StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Intelligent Building Management Systems Analysis - Term Paper Example

Cite this document
Summary
The object of analysis for the purpose of this paper "Intelligent Building Management Systems Analysis" is the form of construction that integrates distinctive modern-day information systems in order to allow for the easier flow of information throughout a building structure (Bernstein, 2004)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful

Extract of sample "Intelligent Building Management Systems Analysis"

Intelligent Building Management Systems Analysis Student’s Name Institution Intelligent Building Management Systems Analysis Definition Intelligent building management systems or rather BMS refers to the form of construction that integrates distinctive modern day information systems in order to allow for the easier flow of information throughout a building structure (Bernstein, 2004). Introduction Building management system facilitates a higher level of services related to business automation as well as telecommunications hence providing a stringent platform for automatic control, supervision management as well as effective maintenance of the numerous subsystems or services of a building in an effective and efficient way. In essence, intelligent building management systems stipulates a building mechanism that incorporates substantial levels of technological advancements as well as processess in order to develop a structure that is deemed to be more safer, comfortable as well as productive in nature for its immediate dwellers (Bernstein, 2004). Furthermore, it is deemed to be operationally efficient for the developers as well as the true owners. The adoption of a building management system technology integrates certain concepts, processess as well as materials that are focused on surpassing the normal expectations of the performances of the entire building stakeholders including owners and dwellers. The technology is considered to be viable enough to allow for a productive and safer environment (Bernstein, 2004). Significantly, it should possess the capacity to serve future dwellers by way of advocating for sustainability and adaptability over the different life cycles of the building as well as safeguarding unique environmental resource base. For this case, the paper examines the intelligent building management systems as well as the security’s manager considerations like building management system architecture, control basic systems among others. Security Managers’ Consideration of Intelligent Building Management Systems A security manager should strive to consider and comprehend the level of BMS capacities in regards to enhancing safety and comfort of users and other involved stakeholders. There are numerous concepts that security managers should comprehend at the very start of employing a BMS mechanism and structure. First, it is important that they comprehend the fact that integration is the immediate foundation of a smart-building (Siemens, 2012). The integration allows the connection of such fundamental building systems as lighting, power meters, heating as well as sensor and control systems. At a distinctively higher level, the concept should incorporate elevators as well as control systems in conjunction with some shading and top notch concepts like the integration of fire alarm systems needed for improving safety (Schneider & Rode, 2010). The smart building automation system facilitates smoke evacuation equipment to perform two distinctive functions (Siemens, 2012). For instance, in the course of normal operations, this system ensures effective conditioning of available space while improving the necessary outdoor air as postulated by the operating engineer. Secondly, in cases where a section of the building experiences smoke or a detector activates, the entire system will go back to the evacuation mode. Integration brings about intensive levels of gains like the case if a high security building that expects dwellers to swipe cards in order to gain building access (Siemens, 2012). On some specific days, these dwellers will only have at least 50 per cent of their personnel within the office. This information can be passed onto the HVAC system through the underlying building automation system hence preventing air dampers from bringing in unnecessary external air. In those days when there are a substantial number of unoccupied offices in the HVAC zone, the smart building management system might lead to the easement of temperature stipulations within the zone and thus, goes ahead to keep the lights off in the unoccupied offices (Siemens, 2012). Coordination of the communication platform might go in hand to integrate sensors of carbon dioxide and security sensors into performing an almost similar capability. The security managers should also comprehend the fact that integration will always ensure a reduction of the peak demand. In this regards, the building management systems (BMS) abilities assist the facility’s security managers to control energy costs in an effective manner. Perfect examples of a corporation facility manager that have effectively related to this feature include the MGM Resorts International, which possesses extensive numbers of hotels with numerous types of building automation systems (Siemens, 2012). Such other constructions like the Leslies’ posses a building management system (BMS) positioned with The Mirage that employs a load-shedding program features in order to keep from possible operations in the course of peak demand periods. Consequently, security managers should consider the fact that building management systems leads to productivity improvements as well as tenant retention mechanisms. It is important to note that one of the fundamental benefits of a given building management systems (BMS) rests with the improved productivity (Siemens, 2012). Some of the notable considerations that the security manager should adhere to while ensuring consideration of building management systems (BMS) include the following items; i) Control System Basics The basic control system is made up three sections that include; sensors, controller and controlled device. A sensor works in conjunction with the controller so that any possible information related to the measurements of room temperatures is fed into the underlying controller (Sharples, Callaghan & Clarke, 1999). In a real life scenario control systems will always have more than a single input and output signal. Security managers should comprehend the fact that these systems can conjoined into a set of groups or even configured sequentially in order to allow a single controller to utilise other controllers’ output signals as being input signals. At this stage, two distinctive formats of information can be postulated; the digital and analogue platform. A digital platform can be used in ensuring that a certain engine is operational or not while the analogue will be employed to ascertain whether the ever-changing or modulate operational environment (Sharples, Callaghan & Clarke, 1999). Notably, the newer controller logics operate under a software program that helps calculate its output values. Different types of controllers are used for different functions. Consequently, operators and maintainers are expected to tune the controllers as well as devices in order to prevent possible errors and instabilities (Sharples, Callaghan & Clarke, 1999). The security manager understands that the current controllers will always support the function to a certain degree; employing proprietary algorithms and artificial intelligence. For example, in the case where a radiator will be activated whenever it attains a 20 degrees and thereafter, turns on when it reaches a maximum of about 23 degrees. Figure 1: Control System ii) Architecture of the Building Management Systems The security manager ought to comprehend the architecture of the building management systems because it incorporates a significant number of different systems into a single controlled network. In fact, it is better to note that the creation of the microcontroller direct digital control systems replaced the traditional analogue control systems and thus, led to a distinctive network of intelligent and programmable devices that facilitates localised control functionalities (Loo, 2006). Any security manager that acts like a centrally-positioned supervisor will be able to monitor and control the aforementioned nodes from a distinctive position within the entire network. A standardised protocol will be used to integrate the activities of all other connections placed within a bus system (Loo, 2006). The devices as well as networks that are in communication with other protocols will likely be linked to an appropriate communication interface or gateways. At times, bridges will be employed in order to segment networks and thus, regulate the level of traffic that is positioned within a network platform. The manager should consider the fact that packaged units are sometimes applied in cases where fundamental controllers are interlinked with the network while its devices are controlled by the basic unit at hand (Loo, 2006). It will also be important for the security manager to ascertain that the current European Committee for Standardization divides communications for building management systems into three-distinctive platforms that include; the Management, Automation and Field levels (Van Eck & Laborato, 1985). These layers perform in a way that the field level sensors and actuators will always communicate with one another without perceiving the need to send information to a higher level. These three levels of building management systems architecture is employed throughout the proceeding parts in order to avail distinctive risks attributed to both the software and hardware devices (Loo, 2006). Figure 2: BMS artichetecture iii) Manufacturers of Building Management Systems The security manager should further consider evaluating the different types of building management systems manufacturers in the current market. In fact, possessing knowledge of the underlying manufactures showcases their respective technical expertise as well as business pliability. The three well known manufacturers include; Siemens, Honeywell and Schneider Electric (Loo, 2006). Siemens avails products that are distinctively tailored in order to meet the current building automation systems and HVAC related items like low-voltage power distribution as well as customised security and overall building solutions. iv) Improved productivity and tenant retention Security managers should comprehend that one of the single-most advantage of a building management systems rests with the improvement of productivity. The formulation of the Los Angeles Convention Centre operating framework on building management systems has enabled a trouble-shooting platform that saves a great amount of time and also, allows the imminent operators to mend possible faults on time (Siemens, 2012). In essence, building management systems will always function better than convention ones. The integration of a building into a single platform for all operating capabilities allows them the ability to monitor whatever that is happening in each section of the building. It means that the building staff can be effectively responsive to affect tenant comfort. Significantly, the maintenance shutdowns could be arranged efficiently as opposed to risking possible unexpected disastrous failures of the entire building management system. The automation building management systems can utilise fairly-accumulated run times of distinctive equipment as a way of propagating work orders for customary services as well as maintenance activities in operations (McGowan, 1995). For this reason, building management systems can be deemed to be significant level of assets useful for leasing all other efforts. A security manager should thus establish the fact that a correctly designed and implemented building management system can be the perfect tool they or operators can have at their immediate disposal. v) Reduced Costs, Security Gains In the modern construction era, building management systems can effectively cut down on imminent capital costs and enhance security gains. In effect, buildings require substantial equipment rooms as well as cabling platform and pathways (Siemens, 2012). However, with the adoption of a building management system, it is possible to reduce these cables and pathways by way of incorporating numerous infrastructures. Noticeably, it allows for imminent savings especially whenever fire alarm systems are integrated within the building automation systems. Most importantly, it leads to a reduction in design costs hence saving lots of resources since the building can now utilise the fire/smoke dampers as opposed to installing split automation dampers (Siemens, 2012). It also helps to minimise the possibility of conducting intensive wiring and goes ahead to point within the entire building automation system. Integration processess in building management systems can also be utilised to enhance aspects related to safety and security. For example, modern-day learning institutions have opted to incorporate their respective building automation system with both fire and life safety systems in order to ensure sufficient security in the case of an emergency (Siemens, 2012). For instance, a building automation system can be employed to lock distinctive doors to certain areas and it can be further integrated with a mass notification system in order to avail crucial information to the people situated within affected regions. vi) Building Automation Capabilities A security manager should consider an organisations’ building automation capacities because it forms a platform for the creation of integrated building management systems. Constructions developed under the building automation systems avails informational data that range from temperatures as well as humidity readings to all motor statuses within the building management systems (Brooks, 2009). It is important to note that the building automation system will also involve energy optimisation capacities. For instance, with the formulation and implementation of a start/stop, a building automation system will always learn to regulate times for allowing air conditioning systems on line for a certain sector within the entire smart building. Another important feature of the building automation system is focused on the underlying electrical load shedding for demand-limiting situations (Diffie & Landau, 2009). In this regards, electrical loads are integrated into distinctive groups from a crucial to high-priority to non-essential platforms. In the event that there is a rise in building load and it is deemed to be fast-approaching high limit settings, the non-essentials loads are turned off within their sub-groups order and thereafter, followed by the high priority loads (Brooks, 2009). The building management system has the capacity to position the building automation system to a distinctively higher newer level using such elements as open protocols, standardised databases as well as middle ware that can adopt data points and also, normalise them to a certain normal database (Brooks, 2009). Markedly, dashboards are thereafter prepared for different levels of groups as the concept expands to numerous stretches of a single well-integrated building. Incompatible protocols can pose a significant level of challenge but nowadays that needs to be a matter of concern for security managers. In fact, with the current open protocols like BACnet and its immediate updating, the worry has now become a lesser issue to address (Brooks, 2009). It is critical that integrated automation systems require open protocols on each layer so that in cases of issues, every little item that ranges from a single valve to a computer machine can be dissembled and improved (Brooks, 2009). In reality, each and every connection requires to be opened and allowed to communicate with other third-party software within the entire building management systems. Subsequently, it is important to ascertain that fundamental communication protocols employed in all building controls possess certification processess that ensures interoperability functions. For example, BTL Mark developed by BACnet Testing Laboratories stipulates that any devices with a mark appropriately implemented required distinctive listings (Brooks, 2009). vii) Building Management Systems Hardware A security manager should be concerned with the numerous building management systems that occur in the present-day market. In fact, it should be comprehended that a characteristic building management systems system should be composed of numerous components positioned within the automated system as well as in the structure’s plant and equipment (Brooks, 2009). The system is split into the three levels of architecture; management, automation and field levels. The manager should understand that the management level is composed of the human interface, servers as well as routing devices that are all interlinked to the Ethernet communication platform. On the contrary, the automation level avails numerous primary controls as well as supplementary room automations that are interlinked to controllers by way of an already twisted-pair of cables as well as BACnet (Brooks, 2009). Conversely, it is important for the security management to understand that there is no single methodology to the effective application of building management systems hardware. This is related to the fact that incorporation of building management systems items will definitely depend on the users as well as its building requirements as well as system complexities. A perfect example is whenever there arises a division of the BMS into the aforementioned architectural bases (Panke, 2001). A two-level building management systems approach application avails a perfect platform for hardware separation however; it fails to consider the immediate applications of software (Brooks, 2009). On the contrary, a typical three-level division of hardware advancements are presented in regards to a general architectural approach within an entire building section. viii) Building Management Systems Hardware Challenges A security manager should be concerned with the numerous levels of risks attributed to the building management systems since formulation of a protection framework for the hardware will definitely allow for overall protection of the entire system. Device access vulnerabilities depend on the types of devices positioned differently within the entire building management systems. Attacks might be posed to the different levels of the system especially the management level that can avail imminent access to the entire building management systems network and might trigger damage to the Ethernet communication platform (Frost & Sullivan, 2001). Network access vulnerabilities will also depend with the type and position of the network as well as its immediate devices within a building. Attacks are also posed to three-level of building management systems architecture with management level posing a greater threat of network collapse in case of attacks. Another important feature might include; wiretapping, which is solely employed to access private-based communication data without any given permission as well as without any form of gaining notifications (Auddy & Sahu, 2008). Electromagnetic emanation attacks are imminent in intercepting as well as evaluating electromagnetic emanations within a set of limited data (Chan & So, 1999). These emanations might lead to electromagnetic interferences hence limiting data transfer for certain security features like radios. In a way to prevent possible attacks, all of the concerned devices and communication platforms should be protected from unauthorised physical access. Notably, security managers should ensure that all cables are protected from possible electromagnetic interferences (Auddy & Sahu, 2008). In cases where physical protection is deemed insufficient, encryption should be employed to ensure the protection of transmitted traffic. Internal and external interferences happen whenever there is failure to replace devices in the course of upgrades. Interferences might be distinctive with devices like controllers possessing an 8MByte of Random Access Memory that can be extended to at least 128Mbyte. Conclusion To sum up the discussion above, it can be noted that BMS is the form of construction that integrates distinctive modern day information systems in order to allow for the easier flow of information throughout a building structure. It facilitates easement within the security management docket and thus, security managers should be concerned with analysing such attributes like control system basics, building management systems hardware and its challenges, building management systems architecture and its immediate manufacturers as well as its capabilities. They should also ensure to find out whether building management systems reduces costs and enhances security gains as a result of different approach of improvements. References Auddy, A., & Sahu, M. S. (2008). Tempest: Magnitude of threat and mitigation techniques. Proceedings of the 10th International Conference on Electromagnetic Interference and Compatibility, 603‐611. Bernstein, R. (2004). Green buildings: Delivering energy efficiency through intelligent controls Retrieved on May 25, 2015 from http://lmjapan.org/news/latest/pdf/090612_03.pdf Brooks, D. J. (2009). Intruder alarm systems: Is the security industry installing and maintaining alarm systems in compliance to Australian Standard AS2201? Security Journal, DOI: 10.1057/sj.2009.12, 1‐17. Chan, W. L., & So, A. T. P. (1999). Intelligent building systems. Berlin: Springer. Diffie, W., & Landau, S. (2009). Communications surveillance: Privacy and security at risk. Communications of the ACM, 52(11), 42–47. Frost & Sullivan. (2001). North American building automation systems markets. Boston: Author. Langston, C., & Lauge‐Kristensen, R. (2002). Strategic management of built facilities. Boston: Butterworth‐Heinemann. Loo, L. (2006). Intelligent building automation system. University of Southern Queensland. Dissertation Paper: Faculty of Engineering and Surveying. Retrieved on May 25, 2015 from http://core.ac.uk/download/pdf/11036310.pdf McGowan, J. J. (1995). Direct digital control: A guide to distribute building automation: Fairmont Press. Panke, R. A. (2001). Energy management systems and direct digital control: Prentice‐Hall. Siemens. (2012). Improving performance with integrated smart buildings. Industry White Paper. Retrieved on May 25, 2015 from http://www.usa.siemens.com/intelligent-infrastructure/assets/pdf/smart-building-white-paper.pdf Schneider, D., & Rode, P. (2010). Energy renaissance. High Performance Building Magazine, 13‐16. Sharples, S., Callaghan, V., & Clarke, G. (1999). A multi‐agent architecture for intelligent building sensing and control. Sensor Review, 19(2), 135‐140. So, A. T. P., & Wong, K. C. (2002). On the quantitative assessment of intelligent buildings. Facilities, 20(7/8), 288‐295. Van Eck, W., & Laborato, N. (1985). Electromagnetic radiation from video display units: An eavesdropping risk? Computers and Security, 4, 269–286. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Intelligent Building Management Systems Analysis Term Paper, n.d.)
Intelligent Building Management Systems Analysis Term Paper. https://studentshare.org/information-technology/2065681-intelligent-building-system-vulnerabilities
(Intelligent Building Management Systems Analysis Term Paper)
Intelligent Building Management Systems Analysis Term Paper. https://studentshare.org/information-technology/2065681-intelligent-building-system-vulnerabilities.
“Intelligent Building Management Systems Analysis Term Paper”. https://studentshare.org/information-technology/2065681-intelligent-building-system-vulnerabilities.
  • Cited: 0 times

CHECK THESE SAMPLES OF Intelligent Building Management Systems Analysis

Analysis of a Bankruptcy for a Firm

itzpatrick (1931) used the approach of using ratio analysis to compare bankrupt and successful firms.... He applied multiple discriminant analysis to 33 pairs of bankrupt and successful firms....  This essay discusses bankruptcy for a firm its inability to meet its contractual commitments The two most important factors in a bankruptcy are the extent to which a firm's debt exceeds its assets, and its inability to pay its debt as it comes due....
4 Pages (1000 words) Essay

Capital Funding in School Districts

Some of the school buildings have failing roofs, broken boilers, asbestos contamination, structural problems, inadequate fire safety systems,… water treatment systems, faulty electric, and pest infestation etc ; all causing problems to the safe and secure learning process of the school children.... It is difficult for the school management or the authorities to find funds for the renovation or replacement of the school buildings from the tuition fees alone....
4 Pages (1000 words) Research Paper

Business Intelligence

TESCO the decision-driven organization building a system             In To back to the winning ways, TESCO will have come to excel at decision making and execution.... They should put their focus into building an integrated system that supports a decision-driven organization....
11 Pages (2750 words) Essay

Decision Support and Business Intelligence Systems

Mattison (2006), on the other hand, defines data warehouse as consisting of large… oup of computer initiatives whose major goal is to dig out information from legacy systems and make it usable to business persons, supporting their endeavor towards cost reduction and revenue advantage.... Incorporation of data from a number of different sources into a repository ta hub, storing not only current data, but also historical data to be used for developing trending reports so that the management can use the reports for comparisons, even if it the comparisons are annual, quarterly or even semi-annual....
6 Pages (1500 words) Essay

Intelligence Community

The essay “Intelligence Community” aims to identify the causes behind the intelligence failure of 9/11 and also assess how can this be corrected in near future so that threats relating to national security can be addressed and mitigated by a considerable degree.... hellip; The author states that it can be apparently observed that there exist various causes that eventually led towards the failure of the Intelligence Agency of America....
8 Pages (2000 words) Essay

Business analytics

POS and other devices use business Analytics software to gather sales information and marketing data, which is then transferred to an Oracle database for analysis would help organizations have robust information of their business processes and assist them monitoring the progress of their business in the terms of sales, revenues, inventory management, staff allocation, location of the business in terms of which is profitable or unprofitable, and also gives them the head start to mitigate any risk....
4 Pages (1000 words) Research Paper

Business Intelligence

The main applications of the business… ntelligence techniques relates to the analysis of data regarding the business internal operations and functions, its customers and also its competitors.... The most common types of Business Intelligence techniques that are applied by businesses include the data mining techniques, statistical analysis, online analytical processing (OLAP), forecasting techniques and the basic query and reporting technique (Stackowiak, Rayman & Greenwald, 2007:21)....
4 Pages (1000 words) Essay

Data Warehouse and Business Intelligence Implementation

It runs from hierarchically from the executive sponsor all the way to the development staff, data modeller and the analysis of the specific business.... The process is necessary for data extraction as well as in connecting in transaction systems of a single or multiple numbers of systems.... They include the user of the data produced, the change and marketing management, the ETL (Extract, Transform and Load), the metadata, the business on board, the model of data, the executive sponsor as well as the team to the project....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us