and physical media tasks.... Impact of CAD development (Evolution) on Architecture Other name (s) Course Abstract Modern architectural are increasingly using a number of CAD software for various applications such as to improve the design quality, improve the productivity of designers as well as to enhance communication through documentation....
13 Pages (3250 words) Term Paper

From vision to virtual to real: how real is cyber-architecture

With it, man has started to visualize and with that, efforts in the right direction are being made to actually make the dreams see the light of the day.... This has happened in the 1990s era and to date it is… The future looks bright too since a lot of development has already been made in this path....
24 Pages (6000 words) Essay

Is information technology applied in architecture creating a revolution in design and its process

This dissertation aims to explore how technological evolutions have not only caused social, political and cultural revolutions in the past but continue to do so especially in the field of architectural design.... Essentially it is evident from the modern conventions of architecture that the traditional gap between drawing and building is non existent now and throughout my research paper I have explored the idea that digital design and digital fabrication are now evident of “seamless production” rather than creative transformation all of which was the conventional perception of architectural practice....
40 Pages (10000 words) Essay

Fabrication in architectural design process

This transition that is always executed after the completion of the design process is possible with the If a 3d printing or other fabrication method is employed, then there is the need to convert into a particular file for the sake of digital models.... Free form shaped design in the design stage for countless unique components need some rationalization of the structural constituents so that they are materialized into buildings.... In post-rationalization period, the structural system has been assigned to the already polished designs that at times need compromising final form of design (Laseau, P, 1980)....
12 Pages (3000 words) Thesis Proposal

Comparison Between Roman and Greek Architecture

A distinctive characteristic of Roman design can be identified with the blended utilization of arcuated and trabeated design layouts with arches reinforced with post.... By means of preserving and acquiring our very own architectural heritage, we establish an invaluable Subsequent, to the establishment of the Roman Republic in the 5th cent B.... The Romans pilfered from the Greeks and Etruscans and in addition developed an architectural model which was exclusively their own....
6 Pages (1500 words) Research Paper

The Role of Security Professionals in the Architecture Design Process

… The paper "The Role of Security Professionals in the Architecture design Process" is a brilliant example of a term paper on design and technology.... The paper "The Role of Security Professionals in the Architecture design Process" is a brilliant example of a term paper on design and technology.... The themes are based on the eight research questions guiding the study, which is to examine the role of security consultants in the architecture design process and to explore the relationship between the security professionals and the architects in the architecture design process....
24 Pages (6000 words) Term Paper

Beaux-Art and Architectural Design

… The paper "Beaux-Art and architectural design" is a worthy example of an essay on architecture.... The paper "Beaux-Art and architectural design" is a worthy example of an essay on architecture.... Ancient decorative techniques have also been used in the Beaux architectural design in the modern era.... Some of the areas where the design has been applied include the designing of monuments.... Beaux technique incorporates a high degree of symmetry and unique celebration of structures in the design....
7 Pages (1750 words) Essay

Beaux Arts as an Architectural Concept

It argues that beaux artwork is among the best architectural styles, and one would be justified to apply the artwork style in any building design.... The use of Beaux Arts styles in decorating the already existing buildings and newly constructed buildings makes the style the only concept that the design lacked.... The aim of these techniques is to improve the beautiful nature of the building and make the design more marketable and presentable....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us