1. Explain Centralized Air Conditioning?
Introduction : Centralized systems are defined as those in which the
cooling (chilled water) is generated in a chiller at one base location and
distributed to air-handling units or fan-coil units located through out the
building spaces. The air is cooled with secondary media
Central air conditioning systems serve multiple spaces from one base
location. These typically use chilled water as a cooling medium and use
extensive ductwork for air distribution.
Sub systems of centralized AC
a) Chilled water plant
b) Condenser water system
c) Air delivery system
Chilled Water System
The chilled water system supplies chilled water for the cooling needs of all the
buildings air-handling units (AHUs)
The system includes a chilled water pump which circulates the chilled water
through the chillers evaporator section and through the cooling coils of the
AHUs.
Condenser Water System
refrigeration system must also reject the heat that it removes.
There are two options for heat rejection:
1) air cooled &
2) water cooled
Air Cooled Unit Water Cooled Unit
Air cooled units absorb heat from the indoor space and rejects it to ambient air.
Parts:
a) Condenser
b) Compressor
c) Propellor fans &
d) Controls
These are the most common system used in residential and light commercial
applications. Water cooled units absorb the heat from the indoor space and
rejects that heat to water which in turn may either reject heat via fluid coolers
or cooling towers, or dry air coolers with adiabatic kits.
o higher coefficient of performance (COP).
o most common
o multistory offices, hotels, airports and shopping complexes.
Air Delivery System
Air is drawn into a buildings HVAC system through the air intake by the air
handling unit (AHU). Once in the system, supply air is filtered to remove
particulate matter (mold, allergens, and dust), heated or cooled, and then
circulated throughout the building via the air distribution system, which is
typically a system of supply ducts and registers.
System Types
The Central system category could be further broken down into the following:
Central systems with CAV air-handling units
Central systems with VAV air-handling units
Central systems with fan-coil units (All- Water systems).
CAV Systems (Constant Air Volume)
CAV system is an all-air system which accomplish cooling and heating by
varying the supply air temperature and keeping the air volume constant.
The system works well and maintains comfortable conditions in spaces with
uniform heating and cooling requirements.
VAV Systems (Variable Air Volume)
Variable Air Volume (VAV) system is an all air
system which can satisfy the individual cooling requirements of multiple
thermal zones.
This is achieved by supplying air at a constant temperature from central
plant to one or more VAV terminal units in each zone and adjusting the
amount of supply air to meet required cooling loads.
The primary benefit of VAV over constant volume systems (CV) is its ability
to simultaneously provide the required level of cooling to any number of
zones within a building.
2)Integrated Building Management System (IBMS) in Heating
ventilation air conditioning (HVAC)?
Chiller Plant Management
Chiller/pumps sequencing.
Chilled Water Return Header Temperature
Optimization of chiller use.
Integration with chiller microprocessor panel
BMS Integration for monitoring
Facility manager for Chillers to view the data remotely and in graphical
format
Includes field accessories such as sensors, valves Etc (Depends on project
specification)
chilled water is often used to cool a building's air and equipment, especially
in situations where many individual rooms must be controlled separately,
such as a hotel.
A chiller lowers water temperature to between 40 and 45F before the
water is pumped to the location to be cooled.
Air cooled chillers
A heat exchanger using air, refrigerant, water & evaporation to transfer
heat (BTUs) to produce air conditioning ( measured in tons).
Chiller is comprised of an evaporator, compressor, condenser & expansion
valve system
There are 3 primary pumps, two working & one stand by on a common pipe
line, Any pump should be workable with any chiller,
There are motorized isolating valves which should be activated across the
working chiller.
primary should should be started & then command should be given to the
motorized isolating valve to open.
After open position of the valve is identified, then the command to start
the chiller will be issued,
chiller must have a water flow switch which will finally determine to allow
the chiller to run or not.
plant manager is planned for the chillers & will be integrated with BMS to
monitor the chiller parameters.
Through BMS, chiller will be switched ON/OFF & will be hardwired.
chiller sequencing through differential temperatures on the supply &
return header.
the above data log will be used for BTU meter to be installed in return
water header after the de-coupler line from the chiller.
outside air temperature & humidity sensor will be installed as a global
reference for all HVAC measurements.
secondary pumps are run by VFDs,
pressure tranducers & the VFDs are packaged & supplied by the HVAC
contractors.
Air handler, or air handling unit (AHU)
An air handler, or air handling unit (often abbreviated to AHU), is a device used to
condition and circulate air as part of a heating, ventilating, and air-conditioning
(HVAC) system.
controls temperature,
controls humidity,
controls pressure & air exchange
Field device that has IBMS scope
a) Temperature sensors
b) Co2 sensors,
c) Differential pressure switch,
a) Temperature sensors
resistance temperature detectors (rtds), are sensors used to measure
temperature by correlating the resistance of the rtd element with
temperature.
Features & benefits
Monitors temperature, humidity, pressure, air quality and air velocity
Available in a wide range of sensing values,
Supports all popular control signals,
Provides high accuracy for best energy savings,
Offers high reliability for long sensor life,
Installs easily with flexible mounting accessories.
Quick-sensing response time,
Requires no calibration or maintenance,
Wires easily to terminal blocks.
b) Co2 sensors
A carbon dioxide sensor or CO2 sensor is an instrument for the
measurement of carbon dioxide gas. The most common principles for CO2
sensors are infrared gas sensors (NDIR) and chemical gas sensors.
Measuring carbon dioxide is important in monitoring indoor air quality and
many industrial processes.
Applications
Excellent performance CO2 Sensor, for use in a wide range of applications,
including air quality monitoring, smoke alarms, mine and tunnel warning
systems, greenhouses, etc.
The sensor is easy to use and can be easily incorporated in a small portable
unit.
Features
High Sensitivity
Detection Range: 0 - 10,000 ppm CO2
Response Time: <60s
Heater Voltage: 6.0V
Dimensions: 16mm Diameter, 15mm High excluding pins, Pins - 6mm High
C) Differential pressure switch
Filter monitor or flow switch for air, non-combustible, non aggressive
gases in air conditioning and ventilating installations.
APPLICATIONS
Monitoring air filters and ventilators
Monitoring industrial cooling-air circuits
Overheating protection for fan heaters
Monitoring flows in ventilation ducts
Controlling air and fire-protection dampers
Frost protection for heat exchanges
overpressure, relative
Kind of pressure
plastic connection piece for 5
Pressure connection
mm (internal) hose
AMP connector 6,3x0,8 (DIN
Electrical connection
46244) or screw terminals
Protection class IP54
Sensing element material ABS + Silicon
Media temp. -20 ... 85 oC
Ambient temperature -20 ... 85 oC
SPDT switch 240 Vac; 1,5 A
Switch function/capacity
(0.4)A
CE0085AR0013 according EC
Gas Appliance Directive
Certificates
EU/2009/142/EG and DIN EN
1854
Max. pressure 10000 Pa
BTU Metering
Air conditioner capacity is measured by "BTU". BTU stands for British Thermal
Units.
BTU Metering: Measurement is carried by placement matched pair temperature
sensors in the supply and return water lines of the AHU and flow is monitored.
The flow and temperature readings are used to evaluate the BTU consumed on a
continuous basis. All the parameters are transferred to the central system
through the M-BUS to monitor the AHUs efficiency / BTU Consumed.
Consists of
Flow meter inline turbined impellers / Jet type/Electro magnetic/ultrasonic
types
Heat Integrators
Matched pair temperature sensor with pocket for insertion
Local data logging
Local digit LCD display
M BUS O/P
M-BUS Automation Gateway
3)Perimeter Protection security
Outdoors mechanical and/or electronic systems conceived to protect the external
perimeter of a facility.
A F P
Access control Fence Physical
B Future Fibre security
Boundaries of Technologies R
Security G Restricted-
Report Glass break access barrier
C detector system
Chicane H Rope line
Crowd control Home safety S
barrier I Safety barrier
E Iron railing T
Electric fence M Temporary
Electric gates Mantrap fencing
(access W
control) Wattle
(construction)
GATES & BARRIERS CONTROL
Boom barrier controls entry & exit of vehicles.
if a vehicle wants to enter, the specific card has to be accessed &
information has to be sent to the panel.
The relay in panel which is usually in normal open ( NO) becomes normally
closed (NC) & thus boom barrier opens & allows the vehicle.
Main Benefits :
Single-user, un-manned automatic access control,
Indoor or outdoor perimeter security
Safe, simple and effective equipment for demanding, prolonged use,
Reduced maintenance and security costs,
Long-term investment based on exceptional durability
Swipe, proximity , biometric acceses control scanners can be used to
grant access to a secured site.
gates , barriers & traffic lights can also be linked to integrated security
systems & remote CCTV systems.
What is electric fence?
Electric fence is a physical and psychological barrier to deter animals or
people with high voltage pulsed shock.
There are two kinds of electric fence,one is for agricultural and the other
for home security.
Tongher offers home security fence energizer for integrated,such as
conjucted with CCTV camera,alarm system,sensor,etc.
Theory of electric fence
The shock current travels through the
body and into the earth ground where
they are standing.
The effect of the shock on the people
depends on the amount of shock
current, the duration of the shock, and
the body weight of the person.
How it works
1,Circuit complete
Pulsed voltage comes out from the energizer,to the fence wire,then goes through
the human body,to the ground,at last goes back to the energizer.
2,Factors affect the shock:Time of shock,Voltage,Current
Specification
Differential voltage output technology: every wire has
voltage, and differential voltage between the two adjacent
wires.
LCD or LED indicate the working state and the voltage on
every wire.
High/low voltage switch manually, long-distance auto switch
on/off.
Short circuit, break and tamper alarm, Self-inspection
System for equipment fault.
Waterproof casing and downward appearance design.
RS 485 bus control, keypad, computer, network and multiple
long distance management solution.
DC12V, NC/NO dry contact alarm output, can work with
other modern security products.
Solution
1,Self control smart solution
2,Keypad control solution
3,Computer control(Direct and network) solution
Benefit of using electric fence
1,Cost effective
2,Easy to install and maintain
3,Deter burglar and intrusion
4,Integrate with other security product
4) Advantages of IBMS
Key benefits & functions of Integrated Building Management System (IBMS)
Integrated building systems in a single, streamlined, multi-service network
infrastructure
IBMS integrated technology allows centralised and user-friendly control,
monitoring, maintenance, and management.
IBMS also allows efficient, streamlined data recording, reporting and
analysis.
IBMS also allows billing , building maintainance , security ,care ,
consumption trending & IT system maintainance for services.
IBMS allows data transmition that enables remote control & management
for data services.
IBMS also allows functional & safe environment & to save energy for users
& owners.
IBMS allows secure , solid data transmition & business transactions over
internet & e technologies.
IBMS modules allows autonomous measuring, control regulations,
scheduling & alarming functions .
IBMS sensors & actuators allows sensing, steering of HVAC device & local
user interfaces.
For highrise buildings Safety management in IBMS functions to monitored
and controlled by a computerized system where:
access card are required for entry into the building during or after office
hours.
other sensors such as motion or heat detectors, pressure sensors, door
switches and vibration sensors used to detect unauthorized entry.
All of these sensors and actuators are connected to field processors and
building management control.
A Building Management System (BMS) is a computer-based control system
installed in buildings that controls and monitors the buildings mechanical
and electrical equipment such as ventilation, lighting, power systems, fire
systems, and security systems.
A BMS is most common in a highrise building. Its core function is to
manage the environment within the building and may control temperature,
carbon dioxide levels and humidity within a building.
As a core function in most BMS systems, it controls heating and cooling,
manages the systems that distribute this air throughout the building (for
example by operating fans or opening/closing dampers), and then locally
controls the mixture of heating and cooling to achieve the desired room
temperature.
A secondary function sometimes is to monitor the level of human-
generated CO2, mixing in outside air with waste air to increase the amount
of oxygen while also minimizing heat/cooling losses.
Alarm management.
Better coordination of monitoring and control.
Facilitates quicker response time in respect to complaints.
Retaining central database for recording system history, information and
management pertaining to preventive maintenance.
improved administration and optimization of resources.
Graphic interface for controlling and commanding of all systems.
Perimeter fence or wall monitoring with video surveillance.
Building tenant/occupants
Good control of internal comfort conditions,
Possibility of individual room control ,
Increased staff productivity ,
Effective monitoring and targeting of energy consumption,
Improved plant reliability and life,
Effective response to HVAC-related complaints
Save time and money during the maintenance
Building owner
Higher rental value
Flexibility on change of building use
Individual tenant billing for services facilities manager
Central or remote control and monitoring of building
Increased level of comfort and time saving
Maintenance Companies
Ease of information availability problem diagnostics.
Computerized maintenance scheduling
Effective use of maintenance staff
Early detection of problems
More satisfied occupants
5)ACCESS CONTROL SYSTEM ( Biometric System)
Access control shall be implemented with proximity readers, control nodes,
electronic keys and electronic locks.
The access control system is connected to (BOS) Building Operating system for
full control and reporting, and integrated into the central user interface.
Electronic access control uses computers to solve the limitations of mechanical
locks and keys. A wide range of credentials can be used to replace mechanical
keys.
The electronic access control system grants access based on the credential
presented. When access is granted, the door is unlocked for a predetermined
time and the transaction is recorded. When access is refused, the door remains
locked and the attempted access is recorded.
The system will also monitor the door and alarm if the door is forced open or held
open too long after being unlocked
There are three types (factors) of authenticating information:
something the user knows, e.g. a password, pass-phrase or PIN,
something the user has, such as smart card,
something the user is, such as fingerprint, verified by biometric
measurement.
BIOMETRICS
Biometrics is the identification or verification of human identity through the
measurement of repeatable physiological and behavioral characteristics.
CATEGORIES OF BIOMETRICS:
Biometrics can be sorted into two classes: Physiological & behavioral.
Physiological : face , fingerprint , hand , iris , DNA.
Behavioural : key stroke, PIN, signature , voice.
Working & principle of biometrics
Biometric devices consist of a reader or scanning device software that converts
the gathered information into digital form, and a database that stores the
biometric data with comparison with existing records.
Fingerprint Verification
Finger print biometrics are the most widely adopted biometric technologies in the
industry.This is because the stability and uniqueness of the fingerprint are well
established, Fingerprint patterns: arch, loop, and whorl. Fingerprint landmarks
are also shown: core and delta.positions of scars and creases can also be used,
but are usually not used because they can be temporary or artificially introduced.
Hand Geometry verification
A biometric hand geometry device measures the shape and length of the
fingers and knuckles,
Such devices are useful for controlling access to a building with a limited
number of occupants,
They have also proven popular among time and attendance recording
applications
IRIS verification
Biometric technologies that analyze the eyes can be separated into two
categories: iris scanning and retinal scanning. The iris has a fine texture thatlike
fingerprintsis determined randomly during embryonic gestation Like the
fingerprint, it is very hard (if not impossible) to prove that the iris is unique.
However, there are so many factors that go into the formation of these textures
(the iris and fingerprint) that the chance of false matches for either is extremely
low.
Facial Recognition
Facial verification involves recognizing people by there:
Facial features.
Face geometry
Principle:
Analysis of unique shape, pattern and positioning of facial features.
DNA recognition
DNA has not been considered as a form of Biometric until recently. It dictates how
we look and develop; it serves as a full set of building blocks / 'blueprints' for each
person and is as unique as a fingerprint. DNA is short for Deoxyribonucleic Acid .
The use of DNA in biometric applications focuses on the nitrogenous bases which
are referred to as 'bases' for short. There are four distinct bases:
Adenine (A)
Cytosine (C)
Guanine (G)
Thymine (T)
Signature Verification
Biometric technologies that measure signature dynamics are often referred to as
dynamic signature verification (DSV) and they look at the way we sign our
names,.
DSV focuses on the method of signing rather than the finished signature and is
not based on a static image.
DSV can extract and measure a number of characteristics, such as the velocity
and acceleration of the signature, the pressure exerted when holding the pen, as
well as the number of times the pen is lifted from the paper,
The movement of the pen during the signing process rather than the static image
of the signature.
Many aspects of the signature in motion can be studied, such as pen pressure, the
sound the pen makes.
Voice Recognition
Voice recognition software that can recognize words and type a letter,
voice recognition biometric technologies measure the sound of a human voice
that is caused by resonance in the vocal tract, .
The sound of a human voice is based on the length of the vocal tract, as well as
the shape of the mouth and nasal cavities, Thus, these characteristics can
affect every sound made by a human.
ACCESS CONTROL SMART CARD
A smart card-based ID system also gives the cardholder control over who can
access personal information stored on the card.
A biometric further enhances this control, ensuring that only the rightful
cardholder can authorize access to personal information.
When used in combination with biometrics, a smart card ID becomes even more
personal and private. A biometric provides a strong and unique binding between
the cardholder and the personal database on the card, identifying the cardholder
as the rightful owner of this card.The biometric cannot be borrowed, lost, or
stolen like a PIN or a password, and so strengthens the authentication of an
individuals identity.
6) Types of CCTV, how it is installed and connected to single system?
CCTV, Closed Circuit Television, is a TV system that does not broadcast TV
signals to public but transmits them over to limited monitor(s).
CCTV utilizes video cameras(produce the video), cable (transmit the video),
and monitors(see the video).
CCTV system is applied mainly for the security and surveillance purpose
List of CCTV Parts and Accessories
1. Camera Package
* Camera body
* Lens
* Mounting Bracket
* Power source
* cable
Lens and Focal length
The focal length of a camera lens(convex) is the distance between the
center of the lens and the film or CCD pixel array.
The focal length of a camera lens is displayed on the barrel of the lens.
The focal length of a lens establishes the field of view of the camera. The
shorter the focal length is, the larger the field of view.
There are three types of lenses: standard, wideangle, and telephoto.
Lens mount
C-Mount Lens
CS-Mount Lens
Fixed Mount Lens
The distance between the rear flange of the lens to image sensor
is
17.5mm for C mount and 12.5 mm for CS mount
So we cannot use a CS mount lens in a Cmount camera but in a CS
mount camera we can use both CS mount lens and for C mount
lens we just use a 5mm spacer ring
Power source
12 V DC for dome camera
24 V AC for speed dome or PTZ camera
230 VAC for CCD Optix camera
Cables
Coaxial Cable is used to transmit video signals from camera to monitor.
RG59/U is commonly used.
It can run 450ft without loosing the video quality.
This cable is usually connected by BNC connectors at both ends.
Fiber-Optic Cable
It is not affected by electrical interference or high-voltage power. It
transmits video signals with high efficiency and can run upto miles. The
problem is that it is expensive and difficult to handle.
RCA Cable
It is not standard in the industry but used for short distances up to
250ft. Twisted wire is used for this purpose
Different types of cameras
Colour and B/W
NTSC and PAL
Fixed and Movable
C and CS mount
AC and DC camera
CCD and CMOS
Normal and wideangle
Working of video camera(CCD)
A CCD(charge coupled device) consists of several hundred thousand
individual picture elements (pixels) on a tiny 1/2", 1/3", or 1/4" chip.
Each pixel responds to light falling on it by storing a tiny charge of
electricity.
The pixels are arranged on a precise grid, with vertical and horizontal transfer
registers carrying the signals to the camera's video processing circuitry.
This transfer of signals occurs sixty or fifty times per second
NTSC [National Television Systems Committee] (in US) 30 frames per
second
PAL[Phase Alternating Line](in India)25 frames per second.
But according to persistence of vision 24 individual pictures is enough to
get a continuous motion
The 1/3" CCD chip is the most widely used sensor format these days; its size
is 5.5mm (diagonal), 4.4mm (horizontal) and 3.3mm (vertical).
REMOTE VIEWING through LAN
Using Tracerlite Enterprise S/W we can view the Cameras connected to Tracerlite
At a time Maximum of 5 clients can view Live (or) Recorded images.
Also can do the PAN /TILT operation
In our Example by sitting in the Mumbai office we can Pan/Tilt the
camera in the Chennai office
Closed-circuit television (CCTV)
Monitors, records, and control s more cameras ,
View video from anywhere using an Internet browser-enabled PC or
mobile phone,
Locate dates, times, or incidents in video archives quickly and easily
with intelligent search ,
Use intelligent event monitoring to track areas of interest, removal of
items, or the appearance of unsupervised objects
Closed-circuit digital photography (CCDP)
Closed-circuit digital photography (CCDP) is more suited for capturing and
saving recorded high-resolution photographs,
CCTV systems is the ability to take high resolution images of the camera
scene, e.g. on a time lapse or motion-detection basis.
Images may be monitored remotely when the computer is connected to a
network.
IP CAMERAS
IP cameras use the Internet Protocol (IP) used by most Local Area Networks
(LANs) to transmit video across data networks in digital form.
IP can optionally be transmitted across the public internet, allowing users
to view their camera(s) through any internet connection available through
a computer or a 3G phone
It Used For professional or public infrastructure security applications.
IP video is restricted to within a private network
INTEGRATED SYSTEMS
Integrated systems allow users to connect remotely from the internet and
view what their cameras are viewing remotely, similar to that of IP
cameras.