12.07.2015 Views

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>HVAC</strong> <strong>Control</strong>In <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>byMichael F. HordeskiTHE FAIRMONT PRESS, INC.Lilburn, GeorgiaMARCEL DEKKER, INC.<strong>New</strong> York and Baseliii©2001 by The Fairmont Press, Inc. All rights reserved.


Library of Congress Catalog<strong>in</strong>g-<strong>in</strong>-Publication DataHordeski, Michael F.<strong>HVAC</strong> control <strong>in</strong> <strong>the</strong> new millennium/by Michael F. Hordeski.p. cm.I. Includes bibliographical references <strong>in</strong>dex.ISBN 0-88173-399-7 (electronic)1. Heat<strong>in</strong>g--<strong>Control</strong>. 2. Air condition<strong>in</strong>g--<strong>Control</strong>. 3. Ventilation--<strong>Control</strong>. I. Title.TH7466.5 .H68 2001697--dc2100-051415<strong>HVAC</strong> control <strong>in</strong> <strong>the</strong> new millennium/Michael F. Hordeski.©2001 by The Fairmont Press, Inc. All rights reserved. No part of thispublication may be reproduced or transmitted <strong>in</strong> any form or by anymeans, electronic or mechanical, <strong>in</strong>clud<strong>in</strong>g photocopy, record<strong>in</strong>g, orany <strong>in</strong>formation storage and retrieval system, without permission <strong>in</strong>writ<strong>in</strong>g from <strong>the</strong> publisher.Fairmont Press, Inc.700 Indian Trail, Lilburn, GA 30047tel: 770-925-9388; fax: 770-381-9865http://www.fairmontpress.comDistributed by Marcel Dekker, Inc.270 Madison Avenue, <strong>New</strong> York, NY 10016tel: 212-696-9000; fax: 212-685-4540http://www.dekker.comPr<strong>in</strong>ted <strong>in</strong> <strong>the</strong> United States of America10 9 8 7 6 5 4 3 2 10-88173-399-7 (The Fairmont Press, Inc.)0-8247-0915-2 (Marcel Dekker, Inc.)While every effort is made to provide dependable <strong>in</strong>formation, <strong>the</strong> publisher, authors,and editors cannot be held responsible for any errors or omissions.©2001 by The Fairmont Press, Inc. All rights reserved.


Table of ContentsChapter 1Chapter 2Chapter 3Chapter 4Chapter 5Chapter 6Chapter 7Chapter 8Chapter 9Heat, Ventilation and Damper <strong>Control</strong> TrendsEnergy and Power Management,Distributed <strong>Control</strong> Trends<strong>Control</strong> Technology,Microelectronics and NanotechnologyAdvanced <strong>HVAC</strong> <strong>Control</strong>, InformationTechnology and Open SystemsPC-based <strong>Control</strong>, Software and Bus TrendsArtificial Intelligence, Fuzzy Logic and <strong>Control</strong>Computer Networks and SecuritySystems and Device NetworksBuild<strong>in</strong>g Automation, WirelessTechnology and <strong>the</strong> Internet©2001 by The Fairmont Press, Inc. All rights reserved.


PrefaceBuild<strong>in</strong>g condition<strong>in</strong>g is chang<strong>in</strong>g rapidly as we enter <strong>the</strong> newmillennium. Advances <strong>in</strong> personal computer control and sensortechnology will lead <strong>the</strong> advances <strong>in</strong> build<strong>in</strong>g controls. Some of<strong>the</strong>se techniques are just emerg<strong>in</strong>g <strong>in</strong> major <strong>in</strong>dustrial automaionprojects. Push<strong>in</strong>g <strong>the</strong> technology along are potentially high reductions<strong>in</strong> operat<strong>in</strong>g costs from <strong>the</strong> <strong>in</strong>creased efficiency of operation.PC-based control, Internet/Intranet and o<strong>the</strong>r computer technologieswill br<strong>in</strong>g many changes and challenges to those <strong>in</strong>volved <strong>in</strong> <strong>HVAC</strong>systems automation.This book <strong>in</strong>vestigates how <strong>the</strong> latest advances <strong>in</strong> distributed technologywill be used <strong>in</strong> commercial systems. It analyzes <strong>the</strong> impact of thistechnology on <strong>HVAC</strong> control strategies and operator <strong>in</strong>terfaces <strong>in</strong>clud<strong>in</strong>gfuture concepts of human/mach<strong>in</strong>e <strong>in</strong>terfaces. The potential benefitsof improved technology mean additional energy and cost sav<strong>in</strong>gs.Based on recent and upcom<strong>in</strong>g standards <strong>HVAC</strong> control strategymay evolve with chang<strong>in</strong>g needs l<strong>in</strong>ked to plant-wide enterprise systems.These distributed <strong>HVAC</strong> systems provide <strong>the</strong> wide area technologyneeded for <strong>HVAC</strong> system remote access and Internet work communications.There are major improvements to be ga<strong>in</strong>ed by <strong>in</strong>telligent fielddevices along with <strong>in</strong>creased system <strong>in</strong>tegration. Smarter systems willuse extracted data to build databases and provide automatic pip<strong>in</strong>g,electrical and <strong>in</strong>strumentations draw<strong>in</strong>g on-l<strong>in</strong>e, even via remote term<strong>in</strong>alson <strong>the</strong> Internet.Advances <strong>in</strong> microtechnology will provide economic and environmentaladvantages for space heat<strong>in</strong>g. The air <strong>in</strong> a room may be heatedand cooled more efficiently us<strong>in</strong>g small channels of micro heat pumps.Real-time environmental sensors will monitor workplace air quality andm<strong>in</strong>imize lost work hours due to sick-build<strong>in</strong>g syndrome.Embedded Web technology and improved real-time operat<strong>in</strong>g systemswill operate via <strong>the</strong> Internet or plant-wide Intranets. Benefits fromthis technology <strong>in</strong>clude improved worldwide remote diagnostics of systemand equipment failure with real-time monitor<strong>in</strong>g of control systems.©2001 by The Fairmont Press, Inc. All rights reserved.


The use of wireless LANs may double or even triple over <strong>the</strong> nextfew years. Wireless LANs allow ma<strong>in</strong>tenance workers to report problemsus<strong>in</strong>g wireless scanners, portable computers and o<strong>the</strong>r hand-helddevices.Improved efficiency is possible by apply<strong>in</strong>g control concepts suchas ratio and feed-forward control. Fur<strong>the</strong>r <strong>HVAC</strong> system improvementand optimization may be accomplished with advanced model<strong>in</strong>g andsimulation techniques which are used to develop alternate solutions andallow comparative analysis.The computer evolution is on an upward spiral, which concerns<strong>the</strong> nature of <strong>in</strong>telligence, its significance and its ultimate realization <strong>in</strong>mach<strong>in</strong>es that will cause <strong>the</strong> world to be transformed.Future <strong>HVAC</strong> systems will <strong>in</strong>volve mix<strong>in</strong>g <strong>in</strong>telligent and non-<strong>in</strong>telligentdevices. Intelligent systems technology, such as fuzzy logic,expert systems and neural networks will f<strong>in</strong>d practical applications toprovide <strong>in</strong>telligence for control management and optimization. Fuzzylogic will be used <strong>in</strong> supervisory controllers based from operator experienceand experimental results ra<strong>the</strong>r than ma<strong>the</strong>matical models. Whiletraditional control and <strong>the</strong> computer code used to implement it reliesheavily on absolutes like true/false, yes/no or on/off conditions, fuzzylogic employs a more human way of th<strong>in</strong>k<strong>in</strong>g about a problem. Thisbook is about a future which <strong>in</strong>volves a transformation of liv<strong>in</strong>g andwork<strong>in</strong>g habits at many levels.<strong>HVAC</strong> systems may be <strong>in</strong>tegrated <strong>in</strong>to plant-wide supervisory controland data acquisition (SCADA). In <strong>the</strong> new age of component-basedsoftware, objects may be used to snap toge<strong>the</strong>r control systems us<strong>in</strong>gflexible open standards based on general PC technologies. Hardwarewill also evolve towards more plug-<strong>in</strong> components with standard <strong>in</strong>terfacesfor both hardware and software compatibility.<strong>Control</strong> technology cont<strong>in</strong>ues to be driven by <strong>in</strong>formation and <strong>the</strong>means of deliver<strong>in</strong>g it. The chief <strong>in</strong>formation enabler is software. Softwareareas of special <strong>in</strong>terest <strong>in</strong>clude operat<strong>in</strong>g systems, open systems,object-based technologies, and Internet communications. This booklooks at <strong>the</strong> key trends <strong>in</strong> <strong>the</strong>se areas, and discusses <strong>the</strong> impact each islikely to have on control systems.Many <strong>HVAC</strong> systems will use W<strong>in</strong>dows NT and open standardnetworks based on BACnet/TCP/IP E<strong>the</strong>rnet with open data exchangestandards. These systems will use standard Web technology for monitor<strong>in</strong>gand control. Us<strong>in</strong>g a standard Web browser, alarm and event w<strong>in</strong>-©2001 by The Fairmont Press, Inc. All rights reserved.


dows are implemented as Java applets that are automatically downloadedto <strong>the</strong> browser.<strong>Control</strong> software will <strong>in</strong>clude object-oriented languages, with fill<strong>in</strong>-<strong>the</strong>-blanktemplates for control loops. PCs will be used to configureand test <strong>the</strong> control package off-l<strong>in</strong>e and <strong>the</strong>n download it <strong>in</strong>to <strong>the</strong> realtimesystem. The WIMP (w<strong>in</strong>dows, icons, mouse, po<strong>in</strong>ters) concept willtake over <strong>the</strong> role of typewriter-like keyboards. Multi-language controlsoftware will reduce <strong>the</strong> chances of operator error by display<strong>in</strong>g <strong>in</strong>formation<strong>in</strong> German, French and o<strong>the</strong>r languages.The technology of heat<strong>in</strong>g has gone from simple attempts to keepspace areas warm to sophisticated computerized systems that track occupantslevels, seasons, time-of-day, outdoor temperature and humidityconditions. Ventilation will cont<strong>in</strong>ue to play a key role <strong>in</strong> occupant comfortlevels and plant efficiency. Air cleanl<strong>in</strong>ess will become more importantand more emphasis will be placed on dust, bacteria, odors and toxicgases which may affect human health and comfort.The close control of <strong>the</strong> amount of outdoor air used <strong>in</strong> <strong>the</strong> <strong>HVAC</strong>system is only one of <strong>the</strong> areas be<strong>in</strong>g m<strong>in</strong>ed for energy sav<strong>in</strong>gs. Excessiveenergy consumption is often due to <strong>the</strong> <strong>in</strong>filtration of outdoor airwhich can account for about 1/2 of <strong>the</strong> total heat<strong>in</strong>g and cool<strong>in</strong>g loads<strong>in</strong> some public build<strong>in</strong>gs. Build<strong>in</strong>g condition<strong>in</strong>g accounts for about 20%of <strong>the</strong> total energy consumed <strong>in</strong> <strong>the</strong> U.S., so computer-optimized <strong>HVAC</strong>systems can make a major contribution <strong>in</strong> reduc<strong>in</strong>g our national energyuse <strong>in</strong> <strong>the</strong> next millennium.The nature of utility demand-side management (DSM) is chang<strong>in</strong>g.Many energy efficiency measures are difficult to promote through <strong>the</strong>utilities. Equipment efficiency standards are expected to lower nationalelectricity use by several percentage po<strong>in</strong>ts.The computer revolution is mov<strong>in</strong>g towards an emancipation withan overwhelm<strong>in</strong>g and comprehensive impact. When <strong>the</strong> mach<strong>in</strong>e agebegan, it surged <strong>in</strong>to motion and almost ran its course before mostpeople were aware of what had happened. We have <strong>the</strong> gift of bettercommunications which help us to contemplate some of <strong>the</strong> amaz<strong>in</strong>gchanges that may take place. This book attempts to provide an understand<strong>in</strong>gof <strong>the</strong> nature of <strong>the</strong>se changes. It uses case histories to allow acomparative analysis for current and future <strong>HVAC</strong> systems. It compares<strong>in</strong>telligent and non-<strong>in</strong>telligent devices and assesses <strong>the</strong> capabilities andlimitations of <strong>in</strong>telligent devices and <strong>the</strong>ir communications.This book shows how to differentiate between <strong>the</strong> available com-©2001 by The Fairmont Press, Inc. All rights reserved.


munication technologies, predict <strong>the</strong> value of improvements ga<strong>in</strong>ed by<strong>in</strong>telligent field devices and grasp <strong>the</strong> bus<strong>in</strong>ess drivers beh<strong>in</strong>d <strong>in</strong>tegration,<strong>in</strong>dustrial web technologies for <strong>HVAC</strong> and security features of <strong>in</strong>dustrialnetworks.Chapter 1 <strong>in</strong>troduces heat, ventilation and damper control trendsas well as air condition<strong>in</strong>g trends. Basic concepts such as <strong>the</strong> propertiesof air, filter<strong>in</strong>g and heat transfer are described. Zone control and yeararoundair condition<strong>in</strong>g are expla<strong>in</strong>ed along with air wash<strong>in</strong>g. The conceptof <strong>HVAC</strong> <strong>in</strong>telligence is <strong>in</strong>troduced and advanced motion controlfor dampers <strong>in</strong>clud<strong>in</strong>g feedback devices, network<strong>in</strong>g and PCs with digitaldrives are covered.Chapter 2 considers energy and power management trends. Distributedcontrol levels <strong>in</strong>clude <strong>HVAC</strong>, communications and <strong>in</strong>formationmanagement. Topics <strong>in</strong>clude direct digital control and proportional zonecontrol.Future computer-based systems for <strong>in</strong>telligent build<strong>in</strong>gs and controlsmay use biochemical computers. Device communications for <strong>the</strong><strong>in</strong>telligent I/O appliances used <strong>in</strong> complex adaptive systems may takeplace <strong>in</strong> <strong>in</strong>dustrial networks that use wireless connections.<strong>Control</strong> technology and microelectronics are <strong>the</strong> ma<strong>in</strong> subjects ofChapter 3. After a summary of control modes and <strong>the</strong>ir characteristics,supervisory control techniques are considered for system optimizationand old and new control concepts are compared. Advances <strong>in</strong> microelectronicspush much of <strong>the</strong> new computer applications. The computerevolution is due to shr<strong>in</strong>k<strong>in</strong>g devices. Nanotechnology will producemolecular and prote<strong>in</strong> mach<strong>in</strong>es which are new types of molecular computers.Universal assemblers and disassemblers will build and rebuildfuture products. Reconfigurable computers with reconfigurable hardwareare even closer <strong>in</strong> our future.Chapter 4 looks at advanced <strong>HVAC</strong> control, <strong>in</strong>formation technologyand open systems trends. Semiconductor manufactur<strong>in</strong>g <strong>in</strong>volvesadvanced <strong>HVAC</strong> control concepts <strong>in</strong>clud<strong>in</strong>g air contam<strong>in</strong>ation, zoneoptimization, pressure control, flow control and pollution control. Intelligentalarms will use expert systems reason<strong>in</strong>g. Fault tolerant systemscan use passive redundancy or active redundancy.W<strong>in</strong>dows NT has become a de facto standard for control systemswhile E<strong>the</strong>rnet use has expanded as a plant control network. If feedforwardis not used properly for <strong>HVAC</strong>, a number of errors can bepropagated. This is expla<strong>in</strong>ed <strong>in</strong> Chapter 4.©2001 by The Fairmont Press, Inc. All rights reserved.


Object technology is grow<strong>in</strong>g as it fuels open protocols and opencontrol devices. This trend is produc<strong>in</strong>g open build<strong>in</strong>g controls.Chapter 5 is concentrated on PC-based control, software and bustrends. Object concepts are expla<strong>in</strong>ed along with trends <strong>in</strong> operat<strong>in</strong>gsystems <strong>in</strong>clud<strong>in</strong>g W<strong>in</strong>dows CE, W<strong>in</strong>dows NT-2000, UNIX and L<strong>in</strong>ux.ActiveX and Java are important tools <strong>in</strong> PC-based control, but <strong>the</strong> Internetrema<strong>in</strong>s as <strong>the</strong> key to <strong>the</strong> future. Future computers will use naturallanguages, chatterbots and voice recognition software. Search eng<strong>in</strong>eswill become smarter as <strong>the</strong> web advances <strong>in</strong>to <strong>the</strong> future. Smart softwarewill use Bayesian Networks, personal slaves and wizards.Process<strong>in</strong>g power depends on fabrication technology which hasphysical limitations. Chip multiprocessors are expected to proliferate <strong>in</strong><strong>the</strong> near future along with faster bus connections and products likewearable electronic displays.Chapter 6 is concerned with artificial <strong>in</strong>telligence, fuzzy logic andcontrol. This <strong>in</strong>cludes <strong>the</strong> different levels and areas of artificial <strong>in</strong>telligence<strong>in</strong>clud<strong>in</strong>g speech recognition systems, expert systems and neuralnetworks. Fuzzy control can be used for temperature balanc<strong>in</strong>g or <strong>the</strong>overshoot that occurs dur<strong>in</strong>g heat-up. Fuzzy control has been used toreduce <strong>the</strong> variability <strong>in</strong> product properties by 30% to 40%. Neural networksare be<strong>in</strong>g used <strong>in</strong> burner management systems for commercialpower plants.Chapter 7 is concerned with computer networks and security. TheInternational Standards Organization model provides <strong>the</strong> functional layersfor network<strong>in</strong>g. E<strong>the</strong>rnet trends <strong>in</strong>clude wireless E<strong>the</strong>rnet. Internetenablednetworks require security techniques such as digital certificatesand passwords.Chapter 8 covers open systems and device networks. Build<strong>in</strong>gautomation trends <strong>in</strong>clude <strong>the</strong> use of BACnet with its conformance classificationsand <strong>in</strong>teroperable functions. LonWorks control is an alternativeand BACnet and LonMark may be used toge<strong>the</strong>r. O<strong>the</strong>r <strong>in</strong>dustrialnetworks <strong>in</strong>clude DeviceNet, CAN, <strong>Control</strong>Net, Seriplex, AS-i, HART,Foundation Fieldbus, Profibus, CAB and MODBUS. Some of <strong>the</strong>se networksrequire devices with healthy process<strong>in</strong>g which makes <strong>the</strong>m moreexpensive than <strong>the</strong> control devices used <strong>in</strong> a typical commercial or <strong>in</strong>stitutionalbuild<strong>in</strong>g for environmental control.Chapter 9 concentrates on build<strong>in</strong>g automation, wireless technologyand <strong>the</strong> Internet. A variety of BACnet projects have been completedor are underway. There is a merg<strong>in</strong>g of <strong>in</strong>formation and control <strong>in</strong> build-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>in</strong>g automation. This will cont<strong>in</strong>ue as use of <strong>the</strong> Internet and wirelesstechnology grow. The IrDA technology for <strong>in</strong>frared control may becomeprevalent. Cellular problems <strong>in</strong>clude security. The use of wireless LANswill grow along with <strong>the</strong> growth of pocket communications. EmbeddedWeb pages may be <strong>in</strong>cluded <strong>in</strong> many controllers for troubleshoot<strong>in</strong>g andma<strong>in</strong>tenance. Personal digital assistants (PDAs), pagers and smart cellphones will share W<strong>in</strong>dows data.Smart antennas use <strong>the</strong>ir <strong>in</strong>telligence to sense <strong>the</strong> radio environmentand optimize <strong>the</strong>ir performance. As Internet connections <strong>in</strong>creaseand <strong>the</strong> Internet grows, <strong>the</strong>re will be new public networks that willreduce Internet bottlenecks. These new public networks will have added<strong>in</strong>telligence for configuration chores, managed backbones and security.Many thanks to Dee who kept this project mov<strong>in</strong>g along onschedule.©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> Trends 1Chapter 1Heat, Ventilation andDamper <strong>Control</strong> TrendsThe first attempts at environmental control <strong>in</strong>volved heat andventilation. The control of heat goes back to prehistoric timesand probably first developed <strong>in</strong> colder climates where warmertemperatures were needed for both comfort and health. Thetechnology of heat<strong>in</strong>g has advanced from simple attempts to keep <strong>the</strong>body warm to <strong>the</strong> sophisticated systems of ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g stabilized environments<strong>in</strong> order to m<strong>in</strong>imize <strong>the</strong> heat loss from <strong>the</strong> body or <strong>the</strong> structuralsurfaces of <strong>the</strong> room.Ventilation also goes back to very early periods <strong>in</strong> history. The useof slaves to wave large fans and fan-like devices was an attempt toimprove <strong>the</strong> ventilation. Rooms or build<strong>in</strong>gs were also arranged to takeadvantage of <strong>the</strong> ris<strong>in</strong>g and sett<strong>in</strong>g of <strong>the</strong> sun as well as prevail<strong>in</strong>gbreezes and w<strong>in</strong>ds. By <strong>the</strong> end of <strong>the</strong> 18th century significant advanceswere be<strong>in</strong>g made <strong>in</strong> heat<strong>in</strong>g and ventilat<strong>in</strong>g.In <strong>the</strong> early stages of <strong>the</strong> Industrial Revolution, ventilat<strong>in</strong>g andheat<strong>in</strong>g acquired <strong>in</strong>creased importance s<strong>in</strong>ce it affected <strong>the</strong> work efficiencyand <strong>the</strong> health of <strong>the</strong> workers. This resulted <strong>in</strong> <strong>the</strong> creation ofventilation systems to remove contam<strong>in</strong>ants from <strong>the</strong> air.Air Condition<strong>in</strong>gAir condition<strong>in</strong>g is a more recent development and encompassesall aspects of environmental control. In addition to <strong>the</strong> control of temperature,both humidity (<strong>the</strong> moisture content of <strong>the</strong> air) and air cleanl<strong>in</strong>essare regulated by air condition<strong>in</strong>g.The earliest attempts at air condition<strong>in</strong>g <strong>in</strong>volved <strong>the</strong> plac<strong>in</strong>g ofwet cloths over air passages such as w<strong>in</strong>dow open<strong>in</strong>gs and doors to cool©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong><strong>the</strong> air. Air condition<strong>in</strong>g technology began to progress much fur<strong>the</strong>rwhen <strong>in</strong> <strong>the</strong> 1840s, several systems evolved for both cool<strong>in</strong>g and humidify<strong>in</strong>grooms.The first units were developed by textile manufacturers to reducestatic electricity <strong>in</strong> <strong>the</strong> air. Later, adaptations were made by o<strong>the</strong>r <strong>in</strong>dustries.Although developments <strong>in</strong> air condition<strong>in</strong>g technology <strong>in</strong>creasedrapidly <strong>in</strong> <strong>the</strong> first part of <strong>the</strong> 20th century, <strong>the</strong> widespread use of aircondition<strong>in</strong>g <strong>in</strong> build<strong>in</strong>gs did not take place until <strong>the</strong> post-World War IIperiod.Unlike <strong>the</strong> early forms of air condition<strong>in</strong>g which were designed tocool <strong>the</strong> air and add moisture to it, modern air condition<strong>in</strong>g systems cancontrol temperature, air moisture content, air cleanl<strong>in</strong>ess, and air movement.The modern systems truly condition <strong>the</strong> air, ra<strong>the</strong>r than simplycool it.Heat<strong>in</strong>g SystemsMany different methods have been devised for heat<strong>in</strong>g build<strong>in</strong>gs.Each has its own characteristics and most of <strong>the</strong>m have at least oneundesirable characteristic such as <strong>the</strong> cost of fuel, expensive to <strong>in</strong>stall or<strong>in</strong>efficient heat<strong>in</strong>g. Most of <strong>the</strong>se heat<strong>in</strong>g methods can be classified accord<strong>in</strong>gto one of <strong>the</strong> follow<strong>in</strong>g four criteria:• heat convey<strong>in</strong>g medium,• fuel used,• nature of <strong>the</strong> heat, and• efficiency of <strong>the</strong> method.The heat convey<strong>in</strong>g medium is <strong>the</strong> substance or comb<strong>in</strong>ation ofsubstances that carries <strong>the</strong> heat from its po<strong>in</strong>t of orig<strong>in</strong> to <strong>the</strong> area be<strong>in</strong>gheated. The four basic mediums for convey<strong>in</strong>g heat are air, water, steamand electricity.Throughout history different types of wood, coal, oil, and gasproducts have been used as fuels for produc<strong>in</strong>g heat. Electricity can beconsidered both as a fuel and a heat convey<strong>in</strong>g medium. Each type ofheat<strong>in</strong>g fuel has its characteristics and <strong>the</strong> advantages of one over ano<strong>the</strong>rdepends on variables such as availability, efficiency and cost.©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> TrendsHeat<strong>in</strong>g MethodsHeat<strong>in</strong>g methods can also be classified with respect to <strong>the</strong> natureof <strong>the</strong> heat applied. For example, <strong>the</strong> heat may be of exhausted steam oreven consist of exhaust gases from waste combustion.The different heat<strong>in</strong>g methods vary considerably <strong>in</strong> efficiency anddesirability. This is due to different but often <strong>in</strong>terrelated factors such asfuel cost, medium employed and <strong>the</strong> type of heat<strong>in</strong>g unit. The <strong>in</strong>tegrationof <strong>the</strong>se <strong>in</strong>terrelated components <strong>in</strong>to a s<strong>in</strong>gle operat<strong>in</strong>g unit results<strong>in</strong> <strong>the</strong> heat<strong>in</strong>g system.Among <strong>the</strong> variety of heat<strong>in</strong>g systems available are <strong>the</strong> follow<strong>in</strong>gbroad classifications:• warm-air heat<strong>in</strong>g systems,• hot-water heat<strong>in</strong>g systems,• steam heat<strong>in</strong>g systems, and• electric heat<strong>in</strong>g systems.These classifications of heat<strong>in</strong>g systems are based on <strong>the</strong> heat convey<strong>in</strong>gmethod used.Ventilat<strong>in</strong>g SystemsVentilat<strong>in</strong>g is closely <strong>in</strong>terrelated with heat<strong>in</strong>g <strong>in</strong> its various applications.One ventilat<strong>in</strong>g system may be used to provide fresh air whileano<strong>the</strong>r must remove noxious gases or o<strong>the</strong>r dangerous contam<strong>in</strong>antsfrom <strong>the</strong> enclosure. The type and design of ventilat<strong>in</strong>g system employedwill depend upon a number of different factors, <strong>in</strong>clud<strong>in</strong>g:• build<strong>in</strong>g use or ventilat<strong>in</strong>g purpose,• size of build<strong>in</strong>g,• geographical location, and• heat<strong>in</strong>g system used.Build<strong>in</strong>gs located <strong>in</strong> <strong>the</strong> tropical or semi-tropical zones presentdifferent ventilat<strong>in</strong>g problems from those found <strong>in</strong> <strong>the</strong> temperate zones.The differences are so great that <strong>the</strong>y often result <strong>in</strong> different architecturalforms especially before <strong>the</strong> widespread use of air condition<strong>in</strong>g.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The early sou<strong>the</strong>rn houses were constructed with high ceil<strong>in</strong>gs,large porches which sheltered sections of <strong>the</strong> house from <strong>the</strong> direct raysof <strong>the</strong> sun and large w<strong>in</strong>dow areas for ventilation. They were also usuallysituated on <strong>the</strong> site so that halls, major doors and sleep<strong>in</strong>g areasfaced <strong>the</strong> direction of <strong>the</strong> prevail<strong>in</strong>g w<strong>in</strong>ds. Today, with air condition<strong>in</strong>g,<strong>the</strong>se considerations have not been given as much importance.Ventilation RequirementsVentilation is <strong>the</strong> process of supply<strong>in</strong>g or remov<strong>in</strong>g air to or froma build<strong>in</strong>g or space. The air may or may not have been conditioned.Methods of supply<strong>in</strong>g or remov<strong>in</strong>g <strong>the</strong> air <strong>in</strong>clude natural ventilationand mechanical methods.Natural ventilation <strong>in</strong>volves open<strong>in</strong>g or clos<strong>in</strong>g wall vents and byus<strong>in</strong>g roof vents or ventilators. Mechanical ventilation is provided by<strong>the</strong> use of fans or o<strong>the</strong>r means that force <strong>the</strong> air through <strong>the</strong> space to beventilated.Air Condition<strong>in</strong>g TrendsThere has been an <strong>in</strong>creas<strong>in</strong>g use of year-round air condition<strong>in</strong>gsystems that provide heat<strong>in</strong>g, ventilat<strong>in</strong>g, and cool<strong>in</strong>g. These systemscondition <strong>the</strong> air by controll<strong>in</strong>g its temperature (warm<strong>in</strong>g or cool<strong>in</strong>g),cleanl<strong>in</strong>ess, moisture content and movement. Thus, <strong>the</strong> true mean<strong>in</strong>g of<strong>the</strong> term air condition<strong>in</strong>g has been achieved.Air condition<strong>in</strong>g can be treated as <strong>the</strong> simultaneous control ofthose factors that affect <strong>the</strong> conditions of <strong>the</strong> atmosphere <strong>in</strong> a structure.These factors can <strong>in</strong>clude temperature, humidity, air motion and distribution,dust, bacteria, odors, and toxic gases which affect human healthand comfort.Air that has been properly conditioned generally has a comb<strong>in</strong>ationof processes performed on it. It may have been heated or cooled andmay have had moisture removed from it (dehumidified). Fans may beused to move <strong>the</strong> air and filters may be used for clean<strong>in</strong>g. The air actsas a vehicle to transport heat and moisture from one area. Air movementis one important technique of energy conservation.©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> TrendsProperties of AirAir is a mixture of two ma<strong>in</strong> gases, approximately 23 parts ofoxygen and 77 parts nitrogen by weight. The o<strong>the</strong>r gases <strong>in</strong> air <strong>in</strong>cludescarbon dioxide, carbon monoxide, ozone and neon <strong>in</strong> small quantities.Carbon monoxide is not generally present <strong>in</strong> <strong>the</strong> atmosphere, butis found <strong>in</strong> congested motor traffic. It is dangerous and is also given offby stoves and furnaces. Air conta<strong>in</strong><strong>in</strong>g carbon monoxide <strong>in</strong> a concentrationgreater than 0.10% is fatal to humans.Oxygen is <strong>the</strong> most important constituent of air, it makes up about1/4 of <strong>the</strong> air by weight and 1/5 of <strong>the</strong> air by volume and provides <strong>the</strong>existence of all animal life. Nitrogen is an <strong>in</strong>ert gas which acts to diluteoxygen.Air CirculationAir circulation is important for two reasons. Air that is mov<strong>in</strong>g cancarry away <strong>the</strong> moisture and heat surround<strong>in</strong>g <strong>the</strong> body. If this is notdone, <strong>the</strong> occupants can be uncomfortable even when <strong>the</strong> relative humidityof <strong>the</strong> area is low.Air that is drawn <strong>in</strong>to <strong>the</strong> conditioner and passed out over <strong>the</strong>evaporator will remove <strong>the</strong> moisture from <strong>the</strong> room which is condensedand passed through <strong>the</strong> dra<strong>in</strong>.Although <strong>the</strong> movement of air is essential, direct drafts should beavoided. Condensation on <strong>the</strong> evaporator surface dur<strong>in</strong>g summer operationproduces a certa<strong>in</strong> amount of clean<strong>in</strong>g s<strong>in</strong>ce <strong>the</strong> moisture absorbsimpurities from <strong>the</strong> air as it passes over <strong>the</strong> evaporator surfaces. Thecondensation of <strong>the</strong> moisture cont<strong>in</strong>ues to carry off <strong>the</strong>se impurities to<strong>the</strong> dra<strong>in</strong>.FiltersAir clean<strong>in</strong>g and filter<strong>in</strong>g devices can elim<strong>in</strong>ate most particles carried<strong>in</strong> <strong>the</strong> air that are detrimental to health and comfort. These <strong>in</strong>cludedust, fumes, and smoke. Dust and fumes tend to settle <strong>in</strong> still air, butsmoke is actuated by motion and if not removed, will rema<strong>in</strong> <strong>in</strong> motion<strong>in</strong> <strong>the</strong> air.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Air wash<strong>in</strong>g can be effective <strong>in</strong> remov<strong>in</strong>g dust and those fumesand smoke that are soluble <strong>in</strong> water, but carbons, soot, and similar substancescannot be removed by this type of clean<strong>in</strong>g. It is possible tocleanse <strong>the</strong> air of <strong>the</strong>se by substances us<strong>in</strong>g ei<strong>the</strong>r <strong>the</strong> dry and viscousfilters that have been developed.Heat TransferWhen bodies of unequal temperatures are placed near each o<strong>the</strong>r,heat leaves <strong>the</strong> hotter body and is absorbed by <strong>the</strong> colder body until <strong>the</strong>temperature of each is equal. The rate at which <strong>the</strong> heat is absorbed by<strong>the</strong> colder body is proportional to <strong>the</strong> difference of temperature between<strong>the</strong> two bodies, <strong>the</strong> greater <strong>the</strong> difference of temperature <strong>the</strong> greater <strong>the</strong>rate of flow of <strong>the</strong> heat.Heat is an active form of energy, much <strong>the</strong> same as mechanical andelectrical energy. Heat can be transferred by three methods, conduction,convection, and radiation.Conduction and ConvectionConduction refers to heat transfer that takes place ma<strong>in</strong>ly <strong>in</strong> solidswhere <strong>the</strong> heat is passed from one molecule to ano<strong>the</strong>r without anynoticeable movement of <strong>the</strong> molecules.Conduction is <strong>the</strong> transfer of heat through a substance. Conductivitymay be def<strong>in</strong>ed as <strong>the</strong> relative value of a material as compared witha standard, which affords a passage for heat. A poor conductor is knownas a nonconductor or <strong>in</strong>sulator. Copper is a good conductor, while <strong>the</strong>various materials used to <strong>in</strong>sulate build<strong>in</strong>gs are poor conductors. Anysubstance, which is a good conductor of electricity is also a good conductorof heat.Convection is a heat transfer that takes place <strong>in</strong> liquids and gaseswhere <strong>the</strong> molecules carry <strong>the</strong> heat from one po<strong>in</strong>t to ano<strong>the</strong>r. Convection<strong>in</strong>volves <strong>the</strong> transfer of heat due to <strong>the</strong> motion of <strong>the</strong> heated matter.S<strong>in</strong>ce motion is a requirement for convection, it can only take place <strong>in</strong>liquids and gases.RadiationRadiation is heat transfer <strong>in</strong> a wave motion, such as light or radiowaves. It takes place through a transparent medium without affect<strong>in</strong>g©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> Trends<strong>the</strong> medium’s temperature. An example of this is solar radiation.Radiation, as a heat loss, <strong>in</strong>volves <strong>the</strong> throw<strong>in</strong>g out of heat <strong>in</strong> rays.The heat rays proceed outwards <strong>in</strong> straight l<strong>in</strong>es and <strong>the</strong> <strong>in</strong>tensity of <strong>the</strong>heat radiated from any one source becomes less as <strong>the</strong> distance from <strong>the</strong>source <strong>in</strong>creases.The amount of heat loss through radiation depends upon <strong>the</strong> temperatureof <strong>the</strong> surround<strong>in</strong>g surfaces. The colder <strong>the</strong>se surfaces are, <strong>the</strong>faster and greater will be <strong>the</strong> heat loss from a heated object. If <strong>the</strong> surfacesare warmer than <strong>the</strong> heated object, <strong>the</strong>n heat will be radiated from<strong>the</strong>se surfaces to <strong>the</strong> object.Radiation, conduction, and convection are often <strong>in</strong>terrelated. Heatfrom a burn<strong>in</strong>g fuel passes to <strong>the</strong> metal of <strong>the</strong> heat<strong>in</strong>g surface by radiation,through <strong>the</strong> metal by conduction, and is transferred to water byconvection. The circulation needed for convection is caused by <strong>the</strong> variation<strong>in</strong> <strong>the</strong> weight of <strong>the</strong> water due to temperature differences. The waternext to <strong>the</strong> heat<strong>in</strong>g surface receives heat and expands becom<strong>in</strong>g lighter.It rises displac<strong>in</strong>g <strong>the</strong> colder and heavier water above.Mean Radiant TemperatureThe mean radiant temperature of <strong>the</strong> surfaces of an enclosure isimportant when deal<strong>in</strong>g with heat loss by radiation. The mean radianttemperature (MRT) is <strong>the</strong> weighted average temperature of <strong>the</strong> surround<strong>in</strong>gsurfaces.The significance of <strong>the</strong> mean radiant temperature becomes apparentwhen compared with <strong>the</strong> clo<strong>the</strong>d body of an adult at 80°F or 26.7°C.If <strong>the</strong> MRT is below 80°F, <strong>the</strong> human body will lose heat by radiation to<strong>the</strong> surfaces of <strong>the</strong> enclosure. If <strong>the</strong> MRT is higher than 80°F, <strong>the</strong> oppositeeffect will occur.Sensible HeatSensible heat is a form of heat that causes a change <strong>in</strong> <strong>the</strong> temperatureof a substance and can be measured by a dry-bulb <strong>the</strong>rmometer.There is no change <strong>in</strong> moisture content. It is referred to as sensible heatbecause it can be sensed by <strong>in</strong>struments or <strong>the</strong> touch. When <strong>the</strong> temperatureof water is raised from 32 to 212°F, an <strong>in</strong>crease <strong>in</strong> <strong>the</strong> sensibleheat takes place s<strong>in</strong>ce <strong>the</strong>se are dry-bulb measurements.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Specific HeatThis refers to <strong>the</strong> amount of Btus required to raise <strong>the</strong> temperatureof one pound of a substance one degree Fahrenheit. The specific heat ofa substance is <strong>the</strong> ratio of <strong>the</strong> quantity of heat required to raise its temperatureone degree Fahrenheit to <strong>the</strong> amount required to raise <strong>the</strong> temperatureof <strong>the</strong> same weight of water one degree Fahrenheit. This can beexpressed by <strong>the</strong> follow<strong>in</strong>g formula:Specific heat =Btu to raise temperatureof substance 1°FBtu to raise temperatureof same weight water 1°FThe standard is water at 62°F to 63°F which has a rat<strong>in</strong>g of 1.00 on<strong>the</strong> specific heat scale. Specific heat represents <strong>the</strong> Btu’s required to raise<strong>the</strong> temperature of 1 pound of a substance 1°F.The specific heat of water is def<strong>in</strong>ed as 1.00, but <strong>the</strong> amount of heatrequired to raise <strong>the</strong> temperature of different substances through sometemperature range will differ. Water has a large heat capacity and it isused as a standard. S<strong>in</strong>ce 1 pound of water requires one Btu to raise itstemperature one degree Fahrenheit, it is rated on <strong>the</strong> specific heat scaleat 1.00. Iron has a lower specific heat with an average rat<strong>in</strong>g of 0.130, iceis 0.504 and air is 0.238. The more water a substance conta<strong>in</strong>s, <strong>the</strong> higher<strong>the</strong> specific heat.Latent HeatLatent heat is that quantity of heat which disappears or becomesconcealed <strong>in</strong> a body while produc<strong>in</strong>g some change <strong>in</strong> it o<strong>the</strong>r than a riseof temperature.Latent heat means hidden heat and it is a form of heat that causes asubstance to change its physical state from a solid to liquid, a liquid tovapor, or <strong>the</strong> reverse. When a liquid is evaporated to a gas, <strong>the</strong> change ofphysical state is always accompanied by <strong>the</strong> absorption of heat. Evaporationprovides a cool<strong>in</strong>g effect on <strong>the</strong> surround<strong>in</strong>gs of <strong>the</strong> liquid s<strong>in</strong>ce <strong>the</strong>liquid must obta<strong>in</strong> from its surround<strong>in</strong>gs <strong>the</strong> required heat to change itsmolecular structure. This type of action takes place <strong>in</strong> <strong>the</strong> evaporator ofan air conditioner. All liquids tend to saturate <strong>the</strong> surround<strong>in</strong>g space withits vapor. This property is important <strong>in</strong> air condition<strong>in</strong>g.©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> TrendsLatent Heat of FusionThe change of a substance from a solid to liquid or from a liquidto a solid <strong>in</strong>volves <strong>the</strong> latent heat of fusion. One pound of water at atemperature of 32°F requires <strong>the</strong> extraction of 144 Btu to cause it tofreeze <strong>in</strong>to solid ice at 32°F. All solid substances have a latent-heat valueand <strong>the</strong> amount required to convert it, or affect a change of state, iscalled <strong>the</strong> latent heat of fusion. This heat cannot be measured with a<strong>the</strong>rmometer s<strong>in</strong>ce <strong>the</strong> heat is absorbed or expanded <strong>in</strong> <strong>the</strong> change ofstate process.Latent Heat of EvaporationThe change of a substance from a liquid to a vapor or from a vaporto a liquid <strong>in</strong>volves <strong>the</strong> latent heat of evaporation. The conversion of 1pound of pure water at 212°F to steam at 212°F requires 970 Btu at <strong>the</strong>pressure of <strong>the</strong> atmosphere found at sea level. After <strong>the</strong> 970 Btus havebeen used, <strong>the</strong> fur<strong>the</strong>r addition of heat serves only to heat <strong>the</strong> steam.SuperheatSuperheat is <strong>the</strong> sensible heat that is absorbed by a vapor or gasnot <strong>in</strong> contact with its liquid. It does not follow <strong>the</strong> temperature-pressurerelationship and refers to <strong>the</strong> sensible heat absorbed by <strong>the</strong> vaporrais<strong>in</strong>g <strong>the</strong> temperature of <strong>the</strong> vapor or gas without any appreciablechange <strong>in</strong> pressure.A gas is usually considered as a vapor <strong>in</strong> a highly superheatedstate or as a vapor not near its condens<strong>in</strong>g po<strong>in</strong>t. Water <strong>in</strong> <strong>the</strong> air thatis close to <strong>the</strong> condens<strong>in</strong>g po<strong>in</strong>t is water vapor. S<strong>in</strong>ce as superheat issensible heat, its effect can be measured with a <strong>the</strong>rmometer and as atemperature rise. A 10°F superheat means a vapor has absorbed enoughheat to raise <strong>the</strong> vapor temperature 10°F above <strong>the</strong> temperature of vaporiz<strong>in</strong>gliquid.When a gas is condensed to a liquid, <strong>the</strong> change of physical stateis always accompanied by <strong>the</strong> giv<strong>in</strong>g up of heat. This takes place <strong>in</strong> <strong>the</strong>condens<strong>in</strong>g unit of an air conditioner due to <strong>the</strong> mechanical work exertedon <strong>the</strong> gas by <strong>the</strong> compressor.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Heat EnergyHeat is a form of energy that is <strong>in</strong> transit between its source anddest<strong>in</strong>ation po<strong>in</strong>t. Heat energy only exists while flow<strong>in</strong>g between <strong>the</strong>source and dest<strong>in</strong>ation.Heat energy is similar to work energy, which is ano<strong>the</strong>r form ofenergy <strong>in</strong> transit. The ma<strong>in</strong> difference is that heat energy is energy <strong>in</strong>transit as a result of temperature differences.British Thermal UnitThe British <strong>the</strong>rmal unit is a unit of heat or heat energy. S<strong>in</strong>ce 1929British <strong>the</strong>rmal units have been def<strong>in</strong>ed as one Btu be<strong>in</strong>g equal to251.996 IT (International Steam Table) calories, or 778.26 feet-pound ofmechanical energy units (work). S<strong>in</strong>ce one IT calorie equals 1/860 of awatt-hour, one Btu is equivalent to about 1/3 watt-hour.Prior to 1929, one Btu was def<strong>in</strong>ed as <strong>the</strong> amount of heat necessaryto raise 1 pound of water 1°F. Because of some difficulty <strong>in</strong> determ<strong>in</strong><strong>in</strong>g<strong>the</strong> exact value of a Btu, it was redef<strong>in</strong>ed <strong>in</strong> terms of a more fundamentalelectrical unit.Heat and WorkEnergy can be def<strong>in</strong>ed as <strong>the</strong> ability to do work or move aga<strong>in</strong>st aresistance. Work can be def<strong>in</strong>ed as <strong>the</strong> overcom<strong>in</strong>g of resistance througha certa<strong>in</strong> distance us<strong>in</strong>g <strong>the</strong> expenditure of energy.Work is measured by a standard unit called <strong>the</strong> foot pound. Thisis def<strong>in</strong>ed as <strong>the</strong> amount of work done <strong>in</strong> rais<strong>in</strong>g 1 pound <strong>the</strong> distanceof 1 foot, or <strong>in</strong> overcom<strong>in</strong>g a pressure of 1 pound through a distance of1 foot.A relationship between work and heat exists and is referred to as<strong>the</strong> mechanical equivalent of heat. This states that one unit of heat isequal to 778.26 foot-pounds of work.The relationship of <strong>the</strong> mechanical equivalent of heat was firstestablished by experiments conducted <strong>in</strong> 1843 by Dr. Joule of Manchester,England. He determ<strong>in</strong>ed by experiment that when 772 foot-poundsof energy had been expended on one pound of water, <strong>the</strong> temperatureof <strong>the</strong> latter had risen one degree.©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> TrendsThe value of 772 foot-pounds is known as Joule’s equivalent. Morerecent experiments have given higher figures, and <strong>the</strong> value of 1 Btu =778.26 foot-pounds is used today.PsychrometryPsychrometry is that area of physics that <strong>in</strong>volves <strong>the</strong> measurementand determ<strong>in</strong>ation of atmospheric conditions, <strong>in</strong>clud<strong>in</strong>g <strong>the</strong> effectsof moisture mixed with <strong>the</strong> air. In air-condition<strong>in</strong>g systems <strong>the</strong> dry airand water vapor compos<strong>in</strong>g <strong>the</strong> atmosphere are understood to be separateentities and each has its own characteristics. This water vapor is notdissolved <strong>in</strong> <strong>the</strong> air, but it serves to moisten <strong>the</strong> air.Air and Water Vapor MixturesWater vapor is <strong>the</strong> gaseous form of water at a temperature below<strong>the</strong> boil<strong>in</strong>g po<strong>in</strong>t of water. It is <strong>the</strong> most variable part of <strong>the</strong> atmosphere.At certa<strong>in</strong> temperatures and barometric pressures it is extremely unstable<strong>in</strong> ei<strong>the</strong>r gaseous or liquid form. This is shown by <strong>the</strong> rapid formationand disappearance of clouds and fog.Water vapor makes up about 3% of <strong>the</strong> total air by volume <strong>in</strong> hot,humid wea<strong>the</strong>r and about 1/3 to 1% of total air by volume <strong>in</strong> dry, coldwea<strong>the</strong>r. Water vapor is steam at very low temperatures and it acts likesteam at <strong>the</strong>se low temperatures.Dehumidify<strong>in</strong>gThe air becomes humidified when moisture is added to it and isdehumidified when moisture is removed. The addition of moisture toair and <strong>the</strong> removal of moisture from air are important to air condition<strong>in</strong>g.An excess or deficiency of moisture has a noticeable effect on comfortand depends on <strong>the</strong> relative humidity.Relative HumidityRelative humidity is def<strong>in</strong>ed as <strong>the</strong> ratio of <strong>the</strong> quantity of vaporactually present <strong>in</strong> <strong>the</strong> air to <strong>the</strong> greatest amount possible at any given©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>temperature. The relative humidity of air at any given temperature canbe found by divid<strong>in</strong>g <strong>the</strong> amount of moisture actually <strong>in</strong> <strong>the</strong> air by <strong>the</strong>amount of moisture that <strong>the</strong> air can hold at that temperature and multiply<strong>in</strong>g<strong>the</strong> result by 100.Relative Humidity MeasurementRelative humidity has been traditionally measured by sl<strong>in</strong>g psychrometers.This <strong>in</strong>strument has two <strong>the</strong>rmometers fastened to a frame.The <strong>in</strong>strument is spun around on a cha<strong>in</strong> so it comes <strong>in</strong> contact with <strong>the</strong>maximum amount of air.Around <strong>the</strong> bulb of one <strong>the</strong>rmometer is a small piece of cloth,which is dampened with water before tak<strong>in</strong>g a read<strong>in</strong>g. The evaporationof moisture from <strong>the</strong> bulb of <strong>the</strong> wet <strong>the</strong>rmometer causes it to read lowerthat <strong>the</strong> one which is dry. The difference between <strong>the</strong> read<strong>in</strong>gs of <strong>the</strong> two<strong>the</strong>rmometers provides <strong>the</strong> relative humidity.Dew Po<strong>in</strong>tThe saturation temperature for a given quantity of water vapor <strong>in</strong><strong>the</strong> atmosphere is called <strong>the</strong> dew po<strong>in</strong>t. At a given atmospheric pressure,<strong>the</strong> dew po<strong>in</strong>t is <strong>the</strong> temperature of saturation where <strong>the</strong> moisture beg<strong>in</strong>sto change <strong>in</strong>to <strong>the</strong> form of t<strong>in</strong>y water droplets or dew.Effective TemperatureEffective temperature provides an <strong>in</strong>dex of <strong>the</strong> degree of warmthor cold apparent to <strong>the</strong> human body. It takes <strong>in</strong>to account <strong>the</strong> temperature,moisture content and motion of <strong>the</strong> surround<strong>in</strong>g air.The effective temperature is not strictly a measure of heat <strong>in</strong> <strong>the</strong>same way that dry-bulb temperatures are. The effective temperature canbe lowered by <strong>in</strong>creas<strong>in</strong>g <strong>the</strong> rate of airflow even though <strong>the</strong> wet- anddry-bulb temperatures rema<strong>in</strong> constant. If <strong>the</strong> air movement is constant,<strong>the</strong> effective temperature is determ<strong>in</strong>ed by <strong>the</strong> wet- and dry-bulb <strong>the</strong>rmometerread<strong>in</strong>gs.©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> TrendsDry-bulb and Wet-bulb TemperaturesDry-bulb temperature is <strong>the</strong> temperature that an ord<strong>in</strong>ary <strong>the</strong>rmometerwill measure. Wet-bulb temperature is <strong>the</strong> temperature atwhich <strong>the</strong> air becomes saturated when moisture is added without anychange <strong>in</strong> <strong>the</strong> heat. If <strong>the</strong> bulb of an ord<strong>in</strong>ary <strong>the</strong>rmometer is surroundedwith a moistened wick, placed <strong>in</strong> a current of air, and superheated withwater vapor, <strong>the</strong> measurement obta<strong>in</strong>ed will be at some po<strong>in</strong>t below <strong>the</strong>dry-bulb temperature. This m<strong>in</strong>imum read<strong>in</strong>g is <strong>the</strong> wet-bulb temperatureof <strong>the</strong> air.Wet-bulb DepressionOutdoor air <strong>in</strong> <strong>the</strong> summer is rarely fully saturated, <strong>the</strong>re is usuallya respectable difference between <strong>the</strong> dry- and wet-bulb temperatures.This difference between <strong>the</strong> two temperatures is known as <strong>the</strong> wet-bulbdepression. If <strong>the</strong> dry-bulb temperature read<strong>in</strong>g is 85 and <strong>the</strong> correspond<strong>in</strong>gwet-bulb temperature is 65, <strong>the</strong> wet-bulb depression is 20.Temperature-humidity IndexThis is an <strong>in</strong>dex of <strong>the</strong> human discomfort result<strong>in</strong>g from temperatureand moisture. It is found by add<strong>in</strong>g <strong>the</strong> dry- and wet-bulb temperatureread<strong>in</strong>gs, multiply<strong>in</strong>g <strong>the</strong> sum by 0.4, and add<strong>in</strong>g 15. About 10% of<strong>the</strong> population are uncomfortable before <strong>the</strong> <strong>in</strong>dex passes 70, more than50% are uncomfortable after it passes 75, and almost all are uncomfortableat 80 or greater.Psychrometric ChartsThe different methods of treat<strong>in</strong>g air can be shown on a psychrometricchart. The chart is a graphical representation of <strong>the</strong> fundamentalma<strong>the</strong>matical relationship deal<strong>in</strong>g with <strong>the</strong> <strong>the</strong>rmodynamic propertiesof moist air enter<strong>in</strong>g and leav<strong>in</strong>g a heat<strong>in</strong>g or cool<strong>in</strong>g unit.Three basic formulas are used to determ<strong>in</strong>e <strong>the</strong> follow<strong>in</strong>g quantities:©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>1. The total heat to be removed from both <strong>the</strong> gases and water vapor.2. The sensible heat removed from <strong>the</strong> air.3. The latent heat removed <strong>in</strong> condens<strong>in</strong>g <strong>the</strong> water vapor.Total heat = cubic feet/m<strong>in</strong>ute × 4.5 (h 1 - h 1 )= Btu/hourSensible heat = cubic feet/m<strong>in</strong>ute × 1.08 db 1 - db 1 )= Btu/hourLatent heat = cubic feet/m<strong>in</strong>ute × 68 (wb 1 - wb 2 )= Btu/hourwhere, h 1 = total heat for enter<strong>in</strong>g air, Btu/poundh 2 = total heat for leav<strong>in</strong>g air, Btu/pounddb 1 = enter<strong>in</strong>g air dry-bulb temperaturedb 2 = leav<strong>in</strong>g air dry-bulb temperaturewb 1 = enter<strong>in</strong>g air wet-bulb temperaturewb 2 = leav<strong>in</strong>g air wet-bulb temperatureMost heat<strong>in</strong>g and air condition<strong>in</strong>g calculations are made assum<strong>in</strong>gsea-level pressure and standard temperatures, but high altitude or hightemperature applications will require convert<strong>in</strong>g from standard conditionsto those actually present.Comfort ChartsBecause of <strong>the</strong> possibility of shock to <strong>the</strong> human system, it is notdesirable to have too great a difference between <strong>in</strong>door and outdoortemperatures, particularly <strong>in</strong> <strong>the</strong> summer. Also, from <strong>the</strong> standpo<strong>in</strong>t ofphysical comfort, low humidity with high temperature is comparable tohigh humidity at lower temperatures.The greatest physical comfort <strong>in</strong> cold wea<strong>the</strong>r without undue hightemperatures is achieved by <strong>in</strong>creas<strong>in</strong>g <strong>the</strong> humidity of <strong>the</strong> conditionedarea. This also expla<strong>in</strong>s why some parts of <strong>the</strong> country are not extremelyuncomfortable even though <strong>the</strong> outside air temperature is 100°F or morewith a low relative humidity.©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> TrendsHeat LeakageThe <strong>the</strong>rmal properties of a build<strong>in</strong>g affect <strong>the</strong> design of <strong>the</strong> aircondition<strong>in</strong>g and heat<strong>in</strong>g systems. The rate of heat loss through walls,floors, and ceil<strong>in</strong>gs is important when calculat<strong>in</strong>g <strong>the</strong> heat and/or cool<strong>in</strong>gload required for a build<strong>in</strong>g or area. Air leakage will take placethrough various apertures, such as cracks around w<strong>in</strong>dows and doors,through walls, ducts and chimneys.Most of <strong>the</strong> components of <strong>the</strong> cool<strong>in</strong>g load vary greatly dur<strong>in</strong>g a24-hour period and economic considerations should be <strong>the</strong> determ<strong>in</strong><strong>in</strong>gfactor <strong>in</strong> <strong>the</strong> selection of equipment for heat<strong>in</strong>g and cool<strong>in</strong>g season operations.Heat leakage is usually given <strong>in</strong> Btu per hour per degree Fahrenheittemperature difference per square foot of exposed surface (Btu/square foot/hour°F).Estimates of <strong>the</strong> maximum probable heat loss for each room orspace should <strong>in</strong>clude:• losses through conf<strong>in</strong><strong>in</strong>g walls, floors, ceil<strong>in</strong>gs, glass, or o<strong>the</strong>r surfacesand• <strong>in</strong>filtration losses due to leaks through cracks and crevices arounddoors and w<strong>in</strong>dows.The heat leakage through walls, floors, and ceil<strong>in</strong>gs depends on <strong>the</strong>type and thickness of <strong>the</strong> <strong>in</strong>sulat<strong>in</strong>g material used. The general formulafor heat leakage is:H = KA(t 1 - t 2 )where H = heat requiredK = heat-transfer coefficient, Btu/square foot/hour/°FA = area, square feett 1 - t 2 = temperature gradient through wall, °FFor example, suppose you wish to calculate <strong>the</strong> heat leakagethrough an 8-<strong>in</strong>ch concrete wall hav<strong>in</strong>g an area of 100 square feet if <strong>the</strong><strong>in</strong>side temperature is 70°F and <strong>the</strong> outside temperature is 10°F.The heat-transfer coefficient of a pla<strong>in</strong> 8-<strong>in</strong>ch concrete brick wall is©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>approximately 0.50 and substitution of values <strong>in</strong> <strong>the</strong> above equationgives:H = 0.50 × 100(70 - 10) = 3000 Btu/hourNatural VentilationThe natural forces that move air through and out of build<strong>in</strong>gs <strong>in</strong>cludew<strong>in</strong>d forces and temperature differences between <strong>the</strong> <strong>in</strong>side and<strong>the</strong> outside. Air movement can be caused by ei<strong>the</strong>r of <strong>the</strong>se forces act<strong>in</strong>galone or <strong>in</strong> comb<strong>in</strong>ation, depend<strong>in</strong>g on atmospheric conditions, build<strong>in</strong>gdesign, and location.The use of natural forces for produc<strong>in</strong>g ventilation can <strong>in</strong>volve <strong>the</strong>follow<strong>in</strong>g conditions:• average w<strong>in</strong>d velocity,• prevail<strong>in</strong>g w<strong>in</strong>d direction,• seasonal and daily variations <strong>in</strong> w<strong>in</strong>d velocity and direction, and• local w<strong>in</strong>d <strong>in</strong>terference by build<strong>in</strong>gs and o<strong>the</strong>r obstructions.Without obstructions to change <strong>the</strong> w<strong>in</strong>d’s direction, <strong>the</strong> movements of<strong>the</strong> airstream along with <strong>the</strong> pressure, rema<strong>in</strong> constant.Air leakage occurs through <strong>the</strong> build<strong>in</strong>g’s cracks or open<strong>in</strong>gs. Thecold and heavy air enters at low levels and pushes <strong>the</strong> warm and lightair out at higher levels. The same draft takes place <strong>in</strong> a chimney.Temperature-difference ForcesThe draft <strong>in</strong> a stack or chimney is known as <strong>the</strong> flue effect. The flueeffect of a stack is produced <strong>in</strong> a build<strong>in</strong>g when <strong>the</strong> outdoor temperatureis lower than <strong>the</strong> stack temperature. It is due to <strong>the</strong> difference <strong>in</strong> weightof <strong>the</strong> warm column of air <strong>in</strong> <strong>the</strong> stack and <strong>the</strong> cooler air outside. Theflow due to <strong>the</strong> flue effect is proportional to <strong>the</strong> square root of <strong>the</strong> draf<strong>the</strong>ad, and is given by <strong>the</strong> follow<strong>in</strong>g approximate relation:Q=9.4Ah t ± t o©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> TrendswhereQ = airflow, cubic feet/m<strong>in</strong>uteA = area of <strong>in</strong>lets or outlets (assumed equal), square feeth = height from <strong>in</strong>lets to outlets, feett = average temperature of <strong>in</strong>door air, °Ft o = temperature of outdoor air, °F9.4 = constant of proportionality, which <strong>in</strong>cludes a value of65% for <strong>the</strong> effectiveness of open<strong>in</strong>gsThe constant of proportionality can be reduced by 50% for a constant of7.2 if <strong>the</strong> effectiveness of <strong>the</strong> open<strong>in</strong>gs is not as favorable.<strong>Control</strong> TechniquesIn air-condition<strong>in</strong>g systems, various automatic controls are used.Wet- and dry-bulb temperatures, which show <strong>the</strong> temperature and humiditypresent, are always used. A hygrostat is sometimes used onsmaller <strong>in</strong>stallations.Zone <strong>Control</strong>Zone control <strong>in</strong>volves a division of <strong>the</strong> air supply delivered <strong>in</strong>tozones with vary<strong>in</strong>g requirements. A zone is an area among a number ofareas, which are all conditioned by a s<strong>in</strong>gle supply system. Each zonecan be satisfied simultaneously with <strong>the</strong> use of ei<strong>the</strong>r s<strong>in</strong>gle- ormultizone control, depend<strong>in</strong>g on <strong>the</strong> number and size of each zone.Conventional s<strong>in</strong>gle-zone units are <strong>in</strong>stalled one to each zone,which results <strong>in</strong> a simpler application. S<strong>in</strong>gle units are used when eachzone is large enough to justify a separate unit and when <strong>the</strong> system canaccommodate this number of units.Multizone control is preferred when several relatively small zonescan be grouped toge<strong>the</strong>r and handled by one control. The purpose of <strong>the</strong>multizone arrangement is to divide <strong>the</strong> total air volume <strong>in</strong>to a numberof separate parts and condition each <strong>in</strong>dependently. A two-zone systemis shown <strong>in</strong> Figure 1-1.This can also be done with zon<strong>in</strong>g dampers, which provide <strong>the</strong>necessary <strong>in</strong>dividualized control. The air outlet from <strong>the</strong> unit is parti-©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> TrendsA warm-air heat<strong>in</strong>g system is one <strong>in</strong> which <strong>the</strong> air is heated <strong>in</strong> afurnace and circulated through <strong>the</strong> rest of <strong>the</strong> structure ei<strong>the</strong>r by gravityor motor-driven centrifugal fans. A system <strong>in</strong> which air circulation dependsprimarily on mechanical means for its motive force is called aforced warm-air heat<strong>in</strong>g system. Some gravity warm-air systems usefans to supplement <strong>the</strong> gravity flow.Forced warm-air heat<strong>in</strong>g systems are often classified accord<strong>in</strong>g to<strong>the</strong> type of duct arrangement used. The two basic types of duct arrangementused are:• perimeter duct systems and• extended plenum duct systems.A perimeter duct system has <strong>the</strong> supply outlets located around <strong>the</strong>outer edge of <strong>the</strong> structure. Perimeter duct systems <strong>in</strong>clude perimeterloopduct systems and radial-type perimeter duct systems. In <strong>the</strong> perimeter-loopsystems, <strong>the</strong> ducts around <strong>the</strong> perimeter are connected <strong>in</strong> aloop while <strong>in</strong> <strong>the</strong> radial system <strong>the</strong>re is no loop with only <strong>the</strong> radialfeeder ducts from <strong>the</strong> furnace unit.An external plenum system has a large rectangular duct whichextends out from <strong>the</strong> furnace plenum <strong>in</strong> a straight l<strong>in</strong>e down <strong>the</strong> centerof <strong>the</strong> build<strong>in</strong>g. Smaller supply ducts connect <strong>the</strong> plenum to <strong>the</strong> heatemitt<strong>in</strong>g units.Year-around Air Condition<strong>in</strong>gYear-around air condition<strong>in</strong>g systems warm <strong>the</strong> air dur<strong>in</strong>g <strong>the</strong>w<strong>in</strong>ter and may also wash, filter, and humidify it. Dur<strong>in</strong>g <strong>the</strong> summer,<strong>the</strong> air-condition<strong>in</strong>g system will cool <strong>the</strong> air and perform humidificationor dehumidification as required. A year-round air-condition<strong>in</strong>g systemcan elim<strong>in</strong>ate <strong>the</strong> dust, soot, and germs from <strong>the</strong> air enter<strong>in</strong>g <strong>the</strong> <strong>in</strong>takeducts. It may <strong>in</strong>crease <strong>the</strong> humidity <strong>in</strong> w<strong>in</strong>ter and decrease <strong>the</strong> relativehumidity or moisture content of <strong>the</strong> air <strong>in</strong> summer. Circulation of <strong>the</strong>conditioned air also takes place. Figure 1-2 shows two arrangements ofequipment for year-around air-condition<strong>in</strong>g.Several types of service techniques can be used <strong>in</strong>clud<strong>in</strong>g gas-compression,absorption and steam-jet vacuum. Gas-compression is mostcommon and consists of a refrigeration system employ<strong>in</strong>g a mechanical©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 1-2(A). Central year-round air-condition<strong>in</strong>g system.Figure 1-2(B). Central year-round air-condition<strong>in</strong>g system.compression device (compressor) to move <strong>the</strong> low-pressure refrigeranton <strong>the</strong> low-pressure side of <strong>the</strong> unit and deliver it to <strong>the</strong> high-pressureside.An absorption air-condition<strong>in</strong>g system uses a refrigerant gas <strong>in</strong> <strong>the</strong>evaporator which is taken up by an absorber and released <strong>in</strong> a generatorupon <strong>the</strong> application of heat. A steam-jet air-condition<strong>in</strong>g system is avacuum-refrigeration system where high-pressure steam is suppliedthrough a nozzle and acts to eject water from <strong>the</strong> evaporator ma<strong>in</strong>ta<strong>in</strong>-©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> Trends<strong>in</strong>g low pressure <strong>in</strong> <strong>the</strong> evaporator. The required pressure on <strong>the</strong> highside takes place by compression us<strong>in</strong>g a diffusion passage.Central SystemsA central air-condition<strong>in</strong>g system is generally designed for assembly<strong>in</strong> <strong>the</strong> field ra<strong>the</strong>r than <strong>in</strong> <strong>the</strong> factory as a unit. One condens<strong>in</strong>g unitcan service several rooms at a lower cost than a number of self-conta<strong>in</strong>edunits serv<strong>in</strong>g s<strong>in</strong>gle rooms. Central air-condition<strong>in</strong>g systems provideair ducts to <strong>the</strong> various rooms along with one or more exhaust fansto remove any undesired proportion of <strong>the</strong> air.Mix<strong>in</strong>gA mix<strong>in</strong>g chamber is usually <strong>in</strong>corporated <strong>in</strong> <strong>the</strong> system for <strong>the</strong>purpose of recirculat<strong>in</strong>g a portion of <strong>the</strong> air with<strong>in</strong> <strong>the</strong> build<strong>in</strong>g <strong>in</strong> orderto reduce <strong>the</strong> load and operat<strong>in</strong>g costs. In <strong>the</strong> summer <strong>the</strong> cooled air and<strong>in</strong> <strong>the</strong> w<strong>in</strong>ter <strong>the</strong> heated air is mixed with <strong>the</strong> fresh air drawn <strong>in</strong> fromoutside, so that <strong>the</strong> load is reduced considerably.Some fresh air is drawn <strong>in</strong> and mixed with <strong>the</strong> recirculated air. Thisis accomplished with a mix<strong>in</strong>g damper. The mix<strong>in</strong>g chamber must beairtight so that little or no air leakage occurs.Heat<strong>in</strong>g CoilsIn cold wea<strong>the</strong>r regions a heat<strong>in</strong>g or temper<strong>in</strong>g coil is used towarm <strong>the</strong> <strong>in</strong>take air. This is used when <strong>the</strong> outside air is at such a lowtemperature that <strong>the</strong> heat from <strong>the</strong> recirculated air may not be sufficientto meet <strong>the</strong> requirements of <strong>the</strong> load.Temper<strong>in</strong>g heaters must be used wherever cold conditions arefound. In some cases, <strong>the</strong>se conditions may not occur every year or forany length of time. The temper<strong>in</strong>g heater is designed to prevent cold<strong>in</strong>com<strong>in</strong>g air from caus<strong>in</strong>g <strong>the</strong> water spray to freeze.There are several different types of heaters available. The electricheater requires little space but is expensive to operate unless electricityis available at very low rates.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>PreheatersA preheater may be used to add heat to <strong>the</strong> airstream when <strong>the</strong>temperature of <strong>the</strong> <strong>in</strong>com<strong>in</strong>g air is so low that <strong>the</strong> temper<strong>in</strong>g heaters onwhich <strong>the</strong> heat<strong>in</strong>g load falls are unable to ma<strong>in</strong>ta<strong>in</strong> <strong>the</strong> required 68 or70°F at <strong>the</strong> fan.The preheater is used only where extreme temperature conditionsare encountered. In many systems, <strong>the</strong> temper<strong>in</strong>g heaters are made wi<strong>the</strong>nough capacity to carry <strong>the</strong> heat<strong>in</strong>g load.Cool<strong>in</strong>g CoilsThe cool<strong>in</strong>g coils may be chilled by means of refrigerants or apump-forced liquid, such as br<strong>in</strong>e or water. If water of <strong>the</strong> proper coolnessis obta<strong>in</strong>able <strong>in</strong> sufficient quantity, as is <strong>the</strong> case <strong>in</strong> many nor<strong>the</strong>rncities, it may be employed, s<strong>in</strong>ce it requires only a pump<strong>in</strong>g operationto lift it out of <strong>the</strong> ground. Cold water can also be obta<strong>in</strong>ed with mechanicalrefrigeration equipment.Air-supply FansSupply fans and blowers are available <strong>in</strong> various types for specificpurposes. The selection of <strong>the</strong> proper type is important if <strong>the</strong> operationis to be economical and efficient. In general, fans can be divided <strong>in</strong>to twotypes: propeller and centrifugal or turb<strong>in</strong>e.Propeller fans are used <strong>in</strong> short ducts or when <strong>the</strong>re are no ducts.The low speed of <strong>the</strong> blades near <strong>the</strong> hub, compared with <strong>the</strong> peripheralspeed, makes this form of fan unsuitable to overcome <strong>the</strong> resistanceencountered <strong>in</strong> long ducts. The air driven by <strong>the</strong> effective blade areasnear <strong>the</strong> rim can pass back through <strong>the</strong> less effective blade areas at <strong>the</strong>hub than to move aga<strong>in</strong>st <strong>the</strong> duct resistance. Propeller fans also tend tocreate more noise.Many air-condition<strong>in</strong>g <strong>in</strong>stallations require long air ducts to carry<strong>the</strong> conditioned air to <strong>the</strong> various areas of <strong>the</strong> build<strong>in</strong>g. Centrifugal andturb<strong>in</strong>e-type fans are employed <strong>in</strong> <strong>the</strong>se <strong>in</strong>stallations.©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> TrendsFilter<strong>in</strong>gAir filters <strong>in</strong>clude those that can be mechanically cleaned as well asreplaceable and electronic units. The air filter is usually operated yearround. There are times when <strong>the</strong> cool<strong>in</strong>g and humidify<strong>in</strong>g functions arenot needed, but <strong>the</strong> filter is one part of <strong>the</strong> system that may be kept <strong>in</strong>cont<strong>in</strong>uous operation.Air WashersAn air washer is a unit that br<strong>in</strong>gs <strong>the</strong> air <strong>in</strong>to contact with wateror a wet surface. The pr<strong>in</strong>cipal functions of <strong>the</strong> air washer are to cool <strong>the</strong>air passed through <strong>the</strong> spray chamber and control <strong>the</strong> humidity.In some cases, <strong>the</strong> air may be passed over <strong>the</strong> wet surface. More<strong>in</strong>timate contact is possible when <strong>the</strong> water is divided <strong>in</strong>to a f<strong>in</strong>e sprayand <strong>the</strong> air passed through <strong>the</strong> spray chamber.Some of <strong>the</strong> f<strong>in</strong>er water particles will be carried along with <strong>the</strong> aircurrent and a series of curved plates called elim<strong>in</strong>ators may be used tochange <strong>the</strong> direction of air flow and throw off some of <strong>the</strong> water particles.The water is generally circulated with a pump. Warm water ispassed over refrigerat<strong>in</strong>g coils to cool it before be<strong>in</strong>g passed to <strong>the</strong> spraychamber.In some cases, <strong>the</strong> water is cool enough to use as it is drawn from<strong>the</strong> ground. In o<strong>the</strong>r cases, <strong>the</strong> water is not cool enough and must becooled by refrigeration.Indoor Design ConditionsThe <strong>in</strong>door conditions to be ma<strong>in</strong>ta<strong>in</strong>ed <strong>in</strong> a build<strong>in</strong>g are <strong>the</strong> drybulbtemperature and relative humidity of <strong>the</strong> air at a breath<strong>in</strong>g l<strong>in</strong>e 3to 5 feet above <strong>the</strong> floor. The area should <strong>in</strong>dicate average conditionsand not be affected by abnormal or unusual heat ga<strong>in</strong>s or losses from <strong>the</strong><strong>in</strong>terior or exterior.S<strong>in</strong>ce it is difficult to ma<strong>in</strong>ta<strong>in</strong> <strong>the</strong> mean radiant temperature at <strong>the</strong>dry-bulb temperature <strong>in</strong> actual practice, <strong>the</strong> effect of warmer walls normallyencountered dur<strong>in</strong>g <strong>the</strong> cool<strong>in</strong>g season requires a lower design©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> TrendsAdjustment for air-mass modification may be needed near largebodies of water where air moves from <strong>the</strong> water over <strong>the</strong> land <strong>in</strong> <strong>the</strong>summer. On <strong>the</strong> West Coast, both dry- and wet-bulb temperatures <strong>in</strong>creasewith distance from <strong>the</strong> ocean. In <strong>the</strong> region north of <strong>the</strong> Gulf ofMexico, dry-bulb temperatures <strong>in</strong>crease for <strong>the</strong> first 200 or 300 miles,with a slight decrease <strong>in</strong> wet-bulb temperature due to mix<strong>in</strong>g and drier<strong>in</strong>land air. Beyond <strong>the</strong> 200- to 300-mile belt, both dry- and wet-bulbvalues tend to decrease at a somewhat regular rate.The difference between large areas of dry surfaces and large areasof dense foliage upw<strong>in</strong>d from <strong>the</strong> site can account for variations of upto 2°F wet-bulb and 5°F dry-bulb temperature. The warmer temperaturesare associated with dry surfaces.Wea<strong>the</strong>r-oriented Design FactorsThe general approach to air-condition<strong>in</strong>g system design <strong>in</strong>volves<strong>the</strong> computation of a peak design load at a condition established us<strong>in</strong>gone of <strong>the</strong> frequency of occurrence levels of dry- and wet-bulb wea<strong>the</strong>rdata.Dur<strong>in</strong>g <strong>the</strong> four warmest summer months, <strong>the</strong>se values occur between2:00 p.m. and 4:00 p.m. The w<strong>in</strong>ter statistics occur dur<strong>in</strong>g <strong>the</strong> 3coldest months between 6:00 a.m. and 8:00 a.m. The daily dry-bulbvariation will be of <strong>the</strong> order of <strong>the</strong> daily range.Statistically, <strong>the</strong> daily range is <strong>the</strong> long-term average daily rangefor <strong>the</strong> warmest month. The daily range is generally greater dur<strong>in</strong>g clearwea<strong>the</strong>r and much less dur<strong>in</strong>g cloudy or ra<strong>in</strong>y wea<strong>the</strong>r.An approximation of <strong>the</strong> distribution of <strong>the</strong> hourly dry-bulb temperaturescan be made by us<strong>in</strong>g <strong>the</strong> daily maximum at 3:00 p.m. and <strong>the</strong>m<strong>in</strong>imum at 7:00 a.m.In <strong>the</strong> cont<strong>in</strong>ental or <strong>in</strong>land areas of <strong>the</strong> United States, <strong>the</strong> maximumdry-bulb and maximum wet-bulb temperatures are not co<strong>in</strong>cident.In maritime areas <strong>the</strong>y tend to be co<strong>in</strong>cident.The assumption of dry- and wet-bulb co<strong>in</strong>cidence can result <strong>in</strong>wea<strong>the</strong>r-oriented loads of up to 1/2 greater than might be expected. Onesolution is to determ<strong>in</strong>e if <strong>the</strong> structure is most sensitive to dry-bulb(extensive exterior) or wet-bulb, (outside air ventilation).From several years of local wea<strong>the</strong>r records, select days with <strong>the</strong>maximum wet- and dry-bulb entries. Tabulate <strong>the</strong> dry-bulb peak with©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong><strong>the</strong> correspond<strong>in</strong>g wet-bulb and <strong>the</strong> wet-bulb peak with its correspond<strong>in</strong>gdry-bulb. This will show <strong>the</strong> local co<strong>in</strong>cident data.As more complicated and sophisticated applications are utilized tomeet energy-sav<strong>in</strong>g demands, design maximums based on peak valueswill not suffice. Off-peak values need to be considered. Some types ofdays that must be accommodated are more frequent <strong>in</strong> occurrence thanmaximum or m<strong>in</strong>imum design days. Examples of <strong>the</strong>se <strong>in</strong>clude cloudywith small temperature change, warm a.m., cool p.m. and w<strong>in</strong>dy.Mach<strong>in</strong>e computations allow rapid calculations of dry-bulb temperaturewith its correspond<strong>in</strong>g wet-bulb maximum for several hoursdaily on both a room-by-room and a zone or build<strong>in</strong>g basis. This canresult <strong>in</strong> more accurate control as well as more compatible system operation.It can also provide energy-consumption estimates.Humidity <strong>Control</strong>sHumidity control <strong>in</strong>volves controll<strong>in</strong>g <strong>the</strong> amount of water vaporpresent <strong>in</strong> <strong>the</strong> air <strong>in</strong> <strong>the</strong> space. When <strong>the</strong> relative humidity at <strong>the</strong> desiredtemperature setpo<strong>in</strong>t is too high, dehumidification is used to reduce <strong>the</strong>amount of water vapor <strong>in</strong> <strong>the</strong> air. When <strong>the</strong> relative humidity at <strong>the</strong>desired temperature setpo<strong>in</strong>t is too low, humidification is used to <strong>in</strong>crease<strong>the</strong> amount of water vapor <strong>in</strong> <strong>the</strong> air.The relative humidity depends on <strong>the</strong> dry-bulb temperature. Drybulb temperature and relative humidity are usually specified concurrently.A 70°F dry bulb and 50% RH measured <strong>in</strong> a room has an actualmoisture content or specific humidity of 54.5 gra<strong>in</strong>s of water per poundof dry air. A room with <strong>the</strong> same specific humidity at 60°F will haveabout 70% RH. At 80°F this becomes about 35% RH.Humidity controllers are also known as humidistats. These unitsare usually contiguous to <strong>the</strong> <strong>the</strong>rmostat so <strong>the</strong> humidity is based on <strong>the</strong>ambient temperature. The humidity controller is set at <strong>the</strong> relative humiditysetpo<strong>in</strong>t. A change <strong>in</strong> relative humidity from <strong>the</strong> setpo<strong>in</strong>t causesa control signal to be sent to <strong>the</strong> controlled component.Humidifiers use water spray, steam grid and steam pan techniques.In a water spray system, <strong>the</strong> controlled component is a watervalve.If a duct-mounted steam grid humidifier is used, <strong>the</strong> control signalopens <strong>the</strong> steam valve at <strong>the</strong> <strong>in</strong>let to <strong>the</strong> humidifier unit. As <strong>the</strong> steam©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> Trendsvalve opens, steam flows through <strong>the</strong> humidifier <strong>in</strong> <strong>the</strong> supply airstreamand raises <strong>the</strong> relative humidity.Dehumidification methods <strong>in</strong>volve <strong>the</strong> use of desiccants, surfacecool<strong>in</strong>g and <strong>in</strong>direct cool<strong>in</strong>g coils. Indirect cool<strong>in</strong>g coils are used withsprayed coil dehumidification.Dehumidification may take place with sensible (dry bulb) cool<strong>in</strong>gus<strong>in</strong>g surface dehumidification on <strong>the</strong> cool<strong>in</strong>g coils. Dehumidification <strong>in</strong>low dew po<strong>in</strong>t process systems is usually done <strong>in</strong> a separate dehumidificationunit.Air leav<strong>in</strong>g <strong>the</strong> cool<strong>in</strong>g coil from surface dehumidification is usuallynear a saturated condition. If cool<strong>in</strong>g is controlled from <strong>the</strong> relativehumidity <strong>in</strong> order to remove water vapor, <strong>the</strong> supply air will often becooled more than is required for sensible or dry cool<strong>in</strong>g. The space may<strong>the</strong>n require some reheat<strong>in</strong>g to prevent overcool<strong>in</strong>g.<strong>HVAC</strong> IntelligenceMost improvements to <strong>HVAC</strong> systems <strong>in</strong>volve <strong>in</strong>creas<strong>in</strong>g <strong>the</strong>ir<strong>in</strong>telligence. Setback <strong>the</strong>rmostats, which are also known as clock or electronic<strong>the</strong>rmostats, automatically raise or lower <strong>in</strong>door temperatures tomeet <strong>the</strong> build<strong>in</strong>g’s schedule. Indoor temperatures can setback to lowerthan average comfort levels while <strong>the</strong> build<strong>in</strong>g is unoccupied, <strong>the</strong>n <strong>the</strong>yare automatically brought back up to <strong>the</strong> comfort level before it is fullyoccupied. O<strong>the</strong>r smaller setbacks might start at mid-morn<strong>in</strong>g when <strong>the</strong>outside temperature starts to warm.Without any sacrifices <strong>in</strong> comfort, a 10 to 20% sav<strong>in</strong>gs on annualheat<strong>in</strong>g bills are feasible. In <strong>the</strong> summertime <strong>the</strong> setback feature is usedto save on air condition<strong>in</strong>g costs. Some clock <strong>the</strong>rmostats use 7-dayprograms with a different schedule for each day of <strong>the</strong> week. Ano<strong>the</strong>rschedule is <strong>the</strong> 5 + 1 + 1 weekly program, which uses a Mondaythrough-Fridaytimetable and separate timetables for Saturday and Sunday.There are also 5 + 2 schedules which use two programs, one for <strong>the</strong>five workdays and ano<strong>the</strong>r for <strong>the</strong> weekend.Programmable units have evolved <strong>in</strong>to flexible electronic unitswith displays and buttons from <strong>the</strong> earlier electromechanical modelsthat used small levers or p<strong>in</strong>s to mark <strong>the</strong> setback times. Manual overridesare used to override <strong>the</strong> current temperature setpo<strong>in</strong>t without reprogramm<strong>in</strong>g<strong>the</strong> <strong>the</strong>rmostat. <strong>New</strong>er models automatically return to <strong>the</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>orig<strong>in</strong>al program after <strong>the</strong> override period is complete. Electronic <strong>the</strong>rmostatsalso use a key or switch that allows you to change from a heat<strong>in</strong>gseason program to cool<strong>in</strong>g, or back aga<strong>in</strong> without reprogramm<strong>in</strong>g.Some models will make <strong>the</strong> changeover automatically.Heat<strong>in</strong>g-only and cool<strong>in</strong>g-only systems have two or three wires,and comb<strong>in</strong>ed heat<strong>in</strong>g-cool<strong>in</strong>g systems typically have four or five wires.Heat pumps use eight or n<strong>in</strong>e wires.Electronic <strong>the</strong>rmostats use batteries to ma<strong>in</strong>ta<strong>in</strong> <strong>the</strong> program <strong>in</strong>case of a power failure. Most units use a 24-volt power source, but <strong>the</strong>reare also 120-volt or millivolt systems. Some use batteries as <strong>the</strong>ir onlysource of power. This type of battery-only <strong>the</strong>rmostat should have alow-battery <strong>in</strong>dicator to warn of impend<strong>in</strong>g problems.A key improvement <strong>in</strong> <strong>the</strong> future is to equip systems with moreand better sensors so that <strong>the</strong> controller has <strong>the</strong> proper feedback it needsto make smarter adjustments. These sensors will monitor not only <strong>the</strong><strong>in</strong>door and outdoor air temperature, but relative humidity and w<strong>in</strong>dconditions may be monitored as well.More extensive climate control will be used that def<strong>in</strong>es heat<strong>in</strong>gand cool<strong>in</strong>g needs us<strong>in</strong>g current wea<strong>the</strong>r <strong>in</strong>formation along with forecast<strong>in</strong>formation <strong>in</strong> some cases.The concept of zon<strong>in</strong>g will also grow as a cost effective techniqueand control systems will use more <strong>the</strong>rmostats and/or remote sensorsthroughout <strong>the</strong> build<strong>in</strong>g.Pressure <strong>Control</strong>If a forced-air system is not <strong>in</strong> pressure balance, some areas will bepressurized while o<strong>the</strong>rs are depressurized. The depressured areas willbe subject to <strong>in</strong>trusion by cool, dry air from outside. Ductwork leaksallow <strong>the</strong> depressurization effects and dryness to become worse. When<strong>the</strong> ductwork is used for air condition<strong>in</strong>g, depressurization can allowhot, humid air to enter. When a furnace draws its combustion air fromoutdoors, this can also cause depressurization.One way to reduce <strong>the</strong> dryness and fuel consumption is to raise <strong>the</strong>relative humidity <strong>in</strong>side. Ano<strong>the</strong>r technique is to add new supply orreturn air ducts to supply a better balance or regulate <strong>the</strong> system byopen<strong>in</strong>g and clos<strong>in</strong>g air outlets. Air outlet and duct control <strong>in</strong> <strong>the</strong> futurewill be based on a cont<strong>in</strong>uation of exist<strong>in</strong>g trends <strong>in</strong>cludes <strong>in</strong>creased©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> Trends<strong>in</strong>tegration, better communications, more <strong>in</strong>telligence <strong>in</strong> <strong>the</strong> equipment,<strong>in</strong>creased use of PCs and improved price/performance ratios.Motion <strong>Control</strong> IntegrationIntegration of motion control systems and <strong>the</strong> <strong>in</strong>formation that<strong>the</strong>y control <strong>in</strong> future automated control systems will make this technologymore useful, less complex, more powerful, and physically smaller.As <strong>the</strong> mach<strong>in</strong>e adapts to use fewer and smaller components, new formsof actuators will be adopted.Smarter and smaller electronics will allow multi-box solutions tobecome s<strong>in</strong>gle-box solutions with <strong>the</strong> electronics built <strong>in</strong>to <strong>the</strong> motor.With <strong>the</strong> trend towards more open controls, <strong>the</strong> drive <strong>in</strong>telligence will be<strong>in</strong>tegrated fur<strong>the</strong>r <strong>in</strong>to <strong>the</strong> motion control module.The first step is <strong>the</strong> <strong>in</strong>tegration of <strong>the</strong> control with <strong>the</strong> amplifier.Intelligent drives will replace power blocks and traditional amplifiers.An <strong>in</strong>telligent drive conta<strong>in</strong>s <strong>the</strong> traditional amplifier along with featureslike auto tun<strong>in</strong>g, auto tun<strong>in</strong>g on <strong>the</strong> fly, diagnostics, horsepowercalculation, calculation of <strong>the</strong> three ma<strong>in</strong> torques be<strong>in</strong>g delivered (frictiontorque, acceleration torque, and work torque), feedback of position,velocity, acceleration and <strong>in</strong>ertia calculation. Once you know accelerationtorque and acceleration rate, <strong>in</strong>ertia can be calculated.There are already products that can do closed-loop control with ahybrid step motor. In <strong>the</strong> future, motion control platforms will allow anymotor type to be controlled for a wide range of velocity and position<strong>in</strong>gapplications. The feedback device may be an encoder, resolver or tachometerwhich will be electronically recognized and controlled to provide<strong>the</strong> needed feedback signals. Many motion applications will usesensorless position<strong>in</strong>g techniques where embedded signals from <strong>the</strong>motor itself provide <strong>the</strong> feedback signals.Contrex has a l<strong>in</strong>e of position control products designed to add<strong>in</strong>telligent control and operator <strong>in</strong>terface to all types of variable speeddrives. This makes it possible to register and synchronize <strong>in</strong>dependentmach<strong>in</strong>es, allow<strong>in</strong>g <strong>the</strong>m to work toge<strong>the</strong>r and to followpreprogrammed motion profiles. Rockwell Automation has added enhancedmotion control <strong>in</strong> <strong>the</strong>ir Allen-Bradley ProcessLogix distributedprocess control system.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Feedback DevicesWhile more sensorless systems may be appear<strong>in</strong>g, many motioncontrol systems will cont<strong>in</strong>ue to need feedback devices. These aremostly encoders and <strong>the</strong>re will be cont<strong>in</strong>u<strong>in</strong>g ref<strong>in</strong>ements <strong>in</strong> <strong>the</strong>se. Incrementalencoders will evolve <strong>in</strong>to networkable smart devices that takeover tasks now done by absolute encoders.S<strong>in</strong>ce <strong>the</strong>y will be tied <strong>in</strong>to <strong>the</strong> network, <strong>the</strong>y will always be powered.If a position is changed when <strong>the</strong> mach<strong>in</strong>e is powered off, <strong>the</strong>y willstill be able to monitor position and <strong>the</strong> mach<strong>in</strong>e control server will beable to ma<strong>in</strong>ta<strong>in</strong> an absolute position.The newer encoders can also function <strong>in</strong> temperatures that traditionallyhave called for resolvers. BEI Motion Systems, for example, hasencoders that operate at 105°C, and Admotec has magnetic encodersthat work from -30 to 90°C.Sometimes a feedback device is not used. Semipower Systems’IndexBlok drive module can position 1 to 20 kW three-phase motorswith up to 16-bit resolution per electrical cycle of <strong>the</strong> motor with nofeedback device. It gets its <strong>in</strong>formation from <strong>the</strong> motor itself and processesit with special software.L<strong>in</strong>ear encoders cont<strong>in</strong>ue to improve. Danaher <strong>Control</strong>s’ DynaparLR/LS <strong>in</strong>ductive l<strong>in</strong>ear encoder provides resolutions to 0.25 micronwithout <strong>the</strong> use of glass scales.Feedback devices will undergo more changes besides <strong>the</strong> additionof network capability. Conventional encoders will be replaced by lasersensors and fiber-optic sensors <strong>in</strong> <strong>the</strong> future.Trends <strong>in</strong> Motor TechnologyThe move to <strong>in</strong>tegration <strong>in</strong>volves build<strong>in</strong>g all <strong>the</strong> electronics <strong>in</strong>to<strong>the</strong> motor. Animatics has done this with its SmartMotor l<strong>in</strong>e. The <strong>in</strong>tegrationof controls <strong>in</strong>to <strong>the</strong> motor package will be paced by advances <strong>in</strong>power control devices. Smaller, more <strong>in</strong>telligent and more efficient motorcontroller packages will operate both brushless and stepper motors.Motors and <strong>the</strong> mechanical components associated with <strong>the</strong>m willga<strong>in</strong> <strong>in</strong> performance and decrease <strong>in</strong> price. This will be due partly toimprovements <strong>in</strong> materials, especially magnetic materials and <strong>in</strong>sulationsystems. Servo technology is becom<strong>in</strong>g more easier to use and tune.Brushless servo motors and amplifiers will show a cont<strong>in</strong>u<strong>in</strong>g©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> Trendsdecl<strong>in</strong>e <strong>in</strong> price, size, and <strong>in</strong>creases <strong>in</strong> performance. This will cause <strong>the</strong>mto dom<strong>in</strong>ate <strong>the</strong> market at <strong>the</strong> expense of stepper motors. Stepper motorswill still have <strong>the</strong>ir applications due to stepper drive technology<strong>in</strong>novations.Stepper motors are improv<strong>in</strong>g and <strong>the</strong>y have <strong>the</strong>ir advantages anddisadvantages. They <strong>in</strong>itially became popular because <strong>the</strong>y ran openloop and were simple to apply. No feedback loop was needed. The controllerjust sends <strong>the</strong> proper number of pulses and <strong>the</strong>n goes to thisposition. Once <strong>in</strong> position <strong>the</strong>y do not hunt, as servos can. However,<strong>the</strong>y have some peculiar dynamics, and under certa<strong>in</strong> conditions andspeeds can become unstable. If <strong>the</strong>y miss steps, <strong>the</strong> system is out ofposition until reset.Microstepp<strong>in</strong>g is a way to <strong>in</strong>crease <strong>the</strong> number of positions that astep motor can assume. It has been ref<strong>in</strong>ed by <strong>the</strong> Compumotor Divisionof Parker Hannif<strong>in</strong> <strong>in</strong> its OEMZ14 microstepp<strong>in</strong>g drive. This drive usesspecial damp<strong>in</strong>g circuits for Anti-Resonance and Electronic Viscositydamp<strong>in</strong>g. These are designed to defeat <strong>the</strong> step motor’s resonance effectsand stop any r<strong>in</strong>g<strong>in</strong>g that can occur after quick moves.There are several approaches to <strong>the</strong> missed-step problem. OrientalMotors’ Alpha Step system uses an <strong>in</strong>tegral encoder and automaticallyswitches to closed-loop control if <strong>the</strong> motor beg<strong>in</strong>s to lose synchronization.When <strong>the</strong> lost steps are made up, <strong>the</strong> system switches back to openloop.Compumotor uses ano<strong>the</strong>r approach to <strong>the</strong> synchronism problem.Its Gem<strong>in</strong>i series can recognize if <strong>the</strong> motor has stalled without a feedbackdevice, and <strong>the</strong> method is be<strong>in</strong>g extended to allow <strong>the</strong> step motorto operate closed loop.L<strong>in</strong>ear motors are ga<strong>in</strong><strong>in</strong>g <strong>in</strong> performance and popularity, and thistrend is likely to cont<strong>in</strong>ue. Their ability to elim<strong>in</strong>ate lead screws, gears,pulleys, and <strong>the</strong> associated complexity and backlash will <strong>in</strong>crease <strong>the</strong>iruse.L<strong>in</strong>ear motors are <strong>in</strong>creas<strong>in</strong>g <strong>in</strong> power, precision, and ease of use,while prices are decreas<strong>in</strong>g. This will cont<strong>in</strong>ue as l<strong>in</strong>ear motors prevailas <strong>the</strong> fastest grow<strong>in</strong>g motor segment.Network<strong>in</strong>gIntegrat<strong>in</strong>g motion control <strong>in</strong>volves more than mov<strong>in</strong>g <strong>the</strong> controland drive <strong>in</strong>to <strong>the</strong> same package or even mov<strong>in</strong>g <strong>the</strong>m <strong>in</strong>to <strong>the</strong> motor.Integration starts with communication and is focused on open systems.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Motion control equipment has used <strong>the</strong> SERCOS standard forsome time. There is an <strong>in</strong>creas<strong>in</strong>g movement to DeviceNet, Profibus,MODBUS, and o<strong>the</strong>rs <strong>in</strong>clud<strong>in</strong>g USB and IEEE 1394 (FireWire).DeviceNet is used by Whedco which is a subsidiary of GE Fanus. Thetrend to distributed control uses open architectures such as DeviceNet.DeviceNet is popular but it has some limitations. S<strong>in</strong>ce it is a device-levelbus, it was not designed for transferr<strong>in</strong>g larger files. File transfercapability is be<strong>in</strong>g added with a new DeviceNet System file transferspecification. This should allow <strong>the</strong> motion controller to be run from <strong>the</strong>DeviceNet ports without <strong>the</strong> need for an additional serial port.The use of E<strong>the</strong>rnet for motion control applications is spread<strong>in</strong>gand should cont<strong>in</strong>ue. It offers technical and ease-of-use advantages.E<strong>the</strong>rnet will be used <strong>in</strong> <strong>the</strong> future as a bus for motion, I/O, and sensors.Some work still needs to be done at <strong>the</strong> application layer, to allow<strong>in</strong>teroperability. Ormec Systems and mach<strong>in</strong>e vision supplier DVT havecreated a vision-guided motion control system that uses E<strong>the</strong>rnet TCP/IP to connect <strong>the</strong> vision system and motion controller. E<strong>the</strong>rnet willcont<strong>in</strong>ue to grow <strong>in</strong> importance, but Profibus-DP will also ga<strong>in</strong> <strong>in</strong> acceptancefor motion control.Universal Serial Bus (USB) is f<strong>in</strong>d<strong>in</strong>g <strong>in</strong>dustrial uses, especially fordata acquisition. USB for motion control is also appear<strong>in</strong>g with a USBconnecteddrive by Galil Motion <strong>Control</strong>.Ano<strong>the</strong>r bus that is mov<strong>in</strong>g <strong>in</strong> <strong>the</strong> <strong>in</strong>dustrial world is <strong>the</strong> IEEE 1394FireWire. It runs at 200-Mbps, which is fast enough to be <strong>in</strong>side a servoloop. It is plug-and-play and uses low-cost cable and connectors. OrmecSystems has a version of 1394 for servo applications called ServoWire.Acroloop Motion <strong>Control</strong> Systems is also us<strong>in</strong>g IEEE 1394.In applications that require axis coord<strong>in</strong>ation for path control,SERCOS has established itself as <strong>the</strong> dom<strong>in</strong>ant open network with <strong>the</strong><strong>in</strong>telligence distributed to <strong>the</strong> servo drives. In simpler applicationswhere axes movements are <strong>in</strong>dependently sequenced or a number ofaxes are electronically geared toge<strong>the</strong>r, more <strong>in</strong>telligence and control aredistributed from <strong>the</strong> servo controller to <strong>the</strong> drive. These smart driveswill <strong>the</strong>n be connected toge<strong>the</strong>r via a field bus.PCsPCs have moved <strong>in</strong>to more <strong>in</strong>dustrial roles. Start<strong>in</strong>g as programm<strong>in</strong>gdevices and operator <strong>in</strong>terfaces (OIs) for dedicated control equipment.They have taken over more control tasks from DCS to soft PLCs.©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> TrendsPC use has steadily expanded <strong>in</strong> spite of persistent worries aboutnondeterm<strong>in</strong>istic behavior.Just a few years ago, PCs were used as motion programmers andas OIs, while <strong>the</strong> actual motion control was done by a dedicated unitthat drove a separate amplifier. Then, motion control cards wereplugged <strong>in</strong>to <strong>the</strong> PC’s backplane. The next step is to let <strong>the</strong> PC do <strong>the</strong>motion controller task <strong>in</strong> software, us<strong>in</strong>g its own real-time operat<strong>in</strong>gsystem.PCs will take over an <strong>in</strong>creas<strong>in</strong>g part of <strong>the</strong> data handl<strong>in</strong>g andcommunications function, help<strong>in</strong>g to tie <strong>the</strong> motion control function <strong>in</strong>to<strong>the</strong> entire system or network. Dedicated, proprietary boxes will be <strong>in</strong> <strong>the</strong>past as open controls become <strong>the</strong> future. As PC-based controls dom<strong>in</strong>ate,<strong>the</strong>re will be a cont<strong>in</strong>ued trend towards more general-purpose controllers.As <strong>the</strong>se general-purpose motion controls start to dom<strong>in</strong>ate, costswill be driven downward through better manufactur<strong>in</strong>g techniques,<strong>in</strong>clud<strong>in</strong>g reduc<strong>in</strong>g <strong>the</strong> controller to <strong>the</strong> chip level.PC-based control software has achieved development time sav<strong>in</strong>gsdue to a s<strong>in</strong>gle programm<strong>in</strong>g environment, s<strong>in</strong>gle database, and full<strong>in</strong>tegration with logic and HMI (human-mach<strong>in</strong>e <strong>in</strong>terface) functions.Cont<strong>in</strong>ued advancements <strong>in</strong> ma<strong>in</strong>stream PC technology <strong>in</strong>cludefaster processors, better operat<strong>in</strong>g systems, advanced client/server comput<strong>in</strong>garchitecture, new communications technologies and computerbasedtools for test, measurement and <strong>in</strong>dustrial automation.The PC allows measurements to be easily sequenced, processed,displayed, and stored. Seamless <strong>in</strong>tegration of motion is fundamental to<strong>the</strong> success of automated systems. The PC is <strong>the</strong> viable platform for<strong>the</strong>se <strong>in</strong>tegrated systems.There are PC-based control system that <strong>in</strong>clude PLC functions tofieldbus I/O, motion control via SERCOS, and communications via serialports and E<strong>the</strong>rnet. In <strong>the</strong> future this could all be done more simplywith plug-<strong>in</strong> Java Beans for motion control or for <strong>the</strong> <strong>in</strong>terface betweenmotion control and <strong>the</strong> <strong>HVAC</strong> system.Motion control will become a software function runn<strong>in</strong>g on a realtimeoperat<strong>in</strong>g system <strong>in</strong> a PC, at first under W<strong>in</strong>dows NT, and laterperhaps under CE. The control program will be a comb<strong>in</strong>ation of softmotionand soft-logic technology. Logic programm<strong>in</strong>g will be standardizedby IEC-1131-3 while motion programm<strong>in</strong>g may cont<strong>in</strong>ue to be vendorspecific until a similar standard is developed for motion controllers.The PC will <strong>the</strong>n be enabled to take a greater role <strong>in</strong> motion control.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Integrated motion controllers based on W<strong>in</strong>dows NT are start<strong>in</strong>g toappear. One system uses an <strong>in</strong>dustrial Pentium-class PC runn<strong>in</strong>g NTand Steeplechase Software’s Visual Logic <strong>Control</strong>ler.As faster processors are developed, and Microsoft cont<strong>in</strong>ues to addfeatures to <strong>the</strong>ir operat<strong>in</strong>g systems, you will see <strong>the</strong> advent of softmotion control performed <strong>in</strong> CE and NT platforms. The <strong>in</strong>creased use ofPCs will create easier data movement and field bus architectures willremove any separation and create truly <strong>in</strong>tegrated systems.Advanced software technologies such as ActiveX and graphicalprogramm<strong>in</strong>g software such as LabVIEW, will cont<strong>in</strong>ue to make motioncontrol applications more <strong>in</strong>tuitive and simple.Besides better damper position<strong>in</strong>g, tighten<strong>in</strong>g <strong>the</strong> exterior envelopewill slow <strong>the</strong> passage of cold, dry air from outdoors to <strong>in</strong> and raise<strong>the</strong> relative humidity level <strong>in</strong>side. You tend to feel warmer when <strong>the</strong>relative humidity goes up, even if <strong>the</strong> air temperature has not. Provid<strong>in</strong>g<strong>the</strong> furnace with more outdoor combustion air will stop <strong>the</strong> furnacefrom depressuriz<strong>in</strong>g <strong>the</strong> rest of <strong>the</strong> build<strong>in</strong>g and reduces any backdraft.This can result <strong>in</strong> energy sav<strong>in</strong>gs, s<strong>in</strong>ce <strong>the</strong> furnace is no longer us<strong>in</strong>gpreviously heated air for combustion.Forced-air heat<strong>in</strong>g has its own comfort problems. The air may beforced out at 90°F or warmer over people’s sk<strong>in</strong>. This has a cool<strong>in</strong>g anddry<strong>in</strong>g effect. The mov<strong>in</strong>g air results <strong>in</strong> convective heat losses [cool<strong>in</strong>g]from <strong>the</strong> surface beneath it as well as evaporation off <strong>the</strong> sk<strong>in</strong>. One wayto reduce this discomfort from mov<strong>in</strong>g air is better air control withdampers and fans. Some oil and gas furnaces have reduced outlet airtemperatures and <strong>in</strong>creased air flow for efficiency reasons.ZonesZon<strong>in</strong>g <strong>in</strong>volves heat delivery only to those areas where it isneeded and when it is needed, so waste is kept to a m<strong>in</strong>imum. Manyearly zone forced-air systems were hard to balance and control. Theadvent of low cost microprocessor controls and motorized dampers tomodulate airflow has allowed forced-air zon<strong>in</strong>g to be practical.Trends <strong>in</strong> Damper <strong>Control</strong>In <strong>the</strong> past, proprietary motion-control hardware has made<strong>in</strong>teroperability among system components almost impossible. This is©2001 by The Fairmont Press, Inc. All rights reserved.


Heat, Ventilation and Damper <strong>Control</strong> Trendschang<strong>in</strong>g as standards like SERCOS are mak<strong>in</strong>g it easier to l<strong>in</strong>k computersand damper controls. This l<strong>in</strong>kage is occurr<strong>in</strong>g because of <strong>the</strong> growthof C/C++ development tools, standard W<strong>in</strong>dows microcomputers and<strong>the</strong> serial real-time communications (SERCOS) standard. SERCOS wasfirst adopted <strong>in</strong> Europe and its use started <strong>in</strong> <strong>the</strong> United States <strong>in</strong> 1995.SERCOS is designed to establish communications between digital-motordrives and controllers.SERCOS def<strong>in</strong>es a basic way to plug <strong>in</strong> up to 254 programmabledrives <strong>in</strong>to a 4-Mbps fiber-optic r<strong>in</strong>g that functions as <strong>the</strong> medium fordrives and control to pass <strong>in</strong>formation serially to each o<strong>the</strong>r. SERCOSprovides <strong>the</strong> two-way communications between programmable drivesand controls.The SERCOS fiber-optic r<strong>in</strong>g becomes <strong>the</strong> medium for controls anddrives to pass data serially to each o<strong>the</strong>r. The type of fiber specified forSERCOS is a nonstandard diameter that must have a screw-on connectorra<strong>the</strong>r than <strong>the</strong> more conventional bayonet clasp.Unlike analog <strong>in</strong>terfaces, SERCOS allows two-way communicationsbetween controls and programmable drives. It represents a plugand-playbus for <strong>the</strong>se control systems. SERCOS elim<strong>in</strong>ates bugs thatwere common <strong>in</strong> <strong>the</strong> wir<strong>in</strong>g between <strong>the</strong> controller and programmablemotors.The open architecture for motion-control systems results fromteam<strong>in</strong>g <strong>the</strong> SERCOS standard with PCs and standard developmenttools. PCs are more economical than programmable logic controllers(PLCs) which is a likely alternative. Standard development tools dim<strong>in</strong>ish<strong>the</strong> frustrations of us<strong>in</strong>g proprietary systems.Digital DrivesMotion-control is mov<strong>in</strong>g from analog to digital components, particularlydigital programmable drives. Digital drives are faster and moreprecise than analog. They can go from 0 to 3000 rpm <strong>in</strong> 20 millisecondsor come to a stop with<strong>in</strong> 1/8000 of a revolution.SERCOS is not <strong>the</strong> only <strong>in</strong>terface that can be used for motion-controlsystems. Besides proprietary systems, <strong>the</strong> alternatives <strong>in</strong>cludeFieldbus, Profibus, CANbus, InterBus-S, and DeviceNet. These establisha communications l<strong>in</strong>k for I/O data to travel to a number of field devices.DeviceNet has been used for I/O control and SERCOS for motion©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>control <strong>in</strong> <strong>the</strong> same system.SERCOS can lessen wir<strong>in</strong>g costs. An analog-motor drive can have16 wires. Simplified wir<strong>in</strong>g means less wir<strong>in</strong>g errors. Network<strong>in</strong>g drivesand controls through <strong>the</strong> SERCOS <strong>in</strong>terface is a straightforward matter.With <strong>the</strong> ability to manipulate every variable <strong>in</strong> a drive system, SERCOSdigital drives have brought drive setup and optimization <strong>in</strong>to <strong>the</strong>graphical environment of W<strong>in</strong>dows.Although <strong>the</strong> standard allows a maximum of 254 programmabledriveconnections <strong>in</strong> each fiber-optic r<strong>in</strong>g, <strong>the</strong> actual drive limit can beless depend<strong>in</strong>g on <strong>the</strong> communications cycle time and how much datamust be passed for <strong>the</strong> application. The cycle time is also a factor if <strong>the</strong>sesystems are used <strong>in</strong> build<strong>in</strong>g applications.SERCOS was designed for synchronous applications. The actualvalues are detected and commanded values acted on by all drives simultaneously.The drives work synchronously, so beat frequencies or harmonicsare elim<strong>in</strong>ated.Suppliers of SERCOS motion-control cards and equipment <strong>in</strong>cludeIndramat, Motion Eng<strong>in</strong>eer<strong>in</strong>g, and Pacific Scientific. <strong>New</strong> SERCOS systemsmay be capable of 10-Mbps rates. Digital technology means motion-controlsystems can be more precise and easier to use and SERCOSrepresents a future away from proprietary systems.ReferencesAnderson, Edw<strong>in</strong> P., Air Condition<strong>in</strong>g: Home and Commercial, MacmillionPublish<strong>in</strong>g Company: <strong>New</strong> York, <strong>New</strong> York, 1985.Brumbaugh, James E., Heat<strong>in</strong>g, Ventilat<strong>in</strong>g and Air Condition<strong>in</strong>g Library,Vol. 1, Theodore Audel and Company: Indianapolis, Indiana, 1986.©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trends 37Chapter 2Energy andPower Management,Distributed <strong>Control</strong> TrendsThe late 1980s and <strong>the</strong> early 1990s were not <strong>the</strong> best of times forstart<strong>in</strong>g advanced distributed control projects. This period wascharacterized by slow or no growth and recession. Industryresponded by cutt<strong>in</strong>g costs and drastic reorganizations. Thesetook <strong>the</strong> form of mergers with plant clos<strong>in</strong>gs or cutbacks, layoffs anddelayed purchases for capital equipment.The reduction of personnel put some pressure on <strong>the</strong> surviv<strong>in</strong>gdepartments to <strong>in</strong>crease automation and become more efficient. The f<strong>in</strong>ancialstaff analyzed operations more closely and offered areas thatmight be improved. These economic factors as well as technologicaladvances <strong>in</strong> electronics and control hardware allowed changes that werenot possible before. Among <strong>the</strong> benefits of this new technology weretools that allow users to document procedures and justify <strong>the</strong>m for <strong>the</strong>next budget year.The mission to reduce costs did not mean quality could be sacrificed.Quality needed to be improved s<strong>in</strong>ce quality expectations andstandards existed because of regulation, market competition and litigation.Deregulation IssuesPower deregulation is a reality <strong>in</strong> several states such as Californiaand pilot programs are go<strong>in</strong>g <strong>in</strong> several o<strong>the</strong>rs. The way energy isbought is chang<strong>in</strong>g rapidly. Energy deregulation offers great potentialfor cost sav<strong>in</strong>gs.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Utility deregulation is a direct result of <strong>the</strong> Federal Policy Act of1992. Competitive market-based pric<strong>in</strong>g is replac<strong>in</strong>g state and federalrate structures. In states that are still regulated, utilities are modify<strong>in</strong>g<strong>the</strong>ir rate structures to preserve <strong>the</strong>ir customer base <strong>in</strong> any future deregulatedenvironment.Open, competitive energy markets are unrestricted by geographicalboundaries and regulated rates. The different purchas<strong>in</strong>g optionsand rate structures are similar to what occurred follow<strong>in</strong>g <strong>the</strong> deregulationof <strong>the</strong> telephone <strong>in</strong>dustry.Advances <strong>in</strong> meter<strong>in</strong>g hardware, communications, and softwarehave significantly reduced <strong>the</strong> cost of how to monitor and control energyuse, even <strong>in</strong> regulated environments. Those who delay us<strong>in</strong>g <strong>the</strong>seadvances may see <strong>the</strong>ir costs rise significantly.Fur<strong>the</strong>r advances <strong>in</strong> software and communications allow facilitiesto l<strong>in</strong>k <strong>the</strong>ir energy costs with labor/material costs and production rates.These new tools and technologies will allow companies to negotiatebetter rates with utility suppliers and determ<strong>in</strong>e more efficient productionmethods and schedules. These companies will be able to f<strong>in</strong>d manyways to significantly lower <strong>the</strong> once fixed cost of <strong>the</strong>ir energy use. Thenew options also allow companies to guard aga<strong>in</strong>st unexpected powerreliability.Understand<strong>in</strong>g energy requirements requires that you must knowhow your operations can tolerate an occasional <strong>in</strong>terruption of power.Production or o<strong>the</strong>r operations may need to be shifted to off-peak times.Partial load <strong>in</strong>terruptions or lower power quality may damage someequipment and expand ma<strong>in</strong>tenance costs result<strong>in</strong>g <strong>in</strong> lower productivityand lower quality.In recent years, environmental and political pressures haveforced more requirements on companies that discharge waste of anytype. Many <strong>in</strong>dustries are also fac<strong>in</strong>g higher quality standards. Oneexample of higher quality are those standards enforced by <strong>the</strong> U.S.Food and Drug Adm<strong>in</strong>istration (FDA) for pharmaceutical manufacturers.High levels of competition are also forc<strong>in</strong>g improved quality. Competitivefactors and improved technology mean previously acceptablelevels of product quality become unacceptable. Most <strong>in</strong>dustrial customersrequire suppliers to have International Standards Organization (ISO)certification <strong>in</strong> all manufactur<strong>in</strong>g processes.©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> TrendsLegal RamificationsThe legal area cont<strong>in</strong>ues to grow. Many activities that were conductedeasily without problems now require careful justification anddocumentation. The trend is towards more detailed recordkeep<strong>in</strong>g tohelp a company prove its case if needed at a later date. Build<strong>in</strong>g ownersas well as manufacturers have seen an <strong>in</strong>crease <strong>in</strong> litigation, <strong>in</strong> areassuch as <strong>in</strong>door air quality.Improv<strong>in</strong>g quality and hold<strong>in</strong>g down costs is prov<strong>in</strong>g to be a difficultchallenge for those <strong>in</strong> charge of operat<strong>in</strong>g a build<strong>in</strong>g. Build<strong>in</strong>gefficiency requires capital <strong>in</strong>vestment. When money is limited, operationsand ma<strong>in</strong>tenance functions can fall out of <strong>the</strong> bottom of capitalfund<strong>in</strong>g requests. These cost-avoidance projects are often passed up formore lucrative, but possibly riskier, direct revenue-produc<strong>in</strong>g projects.S<strong>in</strong>ce departments must compete among <strong>the</strong>mselves to receive <strong>the</strong>money <strong>the</strong>y need, better documentation of operations is needed.Energy Management and NetworksNetworked control systems started dur<strong>in</strong>g <strong>the</strong> energy crises of <strong>the</strong>1970s, when <strong>the</strong> ris<strong>in</strong>g prices of imported oil triggered severe restrictionson energy use and prompted more efficient energy management andcontrol. This resulted <strong>in</strong> <strong>the</strong> development of energy management systems(EMS) for tightly monitor<strong>in</strong>g energy usage. These systems grewover <strong>the</strong> years <strong>in</strong> both sophistication and scope.One offshoot appeared <strong>in</strong> <strong>the</strong> 1980s called build<strong>in</strong>g automationsystems (BAS). These systems added historical data, trend logg<strong>in</strong>g andfire and security functions to traditional energy management functions.These applications focus a return on <strong>in</strong>vestment based on utility sav<strong>in</strong>gs.Analog and Digital SystemsThe advent of direct digital control systems <strong>in</strong> <strong>the</strong> mid-1980s displacedolder analog closed-loop control (Figure 2-1) as <strong>the</strong> temperaturecontrol scheme of choice for most large equipment. The digital systemsimproved both accuracy and reliability. But, <strong>the</strong>se systems were modeledafter exist<strong>in</strong>g system architectures that did not <strong>in</strong>clude <strong>in</strong>telligent,©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>stand-alone field devices. There were still numerous <strong>in</strong>terfaces to <strong>the</strong>various build<strong>in</strong>g systems and <strong>the</strong> major decisions were made at a centralcomputer.Integrated SystemsMore recent Build<strong>in</strong>g Automation Systems (BAS) attempt to limit<strong>the</strong> <strong>in</strong>terfaces and provide a more seamless, <strong>in</strong>tegrated network. Digitalcontrol networks provide an architecture that can be fully distributedwith <strong>in</strong>dependent controllers for <strong>the</strong> systems and subsystems <strong>in</strong> a build<strong>in</strong>g.Ideally, all of <strong>the</strong> various components will talk to each o<strong>the</strong>r <strong>in</strong> acommon language.The networked system allows improvements <strong>in</strong> plug-<strong>in</strong> <strong>in</strong>strumentation,<strong>in</strong>stant decision support, documentation and automation. Intelligent,versatile <strong>in</strong>strumentation at <strong>the</strong> lowest control level allows <strong>the</strong>energy management data to be easily organized for flexible efficientmanagement.Highly organized data collection means <strong>the</strong> facilities and operationsstaff can be more effective. The reports allow better decisions s<strong>in</strong>ceFigure 2-1. Analog control closed-loop system.©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trendsa variety of reports can be obta<strong>in</strong>ed quickly. Audit trails also go morequickly and can be used to substantiate proof of performance, as well aslimit future risk. A networked control system can automatically documentprocesses, generate reports and issue work orders when problemsare detected at a po<strong>in</strong>t <strong>in</strong> <strong>the</strong> network.Levels of <strong>Control</strong>Networked control systems generally use several levels of hierarchy<strong>in</strong> <strong>the</strong>ir distributed architecture. Three levels that can be used are:• distributed controllers,• build<strong>in</strong>g-wide control and• <strong>in</strong>formation management.Each level serves its own purpose, but all levels are <strong>in</strong>terconnected,similar to <strong>the</strong> operat<strong>in</strong>g structure of a corporation.Distributed controllers may employ microprocessor-based sensorsand o<strong>the</strong>r devices to meet <strong>the</strong> needs of a specific application. Thesestand-alone controllers or control systems function as specialized toolsfor a specific job.The build<strong>in</strong>g-wide level coord<strong>in</strong>ates all of <strong>the</strong> build<strong>in</strong>g controlstrategies. This level coord<strong>in</strong>ates <strong>the</strong> specialized activities and providesglobal direction.At <strong>the</strong> <strong>in</strong>formation management level, data collected from variouspo<strong>in</strong>ts <strong>in</strong> <strong>the</strong> system are transformed <strong>in</strong>to usable <strong>in</strong>formation. The comb<strong>in</strong>edefforts of <strong>the</strong> highly specialized field units <strong>the</strong> higher levels ofcontrol to provide and <strong>in</strong> some cases make <strong>in</strong>formation decisions about<strong>the</strong> operations of <strong>the</strong> overall system.Distributed <strong>HVAC</strong> <strong>Control</strong>Distributed control refers to a complete control system with all <strong>the</strong>needed <strong>in</strong>puts, output and control process<strong>in</strong>g logic to affect a controlloop. In <strong>HVAC</strong> <strong>the</strong> controlled parameters <strong>in</strong>clude standard functionssuch as discharge air temperature, space temperature, humidity and fancontrol.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The benefits of such a control system <strong>in</strong> an <strong>in</strong>telligent, <strong>in</strong>tegratednetwork <strong>in</strong>clude repeatable and <strong>in</strong>dividual parameter or area (zone)control. Specific comfort zones need consistent and repeatable results asloads switch from occupied to unoccupied. The system must switchback to <strong>the</strong> same comfort conditions for <strong>the</strong> next occupied mode. It ispossible to control a specific room or area at <strong>the</strong> appropriate level. Intelligentdevices can be tied <strong>in</strong>to <strong>the</strong> network, allow<strong>in</strong>g data to be collectedand energy usage to be measured.Individual comfort control can <strong>in</strong>crease employee output and provideannual productivity ga<strong>in</strong> of over $1000 per employee. A networkedsystem also offers significant cost sav<strong>in</strong>gs compared to a hard-wiredsystem as shown <strong>in</strong> Table 2-1.Table 2-1. Hard-wired Versus Networked Systems————————————————————————————————Hard-wired System(424 I/O Po<strong>in</strong>ts)Labor and Material 385,000 908 I/O Po<strong>in</strong>tEng<strong>in</strong>eer<strong>in</strong>g/Design 75,000 176 I/O Po<strong>in</strong>tTotal Cost $460,000 $1084 I/O Po<strong>in</strong>tNetworked System(424 I/O Po<strong>in</strong>ts)Labor and Material 200,000 471 I/O Po<strong>in</strong>tEng<strong>in</strong>eer<strong>in</strong>g/Design 35,000 82 I/O Po<strong>in</strong>tTotal Cost $235,000 $ 553 I/O Po<strong>in</strong>t————————————————————————————————Network<strong>in</strong>g takes build<strong>in</strong>g automation beyond traditional <strong>HVAC</strong>functions. A networked system can also manage light<strong>in</strong>g, fire and accesscontrol. If <strong>the</strong>se systems are fully <strong>in</strong>tegrated with <strong>HVAC</strong>, <strong>the</strong>n <strong>the</strong> expanded<strong>in</strong>tegrated control functions can also address environmental issuessuch as <strong>in</strong>door air quality sequence or CFC leak alarm<strong>in</strong>g.CommunicationsHigher levels of <strong>in</strong>tegrated control are possible by ty<strong>in</strong>g toge<strong>the</strong>rdistributed controllers <strong>in</strong> a communications network. This allows a report<strong>in</strong>gpath that allows <strong>in</strong>formation to flow from one controller toano<strong>the</strong>r.©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> TrendsUs<strong>in</strong>g coord<strong>in</strong>ated control sequences, <strong>the</strong> entire build<strong>in</strong>g automationsystem can be monitored and its various functions optimized. All ofthis can take place transparently, beh<strong>in</strong>d <strong>the</strong> scenes, automatically.Information ManagementThis is <strong>the</strong> highest level of control <strong>in</strong> <strong>the</strong> networked system. Datafrom hundreds or thousands of I/O po<strong>in</strong>ts <strong>in</strong> a build<strong>in</strong>g or build<strong>in</strong>gcomplex can be accessed quickly and used to assist <strong>in</strong> decision mak<strong>in</strong>g.The proper communications architecture is needed so that easyaccess to system <strong>in</strong>formation can take place at <strong>the</strong>se different locationsthroughout <strong>the</strong> facility. The access could take place at a local or remotepersonal computer workstation or term<strong>in</strong>al.Information management is needed to provide both regulatorycompliance and risk management. F<strong>in</strong>ancial decision mak<strong>in</strong>g is also allowedalong with quality assurance. Automation allows a speedy responseto problems, as well as <strong>the</strong>ir resolution. A ma<strong>in</strong>tenance managementfeature can also issue and track work orders. Networked controlprovides quality assurance which can be used to identify, analyze andimprove build<strong>in</strong>g operations related to both comfort and security.A large part of <strong>the</strong> build<strong>in</strong>g’s set of plans can be loaded <strong>in</strong>to <strong>the</strong>computer. For new build<strong>in</strong>gs this <strong>in</strong>volves access to <strong>the</strong> CAD (ComputerAided Design) system that designed <strong>the</strong> build<strong>in</strong>g. For older build<strong>in</strong>gs<strong>the</strong> draw<strong>in</strong>gs can be scanned <strong>in</strong>to <strong>the</strong> CAD system and <strong>the</strong>n utilized by<strong>the</strong> Energy Management System.Documentation is often needed for regulatory compliance. Thisdocumentation may <strong>in</strong>clude test<strong>in</strong>g, proof of performance, and <strong>in</strong>cidencereport<strong>in</strong>g. It is essential <strong>in</strong> manag<strong>in</strong>g and reduc<strong>in</strong>g risk. Historicaldata can be used to identify cost-sav<strong>in</strong>g opportunities.Hard-wired and Networked SystemsThe earliest Energy Management Systems used devices that werehard-wired back to <strong>the</strong> computer. A distributed format evolved thatused multiplexed signals over a common wire or <strong>the</strong> electrical distributionsystem (power l<strong>in</strong>e carrier systems). These power l<strong>in</strong>e carrier systemssuffered some setbacks from early reliability problems.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Multiplex<strong>in</strong>g reduced <strong>the</strong> cost of wir<strong>in</strong>g from remote panels to <strong>the</strong>computer but did not reduce <strong>the</strong> cost of wir<strong>in</strong>g <strong>the</strong> <strong>in</strong>put/output devices.Multiplexed systems have a reduced response time as <strong>the</strong> systemgets larger. This response time becomes less important as distributedsystems put more comput<strong>in</strong>g power out <strong>in</strong> <strong>the</strong> remote panels and even<strong>in</strong> <strong>the</strong> <strong>in</strong>put/output devices <strong>the</strong>mselves. The speed of <strong>in</strong>formation transfercan be <strong>in</strong>creased by switch<strong>in</strong>g from twisted pair cables to coaxial orfiber-optics, however, <strong>the</strong>se types of cables add to <strong>the</strong> <strong>in</strong>stallation costs.In <strong>the</strong> future, communications between sensors and multiplexboxes and <strong>the</strong> rest of <strong>the</strong> system may use a comb<strong>in</strong>ation of technologies<strong>in</strong>clud<strong>in</strong>g traditional means such as twisted wire and coaxial and nontraditionalmethods such as <strong>in</strong>frared or radio wave.Operator InterfacesThe first control panels used <strong>in</strong>dividual pilot lights, <strong>the</strong>n cames<strong>in</strong>gle l<strong>in</strong>e light emitt<strong>in</strong>g diode displays. The next evolution <strong>in</strong> control<strong>in</strong>terfaces came with text only, monochrome CRTs. Today, high resolutioncolor graphics provides users with realistic images that are updatedonce a second.Multimedia computers can comb<strong>in</strong>e video, CD-ROM, audio, text,pictures and sound to enhance communications between <strong>the</strong> computerand operator. The system may customize <strong>the</strong> <strong>in</strong>terface for each operator,anticipat<strong>in</strong>g what <strong>the</strong> operator wants to know.A comb<strong>in</strong>ed display/sound <strong>in</strong>terface may be used which maymimic what we call virtual reality. In virtual reality, you can experience<strong>the</strong> environment. Special headsets, gloves and even full body suits areused.The operator can experience <strong>the</strong> build<strong>in</strong>g <strong>in</strong> operation. After acompla<strong>in</strong>t of a hot or cold temperature or a draft, an operator can zoom<strong>in</strong> to <strong>the</strong> space to feel and measure <strong>the</strong> temperature.Zoom<strong>in</strong>g <strong>in</strong>side <strong>the</strong> VAV box, <strong>the</strong> operator could check <strong>the</strong> damperposition and view readouts of air volume and temperature. The <strong>the</strong>rmostator damper control could be adjusted while observ<strong>in</strong>g <strong>the</strong> system’soperation. The operator could also check <strong>the</strong> operation of fans, boilersand chillers us<strong>in</strong>g this zoom control.Add<strong>in</strong>g a sensor to a room could be a simple operation. The sensormight have a self-adhesive back<strong>in</strong>g and stick to <strong>the</strong> wall, where power©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trendsis supplied to <strong>the</strong> unit by a built-<strong>in</strong> solar cell with battery backup. Thesensor would <strong>the</strong>n start broadcast<strong>in</strong>g us<strong>in</strong>g <strong>in</strong>frared, radio wave, ormicrowave. The computer will recognize <strong>the</strong> sensor and assign a po<strong>in</strong>tnumber.The system will map <strong>the</strong> location of <strong>the</strong> sensor us<strong>in</strong>g triangulationof <strong>the</strong> signal and its <strong>in</strong>ternal map of <strong>the</strong> build<strong>in</strong>g. The system can <strong>the</strong>nstart a self-optimization rout<strong>in</strong>e to search for <strong>the</strong> optimum control strategyto utilize this new sensor.Direct Digital <strong>Control</strong>Direct Digital <strong>Control</strong> (DDC) has evolved from <strong>the</strong> growth stage of<strong>the</strong> late 1970s which were triggered as a result of <strong>the</strong> energy price hikesof 1973 and 1977. <strong>Control</strong> system technology had been evolv<strong>in</strong>g but anumber of factors comb<strong>in</strong>ed to make computer-based control technologymore viable. One of <strong>the</strong>se was <strong>the</strong> decreas<strong>in</strong>g cost of electronicswhich made control systems more affordable. At about <strong>the</strong> same time<strong>the</strong> <strong>in</strong>terest <strong>in</strong> energy sav<strong>in</strong>gs jumped and a number of <strong>in</strong>centives andtax credits became available which stimulated <strong>the</strong> market. These factorsresulted <strong>in</strong> a demand for technology that would allow build<strong>in</strong>g ownersto save energy. These newly developed systems came to be known asEnergy Management and <strong>Control</strong> Systems (EMCS).The ma<strong>in</strong> computer <strong>in</strong> use at that time was <strong>the</strong> m<strong>in</strong>icomputer, orcentral process<strong>in</strong>g units (CPUs). These systems utilized energy sav<strong>in</strong>gfeatures for optimiz<strong>in</strong>g equipment operation, offsett<strong>in</strong>g electrical demandand <strong>the</strong> shutdown of equipment when not <strong>in</strong> use.Next <strong>in</strong> this evolution was <strong>the</strong> application of Direct Digital <strong>Control</strong>.Although this technology was used <strong>in</strong> <strong>in</strong>dustrial process control, andeven for some build<strong>in</strong>g applications as long ago as <strong>the</strong> 1950s, it was notuntil much later that it became an acceptable technique for <strong>HVAC</strong> systems.DDC refers to a closed loop control process that is implemented bya digital computer. Closed loop control implies that a condition is controlledby sens<strong>in</strong>g <strong>the</strong> status of that condition, tak<strong>in</strong>g control action toensure that <strong>the</strong> condition rema<strong>in</strong>s <strong>in</strong> <strong>the</strong> desired range and <strong>the</strong>n monitor<strong>in</strong>gthat condition to evaluate if <strong>the</strong> control action was successful(Figure 2-2).©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 2-2. Digital control closed-loop system.Proportional Zone <strong>Control</strong>Consider proportional zone temperature control. The zone temperatureis sensed and compared to a setpo<strong>in</strong>t. If <strong>the</strong> temperature is notat <strong>the</strong> setpo<strong>in</strong>t, a control action is taken to add heat or cool<strong>in</strong>g to <strong>the</strong>zone. Then, <strong>the</strong> temperature is sensed aga<strong>in</strong>.A <strong>the</strong>rmostat with electronic or digital circuitry provides <strong>the</strong> necessary<strong>in</strong>terface for digital control. It may be a microprocessor-baseddevice that implements a sophisticated control loop, or sequence, and iscapable of communications over a local area control network (LACN).The control sequences can expand on <strong>the</strong> basic proportional temperaturecontrol and <strong>in</strong>clude <strong>in</strong>tegral derivative control. In this case, <strong>the</strong><strong>in</strong>tegral is used to calculate <strong>the</strong> amount that <strong>the</strong> temperature is from <strong>the</strong>setpo<strong>in</strong>t. The control action is limited to avoid overshoot<strong>in</strong>g <strong>the</strong> setpo<strong>in</strong>tand <strong>the</strong> oscillations that cause delays <strong>in</strong> control response. These delaysoften occur with proportional control.Derivative control is often used with dynamic applications such aspressure control. Derivative control is used to measure <strong>the</strong> change ofspeed <strong>in</strong> <strong>the</strong> controlled condition and it adjusts <strong>the</strong> action of <strong>the</strong> controlalgorithm to respond to this change.©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> TrendsThe use of a Proportional, Integral and Derivative (PID) controlloop allows <strong>the</strong> control variable to be accurately ma<strong>in</strong>ta<strong>in</strong>ed at <strong>the</strong> desiredlevels with very little deviation. O<strong>the</strong>r comb<strong>in</strong>ed sequences likePID can be used to <strong>in</strong>tegrate <strong>the</strong> control of several pieces of <strong>HVAC</strong>equipment to provide more efficient and seamless operation. Comb<strong>in</strong><strong>in</strong>gthis type of more accurate control with network<strong>in</strong>g is an importantadvance for build<strong>in</strong>g control.Energy Management TrendsBy <strong>the</strong> mid-1980s <strong>the</strong>re was no shortage of oil, and <strong>the</strong> absence ofa national energy policy resulted <strong>in</strong> a decl<strong>in</strong>e <strong>in</strong> <strong>the</strong> demand for energymanagement systems. The slow but cont<strong>in</strong>u<strong>in</strong>g growth of <strong>the</strong>se systemsled to an awareness of <strong>the</strong> many benefits of computerized control. Realenergy cost reductions were noticed as well as o<strong>the</strong>r benefits of bettercontrol. These benefits <strong>in</strong>clude longer equipment life, more effectivecomfort levels and expanded build<strong>in</strong>g <strong>in</strong>formation.The communication features available through <strong>the</strong>se systems allowedimproved build<strong>in</strong>g management and quicker response times forproblem resolution. Intelligent response is a function of system communicationand provides <strong>the</strong> ability to remotely diagnose a problem.These features go beyond energy management and can be extremelydesirable <strong>in</strong> rented properties. Tenants may beg<strong>in</strong> look<strong>in</strong>g forano<strong>the</strong>r office space if space comfort problems are not quickly solved.In <strong>the</strong> future <strong>the</strong> <strong>HVAC</strong> controls <strong>in</strong>dustry will be driven by <strong>the</strong>follow<strong>in</strong>g factors:• higher energy costs and potential energy crises,• growth <strong>in</strong> <strong>the</strong> use of Demand Side Management,• lower cost systems and <strong>the</strong> cost-effective replacement of conventionalcontrols,• growth trends <strong>in</strong> performance contract<strong>in</strong>g,• grow<strong>in</strong>g requirements of <strong>in</strong>door air quality and related environmentalrequirement,• applications of <strong>in</strong>telligent build<strong>in</strong>gs and <strong>the</strong> control <strong>in</strong>tegrationthat <strong>the</strong>y utilize, and• technology advancements <strong>in</strong>clud<strong>in</strong>g microprocessors, software,electronics and communications.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Distributed TechnologyDistributed technology can be viewed as a group of control relateddevices and a common communication network. Build<strong>in</strong>g AutomationSystem (BAS) and Build<strong>in</strong>g <strong>Control</strong> System (BCS) are used <strong>in</strong>terchangeably.Both of <strong>the</strong>se terms refer to equipment that provides build<strong>in</strong>g-widecontrol, and <strong>in</strong>tegrates that control through distributed devices. Distributedcontrol devices rely on network<strong>in</strong>g.Local Area Networks andDistributed <strong>Control</strong>In a Local Area Network (LAN) a node is any device on <strong>the</strong> network<strong>in</strong>clud<strong>in</strong>g <strong>in</strong>telligent microprocessor-based controllers. A distributedcontrol system might control <strong>HVAC</strong> equipment and o<strong>the</strong>r loadssuch as light<strong>in</strong>g. Distributed control is applied at each piece of equipmentto provide an application specific control.Closed loop control is accomplished via <strong>the</strong> monitor<strong>in</strong>g of statusconditions and execution of <strong>the</strong> required control actions. One architecturedef<strong>in</strong>es four levels: sensor/actuator, distributed controller, build<strong>in</strong>gwidehost and central operator <strong>in</strong>terface. O<strong>the</strong>r architectures comb<strong>in</strong>e<strong>the</strong> host and operator <strong>in</strong>terface functions.A number of products have been <strong>in</strong>troduced that use communicationnetworks, <strong>the</strong>se are sometimes called sensor or field buses. Thistype of technology has been grow<strong>in</strong>g quickly.Remote SupportRemote support can take place through a modem <strong>in</strong>terface overtelephone l<strong>in</strong>es. This usually means that <strong>the</strong> remote <strong>in</strong>teraction necessarybetween <strong>the</strong> central operat<strong>in</strong>g <strong>in</strong>terface and <strong>the</strong> local system istransparent to <strong>the</strong> user at a remote site. One promis<strong>in</strong>g advance <strong>in</strong> thisarea is build<strong>in</strong>g-wide controllers that support plug-and-play. This featuresupports an object oriented concept, and stores all critical system<strong>in</strong>formation at <strong>the</strong> controller level. Intelligent controllers of this typemake it possible to dial <strong>in</strong>to a system from a remote location, uploadfrom <strong>the</strong> controllers and have full access to <strong>the</strong> system.©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> TrendsBuild<strong>in</strong>g-wide<strong>Control</strong>ler TrendsAmong <strong>the</strong> trends <strong>in</strong> build<strong>in</strong>g-wide control has been <strong>the</strong> drive forstandard communications. Early <strong>in</strong>novators that acted without general<strong>in</strong>dustry consensus <strong>in</strong>clude IBM with its Facility Automation and CommunicationNetwork (FACN) and o<strong>the</strong>rs from <strong>the</strong> German and Canadiangovernments.Ano<strong>the</strong>r trend at every layer of <strong>the</strong> control architecture has beenpeer to peer control. This technique is mean<strong>in</strong>gful for build<strong>in</strong>g-widecontrol s<strong>in</strong>ce it distributes <strong>the</strong> critical network functions to multiplecontrollers. The concept improves <strong>the</strong> <strong>in</strong>tegrity and reliability of <strong>the</strong>system. Although this type of controller can be complex, <strong>the</strong> cost premiumfor peer control is not significant due to <strong>the</strong> advances <strong>in</strong> electronicand microprocessor-based technology that result <strong>in</strong> greater functionalityat less cost. Microprocessor technology is at <strong>the</strong> heart of build<strong>in</strong>g-wideand <strong>in</strong>dividual control advances.Ano<strong>the</strong>r related build<strong>in</strong>g-wide controller trend is <strong>in</strong>tegration at <strong>the</strong>functional level. There has been a movement toward <strong>in</strong>tegrated controlbetween systems with different functions such as security and build<strong>in</strong>gcontrol systems.O<strong>the</strong>r trends <strong>in</strong> build<strong>in</strong>g-wide control <strong>in</strong>clude easier to use programm<strong>in</strong>gand monitor<strong>in</strong>g systems and PC-based central operator <strong>in</strong>terfaceswith simple user <strong>in</strong>terfaces.VAV Distributed <strong>Control</strong>Most Variable Air Volume boxes <strong>in</strong>clude distributed controls. Peercontrollers can be used for cont<strong>in</strong>uously <strong>in</strong>terrogat<strong>in</strong>g <strong>the</strong> network forsequences such as morn<strong>in</strong>g warm-up. This feature would have beencentralized <strong>in</strong> older systems. A s<strong>in</strong>gle condition such as outside air temperaturemight have been monitored, and <strong>the</strong> build<strong>in</strong>g-wide devicewould make a decision on start time based on this data and a storedsequence. When start up was required, that controller would signal <strong>the</strong>start of <strong>the</strong> sequence. With <strong>in</strong>tegrated control of this type, each controllercan make <strong>in</strong>dependent decisions based on build<strong>in</strong>g-wide data as well aslocal controller data. This results <strong>in</strong> more reliable and effective controlsystems.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Software TrendsBuild<strong>in</strong>g system software is available from multiple sources today.Much of how this software should work is based upon <strong>the</strong> operation ofsuch software as Microsoft W<strong>in</strong>dows. This creates a demand for softwarethat has a W<strong>in</strong>dows look and feel for programm<strong>in</strong>g and monitor<strong>in</strong>g.This software must be mouse driven with a po<strong>in</strong>t and click graphical<strong>in</strong>terface. Beyond ease of use, systems are <strong>in</strong> demand that will doalarm dial outs to pagers and telephones with voice syn<strong>the</strong>sis. ExpandedPC-based operator <strong>in</strong>terfaces may even <strong>in</strong>clude features likepreventive ma<strong>in</strong>tenance and on-l<strong>in</strong>e diagnostics.Nonvolatile memory storage to avoid program loss has evolvedfrom <strong>the</strong> early m<strong>in</strong>icomputer years. The technology cont<strong>in</strong>ues to improve.The early m<strong>in</strong>icomputer approach used Un<strong>in</strong>terruptible PowerSupplies (UPS) to elim<strong>in</strong>ate <strong>the</strong> effects of power failures. This approachwas costly, but most computer hardware was costly <strong>the</strong>n.The first microprocessor-based systems used battery backup withRandom Access Memory (RAM). This was as effective as <strong>the</strong> battery.Then, Electrically Erasable Programmable Read Only Memory(EEPROM) chips were used. These were nonvolatile chips that did notrequire ei<strong>the</strong>r a battery on power to hold memory. This was more effectiveand cost effective, but <strong>the</strong> limited read/write capacity of <strong>the</strong> chipbecome a problem as programs and data <strong>in</strong>creased. The more recentcontrollers use flash memory. This is a type of nonvolatile memory andhas no limitation on read/write capability.<strong>Control</strong> TrendsGeneral-purpose controllers tend to use <strong>the</strong> same hardware, andoperate at <strong>the</strong> same level of architecture, but <strong>the</strong>y implement differentcontrol sequences. These sequences <strong>in</strong>clude such expanded applicationsas start/stop of non-<strong>HVAC</strong> loads and <strong>the</strong> on/off control of light<strong>in</strong>g ando<strong>the</strong>r electrical equipment.In <strong>the</strong>se applications <strong>the</strong>re are greater requirements for control<strong>in</strong>tegration due to <strong>the</strong> distributed nature of <strong>the</strong> control system. At thislevel, as well as <strong>the</strong> build<strong>in</strong>g-wide level, peer-to-peer controllers aremost common.General-purpose controllers provide full local control requirementsand can <strong>in</strong>tegrate with both <strong>the</strong> build<strong>in</strong>g-wide controller and <strong>the</strong> appro-©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trendspriate zone level controllers to provide build<strong>in</strong>g-wide functions.Equipment level applications are energy <strong>in</strong>tensive and <strong>in</strong>clude airhandlers, chillers and boilers. The characteristics of <strong>the</strong> control <strong>in</strong>cludedata po<strong>in</strong>t monitor<strong>in</strong>g and multiple control sequences such as reset andwarm-up.<strong>Control</strong> LoopsBuild<strong>in</strong>g-wide control systems depend on control loops to regulate<strong>the</strong> different parts of <strong>the</strong> control hardware. These can be categorized <strong>in</strong>totwo types, closed and open loops.An open loop uses a controller that starts and stops <strong>the</strong> <strong>HVAC</strong>equipment at given times. There is no feedback to <strong>the</strong> controller abouttemperature or o<strong>the</strong>r controlled variables.In a closed loop <strong>the</strong> controller responds to cont<strong>in</strong>uous environmentaldata and compares <strong>the</strong>m to a programmed environmental setpo<strong>in</strong>t(temperature, humidity, air quality).In a closed-loop system, <strong>the</strong> sens<strong>in</strong>g element provides feedback<strong>in</strong>formation to <strong>the</strong> controller. These data are compared by <strong>the</strong> controllerto <strong>the</strong> setpo<strong>in</strong>t that has been adjusted by <strong>the</strong> user.The controller sends a corrective signal to <strong>the</strong> controlled hardware.The sens<strong>in</strong>g element cont<strong>in</strong>uously monitors <strong>the</strong> environment and outputsnew data to <strong>the</strong> controller. The controller monitors <strong>the</strong> sensors andactivates or controls <strong>the</strong> devices to compensate for any needed environmentaladjustments.Digital LogicThe logic circuits <strong>in</strong> digital computers th<strong>in</strong>k and respond <strong>in</strong> termsof on and off logic. This may be a yes or no, one or zero, open or closedor true or false logic state. This b<strong>in</strong>ary logic is converted <strong>in</strong>to electricalsignals which are def<strong>in</strong>ed as a true or false digital signal.The digital signal <strong>in</strong> a <strong>HVAC</strong> relay is represented by a set of openor closed contacts. The controller may <strong>in</strong>terpret an <strong>in</strong>put device signal asa request or non-request for heat<strong>in</strong>g.A digital signal on <strong>the</strong> output of a microprocessor usually activatesa contactor (relay) to ei<strong>the</strong>r open or close. The system can use this open©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>or closed contact to energize or de-energize an <strong>HVAC</strong> output devicewith an AC or DC voltage. The digital signal voltage levels may also beused directly <strong>in</strong>stead of <strong>in</strong>terfac<strong>in</strong>g with open or closed relay contacts.Analog SignalsAn analog signal has a cont<strong>in</strong>uous range of values. A standard<strong>the</strong>rmostat sends out an electrical signal that corresponds to temperaturevalues. The <strong>the</strong>rmostat signal is analog because it can generate anelectrical quantity that can have any value between <strong>the</strong> temperaturerange.In a digital system, <strong>the</strong> controller receives analog signals from sensors,and converts <strong>the</strong>m to digital. The controller processes <strong>the</strong> signaland may convert it back to analog. This signal conversion is needed for<strong>HVAC</strong> equipment that requires analog signals.Us<strong>in</strong>g sensor and setpo<strong>in</strong>t data, <strong>the</strong> digital controller performsma<strong>the</strong>matical computations from a software program to manage <strong>HVAC</strong>equipment. The results are digital signals generated to control on/offhardware.A/D ConversionA digital controller may receive analog <strong>in</strong>put from a sensor. S<strong>in</strong>ce<strong>the</strong>se data are <strong>in</strong> analog form, an analog to digital converter (A/D converter)is required.When <strong>the</strong> controller completes process<strong>in</strong>g, a digital signal is transmitted.A digital to analog converter (D/A converter) may be used toconvert <strong>the</strong> signal for output to <strong>the</strong> <strong>HVAC</strong> equipment. Digital controllerssample data at set time <strong>in</strong>tervals ra<strong>the</strong>r than read<strong>in</strong>g it cont<strong>in</strong>uously.Digital controllers work with a set of measured control variablesand a set of control algorithms. The control variables may <strong>in</strong>clude temperature,humidity, and air quality sett<strong>in</strong>gs.<strong>Control</strong> CharacteristicsA digital control loop can work much more efficiently than controlus<strong>in</strong>g pneumatic or electro-mechanical methods. The computer’s oper-©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trendsat<strong>in</strong>g speed allows it to sample multiple sensor devices <strong>in</strong> milliseconds.This sampl<strong>in</strong>g speed enables it to update many control loops quickly.The digital software is made up of a series of command sequencesthat consist of computer <strong>in</strong>structions. These <strong>in</strong>structions make up <strong>the</strong>steps of <strong>the</strong> operat<strong>in</strong>g sequence or algorithm. Runn<strong>in</strong>g <strong>the</strong> programtranslates <strong>the</strong>se steps <strong>in</strong>to a series of symbolic commands that <strong>the</strong> computerunderstands.The algorithm or sequence of <strong>in</strong>structions may process <strong>the</strong> feedbackdata from <strong>the</strong> sensors. These sequences allow controllers to perform<strong>the</strong> sophisticated calculations that may be needed for efficient control.As <strong>the</strong> controller receives data from sensors, it performs computationsbased on its programmed sequences. The results of this process<strong>in</strong>gis sent out as corrective signals to <strong>the</strong> <strong>HVAC</strong> equipment.Scan RateThe power of <strong>the</strong> microprocessor used determ<strong>in</strong>es <strong>the</strong> executiontime and scan rate. Scan rate is <strong>the</strong> process required to scan a po<strong>in</strong>t <strong>in</strong><strong>the</strong> system and update <strong>the</strong> control parameters based on <strong>the</strong> current status.Proper control depends on <strong>the</strong> availability of timely <strong>in</strong>formationfrom <strong>in</strong>puts. These <strong>in</strong>puts are <strong>the</strong> source for temperature, air pressureand o<strong>the</strong>r <strong>HVAC</strong> measurement.Execution time is ano<strong>the</strong>r component <strong>in</strong> ensur<strong>in</strong>g effective control.The basic requirement of closed loop control is to execute a command tooutputs controll<strong>in</strong>g equipment based on some measured variable. Thetime that it takes to do this relates directly to <strong>the</strong> microprocessor executiontime.The trend for <strong>HVAC</strong> control is for devices from process control ando<strong>the</strong>r automation applications to be <strong>in</strong>tegrated <strong>in</strong>to <strong>the</strong> build<strong>in</strong>g <strong>in</strong>dustry.An example of this is <strong>the</strong> 32-bit microprocessors that have been <strong>in</strong>troduced<strong>in</strong>to some digital controllers.Some equipment must be able to operate under outdoor temperatureconditions. An example of this is a VAV roof top air handler. As<strong>in</strong>gle enclosure conta<strong>in</strong><strong>in</strong>g <strong>the</strong> <strong>HVAC</strong> equipment and controls is provided<strong>in</strong> one package that is mounted on <strong>the</strong> roof. The package is exposedto <strong>the</strong> full extreme of outdoor temperature and humidity and maybe <strong>in</strong>stalled anywhere <strong>in</strong> <strong>the</strong> world.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Feedback SensorsThere are two basic types of <strong>in</strong>put sensors: analog and digital. Thesimplest form of digital <strong>in</strong>put <strong>in</strong>formation is an on or off condition, possiblymonitored through a s<strong>in</strong>gle dry contact. The contact allows <strong>the</strong> controllerto identify a true or false condition. This can be used to identifysuch conditions as fan or compressor failure. With analog sensors, analogto digital conversion is needed to allow <strong>the</strong> computer to <strong>in</strong>terpret <strong>the</strong>data.Sensor trends that have been grow<strong>in</strong>g <strong>in</strong>clude <strong>the</strong> sensor bus andwireless sensors. These are related concepts s<strong>in</strong>ce <strong>the</strong>y both rely to somedegree on communication.Both of <strong>the</strong>se trends are driven by <strong>the</strong> desire to reduce cost. The sensorbus br<strong>in</strong>gs network<strong>in</strong>g communication technology to <strong>in</strong>put devices.The concept is to reduce both <strong>the</strong> cost of both <strong>the</strong> labor and wire used to<strong>in</strong>stall sensors. This would allow greater ease and flexibility of <strong>in</strong>stallationas well as cost sav<strong>in</strong>gs. It would also simplify relocat<strong>in</strong>g sensors thatare not provid<strong>in</strong>g <strong>the</strong> right <strong>in</strong>formation on actual zone conditions.About a third of all zone sensors are <strong>in</strong>stalled <strong>in</strong> <strong>the</strong> wrong location.Yet most are never moved due to <strong>the</strong> labor and difficulty <strong>in</strong>volved<strong>in</strong> mov<strong>in</strong>g wires through walls to move <strong>the</strong> sensor. A sensor bus orwireless sensors would simplify <strong>the</strong> <strong>in</strong>stallation and relocation process.In a sensor bus, all sensors would be on a communication network andany controller would request <strong>the</strong>se po<strong>in</strong>ts.Wireless sensors are ano<strong>the</strong>r concept. Wireless sensors have been<strong>in</strong>troduced that use ei<strong>the</strong>r <strong>in</strong>frared or radio communication. The costsav<strong>in</strong>gs are even greater than with <strong>the</strong> sensor bus, s<strong>in</strong>ce wir<strong>in</strong>g can beelim<strong>in</strong>ated all toge<strong>the</strong>r. It is easy to move sensors, replace failed sensorsand redef<strong>in</strong>e a sensor to any given controller or loop.Some wireless sensors require a clear l<strong>in</strong>e of sight for <strong>the</strong> accuratetransmission of sensor data. With any type of radio based sensor ornetwork <strong>in</strong>terference is important. Interference that changes or <strong>in</strong>terruptscommunication of <strong>the</strong> current sensor <strong>in</strong>formation cannot be allowedto affect <strong>the</strong> control loop.Software/FirmwareFirmware is a term used to identify anyth<strong>in</strong>g that <strong>the</strong> average useror technician cannot change. As programmed logic, Firmware is resident©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trends<strong>in</strong> <strong>the</strong> control system. In a simple controller chip, Firmware may conta<strong>in</strong><strong>the</strong> Operat<strong>in</strong>g System (OS). It could also <strong>in</strong>clude communication protocols,data libraries and special parameters.The OS provides <strong>the</strong> basic requirements for comput<strong>in</strong>g. It managesall <strong>in</strong>put and output functions necessary for comput<strong>in</strong>g. A hierarchicalstructure of functions is normally used to manage <strong>the</strong> flow of <strong>in</strong>formationand control <strong>the</strong> activity throughout <strong>the</strong> processor.In <strong>the</strong> past, controller manufacturers would develop proprietaryoperat<strong>in</strong>g systems and communication protocols. This meant <strong>the</strong>re wereno standards for communication.Us<strong>in</strong>g a standard chip set for both operat<strong>in</strong>g system and communicationis be<strong>in</strong>g done for bus standards such as Lonworks from Echelon.Lonworks provides a complete set of system tools.Ano<strong>the</strong>r trend is <strong>the</strong> use of Microsoft W<strong>in</strong>dows as <strong>the</strong> basis for PC<strong>in</strong>terface software. This gives everyone us<strong>in</strong>g <strong>the</strong> system access to compatiblesoftware and offers many tools to improve productivity.Application specific device parameters might <strong>in</strong>clude <strong>in</strong>formationsuch as <strong>the</strong> number of stages of cool<strong>in</strong>g <strong>in</strong> an air handler. These parametersare dynamic and allow <strong>the</strong> system to be f<strong>in</strong>e tuned to <strong>the</strong> controlapplication.Data Trend<strong>in</strong>gThis <strong>in</strong>volves collect<strong>in</strong>g <strong>in</strong>formation over some time period for<strong>HVAC</strong> applications. This <strong>in</strong>formation makes it possible to analyzeequipment operations and can be used to f<strong>in</strong>e tune control sequencesand identify mechanical problems. Trend<strong>in</strong>g provides <strong>the</strong> data needed to<strong>in</strong>crease <strong>the</strong> effectiveness of <strong>HVAC</strong> control.Setpo<strong>in</strong>tsSetpo<strong>in</strong>ts are more dynamic than parameters s<strong>in</strong>ce <strong>the</strong>y may bechanged on a day to day basis. Setpo<strong>in</strong>ts def<strong>in</strong>e <strong>the</strong> control conditionsthat are to be ma<strong>in</strong>ta<strong>in</strong>ed for a given application. The chang<strong>in</strong>g of setpo<strong>in</strong>tsoftware files may be done from a central <strong>in</strong>terface, hand-heldterm<strong>in</strong>al or even a zone sensor. Some zone sensors use a thumblewheelpotentiometer or digital readout to allow a setpo<strong>in</strong>t change.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The modification of a setpo<strong>in</strong>t may counteract <strong>the</strong> control program.An unreasonable change to a cool<strong>in</strong>g setpo<strong>in</strong>t <strong>in</strong> a 65°F zone, could result<strong>in</strong> wasted energy and a higher cost of operations. A useful featureapplied with most setpo<strong>in</strong>ts is to have a parameter that limits <strong>the</strong>amount of change allowed for <strong>the</strong> setpo<strong>in</strong>t.Ano<strong>the</strong>r use of setpo<strong>in</strong>ts for equipment and general-purpose controlis alarm<strong>in</strong>g. First, <strong>the</strong> setpo<strong>in</strong>t will be established for a warn<strong>in</strong>g orcritical alarm. These setpo<strong>in</strong>ts may <strong>in</strong>itiate a local notification and perhapsa telephone dial out.Alarm setpo<strong>in</strong>ts can be used to program different alarm conditionsfor <strong>the</strong> time of day. This can be done to elim<strong>in</strong>ate most nuisance alarms.SchedulesSchedules are a type of controller software that is essential to<strong>HVAC</strong> control. A fundamental requirement for cost reduction is reduc<strong>in</strong>g<strong>the</strong> number of hours of operation. In addition to reduc<strong>in</strong>g energycost, this also extends <strong>the</strong> life of equipment s<strong>in</strong>ce <strong>the</strong>re are fewer runhours.Schedules make sav<strong>in</strong>gs possible <strong>in</strong> most equipment control applications,exclud<strong>in</strong>g hospitals and some specialized facilities. There areusually control sequences for both occupied and unoccupied modes.The schedule def<strong>in</strong>es when each mode beg<strong>in</strong>s and ends. The setpo<strong>in</strong>tsare keyed to <strong>the</strong>se schedules that customize <strong>the</strong> desired conditions to <strong>the</strong>time of day. This could be used from a chiller or unit ventilator application.Schedul<strong>in</strong>g is usually <strong>in</strong>tegrated with <strong>the</strong> occupied and unoccupiedmodes and time of day based alarms. Ano<strong>the</strong>r example of <strong>in</strong>tegrat<strong>in</strong>gschedul<strong>in</strong>g with o<strong>the</strong>r sequences is demand limit<strong>in</strong>g withtime of peak and time of use rates. Electric utility rates will vary, butit is common to charge more for electricity that is consumed dur<strong>in</strong>gpeak times of <strong>the</strong> day or season. The schedul<strong>in</strong>g functions are <strong>in</strong>tegratedwith <strong>the</strong> demand schedules to identify <strong>the</strong> beg<strong>in</strong>n<strong>in</strong>g and endof such periods and to change <strong>the</strong> setpo<strong>in</strong>ts accord<strong>in</strong>gly. In certa<strong>in</strong>types of build<strong>in</strong>gs such as schools and churches, schedules changedaily and seasonally so quick access is important. A variable air volume(VAV) air handl<strong>in</strong>g unit (AHU) might implement control sequenceswith <strong>the</strong> priority of Table 2-2.©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> TrendsTable 2-2. Variable Air Volume Air Handler Operations————————————————————————————————Priority <strong>Control</strong>• PID closed-loop control of temperature and pressure (<strong>in</strong>cludesoccupancy and optimization)• Alarm<strong>in</strong>gSecondary <strong>Control</strong>• Morn<strong>in</strong>g warm-up• Reset• Return fan control• Space pressurization• After hours override—tenant bill<strong>in</strong>g• Trend<strong>in</strong>g• Safeties and diagnostics• Preventive ma<strong>in</strong>tenanceIntegrated <strong>Control</strong>• Indoor air quality• Fire/smoke evacuation• Demand limit control• System data————————————————————————————————<strong>Control</strong> of Temperature and PressureVAV equipment must provide discharge air temperature control bysens<strong>in</strong>g temperature and modulat<strong>in</strong>g an outside air damper for ventilation.Free cool<strong>in</strong>g, along with heat<strong>in</strong>g and cool<strong>in</strong>g equipment may alsobe <strong>in</strong>volved.The controlled parameters are supply air temperature and ductstatic pressure. Ano<strong>the</strong>r control component is alarm<strong>in</strong>g. The temperaturecontrol sequence may use several loops for <strong>the</strong> overall sequence of operations.One loop or control might be used to make control decisions on<strong>the</strong> mode of operation, heat or cool. Two additional control loops, onefor heat<strong>in</strong>g and one for cool<strong>in</strong>g, <strong>the</strong>n determ<strong>in</strong>e <strong>the</strong> amount of heat<strong>in</strong>gor cool<strong>in</strong>g to provide. This amount is based on stag<strong>in</strong>g or <strong>the</strong> modulat<strong>in</strong>gof <strong>in</strong>dependent capacities, but it may also <strong>in</strong>clude an outdoor air©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>economizer sequence.Ventilation is a primary consideration and <strong>the</strong> control will ensurea m<strong>in</strong>imum percent of air flow <strong>in</strong> fresh air. The outdoor air ventilationand economizer sequences should be coord<strong>in</strong>ated to mix <strong>the</strong> return airfrom <strong>the</strong> build<strong>in</strong>g with fresh air from <strong>the</strong> outdoors.Damper <strong>Control</strong>In <strong>the</strong> larger VAV air handlers a set of sequences is used to modulate<strong>the</strong> outdoor and return air dampers to ma<strong>in</strong>ta<strong>in</strong> a mixed air temperaturesetpo<strong>in</strong>t. In most VAV air handler applications <strong>the</strong> control ofoutdoor air dampers is <strong>in</strong>tegrated with <strong>the</strong> cool<strong>in</strong>g sequence. This sequenceprovides a higher percentage of fresh air based on ano<strong>the</strong>r <strong>in</strong>put,<strong>the</strong> outside air temperature. An outdoor temperature below 50°F, orhigher depend<strong>in</strong>g on <strong>the</strong> climate, may be possible to satisfy <strong>the</strong> build<strong>in</strong>gsfull need for cool<strong>in</strong>g through <strong>the</strong> economizer.Economizers are usually sized to allow 100% fresh air under optimumconditions. Even more air may be used <strong>in</strong> very humid climates.The economizer may be required to consider enthalpy, ra<strong>the</strong>r than temperaturealone, to make a decision about modulat<strong>in</strong>g <strong>the</strong> damper toprovide free cool<strong>in</strong>g.Duct pressure control is ano<strong>the</strong>r major segment of <strong>the</strong> control sequence.This application should improve efficiency and comfort byvary<strong>in</strong>g <strong>the</strong> air flow to <strong>the</strong> space based upon demand. An <strong>in</strong>crease <strong>in</strong>demand at <strong>the</strong> zone may cause a damper to open thus chang<strong>in</strong>g <strong>the</strong> ductstatic pressure.An <strong>in</strong>crease <strong>in</strong> demand from multiple zones will drop <strong>the</strong> staticpressure below a setpo<strong>in</strong>t and require that <strong>the</strong> VAV air handler fanvolume be <strong>in</strong>creased. This <strong>in</strong>crease is accomplished with a control loopthat monitors <strong>the</strong> duct pressure and modulates fan motor speed ordampers to <strong>in</strong>crease <strong>the</strong> air flow.The <strong>HVAC</strong> control should <strong>in</strong>tegrate temperature and pressure control.These sequences are coord<strong>in</strong>ated to ensure that a constant temperatureof air is delivered with sufficient volume to meet <strong>the</strong> space condition<strong>in</strong>gneeds.Occupied and unoccupied mode control along with optimizationwill ensure build<strong>in</strong>g comfort at <strong>the</strong> lowest possible operat<strong>in</strong>g cost. Timeof day schedules and optimized start/stop should be used <strong>in</strong> all build-©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trends<strong>in</strong>gs that are unoccupied for any portion of <strong>the</strong> day. There may be someexceptions such as large computer facilities.<strong>Control</strong> SequencesMorn<strong>in</strong>g warm-up is used with VAV air handlers that have a heat<strong>in</strong>gcapacity. Most VAV air handlers are cool<strong>in</strong>g only, however, <strong>in</strong> somecases <strong>the</strong> design or <strong>the</strong> climate are such that heat is used <strong>in</strong> <strong>the</strong> air handler.The greatest build<strong>in</strong>g-wide demand for heat dur<strong>in</strong>g <strong>the</strong> day is <strong>in</strong><strong>the</strong> warm-up mode prior to occupancy. S<strong>in</strong>ce <strong>the</strong> build<strong>in</strong>g temperaturemay be 10 to 15 degrees F below <strong>the</strong> setpo<strong>in</strong>t, a great deal of energy isused to warm-up <strong>the</strong> build<strong>in</strong>g.Warm-up is done with <strong>the</strong> dampers full open and <strong>the</strong> setpo<strong>in</strong>t <strong>in</strong><strong>the</strong> air handler is modified to a heat setpo<strong>in</strong>t, which is usually above <strong>the</strong>standard operat<strong>in</strong>g setpo<strong>in</strong>t. This allows heat to be quickly driven to <strong>the</strong>zone level for build<strong>in</strong>g warm-up.A reset functions to change <strong>the</strong> control setpo<strong>in</strong>t, temperature, orpressure and is tripped by a change <strong>in</strong> related conditions. The dischargeair temperature reset for a VAV air handler might depend on <strong>the</strong> spacetemperature and act to reset <strong>the</strong> temperature setpo<strong>in</strong>t.The key is to identify a change <strong>in</strong> <strong>the</strong> demand due to reduced or<strong>in</strong>creased load and react accord<strong>in</strong>gly. The energy and cost sav<strong>in</strong>g comesfrom modify<strong>in</strong>g <strong>the</strong> setpo<strong>in</strong>t under milder conditions and avoid<strong>in</strong>gwasted energy. This can save energy associated with <strong>the</strong> fan horsepowerif <strong>the</strong> volume can be reduced due to a decrease <strong>in</strong> load. Reset is oftenimplemented on both supply air and mixed air sequences <strong>in</strong> a variableair volume air handler.Return Fan <strong>Control</strong>When a return fan is <strong>in</strong>stalled <strong>in</strong> <strong>the</strong> VAV air handler, <strong>the</strong> controllermust provide some type of fan control. The simplest technique is to<strong>in</strong>terlock <strong>the</strong> fan starter with <strong>the</strong> supply fan so both always run at <strong>the</strong>same time.A control sequence can be used to track <strong>the</strong> return fan to <strong>the</strong> supplyfan. If a variable frequency drive is used to control <strong>the</strong> motor speed,<strong>the</strong>re can be an energy sav<strong>in</strong>g <strong>in</strong> return fan horsepower. This can be©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong><strong>in</strong>tegrated with space pressurization to provide <strong>in</strong>door air quality sequencesand enhanced comfort.After Hours <strong>Control</strong>An override function allows access to <strong>the</strong> build<strong>in</strong>g by a tenant withcondition<strong>in</strong>g provided dur<strong>in</strong>g <strong>the</strong>se times. It can be <strong>in</strong>itiated by a pushbutton, switch or dial-up with <strong>the</strong> central operator <strong>in</strong>terface or touchtone telephone <strong>in</strong>terface to <strong>the</strong> controller.There is normally a fixed duration of time that <strong>the</strong> override willlast, but <strong>the</strong> amount of time that a controller is <strong>in</strong> override may also bea variable. It could be based on <strong>the</strong> time needed to log <strong>the</strong> status ofvarious po<strong>in</strong>ts <strong>in</strong> <strong>the</strong> system.Modern leases may <strong>in</strong>clude access to <strong>the</strong> space on a 24-hour basis,but only provide space condition<strong>in</strong>g dur<strong>in</strong>g normal work<strong>in</strong>g hours.Occupants who use <strong>the</strong> space after hours may be required to pay a usecharge for <strong>the</strong> light<strong>in</strong>g and space condition<strong>in</strong>g. This is known as afterhours tenant bill<strong>in</strong>g, and has become a common practice <strong>in</strong> many officebuild<strong>in</strong>gs.Space PressureA control loop that is used more often with VAV air handlers <strong>in</strong>volvesmonitor<strong>in</strong>g and controll<strong>in</strong>g <strong>the</strong> space pressure. This type of controlis used <strong>in</strong> environments where a negative pressure is susta<strong>in</strong>ed toavoid <strong>the</strong> flow of contam<strong>in</strong>ated air outside <strong>the</strong> controlled space.Ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g a slightly negative pressure <strong>in</strong>duces <strong>the</strong> flow of freshair <strong>in</strong>to <strong>the</strong> build<strong>in</strong>g. Ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g neutral space pressure prevents <strong>the</strong>loss of expensive conditioned air to <strong>the</strong> outside from positive pressure.Positive pressure can result <strong>in</strong> noise around diffusers that may bo<strong>the</strong>r<strong>the</strong> occupants.Alarm<strong>in</strong>gOne of <strong>the</strong> benefits to <strong>in</strong>telligent control is <strong>the</strong> ability to monitor avariety of alarm conditions. Most of <strong>the</strong>se are simple control loops that©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trendsmonitor <strong>the</strong> condition of a contact closure or an analog value. Basedupon a change <strong>in</strong> state of <strong>the</strong> digital po<strong>in</strong>t, or an analog po<strong>in</strong>t exceed<strong>in</strong>ga set of range limits, an alarm is <strong>in</strong>itiated.Safety Sequences and DiagnosticsSafety sequences are used to produce <strong>the</strong>se alarms. These controlsequences are implemented to protect <strong>the</strong> <strong>HVAC</strong> equipment as well as<strong>the</strong> build<strong>in</strong>g and occupants. The trend is toward more safety sequences.In a VAV air handler <strong>the</strong>se may <strong>in</strong>clude duct high pressure, compressorpressure, freeze and low discharge air temperature alarms.Diagnostics are program sequences that are used to identify problems.They are used to <strong>in</strong>terrogate <strong>the</strong> system and diagnose problems byreview<strong>in</strong>g such parameters as temperature or pressure. Diagnostics canalso be self-test rout<strong>in</strong>es. The use of safety and diagnostic sequences canoptimize controller operations and reduce downtime.Diagnostics and preventive ma<strong>in</strong>tenance are related, but preventivema<strong>in</strong>tenance sequences are used to <strong>in</strong>crease equipment efficiency,extend equipment life and provide operation with a m<strong>in</strong>imum of downtime.They may collect data on run hours of <strong>the</strong> equipment and usealarms to flag problems that may require immediate attention. O<strong>the</strong>rprogram sequences may be used for <strong>in</strong>door air quality, fire/smokeevacuation and demand limit control.Indoor Air QualityThese program sequences may <strong>in</strong>troduce additional fresh air toma<strong>in</strong>ta<strong>in</strong> <strong>the</strong> parts per million of carbon dioxide (CO 2 ) or reduce <strong>the</strong>amount of fresh air <strong>in</strong>troduced to <strong>the</strong> build<strong>in</strong>g if contam<strong>in</strong>ants are detectedoutside <strong>the</strong> fresh air <strong>in</strong>take. A sensor may be located near <strong>the</strong>outdoor air <strong>in</strong>takes to monitor for carbon monoxide, or o<strong>the</strong>r contam<strong>in</strong>ants.The fresh air <strong>in</strong>take will be stopped if <strong>the</strong>se are detected.Zone control may <strong>in</strong>clude sensors to monitor <strong>the</strong> carbon dioxide.The air handler will add fresh air as required to purge <strong>the</strong> space andreduce <strong>the</strong> concentration of CO 2 . O<strong>the</strong>r control functions may <strong>in</strong>volveexhaust or return fans and dampers.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Fire/Smoke EvacuationThe smoke pressurization sequence may <strong>in</strong>volve all VAV air handlercontrollers as well as <strong>the</strong> zone controllers. Provid<strong>in</strong>g positive pressureon <strong>the</strong> floors above and below a fire may be part of <strong>the</strong>se sequences.The fire floor may be controlled to a negative pressure with all zonesshut down, and return/exhaust fans at full volume.Smoke evacuation is a sequence which enables <strong>the</strong> exhaust andreturn fans on all units. Ano<strong>the</strong>r technique to use separate smoke evacuationfans that are enabled when a fire occurs. In this case all VAV airhandlers are shut off to avoid <strong>in</strong>troduc<strong>in</strong>g more air or <strong>in</strong>terfer<strong>in</strong>g with<strong>the</strong> smoke evacuation fans.Demand Limit <strong>Control</strong>This control technique raises <strong>the</strong> cool<strong>in</strong>g setpo<strong>in</strong>t <strong>in</strong> order to reducesome stages of cool<strong>in</strong>g. This is a build<strong>in</strong>g-wide sequence that requiresequipment turn-off and avoids demand peaks. If companies know <strong>the</strong>irenergy profiles, how and when <strong>the</strong>y consume power, <strong>the</strong>y can negotiatebetter rates for <strong>the</strong> type and amount of power <strong>the</strong>y need.Power MeasurementIntelligent devices and systems can monitor, measure, protect, coord<strong>in</strong>ate,and control how power is distributed. Power and controlmonitor<strong>in</strong>g systems use meters, protective relays, circuit break trip units,and motor starters. They can communicate <strong>in</strong>formation over an E<strong>the</strong>rnetnetwork to a central location for remote monitor<strong>in</strong>g, alarm<strong>in</strong>g, trend<strong>in</strong>g,and control.Power-monitor<strong>in</strong>g software can be used to analyze energy use andpower quality. It can identify load profiles to help rate negotiation. Loadshap<strong>in</strong>g <strong>in</strong>volves <strong>the</strong> prediction of demand excursions for shedd<strong>in</strong>gloads or start<strong>in</strong>g generators to avoid sett<strong>in</strong>g new peaks. It can also beused to predict ma<strong>in</strong>tenance requirements or provide energy bills for<strong>in</strong>dividual departments or areas for actual power use.Intelligent meter<strong>in</strong>g and monitor<strong>in</strong>g systems offer a low-costmethod for quick energy sav<strong>in</strong>g practices. The Cutler-Hammer plant <strong>in</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> TrendsAsheville, NC, <strong>in</strong>stalled a power management system <strong>in</strong> early 1997.Energy bills were runn<strong>in</strong>g close to $45,000 a month. After 6 months of<strong>in</strong>stallation, <strong>the</strong> plant energy sav<strong>in</strong>g amounted to $40,000.The system allowed plant eng<strong>in</strong>eers to identify wasteful procedures,shift loads to level demand and perform preventive ma<strong>in</strong>tenance.There was better control of area lights at off hours and large electricovens were used only dur<strong>in</strong>g <strong>the</strong> late shifts when total energy demandwas lighter.Ma<strong>in</strong>tenance technicians were able to p<strong>in</strong>po<strong>in</strong>t abnormal conditionswith monitor<strong>in</strong>g screens and <strong>the</strong>n service <strong>the</strong> equipment before itbroke down. Total return on <strong>in</strong>vestment was predicted to be less thantwo years.<strong>Control</strong> and Power ManagementL<strong>in</strong>k<strong>in</strong>g power management systems to control systems allows <strong>the</strong>power <strong>in</strong>formation to flow from both systems. Load profiles can bedeveloped to discover any energy <strong>in</strong>efficiencies. Energy schedul<strong>in</strong>g canbe done to f<strong>in</strong>d <strong>the</strong> optimum energy schedule for new products or processes.Real-time utility pric<strong>in</strong>g means that production schedule energyrequirements need to be compared with energy rate schedules for optimumenergy benefits.The new energy supply market requires more companies to giveback energy capacity dur<strong>in</strong>g peak energy use times by schedul<strong>in</strong>glower-energy production. This often results <strong>in</strong> significant sav<strong>in</strong>gs.Power QualityPower quality may have significant effects on product quality.Voltage sags or swells may result <strong>in</strong> product defects. A power managementsystem can be l<strong>in</strong>ked with a quality management system to helpidentify power-quality-caused problems. This can reduce reject rates andimprove productivity.Monitor<strong>in</strong>g power consumption can also reduce ma<strong>in</strong>tenancecosts. Monitor<strong>in</strong>g <strong>the</strong> energy a motor is draw<strong>in</strong>g can show you when atool beg<strong>in</strong>s to get dull and produce bad parts or when a motor is overheat<strong>in</strong>g.Replacements can be made as preventive actions without costly©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>downtimes or produc<strong>in</strong>g defective products.Energy controls are only part of an environmentally consciouspolicy. Modern civilization is electricity based, but over <strong>the</strong> past 20 yearsmost of <strong>the</strong> energy sav<strong>in</strong>gs has ma<strong>in</strong>ly been <strong>in</strong> heat<strong>in</strong>g.Energy Management DevicesEnergy management devices are used to regulate <strong>the</strong> on and offtimes of selected loads, such as fans, heaters, and motors. They are used<strong>in</strong> a build<strong>in</strong>g <strong>in</strong> order to reduce electrical demand (kilowatts) and toregulate energy consumption (kilowatt hours). Energy managementdevices can be electromechanical, electronic, or computer based.The operation of one or more loads is <strong>in</strong>terrupted by <strong>the</strong> energymanagement system based on control algorithms and build<strong>in</strong>g-operat<strong>in</strong>gparameters, such as temperatures, air flow, or occupancy. The sav<strong>in</strong>gs<strong>in</strong> electrical energy use and cost range from 0 to 50% or more.Electrical DemandElectrical demand is def<strong>in</strong>ed as <strong>the</strong> average load connected by auser to an electrical generat<strong>in</strong>g system. It is measured over a short, fixedperiod of time, usually 15 to 30 m<strong>in</strong>utes. The electrical demand is measured<strong>in</strong> kilowatts and recorded by <strong>the</strong> generat<strong>in</strong>g company meter foreach measurement period dur<strong>in</strong>g <strong>the</strong> bill<strong>in</strong>g month. The highest recordedelectrical demand dur<strong>in</strong>g <strong>the</strong> month is used to determ<strong>in</strong>e <strong>the</strong> costof each kilowatt hour (kWh) of energy consumed.Demand Load Shedd<strong>in</strong>gEnergy management devices, such as load shedders, reduce <strong>the</strong>demand (average load) <strong>in</strong> critical demand periods by <strong>in</strong>terrupt<strong>in</strong>g electricalservice to motors, heaters, and o<strong>the</strong>r loads for short periods. S<strong>in</strong>ce<strong>the</strong> load which has been turned off would normally have been operat<strong>in</strong>gcont<strong>in</strong>uously, <strong>the</strong> overall effect is to reduce <strong>the</strong> average load or demandfor that period of time (Figure 2-3). The <strong>in</strong>stantaneous load when <strong>the</strong>load is operat<strong>in</strong>g rema<strong>in</strong>s <strong>the</strong> same. If <strong>the</strong> period <strong>in</strong>volved has <strong>the</strong> high-©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trendsest monthly demand, considerable sav<strong>in</strong>gs are possible <strong>in</strong> rate reductions.In periods o<strong>the</strong>r than <strong>the</strong> highest demand period, some energy isstill saved.Before <strong>the</strong> era of high energy costs, load shedd<strong>in</strong>g was used ma<strong>in</strong>lyto avoid demand cost penalties. Now, it is used to limit energy consumption,by cycl<strong>in</strong>g loads on and off for brief periods, as well as toreduce demand.O<strong>the</strong>r methods used to limit energy use <strong>in</strong>clude computer optimizationof start times, setpo<strong>in</strong>ts, and o<strong>the</strong>r operat<strong>in</strong>g parameters based onwea<strong>the</strong>r, temperatures, or occupancy.Meter ConnectionEnergy management devices base <strong>the</strong>ir control actions on <strong>the</strong> demandlevel <strong>in</strong> each demand period. They get two signals from <strong>the</strong> electricalutility meter (Figure 2-4). These signals are usually momentarycontact closures of about 500-ms duration which <strong>in</strong>dicate <strong>the</strong> beg<strong>in</strong>n<strong>in</strong>gof each demand period or <strong>the</strong> consumption of one kWh of electricalenergy.Figure 2-3. Reduced demand from cycl<strong>in</strong>g a major load off for a brieftime period.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 2-4. Electrical meter connections. The tim<strong>in</strong>g pulse marks <strong>the</strong>end of each demand period. The kWh pulse occurs at each rotation of<strong>the</strong> meter rotor.Meters can be modified by <strong>the</strong> utility company for about $500 to$1000. External clock mechanisms or tim<strong>in</strong>g signals can also be used.The energy (kWh) consumption pulse value is converted to a unit ofdemand (kW) by divid<strong>in</strong>g it by <strong>the</strong> demand period length <strong>in</strong> hours.kWh per PulseDemand Period <strong>in</strong> Hours =kW(Demand)The simplest power control device is a timer or time clock. Anelectromechanical timer or clock has a small electrical motor and anarrangement of cams and switches. These switches allow several loadsto be operated <strong>in</strong> a cyclical mode by turn<strong>in</strong>g <strong>the</strong>m on or off at preset©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trendstimes. Electronic timers or clocks use semiconductor timer chips andswitches to perform <strong>the</strong> same functions. Popular chips like <strong>the</strong> 555 and556 can perform <strong>the</strong>se functions and cost less than 50 cents.Applications range from pool heaters to advertis<strong>in</strong>g signs andoutdoor display light<strong>in</strong>g. They have also been adapted to control electricenergy use and to limit demand. The timer is set to turn a load off andon for brief time <strong>in</strong>tervals dur<strong>in</strong>g each demand period. This has <strong>the</strong>overall effect of limit<strong>in</strong>g energy consumption and reduc<strong>in</strong>g demand.The control is limited to those devices which can be cycled cont<strong>in</strong>uously.Electronic Demand Limit<strong>in</strong>gO<strong>the</strong>r types of electronic demand limit<strong>in</strong>g devices can be used tomonitor and measure <strong>the</strong> actual demand and provide control actions tolimit <strong>the</strong> operation of attached devices when <strong>the</strong> measured demandreaches a preset value. These devices need to receive two signals from<strong>the</strong> utility meter, <strong>the</strong> kilowatt hour (kWh) or demand pulse, which <strong>in</strong>dicates<strong>the</strong> units of electrical energy consumed and a tim<strong>in</strong>g pulse, which<strong>in</strong>dicates <strong>the</strong> end of one demand pulse and <strong>the</strong> start of <strong>the</strong> next one.The demand pulse is used to <strong>in</strong>crement an electronic counter. As<strong>the</strong>se counts accumulate with<strong>in</strong> a demand period, <strong>the</strong>y are compared toa target value which corresponds to <strong>the</strong> maximum desired demand.When <strong>the</strong> value accumulated <strong>in</strong> <strong>the</strong> counter exceeds <strong>the</strong> target value, <strong>the</strong>attached load is switched off.If <strong>the</strong> demand still exceeds <strong>the</strong> demand target, a second load isturned off. This is done until all available loads are turned off or until<strong>the</strong> demand no longer exceeds <strong>the</strong> target.Once it is turned off, <strong>the</strong> load stays off until <strong>the</strong> end of <strong>the</strong> demandperiod. A tim<strong>in</strong>g or reset pulse from <strong>the</strong> meter restores <strong>the</strong> counter tozero and turns <strong>the</strong> loads back on aga<strong>in</strong>. Some load shedders use a demandtarget that is not fixed but <strong>in</strong>creases at a steady rate. O<strong>the</strong>r devicesallow <strong>the</strong> off-on setpo<strong>in</strong>ts to be adjusted <strong>in</strong>dependently for <strong>in</strong>dividualloads.Computer-based SystemsUs<strong>in</strong>g computer technology <strong>in</strong> <strong>the</strong> regulation of electrical energyallows a wide range of control options. The computer’s memory and©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>decision-mak<strong>in</strong>g circuits are comb<strong>in</strong>ed with a customized program tomaximize demand and energy sav<strong>in</strong>gs with a m<strong>in</strong>imum impact on operat<strong>in</strong>gconditions. The computer receives <strong>in</strong>puts from <strong>the</strong> electric meterand from sensors monitor<strong>in</strong>g <strong>the</strong> critical loads <strong>in</strong> <strong>the</strong> build<strong>in</strong>g or facility.Loads may be cycled based on <strong>the</strong> follow<strong>in</strong>g criteria:• maximum demand target,• time of day and day or week,• rate of demand <strong>in</strong>crease,• heat<strong>in</strong>g and cool<strong>in</strong>g temperatures,• pressures,• fuel flow and rates,• occupancy schedules,• <strong>in</strong>side and outside temperatures,• humidity,• w<strong>in</strong>d direction and velocity and• comb<strong>in</strong>ations of <strong>the</strong> above factors.The durations are variable and can be changed automatically accord<strong>in</strong>gto <strong>the</strong>se parameters. A secondary demand target may be usedand if <strong>the</strong> primary demand target is exceeded o<strong>the</strong>r control actions areapplied.The demand target can float upward and downward accord<strong>in</strong>g todemand rates, time of day, and o<strong>the</strong>r parameters. Different targets andcontrol strategies can be applied to different sections of build<strong>in</strong>gs andplants. Reports and graphs show<strong>in</strong>g <strong>the</strong> consumption by demand periodand by day, week, or month are provided.These systems can also be applied to manage <strong>the</strong> energy consumedby air condition<strong>in</strong>g systems. Intake and exhaust dampers are controlledon <strong>the</strong> basis of air temperatures, so that <strong>the</strong> mix of air requir<strong>in</strong>g <strong>the</strong> leastenergy is obta<strong>in</strong>ed at all times. The start-up and shutdown of air condition<strong>in</strong>g,heat<strong>in</strong>g, and light<strong>in</strong>g systems can be regulated accord<strong>in</strong>g to<strong>in</strong>side and outside temperatures as well as occupancy. The goal is toproduce <strong>the</strong> conditions which consume <strong>the</strong> least energy.©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> TrendsEnergy Efficient Light<strong>in</strong>gBuild<strong>in</strong>gs need new ways to reduce energy costs while ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>gquality light<strong>in</strong>g for different facilities. A large portion of facility utilitycosts are devoted to light<strong>in</strong>g. Recent light <strong>in</strong>novations and energyconservation programs are help<strong>in</strong>g to facilitate this task. Technologicaladvances <strong>in</strong> lamps, ballasts, and light<strong>in</strong>g controls, such as improvedmetal halide systems with pulse start ballasts are transform<strong>in</strong>g this sectorof energy sav<strong>in</strong>g.Light<strong>in</strong>g upgrades save energy dollars. Many facilities suffer fromoutdated light<strong>in</strong>g components that are near<strong>in</strong>g <strong>the</strong> end of <strong>the</strong>ir life.Ballasts may be 20 years old and <strong>the</strong>ir life expectancy was 15 years.More efficient build<strong>in</strong>gs are <strong>the</strong> goal of energy conservation organizations,such as <strong>the</strong> Energy Efficient Light<strong>in</strong>g Association (EELA). Itspecializes <strong>in</strong> effective retrofitt<strong>in</strong>g and <strong>the</strong> latest light<strong>in</strong>g technology. TheEELA was launched <strong>in</strong> 1997 and is based <strong>in</strong> Pr<strong>in</strong>ceton Junction, NJ.EELA sponsors conferences and is supported by light<strong>in</strong>g service companies.EELA helps facilities managers achieve energy-sav<strong>in</strong>g goals withan array of light<strong>in</strong>g products. By fund<strong>in</strong>g light<strong>in</strong>g retrofits, energy servicescompanies (ESCOs) also help to achieve energy reduction.In a study for a large hospital, EELA recommended a light<strong>in</strong>g retrofitwith electronic ballasts and energy-efficient lamps. A local utilitycompany offered a rebate that covered a portion of <strong>the</strong> costs. A few yearslater, <strong>the</strong> hospital found that it had saved several hundred thousanddollars <strong>in</strong> energy costs.Companies such as Prescolite are <strong>in</strong>corporat<strong>in</strong>g feedback from <strong>in</strong>stallers,end-users, and design professionals <strong>in</strong> energy-efficient lightproduct design. One example is energy-sav<strong>in</strong>g universal voltage ballaststhat accept multiple wattages and lamp types. These are beneficial tofacilities managers and <strong>in</strong>stallers.O<strong>the</strong>r developments for <strong>in</strong>novative solutions <strong>in</strong>clude advances <strong>in</strong>dimm<strong>in</strong>g ballasts for compact fluorescent lamps with direct digital dimm<strong>in</strong>gand end-of-life circuitry. Microprocessor control technology <strong>in</strong>ballasts is also reduc<strong>in</strong>g energy costs and provid<strong>in</strong>g flexibility for endusers.This is <strong>the</strong> future <strong>in</strong> dimm<strong>in</strong>g control technology.Build<strong>in</strong>gs can be improved with updated ballast technology andgroup relamp<strong>in</strong>g. Group relamp<strong>in</strong>g is <strong>the</strong> opposite of spot relamp<strong>in</strong>gand it saves on ma<strong>in</strong>tenance, as well as utility costs. Many facilities at-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>tempt to remedy <strong>the</strong>ir situations with piecemeal light<strong>in</strong>g solutions. Retrofitt<strong>in</strong>gprovides an average energy sav<strong>in</strong>gs of 50 cents for each squarefoot of build<strong>in</strong>g space. The average payback is 2-1/2 years. Partner<strong>in</strong>gwith energy service companies can also help with energy audits andfund<strong>in</strong>g light<strong>in</strong>g upgrades.Demand Side Limit<strong>in</strong>gMost utility programs for energy conservation <strong>in</strong> recent years <strong>in</strong>volvedemand-side management (DSM). These programs impact howcustomers use electricity. The concept has two parts. The first tactic is toeven out <strong>the</strong> demand for electricity so that exist<strong>in</strong>g power stations areoperat<strong>in</strong>g at efficient capacities throughout any 24-hour day ra<strong>the</strong>r thanrocket<strong>in</strong>g up dur<strong>in</strong>g bus<strong>in</strong>ess hours and dropp<strong>in</strong>g down dur<strong>in</strong>g <strong>the</strong>night. The o<strong>the</strong>r part of DSM is to deter <strong>the</strong> need for new electricitycapacities.DSM refers to energy and load-shape modify<strong>in</strong>g activities that areimplemented <strong>in</strong> response to utility-adm<strong>in</strong>istered programs. It does notrefer to energy and load-shape changes aris<strong>in</strong>g from normal actions of<strong>the</strong> marketplace or from government-mandated energy-efficiency standards.Dur<strong>in</strong>g <strong>the</strong> late 1980s, utilities began offer<strong>in</strong>g commercial rebateprograms for DSM. Some utilities pay 30 to 50% of <strong>the</strong> <strong>in</strong>stalled cost,while o<strong>the</strong>rs base <strong>the</strong>ir rebate programs on <strong>the</strong> peak-kilowatt-demandsav<strong>in</strong>gs achieved by new equipment. DSM programs consist of plann<strong>in</strong>gand monitor<strong>in</strong>g activities which are designed to encourage consumers tomodify <strong>the</strong>ir level and pattern of electricity usage.In <strong>the</strong> past, <strong>the</strong> primary object of most DSM programs was to promotecost-effective energy usage to help defer <strong>the</strong> need for new sourcesof power, <strong>in</strong>clud<strong>in</strong>g generat<strong>in</strong>g facilities, power purchases, and transmissionand distribution capacity additions. Due to <strong>the</strong> changes that areoccurr<strong>in</strong>g with<strong>in</strong> <strong>the</strong> <strong>in</strong>dustry, electric utilities are also us<strong>in</strong>g DSM as away to enhance customer service.DSM <strong>in</strong>volves peak clipp<strong>in</strong>g, strategic conservation, valley fill<strong>in</strong>g,load shift<strong>in</strong>g, strategic load growth and flexible load shap<strong>in</strong>g. It may<strong>in</strong>clude <strong>in</strong>terruptible services or curtailment of services for specifiedtime periods for commercial customers. Peak clipp<strong>in</strong>g refers to reduc<strong>in</strong>g<strong>the</strong> customer demand dur<strong>in</strong>g peak electricity use periods. This is done©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trendsby us<strong>in</strong>g some form of energy management system.Strategic conservation is often rewarded by utility rebate programs.It can <strong>in</strong>clude build<strong>in</strong>g energy audits, wea<strong>the</strong>rization, high-efficiencymotors, Energy Management, DDC systems and <strong>HVAC</strong> systemsand equipment.Valley fill<strong>in</strong>g <strong>in</strong>creases <strong>the</strong> electricity demand dur<strong>in</strong>g off-peak periods,which allows <strong>the</strong> utility to use its power generat<strong>in</strong>g equipmentmore effectively. Load shift<strong>in</strong>g is like valley fill<strong>in</strong>g, s<strong>in</strong>ce it uses powerdur<strong>in</strong>g off-peak periods. Both valley fill<strong>in</strong>g and load shift<strong>in</strong>g programsoften <strong>in</strong>volve <strong>the</strong>rmal storage systems.Strategic load growth is a related DSM program that encouragesdemand dur<strong>in</strong>g certa<strong>in</strong> seasons or times of <strong>the</strong> day. Flexible load shap<strong>in</strong>gmodifies <strong>the</strong> load accord<strong>in</strong>g to operat<strong>in</strong>g needs and can result <strong>in</strong><strong>in</strong>terruptible or curtailment rates for customers.Consolidated Edison’s program <strong>in</strong>volves organizations that canreduce <strong>the</strong>ir summer electricity bills without buy<strong>in</strong>g new equipment.Dur<strong>in</strong>g <strong>the</strong> summer months, <strong>the</strong>se customers agree to reduce electricdemand by at least 200 kilowatts on demand. More than 100 organizationswere <strong>in</strong>volved <strong>in</strong> this program. Duquesne Light Company <strong>in</strong> Pittsburghand Georgia Power also have <strong>in</strong>terruptible economic developmentrates that operate similarly.Con Edison also offers programs with energy audits and rebatesfor efficient light<strong>in</strong>g, steam air condition<strong>in</strong>g, gas air condition<strong>in</strong>g, highefficiencyelectric air condition<strong>in</strong>g, cool storage and high-efficiencymotors.Houston Light<strong>in</strong>g & Power (HL&P) has a program to encourage<strong>the</strong> use of cool storage technology. It provides build<strong>in</strong>g owners with a$300 cash <strong>in</strong>centive for each kilowatt reduction <strong>in</strong> peak demand. Thereis also a cool storage bill<strong>in</strong>g rate, which def<strong>in</strong>es <strong>the</strong> on-peak demand asnoon to 7 p.m. Monday to Friday throughout <strong>the</strong> year. Many build<strong>in</strong>gshave <strong>in</strong>creased <strong>in</strong> value and marketability as a result of <strong>the</strong>se cool storageprograms. In <strong>the</strong> Dallas/Fort Worth area, Texas Utilities has morethan 135 cool storage systems <strong>in</strong> operation.Kraft General Foods and Boston Edison have an Energy-EfficiencyPartnership that has reduced <strong>the</strong> ice cream manufacturer’s cost dramatically.This project decreased <strong>the</strong> cost of produc<strong>in</strong>g ice cream by onethird. The ice cream manufacturer was able to upgrade most of its electricalenergy-consum<strong>in</strong>g capital equipment and obta<strong>in</strong> substantial rebatesfor <strong>the</strong> energy saved. The rebates returned more than 85% of a $3©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>million <strong>in</strong>vestment. This <strong>in</strong>cluded refrigeration and defrost<strong>in</strong>g equipment,light<strong>in</strong>g <strong>in</strong>stallation and monitor<strong>in</strong>g equipment.Georgia Power has its Good Cents build<strong>in</strong>g program for commercialcustomers with <strong>HVAC</strong> and light<strong>in</strong>g rebates, along with energy audits.Georgia Power has also developed an <strong>in</strong>door light<strong>in</strong>g efficiencyprogram.Besides rebates <strong>the</strong>re are low- or no-<strong>in</strong>terest equipment loans, f<strong>in</strong>anc<strong>in</strong>g,leas<strong>in</strong>g and <strong>in</strong>stallation assistance and assured payback programs.Wiscons<strong>in</strong> Electric Power Company offers rebates of up to 50%of <strong>the</strong> project cost and loans with multiple rates and terms for 3 to 7years. These programs are available to build<strong>in</strong>g owners and managerswho <strong>in</strong>stall energy-efficient light<strong>in</strong>g, <strong>HVAC</strong> systems, w<strong>in</strong>dow glaz<strong>in</strong>g,high-efficiency motors or build<strong>in</strong>g automation systems.Direct Digital <strong>Control</strong> ProgramsAbout a third of all utilities offer rebates for controls. These controls<strong>in</strong>clude time clocks, light<strong>in</strong>g controls and Energy Management Systems.An Electric Power Research Institute (EPRI) survey found that <strong>the</strong>sav<strong>in</strong>gs from <strong>the</strong>se systems were 15% of <strong>the</strong> build<strong>in</strong>g energy use. Paybacksranged between 1.5 and 3 years for control system projects <strong>in</strong>clud<strong>in</strong>gDDC systems.Commonwealth Edison Company <strong>in</strong> Chicago offers its Least CostPlann<strong>in</strong>g load reduction program. In this program, bus<strong>in</strong>esses cooperateto curtail or reduce <strong>the</strong>ir electricity consumption to prescribed limitswhen <strong>the</strong> utility requests it. They are compensated with a special electricityrate that is performance-based. The worst performance dur<strong>in</strong>gany curtailment period becomes <strong>the</strong> base for electricity charges.DSM TrendsIncreas<strong>in</strong>g competition among electric utilities may curtail DSMprograms <strong>in</strong> <strong>the</strong> United States. A number of utilities are cutt<strong>in</strong>g back onDSM program budgets while o<strong>the</strong>rs are shift<strong>in</strong>g <strong>the</strong> focus of <strong>the</strong>ir DSMprograms to m<strong>in</strong>imize <strong>the</strong> impact on electric rates.Accord<strong>in</strong>g to <strong>the</strong> Edison Electric Institute (EEI), DSM programsgrew from 134 <strong>in</strong> 1977 to nearly 1,300 by 1992. These DSM programs©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trendsdeferred more than 21,000 megawatts (MWs) by 1992.In 1997, about 1,000 electric utilities had DSM programs. A littlemore than half of <strong>the</strong>se are classified as large and <strong>the</strong> rest are classifiedas small utilities. Large utilities are those that produce more than 120,000megawatt-hours. This group of larger utilities account for about 90% of<strong>the</strong> total retail sales of electricity <strong>in</strong> <strong>the</strong> United States.Energy sav<strong>in</strong>gs for <strong>the</strong>se large electric utilities decreased to 56,406million kilowatt-hours (kWh) <strong>in</strong> 1997. This was 5,346 million kWh lessthan <strong>in</strong> 1996. These energy sav<strong>in</strong>gs represent 1.8% of annual electricsales of 3,140 billion kWh to ultimate consumers <strong>in</strong> 1997.Actual peak load reductions for large utilities was 15% lower <strong>in</strong>1997 at 25,284 megawatts, than <strong>in</strong> 1996. DSM costs decreased from $1.9billion <strong>in</strong> 1996 to $1.6 billion <strong>in</strong> 1997. This was <strong>the</strong> fourth consecutiveyear that DSM costs have decreased from a high of $2.7 billion <strong>in</strong> 1993.Rebate and <strong>in</strong>centive programs are be<strong>in</strong>g modified to reduce utilitycosts, <strong>in</strong>crease participant contributions and <strong>in</strong>crease program cost effectiveness.Rebates are be<strong>in</strong>g used more spar<strong>in</strong>gly and tend to focus onone-time energy efficiency opportunities. These programs are skewed tocustomer classes that are underserved by o<strong>the</strong>r energy efficiency programsand energy efficiency measures that are difficult to promotethrough f<strong>in</strong>anc<strong>in</strong>g, education and standards programs.Build<strong>in</strong>g and Equipment StandardsUtilities are support<strong>in</strong>g adoption and implementation of stricterbuild<strong>in</strong>g codes and equipment efficiency standards. Appliance andequipment efficiency standards are hav<strong>in</strong>g a notable impact on electricitydemand <strong>in</strong> <strong>the</strong> United States. Standards have lowered national electricityuse by 3%. Some energy efficiency measures, such as powermanagedpersonal computers, have been widely adopted without f<strong>in</strong>ancial<strong>in</strong>centives or much utility <strong>in</strong>volvement.Intelligent Build<strong>in</strong>gsThe <strong>in</strong>creas<strong>in</strong>g acceptance of energy management systems forbuild<strong>in</strong>g management applications has been pushed by federal mandates.Energy sav<strong>in</strong>g systems <strong>in</strong>tegrate <strong>the</strong> operation and management©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>of heat<strong>in</strong>g, ventilation, air condition<strong>in</strong>g, security, light and fire safetysystems to reduce energy costs and m<strong>in</strong>imize carbon dioxide emission ofcommercial build<strong>in</strong>gs. The weak l<strong>in</strong>k <strong>in</strong> most older systems is <strong>the</strong> dependenceon a human operator.The future vision is a build<strong>in</strong>g that almost runs itself, from adjust<strong>in</strong>g<strong>HVAC</strong> loads to dimm<strong>in</strong>g <strong>the</strong> lights. Many exist<strong>in</strong>g build<strong>in</strong>gs should<strong>in</strong>clude such <strong>in</strong>tegrated energy controls systems by 2005. <strong>New</strong> constructionswill be designed to utilize practical, <strong>in</strong>tegrated build<strong>in</strong>g controls.Energy efficiency is part of an overall goal to reduce energy useand <strong>the</strong> carbon dioxide emissions that <strong>in</strong>crease <strong>the</strong> greenhouse effect.The result will be practical, computerized energy management systemsthat unify <strong>the</strong> operation and monitor<strong>in</strong>g of heat<strong>in</strong>g, ventilation, air condition<strong>in</strong>g,security, light<strong>in</strong>g and fire safety systems. These systems willbe largely self-manag<strong>in</strong>g, correct<strong>in</strong>g changes with<strong>in</strong> <strong>the</strong> build<strong>in</strong>g automaticallyand alert<strong>in</strong>g build<strong>in</strong>g personnel when problems occur.Most of <strong>the</strong> build<strong>in</strong>g control systems be<strong>in</strong>g designed come withbuilt-<strong>in</strong> computer network connections. These allow <strong>the</strong> <strong>in</strong>dividual controlssystems to communicate ei<strong>the</strong>r directly with each o<strong>the</strong>r, or with alocal or remote PC.<strong>Control</strong> TrendsMany large firms such as AT&T and Boe<strong>in</strong>g Aircraft have beenus<strong>in</strong>g PC-based management and control systems. These systems arebased on a multitask<strong>in</strong>g PC operat<strong>in</strong>g system (OS) such as MicrosoftW<strong>in</strong>dows NT or on more powerful workstation-based systems.AT&T has used its electronic mail system to connect about 80build<strong>in</strong>gs around <strong>the</strong> country with over 25 million square feet of space<strong>in</strong>to a s<strong>in</strong>gle PC located <strong>in</strong> Kansas City, MO. Boe<strong>in</strong>g Aircraft has used asimilar approach <strong>in</strong>to a W<strong>in</strong>dows-based system.Computerized energy controls are <strong>the</strong> wave of <strong>the</strong> future, but acritical part is <strong>the</strong> <strong>in</strong>terface between <strong>the</strong> computer and <strong>the</strong> operator. This<strong>in</strong>terface is concerned with what <strong>the</strong> operator sees on <strong>the</strong> computerscreen and <strong>the</strong> tools <strong>the</strong> operator has to manage <strong>the</strong> system. The <strong>in</strong>terfacecannot be too difficult to understand or use. More powerful softwarecan allow operators to understand <strong>the</strong> underly<strong>in</strong>g ma<strong>the</strong>maticaland algorithmic dynamics, and how each change affects <strong>the</strong> whole.The controls must act as an <strong>in</strong>tegrated system s<strong>in</strong>ce each change <strong>in</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trends<strong>the</strong> system can affect <strong>the</strong> whole. These systems cannot be optimized oneelement at a time, without tak<strong>in</strong>g <strong>in</strong>to consideration unpredictable results.Open AutomationOpen automation systems are evolv<strong>in</strong>g because of advances <strong>in</strong>technology and new ways of do<strong>in</strong>g bus<strong>in</strong>ess. The benefits that arega<strong>in</strong>ed <strong>in</strong>clude agility, quality, reduced downtime, and lower costs.Open systems are nonproprietary and based on standards so componentsfrom multiple vendors can <strong>in</strong>teroperate <strong>in</strong> a predictable mannerand be <strong>in</strong>tegrated easily with o<strong>the</strong>r systems.A PC can be used to program control systems, run control, andprovide operator <strong>in</strong>terface and data analysis. Open automation systemsconsist of open operat<strong>in</strong>g platforms, <strong>in</strong>teroperat<strong>in</strong>g components andopen networks. They form <strong>the</strong> backbone of improved control <strong>in</strong> <strong>the</strong>future.A Sense of <strong>the</strong> FutureDur<strong>in</strong>g <strong>the</strong> last half of <strong>the</strong> 20th Century, <strong>in</strong>dustrial controls movedfrom pneumatic controls, first to vacuum tubes and <strong>the</strong>n transistors and<strong>in</strong>tegrated circuits (ICs). Direct digital controls (DDCs) gave way to distributedcontrol systems (DCSs) which are now implemented with networkedPC-based control systems (see Table 2-3).From <strong>the</strong> roots of contactors and motor controls came programmablelogic controllers (PLCs) which offered better alternatives for control.Now, PLCs are almost considered commodity items. With <strong>the</strong>growth of Internet connectivity, visions of vast arrays of <strong>in</strong>terconnectedsystems are possible.<strong>New</strong> and unconventional discoveries and developments will result<strong>in</strong> changes significant as <strong>the</strong> microprocessor and <strong>the</strong> Internet. In <strong>the</strong>biotech arena, <strong>the</strong> discovery of DNA occurred and soon <strong>the</strong>re will bedetailed genetic and physical maps of <strong>the</strong> human genome. This shoulddecide <strong>the</strong> complete nucleotide sequence of human DNA and localize<strong>the</strong> estimated 50,000-100,000 genes <strong>in</strong> <strong>the</strong> human body. This research isexpected to be complete early <strong>in</strong> <strong>the</strong> millennium and should have farreach<strong>in</strong>g effects.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Table 2-3. Major Events <strong>in</strong> Industrial <strong>Control</strong>————————————————————————————————Early 1940sPneumatic TransmissionsMid-1940sFirst PID <strong>Control</strong>lersLate 1940sTransistor Invented1950 Electronic Analog <strong>Control</strong>Late 1950sFirst <strong>Control</strong> Room HMIEarly 1960sSoftwareComputer Digital <strong>Control</strong> (DDC)Late 1960sIntegrated CircuitsFirst RAM ChipEarly 1970sFax Mach<strong>in</strong>e ProliferationMicroprocessor IntroducedPLC Ladder LogicMid-1970sFirst PC IntroducedDistributed <strong>Control</strong> System (DCS)Late 1970sObject Oriented Programm<strong>in</strong>gLate 1980sCell PhonesPC-based HMI SoftwareEarly 1990sInternet Use ExplodesField-based ArchitecturesMid-1990sIntelligent I/OLate 1990sE-commerce StartsComplex Adaptive SystemsEarly 2000sThird-Generation WirelessHuman Genome Project CompleteDirect Digital L<strong>in</strong>e to Bra<strong>in</strong>Mid-2010sNanotechnologyBio-chips IntroducedLate 2010sMoore’s Law Obsolete————————————————————————————————Biochemical ComputersScientists are mak<strong>in</strong>g computers out of strands of syn<strong>the</strong>tic DNAra<strong>the</strong>r than silicon chips. These computers perform computations simultaneouslyra<strong>the</strong>r than one at a time, as today’s mach<strong>in</strong>es do. This makes<strong>the</strong>m potentially much faster.©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> TrendsThe element silicon is closely identified with computers but suchth<strong>in</strong>k<strong>in</strong>g may have to be fundamentally revised, as high-speed computationmoves beyond chips and mach<strong>in</strong>es to <strong>in</strong>clude <strong>the</strong> tools of biochemistryand genetics <strong>in</strong>clud<strong>in</strong>g DNA.DNA is present <strong>in</strong> every liv<strong>in</strong>g organism, and <strong>the</strong> appeal of <strong>the</strong>molecule as a comput<strong>in</strong>g mechanism lies <strong>in</strong> its ability to store a vastamount of <strong>in</strong>formation <strong>in</strong> a small space. Instead of us<strong>in</strong>g zeroes andones to encode <strong>in</strong>formation us<strong>in</strong>g electrical current, <strong>the</strong> memory <strong>in</strong> aDNA computer uses <strong>the</strong> DNA strands that are syn<strong>the</strong>sized <strong>in</strong> a lab. Eachstrand conta<strong>in</strong>s a different sequence of <strong>the</strong> chemical bases, given <strong>the</strong>letters A, C, T, and G, that make up all DNA molecules. Scientists usedifferent enzymes to elim<strong>in</strong>ate certa<strong>in</strong> strands of DNA, leav<strong>in</strong>g only <strong>the</strong>strands of bases that represent correct graphic answers.Scientists at <strong>the</strong> University of Wiscons<strong>in</strong> have performed simplecalculations with strands of DNA that are attached to a gold-platedsurface. O<strong>the</strong>r experiments with DNA comput<strong>in</strong>g allow <strong>the</strong> DNA tofloat freely <strong>in</strong> a test tube.The method used at <strong>the</strong> University of Wiscons<strong>in</strong> uses s<strong>in</strong>glestrands of DNA which are anchored to an <strong>in</strong>ch square, gold-coated slide.Each slide has a unique configuration of biochemicals that represents apossible answer to a problem.The slide is washed with a series of biochemical solutions thatmark and elim<strong>in</strong>ate <strong>in</strong>correct answers all at once by break<strong>in</strong>g apart <strong>the</strong>molecules. The rema<strong>in</strong><strong>in</strong>g DNA strands are decoded, which represent<strong>the</strong> correct answers to <strong>the</strong> problem.Ano<strong>the</strong>r group at Pr<strong>in</strong>ceton University are us<strong>in</strong>g RNA, a chemicalsibl<strong>in</strong>g of DNA, to perform similar calculations. One calculation provides<strong>the</strong> answer to a chess problem known as <strong>the</strong> knight problem. This<strong>in</strong>volves <strong>the</strong> positions of <strong>the</strong> knights on <strong>the</strong> chess board so that none canattack ano<strong>the</strong>r.Each strand of RNA represents a possible configuration of knights.Then, chemicals are used to elim<strong>in</strong>ate RNA strands that depict wronganswers.A few grams of DNA could store all <strong>the</strong> data known to exist <strong>in</strong> <strong>the</strong>world so biochemicals could eventually be <strong>the</strong> most efficient medium ofstor<strong>in</strong>g and manipulat<strong>in</strong>g <strong>in</strong>formation. Ano<strong>the</strong>r advantage over conventionalcomput<strong>in</strong>g is that ra<strong>the</strong>r than analyz<strong>in</strong>g each possible answer <strong>in</strong>sequence, <strong>the</strong> DNA computer can act on <strong>the</strong> entire set of molecules simultaneously.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The first applications for DNA comput<strong>in</strong>g might <strong>in</strong>volve <strong>the</strong> encryptionof large amounts of <strong>in</strong>formation and embrace some comb<strong>in</strong>ationof silicon and DNA comput<strong>in</strong>g.Device CommunicationsFor many years we have been hear<strong>in</strong>g that soon everyth<strong>in</strong>g willtalk to everyth<strong>in</strong>g else. Connection problems may be on <strong>the</strong> way out dueto three new technologies: J<strong>in</strong>i, Universal Plug-and-Play (UPnP), andBluetooth.J<strong>in</strong>i was conceived by Sun Microsystems <strong>in</strong> 1994 as a plug-<strong>in</strong>powerl<strong>in</strong>e network. It allows a m<strong>in</strong>iature operat<strong>in</strong>g system (OS) <strong>in</strong> everypiece of hardware. When you plug <strong>the</strong> device <strong>in</strong>, it sends vital <strong>in</strong>formationto a central network registry identify<strong>in</strong>g <strong>the</strong> device and its location.The computer <strong>the</strong>n checks on what devices are available and downloadsany <strong>in</strong>formation needed to make <strong>the</strong> connection. J<strong>in</strong>i lets you plug computerhardware <strong>in</strong>to any network because <strong>the</strong>re are no device drivers.In its W<strong>in</strong>dows 95 <strong>in</strong>troduction, Plug-and-Play promised to simplifysystem setup and expansion. Microsoft wants to extend <strong>the</strong> conceptto networked peripherals and <strong>in</strong>telligent appliances. The new generationcalled Universal Plug-and-Play (UPnP) is expected to automatedevice recognition <strong>in</strong> networks without <strong>the</strong> need for a centralized server.UPnP extends Plug-and-Play to devices you may not hook directly <strong>in</strong>to<strong>the</strong> PC, but that still work on <strong>the</strong> computer network.The Bluetooth specification hopes to unite <strong>the</strong> networks, phonesand appliances. It is backed by more than 1,000 companies, <strong>in</strong>clud<strong>in</strong>gIBM and Intel. Bluetooth builds an ad hoc network when ano<strong>the</strong>rBluetooth device is with<strong>in</strong> <strong>the</strong> range of about 33 feet. Bluetooth could beused <strong>in</strong> smart refrigerators which send food shortage lists to <strong>the</strong> phonewhich <strong>in</strong> turn sends <strong>the</strong>m to <strong>the</strong> grocer.Several ground rules may be important early <strong>in</strong> this new millennium.These rules or laws are often celebrated as hav<strong>in</strong>g some control on<strong>the</strong> spread of technology. Moore’s Law was formulated by GordonMoore of Intel <strong>in</strong> <strong>the</strong> early 1970s as a way of estimat<strong>in</strong>g <strong>the</strong> growth ofmicrochips. It states that chip density or process<strong>in</strong>g power doubles every18 months. This <strong>in</strong>fers that as computers become faster, <strong>the</strong> price ofa given level of comput<strong>in</strong>g power halves every 18 months.Gilder’s Law as proposed by George Gilder stipulates that <strong>the</strong> total©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trendsbandwidth of communication systems triples every 12 months. <strong>New</strong>developments <strong>in</strong> communications appear to confirm that bandwidthavailability will keep on expand<strong>in</strong>g at a rate that supports Gilder’s Law.Metcalfe’s law comes from Robert Metcalfe, <strong>the</strong> <strong>in</strong>ventor ofE<strong>the</strong>rnet and founder of 3COM. It states that <strong>the</strong> value of a network isproportional to <strong>the</strong> square of <strong>the</strong> number of nodes. This means that asa network grows, <strong>the</strong> value of be<strong>in</strong>g connected to it grows exponentially,while <strong>the</strong> cost per user rema<strong>in</strong>s <strong>the</strong> same or even drops.Moore’s Law applies to ICs and may no longer be applicable as ICgeometry becomes about one atom thick. O<strong>the</strong>r advances <strong>in</strong> microelectronicsmay also affect this. Lucent, among o<strong>the</strong>rs, is conduct<strong>in</strong>g researchthat could allow <strong>the</strong> fabrication of multiple transistors vertically<strong>in</strong> silicon.This suggests a cubed law <strong>in</strong>stead of a squared law, which couldprovide ano<strong>the</strong>r 20 years of doubl<strong>in</strong>gs before <strong>the</strong> limit is reached <strong>in</strong> allthree dimensions. However, o<strong>the</strong>r technologies, such as bio-chips andnanotechnology, will become prevalent and override <strong>the</strong> equivalent ofMoore’s Law <strong>in</strong> <strong>the</strong> future.In <strong>the</strong> future, many people will use wearable computers. A fashiontechnology show at <strong>the</strong> Spr<strong>in</strong>g Internet World 2000 features <strong>the</strong> latestwireless devices for connect<strong>in</strong>g to <strong>the</strong> Internet.Smart phones are cell phones that have Internet and organizercapabilities. Some such as <strong>the</strong> NeoPo<strong>in</strong>t 1000 have voice recognitionwhile o<strong>the</strong>rs like <strong>the</strong> Nokia 7190 use a dictionary that f<strong>in</strong>ishes words asyou <strong>in</strong>put <strong>the</strong>m. SwatchTalk is <strong>the</strong> world’s first watch with a built-<strong>in</strong>phone.Intelligent I/O AppliancesIn <strong>the</strong> present state-of-<strong>the</strong>-art, dumb sensors are connected to processors.The <strong>in</strong>telligence resides primarily <strong>in</strong> <strong>the</strong> central master. As <strong>the</strong>price of process<strong>in</strong>g power and memory drops, embedded processorswill be used <strong>in</strong> most sensors mak<strong>in</strong>g <strong>the</strong>m <strong>in</strong>telligent appliances (seeTable 2-4).The specifications of each sensor, actuator and measurement orcontrol product <strong>in</strong>clud<strong>in</strong>g part number, <strong>in</strong>stallation date, characteristics,<strong>in</strong>structions and diagnostics will be embedded <strong>in</strong> <strong>the</strong> product and beaccessible to <strong>the</strong> <strong>in</strong>formation network.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Table 2-4. Smart Appliance Characteristics————————————————————————————————Dumb Motor Smart MotorInformation Information Additional FeaturesProvidedProvided————————————————————————————————Power on/off Specifications Speed <strong>Control</strong>Overload Trip Ma<strong>in</strong>tenance Soft Start/stopS<strong>in</strong>gle Direction Replacement Brak<strong>in</strong>gHard-start Lubrication Phase CorrectionRun StatusAcceleration <strong>Control</strong>RPMTorque <strong>Control</strong>DirectionProgrammable LogicTorqueAlarm Manag<strong>in</strong>gPowerPre-failure Warn<strong>in</strong>gsCurrentVoltageTemperatureBear<strong>in</strong>g ConditionBent Shaft DetectionInterfacePower Power Smart <strong>Control</strong> Network withEmbedded Object & Intelligence————————————————————————————————At one time, signal conditioners performed a s<strong>in</strong>gle specific functionsuch as convert<strong>in</strong>g a sensor output to a high-level, l<strong>in</strong>ear signal thatwas <strong>the</strong>n sent to o<strong>the</strong>r <strong>in</strong>struments. With <strong>the</strong> advent of <strong>in</strong>expensiveprocess<strong>in</strong>g, memory and communications circuitry, <strong>the</strong> signal conditionercan now perform several functions and is not limited only tos<strong>in</strong>gle l<strong>in</strong>ear functions. The <strong>in</strong>telligent signal conditioner could be <strong>in</strong>terrogatedto f<strong>in</strong>d out <strong>the</strong> control state dur<strong>in</strong>g a particular time period and<strong>in</strong>vestigate faults. This <strong>in</strong>formation can be used for analysis and diagnostics.In <strong>the</strong> future, PCs will replace PLCs <strong>in</strong> all but <strong>the</strong> smallest applications.This is because of <strong>the</strong> higher-level programm<strong>in</strong>g capabilities and©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trendslow-cost communications and network<strong>in</strong>g capabilities of PCs. PLCs mayserve as mach<strong>in</strong>e controls and as front-end I/O processors for devicelevelnetworks. Traditional DCS will give way to field-based <strong>in</strong>telligent I/O systems. The older centralized, hierarchical control architectures willfade because <strong>the</strong> software requirements of central command and controlsystems are becom<strong>in</strong>g burdensome and practically unmanageable.Complex Adaptive SystemsThere will be a transition from traditional procedural controls torule-based, hostless peer-to-peer controls systems (Figure 2-5). Wheneach <strong>in</strong>put or output po<strong>in</strong>t becomes <strong>in</strong>telligent and connected, controlwill be handled locally through <strong>in</strong>telligent peer-to-peer communicationsamong <strong>the</strong> sensors and actuators, without <strong>in</strong>tervention from an externalhost processor.Figure 2-5. Architecture for complex adaptive systems, with I/O and<strong>in</strong>telligent peer-to-peer communications for true distributed control.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Beyond <strong>the</strong> improved effectiveness of local control, <strong>the</strong> <strong>in</strong>creaseduse of peer-to-peer control systems br<strong>in</strong>gs Metcalfe’s Law with its exponentially<strong>in</strong>creas<strong>in</strong>g effectiveness <strong>in</strong>to play. This results <strong>in</strong> a differenttype of control which is <strong>the</strong> use of complex adaptive systems.The operation is much different from that of conventional, determ<strong>in</strong>istic,hierarchical control. Independent, <strong>in</strong>telligent, autonomous I/Oand controls operate and <strong>in</strong>teract us<strong>in</strong>g rule-based mechanisms. As <strong>the</strong>complexity of <strong>the</strong> <strong>in</strong>teraction <strong>in</strong>creases and changes, <strong>the</strong> system respondsand adapts to <strong>the</strong> chang<strong>in</strong>g events and requirements. Thesechang<strong>in</strong>g events could be fuel availability and costs or seasonal variations.This is <strong>the</strong> equivalent of genetic algorithms which exclude nonproductiveoperations and stimulate improvements.There will be significant advances through reduced software, fasterand easier <strong>in</strong>stallation, more robust performance, improved flexibilityand <strong>the</strong> ability to handle more parameters and parameter variations.The system will be more robust because performance is not dependenton s<strong>in</strong>gle failure po<strong>in</strong>ts. The failure of any s<strong>in</strong>gle portion of <strong>the</strong> systemis accommodated. Higher levels of performance are also achievedthrough emergent behavior and self-organiz<strong>in</strong>g capabilities.These systems are rooted <strong>in</strong> <strong>the</strong> work be<strong>in</strong>g done on artificial lifeand genetic algorithms. Dur<strong>in</strong>g <strong>the</strong> next decade, <strong>the</strong> results of this researchwill become visible <strong>in</strong> factory automation and process controlsystems.SoftwareIn <strong>the</strong> future <strong>the</strong> notion of software as a separate and externalentity will largely evaporate. Software will become a part of <strong>the</strong> product<strong>in</strong> which it <strong>in</strong>habits similar to today’s firmware. Many of <strong>the</strong> currentsoftware functions will migrate downwards <strong>in</strong>to firmware and objectdrivenapplets.The only external software needed will be <strong>in</strong> <strong>the</strong> browser. Everyth<strong>in</strong>gelse will be Java applets or similar client-type operations triggeredby <strong>the</strong> servers when connected, or by <strong>the</strong> objects that reside with<strong>in</strong> <strong>the</strong>products.Among <strong>the</strong> products that have generated much of <strong>the</strong> growth forsoftware companies <strong>in</strong> <strong>the</strong> past were graphic human-mach<strong>in</strong>e <strong>in</strong>terface(HMI) packages and applications that furnish display and control func-©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> Trendstions. Some of <strong>the</strong>se products are an outgrowth of supervisory controland data acquisition (SCADA) systems.Industrial NetworksIn modern factory and plant environments, any islands of automation<strong>in</strong> <strong>the</strong> past are steadily melt<strong>in</strong>g away with <strong>the</strong> connection of essentiallyeveryth<strong>in</strong>g to nuclear networks.Today, <strong>the</strong>re are three levels of network<strong>in</strong>g:• enterprise networks up at <strong>the</strong> top,• control networks <strong>in</strong> <strong>the</strong> middle level, and• device level networks at <strong>the</strong> lowest level.The fieldbus standard may evolve to <strong>the</strong> practical emergence of severalparallel and perhaps overlapp<strong>in</strong>g standards. Each of <strong>the</strong>se may be suitedto a particular <strong>in</strong>dustry and/or environment. Industrial extensions ofE<strong>the</strong>rnet and TCP/IP will become <strong>the</strong> defacto standards for connectivityexternal to <strong>the</strong> system or mach<strong>in</strong>e.The future will see <strong>the</strong> proliferation of E<strong>the</strong>rnet at all levels. Itsperformance and cost will stamp out <strong>the</strong> need for alternatives. Low costwill be fed by acceptance and high volume <strong>in</strong> most application areas.Wireless ConnectionsWorldwide connectivity is mov<strong>in</strong>g very quickly to l<strong>in</strong>k everyoneand everyth<strong>in</strong>g to <strong>the</strong> Internet. This will take place not only throughhigh-speed DSL and cable modems, but also through third-generationwireless systems. The analog technology of first-generation cell phonesslowed <strong>the</strong> adoption of advanced digital wireless technologies <strong>in</strong> <strong>the</strong>United States. Because of <strong>the</strong> entrenched <strong>in</strong>frastructure of <strong>the</strong> analogtelephone system <strong>the</strong> <strong>in</strong>itial growth was slow compared to Europe,which quickly jumped directly to second-generation wireless digitaltelephones. In <strong>the</strong> near future, advances <strong>in</strong> low cost microcircuits willallow broadband wireless connections at speeds exceed<strong>in</strong>g twisted pairlandl<strong>in</strong>es and near<strong>in</strong>g that of cable connections.This will have a major impact on control systems. Connect<strong>in</strong>g con-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>trol components conventional wire systems beyond <strong>the</strong> conf<strong>in</strong>es of atypical system enclosure is still a major task <strong>in</strong> many typical <strong>HVAC</strong>applications.Future controls will be accessible through portable wireless computerscarried by <strong>in</strong>dividual ma<strong>in</strong>tenance people, much as cell phonesare carried today. These portable wireless PDAs (personal digital assistants)will be connected via <strong>the</strong> Web to everyth<strong>in</strong>g needed to read <strong>the</strong>local objects. These objects will <strong>in</strong>clude <strong>the</strong> specifications for each controlcomponent as well as ma<strong>in</strong>tenance, troubleshoot<strong>in</strong>g and repairdocumentation.Third-generation wireless connectivity will <strong>in</strong>clude <strong>the</strong> new localarea network technology called Bluetooth that allows I/O data transfersat 1 megabyte per second with<strong>in</strong> a 10-meter radius.One <strong>in</strong>hibition to wireless operation is <strong>the</strong> fear of <strong>in</strong>terference andtamper<strong>in</strong>g. This can be elim<strong>in</strong>ated through modern encryption techniques,which are already be<strong>in</strong>g used <strong>in</strong> most bank<strong>in</strong>g, stock market ando<strong>the</strong>r high-value applications. The adoption of <strong>the</strong>se security methods <strong>in</strong><strong>in</strong>dustrial automation should be relatively straightforward and complete<strong>the</strong> cycle of <strong>in</strong>tegration.DiagnosticsIntelligence allows diagnostics which can conduct not only <strong>in</strong> postfailure, but it can also be predictive and advisory <strong>in</strong> nature while provid<strong>in</strong>gma<strong>in</strong>tenance <strong>in</strong>structions.It is extremely useful to know that a failure may occur <strong>in</strong> <strong>the</strong> nearfuture. If a valve is stick<strong>in</strong>g, it might be allowed to cont<strong>in</strong>ue to operatewith some precautions. If <strong>the</strong> valve exhibits a particular symptom, <strong>the</strong>nimmediate ma<strong>in</strong>tenance may be needed.Predictive diagnostics allows components to be repaired or replaceddur<strong>in</strong>g off-season downtimes, before a problematic failure occursdur<strong>in</strong>g <strong>HVAC</strong> operation.This type of <strong>in</strong>telligence may reside not only <strong>in</strong> central computers,but also <strong>in</strong> an <strong>in</strong>creas<strong>in</strong>g number of controllers, actuators and displays.The <strong>in</strong>telligence aspect could become a part of essentially every product<strong>in</strong> <strong>the</strong> control system. Some types of failures are best diagnosed us<strong>in</strong>gmethods that <strong>in</strong>volve failure simulation and pattern recognition through<strong>the</strong> responses of <strong>in</strong>telligent I/O po<strong>in</strong>ts <strong>in</strong> a complex adaptive system.©2001 by The Fairmont Press, Inc. All rights reserved.


Energy and Power Management, Distributed <strong>Control</strong> TrendsReferencesCurrier, Bob, “Let’s All Get Along: Your Refrigerator and Oven areAbout to Get <strong>in</strong>to a Heated Debate,” PC Comput<strong>in</strong>g, Vol. 12 No 1,January 2000, p. 52.Joch, Alan, “Plug-and-Play for Manufacturers,” Byte, Vol. 21 No. 9, September1997, pp. 92-100.Liptak, Bela A., Editor-<strong>in</strong>-chief, Instrument Eng<strong>in</strong>eers’ Handbook, RevisedEdition, Chilton Book Company: Radnor, PA, 1982.McGowan, CEM, John J., Direct Digital <strong>Control</strong>: A Guide to DistributedBuild<strong>in</strong>g Automation, Fairmont Press, Inc.: Lilburn, GA, 1995.MacNeil, John S., “The Wet and Wild Future of Computers,” U.S. <strong>New</strong>s& World Report, Volume 128 No. 6, February 14, 2000, p. 52.“Network Solutions,” Intech, Vol. 46 No. 8, August 1999, pp. 34-35.P<strong>in</strong>to, Jim, “Instrumentation and <strong>Control</strong>: On <strong>the</strong> Frontiers of a <strong>New</strong><strong>Millennium</strong>,” Instrumentation and <strong>Control</strong> Systems, Vol. 73 No. 1,January 2000, pp. 29-39.Priscaro, Frank, “What’s Next,” MC Technology Market<strong>in</strong>g Intelligence,Vol. XX No. 2, February 2000, p. 64.Pulaski, Frank, “Power Down <strong>the</strong> Plant Costs,” Industrial Comput<strong>in</strong>g,Vol. 18 No. 7, June 1999, pp. 13-15.Re<strong>in</strong>back, Andrew, “The Buzz About Energy <strong>Control</strong>s,” Build<strong>in</strong>gs, Vol. 86No 10, October 1992, pp. 50-54.Internet: www.eiadoe.gov/cneafelectricity/dsm/dsm_sum.html, “ElectricUtility Demand-side Management 1997,” May 1999, pp. 1-2.Internet: www.aceee.org/pubs/u951.htm, Geller, Howard and SteveNadel and Miriam Pye, “Demand-side Management at a Crossroads,”May 1999, p. 1.Internet: www.build<strong>in</strong>gsmag.com/article 513.asp, Raiford, Reg<strong>in</strong>a, “EnlightenedEnvironments,” June 1999, pp. 1-3.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and Nanotechnology 87Chapter 3<strong>Control</strong> Technology,Microelectronics andNanotechnology<strong>Control</strong> systems require an understand<strong>in</strong>g of <strong>the</strong> characteristicsof <strong>the</strong> process and <strong>in</strong>volve <strong>the</strong> follow<strong>in</strong>g:• controlled variable,• manipulated variable and• uncontrolled load.The control loop is closed by <strong>in</strong>stall<strong>in</strong>g some type of automaticcontroller onto <strong>the</strong> process. The control loop must be able to measure <strong>the</strong>controlled variable and compare that measurement to some desired targetvalue such as a temperature setpo<strong>in</strong>t. If <strong>the</strong>re is an error and <strong>the</strong>controlled variable (temperature) does not equal <strong>the</strong> temperature setpo<strong>in</strong>t,<strong>the</strong>n <strong>the</strong> output is modified and this changes <strong>the</strong> manipulatedvariable <strong>in</strong> such a way to reduce <strong>the</strong> deviation from setpo<strong>in</strong>t.The oldest control approach is to use a simple switch for control.This switch might turn on <strong>the</strong> heat source when <strong>the</strong> temperature is lowand turn it off when <strong>the</strong> temperature is high. This type of system iscalled two-position control and is shown <strong>in</strong> Figure 3-1.<strong>Control</strong>lers have different operat<strong>in</strong>g modes to meet <strong>the</strong> needs of<strong>the</strong> particular process. These modes are tuned to optimize <strong>the</strong> controlfunction. Temperature control is a relatively slow, nonl<strong>in</strong>ear (variablega<strong>in</strong>) process. The process is not noisy. Gas pressure control has nonoise, and it is l<strong>in</strong>ear. A proportional-only controller can be used. Whenproportional-<strong>in</strong>tegral (PI) control is used, <strong>the</strong> <strong>in</strong>tegral is set for 1/3 to 1/5 of <strong>the</strong> period of oscillation which is usually <strong>in</strong> seconds.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>3-1. Two-position control system.Loop Ga<strong>in</strong>Oscillations will result if <strong>the</strong> control loop ga<strong>in</strong> is greater than 1.0.These oscillations will grow <strong>in</strong> amplitude until some component <strong>in</strong> <strong>the</strong>loop is destroyed. This condition is known as an unstable loop withrunaway oscillations.At a control loop ga<strong>in</strong> of exactly 1.0, <strong>the</strong> loop will oscillate, but <strong>the</strong>oscillations will not grow <strong>in</strong> amplitude. The loop will be <strong>in</strong> a state ofmarg<strong>in</strong>al stability.Quarter amplitude damp<strong>in</strong>g results if <strong>the</strong> loop ga<strong>in</strong> is 0.5. The loopresponse to an upset will be a damped s<strong>in</strong>usoid with <strong>the</strong> second peak at1/4 <strong>the</strong> amplitude of <strong>the</strong> first peak. The goal of tun<strong>in</strong>g <strong>in</strong> most processcontrol loops is to obta<strong>in</strong> quarter amplitude damp<strong>in</strong>g. This will result if<strong>the</strong> product of all <strong>the</strong> ga<strong>in</strong>s <strong>in</strong> <strong>the</strong> loop comes to 0.5. It can be achievedby tun<strong>in</strong>g, which adjusts <strong>the</strong> controller to make <strong>the</strong> overall ga<strong>in</strong> product0.5.The controller ga<strong>in</strong>, as well as most o<strong>the</strong>r ga<strong>in</strong>s, consists of asteady-state component, Kc which is <strong>the</strong> proportional sett<strong>in</strong>g. It is unaffectedby <strong>the</strong> period of oscillation. The dynamic ga<strong>in</strong>, Kd, varies with <strong>the</strong>period of <strong>the</strong> <strong>in</strong>put (error) s<strong>in</strong>usoidal wave. The Kd × Kc product is <strong>the</strong>total ga<strong>in</strong> of <strong>the</strong> controller.Slow processes can be controlled with high-ga<strong>in</strong> controllers, whilecontrollers on fast processes must have low ga<strong>in</strong>s. An example of a slow(low-ga<strong>in</strong>) process is space heat<strong>in</strong>g, where it takes a long time for <strong>the</strong>accumulation of <strong>the</strong> heat <strong>in</strong>put provided by <strong>the</strong> manipulated variable tocause a small change <strong>in</strong> <strong>the</strong> controlled variable, <strong>the</strong> space temperature.If <strong>the</strong> comb<strong>in</strong>ed ga<strong>in</strong> of that process is 0.01, <strong>the</strong> controller ga<strong>in</strong> requiredto provide quarter amplitude damp<strong>in</strong>g is 50 s<strong>in</strong>ce 0.01 × 50 = 0.5.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and NanotechnologyIf <strong>the</strong> controlled process is a flow process, <strong>the</strong> process ga<strong>in</strong> is high,maybe 10.0. In this case <strong>the</strong> controller ga<strong>in</strong> should be 0.05 (10.0 × 0.05 =0.5), so that <strong>the</strong> total loop ga<strong>in</strong> is 0.5.The higher <strong>the</strong> controller ga<strong>in</strong>, <strong>the</strong> more corrective action <strong>the</strong> controllercan apply to <strong>the</strong> process <strong>in</strong> response to a small deviation fromsetpo<strong>in</strong>t, and <strong>the</strong> better <strong>the</strong> quality of <strong>the</strong> result<strong>in</strong>g control will be.When <strong>the</strong> ga<strong>in</strong> product of controller and process reaches unity, <strong>the</strong>process becomes unstable and undampened oscillations (cycl<strong>in</strong>g) occur.It is more difficult to tightly control fast (high-ga<strong>in</strong>) processes withoutsome oscillat<strong>in</strong>g. It is far easier to obta<strong>in</strong> tight control on slow, low-ga<strong>in</strong>processes, s<strong>in</strong>ce <strong>the</strong> use of high-ga<strong>in</strong> controllers will not affect stabilityas much.The loop ga<strong>in</strong> is <strong>the</strong> product of all <strong>the</strong> ga<strong>in</strong>s <strong>in</strong> <strong>the</strong> loop, <strong>in</strong>clud<strong>in</strong>gsensor, controller, control valves and process. In a properly tuned loop,<strong>the</strong> product of all <strong>the</strong>se ga<strong>in</strong>s is 0.5. What makes tun<strong>in</strong>g difficult is that<strong>the</strong> process ga<strong>in</strong> often varies with load.In heat transfer processes, when <strong>the</strong> heat load is low and <strong>the</strong> heattransfer surface available to transfer <strong>the</strong> heat is large, <strong>the</strong> transfer of heatis performed efficiently. This type of process is a high-ga<strong>in</strong> process. As<strong>the</strong> load rises, <strong>the</strong> heat transfer process becomes a low-ga<strong>in</strong> process s<strong>in</strong>ce<strong>the</strong> fixed heat transfer area becomes less and less sufficient to transfer<strong>the</strong> heat. This is why <strong>the</strong> ga<strong>in</strong> of a heat transfer process varies with load.Tun<strong>in</strong>g such a system can be difficult s<strong>in</strong>ce <strong>in</strong> order to arrive at anoverall loop ga<strong>in</strong> of 0.5, <strong>the</strong> controller needs to apply a high ga<strong>in</strong> when<strong>the</strong> load is high and a low ga<strong>in</strong> when <strong>the</strong> load is low. Standard controllerscannot do that, because <strong>the</strong>y are tuned to provide a s<strong>in</strong>gle ga<strong>in</strong>.If <strong>the</strong> loop is tuned at high loads, <strong>the</strong> loop can cycle when <strong>the</strong> loaddrops. If <strong>the</strong> loop is tuned at low loads, <strong>the</strong> loop will not be able to hold<strong>the</strong> process on setpo<strong>in</strong>t when <strong>the</strong> load rises. It will be slow or sluggishto respond.One way to compensate for <strong>the</strong> variable load effect is to use avariable ga<strong>in</strong> control valve <strong>in</strong> <strong>the</strong> loop, which <strong>in</strong>creases its ga<strong>in</strong> as <strong>the</strong>load rises. If <strong>the</strong> ga<strong>in</strong> of <strong>the</strong> process drops, <strong>the</strong> ga<strong>in</strong> of <strong>the</strong> valve <strong>in</strong>creasesand <strong>the</strong> total loop ga<strong>in</strong> rema<strong>in</strong>s relatively about <strong>the</strong> same.Feedback <strong>Control</strong>Automatic control systems can use ei<strong>the</strong>r feedback (closed-loop)control or feed-forward (open-loop) control. Feedback control is more©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>commonly used and is <strong>the</strong> underly<strong>in</strong>g concept on which most automaticcontrol <strong>the</strong>ory is based. Feedback control is designed to achieve andma<strong>in</strong>ta<strong>in</strong> a desired condition by us<strong>in</strong>g <strong>the</strong> follow<strong>in</strong>g control actions:• measur<strong>in</strong>g <strong>the</strong> process condition,• compar<strong>in</strong>g <strong>the</strong> measured condition with <strong>the</strong> desired condition, and• <strong>in</strong>itiat<strong>in</strong>g corrective action based on <strong>the</strong> difference between <strong>the</strong>desired and <strong>the</strong> actual condition.The feedback technique is similar to <strong>the</strong> actions of a human operatorattempt<strong>in</strong>g to control a process manually. In <strong>the</strong> control of a directcontact hot water heater, <strong>the</strong> operator would read a temperature <strong>in</strong>dicator<strong>in</strong> <strong>the</strong> hot water tank and compare its value with <strong>the</strong> temperaturedesired. If <strong>the</strong> temperature were too high, <strong>the</strong> tank heat would be reduced,and if <strong>the</strong> temperature were too low, it would be <strong>in</strong>creased.An automatic feedback control system operates <strong>in</strong> much <strong>the</strong> sameway. The temperature of <strong>the</strong> hot water is measured and a signal is fedback to a device that compares <strong>the</strong> measured temperature with <strong>the</strong> desiredtemperature. If an error exists, a signal is generated to change <strong>the</strong>heat value <strong>in</strong> such a way that <strong>the</strong> error is elim<strong>in</strong>ated.The ma<strong>in</strong> difference between <strong>the</strong> manual and automatic means ofcontroll<strong>in</strong>g <strong>the</strong> heater is that <strong>the</strong> automatic controller is more accurateand consistent. Both systems conta<strong>in</strong> <strong>the</strong> basic elements of a feedbackcontrol loop.Feedback control advantages over o<strong>the</strong>r techniques such as feedforwardcontrol <strong>in</strong>clude its relative simplicity and potentially successfuloperation even when <strong>the</strong>re are unknown cont<strong>in</strong>gencies. It works well asa regulator which ma<strong>in</strong>ta<strong>in</strong>s a desired operat<strong>in</strong>g po<strong>in</strong>t by compensat<strong>in</strong>gfor various disturbances that affect <strong>the</strong> system. If designed and tunedproperly, it works equally well as a control to <strong>in</strong>itiate and follow changesdemanded <strong>in</strong> <strong>the</strong> operat<strong>in</strong>g po<strong>in</strong>t.Feed-forward <strong>Control</strong>Feed-forward control is an alternate basic technique used to compensatefor uncontrolled disturbances enter<strong>in</strong>g <strong>the</strong> system. In this technique<strong>the</strong> control action is based on <strong>the</strong> state of a disturbance <strong>in</strong>putwithout reference to <strong>the</strong> actual system condition.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and NanotechnologyFeed-forward control should yield much faster correction thanfeedback control. In <strong>the</strong> ideal case compensation takes place <strong>in</strong> such amanner that <strong>the</strong> effect of <strong>the</strong> disturbance is never seen <strong>in</strong> <strong>the</strong> output.A competent operator could use feed-forward to offset <strong>the</strong> changes<strong>in</strong> <strong>in</strong>let water temperature of a direct contact water heater. Detect<strong>in</strong>g achange <strong>in</strong> <strong>in</strong>let water temperature, <strong>the</strong>y would <strong>in</strong>crease or decrease <strong>the</strong>heat rate to annul <strong>the</strong> change. The same compensation could be doneautomatically with an <strong>in</strong>let temperature detector designed to <strong>in</strong>itiate <strong>the</strong>proper corrective response <strong>in</strong> <strong>the</strong> heat value.The notion of feed-forward control is forceful, but it can be hard toimplement <strong>in</strong> a pure form <strong>in</strong> most control applications. In many casesdisturbances cannot be accurately measured and this makes pure feedforwarddifficult to use.A major limitation of feed-forward is <strong>the</strong> <strong>in</strong>ability to generate perfectmodels or to make accurate measurements. Because of <strong>the</strong>se limitations,pure feed-forward would accumulate <strong>the</strong> errors <strong>in</strong> its model andwould eventually self-destruct.The ma<strong>in</strong> limitation of feedback control is that it cannot predictupsets but can only make corrections after <strong>the</strong> upsets have occurred. Itmakes this correction <strong>in</strong> an oscillat<strong>in</strong>g, cycl<strong>in</strong>g way.The best use of feedback and feed-forward is to comb<strong>in</strong>e <strong>the</strong>m <strong>in</strong>such a way that <strong>the</strong> imperfect feed-forward model corrects for about90% of <strong>the</strong> upset as it occurs and <strong>the</strong> task of correct<strong>in</strong>g for <strong>the</strong> rema<strong>in</strong><strong>in</strong>g10% is done with <strong>the</strong> bias generated by <strong>the</strong> feedback loop. Us<strong>in</strong>g thisapproach, <strong>the</strong> feed-forward component is not pushed beyond its abilitiesand <strong>the</strong> load on <strong>the</strong> feedback loop is reduced by an order of magnitude,allow<strong>in</strong>g much tighter control.Proportional <strong>Control</strong> Mode<strong>Control</strong>lers generally use different control modes for control management.The proportional mode is <strong>the</strong> simplest of <strong>the</strong>se. It is characterizedby a cont<strong>in</strong>uous l<strong>in</strong>ear relationship between <strong>the</strong> controller <strong>in</strong>putand output. O<strong>the</strong>r terms <strong>in</strong> common usage <strong>in</strong>clude proportional action,correspondence control, droop control, and modulat<strong>in</strong>g control. A proportionalcontrol loop is shown <strong>in</strong> Figure 3-2.The adjustable parameter of <strong>the</strong> proportional mode, Kc, is knownas <strong>the</strong> proportional ga<strong>in</strong>, or proportional sensitivity. It may be expressed©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong><strong>in</strong> terms of percent proportional band (PB), whereKc = 100PBFigure 3-2. Proportional-only control.A wide band, high percentage of PB corresponds to less sensitive controllersett<strong>in</strong>gs, and a narrow band, low percentage, corresponds to moresensitive controller sett<strong>in</strong>gs.The correction generated by <strong>the</strong> proportional control mode is proportionalto <strong>the</strong> error. The proportional controller responds only to <strong>the</strong>present. It cannot consider past history of <strong>the</strong> error or possible futureconsequences of an error trend.It responds to all errors <strong>in</strong> <strong>the</strong> same manner, <strong>in</strong> proportion to <strong>the</strong>m.When a small error results <strong>in</strong> a large response, <strong>the</strong> ga<strong>in</strong> (Kc) is said tobe large or <strong>the</strong> proportional band is said to be narrow. When it takes alarge error to cause a small response, <strong>the</strong> controller is said to have asmall ga<strong>in</strong> or a wide proportional sett<strong>in</strong>g.The ga<strong>in</strong> <strong>in</strong> DCS control units is usually adjustable from 0 to 8,while <strong>in</strong> analog controllers <strong>the</strong> range can usually be adjusted from 0.02to about 25.Proportional OffsetThe ma<strong>in</strong> problem with proportional control is that it cannot keep<strong>the</strong> controlled variable on setpo<strong>in</strong>t. The proportional controller can onlyrespond to a change by mov<strong>in</strong>g away from its setpo<strong>in</strong>t. The process willbe on setpo<strong>in</strong>t for only part of <strong>the</strong> time. At all o<strong>the</strong>r times <strong>the</strong> operat<strong>in</strong>glevel travels up and down on its operat<strong>in</strong>g l<strong>in</strong>e as a function of <strong>the</strong> load.The difference between <strong>the</strong> actual value and <strong>the</strong> setpo<strong>in</strong>t is called©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and Nanotechnologyoffset. This is <strong>the</strong> amount by which <strong>the</strong> process is off setpo<strong>in</strong>t.The ga<strong>in</strong> of <strong>the</strong> controller can be <strong>in</strong>creased which narrows <strong>the</strong>throttl<strong>in</strong>g range of <strong>the</strong> system and makes <strong>the</strong> operat<strong>in</strong>g l<strong>in</strong>e more horizontal.Increas<strong>in</strong>g <strong>the</strong> ga<strong>in</strong>, can reduce, but not do away with <strong>the</strong> offset.At high ga<strong>in</strong>s <strong>the</strong> presence of <strong>the</strong> offset is no longer appreciable and itseems as if <strong>the</strong> controller is keep<strong>in</strong>g <strong>the</strong> process on setpo<strong>in</strong>t.Most control loops become unstable if <strong>the</strong> controller is providedwith a high ga<strong>in</strong>. The exceptions are very slow processes. This limits <strong>the</strong>use of pla<strong>in</strong> proportional control to processes which can tolerate highcontroller ga<strong>in</strong>s, <strong>the</strong> narrow proportional bands found <strong>in</strong> <strong>the</strong>rmostatsand humidostats. The addition of an <strong>in</strong>ternal feedback mechanism effectivelyreduces <strong>the</strong> sensitivity of <strong>the</strong> device to an acceptable range forproportional control.Integral ModeThis mode is also known as reset mode, s<strong>in</strong>ce after a load change itreturns <strong>the</strong> controlled variable to setpo<strong>in</strong>t and resets or elim<strong>in</strong>ates <strong>the</strong> offsetwhich <strong>the</strong> proportional controller would cause. This mode is alsoknown as float<strong>in</strong>g control. But, it is most often called <strong>in</strong>tegral control s<strong>in</strong>ce<strong>the</strong> controller output is based on <strong>the</strong> <strong>in</strong>tegral of <strong>the</strong> controller <strong>in</strong>put.Proportional-plus Integral <strong>Control</strong>In a proportional-plus <strong>in</strong>tegral controller <strong>the</strong> controller output is acomb<strong>in</strong>ation of <strong>the</strong> <strong>in</strong>tegral and proportional value (Figure 3-3). The<strong>in</strong>tegral term is divided by <strong>the</strong> <strong>in</strong>tegral time sett<strong>in</strong>g of <strong>the</strong> controller,which is also called <strong>the</strong> reset time.Figure 3-3. Proportional-plus-<strong>in</strong>tegral control.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The <strong>in</strong>tegral mode elim<strong>in</strong>ates <strong>the</strong> offset which exists <strong>in</strong> proportionalcontrol. Proportional control results <strong>in</strong> an offset s<strong>in</strong>ce it disregards<strong>the</strong> past history of error and leaves <strong>the</strong> accumulated effect of past errorsuncorrected.The <strong>in</strong>tegral mode cont<strong>in</strong>ues to use <strong>the</strong> total past history of <strong>the</strong>error by <strong>in</strong>tegrat<strong>in</strong>g <strong>the</strong> area under <strong>the</strong> error curve. This <strong>in</strong>tegral correctionacts to elim<strong>in</strong>ate <strong>the</strong> offset.The <strong>in</strong>tegral time is usually given <strong>in</strong> repeats/m<strong>in</strong>ute or <strong>in</strong> m<strong>in</strong>utes/repeat.The <strong>in</strong>tegral sett<strong>in</strong>g of control loops <strong>in</strong> DCS systems isusually set from 0 to 300 repeats/m<strong>in</strong>ute, or from 0.2 seconds to about60 m<strong>in</strong>utes or more <strong>in</strong> terms of m<strong>in</strong>utes/repeat. The shorter <strong>the</strong> <strong>in</strong>tegraltime, <strong>the</strong> more often <strong>the</strong> proportional correction is repeated (more repeats/m<strong>in</strong>ute).Pure <strong>in</strong>tegral control or float<strong>in</strong>g control is rarely used. In verynoisy valve position or flow control systems, <strong>the</strong> PI loop may be tunedwith low ga<strong>in</strong> and high reset (<strong>in</strong>tegral). The proportional mode tends toact as a noise amplifier, while <strong>the</strong> <strong>in</strong>tegral mode <strong>in</strong>tegrates <strong>the</strong> areaunder <strong>the</strong> noisy error curve and provides a smoo<strong>the</strong>d average.Reset W<strong>in</strong>dupWhile <strong>the</strong> <strong>in</strong>tegral mode solves <strong>the</strong> problem of offset, it <strong>in</strong>troducesano<strong>the</strong>r problem. When <strong>the</strong> loop is idle, if <strong>the</strong> <strong>in</strong>tegral mode is allowedto stay active, it will eventually saturate, and its output will ei<strong>the</strong>r dropto zero or rise to <strong>the</strong> maximum value of its power supply. Once saturated,<strong>the</strong> controller is not able to control and can upset <strong>the</strong> process bytry<strong>in</strong>g to <strong>in</strong>troduce a correction for <strong>the</strong> error, which it experienced dur<strong>in</strong>gits idle state.In <strong>the</strong>se <strong>in</strong>stallations <strong>the</strong> controller must be provided with ei<strong>the</strong>ran external reset, which prevents it from becom<strong>in</strong>g idle, or with antiresetw<strong>in</strong>dup, which protects it from saturat<strong>in</strong>g <strong>in</strong> <strong>the</strong> idle state.In some control systems, when a w<strong>in</strong>dup limit is reached, <strong>the</strong> <strong>in</strong>tegraltime (repeats/m<strong>in</strong>ute) is <strong>in</strong>creased to speed <strong>the</strong> unw<strong>in</strong>d<strong>in</strong>g andreturn <strong>the</strong> system to normal operation. In DCS systems <strong>the</strong>se operationsare implemented <strong>in</strong> software.In digital systems <strong>the</strong> <strong>in</strong>tegral is approximated by an accumulatorwhich cont<strong>in</strong>uously adds <strong>the</strong> deviation from setpo<strong>in</strong>t to <strong>the</strong> previous©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and Nanotechnologysum. When an error exists over a long period of time, <strong>the</strong> <strong>in</strong>tegral cangrow to <strong>the</strong> maximum value <strong>the</strong> DCS memory can hold. This conditionis <strong>in</strong>tegral or reset w<strong>in</strong>dup.The controller output <strong>in</strong> this case will be dom<strong>in</strong>ated by <strong>the</strong> woundupvalue and will saturate with its control value ei<strong>the</strong>r fully open orfully closed. Even when <strong>the</strong> error is removed or changes sign, <strong>the</strong>wound-up value cont<strong>in</strong>ues to ma<strong>in</strong>ta<strong>in</strong> its saturated output for a periodof time. The saturated value will cont<strong>in</strong>ue until <strong>the</strong> negative error accumulationequals <strong>the</strong> previously accumulated positive error.When <strong>the</strong> controller is not <strong>in</strong> control, <strong>the</strong> <strong>in</strong>tegral will w<strong>in</strong>dup. Thiscan be <strong>in</strong>itiated by <strong>the</strong> follow<strong>in</strong>g:• failed control-loop communications,• sensor failure,• control constra<strong>in</strong>t, and• process off or not work<strong>in</strong>g properly.Integral controllers should have an antiw<strong>in</strong>d-up mechanism. Onetechnique is to specify a limit on <strong>the</strong> <strong>in</strong>tegral contribution to <strong>the</strong> totaloutput signal. Ano<strong>the</strong>r strategy is to <strong>in</strong>hibit <strong>in</strong>tegral accumulation if <strong>the</strong>output reaches a limit. Ei<strong>the</strong>r mechanism limits <strong>the</strong> <strong>in</strong>tegral w<strong>in</strong>dup toa value correspond<strong>in</strong>g to full open or full closed. To accelerate <strong>the</strong> returnof <strong>the</strong> <strong>in</strong>tegral contribution to its proper value, some controllers make<strong>the</strong> <strong>in</strong>tegral accumulation 10 to 20 times faster when com<strong>in</strong>g off a limit<strong>in</strong>gvalue.Reset FeedbackReset feedback is ano<strong>the</strong>r technique where <strong>the</strong> <strong>in</strong>tegral of <strong>the</strong> erroris replaced with a filter on <strong>the</strong> output. In reset feedback <strong>the</strong>re is no <strong>in</strong>tegralto w<strong>in</strong>dup. But, <strong>the</strong>re can still be some w<strong>in</strong>dup to <strong>the</strong> upper orlower limits of <strong>the</strong> output.The filter can be on an external signal which would be identical to<strong>the</strong> controller output if <strong>the</strong> control loop were closed. There is a w<strong>in</strong>dupto <strong>the</strong> edge of <strong>the</strong> saturation value and when control is recovered <strong>the</strong>reis no need for w<strong>in</strong>d-down acceleration.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Derivative ModeThe proportional mode considers <strong>the</strong> present state of <strong>the</strong> processerror and <strong>the</strong> <strong>in</strong>tegral mode uses its past history. The derivative modeanticipates its future state and acts on this forecast. This third controlmode became needed as <strong>the</strong> size of equipment <strong>in</strong>creased with a greatermass and <strong>the</strong>rmal <strong>in</strong>ertia.A large process has more <strong>in</strong>ertia or momentum which makes itdifficult to stop or reverse a control trend. The derivative mode tries topredict process errors before <strong>the</strong>y evolve and take corrective action <strong>in</strong>advance of <strong>the</strong> occurrence.When <strong>the</strong> error is constant, <strong>the</strong> derivative contribution to <strong>the</strong> outputsignal is zero. This is because <strong>the</strong> derivative contribution is based on<strong>the</strong> rate at which <strong>the</strong> error is chang<strong>in</strong>g. When that rate is zero <strong>the</strong> derivativeis zero. The derivative contribution always corresponds to <strong>the</strong> slopeof <strong>the</strong> error curve.Derivative TimeThe derivative sett<strong>in</strong>g uses a derivative time (Td) which is <strong>the</strong>length of time <strong>the</strong> derivative mode looks <strong>in</strong>to <strong>the</strong> future. If <strong>the</strong> derivativemode is set for Td, it will supply a correction that will equal <strong>the</strong> correctionwhich <strong>the</strong> proportional mode would have generated at Td. Thelonger <strong>the</strong> Td sett<strong>in</strong>g, <strong>the</strong> fur<strong>the</strong>r <strong>in</strong>to <strong>the</strong> future <strong>the</strong> derivative-modepredicts and <strong>the</strong> larger is <strong>the</strong> corrective value. The derivative time canbe adjusted from a few seconds to hours.PD control loops are sometimes used <strong>in</strong> <strong>the</strong> slave controller <strong>in</strong> temperaturecascade systems when <strong>the</strong>re is a need to <strong>in</strong>crease <strong>the</strong> sensitivityof <strong>the</strong> slave loop. PID control is more widely used and applications<strong>in</strong>clude many temperature control systems.Limitations of Derivative ModeThe derivative mode acts upon <strong>the</strong> rate of error signal change andit can cause unnecessary upsets. It tends to react to sudden setpo<strong>in</strong>tchanges and will amplify noise. The control algorithm can be altered sothat <strong>the</strong> derivative acts on <strong>the</strong> measurement and not on <strong>the</strong> error. Thiswill reduce upsets.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and NanotechnologyExcessive noise and step changes <strong>in</strong> <strong>the</strong> measurement can be correctedby filter<strong>in</strong>g out any change <strong>in</strong> <strong>the</strong> measurement that occurs fasterthan <strong>the</strong> maximum speed of response of <strong>the</strong> process. DCS systems providesoftware with adjustable filters for each variable. The time constantof <strong>the</strong>se filters is usually adjustable from 0 to 100 seconds. In analogcontrol systems, <strong>in</strong>verse derivative modules are often used.Inverse Derivative ModeThis control action is used on fast processes. The <strong>in</strong>verse derivativemode is <strong>the</strong> opposite of <strong>the</strong> derivative mode. While <strong>the</strong> output of <strong>the</strong>derivative mode is directly proportional to <strong>the</strong> rate of change <strong>in</strong> error,<strong>the</strong> output of <strong>the</strong> <strong>in</strong>verse derivative mode is <strong>in</strong>versely proportional to<strong>the</strong> rate of change <strong>in</strong> error.Inverse derivative is used to reduce <strong>the</strong> ga<strong>in</strong> of <strong>the</strong> controller athigh frequencies and is useful <strong>in</strong> stabiliz<strong>in</strong>g a control loop. The dynamicga<strong>in</strong> of <strong>the</strong> derivative function is selected as 0.5 or less. The ga<strong>in</strong> of <strong>the</strong><strong>in</strong>verse derivative controller decreases from <strong>the</strong> proportional ga<strong>in</strong> at lowfrequency to a limit<strong>in</strong>g value of <strong>the</strong> proportional ga<strong>in</strong> divided by thisfactor at high frequency.A proportional-plus-<strong>in</strong>verse-derivative controller provides highga<strong>in</strong> to m<strong>in</strong>imize offset at low frequency and low ga<strong>in</strong> to stabilize <strong>the</strong>loop at high frequency. Inverse derivative can also be added to a proportional-plus-<strong>in</strong>tegralcontroller to stabilize loops requir<strong>in</strong>g very low proportionalga<strong>in</strong> for stability.Inverse derivative should only be added when <strong>the</strong> loop is unstableat <strong>the</strong> m<strong>in</strong>imum ga<strong>in</strong> sett<strong>in</strong>g of <strong>the</strong> proportional-plus-<strong>in</strong>tegral controller.It is available <strong>in</strong> a separate unit and can be added to <strong>the</strong> loop whenstability problems occur. The addition of <strong>in</strong>verse derivative when properlytuned has little effect on <strong>the</strong> natural frequency of <strong>the</strong> loop.Digital <strong>Control</strong> ModesWhen control mode algorithms are implemented <strong>in</strong> digital systems,<strong>in</strong>tegration is replaced by f<strong>in</strong>ite summations and time differentialsbecome f<strong>in</strong>ite differences. The scan period of DCS systems is usuallyfixed at 0.5 seconds or selectable for each loop at 0.1 to 30 seconds.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The DCS system does not cont<strong>in</strong>uously evaluate each measurement,but checks <strong>the</strong>m <strong>in</strong>termittently. It makes its approximations on <strong>the</strong>basis of <strong>the</strong> present and <strong>the</strong> previous error. One type of calculation <strong>in</strong>use is called positional where <strong>the</strong> full output signal is recalculated everytime <strong>the</strong> measurement is checked. The derivative is approximated by <strong>the</strong>change between <strong>the</strong> previous and <strong>the</strong> present value of <strong>the</strong> error. The<strong>in</strong>tegral is approximated by <strong>the</strong> sum of all previous errors between timezero and <strong>the</strong> present time.Ano<strong>the</strong>r type of calculation is called a velocity algorithm. When itis used, <strong>the</strong> value of <strong>the</strong> previous output signal is held <strong>in</strong> memory, andonly <strong>the</strong> required change <strong>in</strong> that output signal is calculated. The change<strong>in</strong> <strong>the</strong> error between <strong>the</strong> previous and <strong>the</strong> present scan period is calculated(second derivative).The positional algorithm is used with noisy measurements s<strong>in</strong>ce itworks with <strong>the</strong> error and not <strong>the</strong> rate of error change. Velocity algorithmscan provide bumpless transfer, less reset w<strong>in</strong>dup and are bettersuited for motor-driven devices. Their ma<strong>in</strong> problems are noise sensitivityand oscillation.Setpo<strong>in</strong>t ResponseWhen <strong>the</strong> error is <strong>the</strong> deviation from setpo<strong>in</strong>t, a sudden setpo<strong>in</strong>tchange causes a sudden error change, which can cause a controlleroutput spike. When both proportional and derivative control act only onmeasurements, <strong>the</strong> output spik<strong>in</strong>g due to setpo<strong>in</strong>t changes is preventedwhile <strong>the</strong> tuned controller performance is not affected. Some controllershave setpo<strong>in</strong>t ramp<strong>in</strong>g to prevent output spik<strong>in</strong>g by elim<strong>in</strong>at<strong>in</strong>g <strong>the</strong>sudden setpo<strong>in</strong>t change.Setpo<strong>in</strong>t StationsSetpo<strong>in</strong>t stations are used to <strong>in</strong>terface a digital control computerwith analog controllers and actuators (Figure 3-4). They allow <strong>the</strong> computerto make changes <strong>in</strong> operat<strong>in</strong>g conditions. In supervisory controlapplications, <strong>the</strong> computer adjusts <strong>the</strong> setpo<strong>in</strong>t of an analog controller.In direct digital or DCS control, <strong>the</strong> computer may adjust <strong>the</strong> actuatordirectly. The signals from <strong>the</strong> computer must be translated <strong>in</strong>to <strong>the</strong> signalsrequired by <strong>the</strong> receiv<strong>in</strong>g device.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and NanotechnologyFigure 3-4. Setpo<strong>in</strong>t <strong>in</strong>terface signals.Setpo<strong>in</strong>t stations may be designed to <strong>in</strong>terface with electronic orpneumatic controllers. The setpo<strong>in</strong>t station may generate, from <strong>the</strong> computeroutput signals, a setpo<strong>in</strong>t that can be directly used <strong>in</strong> <strong>the</strong> controller.For analog electronic controllers, a voltage output is generated by <strong>the</strong>computer (through a digital-to-analog converter) which is proportionalto <strong>the</strong> desired setpo<strong>in</strong>t.Computer Setpo<strong>in</strong>tsThe operator can adjust <strong>the</strong> effective setpo<strong>in</strong>t or use <strong>the</strong> computeroutput signal for computer control. Without automatic switch<strong>in</strong>g, thisscheme is not fail-safe, s<strong>in</strong>ce a computer system failure and loss of <strong>the</strong>computer-supplied setpo<strong>in</strong>t voltage could cause a zero setpo<strong>in</strong>t to exist.This could cause undesirable and even dangerous conditions to exist.There is a need to have automatic switch<strong>in</strong>g to a back-up setpo<strong>in</strong>t adjustment<strong>in</strong> <strong>the</strong> event of computer failure.The computer must be able to cont<strong>in</strong>ually adjust <strong>the</strong> back-up setpo<strong>in</strong>tto keep it up to date with <strong>the</strong> computer’s so that a bumpless transferis guaranteed. Then, when <strong>the</strong> transition from back-up control tocomputer control is made, <strong>the</strong> computer must supply a signal identicalto that supplied by <strong>the</strong> back-up, <strong>in</strong> order to achieve a bumpless transfer.Most setpo<strong>in</strong>t stations are designed to provide fail-safe operation <strong>in</strong> caseof computer failure by hav<strong>in</strong>g <strong>the</strong> computer supply a live signal only©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>while mak<strong>in</strong>g changes <strong>in</strong> <strong>the</strong> setpo<strong>in</strong>t.One fail-safe technique <strong>in</strong>volves operat<strong>in</strong>g a stepp<strong>in</strong>g or synchronousmotor with <strong>the</strong> computer digital output signals. The stepp<strong>in</strong>g motorreceives a pulse tra<strong>in</strong> from <strong>the</strong> computer and <strong>the</strong> number of pulses isequivalent to <strong>the</strong> change <strong>in</strong> setpo<strong>in</strong>t to be made. Failure of <strong>the</strong> computerresults <strong>in</strong> no more pulses and leaves <strong>the</strong> setpo<strong>in</strong>t <strong>in</strong> its last position.A synchronous motor can accept a timed contact closure signalfrom <strong>the</strong> computer. Any change made <strong>in</strong> <strong>the</strong> setpo<strong>in</strong>t is proportional to<strong>the</strong> duration of <strong>the</strong> contact closure signal. Unless <strong>the</strong> computer systemfails while chang<strong>in</strong>g <strong>the</strong> setpo<strong>in</strong>t fail-safe operation is possible. Adjustablemechanical stops can be used to keep <strong>the</strong> computer setpo<strong>in</strong>t with<strong>in</strong>limits and m<strong>in</strong>imize <strong>the</strong> effects of such a failure.In a stepp<strong>in</strong>g motor system, resolution is <strong>the</strong> number of steps requiredto drive <strong>the</strong> setpo<strong>in</strong>t from zero to full scale. A full-scale travel of100 steps, for example, gives a resolution of 1.0%. The maximum pulserate is <strong>the</strong> sum of <strong>the</strong> m<strong>in</strong>imum on pulse duration and <strong>the</strong> m<strong>in</strong>imumallowable time between pulses. For example, if <strong>the</strong> sum is 30 milliseconds,<strong>the</strong> maximum pulse rate is 33 pulses/second, and, assum<strong>in</strong>g 1.0%resolution, 3 seconds would be required for a full-scale change (100pulses) <strong>in</strong> setpo<strong>in</strong>t.Ano<strong>the</strong>r technique for generat<strong>in</strong>g consistent setpo<strong>in</strong>t signals is touse an <strong>in</strong>tegrat<strong>in</strong>g amplifier. The output of <strong>the</strong> amplifier follows <strong>the</strong>setpo<strong>in</strong>t and holds an equivalent setpo<strong>in</strong>t reference voltage. The amplifierdrift rate must be considered if <strong>the</strong> computer is not adjust<strong>in</strong>g <strong>the</strong>setpo<strong>in</strong>t often.Setpo<strong>in</strong>t FeedbackIn a supervisory control system, <strong>the</strong> computer program must be<strong>in</strong>itialized prior to tak<strong>in</strong>g over control of <strong>the</strong> setpo<strong>in</strong>ts. In ei<strong>the</strong>r supervisoryor direct digital control <strong>the</strong> computer needs to know <strong>the</strong> resultsof every setpo<strong>in</strong>t adjustment so setpo<strong>in</strong>t feedback signals are sent to <strong>the</strong>computer. These feedback signals can be obta<strong>in</strong>ed from a transducer.Supervisory <strong>Control</strong>In 1957, <strong>the</strong> Ramo-Woodridge Corporation <strong>in</strong>troduced <strong>the</strong> firstsolid-state digital computer for control systems. This computer was©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and Nanotechnologydesigned around a magnetic drum with 8064 words of 20-bit length. Theexternal <strong>in</strong>put/output supported 540 1-bit digital <strong>in</strong>puts. The computerwas designed to <strong>in</strong>terface directly with exist<strong>in</strong>g analog control systems.The system acted as an enhancement to <strong>the</strong> exist<strong>in</strong>g control <strong>in</strong>strumentationand it functioned as a supervisory control device.The software program consisted of models of <strong>the</strong> process. Thesewere usually simple l<strong>in</strong>ear programm<strong>in</strong>g algorithms. The models providednew sets of operat<strong>in</strong>g conditions (setpo<strong>in</strong>ts) which could improveperformance. The process was moved from one set of steady-state conditionsto ano<strong>the</strong>r <strong>in</strong> response to changes <strong>in</strong> uncontrolled disturbancessuch as ambient conditions.With<strong>in</strong> a few years, o<strong>the</strong>r companies <strong>in</strong>troduced <strong>the</strong>ir versions ofcontrol computers. These companies <strong>in</strong>cluded IBM, General Electric,<strong>Control</strong> Data Corporation and Foxboro. The <strong>in</strong>itial improvements <strong>in</strong>volved<strong>in</strong>creased memory size. The use of magnetic core memory <strong>in</strong>creased<strong>the</strong> computational speed from milliseconds to microseconds. Amajor step came with <strong>the</strong> replacement of solid-state circuitry (diodes,resistors, and transistors) with <strong>in</strong>tegrated circuits. This technology provided<strong>in</strong>creased speed and capacity, lower power requirements, smallersize and improved reliability.An evolution <strong>in</strong> control computers came with <strong>the</strong> development ofdirect digital control (DDC). Here, <strong>the</strong> function of <strong>the</strong> analog <strong>in</strong>strumentationwas <strong>in</strong>corporated <strong>in</strong> <strong>the</strong> computer and <strong>the</strong> analog controllers wereelim<strong>in</strong>ated. The goal was to reduce <strong>the</strong> control system cost and <strong>in</strong>creasedesign flexibility for new applications.Initially, <strong>the</strong>se computers and especially <strong>the</strong> software, which hadbecome complicated, were not sufficiently reliable. In many cases, when<strong>the</strong> computer went down, control was lost completely.When m<strong>in</strong>icomputers replaced <strong>the</strong>se older computers, it was feasibleto provide redundancy <strong>in</strong> <strong>the</strong> form of dual computers. This solved<strong>the</strong> reliability problem.DCSIn 1976 when Honeywell announced <strong>the</strong> first distributed digitalcontrol system (DCS), <strong>the</strong> system was based on redundancy us<strong>in</strong>g microprocessor-basedcontrollers, redundancy <strong>in</strong> communications and redundancy<strong>in</strong> operator <strong>in</strong>terfaces.Most large-scale control applications now use microcomputer-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>based DCS (Figure 3-5). These systems generally have CRT-based operatorconsoles and keyboards which are used for monitor<strong>in</strong>g and controll<strong>in</strong>g<strong>the</strong> system. <strong>Control</strong>lers and multifunction control modules are usedto provide <strong>the</strong> basic control computation or operation.A communication network transfers <strong>the</strong> <strong>in</strong>formation between <strong>the</strong>control modules and operator consoles. I/O (Input/Output) modulesare used to convert <strong>the</strong> sensor signals from analog to digital and digitalto analog for <strong>the</strong> controller modules and console displays. Fieldbus communicationl<strong>in</strong>ks are used for communication between remote I/O devicesand control modules. Historical data storage is used for controldata and is available for on-l<strong>in</strong>e data retrieval. A control software packageis used for monitor<strong>in</strong>g, control, report<strong>in</strong>g, graphics and trend<strong>in</strong>g.In most applications, a DCS replaces a conventional control systemfor <strong>the</strong> purpose of perform<strong>in</strong>g basic control. The supervisory controlfunctions performed by <strong>the</strong> older computer systems plus additionalfunctions such as on-l<strong>in</strong>e <strong>in</strong>formation evaluation may be performed bya supervisory computer l<strong>in</strong>ked to a DCS.Figure 3-5. DCS structure.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and NanotechnologySupervisory FunctionsThe use of digital computers and <strong>the</strong>ir capability to perform complexma<strong>the</strong>matical calculations and make logical decisions provide <strong>the</strong>opportunity to improve <strong>the</strong> performance of any control application. Theneed for supervisory control results from <strong>the</strong> fact that all processes areaffected by changes. These changes are <strong>in</strong> <strong>the</strong> form of disturbances.These disturbances may come from many sources. Examples of disturbances<strong>in</strong>clude ambient conditions, heater and heat exchanger foul<strong>in</strong>gand economics. The supervisory control function can also be used offl<strong>in</strong>eas a valuable simulation tool for evaluat<strong>in</strong>g what-if scenarios.Alarms are based on models utiliz<strong>in</strong>g <strong>the</strong> present and past historyof <strong>the</strong> data and <strong>the</strong> control commands. Anticipat<strong>in</strong>g alarm conditions <strong>in</strong>advance is a vital function of supervisory control. The supervisory computertypically determ<strong>in</strong>es <strong>the</strong> operat<strong>in</strong>g constra<strong>in</strong>ts, such as flood<strong>in</strong>g orsurge conditions. Basic material balance, energy balance, or heat transfercalculations are utilized for model creation.The computation of <strong>the</strong> model is not necessarily a s<strong>in</strong>gle-path computation.It may require iterative computations. This type of computationis not usually performed at <strong>the</strong> DCS level.The present operat<strong>in</strong>g state is determ<strong>in</strong>ed based on <strong>the</strong> on-l<strong>in</strong>e,real-time <strong>in</strong>formation from <strong>the</strong> DCS us<strong>in</strong>g temperatures, pressures ando<strong>the</strong>r characteristics. This determ<strong>in</strong>es <strong>the</strong> desired state accord<strong>in</strong>g to <strong>the</strong>constra<strong>in</strong>ts and optimization criteria. An on-l<strong>in</strong>e <strong>in</strong>formation systemmay <strong>in</strong>clude data collection, data reconciliation, data storage and retrieval.The optimum control strategy is based on <strong>the</strong> on-l<strong>in</strong>e, real-time<strong>in</strong>formation. The control strategy commands will follow <strong>the</strong> optimumpath such that <strong>the</strong> objectives of m<strong>in</strong>imum cost and m<strong>in</strong>imum energy areobta<strong>in</strong>ed.<strong>Control</strong> and OptimizationSupervisory control can <strong>in</strong>clude calculation of <strong>the</strong> present state of<strong>the</strong> process <strong>in</strong> terms of efficiency and calculation of new conditions, <strong>in</strong>terms of setpo<strong>in</strong>ts which will meet <strong>the</strong> requirements of <strong>the</strong> objective function.The objective function can maximize efficiency through fuel costs.The tools needed to perform supervisory control are a model andan optimization or maximization algorithm. The model can range from©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>simple l<strong>in</strong>ear equations to more sophisticated <strong>the</strong>oretical expressions.The ma<strong>in</strong> purpose of <strong>the</strong> model is to provide an estimate of <strong>the</strong> relativitybetween <strong>the</strong> manipulated variable and <strong>the</strong> <strong>in</strong>termediate and performancevariables. When <strong>the</strong> manipulated variables are perturbed by <strong>the</strong>maximization algorithm, an estimate of <strong>the</strong> change <strong>in</strong> <strong>the</strong> <strong>in</strong>termediateand performance variables with relation to <strong>the</strong> constra<strong>in</strong>t values must bemade.The optimization or maximization algorithm can also be simplisticor sophisticated. There is an advantage to us<strong>in</strong>g <strong>the</strong> simpler approach.The procedure always starts with a known solution. Then, <strong>the</strong> perturbationprocedure takes advantage of what a digital computer does best,simple calculations repeated over and over. In sophisticated optimizationalgorithms, <strong>the</strong>re may be multiple solutions and <strong>the</strong> real solutionsmust be selected.In general, <strong>the</strong> computers used for supervisory control aremultitask<strong>in</strong>g computers which are <strong>in</strong>terfaced with <strong>the</strong> DCS through acomputer gateway (Figure 3-6). The data which reside <strong>in</strong> control mod-Figure 3-6. Gateway for DCS.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and Nanotechnologyules can be communicated to <strong>the</strong> supervisory computer when this <strong>in</strong>formationis needed for computation.Supervisory TechniquesEarly supervisory control was used to command s<strong>in</strong>gle-loop analogcontrollers <strong>in</strong> order to achieve a certa<strong>in</strong> goal, such as to obta<strong>in</strong> auniform temperature or to determ<strong>in</strong>e <strong>the</strong> optimum blend<strong>in</strong>g of cold andhot decks. The functions that <strong>the</strong> analog controllers could not accomplishwere delegated to <strong>the</strong> digital computer to perform. These <strong>in</strong>cluded<strong>the</strong> logic, sequence, or analytic computations to improve <strong>the</strong> controloperation.Coord<strong>in</strong>ated supervisory control with <strong>in</strong>tegrated feedback or feedforwardcomb<strong>in</strong>ed <strong>in</strong> a velocity control algorithm may be activated ordeactivated without creat<strong>in</strong>g perturbations. The velocity algorithmimplemented <strong>in</strong> <strong>the</strong> supervisory computer can be converted to <strong>the</strong> positionalgorithm which is usually applied at <strong>the</strong> DCS level. The controlcommand, <strong>in</strong> <strong>the</strong> supervisory computer at <strong>the</strong> current sampl<strong>in</strong>g time ismade up from <strong>the</strong> current computer position command and <strong>the</strong> pastsampled position command.Anti-w<strong>in</strong>dup <strong>Control</strong>The command from <strong>the</strong> supervisory computer to <strong>the</strong> setpo<strong>in</strong>t for<strong>the</strong> control loop at <strong>the</strong> DCS level is a form of cascade control. The primaryloop control command (supervisory computer command) requires<strong>in</strong>formation from <strong>the</strong> lower or secondary loop at <strong>the</strong> DCS level <strong>in</strong> orderto command correctly. This <strong>in</strong>formation <strong>in</strong>cludes saturation status andlower loop current setpo<strong>in</strong>t values at <strong>the</strong> DCS. This <strong>in</strong>formation at <strong>the</strong>DCS level requires constant monitor<strong>in</strong>g by <strong>the</strong> supervisory computer of<strong>the</strong> real-time <strong>in</strong>formation on <strong>the</strong> DCS network. It is important to prevent<strong>the</strong> computer command from caus<strong>in</strong>g setpo<strong>in</strong>t w<strong>in</strong>dup at <strong>the</strong> DCS level.Protect<strong>in</strong>g <strong>the</strong> upper loop command from w<strong>in</strong>dup <strong>in</strong>volves a freez<strong>in</strong>gof <strong>the</strong> supervisory control command output to <strong>the</strong> DCS setpo<strong>in</strong>t atits last value if <strong>the</strong> DCS output to <strong>the</strong> valve is saturated and <strong>the</strong> directionof <strong>the</strong> upper loop output <strong>in</strong>crement is such that it would cause fur<strong>the</strong>rvalve saturation at <strong>the</strong> DCS level. O<strong>the</strong>rwise, <strong>the</strong> upper loop <strong>in</strong> <strong>the</strong> su-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>pervisory computer will not be frozen at its last value.For supervisory control, <strong>the</strong> upper-level control algorithm must be<strong>in</strong>itialized when <strong>the</strong> output from <strong>the</strong> supervisory computer command<strong>in</strong>g<strong>the</strong> lower loops <strong>in</strong> <strong>the</strong> DCS is <strong>in</strong>itiated or when an emergency conditionrequires that <strong>the</strong> supervisory control be prevented.System FailureWhen <strong>the</strong> supervisory computer fails, <strong>the</strong> control generated at <strong>the</strong>computer level cannot be transferred to <strong>the</strong> DCS level. An <strong>in</strong>tegrated controlsystem should use a watchdog timer or communication l<strong>in</strong>k messageto flag <strong>the</strong> lower DCS loops. This is needed to prevent an unnecessary disturbanceto <strong>the</strong> system due to a supervisory computer failure.Fault-tolerant control can be achieved <strong>in</strong> <strong>the</strong> event that <strong>the</strong> computerfails. One approach to fault tolerance is to implement a generalizedoutput control algorithm at <strong>the</strong> DCS level.Supervisory DisplaysThe display on <strong>the</strong> CRT screen becomes <strong>the</strong> ma<strong>in</strong> <strong>in</strong>terface whichcan be used for system performance evaluation. There are usually hundredsof display page screens provided <strong>in</strong> both DCS and supervisorycomputer software. These display pages are easily accessed through akeyboard, touch screen, mouse, or track ball.A typical display access method is to use a tree-structured, multileveldisplay architecture. A two-level structure with 16 elements (pages)<strong>in</strong> each level provides 16 × 16 = 256 pages. Each screen page at <strong>the</strong> secondlevel can cover 16 elements and each element can be a digital oranalog <strong>in</strong>put/output comb<strong>in</strong>ation. This provides a total of 4096 comb<strong>in</strong>edI/O po<strong>in</strong>ts that can be displayed at <strong>the</strong> second level. If <strong>the</strong> propersearch path is selected, only two keystrokes are needed to arrive at <strong>the</strong>desired po<strong>in</strong>t.Traditionally analog controllers have been arranged <strong>in</strong> clusters ofrows or columns. In DCS, controllers are usually arranged <strong>in</strong> groups of8, 12, 16, or 32 for screen displays. One of <strong>the</strong> simplest ways to represent<strong>in</strong>formation for supervisory controls is to use a multi-<strong>in</strong>put/multi-outputdisplay.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and NanotechnologyAlarmsAlarms for DCS <strong>in</strong>clude high, low, high-high, low-low and highrate of change. These alarms appear on <strong>the</strong> alarm screen at <strong>the</strong> DCSoperator console along with time of occurrence, magnitude of variableand alarm limit. In supervisory computers, an alarm management programcan assist <strong>the</strong> alarm diagnostics and help <strong>the</strong> operator p<strong>in</strong>po<strong>in</strong>t <strong>the</strong>alarm cause and location. The alarms can be grouped accord<strong>in</strong>g to <strong>the</strong>geographical regions of <strong>the</strong> plant.Voice <strong>in</strong>put and output can be important for convey<strong>in</strong>g <strong>in</strong>formationabout real-time conditions. The cause or location of alarms can beannounced without us<strong>in</strong>g <strong>the</strong> screen display. When variables approachan alarm limit, voice output can be generated to alert an impend<strong>in</strong>galarm condition.The periodic execution of <strong>the</strong> program is typically a function ofdynamic parameters such as time constants, transportation delays, programexecution time, network speed, gateway update frequency andperiodic <strong>in</strong>terrupts.Gateway InterfaceSupervisory computers are <strong>in</strong>terfaced to <strong>the</strong> DCS through a gatewaydevice which receives data and messages from an orig<strong>in</strong>at<strong>in</strong>gsource. The gateway resides on a node of <strong>the</strong> local control network ordata communication network of <strong>the</strong> DCS (Figure 3-7).The gateways are configured through <strong>the</strong> DCS us<strong>in</strong>g a gatewaydata table. Data <strong>in</strong> <strong>the</strong> data table could <strong>in</strong>clude <strong>the</strong> follow<strong>in</strong>g types:• setpo<strong>in</strong>ts,• process variables,• control loop outputs,• control parameters, and• alarm status.The gateway device collects <strong>the</strong> listed data from <strong>the</strong> DCS communicationnetwork or data highway and transfers <strong>the</strong>m to <strong>the</strong> supervisorycomputer through a different communication l<strong>in</strong>k or network. The gatewayreceives data from <strong>the</strong> supervisory computer and transfers <strong>the</strong>se to©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 3-7. Supervisory computer and DCS gateway.<strong>the</strong> nodes of <strong>the</strong> DCS. Gateways are also used to communicate withcomputers through a local area network (LAN).Old and <strong>New</strong> <strong>Control</strong> ConceptsThe software used <strong>in</strong> modern build<strong>in</strong>g control systems can result<strong>in</strong> significant benefits. More control <strong>in</strong> <strong>the</strong>se facilities can m<strong>in</strong>imize expenses.However, <strong>the</strong> sophisticated build<strong>in</strong>g control systems requiresome changes. One change is to avoid implement<strong>in</strong>g direct digital controllersto deal with <strong>the</strong> same <strong>in</strong>puts that were used <strong>in</strong> past generationsof pneumatic controls. A more holistic approach is required <strong>in</strong> modernbuild<strong>in</strong>g controls.Today’s build<strong>in</strong>g control systems are fueled by software. If properlyapplied, this software can deliver powerful results. But, this requiresbreak<strong>in</strong>g down some traditional l<strong>in</strong>es of system separation.Direct digital control can transform <strong>HVAC</strong> controls. Just a fewyears ago, a build<strong>in</strong>g’s <strong>HVAC</strong> control system might consist of a complexnetwork of discrete electro-mechanical components which were l<strong>in</strong>kedtoge<strong>the</strong>r with pneumatic tub<strong>in</strong>g. Each component had a specific function,ei<strong>the</strong>r serv<strong>in</strong>g as a l<strong>in</strong>k to <strong>the</strong> physical world, or be<strong>in</strong>g part of <strong>the</strong>control logic itself.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and NanotechnologyComponent <strong>Control</strong>In <strong>the</strong> logic components, decisions were based on <strong>the</strong> physicalparameters connected to it, such as air pressure <strong>in</strong> a pneumatic controll<strong>in</strong>e com<strong>in</strong>g from a sensor. Every sensor required pneumatic tub<strong>in</strong>g to berun back to <strong>the</strong> controller. If a change <strong>in</strong> control logic was desired, itrequired additional labor and materials. This type of control focused onoptimiz<strong>in</strong>g components, <strong>in</strong>stead of look<strong>in</strong>g at <strong>the</strong> dynamic ways of optimiz<strong>in</strong>g<strong>the</strong> control operation.In a DDC build<strong>in</strong>g management system, any po<strong>in</strong>t connected to<strong>the</strong> system is a part of <strong>the</strong> data network, capable of provid<strong>in</strong>g criticalcontrol <strong>in</strong>formation.A component concentration prevents DDC control from us<strong>in</strong>g <strong>in</strong>formationfrom anywhere on <strong>the</strong> network. This can occur if it is implementedonly to consider <strong>the</strong> same <strong>in</strong>puts that were used by <strong>the</strong> systemsof pneumatic controls.Temperature control of a s<strong>in</strong>gle office <strong>in</strong> a large complex can illustratethis po<strong>in</strong>t. The office temperature might be controlled by a DDCvariable air volume (VAV) box controller with a sensor/<strong>the</strong>rmostat on<strong>the</strong> wall. To save energy, a night setback feature is added when <strong>the</strong>re isno one <strong>in</strong> <strong>the</strong> office, with <strong>the</strong> change-over triggered automatically by atime scheduler.The <strong>in</strong>dividual office has an <strong>in</strong>stalled light fixture and wall switch.To save energy, an occupancy sensor is mounted <strong>in</strong> <strong>the</strong> room that turnsoff <strong>the</strong> light when no one is <strong>the</strong>re.This results <strong>in</strong> two <strong>in</strong>dividually optimized systems that satisfy<strong>the</strong>ir own <strong>in</strong>dividual missions of sav<strong>in</strong>g energy when <strong>the</strong> room is notoccupied. But, has <strong>the</strong> office, as a whole, been truly optimized?In an <strong>in</strong>tegrated build<strong>in</strong>g management system, every piece of datumis available for use <strong>in</strong> any strategy and an occupancy sensor tocontrol <strong>the</strong> DDC VAV box should be used. The occupied/unoccupiedschedule and temperature setpo<strong>in</strong>ts are still used, but dur<strong>in</strong>g occupiedhours, a third standby setpo<strong>in</strong>t is used for damper control of <strong>the</strong> VAVbox. This would allow <strong>the</strong> temperature to drift up or down to <strong>the</strong> predef<strong>in</strong>edstandby temperature setpo<strong>in</strong>t. This setpo<strong>in</strong>t is used dur<strong>in</strong>g normaloccupied hours when <strong>the</strong> occupant is out of <strong>the</strong> room. The result ismore energy sav<strong>in</strong>gs at little additional cost.This occupancy sensor could be used to provide security <strong>in</strong>formationas well. Us<strong>in</strong>g data generated by <strong>the</strong> system, security could tellwhich rooms were occupied at any given time.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>MicroelectronicsThe most important s<strong>in</strong>gle <strong>in</strong>vention with<strong>in</strong> <strong>the</strong> whole complex of<strong>in</strong>ventions which is today called computer technology is <strong>the</strong> transistor.Electronic tubes made <strong>the</strong> first high-speed process<strong>in</strong>g possible, and <strong>the</strong>stored program led <strong>the</strong> way to <strong>the</strong> possibility of computer <strong>in</strong>telligence,but <strong>the</strong> transistor paved <strong>the</strong> way for modern computers.Tubes rely for <strong>the</strong>ir amplify<strong>in</strong>g and switch<strong>in</strong>g power on a heaterelectrode which pumps electrons through a vacuum. This electrodemust be shaped out of metal and it cannot be reduced beyond a certa<strong>in</strong>size. If it gets too small, it cannot produce enough heat to activate <strong>the</strong>electrons.The transistor relies for particular structures of a m<strong>in</strong>ute size whichare formed <strong>in</strong>side silicon crystals. These structures can be very small anda solid-state amplifier or switch may be based <strong>in</strong> a t<strong>in</strong>y fragment of silicon.This results <strong>in</strong> substantial reductions <strong>in</strong> <strong>the</strong> size of <strong>the</strong> function<strong>in</strong>gunit of an amplifier or comput<strong>in</strong>g unit.The first transistorized devices occupied less than a hundredth of<strong>the</strong> space of electronic tubes. Because <strong>the</strong>y do not rely on heat to drive<strong>the</strong>ir electrons along, transistor devices need no warm<strong>in</strong>g up period and<strong>the</strong>y consume far less energy. They are also faster <strong>in</strong> operation and muchmore reliable. Transistors quickly replaced electronic tubes except forsome high-power applications.The com<strong>in</strong>g of <strong>the</strong> transistor could not have been foreseen by anyof <strong>the</strong> computer pioneers, nor could its dramatic consequences havebeen anticipated. The power and speed of all-transistor computers roseto a po<strong>in</strong>t where <strong>the</strong>y were quantitatively different from anyth<strong>in</strong>g that<strong>the</strong> early computer pioneers could have contemplated.Computer memories became larger, mov<strong>in</strong>g from a few hundred orthousands of bits of <strong>the</strong> earliest devices to hundreds of thousands, millions,tens of millions and eventually billions of words. These massivememories, now available for low cost personal computers, began to takeon new and unexpected roles. Instead of just be<strong>in</strong>g heavy-duty calculators,<strong>the</strong>y suddenly became <strong>in</strong>formation handlers as well offer<strong>in</strong>g hugeand progressively cheaper repositories for masses of <strong>in</strong>formation. Asmemory space cont<strong>in</strong>ued to multiply, memory banks became lighter andsmaller, <strong>the</strong>ir process<strong>in</strong>g speeds <strong>in</strong>creased and costs cont<strong>in</strong>ued to drop.The first components of <strong>the</strong> earliest computers were large andmechanical. Then came electro-magnetic relays, which were a little©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and Nanotechnologysmaller, after which came tubes which were somewhat larger.The arrival of <strong>the</strong> transistor produced a sensational reduction <strong>in</strong>size. The transistor itself is a spot of semi-conduct<strong>in</strong>g material. Thismaterial is not as good a conductor as metal, but it is better than an<strong>in</strong>sulator like plastic or rubber.When it conta<strong>in</strong>s certa<strong>in</strong> impurities <strong>in</strong> its structure, this semiconductorcan act as an amplifier and switch<strong>in</strong>g device. These impuritiescan be very small.The first transistors that were manufactured had an <strong>in</strong>itial size ofabout one cubic centimeter. Several levels of m<strong>in</strong>iaturization werequickly achieved.Transistors were <strong>the</strong>n comb<strong>in</strong>ed <strong>in</strong>to logic units. These electroniccircuits consists of 20 to 100 components arranged as sets of logic gatesfor AND, OR and NOT functions. They were built on a chip of siliconabout a centimeter square. These chips have grown to where <strong>the</strong>y arenow <strong>the</strong> heart of just about every electronic device <strong>in</strong>clud<strong>in</strong>g watchesand <strong>the</strong> largest computers.M<strong>in</strong>iaturization did not stop when it came to etch<strong>in</strong>g completecircuits on a chip. Us<strong>in</strong>g techniques known as large-scale <strong>in</strong>tegration(LSI), hundreds, thousands and even millions of <strong>in</strong>dividual units wereamassed on one chip of semi-conductor material.Still <strong>the</strong> process of m<strong>in</strong>iaturization cont<strong>in</strong>ues <strong>in</strong>to <strong>the</strong> future. Thebuild<strong>in</strong>g units of computers are gett<strong>in</strong>g smaller and smaller, shr<strong>in</strong>k<strong>in</strong>g<strong>in</strong>to <strong>the</strong> <strong>in</strong>f<strong>in</strong>ities of <strong>the</strong> molecular world.Computer ApplicationsThe outcome of <strong>the</strong>se reductions <strong>in</strong> cost and size, and <strong>the</strong> huge<strong>in</strong>creases <strong>in</strong> memory capacity and reliability, allow comput<strong>in</strong>g circuits tobe widely used <strong>in</strong> areas which would have been <strong>in</strong>conceivable before <strong>the</strong>advent of microprocessors. Many areas of special-purpose comput<strong>in</strong>gwhich have been available at high cost and with only marg<strong>in</strong>al reliability<strong>in</strong> <strong>the</strong> past have also become cheaply available.Computers have <strong>the</strong> capacity to read and store text, graphics andeven human ret<strong>in</strong>a signatures and f<strong>in</strong>gerpr<strong>in</strong>ts. They can also recognize<strong>the</strong> human voice and understand spoken words and phrases. They alsohave <strong>the</strong> ability to communicate with <strong>the</strong> user by draw<strong>in</strong>g diagrams orpictures on CRT screens and also by <strong>the</strong> use of syn<strong>the</strong>tic speech and©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>music. The music, words and phrases are created by <strong>the</strong> computer.Computers also have <strong>the</strong> ability to recognize shapes. These developmentsare only <strong>the</strong> first striv<strong>in</strong>gs of computers to <strong>in</strong>teract <strong>in</strong> a dynamic,ra<strong>the</strong>r than a passive way with <strong>the</strong>ir environment. Once a computerhas <strong>the</strong> power to recognize a shape or pattern, it can be utilized<strong>in</strong> an emergency or fire control system which allows it to do someth<strong>in</strong>gto prevent <strong>in</strong>jury or harm to humans and facilities.Image recognition can take place with a robot scann<strong>in</strong>g camerawhich could recognize <strong>in</strong>truders or emergency situations and control amotorized device to rectify <strong>the</strong> problem. It might also be programmedto understand a few useful words such as start, go and stop spoken byany human voice.Computer EvolutionThe computer revolution rides on <strong>the</strong> cost-tails of successful products.There is always ano<strong>the</strong>r generation of devices capable of tackl<strong>in</strong>ga far wider range of tasks. The number-only keyboards and numberonlydisplays of early calculators were replaced by full alphabeticalhand-held personal computer devices.The ma<strong>in</strong> difficulty of m<strong>in</strong>uscule keyboards will be overcomewhen speech recognition systems shr<strong>in</strong>k down to <strong>the</strong> po<strong>in</strong>t where <strong>the</strong>ycan be built <strong>in</strong>to wristwatches and o<strong>the</strong>r small devices. Buttons as <strong>in</strong>putmechanisms <strong>the</strong>n become largely redundant. Calculations will be performedand telephone numbers and o<strong>the</strong>r data are entered <strong>in</strong>to <strong>the</strong>memory by spoken <strong>in</strong>structions.Computer voice output is also <strong>in</strong> an extremely rapid phase ofdevelopment and speech syn<strong>the</strong>sizers are dim<strong>in</strong>ish<strong>in</strong>g <strong>in</strong> size and cost.One of <strong>the</strong> first applications was a talk<strong>in</strong>g calculator, which not onlydisplayed <strong>the</strong> results of <strong>the</strong> calculation on its display but also offered<strong>the</strong>m aloud <strong>in</strong> a syn<strong>the</strong>sized voice.Instruments may speak <strong>the</strong>ir measurements and conta<strong>in</strong>ers maytell you how much <strong>the</strong>y have <strong>in</strong> <strong>the</strong>m. Talk<strong>in</strong>g altimeters and airspeed<strong>in</strong>dicators may be used <strong>in</strong> aviation. In <strong>the</strong> home <strong>the</strong>re will be speak<strong>in</strong>gbathroom scales, freezers that rem<strong>in</strong>d you to restock <strong>the</strong>m, ovens thattell you how <strong>the</strong> roast is do<strong>in</strong>g, doorbells that specify how many visitorsyou had and when <strong>the</strong>y came and <strong>the</strong>rmometers which advise you whatto wear before you get up. You can obta<strong>in</strong> electronic locks which openwhen you key <strong>in</strong> <strong>the</strong> appropriate comb<strong>in</strong>ation and o<strong>the</strong>rs that hold <strong>the</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and Nanotechnologycomb<strong>in</strong>ation on a plastic card.In <strong>the</strong> automobile <strong>in</strong>dustry, cars use computer-controlled fuel <strong>in</strong>jectionwhich is extremely efficient and speedometers can compute youraverage speed and rema<strong>in</strong><strong>in</strong>g fuel and tell you <strong>in</strong> syn<strong>the</strong>tic speech whengas is low. Headlights can come on automatically when <strong>the</strong> ambientlight falls below a certa<strong>in</strong> level. Ano<strong>the</strong>r use of comput<strong>in</strong>g is to calculate<strong>the</strong> speed of <strong>the</strong> car travel<strong>in</strong>g <strong>in</strong> front and specify if <strong>the</strong> two vehicles arebe<strong>in</strong>g driven at a safe distance.Shr<strong>in</strong>k<strong>in</strong>g DevicesIt still rema<strong>in</strong>s a question how small actual devices can be made.Exist<strong>in</strong>g systems can be extrapolated to <strong>the</strong> 50 to 100 nanometer region.As you start gett<strong>in</strong>g wires, transistors and o<strong>the</strong>r components closer toge<strong>the</strong>r,<strong>the</strong>y start to talk to one ano<strong>the</strong>r, and this crosstalk becomes aserious problem. The properties of <strong>the</strong> basic materials used (doped silicon)also become hard to control.It has seen from microelectronics that if you can make th<strong>in</strong>gssmaller, <strong>the</strong>re will be many applications for <strong>the</strong>m. There is a need tomake th<strong>in</strong>gs small so <strong>the</strong>y can be fast and cheap and portable and notpower consum<strong>in</strong>g.Photolithography that uses ultraviolet light to etch out patterns onsilicon chips is <strong>the</strong> dom<strong>in</strong>ant technology <strong>in</strong> mak<strong>in</strong>g microelectronics on<strong>the</strong> micrometer scale. Photolithography is gett<strong>in</strong>g more complex andcostly. The fabrication facilities for mak<strong>in</strong>g semiconductor chips that arebe<strong>in</strong>g planned now for <strong>the</strong> years past 2000, are estimated to be $3 billionto $10 billion. This means, that for a reasonable return on <strong>in</strong>vestment, agreater number of devices have to be sold every year for <strong>the</strong> few yearsthat this facility is <strong>the</strong> state of <strong>the</strong> art.Photolithography has been successful and <strong>the</strong>re is every reason toth<strong>in</strong>k this will cont<strong>in</strong>ue for a while. It is hard to go below 100 nanometers,and you cannot build 3-D th<strong>in</strong>gs yet. It does not work for many materialso<strong>the</strong>r than silicon. One of <strong>the</strong> alternatives is electron beams. An exampleof this is Scalpel which is a system developed at Lucent Technologies’ BellLabs that uses electron beams to pattern silicon wafers.Ano<strong>the</strong>r alternative is X-ray lithography. This process uses X-rays topattern wafers. Both of <strong>the</strong>se have technical problems which will beworked out, but <strong>the</strong>y may not be cheap enough <strong>in</strong> <strong>the</strong> end. <strong>New</strong>er technologies,such as lithography, use neutral atoms or ion beams.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>NanotechnologyShr<strong>in</strong>k<strong>in</strong>g microelectronics smaller and smaller <strong>in</strong>to <strong>the</strong> nanometerregion is called nanotechnology. This technology can be used for mechanicaltypes of applications. One application could be very smallmach<strong>in</strong>es that move around <strong>in</strong> <strong>the</strong> bloodstream. This would be similarto <strong>the</strong> flagellar motor <strong>in</strong> bacteria. One of <strong>the</strong> problems <strong>in</strong> this type ofmach<strong>in</strong>e is power. Ano<strong>the</strong>r example is sensors. Human sensors like <strong>the</strong>ret<strong>in</strong>a and <strong>the</strong> nose use molecules that are nanoscale sensors.In <strong>the</strong> future, nanotechnology may change manufactur<strong>in</strong>g as wellas o<strong>the</strong>r areas. Micron-scale technology may cost less than newspr<strong>in</strong>t.Instead of a newspaper, you might buy a sheet of paper. One side of itis a battery and <strong>the</strong> o<strong>the</strong>r side is a display. You can read it, scroll to f<strong>in</strong>dreferences, see animated illustrations and when you are done, throw itaway. In about 10 years micron-scale electronics with new technologiesmay be used <strong>in</strong> toys, grocery labels, shipp<strong>in</strong>g labels, and credit/IDcards.Modern technology heats up silicon, saws it <strong>in</strong>to slices and makespatterns on its surface us<strong>in</strong>g stencils and light. This produces <strong>the</strong> electronicchips of microelectronic technology. It has moved mach<strong>in</strong>es aspowerful as <strong>the</strong> room-sized computers of <strong>the</strong> early 1950s <strong>in</strong>to pocketsizedcomputers. The <strong>in</strong>dividual components are 1/10th <strong>the</strong> width of af<strong>in</strong>e hair.The new technology will handle <strong>in</strong>dividual atoms and moleculeswith precision and is sometimes called molecular nanotechnology. Theterms nanotechnology and molecular technology are also used <strong>in</strong>terchangeablyto describe this new type of technology.Microcircuits have parts measured <strong>in</strong> micrometers (millionths of ameter) but molecules are measured <strong>in</strong> nanometers, which are a thousandtimes smaller. The new technology will build both nanocircuits andnanomach<strong>in</strong>es.Molecular NanotechnologyEarly <strong>in</strong> <strong>the</strong> 21st century, we may have submicroscopic, self-replicat<strong>in</strong>grobots. Molecular nanotechnology could let us manufacture anyth<strong>in</strong>gwith atomic precision. Ten nanometers is 1,000 times smaller than<strong>the</strong> diameter of a strand of human hair.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and NanotechnologyIn a computer, data are organized <strong>in</strong>to comb<strong>in</strong>ations of bits, so <strong>the</strong>ycan be easily reproduced and distributed. With matter, <strong>the</strong> build<strong>in</strong>gblocks are atoms and <strong>the</strong> comb<strong>in</strong>ations of atoms that make up molecules.Nanotechnology allows you to manipulate those atoms and molecules,mak<strong>in</strong>g it possible to manufacture, replicate, and distribute anysubstance as easily and cheaply as you can replicate data on a computer.Any k<strong>in</strong>d of material, from metal and wood to food and DNA could bereplicated. This would be done with an assembler, a few-atoms-largenanomach<strong>in</strong>e that could custom build matter.The key to manufactur<strong>in</strong>g with assemblers is self replication. If<strong>the</strong>se assemblers could replicate <strong>the</strong>mselves, <strong>the</strong>re could be thousandsor even millions of assemblers manufactur<strong>in</strong>g <strong>in</strong> unison and manufactur<strong>in</strong>gprocesses would be transformed.Cornell, Stanford and Zyvex (<strong>the</strong> first molecular nanotechnologydevelopment company) have been work<strong>in</strong>g on such assemblers. Estimatesof completion vary from 5 to 15 years. The first products could besuperstrong nanoscale build<strong>in</strong>g materials, such as <strong>the</strong> Buckytubes envisionedat Rice University. Buckytubes are made from geodesic domeshapedcarbon molecules called Buckyballs, after Buckm<strong>in</strong>ster Fuller, <strong>the</strong><strong>in</strong>ventor of <strong>the</strong> geodesic dome. These tubes are basically nanometersizedgraphite fibers, with a strength of 100 to 150 times that of steel atless than 1/4th <strong>the</strong> weight.Molecular Mach<strong>in</strong>esMolecular mach<strong>in</strong>es will use molecular bonds that will be brokenand reformed. Copper holds its shape because its atoms stick toge<strong>the</strong>r <strong>in</strong>regular patterns. It can be bent and hammered because its atoms can slipover one ano<strong>the</strong>r while rema<strong>in</strong><strong>in</strong>g bound toge<strong>the</strong>r. Glass shatters whenit is hammered because its atoms separate before <strong>the</strong>y slip. More complexpatterns make up <strong>the</strong> active nanomach<strong>in</strong>es of liv<strong>in</strong>g cells.Biochemists already work with <strong>the</strong>se mach<strong>in</strong>es, which are chieflymade of prote<strong>in</strong>, <strong>the</strong> ma<strong>in</strong> eng<strong>in</strong>eer<strong>in</strong>g material of liv<strong>in</strong>g cells. Prote<strong>in</strong>mach<strong>in</strong>es are unusually flexible.In modern gene syn<strong>the</strong>sis mach<strong>in</strong>es, genetic eng<strong>in</strong>eers build orderlypolymers (DNA molecules) by comb<strong>in</strong><strong>in</strong>g molecules <strong>in</strong> a particularorder. These molecules are nucleotides or compounds of DNA. The©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>mach<strong>in</strong>e adds nucleotides <strong>in</strong> a particular sequence. It bonds one type ofnucleotide to <strong>the</strong> cha<strong>in</strong> ends, <strong>the</strong>n washes away <strong>the</strong> leftover materialand adds chemicals to prepare <strong>the</strong> cha<strong>in</strong> ends to bond <strong>the</strong> next nucleotide.The cha<strong>in</strong>s bond on <strong>the</strong> nucleotides <strong>in</strong> a programmed sequence.Prote<strong>in</strong> Mach<strong>in</strong>esMolecular mach<strong>in</strong>es are found <strong>in</strong> bacteria. They are also known asprote<strong>in</strong> mach<strong>in</strong>es. Some function as restriction enzymes. These read <strong>the</strong>DNA sequences, by stick<strong>in</strong>g to <strong>the</strong>m and cut <strong>the</strong> cha<strong>in</strong> by rearrang<strong>in</strong>gatoms. O<strong>the</strong>r enzymes splice cha<strong>in</strong>s toge<strong>the</strong>r. The enzymes are usedtoge<strong>the</strong>r to write and edit DNA patterns.These DNA patterns can be used to build prote<strong>in</strong>s. The prote<strong>in</strong>molecules can fold up to form small objects. Prote<strong>in</strong>s range from humangrowth hormones to enzymes used <strong>in</strong> mak<strong>in</strong>g cheese.Programmable prote<strong>in</strong> mach<strong>in</strong>es will take a large molecule (<strong>the</strong>workpiece) and br<strong>in</strong>g a smaller molecule up aga<strong>in</strong>st it <strong>in</strong> <strong>the</strong> right place.It will <strong>the</strong>n bond <strong>the</strong> molecules toge<strong>the</strong>r. By bond<strong>in</strong>g molecule aftermolecule to <strong>the</strong> workpiece, <strong>the</strong> mach<strong>in</strong>e will assemble a larger andlarger structure while controll<strong>in</strong>g how its atoms are arranged. Theseprote<strong>in</strong> mach<strong>in</strong>es will build small, solid objects of metal, ceramic, ordiamond which are <strong>in</strong>visibly small, but extremely strong.Some prote<strong>in</strong>s can form basic mechanical structures like struts andparts of o<strong>the</strong>r molecules make excellent bear<strong>in</strong>gs. Amoebas and humancells move and change shape by us<strong>in</strong>g fibers and rods that act as molecularmuscles and bones. Prote<strong>in</strong> molecules will be used as motors,bear<strong>in</strong>gs, and mov<strong>in</strong>g parts to build robot arms which will <strong>the</strong>mselvesbe able to handle <strong>in</strong>dividual molecules. T<strong>in</strong>y motors and pumps may bemade that would fit through <strong>the</strong> f<strong>in</strong>est capillaries.Molecular ComputersThe Naval Research Laboratory, IBM and Genex Corporation haveconducted experiments for develop<strong>in</strong>g molecular switches, memorydevices and o<strong>the</strong>r structures that could be used <strong>in</strong> a prote<strong>in</strong>-based computer.Japan has been develop<strong>in</strong>g self-assembl<strong>in</strong>g molecular motors andcomputers.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and NanotechnologyBio-chips are ano<strong>the</strong>r term for molecular electronic systems. NEC,Hitachi, Toshiba, Matsushite, Fujitsu, Sanyo-Denki and Sharp havestarted research efforts on bio-chips for bio-computers.Molecular computers will control molecular assemblers, provid<strong>in</strong>g<strong>the</strong> flow of <strong>in</strong>structions needed to place large numbers of atoms.Nanocomputers with molecular memory devices can also store datagenerated by a process that is <strong>the</strong> opposite of assembly.Assemblers will be used to shr<strong>in</strong>k <strong>the</strong> size and cost of computercircuits. In today’s bulk technology, <strong>the</strong> patterns on silicon chips rema<strong>in</strong>flat and molecular-scale flaws are unavoidable. Assemblers allow circuitsto be built <strong>in</strong> three dimensions with atomic precision.The fastest computers will use electronic effects, but <strong>the</strong> smallestmay not. With components a few atoms wide, a simple mechanical computercould be 1/100 of a cubic micron. This is billions of times morecompact than today’s microelectronics. Even with a billion bytes of storage,a nanomechanical computer would fit <strong>in</strong> a cube a micron wide,which is about <strong>the</strong> size of a bacterium or s<strong>in</strong>gle bacteria. It would be fast.Although <strong>the</strong> mechanical operations will be about 100,000 times slowerthan electrical signals, <strong>the</strong>y need to travel only 1/1,000,000 as far and<strong>the</strong>re will be less delay. This results <strong>in</strong> a mechanical computer that worksfaster than most of today’s electronic units.Universal AssemblersSecond-generation nanomach<strong>in</strong>es will use enzymes. Thesenanomach<strong>in</strong>es will function as assemblers. Enzymes assemble largemolecules by grabb<strong>in</strong>g small molecules from <strong>the</strong> water around <strong>the</strong>m andhold <strong>the</strong>m toge<strong>the</strong>r so that a bond forms. Enzymes can assemble essentially<strong>the</strong> whole range of molecules found <strong>in</strong> liv<strong>in</strong>g th<strong>in</strong>gs.An enzyme-like mach<strong>in</strong>e could add carbon atoms to a small area,layer on layer. If bonded correctly, <strong>the</strong> atoms will form a f<strong>in</strong>e, flexiblediamond fiber hav<strong>in</strong>g more than fifty times as much strength as <strong>the</strong>same weight of alum<strong>in</strong>um.DNA copy<strong>in</strong>g mach<strong>in</strong>es make less than one error <strong>in</strong>100,000,000,000 operations. This is done with DNA enzymes that proofread<strong>the</strong> copy and correct errors. Assemblers could use similar errorcheck<strong>in</strong>gand error-correct<strong>in</strong>g schemes. The future will br<strong>in</strong>g many improvementson biological evolution, and nanomach<strong>in</strong>es will be but one.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Advanced assemblers will be able to do more than exist<strong>in</strong>g prote<strong>in</strong>mach<strong>in</strong>es. They will be programmable like ribosomes, but <strong>the</strong>y will beable to use a wider range of tools. They will be made of materials thatare stronger and more stable than prote<strong>in</strong>s. They will be able to rotateand move molecules <strong>in</strong> three dimensions under programmed control,mak<strong>in</strong>g possible <strong>the</strong> precise assembly of complex objects.DisassemblersMolecular tools will be able to take anyth<strong>in</strong>g apart, a few atoms ata time. A nanomach<strong>in</strong>e could also apply mechanical force, pry<strong>in</strong>ggroups of atoms free. A nanomach<strong>in</strong>e that is able to do this, while record<strong>in</strong>gwhat it removes layer by layer, is a disassembler.Assemblers can be used to syn<strong>the</strong>size th<strong>in</strong>gs while disassemblerscan help to analyze th<strong>in</strong>gs. Assemblers require <strong>the</strong> ability of enzymesand chemical reactions to form bonds and of mach<strong>in</strong>es to control <strong>the</strong>process.Disassemblers require <strong>the</strong> ability of enzymes and chemical reactionsto break bonds and of mach<strong>in</strong>es to control <strong>the</strong> process. Enzymes,acids, oxidizers, alkali metals, ions, and reactive groups of atoms calledfree radicals can break bonds and remove groups of atoms.Future NanotechnologyAs nanotechnology moves beyond prote<strong>in</strong>s, molecules will be assembledlike components. Molecular tools will bond molecules toge<strong>the</strong>rto make t<strong>in</strong>y gears, motors, levers, and cas<strong>in</strong>gs, and assemble <strong>the</strong>m tomake complex mach<strong>in</strong>es.One type of virus acts like a spr<strong>in</strong>g-loaded syr<strong>in</strong>ge and can <strong>in</strong>jectviral DNA. This DNA <strong>the</strong>n directs <strong>the</strong> cell’s mach<strong>in</strong>es to build more viralDNA and syr<strong>in</strong>ges.Parts conta<strong>in</strong><strong>in</strong>g only a few atoms will be lumpy, but <strong>the</strong>y canwork if <strong>the</strong>y have smooth bear<strong>in</strong>gs to support <strong>the</strong>m. Some bonds betweenatoms make excellent bear<strong>in</strong>gs. A part can be mounted by meansof a s<strong>in</strong>gle chemical bond that will let it turn freely and smoothly. Abear<strong>in</strong>g can be made us<strong>in</strong>g only two atoms and mov<strong>in</strong>g parts need haveonly a few atoms.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and NanotechnologyAssemblers, disassemblers, and nanocomputers will work toge<strong>the</strong>r.A nanomach<strong>in</strong>e will be able to direct <strong>the</strong> disassembly of an object,record its structure, and <strong>the</strong>n direct <strong>the</strong> assembly of perfect copies.Molecular mach<strong>in</strong>es would serve a range of basic functions and <strong>the</strong>parts serv<strong>in</strong>g <strong>the</strong>se basic functions may be comb<strong>in</strong>ed to build complexmach<strong>in</strong>es.In understand<strong>in</strong>g <strong>the</strong> future, we need to understand <strong>the</strong> consequencesof assemblers, disassemblers, and nanocomputers. They promiseto br<strong>in</strong>g changes as profound as <strong>the</strong> <strong>in</strong>dustrial and computer revolutions.Nanotechnology developments may sweep <strong>the</strong> world with<strong>in</strong> 10 to50 years.Assemblers may take years to emerge, but <strong>the</strong>ir emergence appearsto be almost <strong>in</strong>evitable. Although <strong>the</strong> path to assemblers has many steps,each step will br<strong>in</strong>g <strong>the</strong> next with<strong>in</strong> reach and each will br<strong>in</strong>g its rewards.The first steps have already been taken, under <strong>the</strong> names ofgenetic eng<strong>in</strong>eer<strong>in</strong>g and biotechnology. O<strong>the</strong>r paths to assemblers arepossible. Advances <strong>in</strong> computer-aided design will speed <strong>the</strong> developmentof molecular tools and <strong>the</strong> advance toward assemblers willquicken.These assemblers will be used <strong>in</strong> factory assembly l<strong>in</strong>es. They willtailor many products such as clo<strong>the</strong>s to personal specifications. Materials,from steel to cloth, will be built atom by atom, under <strong>the</strong> control ofnanocomputers.Huge leaps <strong>in</strong> medic<strong>in</strong>e will enable many people to live to 120, orolder. A scan of your genetic structure (with billions of bits of data <strong>in</strong> <strong>the</strong>estimated 80,000 genes <strong>in</strong> your body) will detect symptoms or susceptibilityto particular diseases. Replac<strong>in</strong>g diseased or worn-out body partswill be as rout<strong>in</strong>e as replac<strong>in</strong>g auto parts today. Most diseases will becured.Nanobots or m<strong>in</strong>uscule robots will deliver medication to affectedcells to prevent or treat disease. They will clear clogged arteries andrepair damaged tissue.You will have your vital signs tested by mach<strong>in</strong>es at <strong>the</strong> drugstoreand send <strong>the</strong> results to your doctor via <strong>the</strong> Internet for analysis. Implantedbiochips may also monitor your signs, alert<strong>in</strong>g you or yourdoctor to impend<strong>in</strong>g problems.A remote surgeon will do hip and o<strong>the</strong>r replacements at yourhome. The doctor will view <strong>the</strong> surgical area on a screen and remotelymanipulate surgical <strong>in</strong>struments <strong>in</strong>serted by a robot.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Neurons and ComputersWhen <strong>the</strong> first big computer attracted <strong>the</strong> attention of <strong>the</strong> popularpress <strong>in</strong> <strong>the</strong> early 1950s, <strong>the</strong>y were given <strong>the</strong> name of electronic bra<strong>in</strong>s.The human bra<strong>in</strong> is made up of m<strong>in</strong>ute switch<strong>in</strong>g units called neurons.There are about 10 billion of <strong>the</strong>se.In <strong>the</strong> early 1960s, with transistorization, 10 billion electronicswitches had shrunk to about <strong>the</strong> size of <strong>the</strong> Statue of Liberty, and a 10-kilowatt generator was needed for power. By <strong>the</strong> mid-1960s, <strong>in</strong>tegratedcircuits compressed this electronic bra<strong>in</strong> to <strong>the</strong> size of a Greyhound bus,and you could run it off a 220-volt outlet. By <strong>the</strong> mid-1970s it was <strong>the</strong>size of a TV set and <strong>the</strong> shr<strong>in</strong>k<strong>in</strong>g cont<strong>in</strong>ues so now it is a little biggerthan a credit card with most of <strong>the</strong> space taken up by <strong>the</strong> connections.In <strong>the</strong> future, <strong>the</strong> nerve cells of <strong>the</strong> human bra<strong>in</strong> may be l<strong>in</strong>ked tocomputer circuitry, creat<strong>in</strong>g a network that can <strong>in</strong>teract with similarnetworks, and with computers and o<strong>the</strong>r databases. The contents of <strong>the</strong>bra<strong>in</strong> could be scanned and downloaded <strong>in</strong>to an external database,where <strong>the</strong>y could be manipulated, stolen or even erased.Future TechnologyO<strong>the</strong>r possible developments may affect control technology. At <strong>the</strong>Context-Aware Laboratory at MIT, nontraditional <strong>in</strong>terfaces such asspeech and gesture recognition are be<strong>in</strong>g comb<strong>in</strong>ed with sensor dataand specialized software models to allow computers to determ<strong>in</strong>e whathumans are do<strong>in</strong>g and act accord<strong>in</strong>gly.In <strong>the</strong> future, devices will be prevalent but unseen. They will bebuilt-<strong>in</strong> or piped <strong>in</strong>to homes, as utilities are now. These labor-sav<strong>in</strong>gdevices will need no programm<strong>in</strong>g and batteries. Most householdequipment will respond to voice commands. In an emergency youwould give <strong>the</strong> command to get an ambulance and it would be done.Smart cupboards and refrigerators will automatically reorder foodthat runs out. Cloth<strong>in</strong>g and household l<strong>in</strong>ens will be made of smartfabrics that clean and press <strong>the</strong>mselves. Human wash<strong>in</strong>g mach<strong>in</strong>es willcycle you through soap<strong>in</strong>g, wash<strong>in</strong>g, r<strong>in</strong>s<strong>in</strong>g and dry<strong>in</strong>g.Robots may pick up after us and eventually housekeep<strong>in</strong>g will gobeyond robotics and computers towards <strong>in</strong>visibility.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and NanotechnologyPersonal RobotsThere are already robots that will vacuum your carpet with <strong>the</strong>sweep of a mouse and carry your dishes to <strong>the</strong> d<strong>in</strong><strong>in</strong>g room with <strong>the</strong>clap of your hands. The Cye Personal Robot is controlled by your PC tovacuum floors. Cye communicates with your PC us<strong>in</strong>g an FCC approved900-MHz radio l<strong>in</strong>k. You map your environment on <strong>the</strong> screen soCye knows <strong>the</strong> clear space and <strong>the</strong> obstacles.This robot is controlled graphically from a PC. The w<strong>in</strong>dow has arow of task types at <strong>the</strong> top, and you click and drag down <strong>in</strong>to a flowchart.Tasks <strong>in</strong>cludeGO TOWAIT UNTILSING NOTEREPEATCHECK POSITIONVACUUM PATCHThe robot’s radio pod is plugged <strong>in</strong>to a COM port on your PC.In <strong>the</strong> MIT Media Laboratory, <strong>the</strong>re is a talk<strong>in</strong>g trivet, or hot pad,that senses <strong>the</strong> temperature of dishes it holds and announces if <strong>the</strong>y areready or need rewarm<strong>in</strong>g.There is also a ceil<strong>in</strong>g that has been turned <strong>in</strong>to a display. Thisdisplay could be used to check plant and build<strong>in</strong>g conditions. Doorwayswill detect visitors as <strong>the</strong>y step onto a sensor-fitted mat and set appo<strong>in</strong>tments.All-purpose flat screens will diagnose <strong>the</strong> failure of <strong>in</strong>-house systemsand dial up real time images <strong>in</strong> all parts of <strong>the</strong> world for meet<strong>in</strong>gsand visits. Intelligent rooms will have walls that can see you with visionsensors, hear you by voice recognition systems and speak to you <strong>in</strong>response to your requests for heat<strong>in</strong>g and cool<strong>in</strong>g. Hologram meet<strong>in</strong>gs,where projected images of people <strong>in</strong> different locations are used, mayalso become common.Homes may evolve so <strong>the</strong>y are completely self conta<strong>in</strong>ed andmobile, so <strong>the</strong>y can be moved anywhere. Electronic wallpaper will letyou change <strong>the</strong> color or pattern of your walls on demand. Electronicimage spots will display art that you dial up. Keys, locks and bolts willbe replaced by voice commands to open doors and w<strong>in</strong>dows.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Vehicles of <strong>the</strong> future will be made of molded plastic and poweredby non-pollut<strong>in</strong>g fuels. O<strong>the</strong>r changes for motor vehicles <strong>in</strong>cludemagnetized tracks for <strong>the</strong> <strong>in</strong>terstates, which allow travel at bumper tobumper speeds of 200 m.p.h., with no real driv<strong>in</strong>g <strong>in</strong>volved. Dashboardcomputers will warn of accidents and delays and tell <strong>the</strong> locationof <strong>the</strong> nearest open park<strong>in</strong>g spot. On-board computers will monitor<strong>the</strong> work<strong>in</strong>gs of your auto and diagnose <strong>in</strong>cipient or actual failures,automatically <strong>in</strong>form<strong>in</strong>g <strong>the</strong> shop of spare parts you will need.Aircraft will take off vertically, reduc<strong>in</strong>g noise and <strong>the</strong> size ofairports. Orbit<strong>in</strong>g <strong>the</strong> earth will be <strong>the</strong> first space cruise open to tourists.You will rise from ground to satellite on a space elevator, soar<strong>in</strong>gup a te<strong>the</strong>red cable that generates its own energy. Orbit<strong>in</strong>g hotels willquickly follow.A two-planet <strong>in</strong>terplanetary Internet may be <strong>in</strong> operation withseveral satellites <strong>in</strong> orbit around Mars. There may be as many as 2billion users of <strong>the</strong> Internet and that many devices on <strong>the</strong> network aswell.Virtual reality and artificial <strong>in</strong>telligence will provide almost limitlessenterta<strong>in</strong>ment offer<strong>in</strong>gs. Seated <strong>in</strong> a special chair that senses ifyou are cold or uncomfortable and adapts itself, you will pull abubble screen around you. These computer/enterta<strong>in</strong>ment centers willprovide virtual-reality simulations for tra<strong>in</strong><strong>in</strong>g and enterta<strong>in</strong>ment.Connectivity TrendsA connectivity revolution is tak<strong>in</strong>g place of once <strong>in</strong>dependentsystems that are now connected. These evolv<strong>in</strong>g, <strong>in</strong>terdependent systemsprovide solutions that save money while solv<strong>in</strong>g problems. Anevolution of data delivery systems is tak<strong>in</strong>g place as offered by Internetor telephone suppliers.In <strong>the</strong> new world of connectivity, <strong>the</strong> technology must not onlydeliver <strong>the</strong> data, but also get <strong>the</strong>m to <strong>the</strong> right place, at <strong>the</strong> right timeand at <strong>the</strong> right price. The <strong>in</strong>formation superhighway and <strong>the</strong> connectivityrevolution are l<strong>in</strong>ked and have been evolv<strong>in</strong>g for about 15years. Product life cycles were more simple <strong>the</strong>n. A system might bedesigned <strong>in</strong> 2 years and manufactured for 5. Proprietary designs allowsystem modifications to rema<strong>in</strong> <strong>in</strong> <strong>the</strong> with <strong>the</strong> manufacturer.These self-conta<strong>in</strong>ed systems were closed boxes. They are now forced©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and Nanotechnologyto communicate with outside systems. These systems must also accommodatea variety of connectivity standards that are evolv<strong>in</strong>g:• IEEE 1394 for consumer electronics,• IRBus for remote controls,• IEEE 1451 for smart sensors and• Universal Serial Bus (USB) or Device Bay for personal computers.Connectivity is <strong>the</strong> key to <strong>the</strong> convergence of computer andcommunications electronics. It is also <strong>the</strong> key enabl<strong>in</strong>g technology <strong>in</strong>safety or security applications found <strong>in</strong> build<strong>in</strong>gs. The connectivityrevolution br<strong>in</strong>gs vast new options and new opportunities <strong>in</strong>clud<strong>in</strong>g apersonal computer controll<strong>in</strong>g <strong>HVAC</strong> equipment or an Internet remotemonitor. Connectivity will change forever <strong>the</strong> way we view systemapplications. Open system connectivity, user flexibility and selfconfiguration<strong>in</strong> a more complex environment are becom<strong>in</strong>g <strong>the</strong> pathto <strong>the</strong> future. This means Internet access for remote control of lightsand heat that allow <strong>the</strong> temperature to be right when you get to youroffice or home.Historical systems for damper control might <strong>in</strong>clude a remotemotor controller, motor and mechanical lever arm. Today’s designmight <strong>in</strong>clude air flow or pressure sensors and perhaps current sens<strong>in</strong>g<strong>in</strong> <strong>the</strong> motor.Security systems now typically use encryption and roll<strong>in</strong>g codesfor au<strong>the</strong>ntication. The security system may even sound an alarm ifhackers try random codes to break <strong>in</strong>. There are many different technologiesand possible ways to wire <strong>the</strong> system.Wireless Security SystemsWireless security systems are be<strong>in</strong>g used for build<strong>in</strong>g management.The Town Center at Boca Raton, Florida, upgraded its security systems by<strong>in</strong>stall<strong>in</strong>g a 900-MHz Frequency Agile FA system from Inovonics. The costof hardwire systems was almost three times more expensive.The mall’s common-area doors were equipped with magnetic contactsand glass-break detectors. When a contact trips or door glass breaks,a transmitter sends out a signal over <strong>the</strong> 902- to 928-MHz <strong>in</strong>dustrial-scientific-medical(ISM) frequency band to a receiver at an off-site securitycompany. The same alarm is transmitted over <strong>the</strong> security staff’s radio©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>system identify<strong>in</strong>g <strong>the</strong> location and number of <strong>the</strong> door be<strong>in</strong>g tamperedwith. The alarm also sets off a siren and strobe light at <strong>the</strong> door. When adoor alarm is tripped, security personnel can get to <strong>the</strong> exact location ofan alarm <strong>in</strong> approximately one m<strong>in</strong>ute.The 900-MHz system <strong>in</strong>cludes transmitters, repeaters, and receivers.It uses frequency hopp<strong>in</strong>g, spread-spectrum (FHSS) technologyto transmit messages. When a door alarm is tripped, <strong>the</strong> transmitterssend <strong>the</strong> alarm signal 24 times on 24 different frequencies <strong>in</strong> a10-MHz band. By spread<strong>in</strong>g <strong>the</strong> <strong>in</strong>formation across <strong>the</strong> 10-MHz band,<strong>the</strong> system can share spectrum with o<strong>the</strong>r systems without experienc<strong>in</strong>g<strong>in</strong>terference problems.A 64-channel receiver with 16 outputs is used. It can handle <strong>in</strong>formationfrom up to 64 transmitters and can zone received signals<strong>in</strong>to 16 <strong>in</strong>puts.Coverage of <strong>the</strong> 1.3-million-square-foot facility is accomplishedby us<strong>in</strong>g 18 repeaters <strong>in</strong> <strong>the</strong> system. Metal structures as well as neonand fluorescent lights can cause RF noise and cancel some of <strong>the</strong>transmissions between <strong>the</strong> transmitters and receivers/repeaters. Thisproblem was cured by reposition<strong>in</strong>g <strong>the</strong> receivers and repeaters.Wireless Monitor<strong>in</strong>gWireless technology has also experienced rapid growth <strong>in</strong> remotemonitor<strong>in</strong>g, mak<strong>in</strong>g it easier to remotely monitor wells, tanks,pumps and oil and gas l<strong>in</strong>es. Mounta<strong>in</strong> Water Company of Missoula,MT, is one example. Mounta<strong>in</strong> Water provides <strong>the</strong> water-distributionsystem for approximately 50,000 people. There are 26 remote wells,tanks, and booster stations over an area of 100 square miles.Mounta<strong>in</strong> Water uses a supervisory-control and data-acquisitionsystem (SCADA) system to control pump levels and tank levels, turnpumps on and off, switch pumps from automatic to manual, evaluatepressure and flow data, and analyze chlor<strong>in</strong>e levels. Wireless technologybeat out wired approaches on two fronts. Many of <strong>the</strong> remotesites do not have access to wired communications and <strong>the</strong>se remotecables tend to be cut.Traditionally, SCADA applications have been constra<strong>in</strong>ed tovery-small-aperture-term<strong>in</strong>al (VSAT) satellite communications systems.With VSATs, <strong>the</strong>re are large <strong>in</strong>itial equipment costs as well as©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and Nanotechnologymonthly fees for us<strong>in</strong>g <strong>the</strong> satellite network. The wireless modem systemputs all of <strong>the</strong> cost up front. Once <strong>the</strong> modem is <strong>in</strong>stalled, youown <strong>the</strong> radio network.Mounta<strong>in</strong> Water <strong>in</strong>stalled EST’s ESTeem model 95 modem whichoperates <strong>in</strong> <strong>the</strong> 72- to 73- or 75- to 765-MHz very high frequency(VHF) bands. It uses 9600-b/s RF data rate and a 20-kHz channelspac<strong>in</strong>g.A peer-to-peer configuration is used where <strong>the</strong> modem alsofunctions as a repeater. Any station that can hear a transmission receives<strong>the</strong> transmission. If this signal has <strong>the</strong> modem’s address, itprocesses <strong>the</strong> signal. If <strong>the</strong>re is a repeat str<strong>in</strong>g attached, <strong>the</strong> modempasses it off along <strong>the</strong> system to <strong>the</strong> next modem. There is no needfor stand-alone repeaters.Evolv<strong>in</strong>g ConnectivityFor about 15 years, <strong>the</strong> typical mouse for a personal computerwas connected to <strong>the</strong> computer serial port and communicated oneway. The mouse measured signals from an opto-coupler, made a fewcalculations to smooth <strong>the</strong> motion, and sent three bytes of data over<strong>the</strong> l<strong>in</strong>e. A microcontroller was <strong>in</strong>tegrated <strong>in</strong>to <strong>the</strong> mouse design toallow communications via software.Under <strong>the</strong> Universal Serial Bus (USB) <strong>the</strong> mouse is classified asa Human Interface Device (HID) and must conform to a unified commandset for software configuration and control. This communicationis bidirectional. There must be a response to commands or <strong>the</strong> mousebecomes disabled.The mouse identifies itself with a unique identification code soit can accommodate multiple po<strong>in</strong>t devices connected to a s<strong>in</strong>gle system.The mouse should also support error detection and recovery for<strong>the</strong> reliable delivery of data. This fully connected protocol requiresthat <strong>the</strong> software be able to handle up to 35 errors between <strong>the</strong>mouse and <strong>the</strong> host driver software.System connectivity requires <strong>the</strong> ability to automatically configure<strong>the</strong> system for <strong>the</strong> user. If boxes are added or removed, <strong>the</strong> systemmust reconfigure itself without los<strong>in</strong>g data dur<strong>in</strong>g operation.The local device control must be accurately ma<strong>in</strong>ta<strong>in</strong>ed while itresponds to <strong>the</strong> network. Error detection and correction on <strong>the</strong> net-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>work become mandatory to ensure reliable data delivery.The <strong>HVAC</strong> control system is required to generate closed-loopcontrol and deal with network demands. One solution is to add asecond processor dedicated to <strong>the</strong> network <strong>in</strong>terface. This <strong>in</strong>terfacemust be def<strong>in</strong>ed carefully to avoid limit<strong>in</strong>g <strong>the</strong> data flow through <strong>the</strong>system. Limited data flow means <strong>the</strong> control is compromised.Traditional controllers are light on performance. While this mayhave worked f<strong>in</strong>e for simple designs, <strong>the</strong> network <strong>in</strong>terface-connectivitychanges everyth<strong>in</strong>g. Good logical computational eng<strong>in</strong>es for <strong>the</strong>f<strong>in</strong>ite state mach<strong>in</strong>es used <strong>in</strong> most network protocols and numericcapability are needed for closed-loop control calculations.Reconfigurable Computers<strong>New</strong> techniques are emerg<strong>in</strong>g from <strong>the</strong> study of reconfigurablecomput<strong>in</strong>g which was orig<strong>in</strong>ally proposed <strong>in</strong> <strong>the</strong> late 1960s at UCLA.Reconfigurable comput<strong>in</strong>g had been delayed by a lack ofreconfigurable hardware. Reprogrammable logic chips like field programmablegate arrays (FPGAs) have been available for years, but<strong>the</strong>se chips have only recently reached gate densities that make <strong>the</strong>msuitable for more complex applications. FPGAs now have severalhundred thousand reprogrammable logic gates with an anticipateddoubl<strong>in</strong>g of gate densities every 18 months.TSI TelSys are us<strong>in</strong>g reconfigurable comput<strong>in</strong>g technologies <strong>in</strong>ground-station equipment for satellite communications. This application<strong>in</strong>volves high-rate communications, signal process<strong>in</strong>g, and a varietyof network protocols and data formats.The hardware has a great deal of functional flexibility s<strong>in</strong>ce <strong>the</strong>logic <strong>in</strong> <strong>the</strong> FPGA can be changed when necessary. This allows hardwarebug fixes and upgrades to be adm<strong>in</strong>istered as freely as software.In order to support a new version of a network protocol, youredesign <strong>the</strong> <strong>in</strong>ternal logic of <strong>the</strong> FPGA. Reconfigurable comput<strong>in</strong>galso allows manipulation of <strong>the</strong> logic <strong>in</strong> <strong>the</strong> FPGA at run-time. TheFPGA acts as an execution eng<strong>in</strong>e for <strong>the</strong> different hardware functions.Some are execut<strong>in</strong>g <strong>in</strong> parallel and o<strong>the</strong>rs <strong>in</strong> serial fashion. TheFPGA functions as a reconfigurable process<strong>in</strong>g unit (RPU).Reconfigurable comput<strong>in</strong>g allows <strong>the</strong> system to execute morehardware than <strong>the</strong>re are gates for. This works when <strong>the</strong>re are parts of©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and Nanotechnology<strong>the</strong> hardware that are occasionally idle. One potential application issmart cellular phones that support multiple communication and dataprotocols, one at a time. As <strong>the</strong> phone passes from a geographic regionthat is served by one protocol <strong>in</strong>to a region that is served byano<strong>the</strong>r, <strong>the</strong> hardware is automatically reconfigured. This is <strong>the</strong>reconfigurable comput<strong>in</strong>g approach.Reconfigurable comput<strong>in</strong>g makes it feasible to achieve greaterfunctionality with simpler hardware. The cost of additional features isreduced to <strong>the</strong> cost of <strong>the</strong> memory required to store <strong>the</strong> logic needed.Reconfigurable comput<strong>in</strong>g has <strong>the</strong> ability to execute larger hardwaredesigns with fewer gates with <strong>the</strong> flexibility of a software-basedsolution and <strong>the</strong> execution speed of a more traditional, hardwarebasedapproach. Reconfigurable comput<strong>in</strong>g allows <strong>the</strong> addition ofnew features <strong>in</strong> <strong>the</strong> field and rapid implementation of new standardsand protocols on an as-needed basis.In <strong>the</strong> multiprotocol cellular phone, it is possible to support asmany protocols as can fit <strong>in</strong>to <strong>the</strong> available on-board memory. <strong>New</strong>protocols could even be uploaded from a base station to <strong>the</strong> handheldphone on an as-needed basis, requir<strong>in</strong>g no additional memory.S<strong>in</strong>ce systems based on reconfigurable comput<strong>in</strong>g areupgradable <strong>in</strong> <strong>the</strong> field, such changes extend <strong>the</strong> useful life of <strong>the</strong>system. Reconfigurable comput<strong>in</strong>g elim<strong>in</strong>ates a large amount of developmenteffort. The logic design rema<strong>in</strong>s flexible and allows an <strong>in</strong>crementaldesign flow.Reconfigurable HardwareTraditional FPGAs are configurable, but <strong>the</strong>y are not run-timereconfigurable. Older FPGAs read <strong>the</strong>ir configuration from a serialEEPROM, one bit at a time. This means that <strong>the</strong> FPGA must be reprogrammed<strong>in</strong> its entirety. This is compatible with configurable comput<strong>in</strong>gapplications, but it is not adequate for reconfigurable comput<strong>in</strong>g.In order to have run-time reconfiguration, <strong>the</strong> FPGAs need tohave on-<strong>the</strong>-fly reprogrammability. Partial reprogrammability is <strong>the</strong>ability to leave most of <strong>the</strong> <strong>in</strong>ternal logic <strong>in</strong> place and change just onepart. Atmel 40K and Xil<strong>in</strong>x 62xx series FPGAs have this feature. Anygate or set of gates may be changed without affect<strong>in</strong>g <strong>the</strong> state of <strong>the</strong>o<strong>the</strong>rs. An externally visible <strong>in</strong>ternal state means that it is possible to©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>capture that state and save it for later use. Xil<strong>in</strong>x 62xx series FPGAsuse a 32-bit data bus called <strong>the</strong> FastMAP processor <strong>in</strong>terface. It allows<strong>the</strong> <strong>in</strong>ternal state of <strong>the</strong> FPGA to be read and written like memoryand makes it possible to swap logic designs <strong>in</strong> much <strong>the</strong> same waythat pages of virtual memory are swapped <strong>in</strong>to and out of physicalmemory.Hardware ObjectsA hardware object is a functional or logical hardware componentthat conta<strong>in</strong>s its own configuration and state <strong>in</strong>formation. It is a pieceof logic that can be executed <strong>in</strong> an RPU. Hardware objects arerelocatable and can be executed from any position <strong>in</strong> <strong>the</strong> chip.These relocatable logic blocks have some constra<strong>in</strong>ts based on<strong>the</strong> hardware page size. Page sizes of 4 and 16 gates are used <strong>in</strong> <strong>the</strong>Xil<strong>in</strong>x 62xx series of FPGAs because of <strong>the</strong> rout<strong>in</strong>g resources at <strong>the</strong><strong>in</strong>tersections. This makes rout<strong>in</strong>g between hardware objects or a hardwareobject and its I/O p<strong>in</strong>s much easier. By standardiz<strong>in</strong>g <strong>the</strong> <strong>in</strong>terfacesof hardware objects, it is possible to ma<strong>in</strong>ta<strong>in</strong> libraries of frequentlyused objects and to quickly build larger designs from <strong>the</strong>sesmaller components.Hardware objects that <strong>in</strong>terface to <strong>the</strong> world outside <strong>the</strong> RPU doso through an abstraction. This abstraction is called a hardware objectframework which is a r<strong>in</strong>g of logic <strong>in</strong> <strong>the</strong> RPU that is physically locatedalong <strong>the</strong> outer edges. This provides a set of standard <strong>in</strong>terfacesto memory and peripheral devices outside of <strong>the</strong> RPU.In reconfigurable comput<strong>in</strong>g <strong>the</strong> software decides which hardwareobjects to execute and when to swap hardware objects <strong>in</strong>to andout of <strong>the</strong> reconfigurable logic. It also performs <strong>the</strong> rout<strong>in</strong>g betweenhardware objects or between hardware objects and <strong>the</strong> hardware objectframework.The software that does this is called <strong>the</strong> run-time environmentand is similar to <strong>the</strong> operat<strong>in</strong>g system that manages <strong>the</strong> execution ofmultiple tasks <strong>in</strong> personal computers. Hardware objects have prioritiesand it is <strong>the</strong> job of <strong>the</strong> run-time environment to organize this <strong>in</strong>formationand make decisions based upon it.The run-time environment is needed to make decisions while<strong>the</strong> system is runn<strong>in</strong>g. The <strong>in</strong>put data and <strong>the</strong> appropriate logic block©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>Control</strong> Technology, Microelectronics and Nanotechnologyare handed over to <strong>the</strong> run-time environment which executes <strong>the</strong> attachedhardware object.The run-time environment must first locate space with<strong>in</strong> <strong>the</strong>RPU that is large enough to execute <strong>the</strong> hardware object. It <strong>the</strong>n performs<strong>the</strong> necessary rout<strong>in</strong>g between <strong>the</strong> hardware object’s <strong>in</strong>puts andoutputs and <strong>the</strong> blocks of memory needed. Commercial run-time environmentsfor RPUs will emerge if reconfigurable comput<strong>in</strong>g becomespopular.The run-time environment can be thought of as a series of threelayers. The device abstraction layer is <strong>the</strong> lowest level and is analogousto <strong>the</strong> parts of an operat<strong>in</strong>g system that must be written <strong>in</strong> assemblylanguage because <strong>the</strong>y are processor-specific. The device abstractionlayer is concerned with <strong>the</strong> hardware page size and <strong>the</strong>rout<strong>in</strong>g resources that are available at <strong>the</strong> edge of each hardwarepage. The device abstraction layer also provides <strong>the</strong> read/write <strong>in</strong>terfacefor <strong>the</strong> layer above.The middle layer controls <strong>the</strong> placement and rout<strong>in</strong>g of hardwareobjects. It decides where each object will be physically locatedwith<strong>in</strong> <strong>the</strong> device and adds rout<strong>in</strong>g between hardware objects.The upper layer is called <strong>the</strong> object scheduler. It provides an applicationprogramm<strong>in</strong>g <strong>in</strong>terface (API) for <strong>the</strong> RPUs and is responsiblefor decid<strong>in</strong>g which hardware objects are currently runn<strong>in</strong>g. Thisdecision can be based on a schedul<strong>in</strong>g algorithm such as first-come,first-served.ReferencesBarr, Michael, “A Reconfigurable Comput<strong>in</strong>g Primer,” Multimedia SystemsDesign, Vol. 2 No. 9, September 1998, pp. 44-47.Buderi, Robert, “Sleep with a Computer,” Upside, Vol. 118 No. 1, February2000, p. 202.Crowley, Susan I., “Hello to our Future,” AARP Bullet<strong>in</strong>, Vol. 41 No.1, January 2000, pp. 3, 14-15, 20.Keenan, Robert, “Modem Monitors SCADA Systems,” Wireless SystemsDesigns, Vol. 2 No. 5, May 1997, p. 30.Keenan, Robert, “Wireless System Secures Shopp<strong>in</strong>g Malls,”WirelessSystems Design, Vol. 2 No. 4, April 1997, p. 30.Liptak, Bela A., Editor-<strong>in</strong>-chief, Instrument Eng<strong>in</strong>eers’ Handbook, 3rd©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Edition, Chilton Book Company: Radnor, PA, 1995.“The Connectivity Revolution,” Wireless Systems Design, Vol. 3 No. 9,September 1998, pp. 1-3.Redman, Jim, “Upgrades Enhance Capability,” Industrial Comput<strong>in</strong>g,Vol. 18 No. 5, April 1999, pp. 22-25.TigerDirect.com Catalog, Vol. X Issue 1, 2000, p. 107.Internet: www.home.cnet.com/specialreports/0-6014-7-818759.html,Neumann, Alicia and Krist<strong>in</strong>a Blachere, “Nanotechnology WillChange <strong>the</strong> World,” November 1999, pp. 1-2.Internet: www.foresight.org/EOC/EOC.Chapter_1.html, Ulmer, Kev<strong>in</strong>,“Eng<strong>in</strong>es of Creation,” November 1999, pp. 1-10.©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systems 131Chapter 4Advanced <strong>HVAC</strong> <strong>Control</strong>,Information TechnologyAnd Open SystemsClean rooms represent space areas that are used for test<strong>in</strong>g/analysis laboratories, <strong>in</strong> medical, military and electronic process<strong>in</strong>g<strong>in</strong>dustries. The optimization of clean room controls isan important area <strong>in</strong> <strong>the</strong> future of <strong>HVAC</strong> controls. Many of<strong>the</strong>se concepts will be f<strong>in</strong>d<strong>in</strong>g <strong>the</strong>ir way <strong>in</strong>to build<strong>in</strong>g automation.The production of semiconductors must take place <strong>in</strong> a clean roomenvironment. Optimization of <strong>the</strong> clean room control system can reduce<strong>the</strong> cost of operation and <strong>the</strong> number of product defects. In semiconductormanufactur<strong>in</strong>g, an area of 100,000 square feet (9290 square meters)can have a daily production worth of over $1 million.Semiconductor Manufactur<strong>in</strong>gThe overall semiconductor fabrication process consists of <strong>the</strong> pattern<strong>in</strong>gof a sequence of successive layers. The pattern<strong>in</strong>g steps aretransferred <strong>in</strong>to layers of <strong>the</strong> f<strong>in</strong>al system. The sequence of layers is usedto build up an <strong>in</strong>tegrated system.One process is <strong>the</strong> creation of a silicon dioxide <strong>in</strong>sulat<strong>in</strong>g layeron <strong>the</strong> surface of a silicon wafer and <strong>the</strong> selective removal of sectionsof <strong>the</strong> <strong>in</strong>sulat<strong>in</strong>g layer. This step beg<strong>in</strong>s with a bare polished siliconwafer. The wafer is exposed to oxygen <strong>in</strong> a high-temperature furnaceto grow a uniform layer of silicon dioxide on its surface. After <strong>the</strong>wafer is cooled, it is coated with a th<strong>in</strong> film of organic resist material.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The resist is dried and baked and <strong>the</strong> wafer is ready to beg<strong>in</strong> <strong>the</strong>pattern<strong>in</strong>g step.The pattern to be transferred to <strong>the</strong> wafer surface exists as a mask.The mask is a transparent support material coated with a th<strong>in</strong> layer ofopaque material. Certa<strong>in</strong> portions of <strong>the</strong> opaque material are removed,leav<strong>in</strong>g opaque material on <strong>the</strong> mask <strong>in</strong> <strong>the</strong> precise pattern required on<strong>the</strong> silicon surface.The mask, with <strong>the</strong> desired pattern engraved upon it, is broughtface down <strong>in</strong>to close proximity with <strong>the</strong> wafer surface. The dark areasof opaque material on <strong>the</strong> surface of <strong>the</strong> mask are <strong>the</strong> areas where it isdesired to leave silicon dioxide on <strong>the</strong> surface of <strong>the</strong> silicon. Open<strong>in</strong>gs<strong>in</strong> <strong>the</strong> mask correspond to areas where it is desired to remove silicondioxide from <strong>the</strong> silicon surface.The mask is laid on <strong>the</strong> wafer and its back surface is flooded withioniz<strong>in</strong>g radiation, such as ultraviolet light or low-energy X-rays. Theradiation is blocked <strong>in</strong> areas where <strong>the</strong> mask has opaque material on itssurface. Where <strong>the</strong>re is no opaque material on <strong>the</strong> mask surface, <strong>the</strong>ioniz<strong>in</strong>g radiation passes through <strong>in</strong>to <strong>the</strong> resist, <strong>the</strong> silicon dioxide, andsilicon.The ioniz<strong>in</strong>g radiation has little effect on <strong>the</strong> silicon dioxide andsilicon but it breaks down <strong>the</strong> molecular structure of <strong>the</strong> resist <strong>in</strong>tosmaller molecules. This step makes it possible to dissolve exposed resistmaterial <strong>in</strong> solvents that will not dissolve <strong>the</strong> unexposed resist material.The resist is developed by immers<strong>in</strong>g <strong>the</strong> silicon wafer <strong>in</strong> a solvent.The pattern orig<strong>in</strong>ally exist<strong>in</strong>g as a set of opaque geometries on <strong>the</strong>mask surface is transferred as a correspond<strong>in</strong>g pattern <strong>in</strong>to <strong>the</strong> resistmaterial on <strong>the</strong> surface of <strong>the</strong> silicon dioxide.The same pattern is transferred to <strong>the</strong> silicon dioxide by expos<strong>in</strong>g<strong>the</strong> wafer to a material that will etch silicon dioxide but will not attack<strong>the</strong> organic resist material or <strong>the</strong> silicon wafer surface. The etch<strong>in</strong>g stepis usually done with hydrofluoric acid, which dissolves silicon dioxide,but is <strong>in</strong>capable of etch<strong>in</strong>g <strong>the</strong> surface of silicon.The f<strong>in</strong>al step <strong>in</strong> pattern<strong>in</strong>g is removal of <strong>the</strong> rema<strong>in</strong><strong>in</strong>g organicresist material. The techniques used to remove resist materials <strong>in</strong>volveacids, such as chromic acid and atomic oxygen, to oxidize <strong>the</strong> organicmaterials. The pattern <strong>the</strong>n has been transferred <strong>in</strong>to <strong>the</strong> silicon dioxideon <strong>the</strong> wafer surface. A similar sequence of steps is used to selectivelypattern each of <strong>the</strong> layers. The steps differ <strong>in</strong> <strong>the</strong> types ofetchants used.©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open SystemsIntegrated Circuit FabricationA sequence of patterned layers is used to build NMOS <strong>in</strong>tegratedcircuits and systems. The fabrication of a basic <strong>in</strong>verter circuit takesplace <strong>in</strong> a system and all o<strong>the</strong>r circuits are simultaneously implementedby <strong>the</strong> same process.The first mask <strong>in</strong>cludes <strong>the</strong> sources and dra<strong>in</strong>s of all transistors <strong>in</strong><strong>the</strong> circuit, toge<strong>the</strong>r with <strong>the</strong> transistor gate areas and any circuit <strong>in</strong>terconnectionpaths. This mask is used for <strong>the</strong> first step <strong>in</strong> <strong>the</strong> process.The next step is to differentiate transistors that are normally on(depletion mode) from those that are normally off (enhancement mode).This is done by an overcoat of <strong>the</strong> wafer with resist material, expos<strong>in</strong>g<strong>the</strong> resist material through open<strong>in</strong>gs <strong>in</strong> ano<strong>the</strong>r mask, and develop<strong>in</strong>g it.The pattern leaves an open<strong>in</strong>g <strong>in</strong> <strong>the</strong> resist material over <strong>the</strong> area to beturned <strong>in</strong>to depletion mode transistors.The actual conversion of <strong>the</strong> underly<strong>in</strong>g silicon is done by implant<strong>in</strong>gions of arsenic or antimony <strong>in</strong>to <strong>the</strong> silicon surface. The resist materialacts to prevent <strong>the</strong> ions from reach<strong>in</strong>g <strong>the</strong> silicon surface. Ions areonly implanted <strong>in</strong> <strong>the</strong> silicon area free of resist which causes a slight n-type conductivity <strong>in</strong> <strong>the</strong> underly<strong>in</strong>g silicon.The wafer is <strong>the</strong>n heated while exposed to oxygen, to grow a th<strong>in</strong>layer of silicon dioxide over its entire surface. It is <strong>the</strong>n coated with ath<strong>in</strong> layer of polycrystall<strong>in</strong>e silicon. This layer forms <strong>the</strong> gates of all <strong>the</strong>transistors <strong>in</strong> <strong>the</strong> circuit and also serves as a second layer for circuit<strong>in</strong>terconnections.The n-type regions are diffused <strong>in</strong>to <strong>the</strong> p-type silicon substrate,form<strong>in</strong>g <strong>the</strong> sources and dra<strong>in</strong>s of <strong>the</strong> transistors and <strong>the</strong> first level of<strong>in</strong>terconnections. This is done by first remov<strong>in</strong>g <strong>the</strong> th<strong>in</strong> gate oxide <strong>in</strong><strong>the</strong> areas not covered by <strong>the</strong> polysilicon.The wafer is <strong>the</strong>n exposed to n-type impurities such as arsenic,antimony, or phosphorous at high temperature which allows <strong>the</strong>se impuritiesto convert <strong>the</strong> exposed underly<strong>in</strong>g silicon to n-type material.The polysilicon area and <strong>the</strong> th<strong>in</strong> oxide under it act to prevent impuritiesfrom diffus<strong>in</strong>g <strong>in</strong>to <strong>the</strong> underly<strong>in</strong>g silicon.Interconnections are made with a metal layer that contacts both <strong>the</strong>diffused areas and <strong>the</strong> polycrystall<strong>in</strong>e areas. Ano<strong>the</strong>r layer of <strong>in</strong>sulat<strong>in</strong>goxide is coated over <strong>the</strong> entire circuit and <strong>the</strong>n removed <strong>in</strong> places wherecontacts are desired. The wafer surface is usually coated with ano<strong>the</strong>r layerof oxide. This is called overglass<strong>in</strong>g and provides physical protection for©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong><strong>the</strong> device. Ano<strong>the</strong>r mask is <strong>the</strong>n used for <strong>the</strong> metal wire-bond<strong>in</strong>g pads.Each wafer conta<strong>in</strong>s many <strong>in</strong>dividual chips. The chips are separatedby scrib<strong>in</strong>g <strong>the</strong> wafer surface with a diamond scribe and <strong>the</strong>n fractur<strong>in</strong>g<strong>the</strong> wafer along <strong>the</strong> scribe l<strong>in</strong>es. Each <strong>in</strong>dividual chip is <strong>the</strong>ncemented <strong>in</strong> a package and wire leads are bonded to <strong>the</strong> metal contactpads on <strong>the</strong> chip and to pads <strong>in</strong> <strong>the</strong> package that connect with its externalp<strong>in</strong>s. A cover is <strong>the</strong>n cemented onto <strong>the</strong> package.Of <strong>the</strong> large number of <strong>in</strong>dividual <strong>in</strong>tegrated system chips fabricatedon a s<strong>in</strong>gle silicon wafer, only a fraction will be completely functional.Flaws <strong>in</strong> <strong>the</strong> masks, dust particles on <strong>the</strong> wafer surface and defectscause some devices to be less than perfect. Typical conditions <strong>in</strong> <strong>the</strong>process<strong>in</strong>g area are shown <strong>in</strong> Table 4-1.Table 4-1. Clean Room Environment————————————————————————————————No drafts+0.02 <strong>in</strong>ches H 2 O ± 0.005 <strong>in</strong>ches H 2 O, or 5 Pa ± 1.3 PaNo temperature gradients72°F ± 1°F, or 22°C ± 0.6°CNo humidity gradients35% RH ± 3%No airflow variations60 air changes/hour ± 5%————————————————————————————————One goal of control optimization is to maximize productivity by <strong>the</strong>accurate control of <strong>the</strong>se parameters. Ano<strong>the</strong>r goal is to conserve energy.The control elements and control loop configuration needed for high-productivityand low energy costs are <strong>the</strong> subject of <strong>the</strong> next section.Air Contam<strong>in</strong>ationIn order to prevent contam<strong>in</strong>ation by air <strong>in</strong>filtration from <strong>the</strong> surround<strong>in</strong>gareas, <strong>the</strong> clean room pressure must be higher than <strong>the</strong> rest of<strong>the</strong> build<strong>in</strong>g. The clean room is surrounded by a perimeter corridor(Figure 4-1). The pressure <strong>in</strong> <strong>the</strong> clean room is kept higher than <strong>the</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemssurround<strong>in</strong>g corridor to block <strong>the</strong> leakage of contam<strong>in</strong>ated air. The cleanroom is made up of work areas which are considered as zones. Theremay be several hundred zones <strong>in</strong> a plant.Zone <strong>Control</strong>Air is supplied to <strong>the</strong> zones through filters located <strong>in</strong> <strong>the</strong> ceil<strong>in</strong>g.The flow and temperature of <strong>the</strong> air are both controlled. The exhaust airis evacuated <strong>in</strong> <strong>the</strong> lower area of <strong>the</strong> zone. In semiconductor manufactur<strong>in</strong>g,each workstation has its own air supply filter and exhaust outlet.In order to conta<strong>in</strong> any toxic fumes, clean air enters <strong>the</strong> workstationat a velocity of about 75-fpm (0.38 m/s). The air that is not pulled<strong>in</strong> by <strong>the</strong> exhaust system is recirculated back <strong>in</strong>to <strong>the</strong> workstation witha fan. The rest of <strong>the</strong> air is returned by a return air header. A damper <strong>in</strong>this header is modulated to control <strong>the</strong> air pressure.Pressure <strong>Control</strong>The pressure <strong>in</strong> <strong>the</strong> isolat<strong>in</strong>g corridor acts as <strong>the</strong> reference for <strong>the</strong>area pressure controller. This controller ma<strong>in</strong>ta<strong>in</strong>s a few hundredths ofan <strong>in</strong>ch of positive pressure relative to <strong>the</strong> isolat<strong>in</strong>g corridor.The quality of <strong>the</strong> build<strong>in</strong>g construction determ<strong>in</strong>es how high thissetpo<strong>in</strong>t will be. Even with lower quality build<strong>in</strong>gs where leakage mayFigure 4-1. Clean room area with workstations and isolat<strong>in</strong>g corridor.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>be high, a sett<strong>in</strong>g of about 0.02 <strong>in</strong>ches H 2 O can be ma<strong>in</strong>ta<strong>in</strong>ed.At <strong>the</strong>se near-atmospheric pressures, <strong>the</strong> air behaves as if it were<strong>in</strong>compressible and pressure control is fast and stable. When <strong>the</strong> loop isenergized, <strong>the</strong> pressure controller moves <strong>the</strong> return air control damperuntil <strong>the</strong> preset differential is reached. Then, <strong>the</strong> electric motor stops and<strong>the</strong> damper stays at its last open<strong>in</strong>g. This position is not changed as longas <strong>the</strong> follow<strong>in</strong>g conditions apply:Return Airflow= Supply Airflow– (Exhaust Airflow + Pressurization Loss)When this airflow balance is affected by a change <strong>in</strong> airflow orpressure, it causes a change <strong>in</strong> <strong>the</strong> space pressure and <strong>the</strong> return aircontrol damper responds by modify<strong>in</strong>g <strong>the</strong> open<strong>in</strong>g of <strong>the</strong> return aircontrol damper.DraftsProductivity and energy costs are maximized if drafts are m<strong>in</strong>imal<strong>in</strong> <strong>the</strong> work area. Drafts can stir up <strong>the</strong> dust <strong>in</strong> this area, could contam<strong>in</strong>ate<strong>the</strong> product and reduce production. In order to elim<strong>in</strong>ate drafts, <strong>the</strong>pressure at each of <strong>the</strong> work areas must be at <strong>the</strong> same value. This elim<strong>in</strong>atesany pressure differential between areas and prevents drafts.A pressure controller at each workstation will result <strong>in</strong> a uniformpressure profile throughout <strong>the</strong> area. All areas should be at a positivepressure.The local fans will cause a lower pressure where <strong>the</strong>y draw air <strong>in</strong>.These localized vacuum zones could cause contam<strong>in</strong>ation by allow<strong>in</strong>gair <strong>in</strong>filtration. Pressure control of <strong>the</strong> vacuum zones could cause draftsfrom <strong>the</strong> pressure gradients.One technique <strong>in</strong>volves rais<strong>in</strong>g <strong>the</strong> setpo<strong>in</strong>t of <strong>the</strong> pressure controlleruntil all areas are at a positive pressure. The result depends on <strong>the</strong>quality of build<strong>in</strong>g construction which might not be high enough toallow operation at <strong>the</strong> higher space pressures. The pressurization loss <strong>in</strong>badly sealed build<strong>in</strong>gs could make it difficult to reach <strong>the</strong> higher spacepressure.Ano<strong>the</strong>r technique is to use a second pressure controller, whichwould throttle a damper <strong>in</strong> <strong>the</strong> supply air duct. This would provide <strong>the</strong>control needed but would also <strong>in</strong>crease <strong>the</strong> cost of <strong>the</strong> control system by©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemsadd<strong>in</strong>g ano<strong>the</strong>r control loop for each workstation.A more economical solution would be a hand-operated bypassdamper which is manually set dur<strong>in</strong>g <strong>the</strong> <strong>in</strong>itial setup and balanc<strong>in</strong>g.This solution is workable, but <strong>the</strong> sett<strong>in</strong>g would need to be changed as<strong>the</strong> manufactur<strong>in</strong>g process changes.Temperature <strong>Control</strong>The temperature at each workstation is controlled by a <strong>the</strong>rmostat.The temperature controller adjusts <strong>the</strong> ratio of cold air to hot air with<strong>in</strong><strong>the</strong> supply air mix<strong>in</strong>g box to ma<strong>in</strong>ta<strong>in</strong> <strong>the</strong> space temperature.The temperature gradients <strong>in</strong> <strong>the</strong> clean room area should be ±1°Fof 72°F (-0.6°C of 22°C). Conventional <strong>the</strong>rmostats cannot generallymeet this requirement because of <strong>the</strong>ir measurement accuracy and controlquality. Even if <strong>in</strong>dividual calibration is used, <strong>the</strong> error <strong>in</strong> overallloop performance would still be about ±2 or ±3°F (±1°C or ±1.7°C).Part of <strong>the</strong> error will be due to <strong>the</strong> offset that cannot be elim<strong>in</strong>ated<strong>in</strong> proportional controllers, such as <strong>the</strong>rmostats. In operation <strong>the</strong> <strong>the</strong>rmostatmust move its output from <strong>the</strong> midscale value with 50% mix<strong>in</strong>gof cold and hot air. An error <strong>in</strong> room temperature must exist which is <strong>the</strong>permanent offset. The size of this offset error for <strong>the</strong> control of maximumcool<strong>in</strong>g can be estimated by divid<strong>in</strong>g <strong>the</strong> spr<strong>in</strong>g range of <strong>the</strong> coldair damper by twice <strong>the</strong> <strong>the</strong>rmostat ga<strong>in</strong>. Typical dampers have an 8 to13 PSIG (55 to 90 kPa) spr<strong>in</strong>g which gives a spr<strong>in</strong>g range of 5 PSI, or 34.5kPa. If <strong>the</strong> <strong>the</strong>rmostat ga<strong>in</strong> is 2.5 PSI/°F (31 kPa/°C), <strong>the</strong>n <strong>the</strong> offseterror is 1°F (0.6°C).This means <strong>the</strong> space temperature must rise to 73°F (22.8°C) before<strong>the</strong> damper can be fully opened. The offset error will tend to <strong>in</strong>crease as<strong>the</strong> spr<strong>in</strong>g range <strong>in</strong>creases or as <strong>the</strong> <strong>the</strong>rmostat ga<strong>in</strong> decreased.<strong>Control</strong> of <strong>the</strong> clean room temperature to ±1°F (±0.6°C) requires anRTD-sensor or a semiconductor temperature sensor with a proportionalplus-<strong>in</strong>tegralcontroller. This will elim<strong>in</strong>ate <strong>the</strong> offset error and can best bedone with microprocessor-based controllers that communicate with <strong>the</strong>sensors over a pair of twisted pair wires that serve as a data highway.High accuracy temperature transmitters and sensors may cost alittle more <strong>in</strong>itially, but can save time and money over <strong>the</strong> long term byimprov<strong>in</strong>g efficiency and reduc<strong>in</strong>g ma<strong>in</strong>tenance costs. If <strong>the</strong> accuracycan be extended to <strong>the</strong> entire system, <strong>the</strong> sav<strong>in</strong>gs may be dramatic.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Direct wir<strong>in</strong>g transmits <strong>the</strong> low-level sensor output over sensorextension wires. Sensor extension wires are fragile and cost about threetimes more than common shielded copper wire. Transmitters amplifyand condition <strong>the</strong> signal, and transmit it over a twisted wire pair.Temperature Measurement AccuracyAccuracy is a gauge of how much a measurement may vary from<strong>the</strong> true <strong>the</strong>oretical temperature value. Generally speak<strong>in</strong>g, a high-accuracytemperature measurement is greater than ±1°C for a span of 200degrees or less.Temperature measurement uncerta<strong>in</strong>ties may be <strong>in</strong>troduced by <strong>the</strong>transmitter and <strong>the</strong> sensor. Temperature transmitter <strong>in</strong>accuracies <strong>in</strong>clude<strong>in</strong>put/output accuracy, l<strong>in</strong>earity, load and l<strong>in</strong>e voltage effects. The <strong>in</strong>putaccuracy is <strong>the</strong> uncerta<strong>in</strong>ty of <strong>the</strong> measurement after conversion through<strong>the</strong> transmitter’s analog to digital converter. Output accuracy is <strong>the</strong>uncerta<strong>in</strong>ty of <strong>the</strong> output after <strong>the</strong> signal is converted from digital toanalog, it <strong>in</strong>cludes <strong>the</strong> <strong>in</strong>put accuracy.Resolution is <strong>the</strong> smallest change that can be detected <strong>in</strong> a measurement.It is listed as a percent of span or as a number of bits. L<strong>in</strong>earityis <strong>the</strong> amount of deviation from a straight l<strong>in</strong>e between zero and fullscale <strong>in</strong>put. Deviations may be caused by electrical noise or <strong>in</strong>terferenceand <strong>the</strong> resistance of <strong>the</strong> leads depend<strong>in</strong>g on <strong>the</strong> sensor type and leadlength. Repeatability is <strong>the</strong> ability of <strong>the</strong> unit to generate <strong>the</strong> same outputvalue for <strong>the</strong> same <strong>in</strong>put for consecutive measurements under <strong>the</strong>same operat<strong>in</strong>g conditions.In some sensor specifications l<strong>in</strong>earity is used <strong>in</strong> place of accuracy.O<strong>the</strong>rs use an accuracy specification that <strong>in</strong>cludes l<strong>in</strong>earity and repeatability,and assumes specified ambient temperature conditions.RTD output can change due to temperature cycl<strong>in</strong>g, corrosion <strong>in</strong>lead wires, moisture, and contam<strong>in</strong>ation. Two and 3-wire RTDs are subjectto lead wire imbalances. A 4-wire RTD can provide true lead wirecompensation when it is used with a transmitter that has a 4-wire <strong>in</strong>put.Each ohm of imbalance <strong>in</strong> an RTD’s lead wires results <strong>in</strong> as muchas 2.5°C measurement error. Imbalances are due to term<strong>in</strong>al block corrosion,connector corrosion, extension wire splices, loose connections,lead length differences and work harden<strong>in</strong>g from bend<strong>in</strong>g.A 2-wire RTD does not compensate for lead wire length or resis-©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemstance differences. A 3-wire RTD will compensate for lead wire length ifeach lead is exactly <strong>the</strong> same resistance, but will not compensate fordifferences <strong>in</strong> lead resistance. A 4-wire RTD that is used with a temperaturetransmitter that accepts a true 4-wire RTD <strong>in</strong>put can compensate forunequal lead lengths and lead resistance differences. A 4-wire RTD isonly slightly more than a 3-wire.An <strong>in</strong>telligent temperature transmitter will provide a constant currentsource to <strong>the</strong> outer leads of a 4-wire RTD. This supplies <strong>the</strong> currentto <strong>the</strong> RTD. The voltage drop is measured across <strong>the</strong> <strong>in</strong>ner leads, whichis a high impedance, low current voltage loop. There is virtually nocurrent flow <strong>in</strong> <strong>the</strong> voltage loop, so <strong>the</strong>re is no voltage drop. The voltageis directly proportional to RTD resistance. The lead resistance has littleor no effect.Microprocessor-based temperature transmitters have universal <strong>in</strong>putsand ranges and diagnostic capabilities that can save ma<strong>in</strong>tenancetime. They cont<strong>in</strong>ually monitor <strong>the</strong> sensor and send a message if a sensorwire should break or stop transmitt<strong>in</strong>g a signal. The fault messageson an <strong>in</strong>tegral display can save troubleshoot<strong>in</strong>g costs.Noise InterferenceNoise <strong>in</strong>terference can affect accuracy. Direct wir<strong>in</strong>g exposes highimpedance, low-level sensor signals to <strong>the</strong> harmful effects of RFI/EMI.A temperature transmitter filters out RFI/EMI noise and converts <strong>the</strong>low-level signal to a low-impedance 4-20-mA current signal. Transmitterscan be calibrated for a specific range with<strong>in</strong> a sensor’s overall capabilitiesfor more accurate measurements. RTDs are nonl<strong>in</strong>ear and some<strong>in</strong>telligent transmitters can use up to 128 po<strong>in</strong>ts of l<strong>in</strong>earization for precisetemperature calculations.Sensor Match<strong>in</strong>gSome <strong>in</strong>telligent transmitters provide methods of trimm<strong>in</strong>g <strong>the</strong><strong>in</strong>put to a particular temperature sensor. The sensor is checked at a stabilizedtemperature and <strong>the</strong> transmitter is programmed to capture <strong>the</strong>output of <strong>the</strong> sensor. By captur<strong>in</strong>g several data po<strong>in</strong>ts from <strong>the</strong> sensor,<strong>the</strong> transmitter can compensate for <strong>the</strong> deviations of that sensor.Ano<strong>the</strong>r method of calibration uses <strong>the</strong> Callendar-Van Dusen equationfor approximat<strong>in</strong>g <strong>the</strong> resistance-to-temperature relationship of a©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>particular sensor. Most RTD temperature sensors can be obta<strong>in</strong>ed withconstants that are <strong>the</strong>n programmed <strong>in</strong>to a transmitter that uses <strong>the</strong>equation to correct for divergence.Us<strong>in</strong>g a 1000 ohm RTD ra<strong>the</strong>r than a 100 ohm unit will give bettermeasurement resolution, s<strong>in</strong>ce each degree change <strong>in</strong> temperature willresult <strong>in</strong> a resistance change ten times greater.Us<strong>in</strong>g <strong>the</strong> digital output from a smart transmitter <strong>in</strong>stead of ananalog output will provide higher accuracy. This elim<strong>in</strong>ates <strong>the</strong> errorassociated with <strong>the</strong> D/A converter.StabilityAccuracy is <strong>the</strong> level of uncerta<strong>in</strong>ty of a transmitter’s or sensor’soutput at a given time while stability is <strong>the</strong> uncerta<strong>in</strong>ty of a transmitter’sor sensor’s output over a period of time. Stability is usually specified asa percent of temperature span per year. It <strong>in</strong>dicates how often <strong>the</strong> systemwill need calibration.Total accuracy also depends on <strong>the</strong> equipment used to calibrate <strong>the</strong>measurement loop. Test equipment should provide a 3:1 accuracy ratio,where <strong>the</strong> test device is rated at least three times more accurate than <strong>the</strong>unit under calibration. Equipment should be traceable to an accreditedmetrology <strong>in</strong>stitute such as NIST (National Institute of Standards andTechnology).Humidity <strong>Control</strong>The relative humidity sensors are <strong>in</strong>stalled <strong>in</strong> <strong>the</strong> return air stream.The relative humidity <strong>in</strong> <strong>the</strong> clean room should be with<strong>in</strong> RH +3% so <strong>the</strong>humidity sensor must have an error of less than ±3% RH. The repeatabilityof human hair element sensors is about ±1% RH. These units can beused for clean rooms provided that <strong>the</strong>y are <strong>in</strong>dividually calibrated foroperation at or around 35% RH. Without <strong>in</strong>dividual calibration, <strong>the</strong>ywill not perform satisfactorily <strong>in</strong> this application, s<strong>in</strong>ce <strong>the</strong>ir off-<strong>the</strong>-shelferror, is about +5% RH.Hair HygrometersThese devices operate by a change of length of organic and syn<strong>the</strong>ticfibers when <strong>the</strong>se are exposed to a moist atmosphere. A mechani-©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemscal l<strong>in</strong>kage is used to amplify <strong>the</strong> element movement for readout.Good circulation is required and <strong>in</strong> ducts <strong>the</strong>re is generally anadequate gas velocity to <strong>in</strong>sure a dependable measurement. However, if<strong>the</strong> <strong>in</strong>strument is to be mounted <strong>in</strong> a room, <strong>the</strong> location should be carefullychosen. The sens<strong>in</strong>g portion should be <strong>in</strong> <strong>the</strong> room or compartmentwhere <strong>the</strong> relative humidity is to be measured. The sensor should not bemounted near doors or o<strong>the</strong>r open<strong>in</strong>gs where it will be exposed to spuriousdrafts. Flush mount<strong>in</strong>g on a panel should be avoided because <strong>the</strong>atmosphere <strong>in</strong> <strong>the</strong> back of <strong>the</strong> panel is stagnant.Dew Po<strong>in</strong>t HygrometersThe solution conductivity type of hygrometer depends on solidscondens<strong>in</strong>g and absorb<strong>in</strong>g m<strong>in</strong>ute quantities of water on <strong>the</strong>ir surfaces.The solution vapor pressure depends on <strong>the</strong> moisture content of <strong>the</strong>atmosphere.The sens<strong>in</strong>g element is a th<strong>in</strong>-walled, hollow-metal socketwrapped with tape impregnated with lithium chloride salt crystals. Twowires are wrapped over <strong>the</strong> tape and connected to a regulated, alternat<strong>in</strong>gcurrent voltage source. The electric circuit between <strong>the</strong> wires is completedby <strong>the</strong> salt crystals.When <strong>the</strong> sens<strong>in</strong>g element is exposed to <strong>the</strong> sample atmosphere,water condens<strong>in</strong>g on <strong>the</strong> crystals forms an ionic solution which permitsan electric current to flow between <strong>the</strong> wires. This current <strong>in</strong> turn heats<strong>the</strong> solution and raises its vapor pressure.As <strong>the</strong> water condenses, more current flows, which results <strong>in</strong> afur<strong>the</strong>r <strong>in</strong>crease of <strong>the</strong> solution vapor pressure until equilibrium isreached. A decreas<strong>in</strong>g moisture content will cause water to evaporatefrom <strong>the</strong> element, decreas<strong>in</strong>g <strong>the</strong> current flow and result<strong>in</strong>g <strong>in</strong> a newequilibrium at a lower vapor pressure. A temperature sensor <strong>in</strong>side <strong>the</strong>hollow socket is used to detect <strong>the</strong> temperature.The output can be calibrated <strong>in</strong> terms of dew po<strong>in</strong>t temperaturewater vapor pressure or specific humidity. Relative humidity is obta<strong>in</strong>edby convert<strong>in</strong>g sample and dew po<strong>in</strong>t temperature read<strong>in</strong>gs to percentrelative humidity.A sample velocity <strong>in</strong> excess of 1 foot (0.3 m) per second can result<strong>in</strong> a poor measurement and shortened element life. At high samplevelocities, convective heat losses swamp <strong>the</strong> measurement signal and©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong><strong>the</strong> additional heat<strong>in</strong>g power can reduce <strong>the</strong> element life. The sens<strong>in</strong>gelement should be located <strong>in</strong> a relatively quiescent zone or must beprotected from direct imp<strong>in</strong>gement of <strong>the</strong> flow. In ducts, a sheet metalhood can be <strong>in</strong>stalled over <strong>the</strong> element. It is open on <strong>the</strong> downstreamside. In pip<strong>in</strong>g, <strong>the</strong> element can be <strong>in</strong>stalled <strong>in</strong> <strong>the</strong> side outlet of a tee ormounted separately <strong>in</strong> a sampl<strong>in</strong>g chamber. This sensor requires periodicma<strong>in</strong>tenance and must be removable.Surface Conductivity HygrometersEvery object <strong>in</strong> a moist atmosphere has water molecules on itssurface. The concentration on <strong>the</strong>se molecules is related to <strong>the</strong> temperatureof <strong>the</strong> object and <strong>the</strong> dew po<strong>in</strong>t of <strong>the</strong> atmosphere. If <strong>the</strong> temperatureof <strong>the</strong> surface is above <strong>the</strong> dew po<strong>in</strong>t of <strong>the</strong> atmosphere, <strong>the</strong> th<strong>in</strong>layer of molecules is not visible. As <strong>the</strong> surface cools to <strong>the</strong> dew po<strong>in</strong>t,<strong>the</strong> density of water molecules at <strong>the</strong> surface becomes so great thatwater condenses on <strong>the</strong> surface and dew can be seen.At surface temperatures above <strong>the</strong> dew po<strong>in</strong>t, <strong>the</strong> moisture densityat <strong>the</strong> surface can be detected electrically although <strong>the</strong> water vapor isnot visible to <strong>the</strong> eye. This water vapor will permit a current to flow on<strong>the</strong> surface of an <strong>in</strong>sulator. This current flow depends on <strong>the</strong> moisturedensity at <strong>the</strong> surface.The measur<strong>in</strong>g element consists of a polished <strong>in</strong>ert surface with ametal grid and a <strong>the</strong>rmocouple imbedded <strong>in</strong> <strong>the</strong> surface. A fixed potentialis ma<strong>in</strong>ta<strong>in</strong>ed across <strong>the</strong> grid and <strong>the</strong> current flow is compared to <strong>the</strong>reference current flow at dew po<strong>in</strong>t.This signal is amplified and used to modulate a cooler so that <strong>the</strong>surface is ma<strong>in</strong>ta<strong>in</strong>ed at <strong>the</strong> dew po<strong>in</strong>t of <strong>the</strong> sample. The cooler is acrystal that pumps heat away from <strong>the</strong> sensor when electric power issupplied to it. From <strong>the</strong> <strong>the</strong>rmocouple imbedded <strong>in</strong> <strong>the</strong> surface, <strong>the</strong>output can be presented as dew po<strong>in</strong>t temperature or <strong>in</strong> terms of relativeor specific humidity.Chilled Mirror HygrometersThe optical, chilled mirror dew po<strong>in</strong>t technique is a fundamentalmeasurement of <strong>the</strong> humidity of a gas s<strong>in</strong>ce <strong>the</strong> saturation temperature©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemsdeterm<strong>in</strong>es <strong>the</strong> saturation partial pressure of <strong>the</strong> water vapor. This relationshipis used by <strong>the</strong> National Bureau of Standards for humidity sensorcalibration. The saturation vapor pressures over plane surfaces ofpure water and pure ice correspond to equivalent dew po<strong>in</strong>ts or frostpo<strong>in</strong>ts.The equilibrium partial pressure is illustrated <strong>in</strong> Figure 4-2. At <strong>the</strong>saturation temperature, or dew po<strong>in</strong>t, <strong>the</strong> gas mixture is saturated withrespect to water or ice and <strong>the</strong> rate of water molecules leav<strong>in</strong>g <strong>the</strong> atmosphereand condens<strong>in</strong>g on <strong>the</strong> chilled surface is <strong>the</strong> same as <strong>the</strong> rate ofwater molecules leav<strong>in</strong>g <strong>the</strong> chilled surface and reenter<strong>in</strong>g <strong>the</strong> atmosphere.At equilibrium saturation, <strong>the</strong> water vapor partial pressure of<strong>the</strong> condensate is equal to <strong>the</strong> water vapor partial pressure of <strong>the</strong> gasatmosphere.This equilibrium at <strong>the</strong> mirror surface is obta<strong>in</strong>ed by cool<strong>in</strong>g <strong>the</strong>mirror to <strong>the</strong> saturation temperature. A temperature sensor is <strong>in</strong> direct<strong>the</strong>rmal contact with <strong>the</strong> mirror, and <strong>the</strong> mirror temperature is used<strong>in</strong>directly as <strong>the</strong> dew po<strong>in</strong>t or saturation temperature.The cool<strong>in</strong>g of <strong>the</strong> mirror surface may be accomplished with mechanicalrefrigeration. More recent units use <strong>the</strong>rmoelectric heat pumps.Detection of <strong>the</strong> condensation is done with optical phototransistor detection.The newer units automatically control <strong>the</strong> surface at <strong>the</strong> dew po<strong>in</strong>tor frost po<strong>in</strong>t.Manually cooled, visually observed hygrometers are known asdew cups. These devices have been replaced by <strong>the</strong> <strong>the</strong>rmoelectricallycooled, optically observed dew po<strong>in</strong>t hygrometer for on-l<strong>in</strong>e measurement.Here, <strong>the</strong> mirror surface is chilled to <strong>the</strong> dew po<strong>in</strong>t by a <strong>the</strong>rmo-Figure 4-2. Equilibrium partial pressure.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>electric cooler while a cont<strong>in</strong>uous sample of <strong>the</strong> atmosphere passes over<strong>the</strong> mirror. The mirror is illum<strong>in</strong>ated by a light source and observed bya photodetector bridge network.As condensate forms on <strong>the</strong> mirror, <strong>the</strong> change <strong>in</strong> reflectance isdetected by a reduction <strong>in</strong> <strong>the</strong> reflected light level received by <strong>the</strong> photodetectorbecause of <strong>the</strong> light-scatter<strong>in</strong>g effect of <strong>the</strong> <strong>in</strong>dividual dewmolecules. This light reduction forces <strong>the</strong> optical bridge toward a balancepo<strong>in</strong>t, reduces <strong>the</strong> <strong>in</strong>put error signal to <strong>the</strong> amplifier, and proportionallycontrols <strong>the</strong> drive from <strong>the</strong> power supply to <strong>the</strong> <strong>the</strong>rmoelectriccooler (Figure 4-3). This ma<strong>in</strong>ta<strong>in</strong>s <strong>the</strong> mirror at a temperature at whicha constant-thickness dew layer is reta<strong>in</strong>ed. Embedded <strong>in</strong> <strong>the</strong> mirror, atemperature-measur<strong>in</strong>g element measures <strong>the</strong> dew po<strong>in</strong>t temperature.Advances <strong>in</strong> <strong>the</strong> technology of <strong>the</strong>rmoelectric coolers allow practical<strong>in</strong>struments with several stages of <strong>the</strong>rmoelectric cool<strong>in</strong>g for most dewpo<strong>in</strong>t ranges.Relative humidity is controlled at <strong>the</strong> zone level. The control actionis based on <strong>the</strong> relative humidity read<strong>in</strong>g <strong>in</strong> <strong>the</strong> comb<strong>in</strong>ed return airstream from <strong>the</strong> workstations <strong>in</strong> that zone.Figure 4-3. Chilled mirror hygrometer.©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open SystemsFlow <strong>Control</strong>Each workstation has its own mix<strong>in</strong>g box for modulat<strong>in</strong>g <strong>the</strong> ratioof cold and hot air to satisfy <strong>the</strong> requirements of <strong>the</strong> space <strong>the</strong>rmostat(Figure 4-4). The total air supply flow to a workstation should be equalto 60 air changes per hour plus <strong>the</strong> exhaust rate from that subzone.The total air supply rate should be controlled to ±5% of <strong>the</strong> actualflow over a flow range of 3:1. The rangeability of 3:1 is needed to sup-Figure 4-4. Workstation environment control.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>port several semiconductor manufactur<strong>in</strong>g processes with <strong>the</strong>ir associatedexhaust requirements.If <strong>the</strong> flow controller is set manually, it must be changed each time<strong>the</strong> process step changes. The sett<strong>in</strong>g of <strong>the</strong> flow controller needs to bedone with an <strong>in</strong>dividual <strong>in</strong>-place calibration us<strong>in</strong>g a portable hot wireanemometer reference.Some of <strong>the</strong> available mix<strong>in</strong>g box designs should not be used for thisapplication. Some of <strong>the</strong>se mix<strong>in</strong>g boxes are pressure dependent where<strong>the</strong> total flow change has some dependence on <strong>the</strong> air supply pressure.Pressure-<strong>in</strong>dependent types need to be used s<strong>in</strong>ce both <strong>the</strong> cold and <strong>the</strong>hot air supply pressures to <strong>the</strong> mix<strong>in</strong>g box may vary some. A flow meterwith a 3:1 rangeability and accuracy of ±5% of actual flow is needed.Some flow meters use a selector or override design. In <strong>the</strong>se unitsei<strong>the</strong>r <strong>the</strong> flow or temperature is controlled on a selective basis. Theseoverride designs will periodically neglect <strong>the</strong> requirements of <strong>the</strong> temperaturecontroller and will produce upsets and temperature cycl<strong>in</strong>g.Zone OptimizationEach row of workstations makes up a zone. Each zone is served bya cold deck (CD), a hot deck (HD), and a return air subheader or f<strong>in</strong>ger.The operation of <strong>the</strong> controllers for <strong>the</strong> <strong>in</strong>dividual workstations orsubzones are dependent on <strong>the</strong> zone f<strong>in</strong>ger conditions.The subheader should be able to control <strong>the</strong> subzone pressure aslong as <strong>the</strong> pressure difference across <strong>the</strong> damper is high enough toremove all <strong>the</strong> return air without forc<strong>in</strong>g <strong>the</strong> damper to full open. Aslong as <strong>the</strong> dampers are throttl<strong>in</strong>g and not fully open or completelyclosed, <strong>the</strong> pressure controller is <strong>in</strong> control mode.A nonl<strong>in</strong>ear controller is used to control <strong>the</strong> vacuum <strong>in</strong> <strong>the</strong> returnair f<strong>in</strong>ger. The nonl<strong>in</strong>ear controller has a dead band that protects <strong>the</strong>cold deck f<strong>in</strong>ger temperature from be<strong>in</strong>g changed until a substantialchange takes place <strong>in</strong> <strong>the</strong> return air pressure.The mix<strong>in</strong>g box will be <strong>in</strong> a control mode as long as its damper isnot forced to a full open or closed position. If a damper is fully open, <strong>the</strong>control loop is out of control. Damper position controllers are used toprevent <strong>the</strong> dampers from mov<strong>in</strong>g to full open.The relative humidity <strong>in</strong> <strong>the</strong> return air must also be controlledwith<strong>in</strong> acceptable limits. Figure 4-5 shows how this can be done.©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open SystemsFigure 4-5. <strong>Control</strong> for cold deck temperature optimization.Envelope <strong>Control</strong>When <strong>the</strong> number of control variables is greater than <strong>the</strong> numberof manipulated variables, multivariable envelope control can be used. Inthis case <strong>the</strong> manipulated variable is <strong>the</strong> temperature setpo<strong>in</strong>t. It is selectivelycontrolled to keep several variables under control.The setpo<strong>in</strong>t can be used to change <strong>the</strong> cool<strong>in</strong>g capacity of eachunit of cold deck air. The same cool<strong>in</strong>g can be done by us<strong>in</strong>g less air atlower temperature or by us<strong>in</strong>g more air at higher temperature.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Return air humidity can be controlled by modulat<strong>in</strong>g <strong>the</strong> temperaturesetpo<strong>in</strong>t. Increas<strong>in</strong>g <strong>the</strong> ratio of humidity-controlled cold deck air <strong>in</strong><strong>the</strong> zone supply br<strong>in</strong>gs <strong>the</strong> zone closer to <strong>the</strong> desired 35% RH setpo<strong>in</strong>t.In this control system, a temperature setpo<strong>in</strong>t will <strong>in</strong>crease <strong>the</strong> colddeck demand which lowers <strong>the</strong> hot deck and return air demand. A temperaturesetpo<strong>in</strong>t decrease will occur when a return air excess is detectedor <strong>the</strong> cold air damper <strong>in</strong> <strong>the</strong> mix<strong>in</strong>g box is fully open. If <strong>the</strong> colddeck f<strong>in</strong>ger temperature exceeds 70°F (21°C), <strong>the</strong> temperature setpo<strong>in</strong>twill decrease to keep <strong>the</strong> cold deck cooler than <strong>the</strong> hot deck.Plantwide <strong>Control</strong>If <strong>the</strong> temperature and <strong>the</strong> humidity of <strong>the</strong> cold deck supply airare fixed, and if a damper or a valve is fully open or closed, <strong>the</strong> systemis out of control. A load follow<strong>in</strong>g control system will automaticallyadjust <strong>the</strong> ma<strong>in</strong> cold deck supply temperature and <strong>the</strong> humidity.This prevents <strong>the</strong> valves or dampers to cause lost of control by fullyopen<strong>in</strong>g or clos<strong>in</strong>g. The result is <strong>in</strong>creased productivity and reducedoperat<strong>in</strong>g costs.A plant might consist of several dozen zones. The plant controlsystem has a hierarchical structure (Figure 4-6). The workstation controlsare subject to <strong>the</strong> zone controls and <strong>the</strong> plant controls check <strong>the</strong> operationof <strong>the</strong> zone controllers.An important action of <strong>the</strong> levels of <strong>the</strong> hierarchy is <strong>the</strong> activecontrol of valve and damper positions. When a control valve or adamper is approach<strong>in</strong>g <strong>the</strong> po<strong>in</strong>t of los<strong>in</strong>g control, (near full or closedposition) <strong>the</strong> load-follow<strong>in</strong>g control system at <strong>the</strong> next higher levelmodifies <strong>the</strong> air or water supply conditions.The plant control system acts as a flexible set of material balanceand heat/humidity balance controls. Load-follow<strong>in</strong>g optimization of <strong>the</strong>setpo<strong>in</strong>ts produces heat balance control. If <strong>the</strong> material balance requiresan <strong>in</strong>crease <strong>in</strong> airflow and <strong>the</strong> heat balance requires a reduction <strong>in</strong> <strong>the</strong>heat <strong>in</strong>put to <strong>the</strong> space, both requirements will be met by admitt<strong>in</strong>gmore air at a lower temperature.Material Balance <strong>Control</strong>The plant material balance uses pressure control to modulate variable-volumefans to ma<strong>in</strong>ta<strong>in</strong> a m<strong>in</strong>imum supply pressure <strong>in</strong> <strong>the</strong> coldand hot decks. The cold deck supply fan uses outside air.©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open SystemsFigure 4-6. Hierarchical control structure.The suction pressure of <strong>the</strong> hot deck supply fan is an <strong>in</strong>dication of<strong>the</strong> balance between return air availability and hot deck demand. Thisbalance is ma<strong>in</strong>ta<strong>in</strong>ed at <strong>the</strong> zone level by a controller that must betuned for slow, gradual action.Sudden upsets or emergency conditions are corrected by a reliefdamper if <strong>the</strong> suction pressure is high (low vacuum) and a makeupdamper if it is low (high vacuum). Between <strong>the</strong>se limits, both dampersare closed and <strong>the</strong> suction pressure is allowed to float.Heat Balance <strong>Control</strong>Heat balance requires multi-variable envelope control s<strong>in</strong>ce <strong>the</strong>number of controlled variables is greater than <strong>the</strong> number of availablemanipulated variables. The plant air and water supply temperature set-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>po<strong>in</strong>ts are selectively modulated to keep several variables with<strong>in</strong> acceptablelimits <strong>in</strong>side <strong>the</strong> control envelope.The setpo<strong>in</strong>ts are used to adjust <strong>the</strong> cool<strong>in</strong>g capacity of <strong>the</strong> colddeck supply air and <strong>the</strong> heat<strong>in</strong>g capacity of <strong>the</strong> hot water. This providesload-follow<strong>in</strong>g control for <strong>the</strong> m<strong>in</strong>imization of operat<strong>in</strong>g costs. Costs arereduced by m<strong>in</strong>imiz<strong>in</strong>g <strong>the</strong> hot water supply temperature and <strong>the</strong> cool<strong>in</strong>gand reheat<strong>in</strong>g of <strong>the</strong> cold deck air.The setpo<strong>in</strong>ts will be decreased if <strong>the</strong> least open reheat coil controlvalve is reach<strong>in</strong>g full closure and <strong>the</strong> cold deck supply temperature is atits maximum. The setpo<strong>in</strong>ts will be <strong>in</strong>creased if <strong>the</strong> most open reheat coilcontrol valve is reach<strong>in</strong>g full open and <strong>the</strong> cold deck supply temperatureis at its m<strong>in</strong>imum.A control loop is used to prevent any of <strong>the</strong> reheat coil controlvalves from fully open<strong>in</strong>g los<strong>in</strong>g control. It also forces <strong>the</strong> least openvalve toward a m<strong>in</strong>imum open<strong>in</strong>g. This should m<strong>in</strong>imize overlaps betweencool<strong>in</strong>g and reheat<strong>in</strong>g while keep<strong>in</strong>g <strong>the</strong> valve from full closure.This is done with a control function f(x) which keeps <strong>the</strong> least openvalve at about 10% open<strong>in</strong>g and most open valve at less than 90% open.If <strong>the</strong> 90% open<strong>in</strong>g is exceeded, f(x) prevents <strong>the</strong> most open valve fromfully open<strong>in</strong>g by lower<strong>in</strong>g <strong>the</strong> temperature setpo<strong>in</strong>ts.Load-follow<strong>in</strong>g and <strong>the</strong> modulation of ma<strong>in</strong> air and water temperaturesshould keep all zones <strong>in</strong> <strong>the</strong> plant under stable control provided that<strong>the</strong> loads are similar <strong>in</strong> each zone. <strong>Control</strong> will be lost if <strong>the</strong> design limitsare reached or if <strong>the</strong> load distribution is greater than anticipated. In thiscase, one zone may require large amounts of cool<strong>in</strong>g (reheat coil valveclosed) while ano<strong>the</strong>r zone requires its reheat coil valve to be fully open.The control system must decide which condition it must correct, s<strong>in</strong>ce itcannot correct both. The control system must be configured to give priorityto prevent<strong>in</strong>g <strong>the</strong> reheat valve from fully open<strong>in</strong>g.If <strong>the</strong> difference between <strong>the</strong> open<strong>in</strong>g of <strong>the</strong> most open and <strong>the</strong> leastopen valves should reach 95%, a valve position alarm should be actuated.This alarm would <strong>in</strong>dicate excessive loads between zones and allow correctiveaction to be taken by revis<strong>in</strong>g <strong>the</strong> system which would <strong>in</strong>cludemodify<strong>in</strong>g air supply ducts and add<strong>in</strong>g or remov<strong>in</strong>g mix<strong>in</strong>g boxes.<strong>Control</strong>l<strong>in</strong>g <strong>the</strong> reheat valves from be<strong>in</strong>g nearly closed will elim<strong>in</strong>ateunstable (cycl<strong>in</strong>g) valve operation. This also m<strong>in</strong>imizes pump<strong>in</strong>gcosts by m<strong>in</strong>imiz<strong>in</strong>g pressure losses through throttl<strong>in</strong>g valves and m<strong>in</strong>imizesheat pump operat<strong>in</strong>g costs by m<strong>in</strong>imiz<strong>in</strong>g <strong>the</strong> required hot watertemperature.©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open SystemsZone Humidity <strong>Control</strong>At <strong>the</strong> zone level, <strong>the</strong> return air humidity is controlled and <strong>the</strong> dewpo<strong>in</strong>t of <strong>the</strong> cold deck air supply is modulated. The cold deck supplytemperature is also modulated to follow <strong>the</strong> load. This is done by measur<strong>in</strong>g<strong>the</strong> relative humidity <strong>in</strong> <strong>the</strong> return air.The control loop selects <strong>the</strong> return air sectors with <strong>the</strong> highest and<strong>the</strong> lowest relative humidities. The loop will herd <strong>the</strong> relative humidityread<strong>in</strong>gs so that <strong>the</strong> highest and <strong>the</strong> lowest will be with<strong>in</strong> <strong>the</strong> controllimits of 35% ±3% RH.The highest read<strong>in</strong>g is used as <strong>the</strong> controller measurement and <strong>the</strong>lowest read<strong>in</strong>g as <strong>the</strong> setpo<strong>in</strong>t. A humidity change <strong>in</strong> ei<strong>the</strong>r direction canbe recognized and corrected us<strong>in</strong>g this herd<strong>in</strong>g technique. The setpo<strong>in</strong>tof <strong>the</strong> relative humidity controller is produced by a function generator.It prevents <strong>the</strong> most humid return air sector from exceed<strong>in</strong>g 38% relativehumidity and to keep <strong>the</strong> driest relative humidity sector from dropp<strong>in</strong>gbelow 32% RH. The setpo<strong>in</strong>t is held at 35% as long as <strong>the</strong> driest sectorreads 34% RH or more. If it drops below this value, <strong>the</strong> setpo<strong>in</strong>t is raisedto <strong>the</strong> limit of 38% RH <strong>in</strong> order to reverse this low humidity condition,without allow<strong>in</strong>g excessive humidity <strong>in</strong> <strong>the</strong> return air of some o<strong>the</strong>rzone.This control should automatically respond to seasonal changes andprovide control as long as <strong>the</strong> loads <strong>in</strong> <strong>the</strong> various zones are similar. Ifthis is not <strong>the</strong> case, some zones may be moisture-generat<strong>in</strong>g and o<strong>the</strong>rsrequire humidification.The low humidity condition will not be controlled and <strong>the</strong> highhumidity zone will be controlled to prevent it from exceed<strong>in</strong>g 38% relativehumidity. The <strong>in</strong>termix<strong>in</strong>g of <strong>the</strong> return air sources will transfermoisture from zones with excess humidity to zones with low humidity.When <strong>the</strong> difference between <strong>the</strong> m<strong>in</strong>imum and maximum humidityreaches 8%, an alarm is actuated. This will allow adjustments to bemade.Exhaust Air <strong>Control</strong>Exhaust air control is done with a two-position damper. When <strong>the</strong>workstation is operat<strong>in</strong>g <strong>the</strong> damper is open. A switch <strong>in</strong>dicates when <strong>the</strong>damper is open. The m<strong>in</strong>imum damper position should allow enough air©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>exhaust flow for operator safety. Operat<strong>in</strong>g costs are lowered because lessoutside air needs to be conditioned if <strong>the</strong> exhaust airflow is lowered.In order to ma<strong>in</strong>ta<strong>in</strong> <strong>the</strong> required exhaust air flows accurately, <strong>the</strong>vacuum <strong>in</strong> <strong>the</strong> exhaust air ductwork must be kept at a constant value. Apressure controller keeps <strong>the</strong> vacuum constant by throttl<strong>in</strong>g <strong>the</strong> exhaustair damper. If <strong>the</strong>se dampers are to rema<strong>in</strong> <strong>in</strong> control, <strong>the</strong>y must not go tofull open.This is done by identify<strong>in</strong>g <strong>the</strong> most open damper and <strong>the</strong>n compar<strong>in</strong>gthis open<strong>in</strong>g with <strong>the</strong> setpo<strong>in</strong>t of <strong>the</strong> damper position controller. Thiscontroller will limit <strong>the</strong> open<strong>in</strong>g of <strong>the</strong> most open damper to 80% and <strong>in</strong>crease<strong>the</strong> vacuum <strong>in</strong> <strong>the</strong> exhaust air header if <strong>the</strong> open<strong>in</strong>g exceeds 80%.If <strong>the</strong> pressure measurement for <strong>the</strong> controller goes below 9 PSIG(0.6 bar), <strong>the</strong> vacuum setpo<strong>in</strong>t of <strong>the</strong> controller is <strong>in</strong>creased (pressuresett<strong>in</strong>g lowered). This <strong>in</strong>creases <strong>the</strong> operat<strong>in</strong>g level of <strong>the</strong> exhaust fan.Limits on <strong>the</strong> setpo<strong>in</strong>t of <strong>the</strong> controller are used to prevent damage, suchas <strong>the</strong> collaps<strong>in</strong>g of ducts from excessive vacuum.A glycol-circulat<strong>in</strong>g heat recovery loop can be used to preheat <strong>the</strong>enter<strong>in</strong>g outside air or as a heat source to a heat pump <strong>in</strong> <strong>the</strong> w<strong>in</strong>ter.Operat<strong>in</strong>g costs are lowered by recover<strong>in</strong>g <strong>the</strong> heat content of <strong>the</strong> airbefore it is exhausted <strong>in</strong> <strong>the</strong> w<strong>in</strong>ter.Pollution <strong>Control</strong>The discharge of chemical vapors <strong>in</strong>to <strong>the</strong> atmosphere is a pollutionproblem. The usual approach is to remove most of <strong>the</strong> chemical by adsorptionand scrubb<strong>in</strong>g before exhaust<strong>in</strong>g <strong>the</strong> air. Some additional benefitsare provided by exhaust<strong>in</strong>g <strong>the</strong> air at high velocity. This will <strong>in</strong>crease<strong>the</strong> dispersion <strong>in</strong> <strong>the</strong> atmosphere. S<strong>in</strong>ce <strong>the</strong> volume of air be<strong>in</strong>g exhaustedvaries, an air velocity controller is used to keep <strong>the</strong> velocity of dischargeconstant. This is done by modulat<strong>in</strong>g a variable orifice damper.Intelligent AlarmsRecent studies suggest that U.S. <strong>in</strong>dustry loses more than $20 billionper year to preventable process disruptions. Globally, <strong>the</strong> impact ismuch greater. Abnormal situation management (ASM) focuses on systemsthat provide operator decision support and troubleshoot<strong>in</strong>g assistancedur<strong>in</strong>g disruptions. ASM requires <strong>the</strong> management of largeamounts of data to filter nuisance <strong>in</strong>formation, diagnose <strong>the</strong> cause of <strong>the</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemsalarm condition and implement a corrective action.Future <strong>in</strong>telligent alarm management solutions may apply expertsystems. These systems provide a framework for diagnos<strong>in</strong>g processdisruptions, generat<strong>in</strong>g more precise <strong>in</strong>formation and implement<strong>in</strong>gcorrective actions.Expert Systems Reason<strong>in</strong>gExpert systems are applications of artificial <strong>in</strong>telligence (AI) thatapply <strong>in</strong>ference eng<strong>in</strong>e and fuzzy-logic technologies to reason <strong>in</strong> realtime about events that occur <strong>in</strong> dynamic processes. The <strong>in</strong>ference eng<strong>in</strong>ereasons from rules def<strong>in</strong>ed <strong>in</strong> a knowledge base that is derived fromexpert specific knowledge.Real-time expert systems can be divided <strong>in</strong>to two basic categories:advisory and supervisory control. In advisory applications, <strong>the</strong> expertsystem reasons about changes <strong>in</strong> data, makes decisions based on eventsand presents conclusions and rationale to <strong>the</strong> operator.The expert system that acts as a supervisor; it has <strong>the</strong> ability toprovide <strong>in</strong>formation about control occurrences and impend<strong>in</strong>g problems.In some more robust supervisory control applications, <strong>the</strong> expertsystem will proactively adjust setpo<strong>in</strong>ts and switch discrete equipmenton or off to resolve problems, optimize control and atta<strong>in</strong> o<strong>the</strong>r objectivesas def<strong>in</strong>ed <strong>in</strong> <strong>the</strong> knowledge base.Alarm management expert systems can be <strong>in</strong>tegrated with <strong>the</strong>operator <strong>in</strong>terface (OI) to supervise <strong>the</strong> control and provide on-l<strong>in</strong>eadvisory or supervisory control functions. The expert system reasonsabout alarm po<strong>in</strong>ts def<strong>in</strong>ed <strong>in</strong> a database accord<strong>in</strong>g to tagged values,dynamic changes <strong>in</strong> a group of tagged values, or <strong>the</strong> state of o<strong>the</strong>ralarms <strong>in</strong> <strong>the</strong> database.The use of meta alarms, which are alarms that reason about <strong>the</strong>state of o<strong>the</strong>r alarms, allows a higher level of logic that captures <strong>the</strong>dynamic changes occurr<strong>in</strong>g <strong>in</strong> <strong>the</strong> environment.Conventional Alarm SystemsConventional alarm systems are typically advisory <strong>in</strong> nature. Theyare tag-centric. They provide discrete alarms based on an absolute limit©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>that is def<strong>in</strong>ed for a s<strong>in</strong>gle process<strong>in</strong>g value. They mirror <strong>the</strong> function ofmicroprocessor-based annunciators by generat<strong>in</strong>g messages, annunciat<strong>in</strong>g<strong>the</strong> alarm conditions and logg<strong>in</strong>g <strong>the</strong> event with a data and timestamp.The alarm is usually identified as HiHi, High, Low, or LoLo toadvise about <strong>the</strong> alarm condition urgency. This identification does nottake <strong>in</strong>to account <strong>the</strong> current control state, such as start-up, normal,purge or shutdown. This results <strong>in</strong> many nuisance alarms.Discrete alarm systems also tend to po<strong>in</strong>t to <strong>the</strong> symptoms of anabnormal situation <strong>in</strong>stead of <strong>the</strong> cause. There is no capacity for reason<strong>in</strong>gabout <strong>the</strong> state of o<strong>the</strong>r alarm po<strong>in</strong>ts <strong>in</strong> <strong>the</strong> database.Expert systems represent an advancement <strong>in</strong> alarm management.Advanced alarm management concepts <strong>in</strong>clude a sensitivity to processstate, reason<strong>in</strong>g about alarm persistence, meta alarms, expanded alarmpriority and alarm <strong>in</strong>hibition. They also provide <strong>in</strong>telligent assistance <strong>in</strong>manag<strong>in</strong>g abnormal situations by def<strong>in</strong><strong>in</strong>g actions for alarm entry, acknowledgment,or exit.Expert systems can provide alarm management strategies that considerdynamic environments where alarm priority is dependent on processstate. For an alarm message to be generated, <strong>the</strong> entry conditionsmust be true and <strong>the</strong> process state must also be true. Alarm priority canbe configured to temporarily mask nuisance alarms.If a parent alarm is flagged as <strong>the</strong> root cause of <strong>the</strong> problem, itschild alarms, <strong>the</strong> symptoms of <strong>the</strong> root cause, are temporarily <strong>in</strong>hibitedbefore an alarm flood can occur. Parent-child alarm relationships can bedef<strong>in</strong>ed based on a fault-tree relationship that identifies <strong>the</strong> hierarchicalrelationship between alarm po<strong>in</strong>ts <strong>in</strong> <strong>the</strong> database.Alarm <strong>in</strong>hibition can be applied based on persistence, which is <strong>the</strong>frequency of an alarm entry condition with<strong>in</strong> a specified period. Thisprevents an alarm from be<strong>in</strong>g generated unless it occurs x times <strong>in</strong> atime period.When additional <strong>in</strong>formation on an alarm is required, a graphicaluser <strong>in</strong>terface (GUI) provides mouse button access to <strong>in</strong>formation about<strong>the</strong> events that caused <strong>the</strong> alarm or to an on-l<strong>in</strong>e manual that providesaccess to control strategies and corrective control procedures. This <strong>in</strong>formationmay be available <strong>in</strong> HTML or o<strong>the</strong>r document formats. Distributedembedded <strong>in</strong>telligence provides improved operator advice anddiagnostic <strong>in</strong>formation.Expert systems go beyond advisory systems and distributed em-©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemsbedded <strong>in</strong>telligence by implement<strong>in</strong>g actions based on conditions ofalarm entry, acknowledgment, and exit. An action may be def<strong>in</strong>ed foreach condition us<strong>in</strong>g a script<strong>in</strong>g language such as Visual Basic. Actionsmay <strong>in</strong>clude a text message, pag<strong>in</strong>g or e-mail through an <strong>in</strong>tegratedcommunications protocol such as Microsoft Exchange <strong>in</strong> <strong>the</strong> W<strong>in</strong>dowsNT environment.More robust supervisory control applications allow <strong>the</strong> expert systemto apply a corrective control strategy such as chang<strong>in</strong>g setpo<strong>in</strong>ts.Corrective actions may be applied upon alarm entry or after <strong>the</strong> alarmcondition is acknowledged.The migration of automation applications to W<strong>in</strong>dows NT allowsexpert system, OI, and distributed control system (DCS) applications toprovide application set-up and configuration us<strong>in</strong>g a GUI with familiarW<strong>in</strong>dows po<strong>in</strong>t-and-click functions. Intelligent alarm management softwarecan take advantage of <strong>the</strong> W<strong>in</strong>dows NT environment to configurealarm po<strong>in</strong>ts for entry and exit us<strong>in</strong>g predef<strong>in</strong>ed function blocks such asAND, OR, and NOT and drag-and-drop actions. This type of <strong>in</strong>tuitive<strong>in</strong>terface accelerates system acceptance while reduc<strong>in</strong>g time requirementsand costs for implementation and ma<strong>in</strong>tenance.A GUI lends itself to clearer, more effective message displays, annunciation,and <strong>in</strong>formation management. There is greater control overattributes of <strong>the</strong> operator display, <strong>in</strong>clud<strong>in</strong>g color conventions, fonts,persistence of alarms, and message behavior <strong>in</strong> terms of scroll<strong>in</strong>g, zoom<strong>in</strong>g,and filter<strong>in</strong>g.Po<strong>in</strong>t-and-click <strong>in</strong>terfaces lend <strong>the</strong>mselves to quick manipulationof alarm messages and process <strong>in</strong>formation. This <strong>in</strong>cludes click<strong>in</strong>g for<strong>in</strong>formation about a specific alarm po<strong>in</strong>t or group of alarms, filter<strong>in</strong>galarms accord<strong>in</strong>g to priority or group, and access<strong>in</strong>g o<strong>the</strong>r sources of<strong>in</strong>formation such as on-l<strong>in</strong>e manuals.Expert systems provide tools for alarm management and correctionof process disruptions. The migration of <strong>the</strong> process automation<strong>in</strong>dustry to W<strong>in</strong>dows NT is enabl<strong>in</strong>g solutions for data <strong>in</strong>tegration thatsupport a tighter <strong>in</strong>tegration of expert system applications with fieldlevel<strong>in</strong>strumentation, OIs, DCSs, and supervisory control and data acquisition(SCADA) systems (Figure 4-7).The OLE for Process <strong>Control</strong> (OPC) Foundation is support<strong>in</strong>g data<strong>in</strong>tegration by develop<strong>in</strong>g an open <strong>in</strong>terface standard. Intellution,Fisher-Rosemount, and Honeywell are build<strong>in</strong>g systems with <strong>the</strong> OLEand <strong>the</strong> DCOM protocols, which allow software components runn<strong>in</strong>g on©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 4-7. Intelligent alarm management with <strong>in</strong>tegrated control.different workstations to communicate.Intelligent alarm management systems, such as Comdale’sSmartWorkX Alarm Manager, fit <strong>in</strong>to an <strong>in</strong>tegrated control system. An<strong>in</strong>tegrated system can export historical data to bus<strong>in</strong>ess applicationssuch as spreadsheets or relational databases for use <strong>in</strong> failure analysisand preventive ma<strong>in</strong>tenance.The emergence of open data communication standards is elim<strong>in</strong>at<strong>in</strong>g<strong>the</strong> need for proprietary systems that bridge <strong>the</strong> gap between hardwareand software components produced by different manufacturers.The low cost and high performance of Intel-based systems and <strong>the</strong>iroperat<strong>in</strong>g systems, such as W<strong>in</strong>dows NT, are attractive to many newapplications <strong>in</strong>clud<strong>in</strong>g <strong>HVAC</strong> control. This creates more flexibility forcontrol solutions and reduces costs.Fault Tolerant SystemsAs <strong>the</strong> use of computer technology <strong>in</strong>creases, so does <strong>the</strong> need forhardy systems that ensure un<strong>in</strong>terrupted operations. Several suppliersoffer systems with fault tolerance. The basic way to manage a failure is©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemsto switch to an alternative component that cont<strong>in</strong>ues to function dur<strong>in</strong>ga failure. This redundancy is fundamental for a system that ei<strong>the</strong>r recoversfrom or masks failures. Redundancy can be passive or active. Thegoal is to recover from failures <strong>in</strong> passive redundant systems and tomask failures so that <strong>the</strong>y are transparent to <strong>the</strong> user <strong>in</strong> active redundantsystems.Passive RedundancyA passive redundant system provides access to alternative componentsthat are not associated with <strong>the</strong> current task and must be ei<strong>the</strong>ractivated or modified <strong>in</strong> some way to pick up <strong>the</strong> failed component’sload. The transition is noticeable and may even <strong>in</strong>terrupt service anddegrade system performance.Examples of passive redundant systems <strong>in</strong>clude standby serversand clustered systems. The mechanism for handl<strong>in</strong>g failures <strong>in</strong> passiveredundant systems is to switch over to an alternative server. The currentstate of <strong>the</strong> application may be lost, and <strong>the</strong> application may need to berestarted. The restart typically causes some <strong>in</strong>terruption or delay <strong>in</strong> serviceto <strong>the</strong> users.Passive solutions are offered by NCR, V<strong>in</strong>ca, Microsoft and Novelland active redundant systems are offered by Stratus/Ascend and Tandem/Compaq.All require that <strong>the</strong> OS and <strong>the</strong> application have specificknowledge of <strong>the</strong> system architecture to take advantage of redundancy.This means that <strong>the</strong> OS and applications must be modified.Systems that recover from failures use a s<strong>in</strong>gle system to run <strong>the</strong>application until a failure occurs. The detection of a failure may takeseveral seconds to several m<strong>in</strong>utes before <strong>the</strong> recovery process beg<strong>in</strong>s.In <strong>the</strong> simplest type of recovery system, an operator moves <strong>the</strong>disks from <strong>the</strong> failed system to ano<strong>the</strong>r system and boots <strong>the</strong> secondsystem. In more sophisticated systems, <strong>the</strong> second system has knowledgeof <strong>the</strong> application and users, it reboots <strong>the</strong> applications and logs on<strong>the</strong> users. In ei<strong>the</strong>r case <strong>the</strong>re is a pause <strong>in</strong> operation and a lose of data.Applications that have been modified to know <strong>the</strong> system architecturecan reboot automatically, provid<strong>in</strong>g a smoo<strong>the</strong>r recovery.Some automatic backup systems periodically copy certa<strong>in</strong> filesonto ano<strong>the</strong>r system that is <strong>the</strong>n rebooted if <strong>the</strong> first system fails. Theconfigurations are known as clusters. These clusters <strong>in</strong>clude standby©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>servers and computer arrays with fault-tolerant servers.In systems that use standby servers (Compaq) and cluster servers(Microsoft), <strong>the</strong> storage system is divided <strong>in</strong>to two parts, with each partdedicated to one of <strong>the</strong> servers. A SCSI bus between <strong>the</strong> two systemsprovides common access and <strong>the</strong> hard drives for both systems connectedto <strong>the</strong> bus (Figure 4-8).These simple cluster architectures provide a fail-over mechanismthat lets one processor take over for ano<strong>the</strong>r if a failure occurs. They arenot transparent to <strong>the</strong> user and do not provide cont<strong>in</strong>uous process<strong>in</strong>g.Ano<strong>the</strong>r type of cluster configuration uses a shared data architecture,which gives multiple computers access to <strong>the</strong> same disks. A faulttolerantfile system with universal access and a distributed lock managerare used for controll<strong>in</strong>g access to files and modify<strong>in</strong>g common files.These shared access clusters appeared <strong>in</strong> <strong>the</strong> early 1980s. Each server isconnected through a redundant high-speed hub or switch to each o<strong>the</strong>rserver (Figure 4-9). This configuration is used by Compaq.Active RedundancyAn active redundant system provides an alternative processorthat runs concurrently on <strong>the</strong> same task. Dur<strong>in</strong>g a failure it providescont<strong>in</strong>uous service without a noticeable <strong>in</strong>terruption. Because twoprocessors are manipulat<strong>in</strong>g <strong>the</strong> same data simultaneously, <strong>the</strong> failureof a s<strong>in</strong>gle component will be transparent to both <strong>the</strong> application and<strong>the</strong> user.Figure 4-8. Simple cluster configuration, Microsoft cluster server.©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open SystemsFigure 4-9. Shared-file cluster configuration.Systems that mask failures use parallel components. Each componentis capable of do<strong>in</strong>g <strong>the</strong> job. If one fails, <strong>the</strong> o<strong>the</strong>r cont<strong>in</strong>ues.The backup systems can be connected by some type of network connection,such as high-speed E<strong>the</strong>rnet. The data stored on <strong>the</strong> systemsare mirrored over this path which also carries heartbeat messagesfrom each system on <strong>the</strong>ir mutual status. This technique is used <strong>in</strong><strong>the</strong> V<strong>in</strong>ca cluster and <strong>in</strong> <strong>the</strong> Octopus backup system.Active redundant, fault-tolerant systems use at least two processorsand custom hardware <strong>in</strong> a fail-stop configuration (Figure 4-10).Two processors are used <strong>in</strong> microcycle lockstep with hardware comparisonlogic to detect an error <strong>in</strong> <strong>the</strong> output of <strong>the</strong> two systems.If <strong>the</strong> output disagrees, <strong>the</strong> system is stopped. Fail-stop systemsare used by Stratus and Tandem. A special OS manages faults, errors,and system synchronization. The applications that run on <strong>the</strong>se systemsrequire modifications <strong>in</strong> order to use <strong>the</strong> fault-tolerant features.Assured availability servers identify errors or failures before anydata become corrupt. These systems isolate errors or failures so <strong>the</strong>y©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 4-10. Fail-stop CPUs.can cont<strong>in</strong>ue to operate <strong>in</strong> <strong>the</strong> presence of <strong>the</strong> error or failure. Thefailed component can be repaired while <strong>the</strong> system is <strong>in</strong> operation.Disaster-tolerant SystemsLocal disaster-tolerant systems site redundant parts of <strong>the</strong> system<strong>in</strong> different locations with<strong>in</strong> a build<strong>in</strong>g or build<strong>in</strong>g complex. Physicalfirewalls are used to separate <strong>the</strong> redundant components.Remote disaster-tolerant systems place redundant parts of <strong>the</strong> systemmore than a mile apart. Commercial systems, such as <strong>the</strong> passiveredundant clusters from Compaq, provide data and hot-standby capabilitiesover a distance of several miles.Information TechnologyThe <strong>in</strong>formation technology (IT) revolution that has been tak<strong>in</strong>gplace <strong>in</strong> offices is rapidly mov<strong>in</strong>g <strong>in</strong>to build<strong>in</strong>g operations. This revolutionis now on its way to control systems as well as sensors and actuators.The technology is robust, fast, easy to use, and ready to run build<strong>in</strong>gsand plants. Users can now reap <strong>the</strong> benefits of this <strong>in</strong>expensive yetpowerful technology.Several key enablers are push<strong>in</strong>g <strong>the</strong> technology <strong>in</strong>to automation.Widespread Internet availability provides a universal <strong>in</strong>formation deliv-©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemsery mechanism. Internet and Intranet technologies provide <strong>the</strong> backbonefor distributed <strong>in</strong>formation and control system architectures that growwith <strong>the</strong> use of object-based applications.Objects and components play an important role support<strong>in</strong>g <strong>the</strong>distributed architecture that Internet technology provides. Object technologieslet users achieve effective models of <strong>the</strong> processes under controland reduce <strong>the</strong> time needed to implement new systems. They dothis by creat<strong>in</strong>g libraries of component models that are easy to use andreuse which allows projects to grow and prosper.These modular, objects allow <strong>in</strong>cremental improvements <strong>in</strong> <strong>the</strong>control system without hav<strong>in</strong>g to reconfigure <strong>the</strong> complete system. In<strong>the</strong> future object-oriented tools will expose even greater benefits as <strong>the</strong>next generation of object-based control systems develops.Mass-market TechnologyInstead of us<strong>in</strong>g proprietary architectures, products based on massmarketbus<strong>in</strong>ess operat<strong>in</strong>g systems and development tools tend to leverage<strong>the</strong> large exist<strong>in</strong>g <strong>in</strong>stalled base. Many human mach<strong>in</strong>e <strong>in</strong>terface(HMI) products rely on Visual Basic <strong>in</strong>stead of <strong>the</strong>ir own script<strong>in</strong>g languageto save costs.The closed, proprietary nature of automation is mostly <strong>in</strong> <strong>the</strong> past.Open solutions provides easily <strong>in</strong>tegrated packages from differentsources. Open control overcomes <strong>the</strong> limitations of proprietary systemsfrom s<strong>in</strong>gle sources.Many distributed control system (DCS) suppliers provide a W<strong>in</strong>dowsNT-based system. Software suppliers provide soft DCS systemsand control solutions based on PC-based architectures and open-network<strong>in</strong>gprotocols. GM has already tested NT real-time extensions tovalidate <strong>the</strong>ir performance and reliability. The new breed of open-architecturecontrol systems is based on PC control.NT - De facto StandardThis revolution <strong>in</strong>cludes Microsoft’s W<strong>in</strong>dows NT emergence as ade facto standard for operator <strong>in</strong>terfaces and for PC-based control. W<strong>in</strong>dowsproducts are appear<strong>in</strong>g <strong>in</strong> a wide range of scalable configurations,©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>rang<strong>in</strong>g from devices to plantwide data servers. W<strong>in</strong>dows 2000 is designedto replace NT as a crashproof network<strong>in</strong>g system. The W<strong>in</strong>dows<strong>Millennium</strong> Edition (ME) should be <strong>the</strong> new personal operat<strong>in</strong>g system.It should have many features that were promised but lack<strong>in</strong>g <strong>in</strong> W<strong>in</strong>dows98. Microsoft also has its W<strong>in</strong>dows Distributed InterNet Applicationsarchitecture, which <strong>in</strong>tegrates Web and client/server comput<strong>in</strong>g.W<strong>in</strong>dows CE is evolv<strong>in</strong>g as <strong>the</strong> platform of choice for embeddedHMIs and controllers. Microsoft’s component object model (COM) anddistributed component object model (DCOM) are <strong>the</strong> glue that holdssystems toge<strong>the</strong>r.Sun Microsystems is also mak<strong>in</strong>g an impact <strong>in</strong> <strong>the</strong> automation areawith Java and <strong>the</strong> potential of software that can be written once and runanywhere. Sun supports control systems with its Java <strong>Control</strong> and AutomationFramework <strong>in</strong>itiative. Java-based browsers and componentsare also available for automation. In <strong>the</strong> embedded controller area <strong>the</strong>reis EmbeddedJava and PersonalJava. There is a range of standard productswith real-time extensions to W<strong>in</strong>dows NT and CE, Java, and OLEfor process control (OPC).The Object Management Group (OMG) has a standard for distributedobject comput<strong>in</strong>g called CORBA (Common Object Request BrokerArchitecture). CORBA competes with Microsoft’s DCOM. The CORBAmodel was used by Foxboro to develop <strong>the</strong> Foxboro I/A Object Manager.Ano<strong>the</strong>r trend <strong>in</strong>volves Enterprise Java Beans (EJB). Distributedapplicationsprogramm<strong>in</strong>g is becom<strong>in</strong>g an enabler of Internet technology.All of this advances Object-oriented Remote Procedure Call (ORPC)programm<strong>in</strong>g which is a programm<strong>in</strong>g model that allows developers toeasily create distributed applications.The <strong>in</strong>creased <strong>in</strong>terest <strong>in</strong> distributed-application programm<strong>in</strong>g co<strong>in</strong>cideswith <strong>the</strong> growth of <strong>the</strong> Internet. Technologies such as DCOM,CORBA and EJB use <strong>the</strong> notion of location transparency.This is an abstraction that allows a programmer to call on an objectwithout know<strong>in</strong>g where that object actually resides. Programmers areallowed to program <strong>in</strong> <strong>the</strong> context of a familiar model. DCOM def<strong>in</strong>eswhat an object is at a b<strong>in</strong>ary level.Object-oriented programm<strong>in</strong>g is superior over earlier developmentmethods s<strong>in</strong>ce it simplifies <strong>the</strong> development of complex applications.Object-oriented programs communicate by send<strong>in</strong>g messages betweendifferent objects. It takes at least one physical network round-trip to©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemstransmit a message.The current trend of adopt<strong>in</strong>g E<strong>the</strong>rnet for <strong>in</strong>dustrial applicationsgrows and many control applications will leverage exist<strong>in</strong>g desktop andnetwork<strong>in</strong>g technologies to become affordable. Automation systemsmust also easily <strong>in</strong>terface to bus<strong>in</strong>ess systems, which are based on openstandards.The growth of open component-based systems shows <strong>the</strong> importanceof open standards. A common framework allows users to choose<strong>the</strong> best comb<strong>in</strong>ation of software modules. At <strong>the</strong> control level, this occurredwhen PLC suppliers added E<strong>the</strong>rnet connectivity and new opencontroller architectures based on common PC hardware. O<strong>the</strong>r trends<strong>in</strong>clude Java-based control systems and <strong>the</strong> cont<strong>in</strong>ued development ofOPC <strong>in</strong>terfaces.E<strong>the</strong>rnet UseIn <strong>the</strong> area of networks, <strong>the</strong>re is <strong>the</strong> trend towards us<strong>in</strong>g E<strong>the</strong>rnetfor plant control applications. This low-cost, reliable technology br<strong>in</strong>gs<strong>the</strong> benefits of us<strong>in</strong>g E<strong>the</strong>rnet <strong>in</strong> areas beyond its traditional bus<strong>in</strong>essapplications. The total <strong>in</strong>frastructure <strong>in</strong>cludes Internet/Intranet networkswith E<strong>the</strong>rnet at <strong>the</strong> control level.With its speed, performance, low cost of development, and constantlyupdated technology, E<strong>the</strong>rnet is a good fit at <strong>the</strong> control level. Ithas <strong>the</strong> ability to communicate with multiple devices and manage <strong>the</strong>traffic to <strong>the</strong> <strong>in</strong>formation level of <strong>the</strong> plant.<strong>New</strong> technologies allow E<strong>the</strong>rnet to be adopted <strong>in</strong> control networkapplications. These <strong>in</strong>clude low-cost E<strong>the</strong>rnet switch<strong>in</strong>g hubs.The move towards more open systems <strong>in</strong>cludes <strong>the</strong> use of E<strong>the</strong>rnetas a control network. Fisher-Rosemount’s DeltaV system uses standardE<strong>the</strong>rnet as <strong>the</strong> control network between user workstations and controllers.A redundant E<strong>the</strong>rnet capability is provided us<strong>in</strong>g dual-portE<strong>the</strong>rnet cards.Foxboro was one of <strong>the</strong> first to adopt <strong>the</strong> use of <strong>the</strong> IEEE 802.3E<strong>the</strong>rnet specification as <strong>the</strong> backbone of a control system. In its I/Aseries system, Foxboro first modified <strong>the</strong> protocols to optimize <strong>the</strong> IEEE802.3 as a control bus. Then Foxboro offered standard E<strong>the</strong>rnet protocolsand components as an option.West<strong>in</strong>ghouse provides an open control system with its Ovation©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>product. Ovation uses a scaled architecture to provide <strong>the</strong> flexibilityneeded for small- to very-large-scale systems. At <strong>the</strong> lower end of thisscale, Ovation can use standard E<strong>the</strong>rnet products as <strong>the</strong> backbone of<strong>the</strong> control network. O<strong>the</strong>r companies like GE Fanuc and SchneiderAutomation use E<strong>the</strong>rnet to network PLCs. Foundation Fieldbus can beadapted to use E<strong>the</strong>rnet and <strong>the</strong> Internet protocols.E<strong>the</strong>rnet BenefitsE<strong>the</strong>rnet TCP/IP is a network technology that is sold <strong>in</strong> high volumeall over <strong>the</strong> world. The grow<strong>in</strong>g acceptance of standard hardwareand <strong>the</strong> W<strong>in</strong>dows NT operat<strong>in</strong>g system <strong>in</strong>creases E<strong>the</strong>rnet’s chances ofbecom<strong>in</strong>g <strong>the</strong> backbone of many future control and device networks.E<strong>the</strong>rnet is already compatible with exist<strong>in</strong>g <strong>in</strong>dustry-standard PChardware and operat<strong>in</strong>g systems. Many PCs <strong>in</strong>clude E<strong>the</strong>rnet <strong>in</strong>terfaces.W<strong>in</strong>dows NT is becom<strong>in</strong>g <strong>the</strong> <strong>in</strong>dustry standard operat<strong>in</strong>g system forPCs and workstations and it has built-<strong>in</strong> E<strong>the</strong>rnet drivers.E<strong>the</strong>rnet TCP/IP provides connectivity to <strong>the</strong> Internet and is mov<strong>in</strong>g<strong>in</strong>to more applications <strong>in</strong> automation and control. Devices on anE<strong>the</strong>rnet TCP/IP network need only to be assigned an IP address forInternet connectivity.Distributed applications must contend with an abundance of failurepossibilities. In contrast to older applications that run a s<strong>in</strong>gle processon a s<strong>in</strong>gle computer, a distributed application has multiple potentialpo<strong>in</strong>ts of failure. Distributed applications must contend with networkbrownouts, server crashes and operat<strong>in</strong>g system failures. The commonpo<strong>in</strong>t of failure becomes <strong>the</strong> transmission and receipt of messagesbetween <strong>the</strong> components of <strong>the</strong> distributed application.An operat<strong>in</strong>g system is needed that facilitates <strong>the</strong> reliable transmissionand receipts of messages. If <strong>the</strong> operat<strong>in</strong>g system could provide anadditional level of <strong>in</strong>direction <strong>in</strong> <strong>the</strong> form of a queue, <strong>the</strong>n a number ofo<strong>the</strong>r problems such as load balanc<strong>in</strong>g, prioritization, and disconnectedoperation could be taken care of.The operat<strong>in</strong>g system service <strong>in</strong> <strong>the</strong> W<strong>in</strong>dows NT environment thatfacilitates <strong>the</strong> reliable exchange of messages <strong>in</strong> a distributed environmentis Microsoft Message Queue Server (MSMQ). MSMQ provides amethod to locate queues that exchange messages us<strong>in</strong>g various messag<strong>in</strong>gguarantees. Security is important <strong>in</strong> distributed applications and <strong>the</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemsunderly<strong>in</strong>g security <strong>in</strong>frastructure <strong>in</strong> MSMQ makes it possible to develop<strong>the</strong> message <strong>in</strong>frastructure.Message StructureMSMQ mirrors much of <strong>the</strong> Internet. Internet e-mail uses Doma<strong>in</strong>Name Service (DNS) as a directory service for name lookups. Directoryservices operate with<strong>in</strong> a def<strong>in</strong>ed scope, much as a telephone directoryis valid only for a given town or city.Multiple copies of <strong>the</strong> MSMQ are stored <strong>in</strong> different computersthroughout <strong>the</strong> system. In a busy network, <strong>the</strong> directory service caneasily be overwhelmed by lookup requests <strong>in</strong>to multiple sites. Each sitehas its own copy of <strong>the</strong> site controller, which provides load-balanc<strong>in</strong>gand fail-over schemes.Messag<strong>in</strong>gDistributed applications pass messages between computers, ei<strong>the</strong>rsynchronously or asynchronously. With a synchronous exchange, both<strong>the</strong> sender and <strong>the</strong> receiver must be runn<strong>in</strong>g at <strong>the</strong> same time.Examples of queues occur <strong>in</strong> e-mail <strong>in</strong>-boxes. Messages arrive periodically,and you can respond to each as you see fit. You can view <strong>the</strong>m<strong>in</strong> this queue.In MSMQ’s recoverable delivery option a message is copied to adisk queue, guarantee<strong>in</strong>g <strong>the</strong> message will not be lost. The MSMQ <strong>in</strong>frastructureis responsible for deliver<strong>in</strong>g <strong>the</strong> message. Transactionalthroughput is controlled by keep<strong>in</strong>g transactions as brief as possible.SecurityMSMQ supports secure transmission of messages. This <strong>in</strong>volveslimit<strong>in</strong>g access to that <strong>in</strong>formation. Au<strong>the</strong>ntication verifies <strong>the</strong> identityof <strong>the</strong> sender. Encryption ensures that <strong>the</strong> message cannot be read byauthorized receivers. MSMQ supports au<strong>the</strong>nticated and encryptedmessages.The two general encryption schemes <strong>in</strong> use today are symmetricand asymmetric. Symmetric encryption schemes use <strong>the</strong> same key for©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>encryption and decryption, while asymmetric encryption schemes usedifferent keys.Both schemes rely on <strong>the</strong> strength of <strong>the</strong> key be<strong>in</strong>g subject to publicscrut<strong>in</strong>y by <strong>the</strong> cryptographic community. The ma<strong>in</strong> advantage of symmetricencryption schemes is <strong>the</strong> speed with which clear text can beconverted to or from cipher text. Symmetric encryption operates almost1000 times as fast as asymmetric encryption.Asymmetric encryption schemes use public/private key pairs.They utilize a def<strong>in</strong>ed ma<strong>the</strong>matical relationship between <strong>the</strong> public andprivate keys. The ma<strong>in</strong> drawback to us<strong>in</strong>g asymmetric schemes is <strong>the</strong>high computational load of <strong>the</strong> encryption/decryption algorithms.MSMQ uses a comb<strong>in</strong>ation of asymmetric and symmetric encryptionschemes to encrypt <strong>the</strong> body of <strong>the</strong> message. Asymmetric encryptionis used to ensure <strong>the</strong> <strong>in</strong>tegrity of <strong>the</strong> transfer of <strong>the</strong> symmetric key.The MSMQ Queue Manager generates a random symmetric keyand uses it to encrypt <strong>the</strong> body of a message. It must also guarantee <strong>the</strong>au<strong>the</strong>nticity of any public key used. Digital certificates are commonlyuse to solve this problem. If messages conta<strong>in</strong> sensitive <strong>in</strong>formation,<strong>the</strong>y should be both au<strong>the</strong>ntic and encrypted to prevent eavesdropp<strong>in</strong>gor tamper<strong>in</strong>g while <strong>the</strong>y are <strong>in</strong> transit.Direct Digital <strong>Control</strong>Direct digital control (DDC) technology is constantly chang<strong>in</strong>g. In<strong>the</strong> past several years, <strong>the</strong>re has been a race between controls companiesto provide lead<strong>in</strong>g edge hardware and software. Many build<strong>in</strong>g siteshave been converted to or built with direct digital control systems.Most systems are very close to each o<strong>the</strong>r <strong>in</strong> performance. Thelatest movement has been towards <strong>the</strong> ability to easily transfer DDCsystem <strong>in</strong>formation <strong>in</strong>to desktop software packages for data accumulationand process<strong>in</strong>g.The program is an <strong>in</strong>herent part of <strong>the</strong> system. If <strong>the</strong> computer isnot programmed to str<strong>in</strong>gent eng<strong>in</strong>eer<strong>in</strong>g practices, <strong>the</strong> DDC system canbe a liability ra<strong>the</strong>r than an asset. There are many DDC systems <strong>in</strong> usethat have no or little user <strong>in</strong>terface, that function with no comfort problems,and are cost effective. This is because <strong>the</strong>y are quite <strong>in</strong>telligent. Thesystem was designed specifically for a particular build<strong>in</strong>g and functionswell under all conditions. Users can make setpo<strong>in</strong>t adjustments without©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemscomputer <strong>in</strong>terface. With <strong>in</strong>telligent feedback programm<strong>in</strong>g, ma<strong>in</strong>tenancepersonnel are freed from tun<strong>in</strong>g and modify<strong>in</strong>g automation systemson a seasonal basis. Tasks such as ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g mechanical components,scheduled ma<strong>in</strong>tenance, and learn<strong>in</strong>g exist<strong>in</strong>g build<strong>in</strong>g deficienciescan become ma<strong>in</strong>tenance priorities. In a truly <strong>in</strong>telligent program<strong>the</strong>re are no feedforward anticipated schedules, switches, or need forowner <strong>in</strong>tervention to change setpo<strong>in</strong>ts and tune loops constantly.There will be less overall user <strong>in</strong>terface errors that are commonwhen operators must scan programs. There are no po<strong>in</strong>ts locked <strong>in</strong>manual s<strong>in</strong>ce <strong>the</strong> system no longer requires a user to lock th<strong>in</strong>gs out oradjust for problem conditions.Feedforward ErrorsErrors that occur from feedforward <strong>in</strong>stead of feedback programm<strong>in</strong>gresult <strong>in</strong> higher ma<strong>in</strong>tenance costs. Feedforward error conditions<strong>in</strong>clude chang<strong>in</strong>g summer/w<strong>in</strong>ter switches <strong>in</strong> software and tun<strong>in</strong>g controlparameters too often or on a seasonal basis.Shutt<strong>in</strong>g off boilers and <strong>the</strong>n turn<strong>in</strong>g <strong>the</strong>m back on when <strong>the</strong>wea<strong>the</strong>r unexpectedly cools down is ano<strong>the</strong>r one of <strong>the</strong>se problems.Chang<strong>in</strong>g outdoor air, boiler and radiation schedules and resett<strong>in</strong>gfreeze stats also occur too often.Modify<strong>in</strong>g programm<strong>in</strong>g for cool<strong>in</strong>g unit cycl<strong>in</strong>g is a similar problemalong with answer<strong>in</strong>g cold compla<strong>in</strong>ts from cool<strong>in</strong>g cycl<strong>in</strong>g due tounstable operation and answer<strong>in</strong>g too-warm compla<strong>in</strong>ts for s<strong>in</strong>gle-stagegas valves overshoot<strong>in</strong>g. Cool<strong>in</strong>g units can be damaged from <strong>in</strong>correctoperation and outdoor temperature and boiler loops can fight with cool<strong>in</strong>gloops from feedforward error. Cold compla<strong>in</strong>ts <strong>in</strong> build<strong>in</strong>g <strong>in</strong>teriorscan occur from shutt<strong>in</strong>g down boilers from feedforward programm<strong>in</strong>g.Check<strong>in</strong>g software for bugs and <strong>the</strong> causes for <strong>in</strong>correct operationsunder specific conditions are also common occurrences withfeedforward programm<strong>in</strong>g.DDC and Object TechnologyDDC moves at a rapid rate and many upgrades are based on <strong>the</strong>performance results of o<strong>the</strong>r field applications. The Visual Icon DesignMethod (VIDM) is derived from flow chart<strong>in</strong>g and desktop publish<strong>in</strong>g.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>It uses desktop computer technology to associate control system iconswith a programm<strong>in</strong>g scheme to form objects. These objects haveprewritten, generic code that provide <strong>the</strong> sequence of control operations.This allows standardized cod<strong>in</strong>g and forms an object library. It clarifies<strong>the</strong> sequence of operations and displays how to achieve it. This providesa framework for standard programm<strong>in</strong>g across many vendors as well asbetter comprehension of <strong>the</strong> program from various levels. Graphic realtimediagnostics are possible <strong>in</strong> a graphic environment, us<strong>in</strong>g objectflowcharts as a diagnostic real-time graphic.The newer software is eng<strong>in</strong>eered for exception entry and requiresless work to ma<strong>in</strong>ta<strong>in</strong> operations. Audio and video enhancements <strong>in</strong> <strong>the</strong>future will make it easy to catalog equipment and describe ma<strong>in</strong>tenanceprocedures. The trend <strong>in</strong> ma<strong>in</strong>tenance management will be towardsproducts that are easily modified.Open Protocol IssuesNatural forces will def<strong>in</strong>e <strong>the</strong> future of open protocols. The termopen protocol refers to a standard communication format based on <strong>the</strong>exchange of specific modular decisions, which are also called objects,between control systems manufactured by unrelated companies.Ideally, this could allow open competitive bidd<strong>in</strong>g even on largeprojects that may occur over several years. The concept of open systemsorig<strong>in</strong>ated <strong>in</strong> <strong>the</strong> mid-1980s, due to <strong>the</strong> f<strong>in</strong>ancial and operational impactsof evolv<strong>in</strong>g build<strong>in</strong>g automation systems (BAS). Advances <strong>in</strong> microprocessortechnology and <strong>the</strong> new applications of term<strong>in</strong>al unit controllersfor small <strong>HVAC</strong> systems, chillers, unit ventilators, and VAV systems,def<strong>in</strong>ed rapid advancements and new products that rarely communicatedwith previous controllers.GatewaysThe need to support exist<strong>in</strong>g systems lead to expensive approachesto close <strong>the</strong> communication gaps with communication gateway devices.These are communication translators and multi-vendor protocol hostsoftware systems. They provide central host software functions whilecommunicat<strong>in</strong>g with controller networks us<strong>in</strong>g dedicated communica-©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemstion ports and software drivers. These gateways and drivers are relativelyexpensive. All features are provided <strong>in</strong> <strong>the</strong> drivers and must beupdated when one of <strong>the</strong> manufacturer’s products changes.S<strong>in</strong>ce <strong>the</strong> manufacturers of build<strong>in</strong>g automation systems approached<strong>the</strong>ir products and features differently, <strong>the</strong>se proprietary systemshad strengths and weaknesses that made <strong>the</strong>m more appropriateand competitive for specific applications.End-users preferred <strong>the</strong> products <strong>the</strong>y had experienced, because<strong>the</strong>y have been tra<strong>in</strong>ed to make <strong>the</strong>se products work. The costs of tra<strong>in</strong><strong>in</strong>gfor multiple systems, spare parts ma<strong>in</strong>tenance, along with employeeturnover, cause multiple-system applications to be less desirable.Users desire a standard method that ensures unrelated productscan communicate with each o<strong>the</strong>r under a competitive bid structure.One problem is that systems already <strong>in</strong>stalled will not easily or completelybecome compatible without gateways, software drivers, or replacement.Build<strong>in</strong>gs often have exist<strong>in</strong>g computer networks that can beused as a communication medium for <strong>the</strong> build<strong>in</strong>g automation system.ProtocolsThe Build<strong>in</strong>g Automation <strong>Control</strong>s Network (BACnet) protocolwas developed by ASHRAE. BACnet is a multi-layer Open System Interconnection(OSI) basic reference model. It is a set of rules that allowsunrelated manufacturers to communicate <strong>in</strong> predef<strong>in</strong>ed data packets.The GSA has made BACnet a requirement <strong>in</strong> <strong>the</strong>ir build<strong>in</strong>gs. Early concernsabout large data packet transfers under BACnet have been provenunwarranted.Ano<strong>the</strong>r protocol is <strong>the</strong> Local Operators Network (LonTalk) whichwas developed by Echelon and implemented on an <strong>in</strong>tegrated circuitcalled <strong>the</strong> neuron chip. In <strong>the</strong> chip are three microprocessors. Two areused for network<strong>in</strong>g and one for application-specific tasks <strong>in</strong> controldevices.Open <strong>Control</strong> DevicesThermocouples are one type of control device. Biodata’s TC15-Lonis designed to monitor temperatures. Provid<strong>in</strong>g 15 channels, it connectsto a LonWorks network us<strong>in</strong>g 4-wire telephone cable which carries both©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>low voltage DC power and data. The unit reads temperatures andchecks whe<strong>the</strong>r <strong>the</strong>y are changed s<strong>in</strong>ce <strong>the</strong> last read<strong>in</strong>g. It passes anynew data to <strong>the</strong> PC, with <strong>in</strong>stant notification of alarm conditions. S<strong>in</strong>ceit only transmits changed data, <strong>the</strong> network traffic is m<strong>in</strong>imized. You canmove <strong>the</strong> device around without worry<strong>in</strong>g about where it is on <strong>the</strong>network. It always identifies itself.The device comprises an <strong>in</strong>telligent iso<strong>the</strong>rmal box. It has 30 screwterm<strong>in</strong>als for connect<strong>in</strong>g <strong>the</strong> <strong>the</strong>rmocouple wires, a sensor to measure<strong>the</strong> temperature of <strong>the</strong> unit (<strong>the</strong> cold junction sensor), an A-D converterand a processor. It can handle B, E, J, K, N, R, S and T type <strong>the</strong>rmocouples.A W<strong>in</strong>dows software package called W<strong>in</strong>dmill is <strong>in</strong>cluded with <strong>the</strong>system. It provides data logg<strong>in</strong>g, chart<strong>in</strong>g, output control and real-timel<strong>in</strong>ks to o<strong>the</strong>r software. A distributed <strong>the</strong>rmocouple system can <strong>in</strong>crease<strong>the</strong> accuracy of temperature measurements. Resistance temperature devices(RTDs) are also available as Lon units.Open Build<strong>in</strong>g <strong>Control</strong>sAs standards of open <strong>in</strong>teroperability cont<strong>in</strong>ue to evolve, somebuild<strong>in</strong>g control systems promise compliance with several standards.Siebe Environmental <strong>Control</strong>s has <strong>the</strong>ir I/A Series with flexibility andscalability <strong>in</strong> LonMark and LonWorks controllers. WorkPlace is used as<strong>the</strong> Human Mach<strong>in</strong>e Interface (HMI). Based on Wonderware, WorkPlaceprovides s<strong>in</strong>gle seat control of build<strong>in</strong>g systems. The system is optimizedand configured us<strong>in</strong>g an <strong>in</strong>tegrat<strong>in</strong>g driver with <strong>the</strong> Tech Suite or by add<strong>in</strong>gcapabilities through Microsoft Active XCOM object technologies.The Lon Network <strong>Control</strong>ler provides connectivity, alarm<strong>in</strong>g, timeof day schedule optimization, ma<strong>in</strong>tenance rem<strong>in</strong>ders and global <strong>in</strong>formationmanagement. The Tech Suite module uses graphical layout andpresentation technology, comb<strong>in</strong>ed with <strong>the</strong> <strong>in</strong>tuitive assistance of VISIO.The MicroNet controller family allows tailor<strong>in</strong>g of <strong>the</strong> control strategy.As technologies move forward, <strong>the</strong>y should rema<strong>in</strong> focused onbackward compatibility to assure that users have an opportunity to takeadvantage of <strong>the</strong>ir <strong>in</strong>stalled <strong>in</strong>frastructure. Connectivity rang<strong>in</strong>g fromdial-up PBX, to full <strong>in</strong>tegration at <strong>the</strong> workstation and control systemlevels are expected by today’s build<strong>in</strong>g owner. The I/A Series addresses<strong>the</strong>se requirements and provides client/server functionality through©2001 by The Fairmont Press, Inc. All rights reserved.


Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open SystemsW<strong>in</strong>dows and NT. With dial-<strong>in</strong> and auto-dial telecommunication twistedpair or th<strong>in</strong>net connections can be used.W<strong>in</strong>dows <strong>Control</strong> SoftwareWonderware uses Microsoft W<strong>in</strong>dows for <strong>the</strong>ir human-mach<strong>in</strong>e<strong>in</strong>terface (HMI) software. Wonderware software <strong>in</strong>cludes InTouch as a(HMI) for visualization, In<strong>Control</strong> for W<strong>in</strong>dows NT-based control andScout as an Internet/Intranet tool for remote data view<strong>in</strong>g.InTouch provides a s<strong>in</strong>gle <strong>in</strong>tegrated view of all control and <strong>in</strong>formationresources. It allows operators to view and <strong>in</strong>teract with <strong>the</strong>work<strong>in</strong>gs of an entire operation us<strong>in</strong>g graphical representations. It <strong>in</strong>cludesremote tag referenc<strong>in</strong>g, ActiveX support, distributed alarm handl<strong>in</strong>g,and distributed historical data. Individual alarms help users toquickly identify rules that were violated. Users can track corrective actionsand set limits on <strong>the</strong> fly. A high-speed communications protocol,based on TCP/IP, is used to provide performance-optimized data communication<strong>in</strong> <strong>the</strong> W<strong>in</strong>dows NT environment for real-time, peer-to-peercommunications.In<strong>Control</strong> is an NT-based real-time open architecture control systemthat allows <strong>the</strong> user to design, test and run application programs forcontroll<strong>in</strong>g a process. Direct <strong>in</strong>terfaces to a variety of I/O devices, motors,sensors, and o<strong>the</strong>r equipment are available.The Internet visualization module acts as a web server add-on andclient browser that allows read-only remote view<strong>in</strong>g of data and visualobjects over <strong>the</strong> Internet/Intranet. In <strong>the</strong> client or browser mode, visualobjects can be viewed from <strong>the</strong> server us<strong>in</strong>g a standard browser. Thesoftware extends a browser’s capability by provid<strong>in</strong>g a set of userconfigurableActiveX objects such as graphs, charts, and trend elementsthat can be dynamically l<strong>in</strong>ked to <strong>the</strong> data. In <strong>the</strong> server mode a set ofweb server components runs on Microsoft’s Internet Information Server(IIS) and l<strong>in</strong>ks applications to <strong>the</strong> Internet.Build<strong>in</strong>g managers may soon see <strong>the</strong>ir roles expand<strong>in</strong>g with <strong>the</strong>responsibilities for all electrical systems. Just as <strong>the</strong> division betweentelephone and <strong>in</strong>formation systems has largely disappeared, processcontrol and facilities management are also headed for closer l<strong>in</strong>ks tocomputer networks. This convergence between applications is madepossible by open systems that can control manufactur<strong>in</strong>g equipment,©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>elevators, heat<strong>in</strong>g and cool<strong>in</strong>g systems, generators, security and firesystems, pumps, park<strong>in</strong>g lot gates, and o<strong>the</strong>r electrical systems through<strong>in</strong>telligent devices connected to that equipment.ReferencesBernardi, and Brent S. and Dan R. Epperson, “I/A Series, EnterprisewideOpen, Interoperable Solutions, Today and Beyond,” SchoolPlann<strong>in</strong>g and Management, Vol. 38, No. 1, pp. 22-24.Cleaveland, Peter, “Motion and Position <strong>Control</strong> <strong>in</strong> <strong>the</strong> 21st Century,”Instrumentation & <strong>Control</strong> Systems, Vol. 73 No. 1, January 2000, pp.21-28.Gl<strong>in</strong>ke, Timothy J., “The Open Protocol Choice: a Market’s Decision <strong>in</strong>Process,” Air Condition<strong>in</strong>g, Heat<strong>in</strong>g & Refrigeration <strong>New</strong>s, Vol. 202No. 6, October 6, 1997, pp. 6-9.Gloriso, Robert, “Tolerant to a Fault,” Industrial Comput<strong>in</strong>g, Vol. 18 No.11, October 1999, pp. 29-33.Hawman, Chris, “Intelligent Alarm Management Saves Industry $$$,”InTech, Vol. 44 No. 10, October 1997, pp. 34-36.Lam, John, “Improv<strong>in</strong>g <strong>the</strong> Performance of Distributed Applications,”PC Magaz<strong>in</strong>e, Vol. 18 No. 3, pp. 247-253.Liptak, Bela A., Editor-<strong>in</strong>-chief, Instrument Eng<strong>in</strong>eers’ Handbook, RevisedEdition, Chilton Book Company: Radnor, PA, 1982.Liptak, Bela A., Editor-<strong>in</strong>-chief, Instrument Eng<strong>in</strong>eers’ Handbook, 3rd Edition,Chilton Book Company: Radnor, PA, 1995.Oshoway, David, “An Overview of Direct Digital Technology,” Air Condition<strong>in</strong>g,Heat<strong>in</strong>g & Refrigeration <strong>New</strong>s, Vol. 202 No 7, October 13,1997, pp. 14-17.Phillips, Ken, “First Telephones, Now Lights,” PC Week, Vol. 16 No. 17,April 26, 1999, pp. 77-78.Risse, Lori and Greg Vonada, “High Accuracy Temperature Measurements:Are They Worth <strong>the</strong> Investment?,” Instrumentation and <strong>Control</strong>Systems, Vol. 72 No. 6, June 1999, pp. 31-34.Thompson, William E., and Richard H. Caro, “IT Revolution ReachesIndustrial Automation,” <strong>Control</strong> Platforms (Special Supplement toIndustrial Comput<strong>in</strong>g), October 1998, pp. 24-27.Internet: www.microl<strong>in</strong>k.co.uk/tc15lon.html, “Distributed TemperatureMeasurement Us<strong>in</strong>g Thermocouples or RTDs and LonWorks Network,”February 22, 2000, pp. 1-2.©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trends 173Chapter 5PC-based <strong>Control</strong>,Software and Bus Trends-based control is becom<strong>in</strong>g a ma<strong>in</strong>stream technology,PCyet <strong>the</strong>re is still some controversy between programmablelogic controller (PLC) manufacturers and PCbasedcontrol suppliers on <strong>the</strong> use of PC-based controltechnology. PC-based control is much more than simply emulat<strong>in</strong>g aPLC on a PC. PC-based control systems us<strong>in</strong>g only traditional PLC programm<strong>in</strong>glanguages realize only part of <strong>the</strong> technology’s real benefits.These benefits <strong>in</strong>clude <strong>the</strong> <strong>in</strong>tegration of <strong>the</strong> control system <strong>in</strong>to a s<strong>in</strong>gletag database.This <strong>in</strong>tegration comb<strong>in</strong>es <strong>the</strong> functions of logic control, programm<strong>in</strong>g,operator <strong>in</strong>terfaces, supervisory data collection and enterprise<strong>in</strong>terface <strong>in</strong> a s<strong>in</strong>gle platform. A common tag database among each of <strong>the</strong>functions elim<strong>in</strong>ates multiple databases and <strong>the</strong> data communicationconfiguration needed for multiple components. Ano<strong>the</strong>r major benefit is<strong>the</strong> ability to use off-<strong>the</strong>-shelf PC hardware and software. PC-basedcontrol offers a lower-cost control solution and cont<strong>in</strong>uous efficiencyimprovements.Data connectivity between applications on <strong>the</strong> same or differentplatforms is possible through <strong>in</strong>terfaces such as OLE for control (OPC),distributed communications and dynamic data exchange. OLE standsfor object l<strong>in</strong>k<strong>in</strong>g and embedd<strong>in</strong>g.Object ConceptsAn object is a software concept that often embodies hardware elements.Objects are a more natural way of solv<strong>in</strong>g problems. Humansobserve and <strong>in</strong>terrelate on an object basis.An object knows its purpose. It responds to stimuli (<strong>in</strong>puts), per-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>forms its function, which may be algorithms or methods, and sendsmessages to o<strong>the</strong>r objects as its outputs.Objects are event-driven, wait<strong>in</strong>g for a change to start an action.They do not know anyth<strong>in</strong>g about <strong>the</strong> objects that provide <strong>the</strong> <strong>in</strong>puts or<strong>the</strong> objects that receive <strong>the</strong>ir outputs.They may be replicated to extend functionality and replaced toimprove performance or change behavior. Removal is simple when <strong>the</strong>functionality is no longer needed. All of this can be done without impacton <strong>the</strong> overall project function.Objects are tolerant s<strong>in</strong>ce <strong>the</strong>y do not care about <strong>the</strong> makeup orcomplexity of o<strong>the</strong>r objects. A control object could be a PLC, s<strong>in</strong>ce <strong>the</strong>PLC can be encapsulated and treated as an object.Object based solutions can be deployed alongside exist<strong>in</strong>g traditionalsolutions and when it is desired to replace exist<strong>in</strong>g systems withnew ones, it can be done smoothly and effectively.Objects are trust<strong>in</strong>g s<strong>in</strong>ce <strong>the</strong>y always assume that <strong>the</strong> downstreamand upstream objects will always do <strong>the</strong>ir tasks. Objects are widely distributables<strong>in</strong>ce <strong>the</strong>y do not require o<strong>the</strong>r objects to reside on <strong>the</strong> samecomputer platform and <strong>the</strong>y do not m<strong>in</strong>d if o<strong>the</strong>r objects are relocated.Objects behave <strong>the</strong> same if <strong>the</strong>y function on <strong>the</strong>ir own or are a partof a complex control solution. They scale up to meet <strong>the</strong> demands of <strong>the</strong>situation.Object-based solutions have been used to automate many plantsand process solutions <strong>in</strong> <strong>the</strong> oil and gas <strong>in</strong>dustries. In <strong>the</strong>se, complex sequentialoperations were used to ensure consistency and completion. Theobject-based solutions that replaced <strong>the</strong>m were easier to implement andma<strong>in</strong>ta<strong>in</strong> and perform more effectively than <strong>the</strong> systems <strong>the</strong>y replaced.Operat<strong>in</strong>g SystemsIn this <strong>in</strong>formation age, personal computers have become an everydaypart of life, both at home and at work. But, <strong>the</strong>se computers areuseless unless you can easily access <strong>the</strong> <strong>in</strong>formation.Operat<strong>in</strong>g systems provide an <strong>in</strong>terface between <strong>the</strong> user and <strong>the</strong>computer, allow<strong>in</strong>g <strong>the</strong> user to access and control <strong>the</strong> computer resources.The operat<strong>in</strong>g system controls <strong>the</strong> access to <strong>the</strong> processor and<strong>in</strong>terfaces with <strong>the</strong> different system resources such as hard and floppydisks, CD-ROMs, pr<strong>in</strong>ters and modems. The operat<strong>in</strong>g system acts like©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trendsa traffic cop between <strong>the</strong> hardware and <strong>the</strong> application software programs.The operat<strong>in</strong>g system controls basic tasks such as direct<strong>in</strong>g datato and from devices.As operat<strong>in</strong>g systems have evolved, <strong>the</strong>y have taken over functionsthat <strong>the</strong> older applications software used to handle. Dur<strong>in</strong>g <strong>the</strong> lastfew decades, <strong>the</strong> quality of operat<strong>in</strong>g systems available for small computershave <strong>in</strong>creased with <strong>the</strong> demand for better user <strong>in</strong>terfaces. One of<strong>the</strong> most popular operat<strong>in</strong>g systems for control systems is W<strong>in</strong>dows NT.PLCs and PCsWhen PLCs were <strong>in</strong>troduced over 30 years ago, relay ladder logic(RLL) was <strong>the</strong> standard programm<strong>in</strong>g language. Ladder diagrams identify<strong>the</strong> order of operation of devices. The logic can be rewired by programm<strong>in</strong>gon <strong>the</strong> CRT display and tested, without any physical rewir<strong>in</strong>gof <strong>the</strong> banks of relays. The displays show a ladder diagram with contacts,coils and circuit connection very similar to a schematic diagram.RLL was not designed to support a wide range of control functions.The ma<strong>in</strong> <strong>in</strong>put devices to PLCs are push-buttons, limit switchesand o<strong>the</strong>r command devices. The output devices are contactors, relays,solenoids and <strong>in</strong>dicat<strong>in</strong>g lamps.PLCs have been mov<strong>in</strong>g towards commodity hardware items, asPCs already have, and <strong>the</strong> trend is towards provid<strong>in</strong>g more completeapplication solutions. This means more open systems and commercialoff-<strong>the</strong>-shelf technologies to meet user demands for performance, ease ofuse and lower cost of ownership.Cont<strong>in</strong>ued optimization of overall plant performance requires leverag<strong>in</strong>gplant <strong>in</strong>formation with automation applications. Even PLC architecturesare <strong>in</strong>creas<strong>in</strong>gly be<strong>in</strong>g dom<strong>in</strong>ated by <strong>the</strong> flow of <strong>in</strong>formation.The use of object-based technologies, <strong>in</strong>dustrial E<strong>the</strong>rnet and Internet accessto <strong>in</strong>formation are examples of this trend. PLCs along with PCs arechang<strong>in</strong>g from closed-control-specific devices to open <strong>in</strong>formation serversprovid<strong>in</strong>g access to previously untapped operational <strong>in</strong>formation.Flowchart Programm<strong>in</strong>gFlowchart programm<strong>in</strong>g is an advance that helps to realize <strong>the</strong> fullpower of PC-based control systems. A simple, <strong>in</strong>tuitive graphical de-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>scription of <strong>the</strong> system is provided. Predef<strong>in</strong>ed flow elements and agraphics builder are used to create custom objects specific to <strong>the</strong> application.Operator-level diagnostics have been difficult and time consum<strong>in</strong>gto setup with ladder logic. The diagnostic tools available <strong>in</strong> flowchartprogramm<strong>in</strong>g can provide diagnostics that automatically generate faultdetection and recovery logic, along with displayed operator error messagesand HTML-based operator repair and recovery displays. Thesetools are important for improved efficiency s<strong>in</strong>ce <strong>the</strong>y provide quickrecovery <strong>in</strong>structions to operators which substantially lowers equipmentdowntime.Integrated motion control is ano<strong>the</strong>r benefit of flowchart programm<strong>in</strong>g.Motion control is one of <strong>the</strong> most significant features to be <strong>in</strong>tegratedwith logic <strong>in</strong>to PC-based control systems. You no longer need toconfigure a separate motion controller with complex programm<strong>in</strong>g. Itcan be done <strong>in</strong>side a PC-based control system with a s<strong>in</strong>gle dialog box.Embedded DevicesMany advances <strong>in</strong> comput<strong>in</strong>g power are tak<strong>in</strong>g place <strong>in</strong> portableand embedded devices like controllers and <strong>in</strong>telligent sensors. Unlikedesktop computers, <strong>the</strong>se smaller units have little use for <strong>the</strong> power andsize of an operat<strong>in</strong>g system (OS) such as Microsoft W<strong>in</strong>dows 95/98 orNT. They need an OS that is easily adaptable, compatible with a varietyof processors, and can operate without a term<strong>in</strong>al or keyboard.Microsoft’s W<strong>in</strong>dows CE was developed to fill <strong>the</strong>se needs. Inaddition to be<strong>in</strong>g operable without a term<strong>in</strong>al or keyboard, this reducedversion of <strong>the</strong> W<strong>in</strong>dows OS provides support for more than 20 processorsfrom 11 manufacturers and it uses W<strong>in</strong>32 application programm<strong>in</strong>g<strong>in</strong>terfaces (APIs).W<strong>in</strong>32 Programm<strong>in</strong>gDevelopers of applications for W<strong>in</strong>dows can use W<strong>in</strong>32 programm<strong>in</strong>gresources. The W<strong>in</strong>32 APL def<strong>in</strong>es <strong>the</strong> <strong>in</strong>terfaces to <strong>the</strong> W<strong>in</strong>dowsplatforms that are available to a programmer.Programm<strong>in</strong>g us<strong>in</strong>g W<strong>in</strong>32 <strong>in</strong>terfaces is not <strong>the</strong> only way to create©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trends32-bit, W<strong>in</strong>dows-based applications. Ano<strong>the</strong>r programm<strong>in</strong>g <strong>in</strong>terfaceavailable to W<strong>in</strong>32 and Microsoft Visual C++ programmers is <strong>the</strong> MicrosoftFoundation Class library (MFC). MFC provides higher-level encapsulationsfor much of <strong>the</strong> W<strong>in</strong>32 API.MFC supplies C++ classes to represent W<strong>in</strong>dows user <strong>in</strong>terfaceobjects such as w<strong>in</strong>dows, dialog boxes, brushes, pens, and fonts. MFCclass member functions make calls to <strong>the</strong> W<strong>in</strong>32 API functions. Theprogrammer us<strong>in</strong>g W<strong>in</strong>32 can program us<strong>in</strong>g C or C++ and <strong>the</strong> W<strong>in</strong>32API, or us<strong>in</strong>g C++ and MFC.W<strong>in</strong>dows CEW<strong>in</strong>dows CE is not just a reduced-feature-set version of W<strong>in</strong>dows.It was developed as a small-footpr<strong>in</strong>t OS for embedded applications. Itskernel borrows from o<strong>the</strong>r Microsoft 32-bit OSs and elim<strong>in</strong>ates or replacesthose OS characteristics that typical CE-based applications do notrequire. See Figure 5-1.W<strong>in</strong>dows CE applications, like W<strong>in</strong>dows NT applications, run <strong>in</strong> aFigure 5-1. W<strong>in</strong>dows CE architecture with an OEM abstraction layer(OAL) for device-dependent code and device power management.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>preemptive, multitask<strong>in</strong>g environment, <strong>in</strong> protected memory spaces. CEis compact and can be conta<strong>in</strong>ed <strong>in</strong> less than 200K of ROM. W<strong>in</strong>dowsCE’s W<strong>in</strong>32 API has about half of <strong>the</strong> <strong>in</strong>terface methods of <strong>the</strong> W<strong>in</strong>dowsNT version of <strong>the</strong> API.The CE API allows application notification events (timer events) at<strong>the</strong> OS level, ra<strong>the</strong>r than <strong>in</strong> a runn<strong>in</strong>g application. CE supports touchsensitivedisplays. The W<strong>in</strong>dows graphic <strong>in</strong>terface <strong>in</strong> CE makes it particularlyuseful <strong>in</strong> devices that need a standard W<strong>in</strong>dows <strong>in</strong>terface.W<strong>in</strong>dows CE and NT address different applications. CE offers asimpler multitask<strong>in</strong>g model than NT while NT offers more powerfulcommunications functions. W<strong>in</strong>dows CE was designed as a modular OS,so it can be adapted to many different applications such as control,monitor<strong>in</strong>g and data collection. Built-<strong>in</strong> communication features <strong>in</strong>clude:secure Internet, wireless communication <strong>in</strong>terfaces and extendibledevice capabilities (Figure 5-2).W<strong>in</strong>dows CE is a useful platform for operator <strong>in</strong>terface and control.Mobile data collection device manufacturers are us<strong>in</strong>g W<strong>in</strong>dows-CE-based products. W<strong>in</strong>dows CE is also well-suited for open PLC/controllers,<strong>in</strong>telligent field devices and <strong>in</strong>strumentation, utility monitors,VFDs, smart motor controllers, quality auditors and build<strong>in</strong>g ma<strong>in</strong>tenance.Much of <strong>the</strong> functionality <strong>in</strong> <strong>the</strong> new hand-held devices will be dueto <strong>the</strong> human-<strong>in</strong>terface characteristics of <strong>the</strong> universal W<strong>in</strong>dows environment.This functionality will be migrat<strong>in</strong>g to o<strong>the</strong>r applications asW<strong>in</strong>dows CE f<strong>in</strong>ds its way <strong>in</strong>to more and more embedded designs suchas Web TV and home-control products.Low cost and functionality have been among <strong>the</strong> ma<strong>in</strong> features of<strong>the</strong> PC and portable designs have followed that trend. As <strong>in</strong>dustriesrequire more users to be mobile and use portable gear more, <strong>the</strong> need toprovide more employees with portable units will help to drive downcosts.The <strong>in</strong>creased expectations of users as <strong>the</strong>y apply <strong>the</strong>se productivity-improv<strong>in</strong>gtools to everyday problems will demand an <strong>in</strong>crease <strong>in</strong>functionality. Users will not want to give up much of <strong>the</strong> power anddiversity of <strong>the</strong> desktop as seen by <strong>the</strong> huge growth <strong>in</strong> notebook-PCcapabilities.The trend is mov<strong>in</strong>g toward <strong>the</strong> use of knowledge workers. Theseare employees that are expected to manage <strong>in</strong>formation from a varietyof sources, turn that <strong>in</strong>formation <strong>in</strong>to usable knowledge, and apply that©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus TrendsFigure 5-2. W<strong>in</strong>dows CE supports communications protocols for telephonyand serial communications, as well as TCP/IP and o<strong>the</strong>r Internetprotocols.knowledge to <strong>the</strong> solution of <strong>the</strong> problems.The enabl<strong>in</strong>g technology <strong>in</strong>cludes <strong>in</strong>terconnectivity of <strong>the</strong>se handheldunits with o<strong>the</strong>r PCs, <strong>the</strong> Internet and <strong>the</strong> company Intranet. All ofthis functionality is expected to be seamless for <strong>the</strong> user. A familiarW<strong>in</strong>dows or W<strong>in</strong>dows-like graphical user <strong>in</strong>terface (GUI) will be required.Interconnectivity with desktop and laptop PC products willbecome a grow<strong>in</strong>g requirement.The impact that W<strong>in</strong>dows CE will have on portable designs <strong>in</strong>volvesseveral emerg<strong>in</strong>g areas. These emerg<strong>in</strong>g developments are <strong>in</strong>microprocessor unit (MPU)/multipo<strong>in</strong>t conferenc<strong>in</strong>g unit (MCU) architecture,new human <strong>in</strong>terface options, greater connectivity with Internetand PC products and <strong>the</strong> grow<strong>in</strong>g ref<strong>in</strong>ements <strong>in</strong> programm<strong>in</strong>g.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The W<strong>in</strong>dows CE operat<strong>in</strong>g system (OS) is modular, so some portionsof W<strong>in</strong>dows CE may be excluded from portable products. Thereare power-management schemes <strong>in</strong> W<strong>in</strong>dows CE that def<strong>in</strong>e <strong>the</strong> powerstates as On, Idle, and Suspended/Off.There are also new ways to <strong>in</strong>teract with portable and desktopPCs. Speech recognition and syn<strong>the</strong>sis are used for heads up <strong>in</strong>teractionand safety. The personal digital assistant (PDA) of <strong>the</strong> future is likely tohave some k<strong>in</strong>d of handwrit<strong>in</strong>g recognition, similar to <strong>the</strong> <strong>in</strong>put madepopular by <strong>the</strong> 3Com PalmPilot. Full-motion video will become a requirementfor Web use. Video <strong>in</strong>put could be used for face-recognitionsecurity and gesture control of programs.PDAs may be used to change <strong>the</strong> heat<strong>in</strong>g and cool<strong>in</strong>g setpo<strong>in</strong>ts,turn on light<strong>in</strong>g, appliances and boot up <strong>the</strong> PC. Hand-held PDAs willcommunicate with mobile and fixed networks. This could be doneacross a robust and secure wireless network. Many products will needmore wireless technology built <strong>in</strong>to <strong>the</strong>m.The advent of W<strong>in</strong>dows CE forces <strong>the</strong> additional <strong>in</strong>tegration ofsystems. There will be a merg<strong>in</strong>g of pager, phone, voice mail and e-mail<strong>in</strong>to one unit. More people will be able to use <strong>the</strong>se products as <strong>the</strong>ybecome more user friendly through <strong>the</strong> familiar W<strong>in</strong>dows environment.Performance will become critical. The proper configuration of <strong>the</strong>system (power management, cache size, memory speeds, bus latency,and CPU architecture) will allow 100-MHz products to outperformpoorly-optimized 233-MHz systems. Improved <strong>in</strong>terconnectivity willallow <strong>the</strong> user to be able to store files, web pages, and messages on <strong>the</strong>server <strong>in</strong>stead of <strong>the</strong> PDA.There will be cont<strong>in</strong>ued improvement <strong>in</strong> storage medium for <strong>the</strong>PDA. Information overload will cont<strong>in</strong>ue to grow, and <strong>in</strong>formation process<strong>in</strong>gis driv<strong>in</strong>g technology. PDAs will be enlisted to control this overload.A typical PDA device will use two major <strong>in</strong>tegrated-circuit (IC)parts; a W<strong>in</strong>dows CE million-<strong>in</strong>structions-per-second (MIPS) processorand an analog application-specific <strong>in</strong>tegrated circuit (ASIC) for <strong>in</strong>put/output <strong>in</strong>terfac<strong>in</strong>g.W<strong>in</strong>dows CE is language-<strong>in</strong>dependent and compatible with morethan 2,500 of <strong>the</strong> most popular W<strong>in</strong>dows APIs and W<strong>in</strong>32 programm<strong>in</strong>gmodels. It uses <strong>the</strong> same .exe/.dll files, processes, and threads. It can bestored <strong>in</strong> ROM and has built-<strong>in</strong> communications to PCs, <strong>the</strong> Internet,and o<strong>the</strong>r W<strong>in</strong>dows CE devices.©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus TrendsW<strong>in</strong>dows CE uses a graphics device <strong>in</strong>terface with more than 50available components. The use and arrangement of <strong>the</strong>se componentsallows application <strong>in</strong>terfaces for specific products.No longer be<strong>in</strong>g tied to <strong>the</strong> X86 microprocessors is a new developmentfor W<strong>in</strong>dows products. W<strong>in</strong>dows CE has been ported to at least fiveprocessor families <strong>in</strong>clud<strong>in</strong>g MIPS, SH3/4, PowerPC, and Arm/StrongArm processors as well as a variety of peripheral devices, <strong>in</strong>clud<strong>in</strong>gPCMCIA, PC Card, PCI, and ISA buses. I/O types <strong>in</strong>clude modems,E<strong>the</strong>rnet, serial, parallel, <strong>in</strong>frared, keyboards, displays, flash memory, rotat<strong>in</strong>gmedia, wireless, touch screens and voice. Device drivers are used tosupport custom peripherals. There is also device power management.W<strong>in</strong>dows CE provides graphics, w<strong>in</strong>dow<strong>in</strong>g, event management,support for color, fonts, dialog boxes, shell, pr<strong>in</strong>t<strong>in</strong>g, sound, I/O, andfiles. W<strong>in</strong>dows CE can run 32 protected processes and an unlimitednumber of threads. With one processor, it supports preemptive, prioritybasedschedul<strong>in</strong>g, and has eight priority levels with <strong>the</strong> ability to handlepriority <strong>in</strong>version.CE uses virtual memory where memory is allocated to applicationsone page at a time. The page size is determ<strong>in</strong>ed by <strong>the</strong> application. Ina hand-held application, <strong>the</strong> memory page size is usually 1K-4K bytes.Many W<strong>in</strong>dows 95-based applications can be ported to W<strong>in</strong>dowsCE. Only a subset of W<strong>in</strong>32 API is supported and some of this has areduced feature set with fewer supported w<strong>in</strong>dow styles and limitedsupport for colors and fonts.DevelopmentW<strong>in</strong>dows CE development tools for system design <strong>in</strong>clude PlatformBuilder with OS modules and sample configurations. It is set upfor PC-based or Hitachi D9000 reference platforms. The Platform Buildersupports object-oriented programm<strong>in</strong>g through Microsoft’s ComponentObject Model (COM). O<strong>the</strong>r development tools <strong>in</strong>clude sample OALs,device drivers and a configuration tool to select only <strong>the</strong> componentsthat are needed for an application. A ROM image maker and remotedebugger are also provided. The tools provide <strong>the</strong> ability to developapplications us<strong>in</strong>g an emulation of a real device.Language support for application development consists of <strong>the</strong>same language-based tools used for standard W<strong>in</strong>dows 9x/NT programm<strong>in</strong>g.These <strong>in</strong>clude Visual C++ and Visual Basic.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Processes and ThreadsIn W<strong>in</strong>32 term<strong>in</strong>ology, a process is def<strong>in</strong>ed as an <strong>in</strong>stance of a runn<strong>in</strong>gapplication. W<strong>in</strong>dows CE, like o<strong>the</strong>r 32-bit W<strong>in</strong>dows platforms, isa multitask<strong>in</strong>g OS that supports multiple threads of execution with<strong>in</strong> arunn<strong>in</strong>g process. Thread management <strong>in</strong>cludes schedul<strong>in</strong>g, synchronizationand resource allocation. These are handled by <strong>the</strong> kernel.Inside <strong>the</strong> processes that run on 32-bit W<strong>in</strong>dows platforms are <strong>the</strong>threads that rely on messages to start process<strong>in</strong>g, control system resourcesand communicate with <strong>the</strong> OS and user. W<strong>in</strong>dows messages canorig<strong>in</strong>ate from a variety of sources, <strong>in</strong>clud<strong>in</strong>g <strong>the</strong> OS, keyboard, mouseor touch screen actions and o<strong>the</strong>r runn<strong>in</strong>g processes or threads.Exception and Device Handl<strong>in</strong>gSections of code that could fail due to hardware resource problems,device conflicts or cod<strong>in</strong>g errors need to be protected. Exception handl<strong>in</strong>gprotects <strong>the</strong> application from term<strong>in</strong>ation or o<strong>the</strong>r system-levelproblems.The software <strong>in</strong>terface must be able to manage simultaneous ornearly simultaneous events from different types of devices <strong>in</strong> <strong>the</strong> system.The W<strong>in</strong>32 API supports both synchronous and asynchronousmethods of device access. In a synchronous <strong>in</strong>terface, <strong>the</strong> software requestsan action from a device and <strong>the</strong>n waits for <strong>the</strong> result. Examples<strong>in</strong>clude read<strong>in</strong>g and writ<strong>in</strong>g files. In an asynchronous <strong>in</strong>terface, <strong>the</strong>device requests services from <strong>the</strong> application. An example of an asynchronousdevice is a keyboard.In <strong>the</strong> W<strong>in</strong>dows CE kernel, <strong>in</strong>terrupt handl<strong>in</strong>g is split <strong>in</strong>to <strong>in</strong>terruptservice rout<strong>in</strong>g (ISR) and <strong>the</strong> <strong>in</strong>terrupt service thread (IST).Keep<strong>in</strong>g <strong>the</strong> rout<strong>in</strong>g as small and fast as possible is important forreal-time applications.At <strong>the</strong> hardware level, each <strong>in</strong>terrupt request (IRQ) l<strong>in</strong>e is associatedwith one specific software ISR. When triggered, <strong>the</strong> ISR directs <strong>the</strong>kernel to <strong>the</strong> location of <strong>the</strong> IST.Interrupts have a priority associated with <strong>the</strong>m. W<strong>in</strong>dows CE usesa priority-based, time-slice algorithm for thread schedul<strong>in</strong>g. The EmbeddedToolkit allows tun<strong>in</strong>g of <strong>the</strong> <strong>in</strong>terrupt tim<strong>in</strong>g and priorities for aspecific application.©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus TrendsW<strong>in</strong>dows NT-2000Soft-logic, PC-based control can run on NT systems without <strong>the</strong>protection of a real-time kernel. The kernel is <strong>the</strong> heart of <strong>the</strong> operat<strong>in</strong>gsystem. However, us<strong>in</strong>g a real-time kernel assures determ<strong>in</strong>istic performanceand <strong>the</strong> control system is also protected aga<strong>in</strong>st NT failures,buggy W<strong>in</strong>dows drivers and hard drive crashes. If W<strong>in</strong>dows NT is usedwith PC-based control, it provides a familiar <strong>in</strong>terface for <strong>the</strong> operator.The real-time aspect is separated from NT, so if you lose NT, you lose<strong>the</strong> <strong>in</strong>terface but <strong>the</strong> control can still operate. The real-time eng<strong>in</strong>e ishidden from you and does not impact any programs runn<strong>in</strong>g on NT.Interchangeable I/O drivers are a feature of most open PC-basedcontrol systems. Users should be able to switch I/O families and networksas easily as chang<strong>in</strong>g pr<strong>in</strong>ters <strong>in</strong> W<strong>in</strong>dows. A dialog box allowsolder I/O systems to be changed to more modular, lower-cost I/O. AnI/O rack is used for <strong>the</strong> various <strong>in</strong>put/output modules. I/O modulesare available is many configurations <strong>in</strong>clud<strong>in</strong>g analog, communicationsand motion control.W<strong>in</strong>dows 2000 was formerly W<strong>in</strong>dows NT 5.0. Changes <strong>in</strong>cludesimplified application utilities that make it easier to use NT. It is nowmore similar to <strong>the</strong> standard W<strong>in</strong>dows <strong>in</strong>terface. Microsoft has alsomade some changes which should improve future OS system upgrades.These may be a little troublesome now, but ultimately <strong>the</strong>y will improve<strong>the</strong> reliability and <strong>in</strong>tegrity of <strong>the</strong> operat<strong>in</strong>g system.A major change is <strong>the</strong> W<strong>in</strong>dows Driver model (WDM). This changeshould allow more flexibility and enhance reliability. VenturCom has aspecial driver model for automation and control with real-time capability.MicroSoft’s driver <strong>in</strong>cludes plug-n-play which makes it easy to addcards for PCI-based communications and o<strong>the</strong>r I/O.DirectXPart of <strong>the</strong> WDM is Microsoft’s DirectX multimedia architecture(Figure 5-3). This architecture works well <strong>in</strong> W<strong>in</strong>dows 95/98, but <strong>the</strong> useof it <strong>in</strong> W<strong>in</strong>dows 2000 may affect <strong>the</strong> stability of <strong>the</strong> OS. DirectX offersa fast <strong>in</strong>terface to hardware s<strong>in</strong>ce it is really a driver model. These driverscould be virus portals and should be replaced <strong>in</strong> critical <strong>in</strong>dustrialprojects.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 5-3. Microsoft’s DirectX multimedia architecture provides everyth<strong>in</strong>gneeded for a good operator <strong>in</strong>terface.Microsoft runs video drivers <strong>in</strong> <strong>the</strong> kernel of W<strong>in</strong>dows 2000 andNT 4.0. In W<strong>in</strong>dows 2000, this helps high-end graphics applications,such as operator <strong>in</strong>terfaces, but may cause problems <strong>in</strong> controll<strong>in</strong>g aprocess on W<strong>in</strong>dows NT. Standard VGA drivers can be used <strong>in</strong> criticalNT applications.Microsoft has not been able to provide all of <strong>the</strong> DirectX capabilitieson NT due to security concerns. The driver model needs to protectall <strong>the</strong> <strong>in</strong>terfaces to <strong>the</strong> OS. If <strong>the</strong> <strong>in</strong>terface to <strong>the</strong> hard disk is not protectedproperly, loss of data and <strong>the</strong> system can occur. W<strong>in</strong>dows 2000has significantly improved real-time performance capabilities over W<strong>in</strong>dowsNT 4.0.W<strong>in</strong>dows NT and W<strong>in</strong>dows CE both have <strong>the</strong>ir place <strong>in</strong> control.They can provide complementary control solutions. Th<strong>in</strong>k & Do Softwarehas a PC control software package for control and (HMI) that isscalable for both W<strong>in</strong>dows NT and/or W<strong>in</strong>dows CE. This scalable approachallows both NT and CE platforms to use <strong>the</strong> same code <strong>in</strong> small©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trendsstand-alone mach<strong>in</strong>es or fully automated process networks.Ano<strong>the</strong>r approach comb<strong>in</strong>es W<strong>in</strong>dows NT with real-time extensions.VMIC has IOWorks which is a PC-based control software developmentpackage for <strong>the</strong>se real-time extensions.W<strong>in</strong>dows NT can also be used with a real-time operat<strong>in</strong>g systemlike VXWorks. In <strong>the</strong> case of VxWorks, two computers are <strong>in</strong>volved; oneis used for W<strong>in</strong>dows NT development and HMI and a VxWorks computerhandles <strong>the</strong> real-time application. This provides an acceptable PCbaseddevelopment environment with <strong>the</strong> security and performance ofa proven real-time operat<strong>in</strong>g system like VxWorks.CSI has a User Configurable Open System (UCOS) that was designedto run QNX on PC-based hardware. The QNX OS is mature andreliable and easy to <strong>in</strong>tegrate with W<strong>in</strong>dows NT-based eng<strong>in</strong>eer<strong>in</strong>g andoperator workstations.UNIXBefore W<strong>in</strong>dows, UNIX was one of <strong>the</strong> dom<strong>in</strong>ant operat<strong>in</strong>g systems.In this era of open systems, some vendors such as ABB, CSI,Foxboro, GE Fanuc, Honeywell, MDT, USDATA and o<strong>the</strong>rs still offerUNIX products. GE Fanuc’s CIMPLICITY is based on VMS and UNIX.CIMPLICITY was rewritten for <strong>the</strong> W<strong>in</strong>dows NT platform and released<strong>in</strong> 1995.UNIX reta<strong>in</strong>s a considerable legacy base. But, while UNIX systemscan provide a role <strong>in</strong> database support, UNIX systems lack <strong>the</strong> available<strong>in</strong>tegration technologies such as those found <strong>in</strong> Microsoft products.Some software vendors that do not directly support UNIX applicationssee <strong>the</strong> need to communicate with <strong>the</strong>m. The newer methods forconnectivity are mostly <strong>in</strong> <strong>the</strong> form of Microsoft provided connectivityfor databases on non-Microsoft platforms. These are typically UNIXbaseddatabases.L<strong>in</strong>uxL<strong>in</strong>ux has been grow<strong>in</strong>g as it moves <strong>in</strong>to more and more applications.Many of <strong>the</strong>se are through <strong>the</strong> back door as an <strong>in</strong>expensive, highperformance,unbreakable server platform, which is also capable of©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>multiprocessor and cluster implementations. It also exists <strong>in</strong> a real-timeversion and has earned a reputation as a mission-critical server platform(Figure 5-4).Several vendors are prepared to support L<strong>in</strong>ux. GE FanucCIMPLICITY has its UNIX experience and may support L<strong>in</strong>ux as well.National Instrument’s LabVIEW is on L<strong>in</strong>ux and Opto 22 support L<strong>in</strong>uxwith L<strong>in</strong>ux drivers for its E<strong>the</strong>rnet and PAMUX I/O products.The L<strong>in</strong>ux operat<strong>in</strong>g system has to reach commercial levels of successfor desktop systems <strong>in</strong> order to be fully accepted. Many serverproducts use L<strong>in</strong>ux and <strong>the</strong> level of reliability and robustness needed isone of <strong>the</strong> toughest.Real-time L<strong>in</strong>uxReal-time L<strong>in</strong>ux uses a real-time executive, which takes priorityover <strong>the</strong> ma<strong>in</strong> L<strong>in</strong>ux kernel. The purpose of RT-L<strong>in</strong>ux is to mix twoFigure 5-4. RT-L<strong>in</strong>ux with a real-time executive that runs <strong>the</strong> ma<strong>in</strong>L<strong>in</strong>ux kernel as a subord<strong>in</strong>ate task.©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trends<strong>in</strong>compatible properties <strong>in</strong> <strong>the</strong> same operat<strong>in</strong>g system. One is hard realtimeservice with its predictable, fast, low latency, simple scheduler. Theo<strong>the</strong>r is <strong>the</strong> services of GUI, TCP/IP and web-servers.L<strong>in</strong>ux is a low-cost OS with a high-performance microkernel architecture.L<strong>in</strong>ux is <strong>the</strong> ultimate example of open architecture, with hundredsof thousands of end-user contributions.Object TechnologyThe trend towards open source software cont<strong>in</strong>ues with objecttechnologies and Internet protocols mak<strong>in</strong>g it possible. There were nostandards available for object technology back <strong>in</strong> <strong>the</strong> 1980s, so <strong>the</strong> realtimeObject Manager was developed. This type of object-based softwareand communications <strong>in</strong>frastructure provides a high degree of hardwareand operat<strong>in</strong>g system <strong>in</strong>dependence.Today, <strong>the</strong>re are many <strong>in</strong>dustry and defacto object standards suchas Java, CORBA, OPC, Active X and DNA. Each has its place with<strong>in</strong> <strong>the</strong>complete sensor-to-database automation solution. There has been muchsuccess <strong>in</strong> us<strong>in</strong>g Foxboro’s Object Manager with <strong>the</strong>se <strong>in</strong>dustry anddefacto object standards to create object-enabled environments.Many of <strong>the</strong>se applications can run on a number of operat<strong>in</strong>g systems<strong>in</strong>clud<strong>in</strong>g W<strong>in</strong>dows NT, SUN OS, Solaris, VRTX, and Venix. StandardTCP/IP networks, OpenVMS, HP-UX and AIX are also supported.Several object-oriented technologies are play<strong>in</strong>g important roles <strong>in</strong>control software. These are OPC, ActiveX and Java. The latter two aref<strong>in</strong>d<strong>in</strong>g <strong>the</strong>ir roles primarily <strong>in</strong> networks and <strong>the</strong> Internet. CORBA andORB are also object technologies, but <strong>the</strong>se are found primarily on UNIXsystems and typically work at enterprise levels. They have not seenmajor use <strong>in</strong> <strong>in</strong>dustrial data communications.OLE (Object L<strong>in</strong>k<strong>in</strong>g and Embedd<strong>in</strong>g) was Microsoft’s orig<strong>in</strong>alobject-based communications technology with<strong>in</strong> W<strong>in</strong>dows. OLE allowsyou to assign tasks to objects and create <strong>in</strong>tegrated applications that canshare data.OLE was replaced by <strong>the</strong> newer OPC (OLE for process control). Inprocess control, OLE/OPC opened up communications between devicesand software applications <strong>in</strong> <strong>the</strong> W<strong>in</strong>dows environment. OPC became<strong>the</strong> standard technique for exchang<strong>in</strong>g data between clients and servers.OPC toolkits from companies such as PC Soft extended <strong>the</strong> technology©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>to Visual Basic and o<strong>the</strong>r languages.OPC has become <strong>the</strong> ma<strong>in</strong> technology for connect<strong>in</strong>g <strong>in</strong>dustrialsoftware applications. OPC makes small custom applications easy togenerate and support (Figure 5-5).Proprietary object technologies have been used by companies suchas CSI, Foxboro and Honeywell. OPC is now used extensively throughoutHoneywell’s products.It provides a standardized function, which allows many new k<strong>in</strong>dsof <strong>in</strong>formation <strong>in</strong>tegration to occur although it is not as sophisticated asmany exist<strong>in</strong>g proprietary access schemes. The availability of a morebasic and functionally <strong>in</strong>ferior standard access mechanism has beenenough to replace many older proprietary schemes. One problem withFigure 5-5. OPC has its roots <strong>in</strong> <strong>the</strong> Microsoft DCOM (DistributedComponent Object Model) technology, which communicates over networks,and is part of Microsoft DNA.©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus TrendsOPC has been speed. In some control software OPC could be too slowto use.OPC may become <strong>the</strong> generic data exchange mechanism for <strong>in</strong>dustrialautomation. For zone automation, it is not <strong>the</strong> platform that is mostimportant, it’s communication. Where performance is needed <strong>in</strong> <strong>the</strong> PCbasedcontrol, DCX enhancements can be used to supplement OPC.DCXDCX is a newer architecture that may be adopted as a standardreal-time communications specification. OPC and Microsoft’s COM(component object model) can provide enterprise support for data communications,but do not provide real-time determ<strong>in</strong>istic response.DCX uses a publish-and-subscribe based model to provide drivershells for common devices, hard real-time development tools, standardconfigurators and OPC. DCX offers CE and NT portability, provides OSisolation, offers plug-and-play with applications and drivers from differentvendors and supports OPC connectivity (Figure 5-6).Component SoftwareComponent software is a major concept for new application development.The two basic models are Microsoft’s component object model(COM) and <strong>the</strong> Object Management Group’s common object requestbroker architecture (CORBA). The Object Management Group is a consortiumof major software and hardware vendors.COM is used to build systems based on <strong>the</strong> Microsoft W<strong>in</strong>dowsenvironment. CORBA is used to build systems us<strong>in</strong>g more diverse operat<strong>in</strong>genvironments such as IBM’s MVS, CICS, Unix versions or W<strong>in</strong>dowsNT.Microsoft has been develop<strong>in</strong>g <strong>the</strong> technologies for build<strong>in</strong>g components<strong>in</strong> <strong>the</strong> versions of OLE, COM and ActiveX. These standardsmust be implemented <strong>in</strong> ei<strong>the</strong>r Microsoft Foundation Class or ActiveTemplate Libraries.Component developers have focused on develop<strong>in</strong>g user <strong>in</strong>terfacecomponents. These <strong>in</strong>clude component libraries of charts and panels.Developers of <strong>in</strong>dustrial automation software have extended that con-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 5-6. VenturCom’s DCX is a new architecture that can providefast, determ<strong>in</strong>istic data transfers under OPC.cept by develop<strong>in</strong>g component libraries that model gauges, dials and<strong>the</strong>rmometers.This is just a taste of what is to come. There will be much more of<strong>the</strong>se software components and component libraries that model controlsand control systems.User <strong>in</strong>terfaces will resemble process dashboards us<strong>in</strong>g a library ofcomponents that model pumps, proportional-<strong>in</strong>tegral-derivative (PID)loops, tanks and o<strong>the</strong>r system blocks. Systems <strong>in</strong>tegrators who have anexpertise <strong>in</strong> a particular <strong>in</strong>dustry can capture that expertise <strong>in</strong> a componentsoftware product.There is a trend to develop systems <strong>in</strong> an iterative way that reusescomponents and ma<strong>in</strong>ta<strong>in</strong>s flexibility throughout <strong>the</strong> system’s life cycle.This is called rapid application development. It depends on develop<strong>in</strong>giteratively to reduce risks by expos<strong>in</strong>g <strong>the</strong>m early and emphasizes <strong>the</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trendsimportance of software architecture and software reuse. Object-orientedmethods are used <strong>in</strong> day-to-day analysis, design, implementation, andma<strong>in</strong>tenance tasks.There is a major technology shift from waterfall-style developmentand structured methods to iterative development and object-orientedmethods. In waterfall-style development, <strong>the</strong> analysis, design, cod<strong>in</strong>g,unit-test<strong>in</strong>g, software-<strong>in</strong>tegration, and delivery phases occur sequentiallyand <strong>the</strong> software is delivered at <strong>the</strong> end of <strong>the</strong> process.Iterative development is more economical and predictable s<strong>in</strong>ceyou specify <strong>the</strong> objectives for <strong>the</strong> software system and <strong>the</strong>n build anddeliver a series of partial but <strong>in</strong>creas<strong>in</strong>gly complete implementations.These implementations, or iterations, are work<strong>in</strong>g products en route to<strong>the</strong> completion of <strong>the</strong> tuned project. Us<strong>in</strong>g iterative development, you<strong>in</strong>tegrate <strong>the</strong> software at each iteration <strong>in</strong>stead of at <strong>the</strong> end of <strong>the</strong>project. This frequent <strong>in</strong>tegration reduces risk by expos<strong>in</strong>g it early <strong>in</strong> <strong>the</strong>project life cycle.This concept, which is used by most major vendors like Microsoft,allows feedback from users who exercise <strong>the</strong> software delivered at eachiteration. Users can actively participate <strong>in</strong> <strong>the</strong> ref<strong>in</strong>ement of <strong>the</strong> softwarethrough all phases of <strong>the</strong> acceptance process.Each iteration exposes problems and risk <strong>in</strong> <strong>the</strong> system <strong>in</strong>clud<strong>in</strong>gfunctionality, performance and user <strong>in</strong>terface. The rema<strong>in</strong><strong>in</strong>g elements ofrisk become <strong>the</strong> focus of <strong>the</strong> next iteration.ActiveXActiveX is based on Microsoft’s COM. It can be used for connect<strong>in</strong>gdifferent vendors’ applications and serves as <strong>the</strong> glue that connectsan application and makes it versatile. One example is USDATA’s systemswhere <strong>the</strong>y are built upon a COM/ActiveX foundation. Each applicationis a collection of components that is part of <strong>the</strong> system. This technologyis used with an object model to allow a flexible and open environment.Northwest Analytical’s software also uses ActiveX objects. Datamay come from a variety of applications, but it can be presented <strong>in</strong> <strong>the</strong>same standard way regardless of source application. The use of ActiveXprovides <strong>the</strong> necessary components for this capability.The use of ActiveX br<strong>in</strong>gs up <strong>the</strong> question of security, s<strong>in</strong>ce an©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>ActiveX component is actually a program that can access a W<strong>in</strong>dowsbasedcomputer with <strong>the</strong> same privileges as any program. Honeywelluses several security measures:• digital sign<strong>in</strong>g of components gives assurance to users of <strong>the</strong> au<strong>the</strong>nticityof <strong>the</strong> controls,• <strong>in</strong>tegrated NT security provides user au<strong>the</strong>ntication through <strong>the</strong>system and• <strong>the</strong> kerberos 5-based security available <strong>in</strong> W<strong>in</strong>dows 2000.ActiveX and JavaActiveX is still proprietary to Microsoft, so to connect to o<strong>the</strong>rsystems, <strong>the</strong>re may be <strong>the</strong> need to support both ActiveX and Java. CubeTechnology supports Microsoft technologies and <strong>the</strong>ir evolution towardActiveX and COM protocols <strong>in</strong> products like <strong>the</strong> CUBE-WEB modulewhich has <strong>the</strong> multiplatform benefits of Java.PC Soft also uses Java for its Internet-enabled applications. Thisprovides <strong>the</strong> ability to run on many different operat<strong>in</strong>g systems whichis a limitation of ActiveX when accessed by a browser.Fisher-Rosemount has built its DeltaV control system primarilywith OPC, but Java is used <strong>in</strong> its DeltaV Web Server to provide Intranetconnectivity. Fisher-Rosemount also has a DeltaV Web Server tool whichallows users to convert DeltaV operator graphics and trends <strong>in</strong>to readonlyWeb pages. This permits access to DeltaV operat<strong>in</strong>g <strong>in</strong>formationus<strong>in</strong>g standard Internet browsers on PC hardware. This reduces costs aswell as <strong>the</strong> difficulty of access<strong>in</strong>g <strong>the</strong> data.Java may be cont<strong>in</strong>ued to be directed by Sun <strong>in</strong> desktop applications,but <strong>the</strong> direction and utility <strong>in</strong> embedded applications will probablybe fractured. A number of companies now offer good Java VirtualMach<strong>in</strong>e implementations.Internet: Key to <strong>the</strong> FutureThe Internet and its related technologies will be much more important<strong>in</strong> <strong>the</strong> future. Sequencia uses Web-enabled documents where operatorscan use standard Internet browsers to monitor and record opera-©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trendstions. The technology also uses hand-held wireless term<strong>in</strong>als.Web <strong>in</strong>tegration is becom<strong>in</strong>g more important because of <strong>the</strong> manyadvantages offered by this approach. By us<strong>in</strong>g a Web browser, additionalsoftware does not need be <strong>in</strong>stalled, s<strong>in</strong>ce users are already familiarwith <strong>the</strong>se <strong>in</strong>terfaces. Full <strong>in</strong>tegration with exist<strong>in</strong>g Internet/Intranetresources is also easy to accomplish us<strong>in</strong>g this approach.Security for Internet-enabled I/O devices <strong>in</strong>cludes firewalls androuters. When <strong>the</strong> I/O device needs to be stand-alone, it is possible touse hardware/IP address filter<strong>in</strong>g to limit access to known users or touse encryption schemes like <strong>the</strong> Web-standard Secure Sockets Layer. Thetype and extent of security depends on <strong>the</strong> device resources and <strong>the</strong>application and/or sensitivity of <strong>the</strong> data.Ma<strong>in</strong>tenanceOne issue to consider is <strong>the</strong> cost of ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g a PC. This cost hascont<strong>in</strong>uously <strong>in</strong>creased while <strong>the</strong> cost of <strong>the</strong> PC has decreased. The costof ma<strong>in</strong>tenance has <strong>in</strong>creased as <strong>the</strong> complexity of <strong>the</strong> software has <strong>in</strong>creased.When software is <strong>in</strong>stalled on a PC, <strong>the</strong>re is a moderate chance thatei<strong>the</strong>r it will not work, or an exist<strong>in</strong>g application will stop work<strong>in</strong>g dueto hardware conflicts, software conflicts, software bugs <strong>in</strong> <strong>the</strong> <strong>in</strong>stallprogram, or operator errors dur<strong>in</strong>g <strong>the</strong> <strong>in</strong>stallation.Microsoft provides scaled approaches to this problem that rangefrom hand-held devices to low-power PCs to high-end W<strong>in</strong>dows 2000workstations and servers. O<strong>the</strong>r operat<strong>in</strong>g systems such as L<strong>in</strong>us providea scaled, build-to-need approach, that generally requires less hardwarethan W<strong>in</strong>dows-based systems.Web-based applications built on Java and/or ActiveX will requirefewer resources, mak<strong>in</strong>g systems less expensive and more reliable.Future ComputersComputers will become more human, this means that <strong>the</strong>y willbecome more mobile and <strong>in</strong>telligent. They will take on more humanattributes such as <strong>the</strong> ability to react to spoken words or written <strong>in</strong>structionsand to reply <strong>in</strong> a way that seems more natural. The results will be©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>a user <strong>in</strong>terface that will appear more human, even if <strong>the</strong> underly<strong>in</strong>gcomputer program is not artificially <strong>in</strong>telligent.The outgrowth of a more human <strong>in</strong>terface is that <strong>the</strong> <strong>in</strong>terface assumesa personality. This could mean an <strong>in</strong>terface that gets <strong>in</strong> <strong>the</strong> waymore than it helps like MicroSoft’s BOB. But, if it is done correctly, thiscould make computers and Web sites easier and more natural to use.BOBMicrosoft’s BOB was an attempt at social <strong>in</strong>terface as a front end toW<strong>in</strong>dows. BOB was a short-lived market failure, but <strong>the</strong> concept lives on<strong>in</strong> <strong>the</strong> Intelligent Assistant <strong>in</strong> Microsoft Office. Office uses an <strong>in</strong>terfacewith characters like an animated paper clip or friendly dog. You can ask<strong>the</strong> character questions, or you can click it out of <strong>the</strong> <strong>in</strong>terface. Thesetechniques will be used <strong>in</strong> more computer systems over <strong>the</strong> next fewyears. The characters sometimes called bots or agents will probablybecome common <strong>in</strong> many Web sites.Natural-language PCsNatural-language process<strong>in</strong>g is <strong>the</strong> ability to respond to a questionthat is phrased <strong>the</strong> way you would phrase it to ano<strong>the</strong>r person. One Website that uses a natural-language <strong>in</strong>terface is Ask Jeeves, which has aknowledge base of 7 million answers. Unlike most search eng<strong>in</strong>es, youask Jeeves a question and it gives you a list of specific questions itknows <strong>the</strong> answer to. One of <strong>the</strong>se should help answer your orig<strong>in</strong>alquestion.ChatterbotsA chatterbot is a virtual character that you can ask questions of andget answers for a particular knowledge area. For example, a simulatedpsychiatrist could play back words and phrases based on a rudimentaryanalysis of <strong>the</strong> <strong>in</strong>put. This demonstrates a simplistic form of artificial<strong>in</strong>telligence and some chatterbots can seem human at times and uselessat o<strong>the</strong>rs.©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus TrendsChatterbots such as used by Neuromedia, <strong>in</strong> its Neuro Server Eng<strong>in</strong>e,provide a demonstration of a virtual customer service representative.This chatterbot exists as a box <strong>in</strong>to which you type text. Customerscan talk to it and get answers to <strong>the</strong>ir questions most of <strong>the</strong> time, cutt<strong>in</strong>gdown on <strong>the</strong> time <strong>the</strong>y spend on <strong>the</strong> phone talk<strong>in</strong>g to a human representative.The chatterbot does not reason, it only matches patterns. Ano<strong>the</strong>rchatterbot is used by <strong>the</strong> Big Science Company. The chatterbot calledAndrette replies to your questions and shows different pictures of <strong>the</strong>character.When natural language or a chatterbot is to control an application,<strong>the</strong> result is sometimes called a social <strong>in</strong>terface. NetSage uses several of<strong>the</strong>se, <strong>in</strong>clud<strong>in</strong>g its social Intelligence Server. NetSage uses an AnimatedIntelligent Agent and NetSage’s languages allow companies to developsystems that act as sales or support representatives.The Social Intelligence Server has been used to develop <strong>the</strong> OfficeAssistant <strong>in</strong> Office 97 and <strong>the</strong> voice user <strong>in</strong>terface <strong>in</strong> General Magic’sPortico virtual assistant. This telephone assistant allows you to remotelysend copies and play phone messages. Ano<strong>the</strong>r voice actuated bus<strong>in</strong>essservice is Webley’s Systems Webley Service.Voice Recognition SoftwareAno<strong>the</strong>r example of a more human <strong>in</strong>terface <strong>in</strong>volves voice recognition,which has been evolv<strong>in</strong>g at an exceptional rate. Products likeDragon NaturallySpeak<strong>in</strong>g and IBM’s ViaVoice are popular <strong>in</strong> cont<strong>in</strong>uous-speechrecognition applications. Many limitations of <strong>the</strong>se productswill soon be overcome. One area of achievement is towards elim<strong>in</strong>at<strong>in</strong>g<strong>the</strong> time users must spend tra<strong>in</strong><strong>in</strong>g <strong>the</strong> software to recognize <strong>the</strong>irvoices. These programs are becom<strong>in</strong>g speaker <strong>in</strong>dependent and IBM’sspeech development department has demonstrated software that youcall over <strong>the</strong> phone. It answers and directs your questions based on yourresponse, without any tra<strong>in</strong><strong>in</strong>g required.Telephone-based systems have also been targeted by <strong>the</strong> MITLaboratory for Computer Science. Their speech understand<strong>in</strong>g systemsare designed for specialized functions such as wea<strong>the</strong>r reports. Internetaccess lags telephone use, so voice is a way of br<strong>in</strong>g<strong>in</strong>g out applicationsto more people. The Jupiter system uses speech understand<strong>in</strong>g to an-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>swer questions about <strong>the</strong> wea<strong>the</strong>r over <strong>the</strong> phone.Emotion is ano<strong>the</strong>r area that computers are try<strong>in</strong>g to understand.MIT’s Media Labs’ Affective Comput<strong>in</strong>g Group has developed a systemwhere physiological sensors are attached to <strong>the</strong> body and camerasrecord facial expressions so <strong>the</strong> computer can monitor reactions. Theprogram will <strong>the</strong>n adjust to react to <strong>the</strong> sensor and camera <strong>in</strong>puts. Forexample, if <strong>the</strong> user seems confused by a set of <strong>in</strong>structions, <strong>the</strong> programwould repeat <strong>the</strong>m or offer additional explanations.The computer itself may also express emotion. MIT’s Bruzard is an<strong>in</strong>teractive animated 3-D character that uses facial expressions to react toquestions. In <strong>the</strong> future, Bruzard could be comb<strong>in</strong>ed with a chatterbot tocreate a more human <strong>in</strong>terface.Microsoft Research is comb<strong>in</strong><strong>in</strong>g <strong>the</strong>se concepts <strong>in</strong> a project calledFlow for virtual meet<strong>in</strong>gs. The scheme is to represent a traditional meet<strong>in</strong>gas much as possible, even though everyone might be <strong>in</strong> differentlocations.The comb<strong>in</strong>ation of animation, natural-language process<strong>in</strong>g, voicerecognition and voice syn<strong>the</strong>sis are mov<strong>in</strong>g towards user <strong>in</strong>terfaces thatwill seem more natural.Networks <strong>in</strong> <strong>the</strong> FutureIn <strong>the</strong> future, network<strong>in</strong>g will be more <strong>in</strong>visible and universal.There will be faster-wired networks at home and <strong>in</strong> <strong>the</strong> office and morehigh-speed services connect<strong>in</strong>g everyth<strong>in</strong>g. The areas of network<strong>in</strong>gtechnology <strong>in</strong> growth modes <strong>in</strong>clude faster access and LANs will cont<strong>in</strong>ueto grow and become a part of <strong>the</strong> utility system.The benefits of be<strong>in</strong>g universally connected <strong>in</strong>clude more efficientutilization of resources. Industry is now deploy<strong>in</strong>g <strong>the</strong> world’s largestvirtual network as an <strong>in</strong>creas<strong>in</strong>g number of contacts for both buys andsales take place over <strong>the</strong> Internet.The modern automobile is becom<strong>in</strong>g a network of processors andsensors (see Table 5-1). Tollbooths scan our cards and automated fuelpumps can bill us quickly and efficiently. The connected world tries tobecome even more adaptive and helpful.In manufactur<strong>in</strong>g, this connectivity allows just-<strong>in</strong>-time delivery ofraw materials, shipp<strong>in</strong>g of f<strong>in</strong>ished products, access to fund<strong>in</strong>g andmanagement. Improvements <strong>in</strong> connectivity will reduce <strong>the</strong> need for©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus TrendsTable 5-1. Automotive <strong>Control</strong> Trends————————————————————————————————• Front touch-screen LCD for car controls, e-mail, navigation system,and phone• Rear flat-panel display for Web surf<strong>in</strong>g, games and movies• See<strong>in</strong>g-eye cameras and embedded roadway transponders forsteer<strong>in</strong>g• Radar-based adaptive cruise control for ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g a safe follow<strong>in</strong>gdistance• Smart sensors <strong>in</strong> run-flat tires elim<strong>in</strong>ate spares————————————————————————————————energy as products and services are delivered on-l<strong>in</strong>e.Network<strong>in</strong>g progress cont<strong>in</strong>ues <strong>in</strong> wide area networks, <strong>the</strong> Internetand corporate Intranets. <strong>New</strong> developments <strong>in</strong>clude Internet2 and o<strong>the</strong>rprojects to l<strong>in</strong>k <strong>in</strong>dustry, government and universities.One part of Internet2 is known as Abilene. It uses over 10,000 milesof fiber-optic cable and operates at a 2.4-Gbps with a growth potentialof 10-Gbps. More than 70 universities and research facilities are connectedto Abilene.The Internet Protocol (IP) version 4 was head<strong>in</strong>g for a crash becauseof address saturation, but <strong>the</strong> Network Address Translation (NAT)saved it by reliev<strong>in</strong>g <strong>the</strong> pressure on <strong>the</strong> number of available IP addresses.IP does not tell you enough about <strong>the</strong> data it transports.The Internet needs to have greater number<strong>in</strong>g capacities for morenodes and more capacity to set priorities for different categories of data.Version 6 should provide <strong>the</strong>se features for <strong>the</strong> <strong>in</strong>creased loads of Internetand Intranet traffic.There has been a massive <strong>in</strong>crease of digital subscriber l<strong>in</strong>e (DSL)connections for bus<strong>in</strong>esses. Cable modems will be used for additionalhome subscribers. Both techniques will run <strong>in</strong>to limitations on distanceand <strong>the</strong> cost of <strong>in</strong>stall<strong>in</strong>g new copper l<strong>in</strong>es.Early <strong>in</strong> <strong>the</strong> millennium, <strong>the</strong>re will be fixed-po<strong>in</strong>t wireless with microwavesto carry high-speed data. It will be employed <strong>in</strong> many rural areas.Cable modem, DSL and wireless will all f<strong>in</strong>d <strong>the</strong>ir application areas.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The portable wireless area will cont<strong>in</strong>ue to explode. Cell phonebaseddigital technologies will compete with those meant only for data.Compet<strong>in</strong>g technologies for browser-equipped phone connections willclash while creat<strong>in</strong>g more features and lower prices. In <strong>the</strong> near futureInternet-connected telephone/pager/browser devices will becomewidely used.Web AdvancesThe Web was orig<strong>in</strong>ally designed to display text. Later, graphicswere added and <strong>the</strong> Web grew quickly. In <strong>the</strong> future, Web sites will bemore <strong>in</strong>telligent about <strong>the</strong>ir users, <strong>the</strong>ir content and <strong>the</strong> content of o<strong>the</strong>rsites. <strong>New</strong> Web approaches <strong>in</strong>clude personal <strong>in</strong>terfaces, bots and searchtechniques.The Web’s most noticeable trend is toward personalization. Wehave seen personal portals such as My Excite, where users customize <strong>the</strong>site tell<strong>in</strong>g which categories and <strong>in</strong>formation <strong>the</strong>y want.More Web sites are becom<strong>in</strong>g aware of <strong>the</strong>ir visitors and customiz<strong>in</strong>g<strong>the</strong> <strong>in</strong>formation <strong>the</strong>y provide. These sites track visitors by giv<strong>in</strong>g<strong>the</strong>m log-on names and passwords or cookies that are stored <strong>in</strong> <strong>the</strong>browser. Web site cookies are files that store <strong>in</strong>formation on visitors tothat site.The next step is for a Web site to customize its <strong>in</strong>formation withoutyou expressly tell<strong>in</strong>g it what you want. Future sites will track what youtend to look at and offer it to you without your <strong>in</strong>tervention.Collaborative filter<strong>in</strong>g is ano<strong>the</strong>r technique that makes sites appearsmart. Software from Firefly Network (which was acquired by Microsoft),Net Perceptions, and Andromedia match users and sites forproducts and services. These personalization services compare your webuses with o<strong>the</strong>rs.DirectHit uses a variation of this for Web search<strong>in</strong>g. When you aredo<strong>in</strong>g a Web keyword search, Direct Hit po<strong>in</strong>ts you at <strong>the</strong> site that <strong>the</strong>most users have visited. This type of popularity technique is used bysites like HotBot and ZDNet.Ano<strong>the</strong>r trend is <strong>the</strong> use of bots or agents. Bots, which is short forrobots are tied to Web sites. They query o<strong>the</strong>r sites to help you f<strong>in</strong>d<strong>in</strong>formation which can <strong>in</strong>clude prices on products and services. In <strong>the</strong>future, you may have your own agents that reside <strong>in</strong> your computer.©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus TrendsIBM’s Almaden Research Center has been work<strong>in</strong>g on software forprovid<strong>in</strong>g Web Brows<strong>in</strong>g Intelligence (WBI). These programs are similarto agents, but <strong>the</strong>y act as <strong>in</strong>termediaries <strong>in</strong> <strong>the</strong> background to customizeand enhance <strong>the</strong> user environment. They might automatically retrieveand <strong>in</strong>stall software you need to view a Web page.HTML and XMLXML (eXtensible Markup Language) is emerg<strong>in</strong>g as <strong>the</strong> technologyto allow web sites to understand each o<strong>the</strong>rs content. HTML provides <strong>the</strong>language to def<strong>in</strong>e <strong>the</strong> layout of text and graphics on a web page. XML isnot a presentation language, like HTML, but a way of describ<strong>in</strong>g data.XML will enable more precise search<strong>in</strong>g and let bus<strong>in</strong>esses sharedata more efficiently. The Web, which was built on HTML, will be rebuilton XML.Like HTML, XML grew out of <strong>the</strong> Standard Generalized MarkupLanguage (SGML). SGML is a metalanguage, which means it is a languagethat lets you create o<strong>the</strong>r languages. SGML allows various groups<strong>in</strong> <strong>in</strong>dustry to create tags, elements, and attributes called DocumentType Def<strong>in</strong>itions (DTDs) specific to <strong>the</strong>ir applications.HTML is a specific set of tags designed to display Web pages, butXML is a simpler metalanguage designed to allow groups to easily comeup with standard tags to describe <strong>the</strong> contents of specific types of files.XML is be<strong>in</strong>g utilized as <strong>the</strong> base for standardized tags for f<strong>in</strong>ancialtransaction, vector graphics and multimedia applications. The OpenF<strong>in</strong>ancial exchange (OFX) specification provides a common set of tags toallow users to manage f<strong>in</strong>ances and pay bills on-l<strong>in</strong>e.XML is a standard, so most software can be adapted to work withit. The future of XML is to allow applications of all types to exchangedata on <strong>the</strong> Web <strong>in</strong>telligently. XML is likely to be used <strong>in</strong> o<strong>the</strong>r ways aswell. In Office 2000, Microsoft is support<strong>in</strong>g XML as a file format, soMicrosoft Word or Excel documents and files could be viewed <strong>in</strong> anyXML-compla<strong>in</strong>t browser.Web Search<strong>in</strong>gAno<strong>the</strong>r area XML may improve is Web search<strong>in</strong>g. S<strong>in</strong>ce XML tagsdescribe <strong>in</strong>formation <strong>in</strong> a document, <strong>the</strong> descriptions <strong>the</strong>mselves can besearched. This reduces search<strong>in</strong>g time by lett<strong>in</strong>g you be more specific.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The Aeneid search eng<strong>in</strong>e uses XML tags and sophisticated text retrievalto f<strong>in</strong>d and correlate related <strong>in</strong>formation at multiple Web sites. Aeneidpersonalizes Web searches and allows <strong>the</strong> <strong>in</strong>formation to be analyzedus<strong>in</strong>g XML.Most of today’s search eng<strong>in</strong>es look for text. As <strong>the</strong> Web grows andmore types of different media is available, <strong>the</strong> ability to search throughthis array of <strong>in</strong>formation becomes more difficult. Virage’s VideoLoggeris a product designed for cod<strong>in</strong>g and access<strong>in</strong>g video content. Virage’ssoftware allow users to search through video files for specific spokenwords and phrases.IBM has been develop<strong>in</strong>g a technique called Query By Image Content(QBIC). This should allow users to organize and search a databaseof images us<strong>in</strong>g colors, shapes and textures.Web user <strong>in</strong>terfaces will also be chang<strong>in</strong>g. Inxight’s HyperbolicTree works as a set of hypertext l<strong>in</strong>ks that allows a user to navigatespatially with a mouse. The Hyperbolic Tree references <strong>the</strong> previouslyread Web l<strong>in</strong>ks as if <strong>the</strong>y were on a globe. One might be located near <strong>the</strong>equator while ano<strong>the</strong>r l<strong>in</strong>k might be closer to <strong>the</strong> north or south pole.Natrificial has also been work<strong>in</strong>g on a product that organizes Webbased<strong>in</strong>formation with a spatial <strong>in</strong>terface. The Bra<strong>in</strong> is similar to HyperbolicTrees and is designed to act as a medium for shar<strong>in</strong>g content over<strong>the</strong> Internet without <strong>the</strong> need for a dedicated Web site to store <strong>the</strong> <strong>in</strong>formation.The Bra<strong>in</strong> creates associative structures to relate a group of filesto one ano<strong>the</strong>r, just as a human bra<strong>in</strong> associates pieces of <strong>in</strong>formation.These hyperl<strong>in</strong>ks are used to create connections between graphicaltokens called thoughts. Each thought can hold a file or l<strong>in</strong>k to any o<strong>the</strong>rthought or level.Intelligent DevicesMany types of devices with build-<strong>in</strong> <strong>in</strong>telligence use embedded processorslike StrongARM and DragonBall and operat<strong>in</strong>g systems such aspSOS and VxWorkx. The pSOS operat<strong>in</strong>g system is be<strong>in</strong>g used <strong>in</strong> personaldigital assistants (PDAs), cell phones and Web PDAs. Microsoft hasdemonstrated <strong>the</strong> Hermes Internet telephone, which runs W<strong>in</strong>dows CE.There are 120 of <strong>the</strong>se chips from about 40 companies which arepositioned to re<strong>in</strong>vent comput<strong>in</strong>g <strong>in</strong> <strong>the</strong> new millennium. They are used<strong>in</strong> ovens, digital phones, automobile control systems and o<strong>the</strong>r products©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trends(Table 5-2). The Palm family of hand-held devices uses MotorolaDragonBall EZ chips.Tables 5-2. Device Trends———————————————————————————• Samsung CDMA watch/phone is a small wireless phone• Internet refrigerator from Frigidaire and ICL has Internetaccess and bar-code scanner to track contents• Ericsson R380 mobile phone runs on EPOC OS, withvoice dial<strong>in</strong>g and Internet access————————————————————————————Some low-cost embedded processors compare with Intel Pentiums,except that <strong>the</strong> embedded processors cost less and consume less power.Stanford University’s School of Eng<strong>in</strong>eer<strong>in</strong>g believes that embeddedchips may be first to offer multiple processors on a s<strong>in</strong>gle chip.IBM has a prototype of its cyberphone. This is a comb<strong>in</strong>ation cellularphone and computer with wireless Web access. It has a small built<strong>in</strong>display which uses a mirror to enlarge images to <strong>the</strong> same size as <strong>the</strong>ywould appear on a desktop monitor.IBM is also work<strong>in</strong>g on a super-high-resolution wrist watch thatcan provide easy visual access to data. Wrist phones are available fromSamsung with voice-activated dial<strong>in</strong>g.Symbian is a consortium of Ericsson, Motorola, Nokia, and Psionthat developed <strong>the</strong> EPOC operat<strong>in</strong>g system for Internet devices.Symbian is develop<strong>in</strong>g secure wireless devices and Web surf<strong>in</strong>g phoneswhich are souped-up cell phones that provide access to <strong>the</strong> Internet.The Ericsson R380 GSM mobile phone will run on EPOC and <strong>in</strong>cludea built-<strong>in</strong> modem, PDA, touch screen, calendar, address book, e-mail, Internet connection, handwrit<strong>in</strong>g recognition, voice dial<strong>in</strong>g andvoice answer<strong>in</strong>g.Smarter microprocessors are also be<strong>in</strong>g used <strong>in</strong> refrigerators. Aprototype refrigerator from Frigidaire Home Products and ICL, uses anIntel microprocessor along with 32MB of RAM, an E<strong>the</strong>rnet connection,flat-panel touch screen, bar-code scanner and Microsoft W<strong>in</strong>dows. This©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>refrigerator is connected to a phone l<strong>in</strong>e for dial-up Internet access or toa home network that is connected to <strong>the</strong> Web.Communication OptionsSun Microsystems and some manufacturers of cellular phones,pr<strong>in</strong>ters, and hand-held computers have developed J<strong>in</strong>i, which is a Javabasedtechnology for device communication. It plants Java code on digitaldevices so <strong>the</strong>y can be organized <strong>in</strong>to groups. Devices with J<strong>in</strong>i canjo<strong>in</strong> a network and automatically configure <strong>the</strong>mselves.J<strong>in</strong>i competes as a common language for digital devices withMicrosoft’s Universal Plug-and-Play. When you connect a device to <strong>the</strong>network, <strong>the</strong> device automatically acquires a TCP/IP address and us<strong>in</strong>ga discover protocol based on HTTP, it announces its availability to o<strong>the</strong>rdevices on <strong>the</strong> network.Universal Plug-and-Play is one part of Microsoft’s <strong>Millennium</strong> OSproject, which aims at a network of devices that can allocate resourcesefficiently to accomplish each task. Universal Plug-and-Play provides away for devices to communicate while <strong>Millennium</strong> takes <strong>the</strong>se devicesand makes <strong>the</strong>m look like one computer. <strong>Millennium</strong> is slated for homeuse while W<strong>in</strong>dows 2000 is designed for bus<strong>in</strong>ess use.Motorola is a lead<strong>in</strong>g embedded-chip manufacturer for smart appliances.Motorola and MIT’s Media Lab have started <strong>the</strong> MotorolaDigitalDNA Laboratory, where future smart appliances are developed.DigitaDNA refers to <strong>the</strong> concept of l<strong>in</strong>k<strong>in</strong>g various smart products. Oneof <strong>the</strong>se is a smart treadmill that checks your pulse and automaticallyadjusts <strong>the</strong> treadmill. O<strong>the</strong>r concepts <strong>in</strong> work <strong>in</strong>clude cloth<strong>in</strong>g with labelsthat <strong>in</strong>format <strong>the</strong> washer which cycle to use and doors that open forspecified people or pets.Smart SoftwareMost software is not very smart. The majority of applications usedtoday only react to commands given <strong>the</strong>m. As computers become morepowerful, software capabilities also grow and future software may bemuch smarter.Software that appears to understand what it is told has been arounds<strong>in</strong>ce <strong>the</strong> 1970’s. In 1979 an early game called Dungeon was developed at©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus TrendsMIT. It allowed users to type <strong>in</strong> phrases such as “Open <strong>the</strong> door.” Dungeonwould react and describe what happened after <strong>the</strong> door wasopened.O<strong>the</strong>r programs such as Lotus Notes can <strong>in</strong>terpret a wide range ofnatural-language commands. Lotus Notes allows you to type phrases like“Schedule a meet<strong>in</strong>g for next Monday at 9:00 with Eng<strong>in</strong>eer<strong>in</strong>g development.”The program will make <strong>the</strong> proper entry <strong>in</strong> your calendar with <strong>the</strong>correct contacts. These types of applications appear to understand whatyou tell <strong>the</strong>m as long as it is related to mail, calendar and contacts.Natural-language <strong>in</strong>terfaces are a sign that software is gett<strong>in</strong>gsmarter and becom<strong>in</strong>g more human. The speed capabilities of computerswas illustrated <strong>in</strong> Deep Blue’s 1997 victory over chess world championGarry Kasparov. Deep Blue is a powerful 32-node IBM RS/6000 SP computerand was able to calculate hundreds of millions of positions per secondto decide on <strong>the</strong> optimal move. Kasparov only could exam<strong>in</strong>e a fewpositions per second.The process<strong>in</strong>g power that lets Deep Blue simulate millions of possiblechess outcomes is be<strong>in</strong>g used to perform time-consum<strong>in</strong>g tasks suchas <strong>the</strong> simulation of wea<strong>the</strong>r patterns and o<strong>the</strong>r complex physical models.Computer software is also beg<strong>in</strong>n<strong>in</strong>g to use human-like pattern recognitionwhich is typically referred to as neural net techniques. Neuralnets learn from experiences. In <strong>the</strong> future computers will aid doctors <strong>in</strong>analyz<strong>in</strong>g a patient’s condition and assist <strong>the</strong>m <strong>in</strong> creat<strong>in</strong>g new drugsright <strong>in</strong> <strong>the</strong> office.Future of PC SoftwareFuture personal computer software will probably replace <strong>the</strong> virtualdesktop <strong>in</strong> W<strong>in</strong>dows with <strong>the</strong> Webtop. You may soon use W<strong>in</strong>dows occasionally,but liv<strong>in</strong>g <strong>in</strong> a Web browser as <strong>the</strong> Webtop takes over from <strong>the</strong>desktop.In <strong>the</strong> near future you will plug <strong>in</strong>to <strong>the</strong> Webtop wherever you go. Itwill know who you are, what applications you use, and how you wantyour <strong>in</strong>terface to look. No more configur<strong>in</strong>g of your personal computerfor communications will be needed. Communications will be easier, aseveryone logs <strong>in</strong>to one big network. The software <strong>in</strong>dustry needs tochange fundamentally <strong>in</strong> <strong>the</strong> same way <strong>the</strong> microchip changed <strong>the</strong> designof circuits.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Bayesian NetworksSome <strong>in</strong>telligent concepts are be<strong>in</strong>g <strong>in</strong>troduced <strong>in</strong>to PC software. InOffice 97, Microsoft <strong>in</strong>troduced <strong>the</strong> Office Assistant. This animated iconwatched what you were do<strong>in</strong>g <strong>in</strong> your word processor or spreadsheetprogram and offered tips and answered questions to help you with <strong>the</strong>program.The concept beh<strong>in</strong>d tools such as <strong>the</strong> Assistant comes from MicrosoftResearch’s Decision Theory and Adaptive Systems Group. Thisgroup has been <strong>in</strong>volved <strong>in</strong> Bayesian Networks. These networks are<strong>in</strong>terconnected on <strong>the</strong> probability of concurrence among different actionsand conditions. For example, <strong>in</strong> Microsoft Word <strong>the</strong> program follows<strong>the</strong> actions by <strong>the</strong> user, <strong>in</strong>fers what <strong>the</strong> user is try<strong>in</strong>g to accomplishand makes suggestions through <strong>the</strong> Assistant.These <strong>in</strong>itial examples are relatively simple, but Bayesian Networkscan be much more sophisticated. Bayesian networks have beenused as a way to improve processes. They are also f<strong>in</strong>d<strong>in</strong>g <strong>the</strong>ir way <strong>in</strong>toPortal software for hypertext systems. This type of model<strong>in</strong>g of <strong>the</strong>decision-mak<strong>in</strong>g process will allow software <strong>in</strong> <strong>the</strong> future to help youwith complex problems. There will be a gradual <strong>in</strong>crease <strong>in</strong> software<strong>in</strong>telligence that help you do more.Personal SlavesAt Microsoft <strong>the</strong>y see a future where <strong>the</strong> PC not only transcribesspeech but understands what you say. Microsoft predicts a future withoutapplication programs. You would tell your PC what you want andlet it sort out <strong>the</strong> details.The ma<strong>in</strong> issue about today’s software is that it requires too mucht<strong>in</strong>ker<strong>in</strong>g. In 5 or 10 years software will know when its sick and what itneeds to get well. Future versions should offer troubleshoot<strong>in</strong>g wizardsthat help f<strong>in</strong>d hardware conflicts and pr<strong>in</strong>t<strong>in</strong>g and modem problems.When you have a problem, a wizard will ask relevant questions tohelp you figure out what’s happen<strong>in</strong>g. In <strong>the</strong> future, software will lookfor conflicts, make sure drivers are up-to-date and when a fix is necessary,ask if you want to go on-l<strong>in</strong>e and provide a patch. Later on, it willsearch for <strong>the</strong> changes it needs with no <strong>in</strong>tervention from you. Futuresoftware may even watch what you are do<strong>in</strong>g and step <strong>in</strong> when you are©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trendshav<strong>in</strong>g trouble. This software will work when you need it as a personalslave <strong>in</strong> <strong>the</strong> computer and allow easy collaboration over <strong>the</strong> Internet.The PC now handles many tasks that once were <strong>the</strong> sole prov<strong>in</strong>ceof large computers. The PC of <strong>the</strong> future will have terabytes of storage.Displays may be flexible and you may unfold <strong>the</strong>m from your pocketlikecell phone. Voice recognition may not completely replace mice becauseof privacy concerns.You will need lots of connections and <strong>the</strong>y will be <strong>in</strong> <strong>the</strong> walls and<strong>the</strong> floor. What may go away is those wires to <strong>the</strong> phones, <strong>the</strong> keyboardand <strong>the</strong> mouse. These may all go wireless.PCs should be more reliable and customizable. They will need tofree us from ma<strong>in</strong>tenance hassles, compatibility glitches and an everspiral<strong>in</strong>grate of obsolescence.The technology should provide advances <strong>in</strong> processors, storage,displays, and all <strong>the</strong> support<strong>in</strong>g technologies needed to make <strong>the</strong> PCmore useful.Process<strong>in</strong>g PowerThe <strong>in</strong>novation for <strong>the</strong> years ahead <strong>in</strong> silicon fabrication and CPUarchitectures will produce a billion transistors on a chip by 2011 orsooner and comput<strong>in</strong>g devices will be much more powerful. Intel’sPentiums and AMD’s faster K6 chips are tuned to handle graphics better.Intel founder, Gordon Moore, predicted that process<strong>in</strong>g powerwould double every 24 months. Intel’s Pentium II has 7.5 million transistors.As <strong>the</strong> trend cont<strong>in</strong>ues, Intel processors should conta<strong>in</strong> 50 millionto 100 million transistors by <strong>the</strong> first decade of <strong>the</strong> 21st century (seeTable 5-3).In 1965, Intel Corporation cofounder Gordon Moore predicted that<strong>the</strong> density of transistors <strong>in</strong> an <strong>in</strong>tegrated circuit would double everyyear. His observation was called Moore’s Law and was later changed toevery 18 months. Moore’s Law has been relatively accurate for over 30years. Transistor density as well as microprocessor performance tends tofollow Moore’s Law. The cost of memory also cont<strong>in</strong>ues to plummet (seeTable 5-4).In 1996 Intel predicted that by 2011, <strong>the</strong>y would have a microprocessorwith 1 billion transistors which runs at 10-GHz. This would bedone us<strong>in</strong>g 0.07-micron semiconductor process<strong>in</strong>g technology. The chip©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Table 5-3. Intel Processor Growth————————————————————————————————1999 Pentium II - 450-MHzPentium III/667 (Copperm<strong>in</strong>e) - 0.25-micron to0.18-micron process, bus goes from 100 to 133-MHz————————————————————————————————2000 Pentium III/700, Celeron 500+————————————————————————————————2000-01 Willamette—1-Gigahertz————————————————————————————————Mid-2000 Merced—First IA-64-chip————————————————————————————————2001 McK<strong>in</strong>ley—Second-generation IA-64 double <strong>the</strong> speedof Merced (over 1-GHz)————————————————————————————————2002 Madison—Third-generation IA-64Deerfield—Price/performance IA-64————————————————————————————————2002-03 Change to 0.13-micron process withcopper <strong>in</strong>terconnects————————————————————————————————2011 10-GHz, 1 billion transistors100 billion operations per second————————————————————————————————Table 5-4. Microchip Trends————————————————————————————————Year Megabytes Per Dollar Transistors (thousands)1988 0.1 1,0001992 1 2,0001995 10 10,0002000 100 50,0002002 1,000 100,000————————————————————————————————©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trendswould be able to handle 100 billion operations per second.In <strong>the</strong> future, doubl<strong>in</strong>g <strong>the</strong> transistor count may require more than18 months, due to major changes <strong>in</strong> chip design or fabrication technology.Chip logic is becom<strong>in</strong>g more complex and requires longer designand validation times.Fabrication TechnologyFabrication technology must improve with each process generation,such as <strong>the</strong> change from 0.25-microns to 0.18. A critical part of <strong>the</strong>process is photolithography, where short-wavelength light sources arefocused with precision lenses through <strong>the</strong> transparent masks conta<strong>in</strong><strong>in</strong>g<strong>the</strong> circuit details. This exposes <strong>the</strong> photoresist on a wafer’s surface,which is chemically removed leav<strong>in</strong>g <strong>the</strong> details of <strong>the</strong> circuit pattern on<strong>the</strong> wafer.Light sources and optics must evolve toge<strong>the</strong>r. Intel’s 0.18-micronPentium III chips use <strong>the</strong> same 248-mm wavelength deep-UV lightsource as 0.25-micron Pentium II and Pentium III chips. The move to a0.13-micron process should be coupled with 193-nm wavelength lightfrom excimer laser sources.Beyond 0.13-microns would be a 0.09-micron process, whichwould use 157-nm wavelength excimer lasers. The next step below 0.09is major <strong>in</strong> terms of technology and manufactur<strong>in</strong>g processes. Thiswould be <strong>the</strong> 0.07-micron process for <strong>the</strong> 2011 processor.The level of photolithography will probably require extreme-UV(EUV) light sources. EUV has a wavelength of 13nm, which has <strong>the</strong>potential for etch<strong>in</strong>g much smaller transistors. The problem is that <strong>the</strong>reare no known transparent mask materials that will allow <strong>the</strong>se shortwavelengths to pass through. <strong>New</strong> reflective lithography processes andoptics would need to be implemented.As <strong>the</strong> number of transistors <strong>in</strong>creases on a chip, transistor <strong>in</strong>terconnectwires become smaller and closer toge<strong>the</strong>r. This <strong>in</strong>creases conductorresistance and capacitance which adds to any signal delays.To reduce resistance and shr<strong>in</strong>k <strong>the</strong> <strong>in</strong>terconnect l<strong>in</strong>e widths, coppercan be used to replace alum<strong>in</strong>um as <strong>the</strong> <strong>in</strong>terconnect<strong>in</strong>g metal. Copperis be<strong>in</strong>g used <strong>in</strong> IBM’s Power G3 chips and AMD’s newer ships. In<strong>the</strong> future Intel CPUs <strong>in</strong> <strong>the</strong> 0.13-micron class should use copper <strong>in</strong>terconnects.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Physical LimitationsPower and heat management become major problems as transistorscont<strong>in</strong>ue to shr<strong>in</strong>k. The gate oxides become very th<strong>in</strong> <strong>in</strong> order toma<strong>in</strong>ta<strong>in</strong> <strong>the</strong> required transistor switch<strong>in</strong>g speeds. This forces low voltageoperation <strong>in</strong> order to ma<strong>in</strong>ta<strong>in</strong> <strong>the</strong>ir structural <strong>in</strong>tegrity. Intel microprocessorchips 10 years from now may operate at less than 1 volt andcould consume 40 to 50 watts of power. This implies 40- to 50-amp currents.Evenly distribut<strong>in</strong>g this amount of current with<strong>in</strong> <strong>the</strong> chip anddissipat<strong>in</strong>g <strong>the</strong> heat generated are both potential problems.Current silicon fabrication methods may hit physical limits by <strong>the</strong>year 2017, which many have predicted. At this po<strong>in</strong>t, it will not be possibleto build usable transistors any smaller.By that time, research <strong>in</strong>to areas such as molecular nanotechnology,optical or photonic comput<strong>in</strong>g, quantum comput<strong>in</strong>g, DNA comput<strong>in</strong>g,chaotic comput<strong>in</strong>g and o<strong>the</strong>r areas of research may be more common.Molecular nanotechnology <strong>in</strong>volves <strong>the</strong> manufactur<strong>in</strong>g of a electronicchip with t<strong>in</strong>y programmable assemblers to move <strong>in</strong>dividual atomsas discussed <strong>in</strong> Chapter 3. This technology would move devices<strong>in</strong>to <strong>the</strong> nanometer range ra<strong>the</strong>r than tenths of microns as it is now. Anentire computer made this way would be about <strong>the</strong> size of a sugar cube.Photonic comput<strong>in</strong>g <strong>in</strong>volves us<strong>in</strong>g beams of light for comput<strong>in</strong>gfunctions. Quantum comput<strong>in</strong>g technology <strong>in</strong>volves <strong>the</strong> study of electronsfloat<strong>in</strong>g <strong>in</strong> liquid helium as comput<strong>in</strong>g elements.DNA comput<strong>in</strong>g is patterned after <strong>the</strong> way DNA stores <strong>in</strong>formationvery efficiently. The DNA strands can f<strong>in</strong>d each o<strong>the</strong>r among thousandsof o<strong>the</strong>r strands. Syn<strong>the</strong>tic molecules called lipsomes are used forsearches that requires massive parallel process<strong>in</strong>g. It is also calledbiomolecular comput<strong>in</strong>g. Chaotic comput<strong>in</strong>g attempts to apply chaosscience<strong>the</strong>ory to <strong>the</strong> management of computer networks.There are apt to be major changes <strong>in</strong> <strong>the</strong> design and manufactureof microprocessors and <strong>the</strong> way <strong>the</strong>y perform computer operations. Thismeans that as fabrication technologies susta<strong>in</strong> enormous changes <strong>in</strong> <strong>the</strong>com<strong>in</strong>g years, <strong>the</strong> microprocessor architectures that are used today <strong>in</strong>clud<strong>in</strong>glogic designs, <strong>in</strong>struction sets, registers and external <strong>in</strong>terfacesare bound to change. Expect to see more complex 32-bit x 86 processorsfrom AMD, Cyrix, Intel, and o<strong>the</strong>rs <strong>in</strong> <strong>the</strong> near future.Intel and Hewlett Packard have developed <strong>the</strong> EPIC (ExplicitlyParallel Instruction Comput<strong>in</strong>g) <strong>in</strong>struction set technology. This is de-©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trendsparture from <strong>the</strong> Intel x86 architecture. The 64-bit IA-64 architecture is<strong>the</strong> first <strong>in</strong>struction set to use EPIC.The forthcom<strong>in</strong>g Merced processor will be <strong>the</strong> first actual IA-64implementation. Intel believes 64-bit process<strong>in</strong>g will be <strong>the</strong> ma<strong>in</strong>streamtechnology <strong>in</strong> about 10 years.An important objective for AMD is to get as much fast memory asclose to <strong>the</strong> processor as possible and to reduce latencies to I/O devices.Future CPU chips will have faster and more direct <strong>in</strong>teractions withma<strong>in</strong> memory, graphics and lower bandwidth stream<strong>in</strong>g devices. Therewill also be a trend toward PC-on-a-chip devices.Chip MultiprocessorsChip Multiprocessors (CMPs) have multiple processor cores on as<strong>in</strong>gle chip. These devices are expected to proliferate over <strong>the</strong> next decade.There will be more multithreaded applications and multitask<strong>in</strong>gthat take advantage of <strong>the</strong>se architectures. These multiprocess<strong>in</strong>g designsmay delay <strong>the</strong> shift to more exotic computer designs.The embedded-CPU market would be <strong>the</strong> first area for CMPs.CMPs would <strong>the</strong>n move to workstations and servers, although memorybandwidth for <strong>the</strong> multiple cores could slow this trend.Future BusesEven <strong>the</strong> fastest processor can seem slow if your PC’s o<strong>the</strong>r subsystemsand data pathways are not up to high speeds. Intel and o<strong>the</strong>rchip providers are assault<strong>in</strong>g <strong>the</strong> throughput problem by improv<strong>in</strong>g <strong>the</strong>buses <strong>the</strong> data must move through.Intel’s 440LX AGPset chip set <strong>in</strong>troduced <strong>the</strong> Accelerated GraphicsPort, which is a faster than PCI bus between your CPU and graphicscoprocessor. AGP also l<strong>in</strong>ks <strong>the</strong> graphics adapter to system memory forstor<strong>in</strong>g <strong>the</strong> large texture maps that are used <strong>in</strong> 3D applications.<strong>New</strong> system board chips will also support faster system busspeeds of 100-MHz or greater. Increas<strong>in</strong>g <strong>the</strong> bus speed lets <strong>the</strong> PC takeadvantage of faster memory types. The 100-MHz synchronous DRAMsas well as Direct RDRAMs provides better performance and lower costs.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Faster ConnectionsIn <strong>the</strong> future you will be able to connect more devices to your PC,which will exchange data with <strong>the</strong>m at much higher speeds. This isbecause parallel and serial ports will be replaced by high speed buseslike <strong>the</strong> Universal Serial Bus (USB) and <strong>the</strong> IEEE 1394 high-speed serial<strong>in</strong>terface (FireWire). USB provides transfers at up to 12 megabits persecond which is about 100 times faster than most standard serial ports.FireWire starts at 100 to 400-mbps and should rise to 1-gigabyte persecond <strong>in</strong> about 10 years.USB is used to connect low-bandwidth devices such as mice andscanners <strong>in</strong> many new PCs. FireWire will l<strong>in</strong>k external DVD and CD-ROM players, digital video, still cameras and hard drives.Wearable Electronic DisplaysA plant supervisor may soon be able to receive vital <strong>in</strong>formationand see multiple areas of <strong>the</strong> plant through special safety glasses. Atechnician may be able to probe <strong>the</strong> circuit and see <strong>the</strong> output of anoscilloscope <strong>in</strong> <strong>the</strong> same view, elim<strong>in</strong>at<strong>in</strong>g <strong>the</strong> need to look back andforth. Wearable electronic displays can be mounted on or <strong>in</strong>tegrated <strong>in</strong>tomost frames or safety glasses, lett<strong>in</strong>g users obta<strong>in</strong> and view data whilewear<strong>in</strong>g normal vision aids. These new eyeglass displays use a biaxialscann<strong>in</strong>g mirror to raster-scan modulated laser light onto a screen.When <strong>the</strong> light modulation and mirror motion are synchronized, animage forms. S<strong>in</strong>gle crystal silicon is used for <strong>the</strong> mirror.In one version <strong>the</strong> hous<strong>in</strong>g of <strong>the</strong> conversion electronics is separatedfrom <strong>the</strong> display by a 4-foot cable. The display has a 320- by 340-pixel resolution and a 60-Hz refresh rate. The unit has a head-supportedweight of less than 50 grams and a field of view of 12 degrees diagonal.Ano<strong>the</strong>r version <strong>in</strong>tegrates <strong>the</strong> see-through or see-around displayoptics directly <strong>in</strong>to <strong>the</strong> lens and <strong>in</strong>cludes a proprietary lens system thatrelays <strong>the</strong> image to <strong>the</strong> eye and provides prescriptive correction. Thisversion has a 10 diagonal field of view and a head-supported weight of110 grams.The demand for wearable electronics like <strong>the</strong>se is expand<strong>in</strong>g. Researchersat Boe<strong>in</strong>g Company have designed a pair of computerizedeyeglasses that allow <strong>the</strong> wearer to <strong>in</strong>teract by voice or video with a host©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trendssystem. The device could enhance ma<strong>in</strong>tenance and service proceduresus<strong>in</strong>g features such as eye movement detection, speech recognition andvisual <strong>in</strong>put capability.The eyeglasses are based on traditional safety glasses and provide<strong>the</strong> wearer with audio and video <strong>in</strong>teraction to a host system. Theglasses could conta<strong>in</strong> sensors to detect eye movement, a microphone tohandle speech <strong>in</strong>put for speech recognition and a m<strong>in</strong>iature camera toallow visual <strong>in</strong>puts. The ear pieces could conta<strong>in</strong> <strong>the</strong> power supply,neural net and o<strong>the</strong>r processors. Audio feedback could also be part of<strong>the</strong> comb<strong>in</strong>ation.The user would be able to communicate with <strong>the</strong> device via naturalspeech, eye movement, or even mental feedback with <strong>the</strong> appropriatedetectors for alpha waves or o<strong>the</strong>r bra<strong>in</strong> signals. Feedback would be <strong>in</strong><strong>the</strong> form of a ret<strong>in</strong>al display projected <strong>in</strong>to <strong>the</strong> eye or speech syn<strong>the</strong>sisamplified from a small speaker.A high-resolution digital video camera would be located on <strong>the</strong>nose bridge. The camera would have to <strong>in</strong>clude some type of electronicfocus and iris, as well as enough pixels to allow software to scale <strong>the</strong>image up (magnify) without los<strong>in</strong>g details <strong>in</strong> blocks of pixels.The camera would provide a high-resolution view to central ma<strong>in</strong>tenanceto communicate what is be<strong>in</strong>g seen to support staff or <strong>in</strong>telligentagents (bots). The camera could also provide visual assistance by send<strong>in</strong>gmagnified, <strong>in</strong>frared, or <strong>the</strong>rmal images directly to <strong>the</strong> ret<strong>in</strong>al displaysystem.The eyeglass stems could hold <strong>the</strong> power supply and <strong>the</strong> localprocessor. A rechargeable battery takes up about one-half this area. Tohandle <strong>the</strong> image and audio process<strong>in</strong>g, <strong>the</strong> computer unit would conta<strong>in</strong>a Neural-Net Process<strong>in</strong>g Unit (NNPU) as well as conventional nonvolatilestorage and CPU arrays.Located at <strong>the</strong> ends of <strong>the</strong> ear pieces, <strong>the</strong> communications systemwould provide all communications <strong>in</strong>clud<strong>in</strong>g voice, wireless network,and mental feedback. The circuits also could monitor <strong>the</strong> vital signs of<strong>the</strong> wearer <strong>in</strong> <strong>the</strong> event of an emergency.Images from <strong>the</strong> camera or communicated from <strong>the</strong> host over awireless l<strong>in</strong>k would be fed to <strong>the</strong> ret<strong>in</strong>al display system. The systemprojects from <strong>the</strong> side of <strong>the</strong> safety glasses <strong>in</strong>to <strong>the</strong> lens, reflect<strong>in</strong>g backto <strong>the</strong> user’s eye.This type of system should be able to provide a resolution of about3000 pixels by 5000 pixels <strong>in</strong> each eye. The system also monitors eye©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>movement for certa<strong>in</strong> types of user <strong>in</strong>put. For safety reasons, outer peripheralvision would not be projected dur<strong>in</strong>g use <strong>in</strong> an operationalenvironment.MHA TechnologyMagnetic haptic array (MHA) technology can provide tactile feedback<strong>in</strong> almost any angle and position. MHA technology uses graviticforces ra<strong>the</strong>r than magnetism to produce force vectors on <strong>the</strong> user’shands and forearms. The magnetic <strong>in</strong> MHA refers to <strong>the</strong> use of weakmagnetic fields for position sens<strong>in</strong>g.A pair of magnetically sensitive gloves allows <strong>the</strong> MHA to projectgravitic forces. The user would be able to perform mechanical procedureswith full tactile feedback on <strong>the</strong> hands and forearms.Displays<strong>New</strong> technologies are also be<strong>in</strong>g developed to replace standard displayssuch as cathode-ray tubes (CRTs) and liquid crystal displays (LCDs)which may be bulky, or hard to see and consume too much power.IBM has developed a new flat-panel technology that provides fourtimes <strong>the</strong> resolution of Super XGA (1,280 x 1,024) which is <strong>the</strong> best LCDdisplay currently available. Instead of us<strong>in</strong>g <strong>the</strong> display materials of molybdenumand tungsten, <strong>the</strong>se new displays use alum<strong>in</strong>um and copper,which are better conductors and provide higher resolution.The Roentgen 16.3-<strong>in</strong>ch display has a resolution of 2,560 by 2,048pixels which is over 5 million pixels with 200 dots per <strong>in</strong>ch. It will <strong>in</strong>itiallybe available for medical imag<strong>in</strong>g, but should soon f<strong>in</strong>d its way to laptops.Xerox PARC has been work<strong>in</strong>g on <strong>the</strong> ultra-th<strong>in</strong> Gyricon display,which uses millions of plastic balls enclosed <strong>in</strong> a pocket of oil with<strong>in</strong> asheet of rubber. Each ball has a white half and a black half and carries anelectric charge. The black side creates black dots, and <strong>the</strong> white side createswhite dots, much <strong>the</strong> way photographs are displayed <strong>in</strong> a newspaper.The balls can be locked to provide long-term storage of an image.When <strong>the</strong> charge is changed, a new image appears. The resolution isabout 400 to 600 dpi, which is close to laser pr<strong>in</strong>ter quality. Most desktop©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trendsdisplays are about 75 dpi. Xerox hopes <strong>the</strong> technology will be flexibleenough to create electronic books, newspapers and even wallpaper.Xerox is also work<strong>in</strong>g on DataGlyphs, which is a technology forpr<strong>in</strong>t<strong>in</strong>g mach<strong>in</strong>e-readable data on paper documents. The glyphs areembedded <strong>in</strong> <strong>the</strong> documents. DataGlyphs can encode text, data, orgraphics on pla<strong>in</strong> paper. This can <strong>the</strong>n be scanned <strong>in</strong>to a computer andused for br<strong>in</strong>g<strong>in</strong>g up a Web site or pr<strong>in</strong>t<strong>in</strong>g documents. This process isalso known as smart paper.E Ink is an electronic <strong>in</strong>k technology that uses electrophoretic processesdeveloped by <strong>the</strong> MIT Media Lab. E Ink is an <strong>in</strong>k-like materialthat can change color us<strong>in</strong>g an electric field. E Ink may appear <strong>in</strong>changeable traffic warn<strong>in</strong>g signs and store displays.Both E Ink and Gyricon may be used for creat<strong>in</strong>g electronic books.Most of <strong>the</strong>se mach<strong>in</strong>es, which can download material from <strong>the</strong> Web,use conventional LCDs. The E Ink or Gyricon processes provides anelectronic book that is th<strong>in</strong>ner, lighter and more readable compared to aLCD.A related electronic book concept is underway <strong>in</strong> a project calledFolio at <strong>the</strong> Interaction Design Studio at Carnegie Mellon University’sInstitute for Complex Eng<strong>in</strong>eered Systems. Folio’s display is made up of8 h<strong>in</strong>ged, full-color polymer LCD panels that fold up to fit <strong>in</strong> a pocket.Unfold it once and it becomes a writ<strong>in</strong>g pad, unfold twice and it becomesan electronic book or Web browser. Unfold<strong>in</strong>g it completely andit is large enough to display maps or work as a large-scale PC screen.As digital characters beg<strong>in</strong> to look and act more human, actors <strong>in</strong>movies are becom<strong>in</strong>g <strong>in</strong>creas<strong>in</strong>gly digital. Automated response bots cansimulate human conversation or take human form <strong>in</strong> computer programs.The Internet will become an <strong>in</strong>creas<strong>in</strong>gly larger source of videocontent and it will produce high-quality digital video.Digital CharactersAnimated characters will cont<strong>in</strong>ue to look and act more real. Muchof this visual realism is due to 3-D hardware capabilities of <strong>the</strong> computeroperat<strong>in</strong>g platform. The Intel Pentium chip has an <strong>in</strong>struction set calledStream<strong>in</strong>g SIMD Extensions (SSE). It is designed to speed 3-D geometrycalculations <strong>in</strong> applications that use <strong>the</strong> extensions. Many SSE <strong>in</strong>structionsmatch those found <strong>in</strong> AMD’s 3DNow!©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Many future graphics chips will perform geometry calculations onchip.This will produce more f<strong>in</strong>ely detailed graphic images and characters.These new technologies should allow a broader, richer set of <strong>in</strong>teractivebehaviors that work well <strong>in</strong> low bandwidth environments like <strong>the</strong>Internet. Some of this technology has been used <strong>in</strong> robotics and real-timeprocess control. These systems build on specific skills and behaviors,allow<strong>in</strong>g a set of reactions to user <strong>in</strong>put that are more realistic <strong>in</strong> appearanceand also more <strong>in</strong>telligent.ATI has several graphics cards that can produce MPEG-2 video <strong>in</strong>real time on a Pentium III-based PC. MPEG-2 provides video that looksas good as broadcast video because it is broadcast video, serv<strong>in</strong>g as <strong>the</strong>video compression technology for satellite-based video delivery systems.Stereoscopic headsets can monitor head movements and <strong>in</strong>put<strong>the</strong>m <strong>in</strong>to <strong>the</strong> computer. These are be<strong>in</strong>g <strong>in</strong>tegrated <strong>in</strong>to DirectX, whichis Microsoft’s standard for <strong>in</strong>terfac<strong>in</strong>g applications.Digital IdentityA digital identity is that constantly grow<strong>in</strong>g mixture of personal<strong>in</strong>formation which is stored <strong>in</strong> <strong>the</strong> databases of state and municipaloffices, hospitals, medical centers, <strong>in</strong>surance companies, stores, banksand federal agencies. The development of digital identities has beenaccelerated by <strong>the</strong> Internet. Bits of <strong>in</strong>formation about buy<strong>in</strong>g habits,read<strong>in</strong>g preferences, op<strong>in</strong>ions, browser bookmarks and f<strong>in</strong>ancial datamay all be available on <strong>the</strong> Internet.As we beg<strong>in</strong> a new millennium, privacy is be<strong>in</strong>g lost <strong>in</strong> <strong>the</strong> <strong>in</strong>formationgiven to bankers, <strong>in</strong>surance companies and o<strong>the</strong>r serviceproviders. Privacy has been bartered away, for services and on-l<strong>in</strong>econveniences. Privacy <strong>in</strong> <strong>the</strong> digital age means <strong>the</strong> ability to controlour <strong>in</strong>formation. There will be a widespread trend for <strong>in</strong>dividual accessto <strong>in</strong>formation control. This trend will cont<strong>in</strong>ue toward more <strong>in</strong>dividualcontrol. In <strong>the</strong> early years of comput<strong>in</strong>g <strong>the</strong>re were relativelyfew digital records that were related to personal records. Today, manytypes of personal data are be<strong>in</strong>g ga<strong>the</strong>red for possible use <strong>in</strong> biometricsecurity systems.These systems are meant to verify your identity or to allow access©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trendsto build<strong>in</strong>gs or facilities. These <strong>in</strong>clude digital bra<strong>in</strong> scans, electrocardiogramsand MRIs (see Table 5-5).Table 5-5. Biometrics Indemnity Characteristics————————————————————————————————• Individual attributes of face create a digitized ma<strong>the</strong>matical model.• Iris and ret<strong>in</strong>al patterns can be scanned like a human bar-code.• Spoken words can be matched with voicepr<strong>in</strong>t for remote access.• Geometry of hand, ve<strong>in</strong>s <strong>in</strong> wrist, map of sk<strong>in</strong> pores can bematched.————————————————————————————————There is a grow<strong>in</strong>g trend by Web-based bus<strong>in</strong>esses that <strong>the</strong>y mustpost detailed privacy policies on <strong>the</strong>ir sites. Many of those policies areverified by TrustE, which is an <strong>in</strong>dependent, nonprofit consortium topromote pr<strong>in</strong>cipals of disclosure and <strong>in</strong>formed consent. TrustE licenseesmust agree to disclose <strong>in</strong>formation and privacy practices that <strong>in</strong>clude <strong>the</strong>type of <strong>in</strong>formation be<strong>in</strong>g ga<strong>the</strong>red, how <strong>the</strong> <strong>in</strong>formation is used andhow it is shared.Technological solutions to this problem <strong>in</strong>clude encryption, whichhas been a major vehicle to help ensure digital privacy and securityissues. A variety of encryption schemes, <strong>in</strong>clud<strong>in</strong>g public key systems,have been used <strong>in</strong> many comput<strong>in</strong>g and Internet applications to protectdigital data.Internet Security Systems has its Internet Scanner which has anExplorer like tree-<strong>in</strong>terface, but no firewall scann<strong>in</strong>g. Network Associates’Cyber Cop Scanner does have firewall scann<strong>in</strong>g. O<strong>the</strong>r products<strong>in</strong>clude Axent Technologies’ Net Recon and Web Trends’ Security Analyzer,which was designed for Web servers, but is evolv<strong>in</strong>g <strong>in</strong>to a general-purposescanner.Encryption will become more effective, transparent, and userfriendly<strong>in</strong> e-mail, browser and e-commerce applications. Most of thiseffort will be based <strong>in</strong> server-based encryption ra<strong>the</strong>r than approachesthat require end-user <strong>in</strong>tervention. But, end users will still be able toapply technical solutions on <strong>the</strong>ir own. The newer versions of MicrosoftInternet Explorer and Netscape Navigator have many features for set-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>t<strong>in</strong>g user profiles, manag<strong>in</strong>g cookies and filter<strong>in</strong>g content. Secure digitalsignatures and certificates are handled along with encryption for limit<strong>in</strong>g<strong>the</strong> amount of <strong>in</strong>formation revealed.There will be fur<strong>the</strong>r development of security architectures andapproaches by groups such as <strong>the</strong> World Wide Web Consortium’s Platformfor Privacy Preferences.Security levels are used to automate a user’s <strong>in</strong>teraction with Websites through compliant browsers, plug-<strong>in</strong>s, or servers. Intel has developed<strong>the</strong> Common Data Security Architecture (CDSA). This is a set ofapplication programm<strong>in</strong>g <strong>in</strong>terfaces (APIs) designed to make computerplatforms more secure.The growth of smart cards <strong>in</strong>dicates <strong>the</strong>ir acknowledgment as securitydevices. A smart card can be used with passwords or biometricdata to protect access to data. The digital identity is embedded <strong>in</strong> <strong>the</strong>chip on <strong>the</strong> card. In <strong>the</strong> future, those chips will be embedded <strong>in</strong> clo<strong>the</strong>sand perhaps eventually <strong>in</strong> our bodies.Public key encryption-based digital certificates now have limiteduse <strong>in</strong> browsers. These will become more common <strong>in</strong> <strong>the</strong> future. Theycan be used by almost any program and will be a feature of most smartcard identity systems.Au<strong>the</strong>ntication card software <strong>in</strong>cludes Security Dynamics SecureID program and freeware programs from Trip Wire, Crack, COPS andTCP Wrapper. IBM’s Keyworks is designed for public-key <strong>in</strong>frastructureservices <strong>in</strong>clud<strong>in</strong>g cryptography. Lotus Notes uses Keyworks. IBM alsohas its Network firewall for W<strong>in</strong>dows NT.Random Number GenerationRandom number generators provide results that may appear to berandom, but <strong>the</strong>y are actually pseudo-random numbers generated by acalculation such as <strong>the</strong> Lewis-Goodman-Miller generator. This meansthat over a period of time a pattern will emerge <strong>in</strong> <strong>the</strong> numbers that arecomputer picks. That can cause trouble when <strong>the</strong>se numbers are used <strong>in</strong>security schemes.Random numbers are fundamental to computer security, s<strong>in</strong>ce <strong>the</strong>yare used to generate security keys that prevent break<strong>in</strong>g <strong>in</strong>to on-l<strong>in</strong>esystems. Given enough time <strong>the</strong> <strong>in</strong>truder can trace a pattern and replicatea key.©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus TrendsIntel has developed a random number generator that uses <strong>the</strong>rmalnoise. This is one of <strong>the</strong> few sources of random and <strong>in</strong>determ<strong>in</strong>isticphenomena. This true random number generator is <strong>the</strong>n used as an<strong>in</strong>put to produce secure keys.Thermal noise is produced when an electrical resistor heats up asa current is passed through it. This is due to molecular action that givesoff energy as heat.Electronic hardware-based random number generators tend to bebulky and expensive. Intel is produc<strong>in</strong>g its hardware-based randomnumber generator as a standard <strong>in</strong>tegrated circuit component. Intel will<strong>in</strong>clude <strong>the</strong> random number generator <strong>in</strong> its 810 chip set, which will beused <strong>in</strong> standard desktop PCs.Industrial ComputersPC-based processor boards now <strong>in</strong>clude systems that allowPowerPC speed and performance for a wide range of <strong>in</strong>dustrial applications.One processor board uses <strong>the</strong> MPC8240 PowerPC chip, which isa highly <strong>in</strong>tegrated microprocessor built around a PowerPC core. Theunit has 200- or 250-MHz processors, up to 128 MB of synchronousDRAM, up to 8 MB of flash memory, and ei<strong>the</strong>r 512 KB of nonvolatileRAM or 144 MB of disk-on-chip memory. On-board serial I/O, FastE<strong>the</strong>rnet, two RS-232 serial ports, and a PCI expansion connector arealso <strong>in</strong>cluded.An Intel 82559 Fast E<strong>the</strong>rnet controller, with an <strong>in</strong>tegrated 10/100-Mbps physical layer device provides a compact LAN controller. ThePowerPC board uses an operat<strong>in</strong>g system-<strong>in</strong>dependent boot loader forcompatibility with any operat<strong>in</strong>g system.The 64-bit PowerPC 750 microprocessor is also available <strong>in</strong> as<strong>in</strong>gle-board computer. It can run on a choice of operat<strong>in</strong>g systems, <strong>in</strong>clud<strong>in</strong>gVxWorks/Tornado and ISI pSOS. Along with <strong>the</strong> 400-MHz processor,<strong>the</strong> board has 128 MB of high-speed synchronous DRAM, whichcan be expanded to 256 MB through memory modules. A Fast E<strong>the</strong>rnet10/100Base-TX <strong>in</strong>terface is <strong>in</strong>cluded with an RS-232 serial I/O port thatcan be accessed from <strong>the</strong> front panel. A 32-bit PCI local bus allows highspeed<strong>in</strong>terconnections. There is a real-time clock, and three 16-bit timers.A PCI-to-PCI bridge is used to connect <strong>the</strong> computer to aCompactPCI system bus.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>O<strong>the</strong>r S<strong>in</strong>gle-board ComputersAno<strong>the</strong>r s<strong>in</strong>gle-board computer uses an AMD K6-3 500-MHz processor,high-performance Ultra2 SCSI, 10/100Base-T E<strong>the</strong>rnet, and 4 MBof AGP video. The board supports voltage and software watchdogs, aprocessor <strong>the</strong>rmometer and an <strong>in</strong>ternal fan-speed monitor. Standard <strong>in</strong>terfaces<strong>in</strong>clude two USB ports, two serial ports, keyboard and mouseports.Rugged ComputersRugged s<strong>in</strong>gle-board computers <strong>in</strong>corporate <strong>the</strong> 400-MHzMotorola MPC7400 PowerPC processor. An extensive memory bandwidthis possible with an 83.3-MHz memory bus that yields susta<strong>in</strong>ablememory transfer rates of 190 MBps and 296 MBps. Also <strong>in</strong>cluded iscache support, flash capacity and 100Base-T E<strong>the</strong>rnet support for <strong>in</strong>dustrialapplications.All-wea<strong>the</strong>r workstations are available with 400-MHz CPUs. Oneunit has a 12.1-<strong>in</strong>ch, sunlight-readable TFT display, four ISA PCI slots anda detachable keyboard and mouse. These workstations can be used <strong>in</strong>harsh environments that <strong>in</strong>clude ra<strong>in</strong>, dust, and extreme temperatureranges.The unit also <strong>in</strong>cludes a shock-mounted, 8-GB hard drive, a floppydrive and AC, DC, or battery power. A touchscreen, a solid-state drive,a PCMCIA CD drive and E<strong>the</strong>rnet are also available. The unit’s shockmounted<strong>in</strong>ternal parts can withstand high shock and vibration levelsand it may be carried around or mounted on a panel or rack.O<strong>the</strong>r <strong>in</strong>dustrial computer trends <strong>in</strong>clude Pentium MMX-class processorswith VGA-LCD <strong>in</strong>terfaces, audio, 10/100Base-T E<strong>the</strong>rnet andCompactFlash card. Up to 64 MB of RAM are available. Low powerconsumption allows a smaller, fanless design.A bundled W<strong>in</strong>dows CE operat<strong>in</strong>g system, a parallel port, twoserial ports, two USB connectors, keyboard connector and <strong>in</strong>frared portare <strong>in</strong>cluded.Pentium-based s<strong>in</strong>gle board computers with 100-MHz bus clockshave up to 128 MB FPM/EDO (fast page mode/extended data output),512 kB standard L2 cache memory and a socket for a Flash memory disk(DiskOnChip) of up to 72 MB. Also <strong>in</strong>cluded are two RS-232 serial ports,©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trendsa parallel port, 4 IDE <strong>in</strong>terfaces, a floppy drive <strong>in</strong>terface, keyboard andmouse <strong>in</strong>terface.Pentium II/III Computer TrendsThe Intel 440BX chipset can be used <strong>in</strong> <strong>in</strong>dustrial s<strong>in</strong>gle boardcomputers with a 450-MHz CPU and 768-MB SRAM system memory.The cache memory is <strong>in</strong>tegrated <strong>in</strong> <strong>the</strong> CPU. An ATI RAGE XL AGPgraphics chipset provides up to 8 MB SDRAM for graphics. I/O may<strong>in</strong>clude serial and parallel ports, <strong>in</strong>terfaces for hard disk drives, <strong>in</strong>terfacesfor floppy disks, keyboard <strong>in</strong>terface and DiskOnChip to 144 MB.Cyrix-based ComputersTrends <strong>in</strong>clude Pentium MMX-class processors with VGA/LCD<strong>in</strong>terfaces, audio, 10/100Base-T E<strong>the</strong>rnet, CompactFlash card socketsand connectors for up to 64 MB of RAM. Low power consumption leadsto a smaller, fanless design and a two-chip Cyrix processor can use lessreal estate than an Intel architecture. Many systems are bundled with <strong>the</strong>W<strong>in</strong>dows CE operat<strong>in</strong>g system. These s<strong>in</strong>gle-board computers provideparallel and serial ports, USB connectors, keyboard connector and an<strong>in</strong>frared port. They can be operated <strong>in</strong> harsh environments where solidstatestorage and small size are desired.LCD ComputersComb<strong>in</strong><strong>in</strong>g a 233-MHz Media GX processor, 12.1-<strong>in</strong>ch flat-paneldisplay, resistive touchscreen, 3-GB hard drive and W<strong>in</strong>dows, <strong>the</strong>WebL<strong>in</strong>k PC provides a platform for control applications. This computerhas 32 MB of RAM, 10Base-T E<strong>the</strong>rnet port, serial port, parallel port,expansion slots, and a NEMA-4 front panel. The WebL<strong>in</strong>k PC is designedfor space-limited plant-floor applications.W<strong>in</strong>dows CE ComputersIndustrial computers also have full-size SVGA color LCD panelswith touchscreen capability runn<strong>in</strong>g <strong>the</strong> W<strong>in</strong>dows CE operat<strong>in</strong>g system.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>These computers use a 32-bit, 190-MHz RISC processor, 16 MB of flashmemory, and 32 MB of RAM. The 12.1-<strong>in</strong>ch color LCD is sunlight-readablewhich makes <strong>the</strong> unit eight times brighter than o<strong>the</strong>r units. Theseunits can be used <strong>in</strong> all-wea<strong>the</strong>r, outdoor, and plant-floor environments.The operator-<strong>in</strong>terface touchscreen is large enough for <strong>in</strong>teractivegraphical use.Industrial SoftwareThe Allen-Bradley Panel-Builder32 has a user-friendly,configurable environment with float<strong>in</strong>g/docked w<strong>in</strong>dows, help tools,and toolbar and workbook-mode aids that simplify system design andreduce start-up times. The software uses warn<strong>in</strong>g filters that allow operatorsto selectively shut off validation warn<strong>in</strong>gs. If an error is <strong>in</strong>troduceddur<strong>in</strong>g test<strong>in</strong>g, a problem navigator <strong>in</strong>demnifies <strong>the</strong> problem on<strong>the</strong> validation screen. The software is compatible with RSNetworx,RSL<strong>in</strong>x, and RSLogix.W<strong>in</strong>dows-based Automation SoftwareMicrosoft W<strong>in</strong>dows NT Embedded software is designed for scalable,embedded solutions for measurement and <strong>in</strong>dustrial automationapplications. W<strong>in</strong>dows NT Embedded design and development toolscan reduce <strong>the</strong> development time of automation systems. The softwareallows us<strong>in</strong>g flash or solid-state memory and supports systems that donot need a keyboard, mouse, or monitor.Indusoft’s SCADA/HMI software <strong>in</strong>cludes Indusoft Studio forW<strong>in</strong>dows NT and CE. Application types <strong>in</strong>clude:• control room/supervisory,• operator Workstation for direct monitor<strong>in</strong>g and control, and• local <strong>in</strong>terface for embedded operator <strong>in</strong>terfaces.An object-oriented database is used with math functions, reportgeneration, archiv<strong>in</strong>g, alarms, <strong>in</strong>terfaces for PLCs, remote I/O, andTCP/IP network<strong>in</strong>g. The software can be used <strong>in</strong> embedded controls,control panels, ma<strong>in</strong>tenance term<strong>in</strong>als and mobile supervision.©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus TrendsW<strong>in</strong>dows CE SoftwareOpenHMI lets operators and ma<strong>in</strong>tenance personnel analyze systemperformance. Use of <strong>the</strong> W<strong>in</strong>dows CE operat<strong>in</strong>g system provides anopen, PC-based comput<strong>in</strong>g technology ra<strong>the</strong>r than a proprietary system.By flatten<strong>in</strong>g <strong>the</strong> architecture and facilitat<strong>in</strong>g data flow across <strong>the</strong> enterprise,<strong>in</strong>formation is available on management, f<strong>in</strong>ance, eng<strong>in</strong>eer<strong>in</strong>g,control and logistics from one system.HMI Development ToolsA new range of HMI tools that support Visual Basic, Visual C++,ActiveX, and Java is evolv<strong>in</strong>g. Programs like DataViews for W<strong>in</strong>dowsuse a build<strong>in</strong>g-block structure that extends <strong>the</strong> capabilities of all tools.There is a grow<strong>in</strong>g need for flexible, scalable solutions that support anopen architecture and open standards. The software allows <strong>in</strong>teractiveHMIs for <strong>the</strong> analysis, monitor<strong>in</strong>g and control of process automation,telecommunications.DataViews Express works with Visual Basic and ActiveX technology.DataViews Professional offers a C++ application programm<strong>in</strong>g <strong>in</strong>terface(API) and a Java-class library that uses Java native <strong>in</strong>terface technology.DataViews Enterprise adds a C API, a custom editor for build<strong>in</strong>gapplication-specific editors, and a custom data browser.Visualization SoftwareScalable visualization tools allow <strong>in</strong>teractive Web publish<strong>in</strong>g andcan download applications to a variety of operat<strong>in</strong>g systems and platformsfrom a central W<strong>in</strong>dows NT-based development environment.End users can benefit from <strong>the</strong> ease of use <strong>the</strong> Web-based visualizationprovides. The software <strong>in</strong>cludes run-time and Web publish<strong>in</strong>g for <strong>the</strong>W<strong>in</strong>dows CE, NT, and NT Embedded operat<strong>in</strong>g systems. L<strong>in</strong>ux,VxWorks and o<strong>the</strong>r embedded operat<strong>in</strong>g systems will also be <strong>in</strong>cluded<strong>in</strong> <strong>the</strong> future.<strong>Control</strong> Ma<strong>in</strong>tenance PackagesO<strong>the</strong>r software provides a systematic life-cycle approach to manag<strong>in</strong>gand ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g automation control software. The software auto-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>matically compares <strong>the</strong> newly edited program with <strong>the</strong> previous copywhen a program is checked back <strong>in</strong>to <strong>the</strong> library. It <strong>the</strong>n reports <strong>the</strong>results of this comparison via e-mail to designated users, <strong>in</strong>dicat<strong>in</strong>g whomade <strong>the</strong> changes and how <strong>the</strong> changes were made. This type of feedbackhelps ma<strong>in</strong>tenance personnel alleviate bottlenecks, avoid downtime,and simplify <strong>the</strong> ma<strong>in</strong>tenance of control systems. A variety of userscan easily obta<strong>in</strong> <strong>in</strong>formation critical to <strong>the</strong> ma<strong>in</strong>tenance of <strong>the</strong> controlenvironment from anywhere <strong>in</strong>side or outside <strong>the</strong> plant and with noo<strong>the</strong>r software except a standard Web browser.Interbus Automation SoftwareAutomation software comb<strong>in</strong>es proven software standards such asIEC 61131-3 and W<strong>in</strong>dows NT <strong>in</strong>to one control package. PC Worx providesprogramm<strong>in</strong>g, configuration, monitor<strong>in</strong>g, and diagnostics of anInterbus system and can be used with Interbus field controllers. Thepackage consists of System Worx for configuration, monitor<strong>in</strong>g, anddiagnostics. Program Worx is an IEC 61131-3-based programm<strong>in</strong>g toolfor creat<strong>in</strong>g <strong>the</strong> application control program.With <strong>the</strong> help of <strong>the</strong> Interbus system OLE for process control (OPC)server, PC Worx can exchange data with any HMI or software packagethat has an OPC client. Standardized <strong>in</strong>terfaces such as OPC simplify <strong>the</strong>data exchange between PC Worx and o<strong>the</strong>r NT programs.E<strong>the</strong>rnet I/O Drivers<strong>New</strong> software drivers support <strong>the</strong> L<strong>in</strong>ux operat<strong>in</strong>g system andcomb<strong>in</strong>es TCP/IP communications, 10- or 100-Mbps performance andopen protocols. These I/O systems have built-<strong>in</strong> Web servers for configuration,ma<strong>in</strong>tenance and operator <strong>in</strong>terface. With E<strong>the</strong>rnet I/O, userscan <strong>in</strong>terface analog and digital I/O devices to a computer for monitor<strong>in</strong>gand control applications.Wireless Local-area NetworksThe WaveLAN/IEEE Turbo system can provide wired E<strong>the</strong>rnetequivalentdata rates and improved response times for data-<strong>in</strong>tensive©2001 by The Fairmont Press, Inc. All rights reserved.


PC-based <strong>Control</strong>, Software and Bus Trendsnetwork applications. The network is fully compliant with <strong>the</strong> IEEE802.11 specification, which allows operation with term<strong>in</strong>als, pr<strong>in</strong>ters,and bridges from different manufacturers. Auto rate selection automaticallyselects <strong>the</strong> optimal operat<strong>in</strong>g modes for <strong>the</strong> wireless network.Universal Communication ModulesThese modules allow <strong>Control</strong>Net, Interbus, and E<strong>the</strong>rnet network<strong>in</strong>gto a universal communication system (UCS), which provides anopen-architecture, <strong>in</strong>dustrial, device-to-network <strong>in</strong>terface for network<strong>in</strong>g.The UCS client <strong>in</strong>terface allows plug-and-play with all <strong>in</strong>dustrialnetworks supported by UCS master or slave modules.Install<strong>in</strong>g <strong>the</strong> appropriate network personality module <strong>in</strong>to <strong>the</strong>irdevice allows users to <strong>in</strong>terface to both modern and legacy networks.The modules can be upgraded <strong>in</strong> <strong>the</strong> field and feature electrical andsoftware <strong>in</strong>dependence for each supported network. UCS is capable ofbidirectional communication and supports a 64-KB addressable datarange.DeviceNet Troubleshoot<strong>in</strong>g ToolsDeviceNet users have a tool to troubleshoot <strong>the</strong>ir networks. Thehand-held DeviceNet Detective can quickly assess network problems.The unit has <strong>the</strong> follow<strong>in</strong>g capabilities:• anonymously eavesdrop on a network,• register on <strong>the</strong> network as a slave,• monitor voltage levels on <strong>the</strong> network, report errors and diagnosticmessages,• set node numbers,• <strong>in</strong>dicate which node numbers are be<strong>in</strong>g used, and• report which nodes are masters or slaves.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Ano<strong>the</strong>r unit called a DeviceNet Message Display uses an LCDdisplay to provide alphanumeric messag<strong>in</strong>g, operator <strong>in</strong>structions andI/O status. These DeviceNet-addressable, 4- by 20-character, back-litunits can store up to 16 messages <strong>in</strong> nonvolatile memory. The display iscontrolled us<strong>in</strong>g standard DeviceNet commands. Multiport Taps providefor <strong>the</strong> extension of a DeviceNet network by allow<strong>in</strong>g more nodesto be connected to <strong>the</strong> trunk l<strong>in</strong>e, as compared to a s<strong>in</strong>gle-port tap or <strong>the</strong>direct connection of a node to <strong>the</strong> trunk l<strong>in</strong>e.ReferencesBursky, Dave, “Electronic Glasses of <strong>the</strong> Future Deliver Data, Provide Feedback,”Electronic Design, June 23, 1997, Vol. 45 No. 13, p. 32.Chou<strong>in</strong>ard, Don, “W<strong>in</strong>dows CE: <strong>the</strong> Value’s <strong>in</strong> <strong>the</strong> Details,” Instrumentation and<strong>Control</strong> Systems, Vol. 72 No. 6, June 1999, pp. 41-47.Daflucas, Mark, “The Road to Mass Customization,” Industrial Comput<strong>in</strong>g, Vol.17 No. 6, June 1998, pp. 18-19.Derfler, Jr., Frank J., “Networks Will Be Ubiquitous,” PC Magaz<strong>in</strong>e, Vol. 18 No 12,June 22, 1999, p. 114.Gottesman, Ben Z., “Software Will Get Smarter,” PC Magaz<strong>in</strong>e, Vol. 18 No. 12,June 22, 1999, pp. 128-131.“Industrial Computers,” Industrial Comput<strong>in</strong>g, Vol. 18 No. 12, November 1999,pp. 12-13.“Industrial Software,” Industrial Comput<strong>in</strong>g, Vol. 18 No. 12, November 1999, pp.21-23.K<strong>in</strong>near, Dave, “Low-power Processors Create Performance Trade-offs for W<strong>in</strong>dowsCE,” Wireless Systems Design, Vol. 3 No 6, June 1998, pp. 18-22.Kle<strong>in</strong>, Mike, “Realiz<strong>in</strong>g PC-based <strong>Control</strong> True Potential,” Industrial Comput<strong>in</strong>g,Vol. 18 No. 9, August 1999, pp. 15-16.Labs, Wayne, “Software: Open Source OSs, Objects, Web-based CommunicationsChallenge Status Quo,” Instrumentation and <strong>Control</strong> Systems, Vol. 72 No. 7,July 1999, pp. 25-49.Lev<strong>in</strong>, Carol, “Little Devices Will Th<strong>in</strong>k,” PC Magaz<strong>in</strong>e, Vol. 18 No. 12, June 22,1999, pp. 120-123.Lev<strong>in</strong>, Carol, “Safety <strong>in</strong> Random Numbers,” PC Magaz<strong>in</strong>e, Vol. 18 No. 12, June22, 1999, p. 30.Miller, Michael J., “Computers Will Be More Human,” PC Magaz<strong>in</strong>e, Vol. 18 No.12, June 22, 1999, pp. 104-113.Rupley, Sebastian, “The Web Will Be Smart,” PC Magaz<strong>in</strong>e, Vol. 18 No 12, June22, 1999, pp. 116-119.Rupley, Sebastian, “You’ll Look at Computers <strong>in</strong> a Whole <strong>New</strong> Way,” PC Magaz<strong>in</strong>e,Vol. 18 No. 12, June 22, 1999, p. 134.Stamm, Nick, “Moore’s Law Will Cont<strong>in</strong>ue to Drive Comput<strong>in</strong>g,” PC Magaz<strong>in</strong>e,Vol. 18 No. 12, June 22, 1999, pp. 146-147.©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong> 225Chapter 6Artificial Intelligence,Fuzzy Logic and <strong>Control</strong>When a mach<strong>in</strong>e performs an act or task that seems to haverequired <strong>in</strong>telligence, it is called an artificially <strong>in</strong>telligentact. Intelligence is def<strong>in</strong>ed as both <strong>the</strong> ability to learn fromexperience and <strong>the</strong> ability to adapt to a surround<strong>in</strong>g environment.The field of artificial <strong>in</strong>telligence (AI) <strong>in</strong>volves <strong>the</strong> use of mach<strong>in</strong>esthat try to duplicate various acts of <strong>in</strong>telligence that humans canperform.Artificial <strong>in</strong>telligence is concerned with <strong>the</strong> development and deploymentof mach<strong>in</strong>es that mimic human behavior. It <strong>in</strong>cludes <strong>the</strong> follow<strong>in</strong>gareas:• expert systems,• robotics,• vision,• natural language process<strong>in</strong>g, and• artificial neural networks (ANN).Of <strong>the</strong>se, expert systems and ANNs will have a greater impact on <strong>HVAC</strong>control.The study of <strong>in</strong>telligence <strong>in</strong> humans and animals helps us understandbetter how to build <strong>in</strong>telligence <strong>in</strong>to mach<strong>in</strong>es. Also, study<strong>in</strong>gmach<strong>in</strong>es that demonstrate <strong>in</strong>telligence helps us to understand humansand animals.Intelligence can be demonstrated <strong>in</strong> several ways:• learn<strong>in</strong>g from experience,• adapt<strong>in</strong>g to changes <strong>in</strong> an environment,• receiv<strong>in</strong>g and process<strong>in</strong>g vision, speech, and o<strong>the</strong>r <strong>in</strong>puts to obta<strong>in</strong>specific <strong>in</strong>formation,©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>• mak<strong>in</strong>g decisions based on <strong>the</strong> <strong>in</strong>put of <strong>in</strong>formation, and• generat<strong>in</strong>g actions from <strong>the</strong>se decisions.Learn<strong>in</strong>g is one of <strong>the</strong> more obvious areas of <strong>in</strong>telligence. A lessobvious area <strong>in</strong>volves built-<strong>in</strong> or <strong>in</strong>herited <strong>in</strong>telligence. Built-<strong>in</strong> <strong>in</strong>telligencemay be stored <strong>in</strong> computer memory.<strong>HVAC</strong> control depends on sensor <strong>in</strong>put and <strong>in</strong>terpretation. In <strong>the</strong>future <strong>the</strong>se sensors may <strong>in</strong>clude speech recognition, vision, and touch.Artificial <strong>in</strong>telligence has been important <strong>in</strong> advances <strong>in</strong>volv<strong>in</strong>gsuch areas as expert systems, vision process<strong>in</strong>g, image understand<strong>in</strong>g,speed recognition, speech syn<strong>the</strong>sis, and natural language understand<strong>in</strong>g.Some of <strong>the</strong>se areas are already f<strong>in</strong>d<strong>in</strong>g applications <strong>in</strong> commercialcomputer products <strong>in</strong>clud<strong>in</strong>g <strong>the</strong> Internet.Search eng<strong>in</strong>es like Excite, Infoseek and Lycos allow you to enterqueries <strong>in</strong> pla<strong>in</strong> English. You can type a question as a complete sentence<strong>in</strong> <strong>the</strong> Search Form text box: “Where can I f<strong>in</strong>d temperature data fornor<strong>the</strong>rn Florida?” In Lycos, you type <strong>in</strong> <strong>the</strong> question <strong>in</strong> <strong>the</strong> search formtext box and select Natural Language Query.Much of artificial <strong>in</strong>telligence is occupied with try<strong>in</strong>g to teachmach<strong>in</strong>es to th<strong>in</strong>k, but artificial <strong>in</strong>telligence is also concerned with howhuman be<strong>in</strong>gs th<strong>in</strong>k. The use of <strong>in</strong>telligent computer tutor<strong>in</strong>g systemsallows <strong>the</strong> computer to tell a user that an answer to a question is wrongand to p<strong>in</strong>po<strong>in</strong>t where <strong>the</strong> th<strong>in</strong>k<strong>in</strong>g process was <strong>in</strong> error.Levels of Artificial IntelligenceResearchers have def<strong>in</strong>ed three different levels of <strong>in</strong>telligence: alpha,beta, and gamma. The alpha level of <strong>in</strong>telligence is def<strong>in</strong>ed as anonlearn<strong>in</strong>g <strong>in</strong>telligence. At this level, past experiences do not enter <strong>in</strong>to<strong>the</strong> decision mak<strong>in</strong>g process. An example of this level of <strong>in</strong>telligence are<strong>the</strong> simple hand-held electronic chess-play<strong>in</strong>g games. This game willalways repeat its moves.Beta-level IntelligenceThe beta level of <strong>in</strong>telligence has an elementary learn<strong>in</strong>g capability.This level of <strong>in</strong>telligence can learn from its mistakes and past failures are©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>used <strong>in</strong> its decision mak<strong>in</strong>g. Beta-level <strong>in</strong>telligence is used <strong>in</strong> chess play<strong>in</strong>grobots that will not choose <strong>the</strong> same los<strong>in</strong>g move twice. These mach<strong>in</strong>estry to learn from <strong>the</strong>ir past mistakes and experiences. A domesticrobot that is required to work around <strong>the</strong> home may need to learn itsway around <strong>the</strong> house and exhibit some beta-level <strong>in</strong>telligence.Gamma-level IntelligenceThe gamma level of <strong>in</strong>telligence uses <strong>the</strong> ability to make generalizationsfrom past experiences. This is also known as heuristics. Computerprogramm<strong>in</strong>g attempts to achieve this level of <strong>in</strong>telligence havenot yet been very successful and this area has not been very well def<strong>in</strong>ed.Gamma-level <strong>in</strong>telligence requires that averages and o<strong>the</strong>r statisticsbe calculated and used for general conclusions. Even among humans,draw<strong>in</strong>g conclusions based on statistics often results <strong>in</strong> differentoutcomes.Built-<strong>in</strong> IntelligenceMany hand-held electronic games use some built-<strong>in</strong> <strong>in</strong>telligence.This <strong>in</strong>telligence is placed <strong>in</strong> <strong>the</strong>ir memories dur<strong>in</strong>g <strong>the</strong> manufactur<strong>in</strong>gprocess. They do not learn, but <strong>the</strong>y may use a random number generatorto choose different moves to change <strong>the</strong> outcome of <strong>the</strong> game. Theuse of <strong>the</strong>se different moves gives <strong>the</strong> appearance of a variable style ofplay<strong>in</strong>g <strong>the</strong> game.Game play<strong>in</strong>g mach<strong>in</strong>es generally use ma<strong>the</strong>matical formulas tocalculate <strong>the</strong> value of an alternative move, and <strong>the</strong>y often use memorizedopen<strong>in</strong>g and end<strong>in</strong>g positions. This technique is also used <strong>in</strong> many<strong>in</strong>dustrial robots.The human nervous system uses built-<strong>in</strong> knowledge to controlfunctions such as heartbeat, breath<strong>in</strong>g, temperature, digestion, reflexes,<strong>the</strong> ability to learn and <strong>the</strong> movement of <strong>in</strong>formation between <strong>the</strong> bra<strong>in</strong>and <strong>the</strong> senses and muscles. Without this built-<strong>in</strong> <strong>in</strong>telligence we couldnot survive.Many automated devices, from clocks to w<strong>in</strong>dup toys and complexelectronic devices depend on built-<strong>in</strong> <strong>in</strong>telligence for <strong>the</strong>ir functions.In a mechanical w<strong>in</strong>dup clock, <strong>the</strong> <strong>in</strong>telligence for keep<strong>in</strong>g track of©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong><strong>the</strong> time is built <strong>in</strong>to <strong>the</strong> gears. The digital electronic clocks have <strong>the</strong>ir<strong>in</strong>telligence built <strong>in</strong>to <strong>the</strong> electronic circuitry. A clock can be though aspecial-purpose mach<strong>in</strong>e whose task it is to keep <strong>the</strong> correct time. Someelectronic clocks can even accept spoken commands ask<strong>in</strong>g what time itis and respond through a speech syn<strong>the</strong>sizer with <strong>the</strong> time.Tur<strong>in</strong>g’s TestAlan Tur<strong>in</strong>g was a British ma<strong>the</strong>matician who proposed a classictest for mach<strong>in</strong>e <strong>in</strong>telligence. Tur<strong>in</strong>g’s test <strong>in</strong>volves a room with twocomputer term<strong>in</strong>als. One of <strong>the</strong> term<strong>in</strong>als is connected to a term<strong>in</strong>al <strong>in</strong>ano<strong>the</strong>r room, with ano<strong>the</strong>r human at <strong>the</strong> keyboard. The o<strong>the</strong>r term<strong>in</strong>alis connected to a computer <strong>in</strong> ano<strong>the</strong>r room, with an artificial <strong>in</strong>telligenceprogram loaded <strong>in</strong> its memory.Now, use a keyboard to carry on conversations with <strong>the</strong> two term<strong>in</strong>als.If at <strong>the</strong> end of 15 m<strong>in</strong>utes, you cannot tell which term<strong>in</strong>al is connectedto <strong>the</strong> human and which term<strong>in</strong>al is connected to <strong>the</strong> computer,<strong>the</strong>n <strong>the</strong> computer has demonstrated some <strong>in</strong>telligence.A relatively simple program can carry on a mean<strong>in</strong>gful conversationwith a human. One of <strong>the</strong>se is ELIZA which pretends to be a psycho<strong>the</strong>rapist.This program was written as a demonstration of artificial<strong>in</strong>telligence and can run on a personal computer. The program syntacticallytakes apart <strong>the</strong> statements made by <strong>the</strong> human and rearranges<strong>the</strong>m as a response.The program has no learn<strong>in</strong>g capability and it does not understanda word <strong>the</strong> human says. The program could be firmware or built-<strong>in</strong><strong>in</strong>telligence, s<strong>in</strong>ce it does not change.Learn<strong>in</strong>g and Educable Mach<strong>in</strong>esOne area of <strong>in</strong>telligence <strong>in</strong>volves <strong>the</strong> ability to learn. This ability isgenerally assessed based on what one has learned. The famous study ofdogs by Pavlov shows how learn<strong>in</strong>g is a result of repeated cause-andeffectevents.The process of learn<strong>in</strong>g from one’s mistakes is demonstrated bychess or checkers game programs. All <strong>the</strong> possible moves for a playerare analyzed for <strong>the</strong> game. Only <strong>the</strong> legal moves are given to <strong>the</strong> pro-©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>gram and a human plays one side of <strong>the</strong> game. At <strong>the</strong> beg<strong>in</strong>n<strong>in</strong>g of <strong>the</strong>game all <strong>the</strong> pieces are l<strong>in</strong>ed up on <strong>the</strong> board.When a game is completed, if <strong>the</strong> mach<strong>in</strong>e loses, it removes fromits list of possible moves <strong>the</strong> last move it made. This is how <strong>the</strong> programlearns from its mistakes. It is not able to make <strong>the</strong> same bad move twice.The program does not know that it has won or lost <strong>the</strong> game. It onlyknows that it cannot f<strong>in</strong>d a legal move with which to cont<strong>in</strong>ue <strong>the</strong> game.It takes a number of losses to become a good player.Ano<strong>the</strong>r type of <strong>in</strong>telligence consists of build<strong>in</strong>g one’s knowledgeon <strong>the</strong> basis of previous knowledge. The computer game of Animal usesthis type of artificial <strong>in</strong>telligence learn<strong>in</strong>g.The program asks <strong>the</strong> human player to th<strong>in</strong>k of <strong>the</strong> name of ananimal so that <strong>the</strong> program can try to guess it. If <strong>the</strong> program cannotguess <strong>the</strong> name, it asks <strong>the</strong> human player to type <strong>in</strong> a question thatwould dist<strong>in</strong>guish <strong>the</strong> new animal from <strong>the</strong> last animal <strong>the</strong> computerguessed. The program saves all <strong>the</strong> <strong>in</strong>formation given to it and uses this<strong>in</strong>formation <strong>in</strong> future guesses. In a real-time environment <strong>the</strong> computerneeds to <strong>in</strong>terpret sensory <strong>in</strong>puts <strong>in</strong> time to use <strong>the</strong> <strong>in</strong>formation for <strong>the</strong>present task. Artificial <strong>in</strong>telligence programs work at a batch-level mode.A batch mode of operation means that a device processes <strong>the</strong> <strong>in</strong>formationat its own convenience. Artificial <strong>in</strong>telligence devices need to becomefaster and less expensive if <strong>the</strong>y are to give practical senses toenvironmental control.As research <strong>in</strong> artificial <strong>in</strong>telligence br<strong>in</strong>gs new and improved sensorcapabilities, this will allow more complicated tasks <strong>in</strong> <strong>HVAC</strong>. Artificial<strong>in</strong>telligence will help enable <strong>the</strong> system to work with <strong>in</strong>completeand uncerta<strong>in</strong> knowledge. It will provide help to select <strong>the</strong> right equipmentor system. It will allow <strong>the</strong> system to diagnose unexpected problemsand work around <strong>the</strong>m.Fuzzy Logic and Plant <strong>Control</strong>One way artificial <strong>in</strong>telligence may affect <strong>HVAC</strong> control is by allow<strong>in</strong>git to handle problems that do not have exact solutions. Theserequire <strong>the</strong> controller to work with fuzzy logic. Fuzzy logic problemsdeal with situations that have several gray areas and may have severalreasonable solutions. The objective is to f<strong>in</strong>d <strong>the</strong> best of <strong>the</strong>se possiblesolutions. The use of fuzzy logic can greatly <strong>in</strong>crease <strong>the</strong> system’s func-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>tionality and flexibility.The ideal automated plant takes <strong>in</strong> raw materials or fuel at one endand outputs f<strong>in</strong>ished products at <strong>the</strong> o<strong>the</strong>r end, without <strong>the</strong> aid of humanlabor. Humans may provide special talents <strong>in</strong> problem solv<strong>in</strong>g anddecision mak<strong>in</strong>g. They will set up a supply of raw materials and tell <strong>the</strong>plant what is to be produced and arrange for transport of <strong>the</strong> f<strong>in</strong>ishedproducts.The automated plant may consist of equipment, robots, and materialhandlers which are computer controlled. Much of this equipmentwill have built-<strong>in</strong> computers. The management with<strong>in</strong> <strong>the</strong> automatedfactory will be by expert systems.Supervisor computers will schedule equipment computers, while acentral management computer will schedule <strong>the</strong> supervisor computers.Human management will control <strong>the</strong> central management computer.The expert systems will allow <strong>the</strong> plant to reroute production arounddefective mach<strong>in</strong>es or to start secondary production systems. All <strong>the</strong>computers and equipment used <strong>in</strong> <strong>the</strong> automated plant will have a highlevel of <strong>in</strong>telligence.In its early stages, <strong>the</strong> automated plant’s ability will be to producea specific product. Later, this will <strong>in</strong>clude <strong>the</strong> ability to produce morethan just one product or a closely related family of products.Understand<strong>in</strong>g Human LanguagesSeveral areas of artificial <strong>in</strong>telligence deal with understand<strong>in</strong>ghuman languages. These <strong>in</strong>clude voice or speech recognition, and naturallanguage understand<strong>in</strong>g. Voice or speech recognition deals with convert<strong>in</strong>g<strong>the</strong> spoken language of humans <strong>in</strong>to recognizable patterns for<strong>the</strong> computer. Natural language understand<strong>in</strong>g <strong>in</strong>volves accept<strong>in</strong>g commands<strong>in</strong> a human language, such as English, and translat<strong>in</strong>g <strong>the</strong>secommands <strong>in</strong>to <strong>the</strong> computer’s own mach<strong>in</strong>e language. A voice recognitionsystem or a keyboard may be used to get <strong>the</strong> words <strong>in</strong>to <strong>the</strong>computer. Then <strong>the</strong> natural language understand<strong>in</strong>g program f<strong>in</strong>ds <strong>the</strong>mean<strong>in</strong>g for <strong>the</strong> words.Computer mach<strong>in</strong>e languages are precise while human languagestend to be <strong>in</strong>exact. The same English sentence conveys different mean<strong>in</strong>gsto different persons. The same person may also give different mean<strong>in</strong>gsto <strong>the</strong> same sentence under different conditions. The <strong>in</strong>exactness of©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>natural languages occurs because <strong>the</strong> mean<strong>in</strong>g of a sentence is <strong>in</strong>fluencedby <strong>the</strong> context around <strong>the</strong> sentence.A very basic natural language understand<strong>in</strong>g system can be builtfrom a 1,000-word, speaker-<strong>in</strong>dependent system. A more complete systemfor natural language understand<strong>in</strong>g would use a 10,000-word vocabulary.Voice RecognitionEarly voice recognition depended on voice pr<strong>in</strong>ts which are digitalrecord<strong>in</strong>gs of short parts of speech. These pr<strong>in</strong>ts were analyzed for <strong>the</strong>length of a word and for <strong>the</strong> frequencies used <strong>in</strong> <strong>the</strong> word. Each voicepr<strong>in</strong>t acted like a f<strong>in</strong>gerpr<strong>in</strong>t and had to be memorized for every personthat <strong>the</strong> computer would receive voice <strong>in</strong>put from.As <strong>the</strong> number of words <strong>in</strong> <strong>the</strong> vocabulary grows and <strong>the</strong> numberof persons us<strong>in</strong>g <strong>the</strong> system <strong>in</strong>creases, <strong>the</strong> amount of memory requiredfor stor<strong>in</strong>g <strong>the</strong> voice pr<strong>in</strong>ts expands and <strong>the</strong> time needed to search <strong>the</strong>voice pr<strong>in</strong>ts for a match goes up. Voice pr<strong>in</strong>t systems tend to be impracticalfor handl<strong>in</strong>g large vocabularies.Ano<strong>the</strong>r type of voice recognition uses phonics to recognize words.This requires stor<strong>in</strong>g <strong>the</strong> known phonemes of speech for a particularlanguage. These phonemes are <strong>the</strong> smallest units of speech that dist<strong>in</strong>guishone utterance from ano<strong>the</strong>r.Each word <strong>in</strong> <strong>the</strong> vocabulary is represented by <strong>the</strong>se phonemes.When a voice <strong>in</strong>put is received, <strong>the</strong> <strong>in</strong>put is broken down <strong>in</strong>to a str<strong>in</strong>gof phonemes and <strong>the</strong> computer makes its best guess at match<strong>in</strong>g <strong>the</strong>utterances to <strong>the</strong> phonemes. The computer must also recognize <strong>the</strong>breaks between each word.The computer takes <strong>the</strong> str<strong>in</strong>g of received phonemes and compares<strong>the</strong>m to known word phoneme patterns. The computer may ask for <strong>the</strong>mean<strong>in</strong>g of a new word or for repronounication of <strong>the</strong> word. If it is anew word, <strong>the</strong> computer will add <strong>the</strong> phonemes and def<strong>in</strong>ition to itsdictionary.Humans <strong>in</strong>crease <strong>the</strong> speed of <strong>the</strong>ir speech process<strong>in</strong>g by assum<strong>in</strong>gwhat <strong>the</strong>y expect to hear. This technique occasionally leads to mistakesand <strong>the</strong> hearer may have to ask for part of <strong>the</strong> speech to be repeated. Allof a person’s past experiences are used for reference <strong>in</strong> speech process<strong>in</strong>g.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Speech understand<strong>in</strong>g <strong>in</strong>volves speech recognition and word understand<strong>in</strong>g.Speech recognition deals with recogniz<strong>in</strong>g that a certa<strong>in</strong>series of sounds represents a certa<strong>in</strong> word. Word understand<strong>in</strong>g is naturallanguage understand<strong>in</strong>g and deals with <strong>the</strong> relationships betweendifferent words.Most people th<strong>in</strong>k that <strong>the</strong>y hear and understand about 80% ofwhat is said. The actual percentage can be less than 50%. One factor thatcauses a low speech recognition percentage is <strong>the</strong> use of homonyms,words that sound alike, but have different mean<strong>in</strong>gs. Follow<strong>in</strong>g aresome typical homonyms:for fore four<strong>the</strong>ir <strong>the</strong>re <strong>the</strong>y’reto too twoHomonyms can also consist of groups of words like <strong>the</strong> follow<strong>in</strong>gphrases:recognize speechwreck a nice beachAlso, every person has a unique micro-accent, speaks at differentfrequencies and vary<strong>in</strong>g speeds, and tends to run words toge<strong>the</strong>r.Speech understand<strong>in</strong>g starts with hear<strong>in</strong>g sounds, which must<strong>the</strong>n be recognized as words. F<strong>in</strong>ally <strong>the</strong> words must be comb<strong>in</strong>ed toproduce idea understand<strong>in</strong>g. Hear<strong>in</strong>g is <strong>the</strong> process of respond<strong>in</strong>g tosound waves. This requires some type of specialized sound-wave receptor.A microphone is a transducer that converts sound waves to electricalenergy. A microphone is actually a special loudspeaker runn<strong>in</strong>g backwardto detect sounds.Speech recognition systems are used to recognize spoken words.These may work on one word at a time or on cont<strong>in</strong>uous speech. Thesystem may be tuned to a s<strong>in</strong>gle person’s voice, or it may be usable bymany different persons. The least expensive systems operate with isolatedwords and are speaker-dependent.Speaker-dependent SystemsA speaker-dependent system is a speech recognition system thatrecognizes only <strong>the</strong> words or commands spoken by one particular hu-©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>man. A word spoken by a human has a complex waveform that is asunique as a f<strong>in</strong>gerpr<strong>in</strong>t. The electronic record<strong>in</strong>gs of human words arecalled voice pr<strong>in</strong>ts. A speaker-dependent system is less costly than aspeaker-<strong>in</strong>dependent system, but it must be tra<strong>in</strong>ed by hav<strong>in</strong>g <strong>the</strong> <strong>in</strong>tendeduser speak <strong>the</strong> command words while <strong>the</strong> system records <strong>the</strong>m.These voice pr<strong>in</strong>ts are later used by <strong>the</strong> system for match<strong>in</strong>g <strong>the</strong> present<strong>in</strong>put.Most systems digitize <strong>the</strong> voice pr<strong>in</strong>t and break it down <strong>in</strong>to itsdifferent frequency components. The more <strong>in</strong>formation saved about <strong>the</strong>voice, <strong>the</strong> more secure <strong>the</strong> system is from unauthorized use. If <strong>the</strong> personis talk<strong>in</strong>g under stress or <strong>in</strong> a noisy environment, <strong>the</strong> system maynot recognize <strong>the</strong> commands given. Most speaker-dependent systemshave a limited number of words <strong>in</strong> <strong>the</strong>ir vocabulary. A speaker-dependentsystem must also be retra<strong>in</strong>ed when you switch users.Speaker-<strong>in</strong>dependent SystemsA speaker-<strong>in</strong>dependent system is a voice recognition system designedto recognize commands given to it no matter who does <strong>the</strong>speak<strong>in</strong>g. S<strong>in</strong>ce different persons say words at different speeds, frequencies,and <strong>in</strong>flections, a speaker-<strong>in</strong>dependent system must analyze <strong>the</strong>speech <strong>in</strong> several steps and <strong>the</strong>n base its identification on <strong>the</strong> results.First, it breaks <strong>the</strong> sounds down <strong>in</strong>to phonemes so it must be ableto f<strong>in</strong>d <strong>the</strong> pauses <strong>in</strong> <strong>the</strong> words. Then, it looks up <strong>the</strong> phonemes <strong>in</strong> itsmemory and tries to f<strong>in</strong>d <strong>the</strong> words <strong>the</strong>y represent, which can requirestor<strong>in</strong>g several pronunciations of <strong>the</strong> words. Then, it compares <strong>the</strong>sewords aga<strong>in</strong>st known commands and selects a command. If a commandis not understood, <strong>the</strong> speech recognition system must request that <strong>the</strong>command be given aga<strong>in</strong>.For short vocabularies, <strong>the</strong> voice pr<strong>in</strong>t technique can be used by aspeaker-dependent system. For large vocabularies, <strong>the</strong> phonic techniquetakes less memory space and is more efficient.Isolated-word Recognition SystemsIsolated-word recognition refers to a speech recognition systemthat only hears one word at a time (Figure 6-1). It processes <strong>the</strong> word it©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>hears and performs <strong>the</strong> associated command. If multiple words are spokento an isolated-word recognition system, it treats <strong>the</strong>m as a s<strong>in</strong>gleword or command.Many word recognition systems operate with isolated words.These may be speaker-dependent or speaker-<strong>in</strong>dependent. These systemshave been used for giv<strong>in</strong>g simple commands to a mach<strong>in</strong>e or robot.An isolated-word, speaker-<strong>in</strong>dependent voice recognition <strong>in</strong>tegratedcircuit like <strong>the</strong> VCP200 can understand <strong>the</strong> words go, stop, leftturn, turn right, and reverse. It can also understand yes/no or on/off.Olivetti of Italy has worked on a listen<strong>in</strong>g and talk<strong>in</strong>g mach<strong>in</strong>e thatcan function as a listen<strong>in</strong>g typewriter. It acts as an isolated-word,speaker-<strong>in</strong>dependent word recognition system with a vocabulary of10,000 words. When a word is first spoken, <strong>the</strong> mach<strong>in</strong>e selects <strong>the</strong> bestthree or four candidates for <strong>the</strong> actual word and places <strong>the</strong> likeliest of<strong>the</strong>se <strong>in</strong> <strong>the</strong> text. If later words give a better clue to <strong>the</strong> word just spoken,<strong>the</strong> mach<strong>in</strong>e goes back and changes that word <strong>in</strong> <strong>the</strong> text.Figure 6-1. Isolated-word recognition system©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>Cont<strong>in</strong>uous-speech Recognition SystemsA cont<strong>in</strong>uous-speech recognition system is capable of understand<strong>in</strong>gsentence-length concepts and ideas (Figure 6-2). This type of speechrecognition system has to overcome problems that are not encounteredby an isolated-word recognition system. A cont<strong>in</strong>uous-speech recognitionsystem must work <strong>in</strong> real time so it must understand what is be<strong>in</strong>gsaid shortly after hear<strong>in</strong>g each word. Cont<strong>in</strong>uous-speech recognitionFigure 6-2. Cont<strong>in</strong>uous-speed recognition system©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>systems can use a learn<strong>in</strong>g process similar to Morse Code. Learn<strong>in</strong>gstarts with recogniz<strong>in</strong>g <strong>the</strong> dots, dashes, and spaces. Then, learn<strong>in</strong>gproceeds to recognize <strong>the</strong> characters without hav<strong>in</strong>g to count <strong>the</strong> dotsand dashes. Next, you learn to recognize simple words and eventuallyget to predict complete sentences or phrases.Fast speech recognition requires that <strong>the</strong> system must be able torecognize common phrases. S<strong>in</strong>ce speech recognition systems are used<strong>in</strong> specific application areas, <strong>the</strong> language of <strong>the</strong> particular applicationlike <strong>HVAC</strong> becomes <strong>the</strong> heart of <strong>the</strong> system’s common-word vocabulary.Speech Recognition TechniquesFour approaches or techniques for electronic speech recognitionexist. Acoustical techniques depend on <strong>the</strong> analysis of <strong>the</strong> speech waveform. Signal analysis can be done with Fourier frequency analysis, pr<strong>in</strong>cipalcomponent analysis and statistical decision mak<strong>in</strong>g.The speech perception approach bases speech <strong>in</strong>terpretation on <strong>the</strong>essential components of speech such as <strong>the</strong> length of <strong>the</strong> sounds, <strong>the</strong>separation of vowel and consonant sounds, feature detection and l<strong>in</strong>guisticcategories. Speech production techniques are based on <strong>the</strong> idea ofunderstand<strong>in</strong>g how speech is produced <strong>in</strong> order to understand its mean<strong>in</strong>g.Speech reception techniques duplicate <strong>the</strong> human auditory receptionprocess <strong>in</strong> a mach<strong>in</strong>e. It is based on observ<strong>in</strong>g how <strong>the</strong> ear receivessound and converts it <strong>in</strong>to electrical impulses, and how <strong>the</strong> nerves transmit<strong>the</strong> sound <strong>in</strong>formation. The concept is to replicate <strong>the</strong> process mechanically.Humans hear <strong>the</strong> contextual mean<strong>in</strong>g between spoken words andpast experiences and <strong>the</strong>se are used for speech <strong>in</strong>terpretation, as well as<strong>the</strong> physical gestures made by <strong>the</strong> speaker.Speech Recognition ProblemsSpeech recognition systems have some common problems. Theyneed to be able to identify <strong>the</strong> most probable answer, but <strong>the</strong> only systemthat can be expected to f<strong>in</strong>d exact matches is a voice pr<strong>in</strong>t system.All systems require a means of receiv<strong>in</strong>g <strong>the</strong> sound waves and©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>convert<strong>in</strong>g <strong>the</strong>m to electronic signals. This requires some type of microphoneand amplifier circuit, as well as some type of automatic levelcontrol to make <strong>the</strong> sounds peak at <strong>the</strong> same level. Spectrum analysiscan be done on <strong>the</strong> analog signals, as can zero cross<strong>in</strong>g or utteranceboundary detection.The analog signals may also be converted <strong>in</strong>to digital signals andstored <strong>in</strong> memory. The memory can be scanned and compared to <strong>the</strong>present <strong>in</strong>put for a voice pr<strong>in</strong>t match. Spectrum analysis, zero cross<strong>in</strong>gand utterance boundary detection can also be done as digital <strong>in</strong>formationstored <strong>in</strong> memory.If cont<strong>in</strong>uous-word recognition is used, <strong>the</strong>re may be additionaltasks of prosopic analysis, syntactic analysis, semantic analysis, andpragmatic analysis. Prosopic analysis tries to f<strong>in</strong>d clues to l<strong>in</strong>guisticstructures, stressed words and areas of phonetic reliability. Syntacticanalysis <strong>in</strong>volves sentence structures and grammatical relations. Semanticanalysis checks <strong>the</strong> <strong>in</strong>terpretation of <strong>the</strong> words for a mean<strong>in</strong>gful sentence.Pragmatic analysis is used to verify hypo<strong>the</strong>sized word comb<strong>in</strong>ations.Speech Syn<strong>the</strong>sisSpeech syn<strong>the</strong>sis refers to <strong>the</strong> process by which a mach<strong>in</strong>e producesspeech. Voice <strong>in</strong>put/output can simplify human/<strong>HVAC</strong> <strong>in</strong>teractionsand make <strong>HVAC</strong> more user-friendly.Voice output or speech syn<strong>the</strong>sis is considerably easier to add to amach<strong>in</strong>e than vision process<strong>in</strong>g or voice <strong>in</strong>put. When phonic <strong>in</strong>tegratedcircuits are used, voice output requires less comput<strong>in</strong>g power.Speech is omnidirectional and understood by most humans. Humanscan listen to <strong>the</strong> speech output of a mach<strong>in</strong>e while focus<strong>in</strong>g onsome o<strong>the</strong>r task. In an emergency, a mach<strong>in</strong>e could use voice or speechoutput to transmit critical <strong>in</strong>formation faster than it could by us<strong>in</strong>glights, sirens or displays.Some of <strong>the</strong> earliest work on mach<strong>in</strong>e speech syn<strong>the</strong>sis is creditedto Alexander Graham Bell, <strong>in</strong> <strong>the</strong> mid-1800s. Us<strong>in</strong>g bellows and o<strong>the</strong>rmechanical devices, Bell tried to build a copy of <strong>the</strong> human speechmechanism. He was able to simulate a few words and this work contributedto his <strong>in</strong>vention of <strong>the</strong> telephone.Three methods can be used to produce mach<strong>in</strong>e speech output:©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>• prerecorded messages produced by human voices,• digitized words produced by human voices and• phonic <strong>in</strong>tegrated circuits.Early electronic speech units used tape record<strong>in</strong>gs of a humanvoice. The human voice is an analog form of energy made up of a mixtureof tones. If prerecorded messages are stored on a s<strong>in</strong>gle magnetictape, <strong>the</strong> tape will have to be searched each time for <strong>the</strong> correct message.This time delay could be a problem <strong>in</strong> an emergency.Samples of prerecorded human voice output are still used <strong>in</strong> sometoys. A m<strong>in</strong>iature record is used. Digital audio record<strong>in</strong>gs can use acompact disk for high-quality sound, and a large amount of memory canbe accessed <strong>in</strong> less than 1 second.A system that uses a digitized human voice is able to store <strong>the</strong>sounds <strong>in</strong> computer memory, like any o<strong>the</strong>r digital <strong>in</strong>formation. Thesounds made by a human be<strong>in</strong>g are converted and stored as digital<strong>in</strong>formation.A National Semiconductor digitized human voice system calledDigitalker used from 3 to 5 special ICs along with several support ICsfor address selection and audio amplification. The ma<strong>in</strong> IC was aMM54104 microprocessor-based controller. The ROM ICs held a total of274 words. Any message made up of <strong>the</strong>se words can be spoken by <strong>the</strong>Digitalker. Special ROMs are used to satisfy a specific application.The Digitalker <strong>in</strong>terfaces to a personal computer through a parallelpr<strong>in</strong>ter port. Programm<strong>in</strong>g <strong>the</strong> Digitalker <strong>in</strong>volves send<strong>in</strong>g it a series ofhexadecimal addresses of words that are to be spoken. The addresses for<strong>the</strong> proper pauses between words must also be <strong>in</strong>cluded.An <strong>in</strong>expensive way of produc<strong>in</strong>g speech output for mach<strong>in</strong>es is touse phonic <strong>in</strong>tegrated circuits. A phonic <strong>in</strong>tegrated circuit uses phonemeswhich are <strong>the</strong> smallest dist<strong>in</strong>ct units of speech to produce speech.A typical phonic <strong>in</strong>tegrated circuit may have 64 phonemes, which<strong>in</strong>cludes 5 different lengths of pauses. The o<strong>the</strong>r 59 phonemes are <strong>the</strong>sounds such as “OY” <strong>in</strong> boy and “AY” <strong>in</strong> sky. See Table 6-1.A processor and an audio amplifier forms a work<strong>in</strong>g system with<strong>the</strong>se ICs. A sound is produced by giv<strong>in</strong>g <strong>the</strong> processor <strong>the</strong> address of<strong>the</strong> desired phoneme. By giv<strong>in</strong>g <strong>the</strong> processor a series of addresses, youcan produce words and sentences. To produce <strong>the</strong> word MAY, for example,you could address an MM, as <strong>in</strong> milk, and <strong>the</strong>n an EY, as <strong>in</strong>beige.©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>Table 6-1. Typical Integrated Circuit Phonemes————————————————————————————————Hexadecimal Phonemes Mean<strong>in</strong>g orAddressSound————————————————————————————————00 PA1 Pause 10 MS01 PA2 Pause 30 MS02 PA3 Pause 50 MS03 PA4 Pause 200 MS3A OR Store3B AR Alarm3C YR Clear————————————————————————————————Produc<strong>in</strong>g <strong>the</strong> word six is more complex. It requires:• two SS sounds as <strong>in</strong> vest,• two IH sounds as <strong>in</strong> sit,• a pause of 50 milliseconds,• KK sound as <strong>in</strong> sky and• SS sound as <strong>in</strong> vest.Us<strong>in</strong>g phonics requires some process<strong>in</strong>g time.Most phonic <strong>in</strong>tegrated circuits cannot remember a series of commands.They work on only one command at a time. Additional circuitsare required to get <strong>the</strong> <strong>in</strong>tegrated circuit to produce more than isolatedsounds.The CTS256A-AL2 text-to-speech controller IC handles many of<strong>the</strong> support functions for <strong>the</strong> SP0256-AL2 Speech syn<strong>the</strong>sizer IC. It acceptsASCII characters as <strong>in</strong>put and outputs <strong>the</strong> phoneme codes to <strong>the</strong>SP0256-AL2. The CTS256SA-AL2 furnishes a buffer for <strong>the</strong> ASCII characters,and it can forward <strong>the</strong> characters for pronunciation as s<strong>in</strong>gle letters,s<strong>in</strong>gle words, or groups of words separated by appropriate punctuationmarks.The sounds <strong>in</strong> an <strong>in</strong>tegrated circuit are always pronounced <strong>the</strong>same way each time. While <strong>the</strong> base frequency of <strong>the</strong> voice can be varied,it is still not a pleasant voice. The phonemes do not represent regionalspeech differences and do not handle accents well.These phonemes are made for American English and if <strong>the</strong> speech©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>system were used to pronounce Spanish or French, it would be hard torecognize what is be<strong>in</strong>g said. Each spoken language has its own comb<strong>in</strong>ationof phonemes. Programm<strong>in</strong>g <strong>the</strong> SP0256-AL2 <strong>in</strong>volves send<strong>in</strong>g aseries of addresses to <strong>the</strong> IC. These addresses must <strong>in</strong>clude phonemesfor each word, <strong>in</strong>clud<strong>in</strong>g <strong>the</strong> pauses with<strong>in</strong> each word and <strong>the</strong> pausesbetween words. User-def<strong>in</strong>ed speeches consist of mach<strong>in</strong>e language <strong>in</strong>structionplaced around <strong>the</strong> phoneme addresses. Speech or voice syn<strong>the</strong>sizersare available for personal computers. Table 6-2 shows a list ofstored words for digitized voice systems.Table 6-2. Typical Stored Words for Digitized Voice System————————————————————————————————WordHexadecimalAddress————————————————————————————————Emergency 23End 24Enter 25Entry 26Evacuate 28Exit 29Fail2AFailure2B————————————————————————————————Expert SystemsExpert systems mimic <strong>the</strong> tasks usually carried out by experts. Theexpertise of <strong>the</strong>se systems is conf<strong>in</strong>ed to a well-def<strong>in</strong>ed area. Unlikehumans, <strong>the</strong>se systems lack common sense and cannot extrapolate <strong>the</strong>irknowledge beyond <strong>the</strong>ir narrow doma<strong>in</strong> of expertise. Expert systems actlike a storehouse of knowledge with ways of retriev<strong>in</strong>g this knowledgeto solve a particular problem (Figure 6-3).An expert system is a computer program that has some <strong>in</strong>formationthat helps it to make a decision. One simple example is a troubleshoot<strong>in</strong>gtable given <strong>in</strong> a product manual. A set of procedures for©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>Figure 6-3. Expert system structuretroubleshoot<strong>in</strong>g a computer system is also known as a diagnostic decisionlogic table (DDLT).Robotic systems are us<strong>in</strong>g expert systems to decide which robot isbest for perform<strong>in</strong>g a particular task and to help troubleshoot brokenrobots. Expert systems are also used to schedule factory production andma<strong>in</strong>tenance.An expert system can have four parts:• <strong>in</strong>ference eng<strong>in</strong>e,• knowledge base,• database and• natural language <strong>in</strong>terface.The <strong>in</strong>ference eng<strong>in</strong>e acts as a rule <strong>in</strong>terpreter which matches factsand rule conditions. It is <strong>the</strong> controller of <strong>the</strong> system. The knowledgebase conta<strong>in</strong>s <strong>the</strong> rules while <strong>the</strong> database collects <strong>the</strong> facts given to <strong>the</strong>system by <strong>the</strong> user. These facts are used by <strong>the</strong> <strong>in</strong>ference eng<strong>in</strong>e <strong>in</strong> decid<strong>in</strong>gwhat rules to apply to <strong>the</strong> problem. The natural language <strong>in</strong>terfaceallows <strong>the</strong> user to communicate with <strong>the</strong> expert system <strong>in</strong> a naturallanguage such as English or French.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The expert system operates <strong>in</strong> one of two modes. The expert orknowledge acquisition mode is used to enter rules <strong>in</strong>to <strong>the</strong> system. Theuser or consultation mode is used to solve <strong>the</strong> problem (Figure 6-4).The game of Animal acts like an expert system. When it asks forquestions, it is operat<strong>in</strong>g <strong>in</strong> <strong>the</strong> knowledge acquisition mode. It uses <strong>the</strong>answers to <strong>the</strong>se questions to construct or add to its expert system ofanimal classification. Similar classification expert systems are used <strong>in</strong>medic<strong>in</strong>e, publish<strong>in</strong>g, geology, and construction.The expert system for <strong>the</strong> game of Animal works with completeand certa<strong>in</strong> <strong>in</strong>formation. O<strong>the</strong>r expert systems work with uncerta<strong>in</strong> or<strong>in</strong>complete <strong>in</strong>formation. This <strong>in</strong>cludes medical programs used to diagnoseand prescribe treatment for specific problems like bacterial <strong>in</strong>fectionsof <strong>the</strong> blood.Expert systems have been used <strong>in</strong> <strong>the</strong> follow<strong>in</strong>g control areas:• fault diagnosis and troubleshoot<strong>in</strong>g,• quality control,• control system syn<strong>the</strong>sis,• statistical control and• alarm management.Artificial neural networks (ANN) can be used as a tool for exam<strong>in</strong><strong>in</strong>gdata and determ<strong>in</strong><strong>in</strong>g relationships. They are useful for captur<strong>in</strong>grelationships among measurements and model<strong>in</strong>g. Compared to <strong>the</strong>technology of expert systems, <strong>the</strong> technology of neural networks isnewer.Figure 6-4. One type of expert system operates <strong>in</strong> an expert modewhile learn<strong>in</strong>g new facts and <strong>in</strong> a user mode while us<strong>in</strong>g its knowledgebase.©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>Structure of Expert SystemsExpert systems encode <strong>the</strong> relevant knowledge about <strong>the</strong> problemdoma<strong>in</strong> <strong>in</strong> a form which is suitable for manipulation. The structure of<strong>the</strong> expert system separates <strong>the</strong> knowledge from <strong>the</strong> mechanism formanipulat<strong>in</strong>g <strong>the</strong> knowledge.It is this separation of <strong>the</strong> knowledge base from <strong>the</strong> reason<strong>in</strong>gprocess that makes expert systems different from most o<strong>the</strong>r softwarepackages. The type of knowledge <strong>in</strong> <strong>the</strong> knowledge base depends on <strong>the</strong>problem. Knowledge is stored <strong>in</strong> <strong>the</strong> follow<strong>in</strong>g ways:• Acts As temperature goes up, fuel use <strong>in</strong>creases.• Rules If space temperature is high, <strong>the</strong>n <strong>the</strong> <strong>HVAC</strong> systemis faulty.• Data frames Data structures for stor<strong>in</strong>g <strong>in</strong>formation <strong>in</strong> a hierarchicalformat.• Objects These perform specific tasks such as an energy balance.Objects may be coded <strong>in</strong> o<strong>the</strong>r programm<strong>in</strong>g languages and both <strong>the</strong>knowledge and <strong>the</strong> data can be ei<strong>the</strong>r qualitative or quantitative s<strong>in</strong>ceexpert systems have <strong>the</strong> ability to deal with qualitative data and knowledge.The problem-solv<strong>in</strong>g strategy of <strong>the</strong> expert system is conta<strong>in</strong>ed <strong>in</strong><strong>the</strong> <strong>in</strong>ference eng<strong>in</strong>e. The rules <strong>in</strong> <strong>the</strong> knowledge base are applied <strong>in</strong> acerta<strong>in</strong> sequence until a conclusion is reached. This process is called rulecha<strong>in</strong><strong>in</strong>g.The user <strong>in</strong>terface provides a mechanism for <strong>the</strong> expert to enterknowledge and <strong>the</strong> user to enter data for a specific problem. Most expertsystems are programmed us<strong>in</strong>g expert systems shells.An expert system shell conta<strong>in</strong>s all of <strong>the</strong> structure, but its knowledgebase is empty. By programm<strong>in</strong>g <strong>the</strong> shell to conta<strong>in</strong> knowledgeabout a doma<strong>in</strong>, an expert system can be built up.Real-time expert systems <strong>in</strong>volve <strong>the</strong> time element <strong>in</strong> <strong>the</strong> reason<strong>in</strong>gprocess and must be <strong>in</strong>tegrated with sensor and data communicationswith <strong>the</strong> operator (Figure 6-5). Examples of real-time expert systems<strong>in</strong>clude G2 from Gensym and Expert 90 from Bailey <strong>Control</strong>s.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 6-5. Real-time expert systemKnowledge acquisition is <strong>the</strong> ma<strong>in</strong> problem <strong>in</strong> <strong>the</strong> implementationof expert systems. One technique is to use knowledge eng<strong>in</strong>eers to <strong>in</strong>terviewexperts and <strong>the</strong>n <strong>in</strong>corporate <strong>the</strong> knowledge <strong>in</strong>to an expert system.Ano<strong>the</strong>r technique is to have <strong>the</strong> expert enter <strong>the</strong> knowledge <strong>in</strong>to <strong>the</strong>expert system shell. This technique has been more popular.Most shells are designed to allow <strong>the</strong> knowledge base constructionto be automated. Some shells generate <strong>the</strong> knowledge base from examples.Expert Systems <strong>in</strong> <strong>Control</strong>Expert system applications <strong>in</strong>clude both control system design andreal-time control. In expert systems for design, <strong>the</strong> goal is to reduce <strong>the</strong>design time and to produce optional designs. The expert system ga<strong>the</strong>rs<strong>the</strong> knowledge, organizes it and codes it <strong>in</strong>to <strong>the</strong> program. The user<strong>in</strong>teracts with <strong>the</strong> program <strong>in</strong> an <strong>in</strong>terview mode, supply<strong>in</strong>g relevantdata on a specific problem. The expert system will suggest an appropriatecontrol configuration and several options. The advantage of such an©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>expert system is that it can be reproduced, distributed and <strong>the</strong> expertisebecomes easily available.The expert system can be looked at as a way of captur<strong>in</strong>g <strong>the</strong> expertknowledge <strong>in</strong> specialized areas. However, <strong>the</strong> knowledge conta<strong>in</strong>ed<strong>in</strong> an expert system is never complete and <strong>the</strong> output of an expert systemmust be validated.The expert system can capture diagnostic knowledge and code it <strong>in</strong>a software package that could <strong>the</strong>n be used by operators to diagnoserout<strong>in</strong>e problems. A convenient way to represent <strong>the</strong> knowledge is <strong>in</strong> <strong>the</strong>form of a decision tree with each node <strong>in</strong> <strong>the</strong> tree represent<strong>in</strong>g a decisionto be made regard<strong>in</strong>g <strong>the</strong> possible cause of <strong>the</strong> problem.Expert systems can serve as an additional tool for <strong>the</strong> <strong>in</strong>experiencedoperator <strong>in</strong> diagnosis of faults. The expert system can diagnose<strong>the</strong> cause of <strong>the</strong> fault and suggest actions to correct <strong>the</strong> situation.The user <strong>in</strong>terface is critical as well as <strong>the</strong> type of queries made by<strong>the</strong> expert system dur<strong>in</strong>g <strong>the</strong> diagnostic session. O<strong>the</strong>r critical parts <strong>in</strong>clude<strong>the</strong> language and term<strong>in</strong>ology used, <strong>the</strong> use of graphics and <strong>the</strong>response time of <strong>the</strong> system to entries made by <strong>the</strong> user.Statistical <strong>Control</strong>On-l<strong>in</strong>e statistical control is a good tool for monitor<strong>in</strong>g if a processis operat<strong>in</strong>g normally. Many DCS systems generate quality controlcharts automatically but <strong>the</strong> operator has to decide <strong>the</strong> action to take ifsome abnormality is detected. This can be done us<strong>in</strong>g some type ofPareto analysis.On-l<strong>in</strong>e expert systems are sometimes called DCS-embedded expertsystems and <strong>the</strong>y can do this diagnosis automatically. The DCS canfeed <strong>the</strong> current state of <strong>the</strong> process to <strong>the</strong> expert system at pre-specified<strong>in</strong>tervals of time. Messages on <strong>the</strong> operator console provide alarms thatnot only po<strong>in</strong>t to <strong>the</strong> problem but also provide advice on possible causesand solutions.On-l<strong>in</strong>e expert systems may acquire <strong>the</strong>ir knowledge base automatically.This falls under <strong>the</strong> doma<strong>in</strong> of mach<strong>in</strong>e learn<strong>in</strong>g. In a large<strong>HVAC</strong> system <strong>the</strong>re may be a large amount of data that is generatedfrom sensors. This data must be reduced to a form that can be used byan expert system.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Future TrendsExpert systems open a new dimension <strong>in</strong> <strong>the</strong> way computers canbe used for <strong>HVAC</strong>. Expert systems technology is be<strong>in</strong>g <strong>in</strong>tegrated <strong>in</strong>to<strong>the</strong> architecture of many distributed control systems and networkedprogrammable controller systems. Self-tun<strong>in</strong>g PID controllers use expertsystem technology. A boiler might <strong>in</strong>corporate a troubleshoot<strong>in</strong>g anddiagnostic expert system as part of <strong>the</strong> control system for <strong>the</strong> boiler.Expert system applications <strong>in</strong>clude sensor test<strong>in</strong>g and validation,control system design validation, performance evaluation, diagnostics,on-l<strong>in</strong>e tun<strong>in</strong>g and statistical control and analysis.Neural NetworksNeural networks such as expert systems, fuzzy logic, robotics,natural language process<strong>in</strong>g, and mach<strong>in</strong>e vision, are parts of <strong>the</strong> overalltechnology umbrella known as artificial <strong>in</strong>telligence (AI). Neural networksattempt to mimic <strong>the</strong> structures and process of biological neuralsystems. They provide a powerful analysis technique for complex process<strong>in</strong>gof large amounts of <strong>in</strong>put/output <strong>in</strong>formation. They have <strong>the</strong>ability to generalize or form concepts.Artificial neural networks (ANNs) are a useful <strong>in</strong>formation abstraction<strong>in</strong> model<strong>in</strong>g <strong>in</strong>telligence <strong>in</strong> control systems. Neural networksmay be thought of as a functional mapp<strong>in</strong>g of <strong>in</strong>puts to outputs us<strong>in</strong>gan <strong>in</strong>terconnected network of nodes. Weights are given to <strong>the</strong> node <strong>in</strong>terconnectionsto achieve <strong>the</strong> desired mapp<strong>in</strong>g.Artificial neural networks are a cognitive <strong>in</strong>formation process<strong>in</strong>gstructure based upon <strong>the</strong> models of bra<strong>in</strong> function. It is a highly paralleldynamic system that processes <strong>in</strong>formation us<strong>in</strong>g <strong>the</strong> state response to<strong>in</strong>puts.The advantage of neural networks is <strong>in</strong> <strong>the</strong>ir ability to learn arbitraryfunction mapp<strong>in</strong>g with little or no prior knowledge about <strong>the</strong> functionitself. They provide <strong>the</strong> capability to do black-box model<strong>in</strong>g of aprocess given only <strong>the</strong> Input/Output data.These networks have proved to be robust, resilient and capable ofadaptive learn<strong>in</strong>g. The disadvantage is that <strong>the</strong> knowledge is implied by<strong>the</strong> network connection weights.Neural networks have been used as virtual or soft sensors to <strong>in</strong>fer©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>quality from sensor data. DuPont has used <strong>the</strong>m to predict <strong>the</strong> compositionof chemical mixtures.The <strong>in</strong>puts to <strong>the</strong> network are measurements of <strong>the</strong> mixture. Tra<strong>in</strong><strong>in</strong>g<strong>the</strong> network to determ<strong>in</strong>e <strong>the</strong> network connection weights <strong>in</strong>volvesdata from mixtures whose composition is known. Numerical algorithmsto tra<strong>in</strong> <strong>the</strong> network are used from commercial software packages. Du-Pont has also used neural network<strong>in</strong>g as a virtual sensor to predictperiodically measured concentrations.Historical data on temperature, pressure, and concentration wereused to tra<strong>in</strong> a network to predict <strong>the</strong> concentration from temperatureand pressure measurements. This tra<strong>in</strong>ed network can <strong>the</strong>n be used toprovide cont<strong>in</strong>uous, on-l<strong>in</strong>e prediction of concentration.Neural networks are a tool to solve many complex problems. Theymay be embedded <strong>in</strong> databases or expert system applications or act aspreprocessors or postprocessors to o<strong>the</strong>r systems.Neural networks have <strong>the</strong> ability to adapt, generalize, and extrapolateresults. However, <strong>the</strong>y cannot optimize and need lots of data. Theycan be unpredictable <strong>in</strong> untra<strong>in</strong>ed areas and are not well understood orwidely accepted.Neutral Network GrowthThe basic concepts of <strong>the</strong> neural network have been known s<strong>in</strong>ce<strong>the</strong> 1940s. The <strong>the</strong>oretical foundations were established <strong>in</strong> <strong>the</strong> 1960s and1970s. Research of <strong>the</strong> 1980s-1990s provided <strong>the</strong> first applications.The researchers <strong>in</strong>cluded neuroscientists, cognitive psychologists,physicists, computer scientists, ma<strong>the</strong>maticians, and eng<strong>in</strong>eers. The <strong>in</strong>creas<strong>in</strong>gpower and <strong>in</strong>expensive cost of comput<strong>in</strong>g allowed <strong>the</strong> developmentand deployment of systems for <strong>in</strong>dustrial applications.Neural networks obta<strong>in</strong> <strong>the</strong>ir name and some of <strong>the</strong>ir associatedterm<strong>in</strong>ology from biological systems (Figure 6-6). Neural networks arebuilt of neurons which are also called nodes or process<strong>in</strong>g elements.These nodes are usually arranged <strong>in</strong> layers or slabs and are oftenconnected to nodes <strong>in</strong> o<strong>the</strong>r layers. A layer is a set of nodes with weightsthat are actively manipulated. These layers serve as a buffer between <strong>the</strong><strong>in</strong>puts or outputs or o<strong>the</strong>r layers.A slab is a set of nodes that may be different <strong>in</strong> <strong>the</strong>ir <strong>in</strong>ternal specificationsor connectivity but which share <strong>the</strong> same layer. A s<strong>in</strong>gle layer©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 6-6. Neural net process<strong>in</strong>g analogycan consist of multiple slabs.Each node processes <strong>the</strong> <strong>in</strong>put it receives, uses <strong>the</strong>se connectionsand provides a cont<strong>in</strong>uous output to o<strong>the</strong>r process<strong>in</strong>g elements us<strong>in</strong>g itsoutgo<strong>in</strong>g connections. Like biological systems, <strong>the</strong> strengths of <strong>the</strong>seconnections may change.The different ways <strong>the</strong> process<strong>in</strong>g elements <strong>in</strong> a network are connected,how <strong>the</strong> process<strong>in</strong>g elements process <strong>the</strong>ir <strong>in</strong>formation, and how<strong>the</strong> connection strengths are changed make up <strong>the</strong> neural network.There are more than 100 different types of neural networks and thisnumber is still grow<strong>in</strong>g.L<strong>in</strong>ear programs and o<strong>the</strong>r older model<strong>in</strong>g techniques require thatan algorithm describe how <strong>the</strong> system should proceed. Data is fetchedwhen needed for execution of <strong>the</strong> <strong>in</strong>structions and <strong>the</strong> results stored.These operations are performed <strong>in</strong> a determ<strong>in</strong>istic and sequential manner.Neural networks consist of heavily <strong>in</strong>terconnected process<strong>in</strong>g elementsthat do not store <strong>in</strong>formation. The knowledge that is stored dependson <strong>the</strong> way <strong>the</strong> process<strong>in</strong>g elements are connected and by <strong>the</strong>importance of each connection, known as its weight.Ra<strong>the</strong>r than be<strong>in</strong>g programmed, neural networks are tra<strong>in</strong>ed. Thenetwork adjusts itself based on a specified learn<strong>in</strong>g rule that corrects <strong>the</strong>response to a desired response. Many representative samples are neededby a neural network <strong>in</strong> order for it to learn its rules for process<strong>in</strong>gknowledge.©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>Neural Network OperationA neural network process<strong>in</strong>g element has many <strong>in</strong>put paths whichare <strong>in</strong>dividually multiplied by a weight and <strong>the</strong>n summed. A nonl<strong>in</strong>eartransfer function known as a squash<strong>in</strong>g function is applied to <strong>the</strong> resultto calculate each process<strong>in</strong>g element’s output.The transfer function must provide both nonl<strong>in</strong>earity and stabilityto <strong>the</strong> network. Typical transfer functions <strong>in</strong>clude <strong>the</strong> sigmoid transferfunction which is most often used <strong>in</strong> back-propagation networks andTanH which is a bipolar version of <strong>the</strong> sigmoid.The output value of <strong>the</strong> transfer function is usually passed directlyto <strong>the</strong> output path of <strong>the</strong> process<strong>in</strong>g element. The output path is <strong>the</strong>nconnected to <strong>in</strong>put paths of o<strong>the</strong>r process<strong>in</strong>g elements through connectionweights. The weights and connections form <strong>the</strong> memory or knowledgeof <strong>the</strong> neural net. S<strong>in</strong>ce each connection has a correspond<strong>in</strong>gweight, <strong>the</strong> signals on <strong>the</strong> <strong>in</strong>put l<strong>in</strong>es to a process<strong>in</strong>g element are modifiedby <strong>the</strong>se weights prior to be<strong>in</strong>g summed. Thus, <strong>the</strong> summationfunction is a weighted summation.A neural network consists of many process<strong>in</strong>g elements jo<strong>in</strong>edtoge<strong>the</strong>r. A typical network consists of a sequence of layers with connectionsbetween successive layers. A m<strong>in</strong>imum of two layers is required.These are <strong>the</strong> <strong>in</strong>put buffer where data is presented and <strong>the</strong> output layerwhere <strong>the</strong> results are held. Many networks also use <strong>in</strong>termediate layerscalled hidden layers.Applications for neural networks need an abundance of historicaldata or examples with data dependence on several <strong>in</strong>teract<strong>in</strong>g parameters.Back-propagation neural networks have been used <strong>in</strong> chemicalprocess control to predict boil<strong>in</strong>g po<strong>in</strong>ts.The type and number of process<strong>in</strong>g elements, <strong>the</strong> number of slabs,<strong>the</strong> number of layers, <strong>the</strong> connectivity of <strong>the</strong> layers, <strong>the</strong> transfer function,<strong>the</strong> learn<strong>in</strong>g algorithm or rule are all parameters of <strong>the</strong> network.O<strong>the</strong>r parameters <strong>in</strong>clude <strong>the</strong> learn<strong>in</strong>g threshold and learn<strong>in</strong>g coefficientsand learn<strong>in</strong>g schedule.The learn<strong>in</strong>g schedule is a breakpo<strong>in</strong>t table that allows <strong>the</strong> learn<strong>in</strong>gcoefficient to decay after a number of learn<strong>in</strong>g passes. The higher <strong>the</strong>learn<strong>in</strong>g coefficient, <strong>the</strong> faster <strong>the</strong> learn<strong>in</strong>g. However, <strong>the</strong> higher <strong>the</strong>learn<strong>in</strong>g coefficient, <strong>the</strong> slower <strong>the</strong> convergence. Therefore, if <strong>the</strong> learn<strong>in</strong>gcoefficient can be reduced as tra<strong>in</strong><strong>in</strong>g proceeds, high learn<strong>in</strong>g andfast convergence can take place. The momentum factor acts as a low-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>pass filter on <strong>the</strong> weight differences that allows faster learn<strong>in</strong>g on lowlearn<strong>in</strong>g coefficients. O<strong>the</strong>r features to expedite convergence <strong>in</strong>cludealgorithms for random weight generation, <strong>in</strong>troduction of noise as <strong>the</strong>network learns, and algorithms to jog <strong>the</strong> weights randomly.Hidden layers act as layers of abstraction and help <strong>the</strong> networkgeneralize and memorize. Most control applications require only onehidden layer.One way of determ<strong>in</strong><strong>in</strong>g whe<strong>the</strong>r multiple layers or multiple slabsimprove <strong>the</strong> performance of a network is experimentation. Determ<strong>in</strong><strong>in</strong>g<strong>the</strong> number of nodes <strong>in</strong> a hidden layer is also an experimental exercise.More complex relationships require more process<strong>in</strong>g elements <strong>in</strong><strong>the</strong> hidden layer. Too few nodes <strong>in</strong> <strong>the</strong> hidden layer prevents <strong>the</strong> networkfrom properly mapp<strong>in</strong>g <strong>in</strong>puts to outputs. Too many nodes promotesmemorization and <strong>in</strong>hibits generalization.Memorization occurs when <strong>the</strong> patterns presented to <strong>the</strong> networkare reproduced exactly without extract<strong>in</strong>g any salient features. The networkis <strong>the</strong>n unable to process new patterns correctly because it has notdiscovered <strong>the</strong> proper relationships.Prepar<strong>in</strong>g <strong>the</strong> data <strong>in</strong>cludes transform<strong>in</strong>g <strong>in</strong>puts <strong>in</strong>to <strong>the</strong> properform such as ratios or classes and data types. How <strong>the</strong> data is representedand translated plays a role <strong>in</strong> <strong>the</strong> network’s ability to understanddur<strong>in</strong>g tra<strong>in</strong><strong>in</strong>g. Data may be cont<strong>in</strong>uous, digital, time-oriented or static.Data can be naturally grouped, may be represented as actual amounts orchanges <strong>in</strong> amounts, or may be evenly or unevenly distributed over <strong>the</strong>entire range. When naturally occurr<strong>in</strong>g groups appear, b<strong>in</strong>ary categoriesare often <strong>the</strong> best method for mak<strong>in</strong>g correlations.All data needs to be normalized <strong>in</strong> order for <strong>the</strong> transform functionto operate. Data may be scaled between m<strong>in</strong>imum and maximum rangesor be set between a predef<strong>in</strong>ed range.Often <strong>the</strong> network is tra<strong>in</strong>ed on one set of data (tra<strong>in</strong><strong>in</strong>g data) andverified with a different set of data (recall data). Once a network istra<strong>in</strong>ed on a set of data, it is used to predict results based upon new setsof ga<strong>the</strong>red data.Statistical tools can help determ<strong>in</strong>e how <strong>the</strong> network produces <strong>the</strong>correct outputs. Small weights <strong>in</strong>dicate that <strong>the</strong> process<strong>in</strong>g elements arenot <strong>in</strong>fluenc<strong>in</strong>g <strong>the</strong> outcome of <strong>the</strong> network. These nodes can <strong>the</strong>n beelim<strong>in</strong>ated and <strong>the</strong> network retra<strong>in</strong>ed. Large weights can <strong>in</strong>dicate toomuch dependence upon a particular <strong>in</strong>put, <strong>in</strong>dicat<strong>in</strong>g some degree ofmemorization.©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>Fuzzy <strong>Control</strong>Fuzzy controllers have rules that are used to calculate <strong>the</strong> controlaction. Each rule is an expression about <strong>the</strong> control action to be taken <strong>in</strong>response to a given set of conditions. These rules have <strong>the</strong> follow<strong>in</strong>ggeneral format:IF (CONDITION) THEN ACTIONThe condition may <strong>in</strong>clude AND/OR operations. The fuzzy controlleruses <strong>the</strong> <strong>in</strong>ference process, (Figure 6-7), which has several ruleprocesses and produces a s<strong>in</strong>gle logical sum. Each rule process has itsconditions (antecedent) and a conclusion (consequence). The conclusionis reached when <strong>the</strong> conditions are satisfied. The conclusions are <strong>the</strong>nsent through a logical summer.The defuzzification operation <strong>the</strong>n unifies <strong>the</strong> results of <strong>the</strong> ruleprocess and produces a f<strong>in</strong>al output that can be <strong>in</strong>terfaced to most typesof output devices.The problem of energy use <strong>in</strong> <strong>HVAC</strong> can be used to illustrate <strong>the</strong>operation of a fuzzy controller. A set of <strong>in</strong>st<strong>in</strong>ctive judgments is trans-Figure 6-7. Operation of fuzzy control©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>planted <strong>in</strong>to <strong>the</strong> mach<strong>in</strong>e, without us<strong>in</strong>g complex equations.Temperature balanc<strong>in</strong>g can be done with <strong>the</strong> IF...THEN function <strong>in</strong>fuzzy control (See Table 6-3).Table 6-3. Rules for Fuzzy Temperature <strong>Control</strong>————————————————————————————————Antecedent BlockConsequent BlockRule 1 If temperature is moderately Then reduce fuel moderatelylow and almost stillbut quicklyRule 2 If temperature is moderatelylow and fall<strong>in</strong>g slowlyRule 3 If temperature is moderatelylow and ris<strong>in</strong>g slowlyRule 4 If temperature is moderatelyhigh and almost stillRule 5 If temperature is moderatelyhigh and fall<strong>in</strong>g slowlyRule 6 If temperature is moderatelyhigh and ris<strong>in</strong>g slowlyThen <strong>in</strong>crease fuel moderatelyand a little quicklyThen do not change fuel flowmuchThen decrease fuelmoderately but quicklyThen decrease fuelmoderately and alittle quicklyThen do not changefuel flow muchRule 7 If temperature is at setpo<strong>in</strong>t Then do not change fueland almost stillflow much————————————————————————————————The antecedent blocks (IF... phrases describe <strong>the</strong> states that <strong>the</strong>space can be <strong>in</strong>, and <strong>the</strong> consequent blocks (THEN... phrases) describehow <strong>the</strong> temperature should change <strong>in</strong> response to <strong>the</strong>se states (SeeTable 6-4).Fuzzy expressions such as moderate, almost, and a little are used.If <strong>the</strong> condition is true, <strong>the</strong> measure of fulfillment of <strong>the</strong> statement isequal to 1.0, if <strong>the</strong> condition is false, <strong>the</strong> measure of fulfillment is 0.0. Avalue between 0.0 and 1.0 is possible for anyth<strong>in</strong>g between true andfalse.©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>Table 6-4. Antecedent and Consequent Blocks for Fuzzy Temperature<strong>Control</strong>————————————————————————————————Antecedent BlocksConsequentAntecedent Membership Logical Product BlocksFunctionsM<strong>in</strong>imum————————————————————————————————Rule 1 0.7 PM 0.7 AND ZE 0.8 0.8 = 0.7 THEN PM 0.7Rule 2 0.3 PS 0.3 AND PS 0.2 0.2 = 0.2 THEN PS 0.2Rule 3 0.3 PS 0.3 AND NS 0.0 = 0.0 THEN ZERule 4 NM 0.0 AND ZE 0.8 0.8 = 0.0 THEN NMRule 5 NS 0.0 AND NS 0.0 = 0.0 THEN NSRule 6 NS 0.0 AND PS 0.2 0.2 = 0.0 THEN ZERule 7 ZE 0.0 AND ZR 0.8 0.0 = 0.0 THEN ZE————————————————————————————————Key:NG NegateNL Negative LargeNM Negative MediumNS Negative SmallPM Positive MediumPS Positive SmallZE Zero————————————————————————————————There are seven rules listed, but fewer can be used. When fewerrules are used, <strong>the</strong> function becomes simpler, but control is not assmooth.A membership curve is used for logical summ<strong>in</strong>g. This can take atriangle shape, S, Z, bell shape or trapezoidal. The output depends onhow <strong>the</strong> <strong>in</strong>dividual curves overlap and it determ<strong>in</strong>es <strong>the</strong> type and degreeof action required.Rules can be written to <strong>in</strong>clude:• <strong>the</strong> difference of <strong>the</strong> temperature from <strong>the</strong> setpo<strong>in</strong>t,• <strong>the</strong> rate at which <strong>the</strong> temperature is chang<strong>in</strong>g.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The logical product of a fuzzy logic function <strong>in</strong> response to a specificset of <strong>in</strong>puts always occurs at a po<strong>in</strong>t <strong>in</strong> time. These calculations aresimilar to <strong>the</strong> scan cycle of a PLC.The logical sum comb<strong>in</strong>es <strong>the</strong> results of <strong>the</strong> rules. The fuzzy devicedoes not make a quick decision. The logical sum may suggest that <strong>the</strong>controlled parameter should be decreased, but whe<strong>the</strong>r this should bedone quickly or slowly is left fuzzy unless <strong>the</strong> result is TRUE or FALSE.This is sometimes called <strong>the</strong> conclusion of <strong>the</strong> fuzzy <strong>in</strong>terference.DefuzzificationThe defuzzification operation calculates <strong>the</strong> center of gravity of <strong>the</strong>fuzzy <strong>in</strong>terference. This value becomes <strong>the</strong> output. When <strong>the</strong> output isa s<strong>in</strong>gle value determ<strong>in</strong><strong>in</strong>g <strong>the</strong> required change, <strong>the</strong> defuzzification isknown as <strong>the</strong> Mamdani method and is <strong>the</strong> most common techniqueused.For multivariable control, <strong>the</strong> f<strong>in</strong>al control action is calculated from<strong>the</strong> weighted <strong>in</strong>dividual membership values of each active rule.Based on <strong>the</strong> rules programmed <strong>in</strong>to <strong>the</strong> fuzzy controller, it willoutput <strong>the</strong> most valid value correspond<strong>in</strong>g to <strong>the</strong> variable <strong>in</strong>put conditions.With fuzzy control, <strong>the</strong> steps are performed cont<strong>in</strong>uously, while <strong>in</strong><strong>in</strong>formation process<strong>in</strong>g, such procedures are executed only when <strong>the</strong><strong>in</strong>put data varies. In one fuzzy control system application <strong>the</strong> variability<strong>in</strong> product properties was reduced by about 30%.Temperature Overshoot <strong>Control</strong>A fuzzy logic controller can reduce <strong>the</strong> temperature overshoot thatoccurs dur<strong>in</strong>g heat-up. The ideal control system might start with a lowsetpo<strong>in</strong>t and <strong>the</strong>n gradually adjust it toward <strong>the</strong> correct setpo<strong>in</strong>t whilewatch<strong>in</strong>g <strong>the</strong> control performance. Fuzzy logic can be used for this typeof control (Figure 6-8).Autotun<strong>in</strong>g is used to obta<strong>in</strong> <strong>the</strong> PID constants and <strong>the</strong> process characteristicssuch as <strong>the</strong> dead time and time constant. The controller manipulates<strong>the</strong> heat <strong>in</strong>put based on <strong>the</strong> deviation from <strong>the</strong> setpo<strong>in</strong>t. It automaticallychanges <strong>the</strong> <strong>in</strong>ternal setpo<strong>in</strong>t to a lower value when <strong>the</strong> anticipatorylogic predicts an overshoot. The controller cont<strong>in</strong>ues to monitor©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>Figure 6-8. PID and fuzzy control<strong>the</strong> deviation and returns <strong>the</strong> setpo<strong>in</strong>t slowly to <strong>the</strong> correct value, whilekeep<strong>in</strong>g it with<strong>in</strong> a range where <strong>the</strong>re is no risk to overshoot.Fuzzy Feedforward <strong>Control</strong>Fur<strong>the</strong>r improvements <strong>in</strong> product consistency are possible when aprocess parameter is used as an advanced warn<strong>in</strong>g signal. Thefeedforward <strong>in</strong>put serves to change <strong>the</strong> fuel flow long before outputchanges result <strong>in</strong> environment or product. The feedforward changes arenot exact, and <strong>the</strong>ir <strong>in</strong>fluence is adjustable as <strong>in</strong> feedback control. Themethod of calculation of <strong>the</strong> f<strong>in</strong>al feedforward control action is similarto <strong>the</strong> calculation of feedback control action. In one application <strong>the</strong> fuzzyfeedforward control resulted <strong>in</strong> a 40% reduction <strong>in</strong> <strong>the</strong> standard deviationof <strong>the</strong> target property.Fuzzy Color Sens<strong>in</strong>gColor sens<strong>in</strong>g can be done with fuzzy logic control. A sensor headwith light emitt<strong>in</strong>g diodes for red, green and blue light is used. The sensorhead also has circuitry to measure <strong>the</strong> light reflected by <strong>the</strong> object.A number of noncontact color profile measurements are taken tocompute <strong>the</strong> average color profile. These profiles are compared to a prerecordedstandard and if <strong>the</strong> deviation between <strong>the</strong> two values exceeds <strong>the</strong>programmed acceptable tolerance, <strong>the</strong> output signals a rejection.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Fuzzy logic rules are used to tra<strong>in</strong> <strong>the</strong> sensor to dist<strong>in</strong>guish <strong>the</strong>designated color and also to compute <strong>the</strong> sensor output signal. Coloracceptability corresponds to <strong>the</strong> logic set range of 0 to 1.Model-based <strong>Control</strong>The basic concept of model-based control <strong>in</strong>volves a model of <strong>the</strong>process which is used to calculate a value for <strong>the</strong> manipulated variable(m) (Fig. 6-9). This value should make <strong>the</strong> controller variable (x) behave <strong>in</strong>some desired way. If this is satisfied, <strong>the</strong>n this value of m is utilized.The controller does not use PID components and usually <strong>the</strong>re isonly one tun<strong>in</strong>g parameter, <strong>the</strong> speed of <strong>the</strong> controlled variable as itmoves to <strong>the</strong> setpo<strong>in</strong>t. Initializ<strong>in</strong>g <strong>the</strong> controller with a validated modelis a critical implementation step.The <strong>in</strong>verse model is used. In standard model<strong>in</strong>g, <strong>the</strong> <strong>in</strong>put is setand <strong>the</strong> response of <strong>the</strong> output is observed. The <strong>in</strong>verse model determ<strong>in</strong>eswhat <strong>in</strong>put causes a predeterm<strong>in</strong>ed output response. (Figure 6-10)If <strong>the</strong> model is exact, an open loop structure could be used. But,most controller models are not exact and <strong>the</strong>y require some feedbackcorrection. The usual approach is to monitor <strong>the</strong> difference between <strong>the</strong>model and <strong>the</strong> process output and adjust a controller feedback signal.The feedback signal is ei<strong>the</strong>r a bias to <strong>the</strong> setpo<strong>in</strong>t or a model coefficient.Model<strong>in</strong>g TechniquesThree dist<strong>in</strong>ct model<strong>in</strong>g approaches are used:• transfer function,• time series,• nonl<strong>in</strong>ear phenomenological.Figure 6-9. Model-based control©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>Figure 6-10. Feedback with <strong>in</strong>verse, model and adjustment functionsTransfer function models use an open-loop Laplace transform descriptionof <strong>the</strong> process response to a step <strong>in</strong>put. This is a common controlmodel<strong>in</strong>g approach but is limited to l<strong>in</strong>ear and simplistic dynamicmodel<strong>in</strong>g.Time series models <strong>in</strong>volve <strong>the</strong> open-loop response of <strong>the</strong> processto a vector of impulses. These are empirically determ<strong>in</strong>ed and consist ofabout 30 elements. More precision is possible but matrix/vector algebrais required. This is <strong>the</strong> most common model<strong>in</strong>g approach used formodel-based control.Nonl<strong>in</strong>ear phenomenological models are design-based simulatorsfor nonl<strong>in</strong>ear or nonstationary processes. Their control <strong>in</strong>telligencecomes with model<strong>in</strong>g and computational complexity.Internal Mode <strong>Control</strong>This is a type of model<strong>in</strong>g that uses open-loop, step-responseLaplace transfer functions. The basic structure is shown <strong>in</strong> Figure 6-11. Asimple first-order-plus-dead-time representation is shown <strong>in</strong> Figure 6-12.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 6-11. Internal mode controlFigure 6-12. Internal mode control with first-order plus dead time controllerSetpo<strong>in</strong>t bias<strong>in</strong>g is <strong>the</strong> feedback adjustment method. To elim<strong>in</strong>atespikes <strong>in</strong> from measurement noise and setpo<strong>in</strong>t changes, <strong>the</strong> biased setpo<strong>in</strong>tis filtered.The function blocks are leads, lags, delays, summations, and ga<strong>in</strong>s,and <strong>the</strong>y can be configured by most distributed control systems (DCS),s<strong>in</strong>gle-loop controller or programmable logic controller (PLC). The usualtun<strong>in</strong>g parameter is <strong>the</strong> filter time constant. Lower values of <strong>the</strong> timeconstant make <strong>the</strong> controller more aggressive and higher values make itgentler.In <strong>in</strong>ternal model<strong>in</strong>g control <strong>the</strong> model is l<strong>in</strong>ear and stationary. If<strong>the</strong> process ga<strong>in</strong> or time constants change, <strong>the</strong> model-based calculationsbecome ei<strong>the</strong>r too aggressive or sluggish and retun<strong>in</strong>g may be required.©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>This is similar to PID control where changes <strong>in</strong> process dynamics alsorequire retun<strong>in</strong>g.Model Predictive <strong>Control</strong>This type of model<strong>in</strong>g is often called time series or convolutionmodel<strong>in</strong>g. It represents <strong>the</strong> open-loop process response as a vector. As<strong>in</strong>gle, unity <strong>in</strong>put step change <strong>in</strong> <strong>the</strong> manipulated variable is used toaffect <strong>the</strong> output. The <strong>in</strong>put behavior is represented as a sequence ofsteps and <strong>the</strong> output as <strong>the</strong> cumulative effects of those steps.The desired behavior for <strong>the</strong> output may be a path of return tosetpo<strong>in</strong>t. It can be expressed as a vector and <strong>the</strong> necessary sequence ofmanipulated variable values can be calculated from <strong>the</strong> model <strong>in</strong>verse.If <strong>the</strong> process has dead time, elements of <strong>the</strong> process model vectorbecome zero. Ano<strong>the</strong>r problem is that <strong>the</strong> residual values of <strong>the</strong> processmodel vector will affect <strong>the</strong> output. This can result <strong>in</strong> a steady-stateoffset. The methods for handl<strong>in</strong>g <strong>the</strong>se problems <strong>in</strong>volve us<strong>in</strong>g a filter toremove measurement noise from <strong>the</strong> model mismatch signal.The filtered value is used as a reference bias which elim<strong>in</strong>ates <strong>the</strong>zeros and offset. These controllers require that <strong>the</strong> process fit a l<strong>in</strong>earand stationary model.Process Model-based <strong>Control</strong>Models can be developed from material and energy balances and<strong>the</strong>rmodynamic relations. These models can be used for economic optimization.Simple, reduced, or tendency models can be used. A modelmay be represented asdxdt = f(x,m,p)wherex = outputm = manipulated variablep = an adjustable process parameter©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The control objective is to have <strong>the</strong> process output move to <strong>the</strong>setpo<strong>in</strong>t (X sp ) with<strong>in</strong> some specific time t1. This specifies above derivativeand <strong>the</strong> control law becomes <strong>the</strong> model <strong>in</strong>verse which determ<strong>in</strong>es mfrom <strong>the</strong> follow<strong>in</strong>g:f(x,m,p) ± x sp ± xt1=0S<strong>in</strong>ce x is measured, p is set, and x sp and t1 are user-def<strong>in</strong>ed, <strong>the</strong> equationcan be solved for m. The tun<strong>in</strong>g parameter is t1. These equations areoften nonl<strong>in</strong>ear, and <strong>the</strong> solution may require iterative techniques suchas <strong>New</strong>ton’s.A steady-state offset occurs if <strong>the</strong> model is not perfect. Feedbackadjustment <strong>in</strong>cludes bias<strong>in</strong>g <strong>the</strong> setpo<strong>in</strong>t and adjust<strong>in</strong>g a process parameter.Adjustable parameters represent a real process mechanism, not ahypo<strong>the</strong>tical disturbance. These adjustable parameters can <strong>in</strong>clude heatexchanger foul<strong>in</strong>g factors and ambient heat losses.MultivariablesThere are often measurable loads which affect <strong>the</strong> output <strong>in</strong> <strong>HVAC</strong>as well as o<strong>the</strong>r <strong>in</strong>puts <strong>in</strong> addition to <strong>the</strong> manipulated variable. Theireffects on <strong>the</strong> output can be modeled to achieve feedforward action. If<strong>the</strong>re are more manipulatable <strong>in</strong>puts than controlled outputs, a decisionmechanism is used to associate all controlled variables with at least onemanipulated variable.The new <strong>in</strong>formation technology <strong>in</strong> use today enables control systemsto function on nonproprietary networks. The controllers often arePC platforms. Typically, <strong>the</strong> user <strong>in</strong>terfaces are <strong>the</strong> familiar, commerciallyavailable operat<strong>in</strong>g systems.Data and InformationAll of this ability to communicate large quantities of data <strong>in</strong> a shortperiod of time means data overload can become a likely problem. Thisis <strong>the</strong> task of control PCs’ software <strong>in</strong>terface. It must create useful operator<strong>in</strong>formation from <strong>the</strong> plant data.©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>One area where this software capability to turn data <strong>in</strong>to <strong>in</strong>formationis valve diagnostics. <strong>Control</strong> valves make many small movementseach day to control parameters such as pressure, temperature, or flowrate to an optimum level for efficient plant operation.Diagnostic tools can measure valve and valve actuator characteristicsto determ<strong>in</strong>e whe<strong>the</strong>r or not such control valves are function<strong>in</strong>gproperly or require ma<strong>in</strong>tenance. Analyz<strong>in</strong>g <strong>the</strong> valve actuator pressureversus valve travel can provide <strong>in</strong>formation on friction, actuator spr<strong>in</strong>gcompression and gall<strong>in</strong>g. This <strong>in</strong>formation can be important <strong>in</strong> reduc<strong>in</strong>gdowntime and ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g optimum system performance.Fieldbus communication protocols can provide <strong>the</strong> two-way communicationsneeded. Us<strong>in</strong>g this technology, a smart valve positioner cansend <strong>in</strong>formation back to <strong>the</strong> controller concern<strong>in</strong>g its actual f<strong>in</strong>al positionus<strong>in</strong>g <strong>the</strong> same wires as <strong>the</strong> outgo<strong>in</strong>g signal.The sensors throughout <strong>the</strong> plant also provide an opportunity forsignificant operational improvements. Advanced calibration monitor<strong>in</strong>gsoftware uses ma<strong>the</strong>matical techniques to predict an expected valuesuch as temperature or pressure. The software computes <strong>the</strong> statisticalvariation from <strong>the</strong> predicted value. This software keeps track of <strong>the</strong>amount of time each sensor is beyond <strong>the</strong> setpo<strong>in</strong>t limit and generatesa report that flags those devices that are <strong>in</strong> need of ma<strong>in</strong>tenance.A new generation of valve controllers, called digital valve controllers,provides valve diagnostic capabilities. This is part of <strong>the</strong> evolution<strong>in</strong> distributed controls. Low-power microprocessors allow <strong>the</strong>se digitalvalve controllers to operate on <strong>the</strong> power from <strong>the</strong> standard 4-20 mA<strong>in</strong>strument wir<strong>in</strong>g. The HART communications protocol superimposes adigital signal on top of <strong>the</strong> 4-20 mA analog signal. This provides <strong>the</strong>control loop along with two-way communications with <strong>the</strong> valve controller.PC and W<strong>in</strong>dows-based software can communicate with <strong>the</strong> controllerto obta<strong>in</strong> <strong>the</strong> valve diagnostic variables. The data can be plottedwith <strong>the</strong> software to determ<strong>in</strong>e <strong>the</strong> condition of <strong>the</strong> valve.Neural Network Model<strong>in</strong>gBesides l<strong>in</strong>k<strong>in</strong>g <strong>the</strong> plant operations with <strong>the</strong> control of ma<strong>in</strong>tenanceactivities, an additional part of enterprise management is systemmodel<strong>in</strong>g and <strong>the</strong> result<strong>in</strong>g analysis.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Recently, some companies have turned to neural network models,which are useful for deal<strong>in</strong>g with complex situations. As plant operatorsga<strong>in</strong> confidence <strong>in</strong> this relatively new technology, <strong>the</strong>y are even beg<strong>in</strong>n<strong>in</strong>gto use it for real-time plant control.Some <strong>in</strong>dustries have used predictive control technology, referredto as model predictive control (MPC), for over 20 years us<strong>in</strong>g l<strong>in</strong>earmodel<strong>in</strong>g techniques. The <strong>in</strong>creas<strong>in</strong>g complexity of some plants has ledto <strong>the</strong> development of nonl<strong>in</strong>ear models.A hybrid alternative to <strong>the</strong>se complex, nonl<strong>in</strong>ear models, is a l<strong>in</strong>earmodel comb<strong>in</strong>ed with <strong>the</strong> learn<strong>in</strong>g capability of neural networks tha<strong>the</strong>lps <strong>the</strong> system cope with real-world nonl<strong>in</strong>earities.A neural network controller does not know how to treat data thatis outside <strong>the</strong> range of data collected <strong>in</strong> its tra<strong>in</strong><strong>in</strong>g or open-loop mode.The hybrid system provides a l<strong>in</strong>ear system that takes over control whenparameters are outside <strong>the</strong> neural network’s range.A power plant near Warsaw, Poland, recently <strong>in</strong>stalled and testedsuch a hybrid system. The Ostroleka power plant near Warsaw, Poland,is one of <strong>the</strong> first to apply a hybrid neural network MPC system with anAspen Target MPC controller us<strong>in</strong>g a nonl<strong>in</strong>ear state-space model <strong>in</strong>tegratedwith a neural network model.The plant uses three wall-fired boilers with pulverized coal. Sixsets of low NO x burners are <strong>in</strong>stalled <strong>in</strong> each of four elevations. After aperiod of open-loop tra<strong>in</strong><strong>in</strong>g <strong>the</strong> MPC was placed <strong>in</strong> closed-loop operationwith <strong>the</strong> follow<strong>in</strong>g results:• NO x decreased 15 to 25%,• Boiler efficiency <strong>in</strong>creased 0.1 to 0.5%,• LOI (carbon loss on ignition) decreased from 5% to 3%, and• Cool<strong>in</strong>g water consumption reduced by up to 5%.The controls also demonstrated robust response to extraord<strong>in</strong>ary events.Burner Management SystemsTo ensure that modern power plants have <strong>the</strong> capability to respondpromptly to any load demand, new burner management systems(BMSs) provide <strong>the</strong> programmable control needed to operate burnersand igniters for gas or oil fir<strong>in</strong>g. They also provide <strong>the</strong> highest available©2001 by The Fairmont Press, Inc. All rights reserved.


Artificial Intelligence, Fuzzy Logic and <strong>Control</strong>level of safety for automatic control and monitor<strong>in</strong>g of start-up, operation,and shutdown of <strong>the</strong> boiler.In Melbourne, Australia, a new BMS was <strong>in</strong>stalled at <strong>the</strong> <strong>New</strong>portPower Station. The strategy was to upgrade <strong>the</strong> 1980s stand-alone combustioncontrols us<strong>in</strong>g a new distributed control system (DCS). The tight<strong>in</strong>tegration planned for <strong>the</strong> two systems was simplified by <strong>the</strong> flexibility<strong>in</strong> <strong>the</strong> BMS design, which also can operate <strong>in</strong>dependently of <strong>the</strong> DCS.There is a total of 60 burner elements, with each element requir<strong>in</strong>g<strong>in</strong>dividual control and monitor<strong>in</strong>g with a high level of requirementsrelated to safety. A QUADLOG safety system from Moore Process AutomationSolutions was used. It has a one-out-of-two-diagnostic (1oo2D)redundant architecture. In <strong>the</strong> 1oo2D redundant architecture, <strong>the</strong>re aretwo processors, each with its own backplane and <strong>in</strong>frastructure.The PC-based programm<strong>in</strong>g software runs on W<strong>in</strong>dows NT andprovides an <strong>in</strong>tuitive, user-friendly graphical configuration. There is achoice of several programm<strong>in</strong>g languages: ladder logic, function blocks,sequential charts, or structured text. The graphical configuration capabilitysaves hours when mak<strong>in</strong>g on-l<strong>in</strong>e changes. The system is fullyself-document<strong>in</strong>g and <strong>the</strong> high availability of <strong>the</strong> system results <strong>in</strong>higher plant availability.If <strong>the</strong> on-l<strong>in</strong>e diagnostics detect a failure <strong>in</strong> one system, <strong>the</strong> o<strong>the</strong>rsystem automatically assumes control and <strong>the</strong> safety system rema<strong>in</strong>savailable. The control and I/O modules fit <strong>in</strong>to slots with 10 to a rack.There are four racks assigned to purge and fuel safety, and 8 assigned to<strong>the</strong> burners and igniters. The racks are connected to a LAN, along witha workstation located near <strong>the</strong> racks and 2 workstations located <strong>in</strong> <strong>the</strong>control room.Each of <strong>the</strong> 20 gas burners, 20 oil burners, and 20 igniters has itsown flame detection system, valves, limit switches, air dampers, ando<strong>the</strong>r equipment. The overall safety system has four burner subsystems:• igniter fuel trip,• gas fuel trip,• oil fuel trip, and• master fuel trip.All failure modes are predeterm<strong>in</strong>ed <strong>in</strong> <strong>the</strong> hardware and firmware to afail-safe condition. Alarms are used to identify <strong>the</strong>m.The application software for sequenc<strong>in</strong>g operations allows a s<strong>in</strong>gle©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>button to <strong>in</strong>itiate <strong>the</strong> follow<strong>in</strong>g automatic actions:• purge <strong>the</strong> furnace,• perform comprehensive header leak tests on all <strong>the</strong> fuels,• open <strong>the</strong> trip valves,• br<strong>in</strong>g <strong>the</strong> first igniter and burner on-l<strong>in</strong>e, and• br<strong>in</strong>g <strong>the</strong> furnace up with additional burners as needed.A saturated steam curve ignition run-up is used and burners are bypassedthat fail to go <strong>in</strong>to service. If a boiler is cold, it is pre-warmed,fir<strong>in</strong>g it at a level accord<strong>in</strong>g to <strong>the</strong> cold-boiler-run-up steam curve. Theseactions speed <strong>the</strong> process of respond<strong>in</strong>g to load demands. The burnermanagement system has algorithms that assist <strong>in</strong> <strong>the</strong> required configurations.ReferencesFuller, James L., Robotics: Introduction, Programm<strong>in</strong>g, and Projects, Merrill,an Impr<strong>in</strong>t of Macmillan Publish<strong>in</strong>g Company: <strong>New</strong> York, 1991.Harvey, Charles and Peter Wise, “<strong>New</strong> BMS and DCS Provide Reliableand Responsive Power Plant Automation,” Instrumentation & <strong>Control</strong>Systems, Vol. 72 No. 11, November 1999, pp. 59-61.Redman, Jim, “Upgrades Enhance Capability,” Industrial Comput<strong>in</strong>g, Vol.18 No. 5, April 1999, pp. 22-25.R<strong>in</strong>ehart, R.R., “Model-based <strong>Control</strong>,” Instrument Eng<strong>in</strong>eers’ Handbook,3rd Edition, Chilton Book Company: Radnor, PA, 1995.Riorda, Michael, “The Incredible Shr<strong>in</strong>k<strong>in</strong>g Transistor,” Technology Review,Vol. 100 No. 8, November/December 1997, pp. 48-50.Z<strong>in</strong>k, John C., Ph.D., P.E., “Power Plants Merge Information and <strong>Control</strong>Systems,” Instrumentation & <strong>Control</strong> Systems, Vol. 72 No. 11, November1999, pp. 55-57.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Security 265Chapter 7Computer NetworksAnd SecurityDur<strong>in</strong>g <strong>the</strong> early days of <strong>the</strong> computers <strong>in</strong> <strong>the</strong> mid-1960s, <strong>the</strong>computer environment consisted of large ma<strong>in</strong>frames withremote term<strong>in</strong>als connected to <strong>the</strong> ma<strong>in</strong>frame. These largecomputers required special environmentally controlled computerrooms. Both <strong>the</strong> computers and <strong>the</strong> rooms were expensive to buildand required tra<strong>in</strong>ed personnel for <strong>in</strong>put and output and ma<strong>in</strong>tenance.Later, <strong>the</strong>se large computers would grow smaller and some applicationswould be served by m<strong>in</strong>icomputers that did not need special rooms. Theremote term<strong>in</strong>al system was <strong>the</strong> ma<strong>in</strong> user-computer <strong>in</strong>terface untilaround 1980, when <strong>the</strong> first personal computers were <strong>in</strong>troduced.The early methods of comput<strong>in</strong>g had many disadvantages as wellas some advantages. The comput<strong>in</strong>g environment allowed multiple usersto access one computer. These users had access to <strong>the</strong> same applicationsand files and had some capability of transmitt<strong>in</strong>g and receiv<strong>in</strong>gmail electronically. Centralized management of <strong>the</strong> computer was possible.The management of user accounts, files and <strong>the</strong> hardware wasdone by a group of specialists. The costs of runn<strong>in</strong>g <strong>the</strong> cables for <strong>the</strong>user term<strong>in</strong>als were <strong>the</strong> second most expensive part of <strong>the</strong> computer<strong>in</strong>stallation besides <strong>the</strong> cost of <strong>the</strong> computer itself.This comput<strong>in</strong>g environment was known as centralized comput<strong>in</strong>g.If <strong>the</strong> ma<strong>in</strong>frame or m<strong>in</strong>icomputer went down, all of <strong>the</strong> users wereaffected and would rema<strong>in</strong> idle until <strong>the</strong> computer became operational.These breakdowns were common especially where <strong>the</strong> term<strong>in</strong>als wereseparated at some distance from <strong>the</strong> computer. The breakdowns werecostly s<strong>in</strong>ce <strong>the</strong> users were unproductive until <strong>the</strong> computer was operational.The user term<strong>in</strong>als were known as dumb term<strong>in</strong>als, s<strong>in</strong>ce <strong>the</strong>y hadvery little <strong>in</strong>telligence with most of <strong>the</strong> host-term<strong>in</strong>al <strong>in</strong>terface process<strong>in</strong>gdone on <strong>the</strong> ma<strong>in</strong>frame.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Multiple-host connections were possible us<strong>in</strong>g a modem to dial upano<strong>the</strong>r computer. This centralized comput<strong>in</strong>g environment was usedbecause at <strong>the</strong> time o<strong>the</strong>r alternatives were not available. In 1981 IBM<strong>in</strong>troduced <strong>the</strong> personal computer and <strong>the</strong> comput<strong>in</strong>g environment waschanged forever.The personal computer gave <strong>the</strong> user much more freedom. Thepersonal computer brought <strong>the</strong> ma<strong>in</strong>frame functionality to <strong>the</strong> desktop.Initially, it did not br<strong>in</strong>g <strong>the</strong> power of <strong>the</strong> ma<strong>in</strong>frame to <strong>the</strong> desktops<strong>in</strong>ce <strong>the</strong> early PCs had very little power.PCs became popular because <strong>the</strong>y did away with <strong>the</strong> disadvantagesof a centralized computer <strong>in</strong>clud<strong>in</strong>g <strong>the</strong> cabl<strong>in</strong>g costs, environmentallycontrolled rooms and expensive hardware and ma<strong>in</strong>tenance costs.The user had control over <strong>the</strong>ir comput<strong>in</strong>g environment and enjoyedhav<strong>in</strong>g personal application software that would run on <strong>in</strong>dividualcomputers. A user could load an application program, enter <strong>the</strong>data and pr<strong>in</strong>t out a report on a local pr<strong>in</strong>ter much quicker than before.There were no multiple-user applications, messag<strong>in</strong>g capabilities ormultiple-host support.Ma<strong>in</strong>frame-PC connectivity was accomplished us<strong>in</strong>g term<strong>in</strong>alemulation programs that were run on <strong>the</strong> PC to emulate <strong>the</strong> term<strong>in</strong>als.File transfers between <strong>the</strong> ma<strong>in</strong>frame and <strong>the</strong> PC were supported with<strong>the</strong> term<strong>in</strong>al emulation software.File transfers were also done us<strong>in</strong>g a technique known asSneakernet. Here, a user would save <strong>the</strong>ir work on a floppy disk andtake or send <strong>the</strong> disk to ano<strong>the</strong>r computer and load it.Shortly after <strong>the</strong> <strong>in</strong>troduction of <strong>the</strong> personal computer, <strong>the</strong> firstlocal area networks (LANs) started to appear. These early LANs alloweda connection <strong>in</strong> <strong>the</strong> host-term<strong>in</strong>al environment and also <strong>in</strong>terconnectionwith <strong>the</strong> personal computers. Devices and peripherals could be sharedon a s<strong>in</strong>gle cabl<strong>in</strong>g scheme.At first, most LANs were relatively expensive to <strong>in</strong>stall and ma<strong>in</strong>ta<strong>in</strong>.They started <strong>in</strong> scientific and eng<strong>in</strong>eer<strong>in</strong>g applications and spread toalmost all commercial activities. Ma<strong>in</strong>tenance costs were also higher with<strong>the</strong> early LANs s<strong>in</strong>ce few people knew how to <strong>in</strong>stall and ma<strong>in</strong>ta<strong>in</strong> <strong>the</strong>m.The disadvantages of LANs were gradually reduced. Cable costswere reduced and <strong>in</strong> small and medium-size networks, <strong>the</strong>se cablescould be <strong>in</strong>stalled by <strong>the</strong> user. Networks usually transmit and receive <strong>in</strong>megabits per second (Mbps) which is much faster than <strong>the</strong> 9600 or19,200 bits per second (bps) that <strong>the</strong> term<strong>in</strong>al-host <strong>in</strong>terface supported.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityInternational Standards Organization ModelThe standards association known as <strong>the</strong> International StandardsOrganization has developed an architectural model known as <strong>the</strong> ISOreference model for open-systems <strong>in</strong>terconnection. This model divides alocal area network system <strong>in</strong>to seven process<strong>in</strong>g layers. Each layer performsspecific functions as part of <strong>the</strong> overall task. The application programscan run on different computer systems which can be locatedanywhere. These programs can communicate with each o<strong>the</strong>r as if <strong>the</strong>programs resided <strong>in</strong> <strong>the</strong> same system.The ISO model is based on modules and is not specific to softwareor hardware. ISO def<strong>in</strong>es seven modules but does not cover <strong>the</strong> softwarecode or hardware that implements <strong>the</strong> model.Local area network<strong>in</strong>g protocols such as <strong>the</strong> Transport <strong>Control</strong>Protocol/Internet Protocol (TCP/IP) and hardware protocols are designedus<strong>in</strong>g this model. These protocols may be <strong>in</strong>termixed completely.The ISP model design allows this.There are seven modules or layers <strong>in</strong> <strong>the</strong> model; physical, datal<strong>in</strong>k,network, transport, session, presentation and application layers.These seven layers are shown <strong>in</strong> Table 7-1.Table 7-1. ISO Reference Model—Open-system Layers————————————————————————————————LayerFunction7 Application User applications, process management6 Presentation Data <strong>in</strong>terpretation, format, code transformation5 Session Adm<strong>in</strong>istration, control of sessions between nodes4 Transport Transparent data transfer and transmission control3 Network Rout<strong>in</strong>g, switch<strong>in</strong>g, flow control2 Data l<strong>in</strong>k Ma<strong>in</strong>ta<strong>in</strong>, release data, l<strong>in</strong>k, error, flow control1 Physical <strong>Control</strong> of data circuits, physical media def<strong>in</strong>ition————————————————————————————————Each layer has a specific purpose and functions <strong>in</strong>dependently of<strong>the</strong> o<strong>the</strong>r layers. Each layer is aware only of its immediate upper andlower module.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The modularity of <strong>the</strong> ISO model design means that each <strong>in</strong>dividualmodule can be replaced with a module of a different protocol.The new module must provide <strong>the</strong> same functionality as <strong>the</strong> module itreplaced. This is accomplished without any <strong>in</strong>terruption <strong>in</strong> <strong>the</strong> functionof <strong>the</strong> o<strong>the</strong>r layers. This approach allows multiple-vendor operation andencourages technology changes.Functional LayersThe functions performed at each layer of <strong>the</strong> ISO model def<strong>in</strong>e <strong>the</strong>different types of hardware and software needed to <strong>in</strong>stall or enhance<strong>the</strong> network. The physical layer def<strong>in</strong>es <strong>the</strong> lowest or first level. Thislayer def<strong>in</strong>es <strong>the</strong> methods used to transmit and receive data on <strong>the</strong>network. It consists of <strong>the</strong> wir<strong>in</strong>g and devices that are used to connecta station’s network <strong>in</strong>terface controller to <strong>the</strong> wir<strong>in</strong>g and <strong>the</strong> signalsneeded to transmit and receive data on <strong>the</strong> network.The data-l<strong>in</strong>k layer is <strong>the</strong> second layer. This layer synchronizes <strong>the</strong>transmission and handles <strong>the</strong> packet error control and recovery. Frameformatt<strong>in</strong>g and redundancy check<strong>in</strong>g to check for errors <strong>in</strong> <strong>the</strong> data areaccomplished at this layer. This layer def<strong>in</strong>es <strong>the</strong> network access methodsuch as E<strong>the</strong>rnet.The network layer controls <strong>the</strong> forward<strong>in</strong>g of messages betweenstations. This layer allows <strong>the</strong> data to flow sequentially between stations<strong>in</strong> <strong>the</strong> most economical path both logically and physically. This layeralso allows packets to be transmitted over devices known as routers.The transport layer provides end-to-end or station-to-station transmissionof <strong>the</strong> data. This layer is responsible for <strong>the</strong> transmission of databetween communicat<strong>in</strong>g stations.The session layer establishes, ma<strong>in</strong>ta<strong>in</strong>s and disconnects <strong>the</strong> communicationsl<strong>in</strong>k between two stations. This layer is also responsible for<strong>the</strong> station physical addresses.The presentation layer is responsible for <strong>the</strong> data format and dataencryption. It is not always implemented.The application layer is <strong>the</strong> seventh layer. This layer is used forapplications that run over <strong>the</strong> network. These applications <strong>in</strong>clude filetransfers.S<strong>in</strong>ce each layer has its particular role, it provides structure <strong>in</strong> whatis a static model. Each layer has its place and cannot be moved to replaceano<strong>the</strong>r layer above or below it.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityNetwork<strong>in</strong>g TechnologyNetwork<strong>in</strong>g technology <strong>in</strong>cludes <strong>the</strong> simplest local area networksto those that span large, multiple-site organizations. An organizationneeds to leverage <strong>the</strong> creative uses of <strong>in</strong>formation and network<strong>in</strong>g technologyfor its strategic benefit. There is a cont<strong>in</strong>uum of growth withcomputer and communications technology. The network<strong>in</strong>g trend iscont<strong>in</strong>u<strong>in</strong>g. Each success causes more complex and <strong>in</strong>tuitive applicationsof network<strong>in</strong>g to susta<strong>in</strong> an advantage.The proliferation of communications technology has redef<strong>in</strong>ed <strong>the</strong>path of success for organizations. Communications have become <strong>in</strong>tegralto most computer and bus<strong>in</strong>ess activities. Some will fail to recognize<strong>the</strong> available opportunities, and o<strong>the</strong>rs will fail to recognize how toadapt <strong>the</strong>m to <strong>the</strong> new possibilities that will be available.Technological changes will greatly improve <strong>the</strong> efficiency and enhance<strong>the</strong> implementation of control and communication systems. Network<strong>in</strong>g,<strong>in</strong> particular, can be a sophisticated strategy that can loweroperat<strong>in</strong>g costs and improve work environments.Networks can facilitate quick decisions, improve <strong>in</strong>formation flowand accuracy, and communicate such <strong>in</strong>formation and decisions rapidlyto those who would benefit from <strong>the</strong>m.Network<strong>in</strong>g provides an economy-of-scale s<strong>in</strong>ce it distributes operationsto smaller, less expensive, and more responsive personal computersthat are <strong>in</strong>terconnected.Network<strong>in</strong>g also provides shared access to data for many usersthat were previously unavailable. The technology shifts from workstationsto more common personal computers.Information and network<strong>in</strong>g technology are strategic solutions, butthis technology must be applied with foresight, forethought and a criticalunderstand<strong>in</strong>g of <strong>the</strong> technology. Clearly, <strong>the</strong>re is a risk to try new technologywith its potential for clumsy and <strong>in</strong>efficient results. But, <strong>the</strong>re is agreater risk for those who watch and wait while o<strong>the</strong>rs succeed first.Advantages of PC NetworksPC networks yield significant advantages. Low cost network<strong>in</strong>gpower can provide more efficiency with fewer resources. The technologyof distributed personal computers is very cost-effective for many functions.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Network<strong>in</strong>g can streaml<strong>in</strong>e <strong>the</strong> control of systems that are <strong>in</strong>herentlyslow or fragile and automate <strong>the</strong>se systems for higher <strong>in</strong>tegrity. Itis proven that networks do generate cost-effective benefits, create significanteconomies of scale, boost productivity and create unanticipated andimag<strong>in</strong>ative results. Such systems have generated <strong>in</strong>formation that hasbeen applied to pare costs, simplify excessive or expensive procedures,locate cost variances and reduce <strong>in</strong>ventories and stocks.The control network must be segmented and protected from bus<strong>in</strong>esstraffic to ensure <strong>the</strong> required reliability and determ<strong>in</strong>ism. Simplyseparat<strong>in</strong>g control and bus<strong>in</strong>ess networks with a bridge, or even an NTserver, is rarely sufficient. An <strong>in</strong>correctly configured W<strong>in</strong>dows workstationcan generate high levels of broadcast packets that can affect <strong>the</strong>sample time. Security breaches through <strong>the</strong> control network can alsocause problems.DDE/OLE L<strong>in</strong>k<strong>in</strong>gDynamic Data Exchange (DDE) was designed as an MS W<strong>in</strong>dowstool for l<strong>in</strong>k<strong>in</strong>g data with<strong>in</strong> a s<strong>in</strong>gle PC, but many software vendorshave created extensions for full network DDE data access and l<strong>in</strong>kage.This <strong>in</strong>cludes network data and data accessible through phone connections,remote sites and enterprise-wide networks.Object L<strong>in</strong>k<strong>in</strong>g and Embedd<strong>in</strong>g (OLE) provides a means to l<strong>in</strong>kdata cells and <strong>the</strong> latest versions of entire documents, images, video andsounds. The availability and prom<strong>in</strong>ence of <strong>in</strong>terconnectivity,<strong>in</strong>teroperability and <strong>the</strong> development of user-level tools <strong>in</strong>creases <strong>the</strong>importance of exist<strong>in</strong>g networks.E<strong>the</strong>rnet TrendsThe future of E<strong>the</strong>rnet is strong and it will not merely be bypassedby technological changes. O<strong>the</strong>r network schemes like Carrier Sense MultipleAccess with Collision Detection (CSMA/CD) networks can providebetter response times, throughputs and lower overhead, but this is offsetby <strong>the</strong> consistency and predictability of token protocols such as E<strong>the</strong>rnet.E<strong>the</strong>rnet was orig<strong>in</strong>ally thought to reach its peak <strong>in</strong> about 1990 andbecome obsolescent by 2003. However, this is one network technologythat has blossomed and cont<strong>in</strong>ues to ga<strong>the</strong>r momentum past its plannedhalf-life.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityE<strong>the</strong>rnet is do<strong>in</strong>g well <strong>in</strong> <strong>the</strong> <strong>in</strong>dustrial marketplace. It has completelytaken over <strong>the</strong> commercial sector, push<strong>in</strong>g <strong>the</strong> former competitionlike ARCnet and token r<strong>in</strong>g aside. Users and vendors have givenE<strong>the</strong>rnet a place <strong>in</strong> modern control systems.There will soon be an estimated 200 million E<strong>the</strong>rnet connectionsworldwide. Some control networks may not survive <strong>the</strong> growth ofE<strong>the</strong>rnet, <strong>in</strong>clud<strong>in</strong>g controller-to-controller buses such as <strong>Control</strong>Net orProfibus-FMS, unless <strong>the</strong>y are modified to use E<strong>the</strong>rnet.It has become a very <strong>in</strong>expensive technology and is well understoods<strong>in</strong>ce it is one of <strong>the</strong> simplest network technologies to implement(Figure 7-1).E<strong>the</strong>rnet offers <strong>the</strong> possibility of a truly open connectivity standardfor distributed control systems along with field-device networks such asProfibus or Foundation Fieldbus.E<strong>the</strong>rnet technology was orig<strong>in</strong>ally developed by Xerox <strong>in</strong> <strong>the</strong>early 1980s. It was adopted by <strong>the</strong> Institute of Electrical and ElectronicsEng<strong>in</strong>eers (IEEE) as standard 802.3 <strong>in</strong> 1988. S<strong>in</strong>ce <strong>the</strong>n it has become <strong>the</strong>dom<strong>in</strong>ant standard for local area networks.E<strong>the</strong>rnet provides <strong>the</strong> physical layer and <strong>the</strong> data-l<strong>in</strong>k layer protocols<strong>in</strong> <strong>the</strong> ISO model. The physical layer def<strong>in</strong>es <strong>the</strong> cable types, connec-Figure 7-1. Basic E<strong>the</strong>rnet network©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>tors, and electrical characteristics. The data-l<strong>in</strong>k layer def<strong>in</strong>es <strong>the</strong> formatfor an E<strong>the</strong>rnet frame, <strong>the</strong> error-check<strong>in</strong>g method and <strong>the</strong> physical-address<strong>in</strong>gmethod.The data-l<strong>in</strong>k layer also def<strong>in</strong>es <strong>the</strong> protocol E<strong>the</strong>rnet uses to determ<strong>in</strong>ewhen nodes can transmit on <strong>the</strong> network. This is known as carriersense, multiple access with collision detection. There is a need for standardupper-level protocols to be used with E<strong>the</strong>rnet.E<strong>the</strong>rnet is only one of <strong>the</strong> protocols needed to make any LAN operational.E<strong>the</strong>rnet cannot help a message f<strong>in</strong>d its way through a complexnetwork. It cannot def<strong>in</strong>e how to carry out specific tasks on a network,such as file transfers. These operations require additional protocolson top of E<strong>the</strong>rnet to create a protocol suite.In E<strong>the</strong>rnet <strong>the</strong>re is no assurance of when a node can get on <strong>the</strong>network. If <strong>the</strong> network is busy, <strong>the</strong>n a node with a message may haveto wait. The length of <strong>the</strong> wait would be based on probabilities. Thismakes E<strong>the</strong>rnet nondeterm<strong>in</strong>istic.In a proportional-<strong>in</strong>tegral-derivative (PID) control system, it couldbe a problem. The collection of sensor data over an E<strong>the</strong>rnet segmentshould have a regular sample time to be effective. In <strong>the</strong>ory, E<strong>the</strong>rnetmay not be able to guarantee consistent tim<strong>in</strong>g.The determ<strong>in</strong>ism issue would have you believe that any E<strong>the</strong>rnetnetwork loaded at about 40% would encounter an exponential growth <strong>in</strong>transmission delay times. But, studies conducted <strong>in</strong> <strong>the</strong> late 1980sshowed that, <strong>in</strong> practice, E<strong>the</strong>rnet delays tend to be l<strong>in</strong>ear and can beheld to less than 2 milliseconds for a lightly loaded network and 30milliseconds for a heavily loaded network. These delays are acceptablefor most <strong>HVAC</strong> control applications.The ma<strong>in</strong> concern is to keep <strong>the</strong> traffic level on <strong>the</strong> E<strong>the</strong>rnet networklow enough so that collisions occur at low frequency levels. Thismeans restrict<strong>in</strong>g <strong>the</strong> number of devices and <strong>the</strong> amount of traffic thateach device generates so that <strong>the</strong> total segment traffic never rises above1 or 2%.If more devices are needed, <strong>the</strong>y are put on separate segments and<strong>the</strong>n connected us<strong>in</strong>g a bridge, router, or switch. This concept is used byDCS systems such as ABB’s MasterBus and Foxboro’s Nodebus.Besides <strong>the</strong> commercial-grade hardware for E<strong>the</strong>rnet, severalmanufacturers offer <strong>in</strong>dustrial hubs and switches that can be DIN-railmounted and have redundant power supplies. E<strong>the</strong>rnet is easy to <strong>in</strong>stalland connect.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityE<strong>the</strong>rnet ProtocolsS<strong>in</strong>ce E<strong>the</strong>rnet is not sufficient <strong>in</strong> itself to run a network o<strong>the</strong>r protocolsneed to be used. The transmission control protocol (TCP) and Internetprotocol (IP) are <strong>the</strong> protocols of choice for deal<strong>in</strong>g with issues of rout<strong>in</strong>gand end-to-end data <strong>in</strong>tegrity. These are <strong>the</strong> network and transportlayers <strong>in</strong> <strong>the</strong> Open Systems Interconnect (OSI) protocol model.While TCP and IP are transport and network layer protocols, <strong>the</strong>yusually come bundled with application layer protocols like file transferprotocol, simple mail transport protocol, and simple network managementprotocol (SNMP). Several control systems vendors use some of<strong>the</strong>se protocols (such as SNMP) <strong>in</strong> <strong>the</strong>ir hardware, but <strong>the</strong>y are not idealfor control systems. The MODBUS application protocol can be used. Thisis <strong>the</strong> application layer from <strong>the</strong> MODBUS protocol suite, bundled withTCP/IP.Both TCP and MODBUS are widely supported. However, MODBUSdoes not support an object-based communications model like most of <strong>the</strong>new fieldbus technologies. When you read a MODBUS device over a network,you only get <strong>the</strong> data without any details about its function or format.It is no longer enough to consider a device as a group of registers.The network must be able to see an object. The IEEE 1451 standard providestechniques for self-describ<strong>in</strong>g measurement and control devices. Itis an object technology that specifies a common object model for devices,how <strong>the</strong>y communicate, ei<strong>the</strong>r client/server or publish/subscribe andhow <strong>the</strong>y are managed.These network-neutral <strong>in</strong>terfaces can be implemented on E<strong>the</strong>rnetand <strong>the</strong>y provide a way of <strong>in</strong>tegrat<strong>in</strong>g multiple networks and us<strong>in</strong>g commonapplication software.The Fieldbus Foundation uses fast E<strong>the</strong>rnet as <strong>the</strong> base-level protocolfor its H2 network. The foundation maps <strong>the</strong> Layer 2 technologiesfrom its H1 standard <strong>in</strong>to E<strong>the</strong>rnet. This <strong>in</strong>cludes <strong>the</strong> object model andschedul<strong>in</strong>g and publisher/subscriber services. O<strong>the</strong>r systems encapsulate<strong>the</strong>ir protocols <strong>in</strong>side of an E<strong>the</strong>rnet frame. This technique is knownas tunnel<strong>in</strong>g.The utility of E<strong>the</strong>rnet has grown with <strong>the</strong> wide acceptance of <strong>the</strong>Transaction <strong>Control</strong> Protocol and Internet Protocol (TCP/IP) suite. Partof this success has been due to <strong>the</strong> standardization and <strong>the</strong> multipleplatform support provided by E<strong>the</strong>rnet. This success is <strong>in</strong> contrast to <strong>the</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>lack of vendor conformity <strong>in</strong> o<strong>the</strong>r network protocols such as StarLan,ARCnet, and Token R<strong>in</strong>g. Some of this success can also be attributed to<strong>the</strong> growth and economics of twisted-pair and optical fiber technologywhich have extended <strong>the</strong> life of E<strong>the</strong>rnet.The high costs of go<strong>in</strong>g with <strong>the</strong> wrong emerg<strong>in</strong>g network technologyalso encourages users to be more conservative and choose <strong>the</strong> pathof known and accepted technologies like E<strong>the</strong>rnet. This conservatism isano<strong>the</strong>r major reason for <strong>the</strong> success of E<strong>the</strong>rnet and its cont<strong>in</strong>ued applicability.E<strong>the</strong>rnet economics also cont<strong>in</strong>ues to improve. E<strong>the</strong>rnet hardwarewhich orig<strong>in</strong>ally cost thousands of dollars is now available at less than10% of that cost.E<strong>the</strong>rnet is a description of physical media <strong>in</strong>terconnections.E<strong>the</strong>rnet is l<strong>in</strong>ked to TCP/IP and some users consider E<strong>the</strong>rnet to beTCP/IP, but both exist <strong>in</strong>dependently. It is likely that E<strong>the</strong>rnet processeswill be separated from <strong>the</strong> underly<strong>in</strong>g medium much as TCP/IP hasbecome a protocol <strong>in</strong>dependent from <strong>the</strong> physical transmission process.E<strong>the</strong>rnet and TCP/IP provide a strong foundation for l<strong>in</strong>kage.They provide an efficient method to connect dissimilar computers, operat<strong>in</strong>gsystems and network protocols.Exist<strong>in</strong>g E<strong>the</strong>rnet networks are not likely to be replaced by fasteror merely new technology. Instead, <strong>the</strong>y will be <strong>in</strong>tegrated <strong>in</strong>to widernetworks. This type of data access and l<strong>in</strong>kage has been pushed by <strong>the</strong>utility of PC and W<strong>in</strong>dows-based products. These tools provide uniformsystems for users to ga<strong>the</strong>r, construct and process networked data.Software vendors now build applications that are virtually <strong>in</strong>dependentfrom <strong>the</strong> underly<strong>in</strong>g network protocols <strong>in</strong>clud<strong>in</strong>g E<strong>the</strong>rnet. Theuse of compound networks, backbones, <strong>in</strong>terconnectivity, bridg<strong>in</strong>g androut<strong>in</strong>g will <strong>in</strong>crease.E<strong>the</strong>rnet rema<strong>in</strong>s <strong>in</strong> a growth mode because <strong>the</strong> tools and experienceexist. It will not be replaced for years, but will be supplementedwhen specific situations demand higher transmission speeds. The <strong>in</strong>stalledbase and compatibility ensure its survival for many more years.E<strong>the</strong>rnet can also be repackaged to delay its obsolescence.E<strong>the</strong>rnet persists because of its simplicity. The twisted-pair starconfiguration utilizes telephone wir<strong>in</strong>g to simplify <strong>in</strong>stallation andlower costs.The Open Systems Interconnection (OSI) communication structureprovides <strong>the</strong> means to alter layers <strong>in</strong>dependently of <strong>the</strong> o<strong>the</strong>rs. The OSI©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Securitystructure of most high-level protocols allows a reth<strong>in</strong>k<strong>in</strong>g, rebuild<strong>in</strong>gand rebundl<strong>in</strong>g of network services. This repackaged E<strong>the</strong>rnet technologyalso provides a start<strong>in</strong>g po<strong>in</strong>t for small network <strong>in</strong>stallations thatcan gradually expand to a coaxial backbone connect<strong>in</strong>g concentrationsof twisted-pair <strong>in</strong>stallations.E<strong>the</strong>rnet provides plug-and-play <strong>in</strong>tercompatibility that is o<strong>the</strong>rwiseunavailable. This may be sufficient to prevent <strong>the</strong> replacement ofexist<strong>in</strong>g networks.Expect to see more implementations that encapsulate E<strong>the</strong>rnet.Implementations of routers, packet switches, and gateways can boost<strong>the</strong> <strong>in</strong>tegration of small networks <strong>in</strong>to wider enterprise type systems.E<strong>the</strong>rnet comprises layers 1 and 2 of <strong>the</strong> OSI model. Layers 3through 7 are not part of E<strong>the</strong>rnet, although E<strong>the</strong>rnet is often packagedwith <strong>the</strong> TCP/IP protocol. TCP/IP provides <strong>the</strong> network-layer functions.TCP/IP was commissioned by <strong>the</strong> Department of Defense for <strong>the</strong>Internet wide area network (WAN) network. It was standardized by <strong>the</strong>government, but is supplied <strong>in</strong> a rapidly grow<strong>in</strong>g list of products. Theadvantage of TCP/IP is its simple structure and its ready implementationwith<strong>in</strong> <strong>the</strong> memory and speed limits of most computer platforms.The disadvantage of TCP/IP as implemented is that it does not conformrigorously to <strong>the</strong> OSI protocol.E<strong>the</strong>rnet is represented by hardware but software protocols buildupon <strong>the</strong> basic hardware that def<strong>in</strong>es E<strong>the</strong>rnet. E<strong>the</strong>rnet is physical, althoughmost E<strong>the</strong>rnet networks <strong>in</strong>clude network software such as TCP/IP. This difference between <strong>the</strong> OSI model and E<strong>the</strong>rnet TCP/IP is apt tofade.The physical layer acts as a conduit or data path and <strong>the</strong> data-l<strong>in</strong>klayer is implemented by software, controller and transceiver units. Thesoftware function is often serviced by TCP/IP and is represented <strong>in</strong> <strong>the</strong>data-l<strong>in</strong>k layer by communication control protocols.E<strong>the</strong>rnet VariationsE<strong>the</strong>rnet hardware has several variations and <strong>the</strong>re are physicaldifferences among <strong>the</strong>m (See Table 7-2). There are standards for <strong>the</strong>various transmission media, <strong>in</strong>clud<strong>in</strong>g baseband, twisted-pair, radio frequencyand <strong>in</strong>frared, broadband coaxial cable and optical fiber.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Baseband coax cable, s<strong>in</strong>gle-strand and s<strong>in</strong>gle-channel has been <strong>the</strong>prevalent medium.Table 7-2. Comparison of E<strong>the</strong>rnet Networks————————————————————————————————Twisted-pair NetworkLess expensive and easier to <strong>in</strong>stall than coaxial cableSimple node relocationSmaller geographic areaLess tolerance to crosstalk, <strong>in</strong>terferenceFault isolation more difficultCoaxial Cable NetworkMore tolerance to crosstalk, <strong>in</strong>terferenceMore durable and reliable than twisted-pairHarder to <strong>in</strong>stall and more expensive than twisted-pairNetwork with Trunk BackboneBetter performance than cascaded networkSimple expansionCan segment failed networksEasier to troubleshootHarder to traceWireless NetworkSimple to <strong>in</strong>stallNode relocation simpleCan be moved from site to siteLimited distanceSlower transmission speedsPossible health consequencesSusceptible to eavesdropp<strong>in</strong>gPoor tolerance to <strong>in</strong>terference————————————————————————————————Coaxial cable has a conduct<strong>in</strong>g outer metal shield enclos<strong>in</strong>g and<strong>in</strong>sulated from a central metal conduct<strong>in</strong>g core. It is called coaxial s<strong>in</strong>ce<strong>the</strong> core and shield conductors share a common axis. A s<strong>in</strong>gle-strandcable with a t<strong>in</strong>ned copper core is used which is surrounded by a foammaterial that <strong>in</strong>sulates it from a t<strong>in</strong>ned and braided copper shield. Coaxialcable provides an electrically balanced signal. A s<strong>in</strong>gle coaxial cabletransmits a s<strong>in</strong>gle channel of <strong>in</strong>formation.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityA broadband coax cable is similar <strong>in</strong> function and appearance tobaseband, although <strong>the</strong> cable is physically several times larger. BroadbandE<strong>the</strong>rnet, <strong>in</strong> coax and optical fiber, will provide longer networksegments and <strong>in</strong>creased channel capacity or channel transmission speed.It is called broadband s<strong>in</strong>ce it provides a wider frequency range thanbaseband. There is multiple-channel broadband E<strong>the</strong>rnet cable, bothcopper and optical fiber. Various data transmission and encod<strong>in</strong>gschemes are used <strong>in</strong> E<strong>the</strong>rnet. The broadband signal characteristics areshown <strong>in</strong> Table 7-3.Table 7-3. Broadband Signal<strong>in</strong>g Characteristics————————————————————————————————Many channels on one cableSeparate frequency for each channelCarrier tone supplied by modemsModulation encod<strong>in</strong>g schemesAM amplitude modulationFM frequency modulationPM phase modulationPCM pulse-code modulationPSK phase-shift key<strong>in</strong>gFSK frequency-shift key<strong>in</strong>g————————————————————————————————Baseband cable <strong>in</strong>cludes 50-ohm Thicknet coaxial cable, 75-ohmTh<strong>in</strong>net and Cheapernet cable. The higher cable impedance of Th<strong>in</strong>netand Cheapernet limits <strong>the</strong>m to shorter segments because <strong>the</strong> signal degradesand attenuates with distances. The th<strong>in</strong>ner cable is also moresusceptible to signal <strong>in</strong>terference.Th<strong>in</strong>net is a simple cable substitute for standard E<strong>the</strong>rnet networkcabl<strong>in</strong>g, while Cheapernet uses a different E<strong>the</strong>rnet controller-transceiverunit that is <strong>in</strong>tegrated <strong>in</strong> a s<strong>in</strong>gle bus card or <strong>in</strong>cluded on <strong>the</strong> PCmo<strong>the</strong>r board.Optical fiber cables are th<strong>in</strong>ner, lighter and conta<strong>in</strong> no metal. Theyare used to solve long-haul or security problems. Fiber can be used to<strong>in</strong>terconnect build<strong>in</strong>gs miles apart.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Broadband cables are most often used for analog communications,but optical fiber broadband is used to transmit digital transmissions aswell.Broadband networks provide more bandwidth, higher speeds anda larger geographic service than baseband networks, but <strong>the</strong> cost ishigher. The physical medium and transmission differ from baseband but<strong>the</strong> E<strong>the</strong>rnet protocols can transmit on baseband and <strong>in</strong>terconnect us<strong>in</strong>ga bridge.Broadband can simultaneously carry voice, data, video or anyo<strong>the</strong>r digital or analog traffic at different frequencies. When broadbandnetworks carry voice, video, and data communication signals concurrentlyon <strong>the</strong> same networks, a bridg<strong>in</strong>g mechanism is required to transmitdata between networks us<strong>in</strong>g different transmission media. Broadbanddisadvantages <strong>in</strong>clude its <strong>in</strong>itial expense as well as <strong>the</strong> difficultyand expense <strong>in</strong> mov<strong>in</strong>g or add<strong>in</strong>g nodes to expand <strong>the</strong> network.The ma<strong>in</strong> difference between a standard E<strong>the</strong>rnet, twisted-pair,and <strong>the</strong> Cheapernet and Th<strong>in</strong>net variations is <strong>the</strong> maximum length ofcable each version supports and <strong>the</strong> m<strong>in</strong>imum distance between nodes.Standard E<strong>the</strong>rnet supports a maximum 500-meter segment andnodes spaced no closer than 2.5 meters, while Cheapernet and Th<strong>in</strong>netrun on th<strong>in</strong>ner 75-ohm cabl<strong>in</strong>g and support a maximum 200 meter segment.The nodes can be spaced as close as 0.5 meter. The 50-ohm coaxialcable is physically thicker and stronger, better shielded, and more expensivethan <strong>the</strong> 75-ohm Th<strong>in</strong>net cable. Broadband uses a televisiontuner-like modem that converts each channel to a separate frequency.There can be 2 to 80 channels per broadband cable. BroadbandE<strong>the</strong>rnet can run for longer distances than baseband, up to 2 km. Opticalfiber technology is newer and provides greater bandwidth and highertransmission speeds than broadband coaxial cable, but it is more expensive.Fiber cable is more difficult to splice and repair. Expansion andcontraction from extremes of heat and cold can fracture <strong>the</strong> cable. Heatand cold can also affect <strong>the</strong> optical qualities and gradually decrease <strong>the</strong>bandwidth.Optical fiber transmission is available through PC adapter boardsfor E<strong>the</strong>rnet. Optical fiber networks have some of <strong>the</strong> same transmissioncharacteristics as broadband cable but <strong>the</strong>y are more expensive andmore difficult to debug, ma<strong>in</strong>ta<strong>in</strong>, and expand. They are not susceptibleto electronic noise or signal crosstalk and provide good security.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityTh<strong>in</strong>net and Cheapernet cables have similar compositions. Thedielectric is a type of foam and <strong>the</strong> exterior <strong>in</strong>sulat<strong>in</strong>g jacket can bepolyv<strong>in</strong>yl chloride (PVC) or <strong>the</strong> more expensive, fire-resistant fluor<strong>in</strong>atedethylene propylene (FEP) Teflon for <strong>in</strong>stallation <strong>in</strong> build<strong>in</strong>g plenumsand walls.Baseband E<strong>the</strong>rnet can run on twisted-pair telephone wir<strong>in</strong>g. Thistype of cable has bundles of wires conta<strong>in</strong><strong>in</strong>g 4, 6, or 8 wir<strong>in</strong>g pairswhich are twisted around each o<strong>the</strong>r. The wires are twisted to m<strong>in</strong>imizecrosstalk, signal attenuation and susceptibility to stray noise (See Tables7-4, 7-5).Table 7-4. E<strong>the</strong>rnet Baseband Variants————————————————————————————————Specifications E<strong>the</strong>rnet Cheapernet Th<strong>in</strong>net Twisted-PairSegment length (m) 500 200 200 250Transceiversper segment 100 100 100 512Maximum numberof segments 3 3 3 3Network length (m) 1500 600 600 500————————————————————————————————Table 7-5. Baseband Signal<strong>in</strong>g Characteristics————————————————————————————————One channel per coaxial cableNo carrierDC to upper frequency limitEncod<strong>in</strong>g schemesManchesterReturn-to-zeroNon-return-to-zeroDigital transmission, no modem translation————————————————————————————————E<strong>the</strong>rnet CompatibilityNetwork compatibility is a function of network length and lengthof <strong>in</strong>dividual node connections. E<strong>the</strong>rnet transmission is based upon a©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>statistical signal and ranges of signal acceptance. Violation of thosespecifications means that <strong>the</strong> network could function poorly. Exceededsegment lengths, drop cable lengths, twisted-pair connections, substitut<strong>in</strong>gTh<strong>in</strong>net for standard cable segments or <strong>in</strong>sert<strong>in</strong>g twisted-pairs allstress <strong>the</strong> network.Some E<strong>the</strong>rnet versions have data encod<strong>in</strong>g differences. The OSImodel has become generally accepted due to <strong>the</strong> globalization of telecommunicationsand data communications. It is a de facto standard.True standardization implies comprehensive test<strong>in</strong>g for conformity toOSI and this is a major undertak<strong>in</strong>g <strong>in</strong> <strong>the</strong> future.Wireless E<strong>the</strong>rnetBaseband wireless networks use <strong>in</strong>frared or radio frequency signaltransmission to transmit signals through <strong>the</strong> air and through <strong>the</strong> walls.Spread-spectrum technology (SST) uses multiple frequencies and carriesa s<strong>in</strong>gle baseband channel. The only difference between <strong>the</strong> more traditionalcable networks and a wireless network is <strong>the</strong> lack of media. Noconnect<strong>in</strong>g wires are used.This technology is useful for build<strong>in</strong>gs where add<strong>in</strong>g wir<strong>in</strong>g wouldbe costly. This <strong>in</strong>cludes old build<strong>in</strong>gs without conduits, hollow walls, orfalse ceil<strong>in</strong>gs, or build<strong>in</strong>gs with an asbestos problem.Infrared technology is not advisable for dusty, dirty, or smokyenvironments because <strong>the</strong>se particles degrade <strong>the</strong> signals. Infrared technologyis also limited by l<strong>in</strong>e-of-sight <strong>in</strong>stallations.The hardware required for <strong>the</strong> most m<strong>in</strong>imal configuration isnode-based wireless transmitters which elim<strong>in</strong>ates <strong>the</strong> need for anynetwork cabl<strong>in</strong>g. The more usual configuration uses a backbone cable orwire that <strong>in</strong>terconnects <strong>the</strong> nodes. The cable or wire is ei<strong>the</strong>r coaxialcable, twisted-pair wire bundles and telephone modular jumpers, oroptical fiber.Coaxial cable is most often designated as RG-50, RG-59, or RG-225coaxial cable. The 50-ohm cable (RG-50) performs better than 75-ohmCATV cable (RG-59 or RG-225) because it has better resistance to lowfrequencyelectromagnetic noise which means that it shields <strong>the</strong> signaland is rarely affected by external <strong>in</strong>terference. Th<strong>in</strong>net and Cheapernetare 75-ohm cable and can suffer this <strong>in</strong>terference.Unshielded twisted-pair (UTP) E<strong>the</strong>rnet wire is designated as ei-©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Security<strong>the</strong>r UTP-3, UTP-4, or STP-3, which is a higher-grade shielded twistedpairwire bundle. The wire itself is typically 24-gauge copper wire witha PVC or Teflon coat<strong>in</strong>g.An E<strong>the</strong>rnet network consists of <strong>the</strong> cable and connectors. Thereare also term<strong>in</strong>at<strong>in</strong>g resistors, coaxial taps and transceiver drop cables.Transceivers and controllers are used at <strong>the</strong> node locations. Fan-outs,gateways, repeaters and o<strong>the</strong>r equipment are used to expand <strong>the</strong> system.An E<strong>the</strong>rnet gateway provides network expansion and conversionamong networks with different protocols.A packet or E<strong>the</strong>rnet frame is <strong>the</strong> transmission vehicle. E<strong>the</strong>rnetacts like a one-l<strong>in</strong>e country telephone network s<strong>in</strong>ce only a s<strong>in</strong>gle transmissioncan proceed at a time (Figure 7-2). The transmission protocolsare rules for decid<strong>in</strong>g who can transmit.Each node has transmission and reception hardware, which takes<strong>the</strong> role of a telephone handset. This hardware controls access to <strong>the</strong>communications channel. Each node builds its message to match <strong>the</strong>required E<strong>the</strong>rnet frame format.Transceivers and <strong>Control</strong>lersThe transmission-reception hardware is called a transceiver, ortransmitter-receiver. This is analogous to <strong>the</strong> earphone and microphoneof <strong>the</strong> telephone headset.The traffic control hardware is called an E<strong>the</strong>rnet controller, whichis analogous to <strong>the</strong> dial unit of a phone system. The controller and trans-Figure 7-2. Party-l<strong>in</strong>e telephone analogy©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>ceiver are often bundled toge<strong>the</strong>r <strong>in</strong>to a s<strong>in</strong>gle personal computeradapter board called a network <strong>in</strong>terface card (NIC) or a multimediaaccess unit. Transceiver and controller functions are specified by <strong>the</strong> OSImodel. Table 7-6 lists <strong>the</strong>transceiver functions.The transceivers limitaccess to one caller at a timeand direct <strong>the</strong> transmission.First, <strong>the</strong> transceiver listensfor a quiet period. When <strong>the</strong>network cable is not busywith ano<strong>the</strong>r transmission,<strong>the</strong> transceiver transmits <strong>the</strong>data signal.Two or more transmittersmay simultaneously observea quiet period andtransmit. This results <strong>in</strong> a collision.Then, <strong>the</strong> transmitt<strong>in</strong>gtransceivers will broadcast ajam signal. Upon receipt ofthis signal, each station contribut<strong>in</strong>gto <strong>the</strong> collision must wait for a random period of time beforeattempt<strong>in</strong>g to transmit aga<strong>in</strong>. Different mechanisms are used for collisiondetection. These differences make some hardware <strong>in</strong>compatiblewith o<strong>the</strong>r hardware.The E<strong>the</strong>rnet controller dials <strong>the</strong> number and builds <strong>the</strong> transmittedpacket which is addressed to a designated node. The controller alsodisassembles packets and transfers this <strong>in</strong>formation to <strong>the</strong> receiv<strong>in</strong>gcomputer.The network access unit (NAU) also provides some services to<strong>in</strong>crease reliability. The NAU shuts down when it senses that <strong>the</strong>twisted-pair wire is connected to a live telephone circuit. It also tests <strong>the</strong>connections.Transmission ProcessTable 7-6. Transceiver Functions———————————————Receive signalTransmit signalBroadcast jam signalTest for receptionTest for transmissionTest for jam (collision)Test for heartbeatTest for carrier senseTransmit preambleTransmit delay signalSense collision———————————————Baseband E<strong>the</strong>rnet transmits a s<strong>in</strong>gle digital channel. A base voltageof + 0.7 V provides a carrier sense signal for <strong>the</strong> nodes on <strong>the</strong> net-©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Securitywork. When transmitt<strong>in</strong>g, a transceiver unit lowers <strong>the</strong> voltage level to-0.7 V. The transmitt<strong>in</strong>g node propagates a digital signal wave outward<strong>in</strong> both directions down <strong>the</strong> coaxial cable.Manchester encod<strong>in</strong>g is used where <strong>the</strong> digital signal represents a0 as a high voltage with a transition to a low voltage and a 1 as a lowvoltage with a transition to a high voltage.Twisted-pair concentrators <strong>in</strong>terpret and regenerate <strong>the</strong> signals forretransmission to o<strong>the</strong>r nodes. This <strong>in</strong>tegrity check is not available oncoaxial networks. A short circuit or o<strong>the</strong>r electrical malfunction willcause <strong>the</strong> failed node to be removed.Packet TransmissionIndividual bits are not transferred from location to location withouta preamble or explanation as <strong>the</strong>y are <strong>in</strong> modem-connected l<strong>in</strong>es.The <strong>in</strong>formation to be transferred is packaged and checked upon receiptfor proper delivery.The packet conta<strong>in</strong>s <strong>the</strong> follow<strong>in</strong>g <strong>in</strong>formation:• dest<strong>in</strong>ation address,• return or source address,• length field,• data field and• frame check sequence field.Handshak<strong>in</strong>g between transmitt<strong>in</strong>g and receiv<strong>in</strong>g nodes prevents packetsfrom crash<strong>in</strong>g <strong>in</strong>to each o<strong>the</strong>r and be<strong>in</strong>g scrambled. When <strong>the</strong> networkis not busy, an idle signal is transmitted by all source-dest<strong>in</strong>ationnodes, which is <strong>the</strong> -0.7 V carrier sense. This base voltage is sometimescalled <strong>the</strong> heartbeat.Once <strong>the</strong> data set is packaged <strong>in</strong>to a frame, <strong>the</strong> E<strong>the</strong>rnet controllerpolls <strong>the</strong> transceiver for <strong>the</strong> network state. If <strong>the</strong> network is busy, it waitsuntil <strong>the</strong> network is free and <strong>the</strong>n transmits <strong>the</strong> packet. The packet signalpropagates <strong>in</strong> both directions over <strong>the</strong> coaxial cable.Each transceiver on <strong>the</strong> network hears <strong>the</strong> transmission preamble,synchronizes its clock, and awaits <strong>the</strong> packet. This clock synchronizationis needed to dist<strong>in</strong>guish <strong>the</strong> beg<strong>in</strong>n<strong>in</strong>g and <strong>the</strong> end of <strong>the</strong> packet. Thepreamble provides this frame alignment.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Every transceiver on <strong>the</strong> network reads <strong>the</strong> address <strong>in</strong>formation.When a packet dest<strong>in</strong>ation address matches <strong>the</strong> E<strong>the</strong>rnet address of anode, <strong>the</strong> transceiver for that dest<strong>in</strong>ation node accepts <strong>the</strong> E<strong>the</strong>rnet signal<strong>in</strong>to <strong>the</strong> receive buffers on its E<strong>the</strong>rnet controller. The signal wavecont<strong>in</strong>ues travel<strong>in</strong>g down <strong>the</strong> cable until absorbed by <strong>the</strong> term<strong>in</strong>ators.All transceiver units listen to <strong>the</strong> coax broadcast signal. When <strong>the</strong>dest<strong>in</strong>ation address matches <strong>the</strong> E<strong>the</strong>rnet address of a receiv<strong>in</strong>g node,that transceiver reads <strong>the</strong> signal and copies <strong>the</strong> transmission <strong>in</strong>to its ownbuffer without chang<strong>in</strong>g or damag<strong>in</strong>g <strong>the</strong> signal wave.The controller verifies that <strong>the</strong> length of <strong>the</strong> data message matches<strong>the</strong> value <strong>in</strong> <strong>the</strong> length field. Any discrepancies are passed to <strong>the</strong> softwareprotocols. TCP/IP, for example, would request a rebroadcast of <strong>the</strong>damaged packet. TCP/IP also reports receipt confirmation to <strong>the</strong> transmitt<strong>in</strong>gnode. If <strong>the</strong> transmission has been successful, <strong>the</strong> data fieldcontents are passed to <strong>the</strong> software protocols and eventually transferredto <strong>the</strong> application.E<strong>the</strong>rnet DrawbacksThe nodes contend for network access, much like users of party-l<strong>in</strong>etelephones compete for a free l<strong>in</strong>e. This contention method of broadcast<strong>in</strong>gallows more than one transceiver to transmit at <strong>the</strong> same time. Two ormore transceivers may simultaneously sense a quiet network. In that time<strong>in</strong>terval, each will beg<strong>in</strong> to transmit packets. The signals will collide, corrupt<strong>in</strong>geach transmission. One unit may recognize <strong>the</strong> collision andbroadcast a jam signal. As a consequence two fragmentary packets aretransmitted <strong>in</strong> each direction for each corrupted transmission.When a collision has been sensed and acknowledged, <strong>the</strong> E<strong>the</strong>rnetcontrollers create a random number. This is usually provided by <strong>the</strong> nodecomputer equipment and is used to delay fur<strong>the</strong>r retransmission attempts.The random delay serves to restart <strong>the</strong> contention for <strong>the</strong> network.These collisions on E<strong>the</strong>rnet create fragmentary packets and lower<strong>the</strong> possible transmission rate. The jam signal takes a m<strong>in</strong>imum of 32bits and all collid<strong>in</strong>g packets must be retransmitted.An adm<strong>in</strong>istrative layer directs <strong>the</strong> packets and deals with trafficproblems from packet content. This software provides <strong>the</strong> ability toknow what nodes exist. Some systems map network station names <strong>in</strong>to©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Securitylogical Internet addresses. The role of this adm<strong>in</strong>istrative layer is similarto that of <strong>the</strong> telephone operator. The operator provides connections,distributes telephone numbers and verifies wrong numbers, retries <strong>the</strong>connection after a busy signal, switches connections onto o<strong>the</strong>r networkswhen <strong>the</strong> ma<strong>in</strong> network fails, troubleshoots <strong>the</strong> mechanical connectionand <strong>in</strong>forms <strong>the</strong> call<strong>in</strong>g party of network problems.While hardware problems are more easily diagnosed, networksoftware problems can be narrowed to specific nodes with software toolsand protocol analyzers.Network software can provide functions such as system boot, network<strong>in</strong>itialization and systems monitor<strong>in</strong>g. Simple networks buildupon TCP/IP protocols which are <strong>the</strong> predom<strong>in</strong>ant E<strong>the</strong>rnet software.These provide <strong>in</strong>tercommunication between nodes for messages, fileexchange and term<strong>in</strong>al services. This can <strong>in</strong>clude remote workstationoperation, remote boot, and remote device access and services.Internet ProtocolThe Internet protocol had its roots <strong>in</strong> a communications address<strong>in</strong>gscheme known as <strong>the</strong> Address Resolution Protocol (ARP). This formed<strong>the</strong> basis of <strong>the</strong> Department of Defense’s Advanced Research Project(DARPA) four-node network called Arpanet.Arpanet evolved <strong>in</strong>to <strong>the</strong> Internet dur<strong>in</strong>g <strong>the</strong> 1970s as TCP/IP wasadapted for LANs us<strong>in</strong>g E<strong>the</strong>rnet. The IP address conta<strong>in</strong>s a networkand host address divided <strong>in</strong>to parts.The Internet protocol provides <strong>the</strong> lowest level of software accessand <strong>in</strong>terface to <strong>the</strong> E<strong>the</strong>rnet environment. This protocol provides l<strong>in</strong>k<strong>in</strong>itialization and term<strong>in</strong>ation, node recognition, and packet control operations.Transmission <strong>Control</strong> Protocol is a higher level communicationprotocol. This protocol sequences data transfers and <strong>the</strong> actual packettransmissions. TCP resides at <strong>the</strong> OSI layer 4, while IP is OSI layer 3.Internet-enabled NetworksThis type of network makes it possible to manage, view, and controlprocesses, network devices, and configurations from applicationsand standard Web browsers. Implement<strong>in</strong>g a Web network allows visu-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>alization and control over <strong>the</strong> Internet via technologies such as IIS/PeerWeb server, HTTP, XML, ActiveZ and embedded Web servers (Figure 7-3). This is sometimes called a Web-Aware Enterprise Network (WAEN).The recent explosion of WAENs <strong>in</strong> <strong>in</strong>dustrial automation hascaused some concern about <strong>the</strong> security of networks connected to <strong>the</strong>Internet. Implement<strong>in</strong>g a security bluepr<strong>in</strong>t that fits your Internet requirementsis critical as Web capability moves ahead. Several steps canbe taken to secure a network aga<strong>in</strong>st unwanted <strong>in</strong>trusion when connectedto <strong>the</strong> Internet. There are some basic security technologies thatcan be used aga<strong>in</strong>st <strong>the</strong> commonly used attacks that could compromisea network’s <strong>in</strong>tegrity.Connect<strong>in</strong>g a LAN or WAN (Wide Area Network) to <strong>the</strong> Internetexposes <strong>the</strong> network to more than 50,000 o<strong>the</strong>r networks and <strong>the</strong>ir users.These connections provide opportunities for <strong>in</strong>formation shar<strong>in</strong>g, butFigure 7-3. Browser-based system©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Security<strong>the</strong>y also lead to <strong>in</strong>formation <strong>the</strong>ft or corruption. Network <strong>in</strong>formationcan reside on a hard drive or be <strong>in</strong> transit across <strong>the</strong> network cable <strong>in</strong> <strong>the</strong>form of packets. Serious hackers are also called crackers. They maybecome active <strong>in</strong> access<strong>in</strong>g your network and should be considered athreat. Some of <strong>the</strong>ir methods create holes with<strong>in</strong> <strong>the</strong> operat<strong>in</strong>g system,which allows easy access for hackers.Security TechnologyLevels of security should be implemented for Internet implementations.These will restrict <strong>the</strong> levels of access made available to remoteusers. This type of security is available from NT, Internet InformationServer (IIS) security, SSL (Secure Socket Layers), Digital Certificates andencryption.In Wonderware software <strong>the</strong>re are three types of protected dataaccess via <strong>the</strong> Internet. These are:• Read-only access of SQL clients, which are ActiveX objects,• Read-only access of real-time process graphics us<strong>in</strong>g standard NTand IIS security,• Runtime, a module which gives remote users <strong>the</strong> ability to respondto emergencies, security for <strong>the</strong> user is predef<strong>in</strong>ed us<strong>in</strong>g NT andIIS security adm<strong>in</strong>istration.In W<strong>in</strong>dows NT-based systems, general security is supportedthrough <strong>the</strong> OS and IIS (Figure 7-4). W<strong>in</strong>dows NT allows <strong>the</strong> user toenable and disable access to files and directories by user or group. WithIIS manager more security restrict<strong>in</strong>g read/write accesses can be added.Security technology <strong>in</strong>cludes SSL, Digital certificates and HTTPS.SSL is a protocol developed by Netscape that allows a secure transactionbetween standard browsers and Web servers on <strong>the</strong> Internet. Both <strong>the</strong>Netscape Navigator and Internet Explorer browsers support SSL.Encryption is ano<strong>the</strong>r type of security. Data can be encrypted us<strong>in</strong>ga secret key for encryption (symmetric) or public key encryption (asymmetric).In secret key encryption both parties share <strong>the</strong> same passwordor key. In public key encryption, <strong>the</strong>re are two keys that are related, oneis private and <strong>the</strong> o<strong>the</strong>r public. SSL uses <strong>the</strong> public key method of encryption.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 7-4. Security supported by W<strong>in</strong>dows NT and Microsoft IIS WebserverDigital CertificatesPublic keys can be au<strong>the</strong>nticated with Digital Certificates (IDs).When a Digital Certificate is used with encryption, it secures <strong>the</strong> au<strong>the</strong>nticityof <strong>the</strong> parties <strong>in</strong>volved <strong>in</strong> <strong>the</strong> transaction (Figure 7-5).Digital Certificates provide a type of identification or passport thatallows users to navigate across multiple networks. The users reta<strong>in</strong> <strong>the</strong>iraccess levels and credentials (Digital IDs) for each network. DigitalCertificates provide <strong>the</strong> capability to identify users, access levels andauthorized functions <strong>in</strong> multiple networks. When a user’s levels aredef<strong>in</strong>ed and a digital Certificate is issued, adm<strong>in</strong>istrators can audit <strong>the</strong>user’s transactions.Methods of outside <strong>in</strong>trusion that can compromise <strong>in</strong>formationand security on a network <strong>in</strong>clude:Figure 7-5. Secure transmissions with digital ID certificates.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Security• network packet sniffers,• password attacks,• IP spoof<strong>in</strong>g,• middle man attacks,• denial-of-service attacks, and• application layer attacks.Packet SniffersNetworked computers communicate serially by send<strong>in</strong>g one datapiece after ano<strong>the</strong>r. The large data pieces are broken <strong>in</strong>to smaller pieces.The smaller pieces are <strong>the</strong> network packets.Some network applications distribute <strong>the</strong> network packets <strong>in</strong> cleartext. These packets are not encrypted and can be processed and read bya packet sniffer which can be implemented <strong>in</strong> ei<strong>the</strong>r software or hardware.The packet sniffer is normally used for network fault analysis. Itcan pick <strong>the</strong> packets off <strong>the</strong> network and process <strong>the</strong>m for data analysis.The packet sniffer software will capture <strong>the</strong> packets received on aphysical network wire. There are freeware and shareware packet sniffersthat allow any user to get <strong>in</strong>to a system without any knowledge of <strong>the</strong><strong>in</strong>ner work<strong>in</strong>gs of <strong>the</strong> system.In a networked database, a packet sniffer can be used to get <strong>in</strong>formationthat is queried from <strong>the</strong> database, along with user account namesand <strong>the</strong> passwords used. This can be a problem s<strong>in</strong>ce users often reuse<strong>the</strong>ir log-<strong>in</strong> names and passwords across multiple applications.O<strong>the</strong>r packet sniffer <strong>in</strong>formation <strong>in</strong>cludes <strong>the</strong> topology of <strong>the</strong> network,what computers run specific services, how many computers areon <strong>the</strong> network and which computers have access to o<strong>the</strong>rs.Password AttacksPassword attacks occur when <strong>the</strong>re are repeated attempts to identifya user account or password. These attacks take place from bruteforce, repeated attempts which are often automated. O<strong>the</strong>r attacks cancome from Trojan horse programs, IP spoof<strong>in</strong>g, and packet sniffers.Once an attacker ga<strong>in</strong>s access to <strong>the</strong> network, <strong>the</strong>y could modify<strong>the</strong> rout<strong>in</strong>g tables for <strong>the</strong> network. Then, all network packets can be©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>routed to <strong>the</strong> attacker before <strong>the</strong>y are transmitted to <strong>the</strong>ir f<strong>in</strong>al dest<strong>in</strong>ation.This allows <strong>the</strong> attacker to monitor all network traffic and becomea middle man.A middle-man attack can come from someone who is work<strong>in</strong>g for<strong>the</strong> Internet service provider (ISP). This person could ga<strong>in</strong> access to <strong>the</strong>network packets transferred between <strong>the</strong> network and any o<strong>the</strong>r networkus<strong>in</strong>g packet sniffers and rout<strong>in</strong>g or transport protocol software.These attacks could result <strong>in</strong> <strong>the</strong> <strong>the</strong>ft of <strong>in</strong>formation, hijack<strong>in</strong>g of<strong>in</strong>ternal network resources, denial of services, corruption of transmitteddata, <strong>in</strong>troduction of new or false <strong>in</strong>formation <strong>in</strong>to network sessions,<strong>in</strong>terruption of control and <strong>the</strong> degradation of network performance.IP Spoof<strong>in</strong>gAn IP-spoof<strong>in</strong>g attack can occur when an attacker outside <strong>the</strong> networkpretends to be a trusted computer on <strong>the</strong> system by us<strong>in</strong>g an IPaddress that is with<strong>in</strong> <strong>the</strong> range of IP addresses for <strong>the</strong> network. Theattacker may also use an authorized external IP address to provide accessto specific resources on <strong>the</strong> network.IP-spoof<strong>in</strong>g attacks are limited to <strong>the</strong> <strong>in</strong>jection of data or commands<strong>in</strong>to an exist<strong>in</strong>g stream of data passed between a client andserver application or a peer-to-peer network connection. For bidirectionalcommunication to exist, <strong>the</strong> attacker must change all rout<strong>in</strong>gtables to po<strong>in</strong>t to <strong>the</strong> spoofed IP address.An attacker can also emulate one of <strong>the</strong> <strong>in</strong>ternal users <strong>in</strong> <strong>the</strong> organization.This could <strong>in</strong>clude e-mail messages that appear to be official.These attacks are easier when an attacker has a user account and password.But, <strong>the</strong>y are still possible by comb<strong>in</strong><strong>in</strong>g spoof<strong>in</strong>g with a knowledgeof messag<strong>in</strong>g protocols.Denial-of-service AttacksDenial-of-service attacks concentrate on mak<strong>in</strong>g a service unavailable.This can be done exhaust<strong>in</strong>g or slamm<strong>in</strong>g a server on <strong>the</strong> network.Denial-of-service attacks can use Internet protocols, such as TCP and <strong>the</strong>Internet <strong>Control</strong> Message Protocol (ICMP).These attacks probe a weakness <strong>in</strong> <strong>the</strong> system. Flood<strong>in</strong>g <strong>the</strong> net-©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Securitywork with undesired network packets is one technique that is used.Ano<strong>the</strong>r technique is to leave false <strong>in</strong>formation about <strong>the</strong> status of networkresources.Application and Trojan Horse AttacksApplication attacks use some weakness <strong>in</strong> <strong>the</strong> software that isfound on servers, <strong>in</strong>clud<strong>in</strong>g FTP. This allows <strong>the</strong> attacker to ga<strong>in</strong> accesswith <strong>the</strong> permission of <strong>the</strong> account runn<strong>in</strong>g <strong>the</strong> application.Trojan horse program attacks use a program that <strong>the</strong> attacker substitutesfor ano<strong>the</strong>r program. The substitute program can furnish <strong>the</strong>functions of <strong>the</strong> normal program. But, it also may monitor log-<strong>in</strong> attemptsand seize user account and password <strong>in</strong>formation.One type of Trojan horse program displays a screen, banner, orprompt that looks like a valid log-<strong>in</strong> sequence. The program processes<strong>the</strong> <strong>in</strong>formation that <strong>the</strong> user types <strong>in</strong> and e-mails it to <strong>the</strong> attacker.Secur<strong>in</strong>g <strong>the</strong> NetworkNetwork security can <strong>in</strong>clude firewalls, proxy servers and dataencryption. Proxy servers and firewalls act as traffic cops. They regulatewho gets <strong>in</strong> and out of <strong>the</strong> network.A firewall monitors <strong>the</strong> traffic cross<strong>in</strong>g network perimeters andsets restrictions accord<strong>in</strong>g to <strong>the</strong> security policy. Perimeter routers canalso be used. These can be located at a network boundary. Firewallscommonly separate <strong>in</strong>ternal and external networks. The firewall serveracts as <strong>the</strong> gateway for all communications between trusted networksand untrusted and unknown networks.The least secure network is <strong>the</strong> outermost perimeter network of <strong>the</strong>system (Figure 7-6). This area of <strong>the</strong> network is <strong>the</strong> easiest area to ga<strong>in</strong>access to, mak<strong>in</strong>g it <strong>the</strong> most frequently attacked.PasswordsThe shorter <strong>the</strong> password, <strong>the</strong> easier it is to guess and test. Passwordsshould be at least eight characters long. The maximum number of©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 7-6. Perimeter networks that need to be protected.characters you can type <strong>in</strong> <strong>the</strong> log-on box will make it harder for hackers,but also harder for users to log on. Place restrictions on all userdef<strong>in</strong>edpasswords. Do not use words for passwords that conta<strong>in</strong> <strong>the</strong>birth date, middle name, and/or spouse’s and children’s’ names, s<strong>in</strong>cethis makes it easier for hackers to obta<strong>in</strong> access to <strong>the</strong> password.Also, do not use any common word that can be found <strong>in</strong> a dictionary.A common hacker technique is to run lists of common words suchas names of famous places or people. Use more complicated ra<strong>the</strong>r thansimple passwords. The later W<strong>in</strong>dows NT versions have a Service Packwith features that improve <strong>the</strong> security of <strong>the</strong> network passwords. Itrequires <strong>the</strong> user passwords to be at least six characters long. They mustalso conta<strong>in</strong> characters from at least three of <strong>the</strong> follow<strong>in</strong>g four groups:• English uppercase letters (A-Z),• English lowercase letters (a-z),• Arabic numerals (0-9) and• Punctuation or o<strong>the</strong>r special characters.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityMany Internet sites require you to enter a user name and password<strong>in</strong> order to access <strong>in</strong>formation. You should never use your W<strong>in</strong>dows NTlog-on password to sign on to a Web site. There is <strong>the</strong> chance that someonecould <strong>in</strong>tercept <strong>the</strong> password and try it to log onto <strong>the</strong> system.Log-<strong>in</strong> and Registry SecurityThere is a Microsoft utility called TweakUL. This utility stores <strong>the</strong>user name and password values <strong>in</strong> <strong>the</strong> W<strong>in</strong>dows Registry <strong>in</strong> anunencrypted format. Hackers can access <strong>the</strong> Registry. If <strong>the</strong> system is setup for automatic log-on, you can still protect <strong>the</strong> log-<strong>in</strong> <strong>in</strong>formation byedit<strong>in</strong>g <strong>the</strong> permissions associated with <strong>the</strong> segment of <strong>the</strong> Registrywhere <strong>the</strong> <strong>in</strong>formation is automatically stored.You open <strong>the</strong> W<strong>in</strong>dows NT registry Editor and choose Permissionsfrom <strong>the</strong> security dropdown menu. Then change <strong>the</strong> default permissionfor <strong>the</strong> Everyone group from Read to Special Access. Then, deselect <strong>the</strong>Query Value check box. Now, when someone o<strong>the</strong>r than an adm<strong>in</strong>istratortries to access <strong>the</strong> key, it will appear grayed out.W<strong>in</strong>dows NT can clear <strong>the</strong> user name on <strong>the</strong> log-on screen. NT bydefault displays <strong>the</strong> name of <strong>the</strong> last person who logged onto <strong>the</strong> system.This can be a security threat, s<strong>in</strong>ce a hacker may guess a user’spassword based on <strong>the</strong> account name or <strong>the</strong> log-<strong>in</strong> environment. You canclear <strong>the</strong> previous user name by add<strong>in</strong>g a new str<strong>in</strong>g value calledDontDisplayLastUserNameSecurity is improved if <strong>the</strong>re are only READ capabilities on <strong>the</strong>Registry keys. The default sett<strong>in</strong>g is WRITE on some of <strong>the</strong> most importantkeys. These WRITE privileges allow a user to ga<strong>in</strong> access to <strong>the</strong>server. This can be prevented by chang<strong>in</strong>g <strong>the</strong> permissions on <strong>the</strong>se keysto READ. Use <strong>the</strong> Registry Editor to change <strong>the</strong> security/permissions on<strong>the</strong>se keys.When a user starts an NT workstation, it automatically createssome shared resources. These <strong>in</strong>clude a share to <strong>the</strong> root directory of <strong>the</strong>hard drive that rema<strong>in</strong>s <strong>in</strong>visible dur<strong>in</strong>g brows<strong>in</strong>g. To prevent this automaticresource shar<strong>in</strong>g you can edit <strong>the</strong> NT Registry sett<strong>in</strong>gs.W<strong>in</strong>dows NT holds data <strong>in</strong> swap files and temp files. In order tospeed access and improve performance, pages of data are swapped <strong>in</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>and out as needed. When <strong>the</strong> system shuts down, <strong>the</strong> swap file stays on<strong>the</strong> hard drive. An <strong>in</strong>truder could view data stored <strong>in</strong> <strong>the</strong> swap file. TheNT system can be configured to clear <strong>the</strong> swap file every time <strong>the</strong> systemshuts down.This can be done by us<strong>in</strong>g <strong>the</strong> NT Registry Editor. You go toand addHKEY_LOCAL_MACHINEClearPageFileAtShutdownThis will clear all pages except those that are still active dur<strong>in</strong>gshutdown.One of <strong>the</strong> common paths a hacker uses to ga<strong>in</strong> access to a networkis through services runn<strong>in</strong>g on <strong>the</strong> server. These <strong>in</strong>clude <strong>the</strong> ClipBookServer, Plug-&-Play and Net Log-on. Consider shutt<strong>in</strong>g down those thatare not needed.Smart NetworksSmart control and advanced networks def<strong>in</strong>e <strong>the</strong> future of controltechnology. The goal <strong>in</strong> <strong>the</strong> future will be to <strong>in</strong>tegrate plant-wide controlswith <strong>the</strong> monitor<strong>in</strong>g of energy used for heat<strong>in</strong>g and ventilation.Fan rooms are hav<strong>in</strong>g <strong>the</strong>ir older pneumatic controls replacedwith modern data acquisition and control. Field devices are used as<strong>in</strong>put/output devices to <strong>the</strong> PC <strong>in</strong> each fan room substation. W<strong>in</strong>dowsNT is used <strong>in</strong> a PC-based control system with fieldbus communications.Benefits <strong>in</strong>clude lower <strong>in</strong>stalled costs with less wir<strong>in</strong>g andtrue distributed <strong>in</strong>telligence. Communications are improved as well asdiagnostics between devices. Incorporat<strong>in</strong>g all control, operator <strong>in</strong>terfacesand data acquisition <strong>in</strong> a s<strong>in</strong>gle system allows a leaner overalloperation. Hardware sav<strong>in</strong>gs can reach 25%.PC-based software like Paradym-31 provides ladder logic, sequentialfunction charts, and function-block diagrams. User-def<strong>in</strong>edfunction blocks allow users to customize <strong>the</strong> <strong>HVAC</strong> application us<strong>in</strong>gsoftware tool sets.PC-based control will be used for more energy sav<strong>in</strong>g applications.It can provide control capabilities usually miss<strong>in</strong>g <strong>in</strong> older classicalmethods.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityPure PC-based control will grow while blend<strong>in</strong>g traditionalforms of control like programmable logic control with PCs will decreaseas <strong>the</strong> range of PC software expands to cover more diverseapplications.PC-based control runs on a standard operat<strong>in</strong>g system such asW<strong>in</strong>dows NT. Off-<strong>the</strong>-shelf application programs cont<strong>in</strong>ue to improve.<strong>Control</strong> systems can be built on W<strong>in</strong>dows with real-time extensions.PC-based control offer improved options <strong>in</strong> programm<strong>in</strong>g software.Systems can utilize popular languages such as Visual Basic, VisualC++, C, or even ladder logic. Applications programmed <strong>in</strong> differentlanguages can reside simultaneously on <strong>the</strong> same system.The methods used to simplify program control cont<strong>in</strong>ue to growand improve. These <strong>in</strong>clude sequential function charts, function-blockdiagrams, structured text and flowcharts. A system may use a comb<strong>in</strong>ationof several languages and program control methods.In PC-based control, <strong>the</strong> <strong>in</strong>formation shar<strong>in</strong>g between programscont<strong>in</strong>ues to grow and become more simplified. Tools like ActiveXcontrols allow small, specialized software components to be createdthat can be reused to develop customized applications.I/O <strong>in</strong>dependence is ano<strong>the</strong>r characteristic of most PC-based eng<strong>in</strong>es.It allows users to choose <strong>the</strong> I/O and network solution bestsuited for <strong>the</strong> application <strong>in</strong>stead of us<strong>in</strong>g a proprietary solution. Thisis be<strong>in</strong>g fueled by open, multisupplier network technologies such asDeviceNet, <strong>Control</strong>Net, and E<strong>the</strong>rnet.Open Systems GrowthToday, <strong>the</strong>re is a trend towards open computer systems for commercialand <strong>in</strong>dustrial control. These applications <strong>in</strong>clude boiler andchiller controls, heat<strong>in</strong>g and air condition<strong>in</strong>g and fire alarm systems. In<strong>the</strong>se control and monitor<strong>in</strong>g systems, a critical element is <strong>the</strong> method ofcommunication that l<strong>in</strong>ks <strong>the</strong> <strong>in</strong>dividual components <strong>in</strong>to an organizedsystem.Most modern control components are capable of connection tosome type of communication network. There are many choices availableas <strong>the</strong>se open control systems compete for attention.The elements <strong>in</strong> <strong>the</strong>se systems need to pass <strong>in</strong>formation among<strong>the</strong>mselves <strong>in</strong> order to execute <strong>the</strong>ir assigned tasks. An example is an©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>outside temperature sensor for hot water reset, which signals a boilercontroller to produce hot water at <strong>the</strong> correct temperature to satisfy abuild<strong>in</strong>g’s heat<strong>in</strong>g load. The use of <strong>in</strong>stalled equipment from multiplevendors can be expensive to <strong>in</strong>terface and <strong>the</strong> <strong>in</strong>stallation of controlequipment from ano<strong>the</strong>r manufacturer requires new skills.As products improve, <strong>the</strong> life cycle for <strong>the</strong>se systems is becom<strong>in</strong>gshorter. Parts and service for older systems can cause costly delays andit may become more economical to <strong>in</strong>stall newer systems that can providemore efficient performance along with modular design for easierma<strong>in</strong>tenance.A proprietary control system usually requires proprietary hardwarefrom <strong>the</strong> orig<strong>in</strong>al manufacturer. The move to <strong>in</strong>terface computercontrol systems from different manufacturers is driv<strong>in</strong>g <strong>the</strong> growth ofopen systems for commercial and <strong>in</strong>dustrial control.The open system notion allows <strong>the</strong> connection of control systemcomponents from different manufacturers to operate as an <strong>in</strong>tegratedsystem <strong>in</strong> a mode which is transparent to <strong>the</strong> user. The system componentsalso become more competitive with improved availability.The open systems concept has been demonstrated <strong>in</strong> IBM personalcomputer systems. These computers are based on open specificationsand any manufacturer can build systems around <strong>the</strong>m. This results <strong>in</strong>system <strong>in</strong>teroperability <strong>in</strong> a more wide open market.Open System IssuesAs open systems come <strong>in</strong>to widespread use, several issues need tobe evaluated. The protocol functions supported need to <strong>in</strong>clude read<strong>in</strong>gdigital and analog values, chang<strong>in</strong>g setpo<strong>in</strong>ts and schedules, and download<strong>in</strong>gdata.Operator workstation functionality may be limited when communicat<strong>in</strong>gwith <strong>the</strong> open protocol equipment. Ideally, conformance with<strong>in</strong>teroperability should be plug-and-play.The functionality of <strong>the</strong> operator workstations are important s<strong>in</strong>cesystem configuration, rout<strong>in</strong>e eng<strong>in</strong>eer<strong>in</strong>g and ma<strong>in</strong>tenance functionsare not usually performed at a s<strong>in</strong>gle location.Several trade-offs are <strong>in</strong>volved <strong>in</strong> us<strong>in</strong>g open systems. These <strong>in</strong>cludeperformance limitations, system <strong>in</strong>tegration, ma<strong>in</strong>tenance, andservice issues.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityThe mix<strong>in</strong>g of open system standard protocol capabilities withproprietary system functionality leads to <strong>in</strong>creased costs and createspotential purchas<strong>in</strong>g and implementation problems.Detailed functions and services must be specified s<strong>in</strong>ce many standardprotocols do not provide <strong>the</strong> same capabilities. These <strong>in</strong>cludemonitor<strong>in</strong>g, alarm, setpo<strong>in</strong>t changes and schedul<strong>in</strong>g functions.The def<strong>in</strong>ition of system <strong>in</strong>tegration responsibilities is importantwhen us<strong>in</strong>g equipment from different manufacturers. These responsibilities<strong>in</strong>clude <strong>in</strong>tegrat<strong>in</strong>g new equipment and <strong>the</strong> database at <strong>the</strong> operatorworkstations to <strong>in</strong>corporate new requirements. Changes <strong>in</strong> onemanufacturer’s hardware or software may affect o<strong>the</strong>r portions of <strong>the</strong>system.The def<strong>in</strong>ition of factory and field test<strong>in</strong>g is also important. This<strong>in</strong>cludes <strong>the</strong> acceptance criteria, based on <strong>in</strong>dividual component and<strong>in</strong>tegrated system functionality. This functionality must be tested at bothlevels. It is not enough to test <strong>the</strong> monitor<strong>in</strong>g and control functionssupported by <strong>the</strong> open systems protocol from <strong>the</strong> workstation to eachfield panel. The programm<strong>in</strong>g functions required at each field panellocation must also be tested.Ma<strong>in</strong>tenance is a critical issue for <strong>the</strong> successful operation of <strong>the</strong>system. System ma<strong>in</strong>tenance refers to both hardware and software.Hardware ma<strong>in</strong>tenance is simplified because of built-<strong>in</strong> equipment diagnosticsand plug-<strong>in</strong> replacement boards. Software ma<strong>in</strong>tenance can bemore demand<strong>in</strong>g s<strong>in</strong>ce <strong>the</strong>re may be multiple databases and applicationprograms to ma<strong>in</strong>ta<strong>in</strong> as well as several different programm<strong>in</strong>g languages.Electrical and mechanical system ma<strong>in</strong>tenance programs can beused for preventive ma<strong>in</strong>tenance and trend recordkeep<strong>in</strong>g.System HardwareSoftware is only part of <strong>the</strong> solution, <strong>the</strong> hardware on which <strong>the</strong>software runs is also important. The PC system can be an <strong>in</strong>dustrialcomputer, commercial-grade computer, or open type of controller. Thehardware usually depends on <strong>the</strong> environment <strong>in</strong> which it will run.Industrial computers are available with shock-mounted hard drives, ballbear<strong>in</strong>g and filter cool<strong>in</strong>g fans, <strong>in</strong>ternal temperature sensors, redundanthard drives, system control monitor cards and un<strong>in</strong>terruptible powersources.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>W<strong>in</strong>dows NT/2000 ChangesW<strong>in</strong>dows NT Version 4 is be<strong>in</strong>g released as W<strong>in</strong>dows 2000. It hasadded support for DirectX, which is Microsoft’s multimedia platform,changed its driver architecture to be compatible with W<strong>in</strong>dows 98 plugand-play,and made a number of o<strong>the</strong>r changes. With <strong>the</strong> <strong>in</strong>troduction ofW<strong>in</strong>dows 2000, Microsoft has made some strict rules regard<strong>in</strong>g what cango <strong>in</strong> <strong>the</strong> SYSTEM directory of W<strong>in</strong>dows NT.For system users, <strong>the</strong>se changes have been largely a plus, add<strong>in</strong>gcapability and compatibility. Most beta test<strong>in</strong>g <strong>in</strong>dicates little or no difficulties<strong>in</strong> migrat<strong>in</strong>g from W<strong>in</strong>dows NT 4 to W<strong>in</strong>dows 2000. Prelim<strong>in</strong>arytest<strong>in</strong>g of exist<strong>in</strong>g applications <strong>in</strong> W<strong>in</strong>dows 2000 Professional and W<strong>in</strong>dows2000 Server has resulted <strong>in</strong> only m<strong>in</strong>or setup problems.Several companies such as Intellution, Wonderware and SoftPLChave developed programs that run on a PC that emulate a PLC. Theseprograms use ladder logic and allow <strong>the</strong> PC to function like a PLC.There is a development platform and a run-time platform, and <strong>in</strong>some cases an operator <strong>in</strong>terface front end. Most programs such asParadym-31 from Intellution have a self-document<strong>in</strong>g capability and cango from ladder logic to o<strong>the</strong>r programm<strong>in</strong>g techniques.Software SuitesThe trend <strong>in</strong> control automation is towards tightly <strong>in</strong>tegrated softwaresuites. The access of diagnostic <strong>in</strong>formation is a major part of <strong>the</strong>control management and configuration software. OPC enabled automationsuites may <strong>in</strong>clude <strong>the</strong> supervision, operator <strong>in</strong>terface, reports, diagnostics,calibration and ma<strong>in</strong>tenance. The configuration package may<strong>in</strong>clude <strong>the</strong> construction of control strategies and simulation.OPC is br<strong>in</strong>g<strong>in</strong>g major changes <strong>in</strong> <strong>the</strong> way diagnostics are managed.Fieldbus devices provide a driver for OPC, just as pr<strong>in</strong>ters use adriver for W<strong>in</strong>dows.Companies that previously only dealt with software may now sellit pre<strong>in</strong>stalled <strong>in</strong> a PC, with <strong>in</strong>terfaces as a console product. Users <strong>the</strong>nplug <strong>in</strong> <strong>the</strong> field devices without <strong>the</strong> setup problems of cards, driversand <strong>in</strong>terrupt conflicts.Users can ensure that <strong>the</strong>y get devices with <strong>the</strong> diagnostics <strong>the</strong>yneed to reduce control variability and downtime. Fieldbus devices are©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Securityavailable to provide <strong>the</strong> diagnostics needed. In <strong>the</strong> display end, efficient<strong>in</strong>terfaces and software with extensive template facilities should beused.The concept of an <strong>in</strong>dustrial control network is to l<strong>in</strong>k all devicesor stations with one cable. No matter how many devices you are connect<strong>in</strong>g,you just add <strong>the</strong> physical cable which is needed to connect to<strong>the</strong> fur<strong>the</strong>st station. Troubleshoot<strong>in</strong>g becomes much easier s<strong>in</strong>ce you canplug and unplug <strong>the</strong> device from <strong>the</strong> network. This virtually implies aplug-and-play ability of <strong>the</strong> devices.The best of buses for one <strong>in</strong>dustrial automation application may be<strong>the</strong> worse of buses for ano<strong>the</strong>r. Wide-rang<strong>in</strong>g requirements have spurred<strong>the</strong> creation of specialized networks.The move to open digital networks marks a significant change <strong>in</strong><strong>the</strong> architecture of control systems. As with any major technologicalchange, much contention surrounds <strong>the</strong> choice of technologies, methods,and architectures.The IEEE-488 standard has been <strong>the</strong> dom<strong>in</strong>ant communications<strong>in</strong>terface for electronic <strong>in</strong>strumentation for more than 20 years. IEEE-488has evolved to <strong>in</strong>clude more software standardization and <strong>in</strong>creasedtransfer rates. It cont<strong>in</strong>ues to dom<strong>in</strong>ate test-and-measurement applications.Several major technological shifts have occurred <strong>in</strong> control systemsover <strong>the</strong> last half century. Process control has shifted from manual systemsto pneumatics, followed by electronic control systems based on <strong>the</strong>4- to 2-mA <strong>in</strong>strumentation standard. Many distributed control systemsstill use 4- to 2-mA <strong>in</strong>strumentation wired to I/O subsystems, which <strong>in</strong>turn are connected to larger systems by proprietary digital networks.The most significant move <strong>in</strong> <strong>the</strong> early 1970s was from hardwiredrelay panels to programmable logic controllers (PLCs). These PLC-basedsystems directly wired <strong>the</strong> analog and digital signals to I/O subsystems,which were connected to <strong>the</strong> PLC us<strong>in</strong>g vendor-specific digital networks.Devices that <strong>in</strong>clude both digital-communication and sens<strong>in</strong>g capabilitiesdist<strong>in</strong>guish today’s digital networks. A common network thatdirectly connects <strong>the</strong> control system’s measurement and control devicesreplaces po<strong>in</strong>t-to-po<strong>in</strong>t wir<strong>in</strong>g to centralized I/O subsystems. Digitalnetworks provide several benefits. One of <strong>the</strong>ir most basic characteristicsis <strong>the</strong> <strong>in</strong>creased <strong>in</strong>formation available from devices that communicatedigitally.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Open SystemsThe detailed concept of open systems for computers has developedfrom <strong>the</strong> Open System Interconnection (OSI) reference model for computercommunication standards. The OSI model has seven layers ofcommunication protocol and each of <strong>the</strong> layers has its own functionwith def<strong>in</strong>ed <strong>in</strong>terfaces to higher and lower layers.These layers are used with programm<strong>in</strong>g object models to def<strong>in</strong>e<strong>the</strong> mean<strong>in</strong>g and format of data. This can provide a high level of multivendor<strong>in</strong>teroperability.In an ideal open systems architecture, devices communicate wi<strong>the</strong>ach o<strong>the</strong>r us<strong>in</strong>g a standard protocol as a native language, withouttranslation. The ideal system would have <strong>in</strong>teroperability at all levels.Some so-called open systems <strong>in</strong>terface workstations and controlsystem components from one manufacturer with o<strong>the</strong>r manufacturers’components us<strong>in</strong>g gateway hardware or software on <strong>the</strong> network segments.The native language may be a proprietary protocol <strong>in</strong> this system.The system is forced to be compatible, us<strong>in</strong>g translation <strong>in</strong> <strong>the</strong> formof <strong>the</strong> gateways implemented <strong>in</strong> hardware or software. The devices <strong>in</strong> acommunication segment must be from <strong>the</strong> same manufacturer. Thesedevices may <strong>in</strong>clude term<strong>in</strong>al units, chillers, fire alarm panels, securityaccess controls, generator controls, fume hoods and programmable logicalcontrollers.In a true open system, <strong>the</strong> communications between workstationsand field devices take place on a common bus us<strong>in</strong>g non-proprietaryprotocols. The field devices may be setup <strong>in</strong>ternally to perform <strong>the</strong> gatewayfunctions, or <strong>the</strong>y can use external gateways to communicate witho<strong>the</strong>r manufacturers’ equipment us<strong>in</strong>g a proprietary protocol. Protocolsprovide for <strong>the</strong> data exchange of a def<strong>in</strong>ed set of programm<strong>in</strong>g objectsand services.In Europe, open systems development has produced Profibus andFND. In <strong>the</strong> United States, <strong>the</strong> Distributed Network Protocol (DNP) andUtility Communications Architecture (UCA) were developed for <strong>in</strong>dustrialand utility Supervisory <strong>Control</strong> and Data Acquisition (SCADA).Data communication protocols for build<strong>in</strong>g automation and controlnetworks <strong>in</strong>clude BACnet, sponsored by ASHRAE, and LonTalk,sponsored by <strong>the</strong> Echelon Corp. The BACnet protocol has been adoptedas an ANSI/ASHRAE standard.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecuritySeveral fieldbus technologies are already de-facto standards andcompet<strong>in</strong>g for market share <strong>in</strong> <strong>HVAC</strong> controls. Among build<strong>in</strong>g automationtrends this will be one of <strong>the</strong> most significant changes <strong>in</strong> <strong>the</strong> nearfuture.Fieldbus DiagnosticsInformation is <strong>the</strong> currency of <strong>the</strong> <strong>in</strong>formation age and fieldbusbaseddevices provide control variables as well as lots of noncontrol<strong>in</strong>formation. Data about equipment exceed<strong>in</strong>g operat<strong>in</strong>g conditions ando<strong>the</strong>r abnormal behavior can be used for predictive ma<strong>in</strong>tenance schedul<strong>in</strong>g,which m<strong>in</strong>imizes unplanned downtime. Detailed device self diagnosticsand automatic failure alarms can be used to determ<strong>in</strong>e if a problemis due to <strong>the</strong> sensor or without <strong>in</strong>volv<strong>in</strong>g field visits.Field device management software can complement <strong>the</strong> basic controlfunction, reduc<strong>in</strong>g configuration, calibration, and ma<strong>in</strong>tenance costs.The l<strong>in</strong>k between control systems and bus<strong>in</strong>ess systems can <strong>in</strong>cluderesource utilization plann<strong>in</strong>g with <strong>the</strong> help of diagnostic <strong>in</strong>formationfrom field devices. Fieldbus provides a means of communicat<strong>in</strong>g<strong>the</strong> <strong>in</strong>formation from field devices to a host system. Emerg<strong>in</strong>g standardswill def<strong>in</strong>e <strong>in</strong>terfaces from <strong>the</strong> control system to <strong>the</strong> bus<strong>in</strong>ess level.O<strong>the</strong>r technology, like <strong>the</strong> specification for OLE for Process <strong>Control</strong>(OPC), make it easier to br<strong>in</strong>g this <strong>in</strong>formation <strong>in</strong>to <strong>the</strong> host system.Unplanned shutdowns due to failures can be avoided if users canschedule controlled shutdowns when a number of devices need repair.Spare parts can be ordered <strong>in</strong> advance, avoid<strong>in</strong>g delays. Good diagnosticscan help avoid accidents.Field devices <strong>in</strong> <strong>HVAC</strong> systems <strong>in</strong>clude sensors and positioners.Temperature and pressure sensors are dedicated to provid<strong>in</strong>g <strong>the</strong> processorwith <strong>in</strong>formation on <strong>the</strong> state of each device and ambient conditions.For positioners <strong>the</strong> possibilities for diagnostics are larger becausepositioners control <strong>the</strong>ir outputs and sense <strong>the</strong> feedback. This allowspositioners to perform tests to determ<strong>in</strong>e, for example, if <strong>the</strong> function ofa valve or damper is correct with respect to <strong>the</strong> positioner output.Self diagnostics of devices can notify <strong>the</strong> operator of failures andproblems, allow<strong>in</strong>g ma<strong>in</strong>tenance to p<strong>in</strong>po<strong>in</strong>t errors. Sensor and calibrationerrors are reported automatically without <strong>the</strong> need for manual <strong>in</strong>-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>terrogation. Devices can provide automatic safety actions to preventdangerous conditions. Diagnostics may be checked directly from <strong>the</strong>operator console or from hand-held term<strong>in</strong>als.Cont<strong>in</strong>uous device self diagnostics can be reported as events aswell as configuration diagnostics. User-<strong>in</strong>voked diagnostics tests can beused to check damper and valve operation.Modern <strong>HVAC</strong> controls must ma<strong>in</strong>ta<strong>in</strong> accurate and reliable measurementsto achieve lower operational costs. Foul<strong>in</strong>g of sensors may bedetected as well as faulty or poor wir<strong>in</strong>g. Long-term drifts or shifts dueto conditions or ag<strong>in</strong>g can be detected if <strong>the</strong>re is a comparison aga<strong>in</strong>stan external reference provid<strong>in</strong>g calibration.Positioner diagnostics can <strong>in</strong>clude diagnostics of actuators andvalves. Valve positioner diagnostic <strong>in</strong>formation can <strong>in</strong>clude valve stemfriction and o<strong>the</strong>r parameters. Statistics on cycle count and time <strong>in</strong> operationcan be recorded to estimate wear and tear and predict failures.O<strong>the</strong>r data from <strong>the</strong> positioner can be used to determ<strong>in</strong>e positioner andvalve characteristics, such as valve position travel time.Stored device <strong>in</strong>formation <strong>in</strong>cludes tag and serial numbers, characteristicsand date <strong>in</strong>stalled. Stor<strong>in</strong>g <strong>the</strong> <strong>in</strong>formation <strong>in</strong> searchable andsortable databases for easy access reduces errors and makes calibrationand preventive ma<strong>in</strong>tenance less costly while ensur<strong>in</strong>g it is done correctlyand on a periodic basis. The result is better measurement andcontrol.Fieldbus places new requirements on host operator <strong>in</strong>terface software.Older distributed control systems (DCS) and PC-based softwarewas designed <strong>in</strong> an era when field devices provided only a s<strong>in</strong>gle value.With fieldbus, <strong>the</strong>re is a huge <strong>in</strong>crease <strong>in</strong> diagnostic and o<strong>the</strong>r data.Some of <strong>the</strong>se are cont<strong>in</strong>uously updated and o<strong>the</strong>rs are updated asalert reports. O<strong>the</strong>rs are static and updated only when <strong>the</strong>y change.The <strong>in</strong>formation had to be entered for each parameter can <strong>in</strong>cludenode address, data file and memory address. Data type and display andalarm <strong>in</strong>formation may also be applicable to some parameters.S<strong>in</strong>ce fieldbus devices are standardized and based on user-def<strong>in</strong>edtags, <strong>the</strong> user can specify <strong>the</strong> tag of a function block or device and all <strong>the</strong>diagnostics and pieces of <strong>in</strong>formation associated with that tag are automaticallyconfigured <strong>in</strong> detail.Automated configuration generation reduce <strong>the</strong> number of hoursto make a configuration and users will get more data easier and <strong>in</strong> lesstime.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityEfficient data access <strong>in</strong>cludes logical group<strong>in</strong>gs of associated parametersthat displayed toge<strong>the</strong>r. It allows <strong>the</strong> access of <strong>in</strong>formation asa s<strong>in</strong>gle communication, ra<strong>the</strong>r than many.Devices <strong>in</strong> <strong>the</strong> field detect any alarms and report <strong>the</strong>m only when<strong>the</strong>y occur and disappear. This is far more efficient than for <strong>the</strong> host topoll <strong>the</strong> device for <strong>the</strong> variable a few times per second and detect <strong>the</strong>alarm <strong>in</strong> <strong>the</strong> host. Field devices can also help <strong>the</strong> host <strong>in</strong> trend record<strong>in</strong>gby tak<strong>in</strong>g real-time samples and pass<strong>in</strong>g <strong>the</strong>m to <strong>the</strong> host <strong>in</strong> a s<strong>in</strong>glecommunication.An important function of fieldbus is <strong>the</strong> mechanism for access<strong>in</strong>gstatic parameters only if <strong>the</strong>y are changed. Field devices automaticallynotify <strong>the</strong> host when changes are made to <strong>the</strong>m. O<strong>the</strong>r functions traditionallydone <strong>in</strong> <strong>the</strong> host that may be performed by <strong>the</strong> field devices<strong>in</strong>clude setpo<strong>in</strong>t generation and logic functions. Field devices can alsotake over controller functions like PID and computation from <strong>the</strong> DCS.The <strong>in</strong>creased amount of data associated with diagnostics ando<strong>the</strong>r functions <strong>in</strong> fieldbus requires software that must make use of <strong>the</strong>alarms and trend<strong>in</strong>g.OPC is address<strong>in</strong>g this capability. The RS-232 port on a PC is abottleneck and is not fast enough to handle several fieldbuses. Specialmultiport fieldbus cards with direct memory access and dedicated onboardCPU for data access can provide a bridge between network segmentsand provide communication management. This CPU operates<strong>in</strong>dependently of <strong>the</strong> PC and can even perform some advanced controland computation functions.Information can be distilled <strong>in</strong>to a simple, organized form. Hostscan collect as much data as possible and <strong>the</strong>n select what is important.Host displays normally show overview screens with overall statesand not too much detail. The operator can <strong>the</strong>n zoom <strong>in</strong> on <strong>the</strong> details<strong>in</strong> a hierarchical manner. When a parameter deviates from its normalvalue, <strong>the</strong> operator must be alerted.Besides look<strong>in</strong>g at <strong>in</strong>dividual loops, <strong>the</strong>re must be screens show<strong>in</strong>gdevice and function-block status and <strong>the</strong> state of <strong>the</strong> communicationsubsystem. There must also be access to specific diagnostic <strong>in</strong>formationabout <strong>the</strong> loop or device to determ<strong>in</strong>e <strong>the</strong> nature of <strong>the</strong> fault. The softwareshould store and be able to recall <strong>the</strong> values, status, and alarms justbefore <strong>the</strong> failure occurred.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>ReferencesAgarival, Anant, “Raw Computation,” Scientific American, Vol. 281 Issue2, August 1999, pp. 60-61.Berge, Jonas, “Fieldbus Advances Diagnostics,” InTech, Vol. 45 No. 4,April 1998, pp. 52-56.Byres, Eric, “E<strong>the</strong>rnet to L<strong>in</strong>k Automation Hierarchy,” InTech, Vol. 46 No.6, pp. 44-47.Evans, Christopher, The Micro <strong>Millennium</strong>, Vik<strong>in</strong>g Press: <strong>New</strong> York, 1980.Gearhart, Michael A., “Open Communication’s Protocols Emerg<strong>in</strong>g,”Access <strong>Control</strong> & Security Systems Integration, Vol. 7 No. 10, July 1,1997., pp. 1-5.Graham, Jamie, “Beef Up <strong>the</strong> Security of Your Plant Network’s InternetConnection,” Instrumentation and <strong>Control</strong> Systems, Vol. 72 No. 8,August 1999, pp. 39-47.Hogan, Mike, “The PC of Tomorrow,” PC World, Vol. 16 No. 1, January1998, p. 138.Liptak, Bela A., Editor-<strong>in</strong>-chief, Instrument Eng<strong>in</strong>eers’ Handbook, 3rd Edition,Chilton Book Company: Radnor, PA, 1995.Naugle, Mat<strong>the</strong>w G., Local Area Network<strong>in</strong>g, McGraw-Hill, Inc.: <strong>New</strong>York, 1991.Nemzow, Mart<strong>in</strong> A., The E<strong>the</strong>rnet Management Guide: Keep<strong>in</strong>g <strong>the</strong> L<strong>in</strong>k,McGraw-Hill, Inc.: <strong>New</strong> York, 1992.Saffo, Paul, “Future Software: Where do You Want to Go Tomorrow?,”PC World, Vol. 16 No. 1, January 1999, p. 140.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Security 305Chapter 8Open Systems andDevice NetworksIn today’s energy management climate, <strong>in</strong>creas<strong>in</strong>g costs and <strong>the</strong>need for improved efficiency of build<strong>in</strong>g systems forces ownersto take a hard look at <strong>the</strong>ir build<strong>in</strong>g automation systems.Many <strong>in</strong>dustries must comply with new environmental and safetyrequirements. In such a bus<strong>in</strong>ess environment, less of <strong>the</strong> required dataare control specific. More <strong>in</strong>formation of o<strong>the</strong>r types is needed to ma<strong>in</strong>ta<strong>in</strong>,diagnose and modify <strong>the</strong> control system.Standard digital networks have additional benefits. Reduced wir<strong>in</strong>glowers <strong>in</strong>stallation and ma<strong>in</strong>tenance costs. Open systems allowsusers to select <strong>the</strong> right equipment for <strong>the</strong> job, regardless of <strong>the</strong> systemmanufacturer. The networks also have <strong>in</strong>telligent <strong>in</strong>strumentation, <strong>in</strong>which better perform<strong>in</strong>g devices provide functions such as advanceddiagnostics.The networks offer distributed control with <strong>in</strong>telligent devices thatprovide <strong>the</strong> flexibility to apply control centrally or at local process<strong>in</strong>gpo<strong>in</strong>ts for improved performance and reliability. Those available rangefrom low-level systems that ga<strong>the</strong>r data from simple discrete sensors tomore sophisticated networks <strong>in</strong> which <strong>in</strong>telligent field devices implementdistributed control.Open and Standard ProtocolsThere is some difference between an open protocol and a standardprotocol. Open means that anyone is free to use <strong>the</strong> protocol. Standardmeans <strong>the</strong> document that describes <strong>the</strong> protocol has been through aprocess and been reviewed by a variety of <strong>in</strong>terests which may <strong>in</strong>cludeusers, vendors and support<strong>in</strong>g agencies.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>A standard protocol for build<strong>in</strong>g control can have great benefits.Standard protocols for open systems allow <strong>in</strong>teroperability of differentsystems. Some benefits of open protocols cannot be realized without<strong>in</strong>dustry standard protocols.A standard protocol provides vendor <strong>in</strong>dependence s<strong>in</strong>ce it allows<strong>the</strong> <strong>in</strong>teroperability of different vendors’ systems and components.Interoperability allows competition which tends to regulate cost andprices. It is always best to make use of exist<strong>in</strong>g standards to <strong>the</strong> greatestextent possible. Most vendors and suppliers know that <strong>in</strong>teroperabilitystandards are important.Integrat<strong>in</strong>g equipment and controls from different companies tocreate a reliable control system has been one of <strong>the</strong> toughest tasks <strong>in</strong>build<strong>in</strong>g automation. Non-homogeneous systems <strong>in</strong>creas<strong>in</strong>gly need toshare <strong>in</strong>formation and it is important to <strong>in</strong>terconnect more easily.<strong>HVAC</strong> controls are available for many open systems. The shiftfrom proprietary to open control systems is similar to <strong>the</strong> shift that occurredfrom proprietary m<strong>in</strong>i-computers to generic, IBM-standard personalcomputers based on open specifications.In <strong>the</strong> computer <strong>in</strong>dustry before 1980, it was a vertical market s<strong>in</strong>ceeach vendor provided all of <strong>the</strong> major components of <strong>the</strong> system. Oncea specific vendor was selected by <strong>the</strong> customer, service, future additionsand changes to <strong>the</strong> system were generally available only from that vendor.The customer was locked <strong>in</strong>.Today, computers are sold through <strong>the</strong> mail. The market is nolonger vertical. It is horizontal. Customers can mix and match if <strong>the</strong>ydesire. They have choice and flexibility. The computer <strong>in</strong>dustry couldnot have shifted without a set of rules. Hewlett Packard laser pr<strong>in</strong>terscan communicate with Intel chips and are directed by Microsoft operat<strong>in</strong>gsystems.The absence of a set of rules kept <strong>the</strong> market vertical. As <strong>the</strong> rulesevolved, a new organization took shape. This shift provided new rolesfor computer manufacturers. Some cont<strong>in</strong>ued to build complete systemsand still do. Over time, o<strong>the</strong>rs focused on what <strong>the</strong>y did best. The <strong>in</strong>dustrywas essentially transformed, with a proliferation of new products.The build<strong>in</strong>g control <strong>in</strong>dustry is beg<strong>in</strong>n<strong>in</strong>g to follow this pattern.Industry sectors like actuation are develop<strong>in</strong>g with companies such asBelimo and o<strong>the</strong>rs specializ<strong>in</strong>g <strong>in</strong> this area. Performance contract<strong>in</strong>g isano<strong>the</strong>r grow<strong>in</strong>g specialty.An example of an open system occurs <strong>in</strong> computer-aided design©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Security(CAD), where DGS, and DXF file <strong>in</strong>terchange protocols allow <strong>the</strong>AutoCad and Microstation CAD systems from different software vendorsto exchange graphic files.Build<strong>in</strong>g Automation TrendsOpen control systems us<strong>in</strong>g BACnet and LonTalk are becom<strong>in</strong>gmore common. Product <strong>in</strong>teroperability depends on <strong>the</strong> BACnetcommittee’s documents on m<strong>in</strong>imum BACnet performance requirementsfor different types of equipment and <strong>the</strong> developers of LonTalk,under <strong>the</strong> LonMark trade association, develop<strong>in</strong>g similar performancerequirements for different types of mechanical and electrical systems.Open system product offer<strong>in</strong>gs <strong>in</strong>clude build<strong>in</strong>g automation systems,DDC controls, security systems and fire alarm systems. Somemanufacturers support one or both of <strong>the</strong> lead<strong>in</strong>g commercial protocols,BACnet and LonTalk.There are over a dozen open system protocols for build<strong>in</strong>g controlsystems. One of <strong>the</strong>se is BACnet, which was developed under <strong>the</strong> auspicesof <strong>the</strong> American Society of Heat<strong>in</strong>g, Refrigerat<strong>in</strong>g and Air Condition<strong>in</strong>gEng<strong>in</strong>eers (ASHRAE).BACnetWhen <strong>the</strong> American Society of Heat<strong>in</strong>g Ventilation and Air Condition<strong>in</strong>gcompleted its 8-year effort to develop <strong>the</strong> common protocol calledBACnet <strong>the</strong> goal was to establish <strong>in</strong>teroperability between DCS equipmentmanufacturers. Echelon is <strong>the</strong> standard at <strong>the</strong> sensor bus level.The BACnet (Build<strong>in</strong>g Automation <strong>Control</strong> network) protocol allowsbuild<strong>in</strong>g automation equipment from different manufacturers am<strong>in</strong>imum level of <strong>in</strong>teroperability. ASHRAE began develop<strong>in</strong>g BACnet<strong>in</strong> 1987. It was published <strong>in</strong> 1995 as ASHRAE Standard 1355-1995.ASHRAE’S BACnet standard holds great promise for <strong>the</strong> <strong>HVAC</strong> <strong>in</strong>dustry.Most control manufacturers have announced <strong>the</strong>ir support for <strong>the</strong>standard, and many are provid<strong>in</strong>g BACnet products today.BACnet is a software solution to <strong>in</strong>tegrat<strong>in</strong>g different productsfrom different manufacturers. It consists of a standardized set of messagesbetween field units and <strong>the</strong> host. BACnet is also a recognized stan-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>dard of <strong>the</strong> American National Standards Institute (ANSI) which has aBACnet device compliance test<strong>in</strong>g facility <strong>in</strong> Gai<strong>the</strong>rsburg, MD.BACnet was developed as a voluntary consensus standard asASHRAE Standard 135. There are three ma<strong>in</strong> parts to <strong>the</strong> BACnet standard.There is a specification for local area network technologies. A localarea network (LAN) provides a way of mov<strong>in</strong>g <strong>in</strong>formation among computers.Ano<strong>the</strong>r part of <strong>the</strong> BACnet standard provides a way to <strong>in</strong>terconnectmultiple LANs <strong>in</strong>to a wider area network. A third part of BACnetspecifies a standard communications format that can be used by differentmanufacturers to allow <strong>the</strong>ir build<strong>in</strong>g control systems to work toge<strong>the</strong>ras <strong>in</strong>dependent but cooperat<strong>in</strong>g systems.BACnet ApplicationBACnet applications <strong>in</strong>clude <strong>in</strong>tegrat<strong>in</strong>g fire detection, protection,and suppression systems with <strong>HVAC</strong> systems and <strong>in</strong>creased communicationsbetween build<strong>in</strong>g control systems and utilities for energy managementand utility load management. BACnet can provide better energymanagement, build<strong>in</strong>g performance monitor<strong>in</strong>g, and enhanced<strong>HVAC</strong> diagnostic capabilities.A consortium of control manufacturers organized by <strong>the</strong> NationalInstitute of Standards and Technology (NIST) has been test<strong>in</strong>g manufacturers’equipment for <strong>in</strong>teroperability.ASHRAE has been develop<strong>in</strong>g an addendum to BACnet thatwould def<strong>in</strong>e conformance tests. These tests could provide an <strong>in</strong>dustrywidecertification program that would ensure <strong>the</strong> compatibility ofBACnet products made by different vendors.Manufacturers are apply<strong>in</strong>g BACnet for island-to-island, multivendorsystem <strong>in</strong>tegration. Communicat<strong>in</strong>g through BACnet, <strong>the</strong>se islandsof control allow monitor<strong>in</strong>g and command capabilities from as<strong>in</strong>gle PC workstation. BACnet can also be a vehicle for comb<strong>in</strong><strong>in</strong>gmulti-vendor campus sites <strong>in</strong>to a s<strong>in</strong>gle <strong>in</strong>tercommunicat<strong>in</strong>g system andmov<strong>in</strong>g exist<strong>in</strong>g systems <strong>in</strong>to an open environment.When a build<strong>in</strong>g owner buys a build<strong>in</strong>g control system, <strong>the</strong> owneris effectively locked <strong>in</strong>. Once a specific vendor is selected by <strong>the</strong> customer,ongo<strong>in</strong>g service, future additions, and changes to <strong>the</strong> system areavailable only from that vendor. Build<strong>in</strong>g owners that f<strong>in</strong>d <strong>the</strong>mselveslimited to a s<strong>in</strong>gle supplier for service and upgrades have higher costs©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Securityand fewer options.BACnet provides an alternative s<strong>in</strong>ce <strong>the</strong>re are a set of rules thatallow <strong>the</strong> major components of a system, even if <strong>the</strong>y are manufacturedby different vendors, to function toge<strong>the</strong>r. They can <strong>in</strong>teroperate. This<strong>in</strong>teroperability promises to provide competitive pric<strong>in</strong>g, more choicesfor products and service, and <strong>the</strong> ability to even operate two differentsystems with a s<strong>in</strong>gle computer station.BACnet is well documented and robust <strong>in</strong> design. It has <strong>the</strong> featuresneeded and has headroom for <strong>the</strong> future. Manufacturers that seeBACnet as an opportunity will adopt it.The complete BACnet standard covers about seven different datal<strong>in</strong>k layer models. But, a BACnet compliant product on an ARCNET leveland a BACnet compliant product on a sensor level does not establish<strong>in</strong>teroperability. If BACnet is not used <strong>in</strong>ternally <strong>in</strong> some new products,<strong>the</strong>n a gateway will be required and that gateway can act as a firewall.A firewall might be used by an equipment manufacturer of chillersand boilers, to protect <strong>the</strong> equipment’s <strong>in</strong>ternal safety logic and criticalcontrol algorithms. If this logic is compromised, it can create a warrantyor liability issue.At m<strong>in</strong>imal compliance, it does not make much difference whatk<strong>in</strong>d of system or what communications protocols are used <strong>in</strong> collect<strong>in</strong>gdata or <strong>in</strong> issu<strong>in</strong>g field commands. What is important, is what data arega<strong>the</strong>red from any given piece of equipment, and how that data arestructured. Us<strong>in</strong>g this strategy and basic network tools, <strong>in</strong>formationga<strong>the</strong>red from multiple field systems can be presented as a s<strong>in</strong>gle system,to multiple users.One problem with a BACnet m<strong>in</strong>imum level of compliance, is thatit is not easy to make programm<strong>in</strong>g changes. In most cases, programm<strong>in</strong>gmust be done at <strong>the</strong> controller connected to <strong>the</strong> field equipment.Full compliance allows programm<strong>in</strong>g as well as monitor<strong>in</strong>g andcontrol functions at <strong>the</strong> user level. Most manufacturers have offeredBACnet compatibility at <strong>the</strong> m<strong>in</strong>imum compliance level.Conformance ClassificationsThe BACnet standard def<strong>in</strong>es conformance classes which aregroups of functions and capabilities needed to allow specific levels <strong>in</strong>BACnet communications. The protocol’s hierarchy of conformance©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>classes means that <strong>the</strong> goals of <strong>the</strong> project become important <strong>in</strong> writ<strong>in</strong>gBACnet specifications. There is an effort to make BACnet easier tospecify and to simplify <strong>the</strong> BACnet specification process. The committeecharged with <strong>the</strong> ma<strong>in</strong>tenance of <strong>the</strong> BACnet standard (ASHRAE SSPC-135) has been redef<strong>in</strong><strong>in</strong>g how to specify BACnet.The BACnet standard has detailed <strong>in</strong>formation on how to implement<strong>the</strong> protocol. Clause 22 is devoted to <strong>the</strong> specification of BACnetsystems. It <strong>in</strong>volves <strong>the</strong> concepts of BACnet Conformance Classes andFunctional Groups. The Conformance Classes range from 1 to 6. Thestandard states that <strong>the</strong>y are not hierarchical and that Class 1 is notbetter than Class 6.Product Implementation Conformance Statements (PICS) fromvendors determ<strong>in</strong>e which products can be used toge<strong>the</strong>r. BACnet<strong>in</strong>teroperable systems should be able to provide s<strong>in</strong>gle-seat operationwhere a central PC operates build<strong>in</strong>gs with control systems furnished byseveral suppliers. It should allow equipment <strong>in</strong>tegration <strong>in</strong>clud<strong>in</strong>g chillers,rooftop units, fire alarm, and light<strong>in</strong>g control systems.There will be an expanded availability of <strong>in</strong>telligent devices thatare supplied with <strong>in</strong>telligent electronic panels or <strong>in</strong>terfaces that communicatewith <strong>the</strong> host. These will <strong>in</strong>tegrate light<strong>in</strong>g, security, access, andfire alarm controls <strong>in</strong>to one system, so <strong>the</strong> build<strong>in</strong>g can be run from as<strong>in</strong>gle operator <strong>in</strong>terface.BACnet is not a plug-and-play system nor are <strong>the</strong> o<strong>the</strong>r<strong>in</strong>teroperable options available today. It is not possible to remove a VAVbox controller and replace it with one from ano<strong>the</strong>r supplier withoutperform<strong>in</strong>g additional setup and programm<strong>in</strong>g. These functions willcont<strong>in</strong>ue to be achieved <strong>in</strong> a unique manner by each supplier.Interoperable systems allow <strong>the</strong> follow<strong>in</strong>g tasks to be accomplished<strong>in</strong> a common format:• view<strong>in</strong>g data on a PC (menus, graphics, reports),• chang<strong>in</strong>g setpo<strong>in</strong>ts,• shar<strong>in</strong>g data between controllers,• view<strong>in</strong>g alarms for po<strong>in</strong>ts that are out of a def<strong>in</strong>ed range,• sett<strong>in</strong>g up and modify<strong>in</strong>g schedules, and• sampl<strong>in</strong>g data at regular <strong>in</strong>tervals and retriev<strong>in</strong>g it for view<strong>in</strong>g orstorage.The first three functions will be able to be supported by even <strong>the</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Securitymost basic BACnet device. This data exchange capability should besupported by suppliers of BACnet systems, as well as suppliers ofBACnet gateways. A PC workstation performs data exchange by check<strong>in</strong>g<strong>the</strong> <strong>in</strong>formation that is conta<strong>in</strong>ed <strong>in</strong> BACnet controllers and chang<strong>in</strong>gsetpo<strong>in</strong>ts and o<strong>the</strong>r values on <strong>the</strong>se controllers. This is done with aseries of BACnet functions or services called Read Property and WriteProperty.This <strong>in</strong>teroperable capability allows a workstation to display temperature,pressures, and o<strong>the</strong>r values. It also allows <strong>the</strong> operator tochange setpo<strong>in</strong>ts, and store data for historical trend<strong>in</strong>g.BACnet supports different network methods <strong>in</strong>clud<strong>in</strong>g E<strong>the</strong>rnet.Read data are used for view<strong>in</strong>g on graphics and write are used forchang<strong>in</strong>g setpo<strong>in</strong>ts. In BACnet <strong>the</strong> workstation needs to use <strong>the</strong> Read(Initiate) and Write (Execute) Services <strong>in</strong> Clauses 15.5 and 15.8 of <strong>the</strong>ASHRAE Standard 135-95. It uses <strong>the</strong>se services to communicate withBACnet objects <strong>in</strong> <strong>the</strong> <strong>in</strong>ternetwork.These objects are also known as po<strong>in</strong>ts and to perform a function,a po<strong>in</strong>t or object list is used to show how an object is related to a service<strong>in</strong> <strong>the</strong> BACnet <strong>in</strong>ternetwork.Legacy systems need a gateway to connect <strong>the</strong> BACnet and <strong>the</strong>legacy system. The gateway will transfer alarm, trend, schedule, andpo<strong>in</strong>t data between BACnet and <strong>the</strong> legacy system.BACnet Interoperable FunctionsData exchange between devices such as PC workstations andbuild<strong>in</strong>g controllers is <strong>the</strong> most basic <strong>in</strong>teroperable function. It <strong>in</strong>volves<strong>the</strong> view<strong>in</strong>g or read<strong>in</strong>g of data as well as mak<strong>in</strong>g changes or writ<strong>in</strong>g tothis data.In BACnet, data are modeled as objects that have properties. Analarm and event function allows <strong>the</strong> exchange of alarm <strong>in</strong>formation.This function can be used to trigger a control action, or an operatoroverride. A set of functions allows <strong>the</strong> edit<strong>in</strong>g and creation of scheduleson a BACnet PC workstation.A network management function provides <strong>the</strong> ability to manage<strong>the</strong> devices on <strong>the</strong> network. This <strong>in</strong>cludes monitor<strong>in</strong>g for a loss of communicationand coord<strong>in</strong>at<strong>in</strong>g <strong>the</strong> time sett<strong>in</strong>gs of <strong>the</strong> clocks <strong>in</strong> each controller.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Interoperability will be realized only if BACnet is supportedwidely by vendors. Most of <strong>the</strong> major controls vendors are <strong>in</strong>troduc<strong>in</strong>gor expand<strong>in</strong>g <strong>the</strong>ir BACnet-based product l<strong>in</strong>es. Many BACnet productl<strong>in</strong>es do not use BA<strong>Control</strong>ler level and at <strong>the</strong> highest levels of <strong>the</strong> system<strong>the</strong>y use a BACnet conformance class of only about three or four.LonMarkIn May 1994, a group of companies saw <strong>the</strong> need for establish<strong>in</strong>gan <strong>in</strong>teroperability standard for control networks and formed <strong>the</strong>LonMark Interoperability Association. The association has over 200members and promotes LonMark products and systems as open,<strong>in</strong>teroperable control solutions. It sets <strong>the</strong> design guidel<strong>in</strong>es for<strong>in</strong>teroperable devices based on LonWorks and verifies products thatmeet <strong>the</strong> guidel<strong>in</strong>es for <strong>in</strong>teroperability.Products that have been verified to conform to LonMark<strong>in</strong>teroperability guidel<strong>in</strong>es carry <strong>the</strong> LonMark logo, which <strong>in</strong>dicates that<strong>the</strong>y are designed to <strong>in</strong>teroperate across a LonWorks network. LonMarktask groups <strong>in</strong>clude elevator, <strong>HVAC</strong>, light<strong>in</strong>g, refrigeration, fire, <strong>in</strong>dustrial,network tools, security and system <strong>in</strong>tegration.Interoperability means <strong>the</strong> easy <strong>in</strong>tegration of products from multiplevendors without <strong>the</strong> need for custom hardware or software. With<strong>in</strong>teroperable control devices, end-users and network <strong>in</strong>tegrators canpurchase devices off <strong>the</strong> shelf from different manufacturers. Plugg<strong>in</strong>g <strong>in</strong><strong>the</strong>se <strong>in</strong>teroperable devices allows easy expansion of control networks.LonWorks <strong>Control</strong>LonWorks provides an open, off-<strong>the</strong>-shelf network<strong>in</strong>g technologyplatform for design<strong>in</strong>g and implement<strong>in</strong>g <strong>in</strong>teroperable control networks.LonWorks represents a complete hardware and software solutionfor control network communication. It does more than <strong>in</strong>tegrate devicesand control systems. It offers a s<strong>in</strong>gle, cohesive, <strong>in</strong>teroperational controlsystem that does not depend on one proprietary vendor or require costlycustomization.If <strong>the</strong> light<strong>in</strong>g and heat<strong>in</strong>g, ventilat<strong>in</strong>g, and air-condition<strong>in</strong>g systemshave LonWorks technology embedded <strong>in</strong> <strong>the</strong>m, <strong>the</strong> two can be©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Securityconnected. Now, <strong>in</strong> addition to shutt<strong>in</strong>g down lights, <strong>the</strong> occupancysensors can send a signal to <strong>the</strong> <strong>HVAC</strong> system to adjust heat<strong>in</strong>g or cool<strong>in</strong>glevels as well.The LonWorks system was designed by Echelon to use a proprietary<strong>in</strong>tegrated circuit called <strong>the</strong> neuron chip. A special communicationsprotocol is used with <strong>the</strong>se chips which are manufactured by severalcompanies, <strong>in</strong>clud<strong>in</strong>g Motorola and Toshiba. LonWorks allows aseamless connection between systems that are designed us<strong>in</strong>g <strong>the</strong> sameparameters.The neuron chip is designed to communicate with field variables,run process control loops and communicate with o<strong>the</strong>r neuron chips.The chip can be used for monitor<strong>in</strong>g and control at different levels <strong>in</strong> <strong>the</strong>system. Some manufacturers even use <strong>the</strong> neuron chip <strong>in</strong> <strong>the</strong> ma<strong>in</strong> controllerof <strong>the</strong>ir EMCS system. While <strong>the</strong>se systems use LonWorks, <strong>the</strong>yare not true LonWorks systems.Open systems like LonWorks also allow customization. Open,<strong>in</strong>teroperable products and architectures allow <strong>the</strong> overall <strong>in</strong>frastructureand system to fit <strong>the</strong> needs of <strong>the</strong> end-user and <strong>the</strong> facilities manager.Once <strong>the</strong> <strong>in</strong>frastructure is put <strong>in</strong> <strong>the</strong> build<strong>in</strong>g owner has a fully<strong>in</strong>tegrated, <strong>in</strong>telligent unit. Applications can be added as needs changeand grow. As new sensors and applications are developed, you can justchange components.The hardware platform is based on <strong>the</strong> Neuron chipset, whichprovides I/O process<strong>in</strong>g and data communications. Software is based on<strong>the</strong> LonTalk communication protocol, which provides a set of standardizedmessages and a development tool for applications.The orig<strong>in</strong>al implementation of LonWorks required a licens<strong>in</strong>gagreement from Echelon. S<strong>in</strong>ce that time, Echelon has allowed users toport LonTalk protocol to a number of different hardware platforms thatprovide <strong>in</strong>creased performance over <strong>the</strong> 8-bit Neuron processor.BACnet and LonMarkManufacturers are deliver<strong>in</strong>g products that are compatible withboth BACnet or LonMark. While BACnet and LonMark have <strong>the</strong>ir ownbenefits, manufacturers are f<strong>in</strong>d<strong>in</strong>g <strong>the</strong>m to be complementary. Thecomplementary nature of <strong>the</strong> two standards allows different build<strong>in</strong>g controlsystems to communicate with each o<strong>the</strong>r and exchange <strong>in</strong>formation.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>BACnet and LonWorks are not <strong>in</strong>terchangeable s<strong>in</strong>ce each has itsown standardized set of messages. However BACnet messages can betransmitted across a LonWorks communication backbone. BACnet recognizesLonWorks as a physical medium only, but messages betweenLonWorks and BACnet are not <strong>in</strong>terchangeable. LonMark is efficient forlow-speed, field-device communication, but does not support <strong>the</strong> highspeedexchange of data on networks like E<strong>the</strong>rnet as well as BACnet.LonMark is be<strong>in</strong>g applied for peer-to-peer, distributed control solutions.This type of control uses a network architecture, with a workstation,field panels, controllers, and <strong>in</strong>dividual devices. LonMark allows<strong>in</strong>telligent devices to handle <strong>in</strong>formation and pass it on to o<strong>the</strong>r devices.LonMark is a cost-effective technology for <strong>in</strong>teroperability at <strong>the</strong> controlslevel.LonTalk ProtocolAn open technology like <strong>the</strong> LonTalk protocol is embedded on achip. Manufacturers of different products <strong>in</strong>clude <strong>the</strong> chip as a standardpart of <strong>the</strong>ir unit.The protocol provides a set of rules for <strong>the</strong> connection and makesit cost-effective and forces <strong>the</strong> implementations to be consistent. Theprotocol chip makes it cost-effective for <strong>the</strong> manufacturers and makesevery implementation exactly <strong>the</strong> same so that <strong>the</strong>re are not any different<strong>in</strong>terpretations of a specification.Neuron-based, open-standard protocol devices are used by electricalmanufacturers and system control vendors. The equipment rema<strong>in</strong>sautonomous and fault-tolerant as centrally managed programs becomedistributed throughout <strong>the</strong> LonWorks network and each Neuron devicelearns its attached equipment’s role and relation to o<strong>the</strong>r equipment.Electronic Systems USA is a build<strong>in</strong>g automation products andservices company that produces products with LonWorks technology,such as <strong>the</strong> NexSys build<strong>in</strong>g automation system. LonWorks allowedElectronic Systems to get to <strong>the</strong> marketplace quicker because all <strong>the</strong>protocols are set. They did not have to develop a new system.The neuron chip is programmed with a version of <strong>the</strong> C languagecalled neuron C. It can also be programmed us<strong>in</strong>g drag and drop softwarefrom Dayton General Systems which allows <strong>the</strong> programm<strong>in</strong>g tobe done much faster.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityLonMaker for W<strong>in</strong>dows is a design tool that makes it easy forcontrol and facilities managers to design and ma<strong>in</strong>ta<strong>in</strong> LonWorks networksfor heat<strong>in</strong>g, ventilation and air condition<strong>in</strong>g systems. Formerly<strong>in</strong>compatible data formats and network databases are be<strong>in</strong>g bridged byLonWorks technology. These systems automate equipmentreconfigurations, improve efficiency, and reduce personnel and utilitiescosts.LonWorks networks are built us<strong>in</strong>g <strong>the</strong> LonMaker for W<strong>in</strong>dows.The Visio Technical draw<strong>in</strong>g package makes up <strong>the</strong> LonMaker user <strong>in</strong>terface.Dynamic Data Exchange applications, such as Microsoft’s VisualBasic or Excel, are also supported.Cisco Systems and Echelon have partnered to create a standard formerg<strong>in</strong>g <strong>in</strong>formation process<strong>in</strong>g IP and LonWorks networks more fully.As <strong>the</strong> dom<strong>in</strong>ant router supplier, Cisco sees a future <strong>in</strong> augment<strong>in</strong>g datanetworks with LonWorks systems. Echelon is also work<strong>in</strong>g with SunMicrosystems to def<strong>in</strong>e standards for <strong>in</strong>tegrat<strong>in</strong>g Java applications withLonWorks devices us<strong>in</strong>g Sun’s J<strong>in</strong>i technology. Microsoft is also promot<strong>in</strong>g<strong>the</strong> merger of electrical devices with data networks <strong>in</strong> a more highlevelway, by advanc<strong>in</strong>g its Universal plug-and-play protocol.DeviceNetDeviceNet is a CAN-based bus developed by Allen-Bradley. It is alow-level network that connects <strong>in</strong>dustrial devices, such as sensors andactuators, to higher level devices such as variable-frequency drives andoperator <strong>in</strong>terfaces. DeviceNet is designed as a low cost peer-to-peernetwork. Although this open <strong>in</strong>dustrial control network<strong>in</strong>g system wasfirst sanctioned by Allen-Bradley, it is now susta<strong>in</strong>ed by an <strong>in</strong>dependentorganization, called <strong>the</strong> Open DeviceNet Vendor’s Association (ODVA).The Open DeviceNet Vendor’s Association provides free technical supportand has DeviceNet experts around <strong>the</strong> world to answer technicalquestions. DeviceNet uses <strong>the</strong> <strong>Control</strong>ler Area Network (CAN) as abackbone and follows <strong>the</strong> ISO/OSI 7-Layer model.This 8-byte fieldbus system is designed for <strong>in</strong>dustrial I/O controlof sensors, switches and motor drives. The devices are l<strong>in</strong>ked toge<strong>the</strong>ron a bus us<strong>in</strong>g a DeviceNet cable with 4 wires: Vcc, CAN-high, CANlowand Ground. The cable is shielded and has a trunk length of up to50 meters.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>A basic network is comprised of a master such as a PC or PLC anda set of simple devices such as on/off switches or motor starters.Object-oriented techniques (OOT) are used where objects are def<strong>in</strong>ed<strong>in</strong> class, <strong>in</strong>stances and attributes. This allows changes to be mademore easily. Four basic objects are used. An identity object provides<strong>in</strong>formation about <strong>the</strong> identity of a device. A connection object conta<strong>in</strong>s<strong>the</strong> number of logical I/O ports of <strong>the</strong> device.A DeviceNet object configures <strong>the</strong> port attributes such as <strong>the</strong> nodeaddress and data rate. It ma<strong>in</strong>ta<strong>in</strong>s <strong>the</strong> configuration and status of physicalattachments. You can remove devices from <strong>the</strong> network or <strong>in</strong>sert<strong>the</strong>m <strong>in</strong>to <strong>the</strong> network without remov<strong>in</strong>g network power. You can alsoadd power taps at any po<strong>in</strong>t <strong>in</strong> <strong>the</strong> network and have redundant powersupplies. One goal of DeviceNet was to achieve <strong>the</strong> same level of <strong>in</strong>terchangeabilityfor 120/220V-ac and 24V-dc discrete devices us<strong>in</strong>g digitalcommunications.DeviceNet provides <strong>in</strong>terchangeability of simple devices whilemak<strong>in</strong>g <strong>in</strong>terconnectivity of more complex devices possible. Instead of asource-dest<strong>in</strong>ation approach, DeviceNet uses <strong>the</strong> producer/consumermodel, as provided by CAN, where each data packet has an identifierfield. The identifier provides for multiple priority levels for arbitrationand multiple consumers.The device with data produces <strong>the</strong> data on <strong>the</strong> network with <strong>the</strong>proper identifier and all devices need<strong>in</strong>g data listen for messages. Whendevices recognize <strong>the</strong> appropriate identifier, <strong>the</strong>y consume <strong>the</strong> data.The message length for DeviceNet is 0-8 bytes, which is idealfor devices with small amounts of frequently exchanged data.DeviceNet supports strobed, polled, cyclic, change-of-state and application-triggereddata movements. Communication can be master/slave, multimaster with different slaves, peer-to-peer, or a comb<strong>in</strong>ationconfiguration depend<strong>in</strong>g on device and application requirements.Response time for a network of up to 64 nodes and 500 I/O can beless than 5-ms.Devices can be powered directly off <strong>the</strong> bus and communicateus<strong>in</strong>g <strong>the</strong> same cable. Nodes can be configured, removed from, or <strong>in</strong>sertedto <strong>the</strong> network without power<strong>in</strong>g down. Power taps can be addedat any po<strong>in</strong>t <strong>in</strong> <strong>the</strong> network allow<strong>in</strong>g redundant power supplies.Trunk and drop l<strong>in</strong>es can use thick or th<strong>in</strong> cable. The networkdistances depend on data rate and cable size. A range of over 500 feetis possible.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityIn DeviceNet’s communication stack of OSI layers, <strong>the</strong> CAN protocoldef<strong>in</strong>es <strong>the</strong> physical and data-l<strong>in</strong>k layers. DeviceNet adds <strong>the</strong> rema<strong>in</strong>derof those layers, along with <strong>the</strong> media and application layers.A DeviceNet network can have as many as 64 node addresses.S<strong>in</strong>ce it uses <strong>the</strong> CAN data-l<strong>in</strong>k layer, DeviceNet is a producer-consumermodel, which requires packets on <strong>the</strong> network to <strong>in</strong>clude data-identifierfields. This approach is <strong>in</strong> contrast with older technologies where messages<strong>in</strong>clude a explicit source and dest<strong>in</strong>ation. The identifiers tell <strong>the</strong>devices if <strong>the</strong>y should consume <strong>the</strong> data.The network assigns transmissions associated with a connectiondevice configuration. The messag<strong>in</strong>g protocol <strong>in</strong>dicates how a deviceshould <strong>in</strong>terpret a message. A message router transfers received messagesto target objects. The priority of access depends on <strong>the</strong> MessageGroup <strong>the</strong> device belongs to. Device configuration takes place through<strong>the</strong> device connections when <strong>the</strong> device identifies it.DeviceNet Objects and DevicesThe object model provides a template for organiz<strong>in</strong>g and implement<strong>in</strong>g<strong>the</strong> attributes (data) and service (methods or procedure). Anidentity object’s attributes <strong>in</strong>clude vendor ID, device type, product code,revision status and serial number.To facilitate compatibility and <strong>in</strong>teroperability, DeviceNet def<strong>in</strong>esstandard device profiles, designed to allow you to <strong>in</strong>terchange vendorsand products that conform to <strong>the</strong> same device-type profile.DeviceNet provides a communications l<strong>in</strong>k for connect<strong>in</strong>g devicessuch as sensors and motor starters to a network. DeviceNet uses twotwisted pairs of wires to provide 24-VDC power and signal. One surveyby Venture Development Corporation found that DeviceNet was usedby 44% of <strong>in</strong>strument and control device suppliers.DeviceNet FutureU.S. device/sensor buses are projected to grow to 2.7 million nodes<strong>in</strong> 5 years. DeviceNet should account for over one-third of this total.More than 300 ODVA members direct <strong>the</strong> future of DeviceNetthrough special <strong>in</strong>terest group activities. These <strong>in</strong>clude alternative media©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>options such as non<strong>in</strong>sulated flatwire cable, to reduce costs, and gatewaysand high-speed routers to o<strong>the</strong>r networks.When two or more nodes try to access <strong>the</strong> network simultaneously,an arbitration scheme resolves <strong>the</strong> possible conflict with no loss of dataor bandwidth. This is much different than E<strong>the</strong>rnet where collision detectionis used where a loss of data and bandwidth can occur s<strong>in</strong>ce bothnodes have to back-down and resend <strong>the</strong> data. If two nodes transmitsimultaneously, <strong>the</strong> w<strong>in</strong>ner is <strong>the</strong> one with <strong>the</strong> lower numbered identifier.Cyclic redundancy checks are used by CAN controllers to detectframe errors. Automatic retries are also used. These methods are usuallytransparent to <strong>the</strong> application and serve to block a faulty node fromupsett<strong>in</strong>g <strong>the</strong> network.CANThe controller area network (CAN) was developed by Bosch toreplace expensive harness wir<strong>in</strong>g. The technology of <strong>the</strong> CAN bus wasdevised <strong>in</strong> <strong>the</strong> mid-1980s as an <strong>in</strong>-vehicle network for automobiles. S<strong>in</strong>ce<strong>the</strong> 1980s, <strong>the</strong> automotive <strong>in</strong>dustry has been us<strong>in</strong>g electronic controlsystems for <strong>in</strong>-vehicle functions and features that improve safety andcomfort.In a system with conventional wir<strong>in</strong>g, data are exchanged us<strong>in</strong>gdedicated signal l<strong>in</strong>es. As <strong>the</strong> complexity and number of devices <strong>in</strong>creased,<strong>the</strong> use of dedicated signal l<strong>in</strong>es became <strong>in</strong>creas<strong>in</strong>gly difficultand expensive to implement.CAN is used as <strong>the</strong> Data L<strong>in</strong>k Layer of DeviceNet. CAN controllerchips allow data to be moved on DeviceNet us<strong>in</strong>g a data frame. CANchips are available from Phillips, NEC, Intel, Siemens and NationalSemiconductor. A 0-8 byte size is used for low-end devices where smallamounts of I/O data that must be exchanged regularly. Simple devicescan also send diagnostic data.Bus systems like CAN overcome some of <strong>the</strong> limitations of conventionalwir<strong>in</strong>g. Us<strong>in</strong>g <strong>the</strong> CAN bus, devices are connected to a commonserial bus. Any device on a CAN bus network can communicate withany o<strong>the</strong>r device us<strong>in</strong>g a common pair of wires.CAN bus features <strong>in</strong>clude CAN frames which have identifiers at<strong>the</strong> beg<strong>in</strong>n<strong>in</strong>g of <strong>the</strong> frames. This identifier is used to identify which©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Securitydevice should receive <strong>the</strong> frame. Along with <strong>the</strong> identifier, o<strong>the</strong>r piecesof <strong>in</strong>formation are added to <strong>the</strong> frame, such as data length, data bytes,error check<strong>in</strong>g, and frame acknowledgment.One type of CAN network is called a producer/consumer network.This type of network allows any device to produce or send amessage to any o<strong>the</strong>r device. This can be done without any <strong>in</strong>teractionfrom a host or master. This type of network decreases <strong>the</strong> amount of bustraffic.When a device transmits a message onto <strong>the</strong> CAN bus network, allo<strong>the</strong>r network devices receive that message. Each receiv<strong>in</strong>g device conductsa test on <strong>the</strong> <strong>in</strong>com<strong>in</strong>g frame identifier to determ<strong>in</strong>e if <strong>the</strong> messageis <strong>in</strong>tended for that device.When transmitt<strong>in</strong>g, a device exam<strong>in</strong>es <strong>the</strong> network to ensure thathigher-priority identifiers have precedence us<strong>in</strong>g a collision-handl<strong>in</strong>gsystem called non-destructive bitwise arbitration.The CAN bus provides a physical layer that is implementedthrough CAN controllers and transceivers. It is a multidrop networkwith no limitation on <strong>the</strong> number of devices, provided that <strong>the</strong> electricalcharacteristics of <strong>the</strong> signal rema<strong>in</strong>s with<strong>in</strong> specifications. The CAN buscable carries both <strong>the</strong> power and signal.The CAN bus def<strong>in</strong>es <strong>the</strong> hardware requirements and how dataframes are transported us<strong>in</strong>g a communication medium. A higher-levelprotocol (HLP) is needed for communications management to set <strong>the</strong>rules, behavior, and format of <strong>the</strong> data frames. HLPs for CAN bus technology<strong>in</strong>clude DeviceNet, CANopen, Smart Distributed Systems, CANApplication Layer (CAL), and CAN K<strong>in</strong>gdom.CANopenCANopen is a set of specifications with a communication profile aswell as device, <strong>in</strong>terface, and application profiles. The communicationprofile is based on <strong>the</strong> CAN data-l<strong>in</strong>k layer and <strong>the</strong> high-speed physicallayer specified <strong>in</strong> ISO 11898. CANopen was <strong>in</strong>itially developed <strong>in</strong> <strong>the</strong>ESPRIT/ASPIC project by Bosch. In 1994, CANopen was transferred to<strong>the</strong> CAN <strong>in</strong> Automation (CIA) <strong>in</strong>ternational users and manufacturersgroup based <strong>in</strong> Germany. CANopen has been used as an open network<strong>in</strong> production l<strong>in</strong>es, power plants, robot control, medical equipment,military systems, and build<strong>in</strong>g automation.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>StandardizedCAN Network<strong>in</strong>gIn <strong>the</strong> early years of CAN, each CAN-based embedded networkhad its own protocol. CANopen deals with <strong>the</strong> CAN-specific detailssuch as bit tim<strong>in</strong>g and implementation. It provides standardized communicationobjects (COBs) for real-time data, configuration data andnetwork management data.Besides standardiz<strong>in</strong>g communication objects, CANopen specifies<strong>the</strong> description of application objects. The CANopen device profilesdef<strong>in</strong>e application objects for <strong>the</strong> basic <strong>in</strong>teroperability of CANopendevices. To test this <strong>in</strong>teroperability, <strong>the</strong>re is a CANopen conformancetest tool. CIA uses this tool for certify<strong>in</strong>g CANopen devices.In CANopen, <strong>the</strong> communication objects for decentralized controlapplications are standardized and described <strong>in</strong> an object dictionary. Theobject dictionary allows CANopen to dist<strong>in</strong>guish more than 2,048 objects.Communication ObjectsProcess data objects are mapped to a s<strong>in</strong>gle CAN frame us<strong>in</strong>g all8 bytes of <strong>the</strong> data. Each object has an identifier and may be transmittedby only one node, but it can receive from more than one.Service data objects transmit configuration data, which may belonger than 8 bytes. The transport protocol allows <strong>the</strong> transmission ofobjects of any size.Network management objects consist of <strong>the</strong> boot-up object, networkmanagement object, and error-control object. The boot-up objecthas <strong>the</strong> same identifier as <strong>the</strong> error control object and is transmittedafter <strong>in</strong>itialization before <strong>the</strong> node is set <strong>in</strong>to a preoperational state.The network management object is <strong>the</strong> highest priority object <strong>in</strong> aCANopen network and is transmitted by <strong>the</strong> network managementmaster node.Sync, emergency <strong>in</strong>dication and time-stamp transmission objectsare broadcast periodically by <strong>the</strong> sync producer. The sync object provides<strong>the</strong> network clock. Emergency objects are triggered by a devicefatal error and are transmitted from an emergency client on <strong>the</strong> applicationdevice.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Security<strong>Control</strong>Net<strong>Control</strong>Net is a real-time, determ<strong>in</strong>istic control-layer network. Itcan provide high-speed transport of real-time I/O and messag<strong>in</strong>gdata. It allows peer-to-peer messag<strong>in</strong>g on a s<strong>in</strong>gle physical media l<strong>in</strong>kand can be used for configuration and programm<strong>in</strong>g which can bedone off-l<strong>in</strong>e with a hand-held device.<strong>Control</strong>Net tries to comb<strong>in</strong>e <strong>the</strong> benefits of several networksonto one l<strong>in</strong>k for <strong>in</strong>creased system performance. It is designed as acontrol network to reliably predict when data will be delivered andensure that transmission times are constant and unaffected by <strong>the</strong> devicesconnected to <strong>the</strong> network.As a real-time, control-layer network for <strong>the</strong> high-speed transportof time-critical I/O and message data, <strong>Control</strong>Net provides upload<strong>in</strong>g/download<strong>in</strong>gof programm<strong>in</strong>g and configuration data andpeer-to-peer messag<strong>in</strong>g, on a s<strong>in</strong>gle physical media l<strong>in</strong>k.<strong>Control</strong>Net operates at 5-Mbits/second. It allows multiple controllersto control I/O on <strong>the</strong> same wire. This is an advantage overo<strong>the</strong>r networks, which allow only one master controller on <strong>the</strong> wire.<strong>Control</strong>Net also allows multicast<strong>in</strong>g of both <strong>in</strong>puts and peer-to-peerdata, which reduces traffic and improves system performance.Determ<strong>in</strong>ism is <strong>the</strong> ability to reliably predict when data will bedelivered. The determ<strong>in</strong>istic performance of <strong>Control</strong>Net can be usedfor both discrete and process applications. O<strong>the</strong>r features <strong>in</strong>clude userselectable I/O and controller <strong>in</strong>terlock<strong>in</strong>g update times to match applicationrequirements.Network access is controlled by a time-slice technique calledConcurrent Time Doma<strong>in</strong> Multiple Access (CTDMA), which regulatesa node’s chance to transmit <strong>in</strong> each network <strong>in</strong>terval. The m<strong>in</strong>imum<strong>in</strong>terval time is 2 ms. <strong>Control</strong>Net is useful for systems with multiplePC-based controllers.<strong>Control</strong>Net can function <strong>in</strong> environments where responses occurwith<strong>in</strong> milliseconds. Each time a user adds a device to a network, <strong>the</strong>cycle time slows and performance is affected. <strong>Control</strong>Net is based ona producer/consumer communications model and can schedule <strong>the</strong>delivery of priority messages <strong>in</strong> spite of <strong>the</strong> number of nodes.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Producer/consumer ModelsNetworks can be grouped <strong>in</strong>to one of two categories; source/dest<strong>in</strong>ationor producer/consumer. In a source/dest<strong>in</strong>ation network, messagesare passed from <strong>the</strong> source to each dest<strong>in</strong>ation at a time. Withproducer/consumer, <strong>the</strong> producer broadcasts <strong>the</strong> message to every consumerat once. In <strong>the</strong> network environment, devices use identifierswhich are embedded <strong>in</strong>to each message to determ<strong>in</strong>e which messages<strong>the</strong>y should consume. The source/dest<strong>in</strong>ation model does not impact<strong>the</strong> baud rate at which data are transmitted—it affects <strong>the</strong> bandwidth.S<strong>in</strong>ce <strong>the</strong> producer/consumer network transmits a piece of <strong>in</strong>formationonly once, it uses less bandwidth.Redundancy and Security<strong>Control</strong>ler redundancy allows users to specify a backup for anynumber of nodes or connections. Until <strong>the</strong> backups are needed, <strong>the</strong>nodes are <strong>in</strong> listen<strong>in</strong>g mode and can take over for a failed device withoutpower<strong>in</strong>g down <strong>the</strong> system. <strong>Control</strong>Net provides physical level redundancy.Guaranteed bandwidth means that critical data should not be lost.In <strong>Control</strong>Net a user can configure a temperature sensor to update everyfew milliseconds to control proportional-<strong>in</strong>tegral-derivative loops.Most source/dest<strong>in</strong>ation networks can only send I/O updates asfast as poll<strong>in</strong>g <strong>the</strong> network allows and all nodes are updated at <strong>the</strong> samerate. The data may come too late for some uses and too often for o<strong>the</strong>rs.Future DirectionsFuture advancements for <strong>Control</strong>Net <strong>in</strong>clude conformance test<strong>in</strong>g,reductions <strong>in</strong> <strong>the</strong> size and cost of <strong>Control</strong>Net chips and real-time I/O(implicit messag<strong>in</strong>g) to <strong>Control</strong>Net services over E<strong>the</strong>rnet.Open systems like <strong>Control</strong>Net need products that are tested toensure <strong>the</strong>y are compliant with <strong>the</strong> network’s specifications. Any networklike Profibus, <strong>Control</strong>Net, or Foundation Fieldbus, can have<strong>in</strong>teroperability problems and <strong>the</strong>re could be difficulty <strong>in</strong>tegrat<strong>in</strong>g productsfrom multiple vendors.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityThe <strong>Control</strong>Net chip is called <strong>the</strong> SMAC4. The size of this 5-voltchip should shr<strong>in</strong>k to 0.6-micron from <strong>the</strong> 1-micron size and costsshould drop as a result.<strong>Control</strong>Net and E<strong>the</strong>rnetE<strong>the</strong>rnet by itself does not provide <strong>in</strong>teroperability and/or <strong>in</strong>terchangeabilityamong compet<strong>in</strong>g devices because a standard applicationlayer, common object model and universal device profiles do not exist.TCP/IP is used to apply <strong>Control</strong>Net messag<strong>in</strong>g services overE<strong>the</strong>rnet. This method treats <strong>the</strong> E<strong>the</strong>rnet network as a limited-function<strong>Control</strong>Net network. The technique allows a <strong>Control</strong>Net node to encapsulatea <strong>Control</strong>Net message as <strong>the</strong> data portion <strong>in</strong> an E<strong>the</strong>rnet message.The node can <strong>the</strong>n send <strong>the</strong> message us<strong>in</strong>g TCP/IP with <strong>the</strong><strong>Control</strong>Net message <strong>in</strong>side. The message is sent to an E<strong>the</strong>rnet communicationchip on <strong>the</strong> data-l<strong>in</strong>k layer <strong>in</strong>stead of a <strong>Control</strong>Net chip. S<strong>in</strong>ce<strong>the</strong> control and <strong>in</strong>formation protocol is used as <strong>the</strong> application layer,<strong>Control</strong>Net’s object model and device profiles can be used.TCP/IP is basically po<strong>in</strong>t-to-po<strong>in</strong>t so <strong>Control</strong>Net services overE<strong>the</strong>rnet are limited to explicit messag<strong>in</strong>g only. The data field of eachmessage carries both <strong>the</strong> network’s protocol <strong>in</strong>formation and explicit<strong>in</strong>structions for service. Nodes must <strong>in</strong>terpret each message, execute <strong>the</strong>requested task, and generate responses. <strong>Control</strong>Net can simultaneouslytransfer explicit messag<strong>in</strong>g and real-time I/O, with UDP/IP. UnlikeTCP/IP, UDP/IP is not limited to po<strong>in</strong>t-to-po<strong>in</strong>t communications andcan be used to multicast messages.<strong>Control</strong>Net’s native data-l<strong>in</strong>k layer uses concurrent time doma<strong>in</strong>multiple access to provide guaranteed access for scheduled I/O.E<strong>the</strong>rnet uses carrier-service multiple access/collision detection.SeriplexThis network has been used to control <strong>the</strong> signal<strong>in</strong>g of sensors byGeneral Motors. GM also uses hundreds of Seriplex I/O po<strong>in</strong>ts <strong>in</strong> monitor<strong>in</strong>gand material call systems.The Ford Assembly Plant <strong>in</strong> Toronto uses Seriplex to l<strong>in</strong>k its light<strong>in</strong>gcontrol system to meet <strong>the</strong> energy reduction goals of <strong>the</strong> Ford 2000 envi-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>ronmental-impact program. The Seriplex system l<strong>in</strong>ks 200 panel-boardsto a central PC which controls <strong>the</strong> entire light<strong>in</strong>g system. Replac<strong>in</strong>g <strong>the</strong>po<strong>in</strong>t-to-po<strong>in</strong>t wir<strong>in</strong>g, Seriplex made it possible to retrofit this 1952-eraplant with PC light<strong>in</strong>g control with m<strong>in</strong>imal wir<strong>in</strong>g and <strong>in</strong>stallation time.Seriplex was developed by Automated Process <strong>Control</strong> (APC), <strong>in</strong>1987. Square D bought APC <strong>in</strong> 1995 and created <strong>the</strong> nonprofit SeriplexTechnology Organization. This device-level control network has beenused <strong>in</strong> North America, Asia, and Australia with more than 3 million I/O po<strong>in</strong>ts <strong>in</strong>stalled at more than 3,000 locations. Besides Square D,Seriplex manufacturers <strong>in</strong>clude Turck, Pepperl+Fuch, ABB Flexible Automation,Banner Eng<strong>in</strong>eer<strong>in</strong>g, Delta Automation, GE Fanuc Automation,MAC Valves, and Wonderware.Seriplex technology was designed ma<strong>in</strong>ly for sensors, actuators,and simple on/off devices. It is determ<strong>in</strong>istic, with speeds <strong>in</strong> <strong>the</strong> lowmilliseconds.A s<strong>in</strong>gle network can accommodate several thousand I/O devicesand extend more than 5,000 feet. The network allows for <strong>the</strong> control andmonitor<strong>in</strong>g of analog and digital devices.Seriplex chips are embedded <strong>in</strong> sensor and actuator devices. Thisprovides <strong>the</strong> connection to <strong>the</strong> bus. The bus is a serial, multiplexed,<strong>in</strong>telligent, distributed I/O system with master/slave and peer-to-peerI/O control and logic. Seriplex technology can replace large bundles ofpo<strong>in</strong>t-to-po<strong>in</strong>t wir<strong>in</strong>g with a s<strong>in</strong>gle th<strong>in</strong> cable.Seriplex can reduce downtime and improve safety. It allows operators<strong>in</strong> a central control station to quickly locate <strong>the</strong> source of breakdowns.Seriplex and E<strong>the</strong>rnetSeriplex may be able to be paired with E<strong>the</strong>rnet. This would replacemultiple levels of proprietary and often <strong>in</strong>compatible networks with asystem of open technology. Several trends could make this possible.One is <strong>the</strong> emergence of E<strong>the</strong>rnet and TCP/IP as de facto standards.Most <strong>in</strong>telligent devices are compatible with E<strong>the</strong>rnet. TCP/IP is<strong>the</strong> technology that makes it possible for computers to view data over<strong>the</strong> Internet.As E<strong>the</strong>rnet moves from a shared to a switched design, it canparticipate <strong>in</strong> time-critical functions for automation and control. The©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityMODBUS protocol could be used for exchang<strong>in</strong>g data.E<strong>the</strong>rnet <strong>in</strong>terfaces smoothly with device networks such asSeriplex and AS-i (Actuator Sensor Interface), which is used <strong>in</strong> Europe.Both of <strong>the</strong>se are determ<strong>in</strong>istic, which allows <strong>the</strong>m to ma<strong>in</strong>ta<strong>in</strong> controlsequenc<strong>in</strong>g and accuracy.Seriplex networks can accommodate up to 7,680 discrete or 480analog I/O po<strong>in</strong>ts, with up to 300 devices connected to one networkcable of up to 5,000 feet. AS-i can accommodate 31 nodes and up to 248I/O on a 330-foot network or 660 feet with a repeater.Filters can be used to monitor which I/O po<strong>in</strong>ts report automatically,such as when an emergency stop is needed. The filter can also beused to capture and record data.Advancements <strong>in</strong> fieldbus technology are hav<strong>in</strong>g a major impacton <strong>the</strong> growth of faster, smarter, and more efficient <strong>in</strong>dustrial networks.Higher-level protocols such as Profibus offer <strong>the</strong> high performance levelsrequired <strong>in</strong> automation applications. The lowest level of automationis <strong>the</strong> actuator and sensor level where <strong>the</strong> AS-Interface (AS-i) is used(Figure 8-1).AS-iThis standard was <strong>in</strong>vented <strong>in</strong> 1990 as a cost-efficient alternative to<strong>the</strong> conventional hard wir<strong>in</strong>g of b<strong>in</strong>ary field devices. As-i has been used<strong>in</strong> hundreds of thousands of <strong>in</strong>stallations. Orig<strong>in</strong>ally, AS-i focused on <strong>the</strong>connection of low-level b<strong>in</strong>ary devices with a s<strong>in</strong>gle, easy-to-mount,two-conductor cable that carries power and data.AS-i is now an <strong>in</strong>ternational standard under EN 50295. It is a vendor-<strong>in</strong>dependentbus network that is open to any manufacturer. AS Internationalis <strong>the</strong> sponsor organization of AS-i. It was formed <strong>in</strong> 1991 bya consortium of 11 manufacturers who developed <strong>the</strong> <strong>in</strong>ternational standard.Today, <strong>the</strong> association has over 100 member companies that supplymore than 600 products and services. AS International is also responsiblefor <strong>the</strong> conformance test<strong>in</strong>g and certification of devices.Connection to Higher LevelsAS-i provides a low-cost solution for connect<strong>in</strong>g b<strong>in</strong>ary products,such as sensors, actuators, valves, and relays, with higher-level©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Figure 8-1. Network hierarchy.control devices <strong>in</strong>clud<strong>in</strong>g PCs and distributed control systems (DCSs)(Figure 8-2). It is used at <strong>the</strong> level directly below fieldbus and devicelevelnetwork systems. It transmits control and device data, configures<strong>the</strong> system architecture, powers <strong>the</strong> devices, and monitors <strong>the</strong>network.AS-i can be used for upgrad<strong>in</strong>g <strong>HVAC</strong> systems. Parallel controlwir<strong>in</strong>g can be replaced with a simple AS-i cable (Figure 8-3). Mostconventional wir<strong>in</strong>g system can be replaced and users report wir<strong>in</strong>gsav<strong>in</strong>gs of up to 40%.Conformance to <strong>the</strong> AS-i standard assures <strong>in</strong>teroperability. Eachslave that fulfills <strong>the</strong> standard’s requirements can work toge<strong>the</strong>r withany o<strong>the</strong>r slave <strong>in</strong> <strong>the</strong> network.The network uses a common cabl<strong>in</strong>g system with all peripheraldevices connected to <strong>the</strong> AS-i cable. The AS-i protocol is embedded <strong>in</strong><strong>the</strong> slave chip which connects <strong>the</strong> sensors and actuators to <strong>the</strong> cable.AS-i uses one master per network that calls up all <strong>the</strong> connectedslaves with a cyclic poll<strong>in</strong>g that uses <strong>the</strong>ir address. The AS-i datapackets are short with simple structures and have a fixed length.Four usable data bits are exchanged between a master and every <strong>in</strong>-©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityFigure 8-2. Cabl<strong>in</strong>g with AS-i serial <strong>in</strong>terface.Figure 8-3. Parallel wir<strong>in</strong>g cabl<strong>in</strong>g.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>dividual slave dur<strong>in</strong>g one cycle. Updated data of <strong>the</strong> runn<strong>in</strong>g processcan be found <strong>in</strong> <strong>the</strong> master as well as <strong>in</strong> <strong>the</strong> slave after one cycle. Ina fully expanded system with 31 slaves, <strong>the</strong> cycle time is about 5-ms.The cyclic poll<strong>in</strong>g method is determ<strong>in</strong>istic. This means that after5 ms, updated sensor data are available to <strong>the</strong> control unit and is<strong>the</strong>n transmitted from <strong>the</strong> control unit to <strong>the</strong> actuators.System OperationThe AS-i slave <strong>in</strong>tegrated circuit (IC) allows sensors, actuatorsand modules to l<strong>in</strong>k up as slaves to <strong>the</strong> AS-i bus. The sensor or actuatorgets its power from <strong>the</strong> l<strong>in</strong>e, recognizes <strong>the</strong> data <strong>the</strong> mastersends out and <strong>the</strong>n sends <strong>the</strong> data back to <strong>the</strong> master.Dur<strong>in</strong>g each cycle, 4 bits of data are transferred from <strong>the</strong> masterto each slave and <strong>the</strong>n back to <strong>the</strong> master. The ports can be configuredas <strong>in</strong>puts, outputs, or bidirectional. Each time a chip is <strong>in</strong>stalled<strong>in</strong> a slave, <strong>the</strong> I/O configuration sets <strong>the</strong> port’s configuration, whichis a 4-bit, permanently stored value.AS-i can be scaled beyond <strong>the</strong> 4 bits of data per cycle to slaveswith more than 4 bits of <strong>in</strong>formation. To accomplish this, <strong>the</strong> datatransmission is spread out over several cycles. AS-i can also be usedfor analog sensors and actuators.The As-i chip may be built <strong>in</strong>to sensors or actuators to make an<strong>in</strong>tegrated device, or it can be built <strong>in</strong>to a module where sensors, actuators,and switches are connected.The AS-i master is a central device that organizes <strong>the</strong> exchangeof data <strong>in</strong> <strong>the</strong> network and connects it to a higher level control unit.Three types of masters may be used. Pure masters allow a direct l<strong>in</strong>kto a PC. Couplers allow <strong>the</strong> connection to a field bus. Stand-alonemasters <strong>in</strong>clude some control functions that let it work without ahigher control.The AS-i master is self-configur<strong>in</strong>g and is configured when <strong>the</strong>addresses and <strong>the</strong> <strong>in</strong>dividual I/O configurations and ID codes of <strong>the</strong>connected slaves are written <strong>in</strong>to <strong>the</strong> master. The master automaticallyperforms all noncyclic functions that are needed for parameters,automatic address<strong>in</strong>g and network supervision.©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and SecurityGateway AccessMasters that behave as a slave <strong>in</strong> a field-bus network act as couplersor gateways. These AS-i gateways provide access to sensor andactuator data from all layers of <strong>the</strong> automation architecture. AS-i gatewaysare available for Profibus, Interbus, DeviceNet, CAN, SDS,MODBUS, MODBUS+ and RS-232/-422/-485. Stand-alone masters actas controllers for simple tasks.An As-i power supply unit serves as <strong>the</strong> power supply for <strong>the</strong>slaves. It forms <strong>the</strong> voltage pulses for data transmission and can beconnected to <strong>the</strong> network at any po<strong>in</strong>t. It feeds a symmetrical supplyvoltage of 30 VDC <strong>in</strong>to <strong>the</strong> cable. Power supplies are available withrat<strong>in</strong>gs of 2.2 to 8-A.AS-i CableThe standard AS-i cable is 2-core, 2 by 1.5-mm, rubber <strong>in</strong>sulated,with a special profile that prevents reversal of <strong>the</strong> poles when connect<strong>in</strong>gdevices. The electrical connection is made by penetration contacts,which pierce <strong>the</strong> rubber <strong>in</strong>sulation to make a connection to <strong>the</strong> two cablewires. This connection method elim<strong>in</strong>ates stripp<strong>in</strong>g and term<strong>in</strong>at<strong>in</strong>g.If a device needs to be moved to ano<strong>the</strong>r location on <strong>the</strong> cable, itis easily done. The cable is self-heal<strong>in</strong>g and holes made <strong>in</strong> <strong>the</strong> cabledur<strong>in</strong>g <strong>in</strong>stallation close when <strong>the</strong> connection is removed.Cables are available for applications that require data and powerseparately. A black cable is used for supply voltages up to 30-V and a redversion for supply voltages up to 230-VAC. Table 8-1 lists <strong>the</strong> AS-i cablecharacteristics.Table 8-1. AS-i Cable Characteristics————————————————————————————————Trapezoidal mechanically coded cableReverse voltage protectionOil-resistant versionsUL recommendedData and power, yellow version - 30 VDCPower - 24 VDC (black) to 230 (red) VACPierc<strong>in</strong>g connectors————————————————————————————————©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Network StructureThe AS-i network uses a tree structure with a maximum of 31slaves, to which 124 <strong>in</strong>puts and outputs can be connected. In most applications,<strong>the</strong> master is part of <strong>the</strong> first control level, but <strong>the</strong> network canalso be subord<strong>in</strong>ate to a fieldbus system.The master becomes a slave <strong>in</strong> <strong>the</strong> fieldbus network. It controls andpolls <strong>the</strong> network, send<strong>in</strong>g and receiv<strong>in</strong>g data from each connected device.It senses and registers any connected device without configurationor application-specific software. There are couplers for differentfieldbuses, <strong>in</strong>clud<strong>in</strong>g Profibus, Interbus, CAN, DeviceNet, and SDS.Over a million AS-i field devices have been <strong>in</strong>stalled. There areslave modules with <strong>in</strong>tegrated pneumatic valves, earth fault detectorsand slaves to handle analog signals. Repeaters and extenders can be usedto <strong>in</strong>crease <strong>the</strong> 100-m network length.The number of slaves that can be connected to a network has been<strong>in</strong>creased from 31 to 62. This is done with A/B address<strong>in</strong>g, which uses aspare bit <strong>in</strong> <strong>the</strong> protocol to switch between devices <strong>in</strong> succeed<strong>in</strong>g buscycles. This <strong>in</strong>creases <strong>the</strong> maximum network capacity to 248 <strong>in</strong>puts and186 outputs but doubles <strong>the</strong> cycle time to 10-ms.A spare bit <strong>in</strong> <strong>the</strong> status register is used to mark peripheral faults.The host can use a fast fault <strong>in</strong>dicator, mak<strong>in</strong>g it easier to detect faults <strong>in</strong>a network.HARTHART is a de facto standard <strong>in</strong> <strong>the</strong> automation <strong>in</strong>dustry. HART offersease of use, compatibility with exist<strong>in</strong>g systems, and cost-sav<strong>in</strong>gbenefits. HART reta<strong>in</strong>s <strong>the</strong> compatibility and familiarity of 4-20-mA systems,while provid<strong>in</strong>g remote two-way digital communication withsmart field equipment. HART is an important communication technologyused <strong>in</strong> smart <strong>in</strong>struments.Smart <strong>in</strong>strumentation is important <strong>in</strong> distributed <strong>in</strong>telligence andcontrol. The ARC Advisory Group has predicted that HART will dom<strong>in</strong>atesmart-<strong>in</strong>strument communication. There is a major trend from traditionalanalog to smart <strong>in</strong>strumentation.The HART Communication Foundation (HCF) owns <strong>the</strong> technology,which was developed by Rosemount. HCF is a nonprofit organiza-©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Securitytion with worldwide members. Sales figures <strong>in</strong>dicate that HART is <strong>the</strong>leader <strong>in</strong> South America, very popular <strong>in</strong> Asia and becom<strong>in</strong>g <strong>the</strong> <strong>in</strong>dustrystandard <strong>in</strong> Europe. The HART protocol is expected to have an <strong>in</strong>stalledbase of 1.5 million <strong>in</strong> several years.HART has <strong>the</strong> capability of allow<strong>in</strong>g multiple measurements andcalculations <strong>in</strong> one device <strong>in</strong>clud<strong>in</strong>g diagnostics. It is a straightforwardand simple technology that provides low-cost digital communications.In most applications, HART digital <strong>in</strong>formation is communicatedsimultaneously with <strong>the</strong> traditional 4-20-mA analog signal. The variableis transmitted cont<strong>in</strong>uously via <strong>the</strong> analog signal, while additional measurements,calculated values, device configuration, diagnostics, and devicestatus <strong>in</strong>formation are sent by HART digital communication on <strong>the</strong>same wires.Ano<strong>the</strong>r capability is that several HART-compatible field devicescan be connected to a s<strong>in</strong>gle pair of wires <strong>in</strong> a multidrop network. In thissystem, digital communication is used to access all of <strong>the</strong> device <strong>in</strong>formation.In <strong>the</strong> future, <strong>the</strong>re will be more network-related products, multiplexers,and multidrop connections for on-l<strong>in</strong>e <strong>in</strong>teraction with HARTdevices. The digital communication capability allows device <strong>in</strong>formationto be l<strong>in</strong>ked remotely to o<strong>the</strong>r digital networks. HCF has developed anobject l<strong>in</strong>k<strong>in</strong>g capability for process control (OPC) servers that allows cyclicaccess of HART device <strong>in</strong>formation by higher-level systems and clientapplications.HART-compatible multiplexers and I/O subsystems make it easyto connect HART devices with central control systems, ma<strong>in</strong>tenance stations,and control and data acquisition networks through <strong>the</strong> OPCServer. The server provides cyclic data access to process variables anddevice diagnostic <strong>in</strong>formation. O<strong>the</strong>r digital networks for <strong>in</strong>dustrial automation<strong>in</strong>clude Foundation Fieldbus and Profibus.Foundation FieldbusThe Fieldbus Foundation has developed Foundation Fieldbus. Thegoal was to develop a digital fieldbus that meets <strong>the</strong> control requirementsof process applications. It is based on ISA and IEC standards, aswell as standards that cover Profibus, <strong>the</strong> French FIP, (factory-<strong>in</strong>strumentationprotocol), and HART (highway addressable remote transducer), a©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>common open protocol for <strong>in</strong>dustrial automation.Fieldbus devices and host control systems provide an alternative toanalog control. Fieldbus is an all-digital, serial, two-way communicationssystem to <strong>in</strong>terconnect sensors, actuators, and controllers. It servesas a local-area network for <strong>in</strong>struments used <strong>in</strong> control and automationapplications. Fieldbus provides reduced <strong>in</strong>frastructure requirements especially<strong>in</strong> <strong>the</strong> area of field cabl<strong>in</strong>g. Each fieldbus segment is capable ofsupport<strong>in</strong>g multiple devices. The expensive cable run between <strong>the</strong> fielddevicejunction box and <strong>the</strong> control system will be much smaller.S<strong>in</strong>ce Fieldbus can drop spurs along its length, this reduces <strong>the</strong>number of home run cables required. A digital signal can also be superimposedover an analog signal which carries <strong>the</strong> control variable measurement.Sav<strong>in</strong>gs can also be achieved with fieldbus multivariable transmitters.These allow a s<strong>in</strong>gle device to transmit more than one variable. Thesignal to be multiplexed can be temperature or pressure measurements.Fieldbus and digital signals also offer <strong>in</strong>creased reliability. This <strong>in</strong>creasedreliability comes from <strong>the</strong> use of <strong>the</strong> diagnostic capabilities of <strong>the</strong>system. The network transmits this <strong>in</strong>formation to <strong>the</strong> network, where itcan be used to monitor <strong>the</strong> health of <strong>the</strong> system.Accord<strong>in</strong>g to some studies, when a problem occurs, 2/3 of <strong>the</strong> repairtime is spent <strong>in</strong> diagnosis and only 1/3 goes to <strong>the</strong> actual repair orreplacement. Reduction of <strong>the</strong> time needed to diagnose <strong>the</strong> problem canhave a significant impact on ma<strong>in</strong>tenance costs.Foundation Fieldbus technology comprises <strong>the</strong> physical layer, <strong>the</strong>communication stack, and <strong>the</strong> user application. These components fit <strong>the</strong>OSI communication model. The physical layer allows low-speed devicesto run on twisted-pair cable.The l<strong>in</strong>k active scheduler (LAS) is <strong>in</strong> charge of access to <strong>the</strong> bus. Al<strong>in</strong>k master is a device that can be an LAS. The LAS capability can betransferred to secondary l<strong>in</strong>k masters, provid<strong>in</strong>g redundancy for <strong>the</strong> system.Fieldbus def<strong>in</strong>es an eighth layer, <strong>the</strong> user layer. The user layer def<strong>in</strong>esblocks that represent <strong>the</strong> functions and data <strong>in</strong> a device.You can implement function blocks on <strong>the</strong> fieldbus for PID and PDfunctions which could each reside <strong>in</strong> separate devices, such as a transmitter,a loop controller, and a valve.In <strong>the</strong>se systems, Fieldbus provides a type of distributed control, <strong>in</strong>which <strong>the</strong> control function exists <strong>in</strong> <strong>the</strong> field ra<strong>the</strong>r than <strong>in</strong> larger central©2001 by The Fairmont Press, Inc. All rights reserved.


Computer Networks and Securitycontrollers. A control-system host with a W<strong>in</strong>dows NT-based human mach<strong>in</strong>e<strong>in</strong>terface can be used to create an <strong>in</strong>terface for configur<strong>in</strong>g deviceparameters.The digital circuitry of Fieldbus transmitters improves <strong>the</strong> accuracyof sens<strong>in</strong>g and transmitt<strong>in</strong>g <strong>the</strong> control variable. Just as W<strong>in</strong>dows hasgrown from its <strong>in</strong>itial versions to its present architecture, Fieldbus shouldcont<strong>in</strong>ue to grow and expand. One of <strong>the</strong> features added to Fieldbus is<strong>the</strong> ability of devices to monitor revisions of <strong>the</strong> device description to ensurethat it is compatible with <strong>the</strong> one <strong>in</strong> <strong>the</strong> host system and o<strong>the</strong>rs on<strong>the</strong> network.ProfibusThe compatible protocol variations <strong>in</strong> Profibus <strong>in</strong>clude Profibus-FMS, Profibus-DP, and Profibus-PA. Profibus-FMS handles high-level,non-real-time communications among devices. Profibus-PA targets process-controlapplications.Profibus-DP is a low-level network that targets high-performanceI/O scann<strong>in</strong>g. Typical DP-slaves are discrete <strong>in</strong>puts or outputs for 24V dcor 230V ac analog <strong>in</strong>puts, and analog outputs.Profibus-DP provides high-speed data transfer at <strong>the</strong> sensor and actuatorlevels. <strong>Control</strong>lers, such as PLC devices, Master devices, or activestations can control <strong>the</strong> bus and transfer messages without a remote request.Slave devices are simple peripherals, such as sensors and actuators.The Profibus standard def<strong>in</strong>es two physical layers with mediumaccessprotocols for different transmission techniques. Besides <strong>the</strong> physicallayer cable a second physical medium is fiber-optic, which greatly extends<strong>the</strong> bus length at high transmission speeds. The Profibus data-l<strong>in</strong>klayer is designated as <strong>the</strong> fieldbus data l<strong>in</strong>k.CABIn 1985, Public Works Canada conducted a study for a more cost-effectivemeans of operat<strong>in</strong>g and manag<strong>in</strong>g <strong>the</strong> control systems used <strong>in</strong>public build<strong>in</strong>gs. This development focused on an operator workstationthat would simplify build<strong>in</strong>g operations and reduce operator tra<strong>in</strong><strong>in</strong>g. Anew data communications protocol was required to l<strong>in</strong>k this workstation©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>to <strong>the</strong> build<strong>in</strong>g automation systems <strong>in</strong> use. The Canadian AutomatedBuild<strong>in</strong>g (CAB) Protocol was supported by Public Works and GovernmentServices Canada (PWGSC) and compatibility with this protocol isnow required for all new build<strong>in</strong>g control systems procured by PWGSC.CAB uses a Local Area Network between gateways and workstations.It def<strong>in</strong>es a standard <strong>in</strong>terface console that connects to <strong>the</strong> LANand communicates to nodes via def<strong>in</strong>ed messages. CAB provides user <strong>in</strong>terfacecapabilities across multiple-build<strong>in</strong>g systems.CAB is essentially a high-speed network protocol and best usedwhen communicat<strong>in</strong>g between devices with good process<strong>in</strong>g capabilities.It is rarely used for field-device communication.MODBUSMODBUS is an Instrument Society of America (ISA) protocol thathas been developed for factory automation. It allows communication betweendifferent manufacturers’ programmable logic controllers (PLCs)and <strong>in</strong>telligent field devices, such as transmitters and actuators.Devices that use MODBUS typically require healthy process<strong>in</strong>g capabilities,and are usually more expensive than <strong>the</strong> control devices used<strong>in</strong> a typical commercial or <strong>in</strong>stitutional build<strong>in</strong>g for environmental control.From proprietary to public standard, <strong>the</strong> proliferation of <strong>in</strong>dustrialnetworks offers user benefits, but unfortunately many of <strong>the</strong> benefits arespread across different networks.Plant-wide network architectures are evolv<strong>in</strong>g <strong>in</strong>to three layers.<strong>Control</strong>Net fits <strong>in</strong>to <strong>the</strong> middle automation and control layer for realtimeI/O control, <strong>in</strong>terlock<strong>in</strong>g, and messag<strong>in</strong>g. The upper <strong>in</strong>formationlayer for plant-wide data collection and program ma<strong>in</strong>tenance can bedone with E<strong>the</strong>rnet. The device layer for <strong>the</strong> <strong>in</strong>tegration of <strong>in</strong>dividual devicesis handled with <strong>the</strong> device buses like DeviceNet and FoundationFieldbus.References“A Host of Options at <strong>the</strong> Device Level,” Worldbus Journal, (Supplementto InTech), Vol. 46 No. 10, October 1999, pp. 38-42.©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> Internet 337Chapter 9Build<strong>in</strong>g Automation,Wireless Technology,And <strong>the</strong> InternetThe bus<strong>in</strong>ess of build<strong>in</strong>gs requires <strong>the</strong> vision to anticipate futureneeds and deliver <strong>the</strong>m. Conveniences may <strong>in</strong>clude plug-andplaywir<strong>in</strong>g, light<strong>in</strong>g, and air distribution.The tenants may want to call <strong>the</strong> build<strong>in</strong>g on a Sunday night andprogram it to be runn<strong>in</strong>g when <strong>the</strong>y arrive for some needed after-hoursuse. They may also want an <strong>in</strong>tegrated security system that makes <strong>the</strong>mfeel safe without <strong>in</strong>vad<strong>in</strong>g <strong>the</strong>ir privacy.These th<strong>in</strong>gs are possible now and will become mandatory <strong>in</strong> <strong>the</strong>future. This <strong>in</strong>creased functionality does not have to cost more. Manyfuture products may be made for a build<strong>in</strong>g communications technologylike BACnet or LonWorks. This type of bus technology allows productsof various build<strong>in</strong>g systems to communicate.It can get you <strong>the</strong> choice of products with<strong>in</strong> a build<strong>in</strong>g and competitivebidd<strong>in</strong>g with<strong>in</strong> an organization. This choice, or flexibility,equates to <strong>the</strong> ability to specify vendors, products and solutionsBACnet ProjectsGreat variety is evident <strong>in</strong> <strong>the</strong> BACnet projects that have been doneor are under way. In one school district’s ma<strong>in</strong> energy managementsystem, a BACnet gateway allows <strong>the</strong> district’s energy managementsystem to transmit a setpo<strong>in</strong>t to one or more of <strong>the</strong> rooftop unit controllers.In ano<strong>the</strong>r project, BACnet is <strong>the</strong> key to communication betweenan ice r<strong>in</strong>k’s BAS and <strong>the</strong> controls for <strong>the</strong> chillers that make <strong>the</strong> ice <strong>in</strong> <strong>the</strong>r<strong>in</strong>k.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The city of Memphis, Tennessee has <strong>in</strong>stalled new control systemsas well as upgrad<strong>in</strong>g and expand<strong>in</strong>g its Fairgrounds Complex. The retrofittedcontrols are BACnet-compatible, and will be networked <strong>in</strong>to acentrally monitored system via <strong>the</strong> city’s exist<strong>in</strong>g municipal stages. Theflexibility offered by BACnet appeals to city managers.BACnet is be<strong>in</strong>g used <strong>in</strong> thousands of build<strong>in</strong>g automation systemsoperat<strong>in</strong>g around <strong>the</strong> world but that is only a small portion of allcontrols projects be<strong>in</strong>g done. One of <strong>the</strong>se projects is a centralized networkof BACnet-based build<strong>in</strong>g automation systems <strong>in</strong> Tucson, Arizonafor about 25 municipal facilities. The new system replaces a group of 5-to 10-year-old direct digital control systems. The city was concernedabout <strong>the</strong>ir exist<strong>in</strong>g control systems, and were expect<strong>in</strong>g to see majorsystem failures if <strong>the</strong>y did noth<strong>in</strong>g.The project uses BACnet at <strong>the</strong> head end and <strong>the</strong> ma<strong>in</strong> distributedprocessors, connect<strong>in</strong>g all of <strong>the</strong> build<strong>in</strong>gs <strong>in</strong>to a s<strong>in</strong>gle centralized system.This will allow flexibility to allow true competitive bidd<strong>in</strong>g forcontrol system additions <strong>in</strong> <strong>the</strong> future.As more control vendors offer BACnet products, <strong>the</strong> dream of<strong>in</strong>teroperability through BACnet will be put to <strong>the</strong> test. The projects thatare be<strong>in</strong>g planned and executed will be watched closely. One way orano<strong>the</strong>r, <strong>the</strong> era of proprietary BAS protocols is com<strong>in</strong>g to a close.The U.S. General Services Adm<strong>in</strong>istration (GSA) is us<strong>in</strong>g BACnetcontrols from Alerton Technologies and <strong>the</strong> Trane Company at its 450Golden Gate Build<strong>in</strong>g, located <strong>in</strong> San Francisco. This is <strong>the</strong> first largescaleimplementation of <strong>the</strong> BACnet open communications protocol. Thebuild<strong>in</strong>g is <strong>the</strong> first large demonstration of BACnet among multiplevendors.The build<strong>in</strong>g houses several government departments and agencies,<strong>in</strong>clud<strong>in</strong>g GSA and federal courts. It has 22 floors with 1.4 millionsquare feet and is one of <strong>the</strong> largest build<strong>in</strong>gs <strong>in</strong> <strong>the</strong> San Francisco skyl<strong>in</strong>e.Each floor is bigger than a football field. The build<strong>in</strong>g has seenextensive renovations, <strong>in</strong>clud<strong>in</strong>g asbestos removal and mechanical systemupgrades, while ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g its pneumatic control system.The new build<strong>in</strong>g-wide energy management control system cost$3.5 million and should save over $500,000 <strong>in</strong> energy costs per year.The Alerton system is based on <strong>the</strong> company’s BACnet systemcalled BACtalk[R], and <strong>the</strong> Trane system is based on <strong>the</strong> Trane Tracersummit system. The build<strong>in</strong>g owners workstation network uses aBACtalk for W<strong>in</strong>dows NT server with an E<strong>the</strong>rnet 10Base2 LAN to con-©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> Internetnect <strong>the</strong> system workstations and network controllers. A network hub isused on each floor with remote term<strong>in</strong>als connect<strong>in</strong>g to <strong>the</strong> network via<strong>the</strong> E<strong>the</strong>rnet LAN.Alerton retrofitted over 800 dual-duct and 60 s<strong>in</strong>gle-duct VAV term<strong>in</strong>alunits with BACtalk controllers. Each controller is programmableand communicates on <strong>the</strong> BACnet MS/TP LAN. The pneumatic operatorshave been replaced with electronic actuators and <strong>the</strong> pneumatic<strong>the</strong>rmostats replaced with <strong>in</strong>telligent digital-display wall sensors. Theeight ma<strong>in</strong> dual-duct air-handl<strong>in</strong>g units have been retrofitted with programmablecontrollers.Trane replaced <strong>the</strong> pneumatic controllers at each term<strong>in</strong>al unit withDDC VAV controllers on three GSA floors. Almost 200 dual-duct and 16s<strong>in</strong>gle-duct VAV term<strong>in</strong>al units have been retrofitted. Trane replacedpneumatic <strong>the</strong>rmostats with electronic DDC zone sensors and providedbuild<strong>in</strong>g control units, which are BACnet-compatible. The build<strong>in</strong>g levelcontrollers will coord<strong>in</strong>ate <strong>the</strong> VAV operation and communicate with <strong>the</strong>Alerton system via BACnet, allow<strong>in</strong>g <strong>the</strong> two systems to <strong>in</strong>teroperate.The W<strong>in</strong>dows NT workstations use a graphics package so <strong>the</strong>operator can view and change <strong>the</strong> system <strong>in</strong>formation. Plans to extend<strong>the</strong> BACnet system <strong>in</strong>clude light<strong>in</strong>g control and central plant equipmentretrofits. Thomas Light<strong>in</strong>g <strong>Control</strong>s and Synergistic <strong>Control</strong> Systemsjo<strong>in</strong>ed Alerton and Trane as manufactur<strong>in</strong>g partners <strong>in</strong> this project.Some <strong>HVAC</strong> systems like <strong>the</strong> one <strong>in</strong> <strong>the</strong> Knickerbocker Hotel <strong>in</strong>Chicago have reduced operat<strong>in</strong>g costs by automat<strong>in</strong>g <strong>the</strong> build<strong>in</strong>g’smechanical systems with a new LonWorks-based build<strong>in</strong>g control system.Interoperable LonWorks-based products <strong>in</strong>cluded ABB adjustablefrequency drives, York direct-fire absorption chillers and RCS temperaturesensors. Shar<strong>in</strong>g a s<strong>in</strong>gle, common twisted-pair (78-kbits/s) wirebackbone among elements, <strong>the</strong> system devices work as <strong>in</strong>telligent zonecontrols.Instead of <strong>in</strong>dividual wires, <strong>the</strong> functions are handled by <strong>the</strong> transmissionof messages over a network. The plug-and-play device characteristicsallow <strong>the</strong> connection of <strong>the</strong> <strong>HVAC</strong> systems to be done easily onsite.The automation <strong>in</strong>volved multi-zone air-handl<strong>in</strong>g devices, refrigerationequipment, and <strong>the</strong> chilled and hot water systems. The volumeof air go<strong>in</strong>g <strong>in</strong>to <strong>the</strong> lobby area is controlled by variable frequencydrives. The control of dampers and zones is done with LonWorks-based©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong><strong>in</strong>telligent actuators. In common areas such as <strong>the</strong> ballroom, <strong>the</strong> lobby,and <strong>the</strong> restaurant, <strong>in</strong>telligent space sensors are used to transmit networkmessages back to <strong>the</strong> actuators that control <strong>the</strong> zone dampers. In<strong>the</strong> air handl<strong>in</strong>g equipment used, <strong>the</strong> separation of <strong>the</strong> hot and colddeck dampers caused a synchronization problem which was solved by<strong>the</strong> tim<strong>in</strong>g facilities of <strong>the</strong> neuron chips <strong>in</strong> <strong>the</strong> actuators. This was adjustedso that both dampers would always operate <strong>in</strong> <strong>the</strong> correct positions.The operation of <strong>the</strong> heat<strong>in</strong>g and cool<strong>in</strong>g valves are also underLonWorks control.The system operates <strong>in</strong> a W<strong>in</strong>dows-based environment and allows<strong>the</strong> monitor<strong>in</strong>g of control system data, reset fan temperatures, turn<strong>in</strong>gequipment on and off and adjusted operat<strong>in</strong>g parameters. Dedicatedchannels on <strong>the</strong> CATV backbone are used for guest services such asmonitor<strong>in</strong>g <strong>the</strong> m<strong>in</strong>i-bar, controll<strong>in</strong>g <strong>the</strong> heat<strong>in</strong>g, and provid<strong>in</strong>g realtimesecurity with a door lock<strong>in</strong>g system.Products with open protocols embedded <strong>in</strong> <strong>the</strong>m are more flexible.For example, <strong>the</strong> retrofitt<strong>in</strong>g of a light<strong>in</strong>g system with occupancy sensors<strong>in</strong> <strong>the</strong> build<strong>in</strong>g can be done to provide more natural light and decrease<strong>the</strong> artificial light usage.Lon-enabled products provide multiple sources of application-specificcontrollers and programmable devices. These basic elements provideanswers to <strong>in</strong>tegration requirements.Products that are cheaper and faster to manufacture are <strong>the</strong> trendfor <strong>the</strong> future. The benefits of LonMark products <strong>in</strong>clude <strong>the</strong> choice ofvendors, easy <strong>in</strong>tegration, additions and changes and reduced <strong>in</strong>stallationcosts.There has been a tremendous shift <strong>in</strong> <strong>the</strong> implementation and utilizationof control systems. This shift has been from discrete sensors andanalog devices to more <strong>in</strong>telligent, processor-based networks of sensorsand devices that return both data values and diagnostic <strong>in</strong>formation.These <strong>in</strong>telligent automation solutions are based on device busnetworks. Open PC technology such as E<strong>the</strong>rnet and OLE for processcontrol (OPC) is coupled with device bus networks. This allows desktop,<strong>in</strong>dustrial, and laptop computers to be powerful connection tools.The future requirements for control systems demand that an ever<strong>in</strong>creas<strong>in</strong>g amount of <strong>in</strong>formation be provided. The trend is towardsopen architecture-based technology that replaces proprietary equipment.This force has sparked a era of <strong>in</strong>novation that has led to <strong>the</strong> leverag<strong>in</strong>gof exist<strong>in</strong>g PC technology.©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetIn today’s energy management climate, <strong>in</strong>creas<strong>in</strong>g costs and <strong>the</strong>need for improved efficiency of build<strong>in</strong>g systems forces owners to takea hard look at <strong>the</strong>ir build<strong>in</strong>g automation systems. Many <strong>in</strong>dustries mustcomply with new environmental and safety requirements.In such a bus<strong>in</strong>ess environment, less of <strong>the</strong> required data are controlspecific. More <strong>in</strong>formation of o<strong>the</strong>r types is needed to ma<strong>in</strong>ta<strong>in</strong>,diagnose and modify <strong>the</strong> control system.Standard digital networks have additional benefits. Reduced wir<strong>in</strong>glowers <strong>in</strong>stallation and ma<strong>in</strong>tenance costs. Open systems let usersselect <strong>the</strong> right equipment for <strong>the</strong> job, regardless of <strong>the</strong> system manufacturer.The networks also have <strong>in</strong>telligent <strong>in</strong>strumentation, <strong>in</strong> which betterperform<strong>in</strong>g devices provide functions such as advanced diagnostics.The networks offer distributed control with <strong>in</strong>telligent devices thatprovide <strong>the</strong> flexibility to apply control centrally or at local process<strong>in</strong>gpo<strong>in</strong>ts for improved performance and reliability.The available range from low-level systems that ga<strong>the</strong>r data fromsimple discrete sensors to more sophisticated networks <strong>in</strong> which <strong>in</strong>telligentfield devices implement distributed control.Web TechnologiesImproved energy management means a tighter <strong>in</strong>tegration of <strong>the</strong>entire facility. Information <strong>in</strong>tegration at this level requires <strong>the</strong> ability tol<strong>in</strong>k systems of different types, provid<strong>in</strong>g <strong>in</strong>formation <strong>in</strong> various formatsthroughout <strong>the</strong> facility and often with geographically dispersed plantsand offices. Until recently, this has been a difficult and costly problem,but <strong>the</strong> <strong>in</strong>creas<strong>in</strong>g use of technologies that have matured on <strong>the</strong> Internetprovides some cost-effective solutions. The Internet has successfullyunified a variety of computers, <strong>in</strong>clud<strong>in</strong>g ma<strong>in</strong>frames, midranges, workstations,and PCs. In many bus<strong>in</strong>esses, <strong>the</strong> move toward electronic commercemeans standardiz<strong>in</strong>g around Internet technologies, <strong>in</strong>clud<strong>in</strong>gE<strong>the</strong>rnet, TCP/IP, and <strong>the</strong> Web. These technologies are used to track notonly <strong>the</strong>ir facility but also <strong>the</strong> status of suppliers <strong>in</strong>clud<strong>in</strong>g energy suppliers.A tight <strong>in</strong>tegration <strong>in</strong> some areas means that <strong>the</strong> state-of-<strong>the</strong>-art isadvanc<strong>in</strong>g to <strong>the</strong> po<strong>in</strong>t where this level of <strong>in</strong>tegration will be a commodity,more like a standard software package than <strong>the</strong> research project itseems like today. Improved energy management presents many of <strong>the</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>same challenges found elsewhere <strong>in</strong> <strong>the</strong> enterprise. Communication andnetwork<strong>in</strong>g standards abound. Programmable logic controllers (PLCs),temperature controllers and PCs all have well-def<strong>in</strong>ed but sometimesoverlapp<strong>in</strong>g roles. The longevity of <strong>the</strong> equipment means that controllersand software do not always reflect <strong>the</strong> latest technologies, especially<strong>in</strong> <strong>the</strong> area of communication capability.Often, replac<strong>in</strong>g expensive equipment just to improve <strong>the</strong> controllercapability is not practical. So, while PCs are recycled quite rapidly,equipment controllers, or at least <strong>the</strong> underly<strong>in</strong>g designs of <strong>the</strong> controller,may be 5 or more years old which is aged <strong>in</strong> comput<strong>in</strong>g years.Enhanced communications capability might justify add<strong>in</strong>g features toexist<strong>in</strong>g equipment, such as track<strong>in</strong>g energy or fuel use.Us<strong>in</strong>g Internet technologies on a local network to create a localIntranet allows you to <strong>in</strong>tegrate many of <strong>the</strong>se systems without a significantimpact on operation (Figure 9-1). Network<strong>in</strong>g allows <strong>the</strong> display ofnew <strong>in</strong>formation, as well as <strong>the</strong> addition of new control features. TheIntranet servers are Web servers with off-<strong>the</strong>-shelf Web browsers, suchas Netscape’s Navigator or Microsoft’s Internet Explorer, comb<strong>in</strong>ed withnew Java-based technology to provide better access.The use of Web techniques is fairly straightforward. Information isprovided to clients by a Web server. On <strong>the</strong> Internet, a server may receivemany millions of requests for <strong>in</strong>formation every day and Webservers are typically dedicated and high-powered computers. For a facilityIntranet, <strong>the</strong> number of requests for <strong>in</strong>formation is relatively small,so a Web server can run on a standard off-<strong>the</strong>-shelf PC system equippedwith a network <strong>in</strong>terface. These systems can run <strong>the</strong> user <strong>in</strong>terfaces.They can also function as real-time controllers.Web enabl<strong>in</strong>g equipment allows anyone with a Web browser and<strong>the</strong> appropriate permissions can access <strong>the</strong> <strong>in</strong>formation. This makesaccess to control <strong>in</strong>formation uncommonly simple. Once <strong>the</strong> client computeris set up and networked, you just need <strong>the</strong> familiar Internet address,or URL. This address might take <strong>the</strong> same basic form as an externalURL, such as www.ibm.com. Internally, an address such asheat<strong>in</strong>gSystem/status.html might provide access to <strong>the</strong> status of a localsystem.In a typical Internet Web site, most of <strong>the</strong> <strong>in</strong>formation is static s<strong>in</strong>ceit does not change until someone physically changes it. Dynamic applicationson <strong>the</strong> Web need to advance this concept by display<strong>in</strong>g rapidlychang<strong>in</strong>g <strong>in</strong>formation <strong>in</strong> near real time. To create, transport, and view©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetFieldbusFigure 9-1. <strong>Control</strong>, plant and corporate networks.this <strong>in</strong>formation, <strong>the</strong> Java language can be used.The Java applets are transported across <strong>the</strong> network and are executedon <strong>the</strong> user’s computer <strong>in</strong>side <strong>the</strong> Web browser. The user <strong>in</strong>terfacelooks familiar to anyone accustomed to Web Surf<strong>in</strong>g.For <strong>the</strong> applet to be effective requires that <strong>the</strong>re be communicationwith <strong>the</strong> real device for <strong>the</strong> system to ei<strong>the</strong>r monitor or control <strong>the</strong>equipment. The nature of this communication depends on <strong>the</strong> controlfunction of <strong>the</strong> equipment.S<strong>in</strong>ce Java and Intranets ma<strong>in</strong>ly support only open protocols, this<strong>in</strong>terface is usually widely available throughout <strong>the</strong> network. One way©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>to create this <strong>in</strong>terface is us<strong>in</strong>g <strong>the</strong> network socket <strong>in</strong>terface providedwith most TCP/IP implementations. This provides <strong>the</strong> data stream from<strong>the</strong> client to <strong>the</strong> server.Sockets are used to talk to E<strong>the</strong>rnet-enabled PLCs such asModicon’s MODBUS TCP which provides a widely supported socket<strong>in</strong>terface to Modicon and o<strong>the</strong>r PLCs.Distributed ObjectsOne flexible technique used to communicate across a network is<strong>the</strong> distributed object. This is a higher-level protocol that is more standardized.Distributed objects allow software runn<strong>in</strong>g on multiple mach<strong>in</strong>esto <strong>in</strong>teract almost as if it were on a s<strong>in</strong>gle mach<strong>in</strong>e.Distributed object technology allows <strong>the</strong> process<strong>in</strong>g and data to bedistributed to various devices where it may be most needed or mosteffectively handled, <strong>in</strong>clud<strong>in</strong>g distribution to <strong>the</strong> Web applications.Distributed object standards <strong>in</strong>clude <strong>the</strong> common object requestbroker architecture (CORBA), guided by <strong>the</strong> Object Management Groupand <strong>the</strong> distributed component object model (DCOM) which supersedesano<strong>the</strong>r earlier Microsoft standard (COM) component object model.CORBA and DCOM provide similar capabilities for large-scaleand facility <strong>in</strong>tegration (See Table 9-1). For <strong>the</strong> users of Internet technologies,<strong>the</strong> object request broker that enables CORBA, has <strong>the</strong> advantageof be<strong>in</strong>g available on almost every computer platform andoperat<strong>in</strong>g system. This <strong>in</strong>cludes <strong>the</strong> embedded real-time operat<strong>in</strong>gsystems used to control mach<strong>in</strong>es. DCOM is available only on MicrosoftW<strong>in</strong>dows products.Java provides <strong>the</strong> network<strong>in</strong>g support for socket programm<strong>in</strong>g. Adistributed object technique called remote method <strong>in</strong>vocation allowsclients us<strong>in</strong>g browsers to easily <strong>in</strong>terface to servers support<strong>in</strong>g <strong>the</strong>sestandards (Table 9-2).Some <strong>in</strong>dustries have <strong>the</strong>ir own protocols, such as <strong>the</strong> semiconductorequipment communication protocol, SECS/GEM, or <strong>the</strong> pharmaceuticalequipment communication protocol, LECIS.Most embedded and real-time computer platforms support Java <strong>in</strong><strong>the</strong> form of Java Virtual Mach<strong>in</strong>e (JVM). This is an application or librarythat converts <strong>the</strong> portable Java byte code <strong>in</strong>to platform-specific code asit is executed.©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetTable 9-1. Web Intranet Levels with CORBA————————————————————————————————Web browsers with dynamic Web pagesIntranetDynamic Web pages and user <strong>in</strong>terfaces - Automation and controlWeb server - CORBAMonitor<strong>in</strong>g and <strong>Control</strong>Hardware <strong>in</strong>terface————————————————————————————————Table 9-2. Web Intranet Levels with CORBA and JAVA————————————————————————————————Web browsers with dynamic Web pagesIntranetDynamic Web pages and user <strong>in</strong>terfaces - Automation and controlWeb server - Java JVM - CORBAMonitor<strong>in</strong>g and control - C, C++, JavaHardware <strong>in</strong>terface————————————————————————————————Multiple protocols can run on one controller. These Web-enabledcomponents can run on local Intranets us<strong>in</strong>g a choice of open communicationprotocols.Intranet network<strong>in</strong>g can take three basic paths:• E<strong>the</strong>rnet network enabl<strong>in</strong>g,• Web enabl<strong>in</strong>g, and• Server-side logic.E<strong>the</strong>rnet and Web Enabl<strong>in</strong>gIf a device has RS-232 communication, a term<strong>in</strong>al server can beused to convert <strong>the</strong> RS-232 communication to E<strong>the</strong>rnet. Term<strong>in</strong>al serversare available from companies such as Lantronix, Kanematsu and SierraMonitor.These systems can also provide some protocol-conversion capabilities,such as from MODBUS RTU to MODBUS TCP. Some term<strong>in</strong>al serv-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>ers are also Web enabled. They allow user-supplied Web pages andapplets to be downloaded to <strong>the</strong> term<strong>in</strong>al server and accessed from<strong>the</strong>re. These applets can communicate with <strong>the</strong> term<strong>in</strong>al server and <strong>the</strong>nto <strong>the</strong> equipment over <strong>the</strong> E<strong>the</strong>rnet connection, for monitor<strong>in</strong>g, controland o<strong>the</strong>r functions.One use for <strong>the</strong>se applets is to allow tasks such as configuration,troubleshoot<strong>in</strong>g, and ma<strong>in</strong>tenance. The manufacturer provides <strong>the</strong>seresident applets. To configure <strong>the</strong> system, you po<strong>in</strong>t a Web browser at<strong>the</strong> Web server <strong>in</strong> <strong>the</strong> equipment or term<strong>in</strong>al server and configure <strong>the</strong>system from <strong>the</strong> pages shown. Troubleshoot<strong>in</strong>g can be provided as listsof alarms or fault <strong>in</strong>dications with suggested corrective actions.The ma<strong>in</strong>tenance and troubleshoot<strong>in</strong>g can even be handled remotelyover <strong>the</strong> Internet. The use of <strong>the</strong> remote user-<strong>in</strong>terface can provide<strong>in</strong>formation on all aspects of <strong>the</strong> mach<strong>in</strong>e or equipment. The hardware<strong>in</strong>terface provides monitor<strong>in</strong>g of <strong>the</strong> system and could also control<strong>the</strong> equipment. Capabilities well beyond <strong>the</strong> scope of <strong>the</strong> orig<strong>in</strong>al controllercan be <strong>in</strong>corporated simply.There are many PLCs that now <strong>in</strong>clude some capability for embedd<strong>in</strong>gWeb pages and applets with<strong>in</strong> <strong>the</strong> controller itself or with<strong>in</strong> ano<strong>the</strong>rmodule on <strong>the</strong> controller such as an E<strong>the</strong>rnet communicationsmodule. Future advances <strong>in</strong> PLCs will enable support for real-time,server-side Java.This would allow <strong>the</strong> PLC to provide monitor<strong>in</strong>g and real-timecontrol. Web-based <strong>in</strong>terfaces and <strong>in</strong>tegration could be provided directlyfrom <strong>the</strong> PLC, which would program such logic <strong>in</strong> Java on both <strong>the</strong>client and <strong>the</strong> server.Us<strong>in</strong>g <strong>the</strong> technologies of <strong>the</strong> Internet on a local Intranet can providea cost-effective method of improv<strong>in</strong>g <strong>in</strong>tegration (Table 9-3). Manynew controllers may <strong>in</strong>clude embedded Web pages for troubleshoot<strong>in</strong>gand ma<strong>in</strong>tenance.Merg<strong>in</strong>g Information and <strong>Control</strong>In today’s deregulated environment, improv<strong>in</strong>g plant and facilitycompetitiveness is a driv<strong>in</strong>g force beh<strong>in</strong>d most <strong>HVAC</strong> control systemreplacements. <strong>New</strong> control systems not only control plant operations,but also improve <strong>the</strong> access to diagnostic <strong>in</strong>formation that can helpimprove efficiency, reliability and cost effectiveness. This is a change©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetTable 9-3. Information System Levels————————————————————————————————Information from Web Servers and Smart EquipmentClients with Web BrowsersServers throughout <strong>the</strong> facility providepages conta<strong>in</strong><strong>in</strong>g <strong>in</strong>formation from allequipment and database l<strong>in</strong>ksOpen protocolsFacility devices and equipmentExist<strong>in</strong>g equipment E<strong>the</strong>rnet with term<strong>in</strong>al Smart E<strong>the</strong>rnetwith Web server server devicesBacNet, DeviceNet, Fieldbus, LonworksPLCs, smart controllers————————————————————————————————from <strong>the</strong> past, when control systems were typically replaced only after<strong>the</strong>y became so old that replacements parts were ei<strong>the</strong>r unavailable ortoo difficult and costly to obta<strong>in</strong>.<strong>New</strong> <strong>in</strong>formation technology plays such a key role <strong>in</strong> nearly allnew plant control systems that <strong>the</strong>y are sometimes called <strong>in</strong>formationand control systems. These systems <strong>in</strong>tegrate <strong>the</strong> entire plant <strong>in</strong>strumentationand controls, plant computer, and <strong>in</strong>formation systems, alongwith communications and diagnostic capabilities, <strong>in</strong>to an enterprisemanagement system.This enterprise management is a plant <strong>in</strong>frastructure that merges<strong>in</strong>formation technology and <strong>in</strong>strumentation and controls. It acts as aunified <strong>in</strong>formation and control system with a shared <strong>in</strong>formation storehouse.It focuses on <strong>the</strong> advantages of <strong>in</strong>formation and control technologiesto reduce plant costs.Enterprise management <strong>in</strong>cludes operat<strong>in</strong>g <strong>the</strong> plant and track<strong>in</strong>goperat<strong>in</strong>g costs. It also <strong>in</strong>volves <strong>the</strong> use of model<strong>in</strong>g that tests differentscenarios to determ<strong>in</strong>e <strong>the</strong> impact of control and ma<strong>in</strong>tenance actions onoperat<strong>in</strong>g costs. The traditional boundaries between control systems and<strong>in</strong>formation systems are fad<strong>in</strong>g.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Build<strong>in</strong>g Automation and <strong>the</strong> InternetBuild<strong>in</strong>g automation systems are also us<strong>in</strong>g <strong>the</strong> Internet. Systemsthat work with <strong>the</strong> Internet take build<strong>in</strong>g automation systems (BAS) onl<strong>in</strong>e.An <strong>in</strong>teroperable BAS system can send out signals through <strong>the</strong> Internetto a PC that <strong>the</strong> <strong>HVAC</strong> equipment is not work<strong>in</strong>g properly. Problemscan <strong>the</strong>n be acknowledged and corrected remotely. Wea<strong>the</strong>r <strong>in</strong>formationcould also be ga<strong>the</strong>red from <strong>the</strong> Internet and downloaded to a build<strong>in</strong>gsystem, which could <strong>the</strong>n adjust <strong>the</strong> build<strong>in</strong>gs’ systems accord<strong>in</strong>gly.The Internet connection could also be used to check utility pricesacross <strong>the</strong> nation on a regular basis and make adjustments accord<strong>in</strong>g toa build<strong>in</strong>g’s needs.Interoperability provides <strong>the</strong> ability to comb<strong>in</strong>e products frommultiple vendors <strong>in</strong>to flexible, functional systems without <strong>the</strong> need todevelop custom hardware, software, or tools.Wireless TechnologyWireless technology will be everywhere <strong>in</strong> <strong>the</strong> future, and is likely tobe prevalent <strong>in</strong> build<strong>in</strong>g automation. There are smart vend<strong>in</strong>g mach<strong>in</strong>esthat are equipped with wireless modems that notify <strong>the</strong> warehouse whenstocks are depleted, elim<strong>in</strong>at<strong>in</strong>g <strong>the</strong> need for costly, on-site time-<strong>in</strong>tensive<strong>in</strong>ventory checks. Portable ticket stations, which are term<strong>in</strong>als l<strong>in</strong>ked topr<strong>in</strong>ters via wireless modems, are found <strong>in</strong> many airports.The type of wireless technology used depends on <strong>the</strong> maximum distancebetween <strong>the</strong> home base and <strong>the</strong> remote site. If you are roam<strong>in</strong>g abuild<strong>in</strong>g, wireless extensions, such as bridges or routers, can l<strong>in</strong>k you to alocal area network. To cover a wider area, such as a campus or build<strong>in</strong>gcomplex, a series of LANs us<strong>in</strong>g wireless extensions can be used to transferany k<strong>in</strong>d of data. In o<strong>the</strong>r cases, <strong>in</strong>frared or low-power radio equipmentl<strong>in</strong>k<strong>in</strong>g one PC to a portable computer may be used.Wireless technologies run <strong>the</strong> gamut from those based on radio frequenciesand cellular technologies to newer technology such as cellulardigital packet data (CDPD) which is a digital alternative to analog-basedcellular communication technology. Any type of <strong>in</strong>formation that can betransmitted wirelessly can be sent over a coaxial cable or a telephone l<strong>in</strong>e.One of <strong>the</strong> most commonly known wireless technologies dependson radio frequency (RF) signals, which send and receive data us<strong>in</strong>g low-©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> Internetpower transmitters and receivers. RF signals make up a portion of <strong>the</strong>electromagnetic spectrum and are used <strong>in</strong> local-area RF and wide-areaRF implementations.RF transceivers and <strong>in</strong>frared devices are used to create wirelessLANs, which can connect PCs on a peer-to-peer network or connect anode to a LAN. The range for local-area RF equipment starts from 30feet to about 100 yards and some equipment can reach 600 feet to 1/4mile (1,200 feet). Most local-area RF equipment operates <strong>in</strong> <strong>the</strong> Industrial,Scientific, and Medical (ISM) bands, which covers radio frequenciesthat do not require a broadcast<strong>in</strong>g license. The equipment mustmeet certa<strong>in</strong> power and bandwidth restrictions enforced by <strong>the</strong> FCC(Federal Communication Commission).Most wireless LAN equipment falls <strong>in</strong>to two categories: low-speeddevices, which range from about 115 kilobits per second (Kbps) to 250Kbps and <strong>the</strong> high-speed devices that transfer data at 1.25 megabytesper second (10 megabits) or greater, which is about <strong>the</strong> same speed asE<strong>the</strong>rnet.Some wireless connections <strong>in</strong>volve RF transceivers that you attachto <strong>the</strong> serial port on <strong>the</strong> PCs. These devices transfer data at <strong>the</strong> rate of<strong>the</strong> serial port with<strong>in</strong> about a 10-meter range. These small card-sizedtransceivers can transfer files between a desktop PC and notebook PC.They form a two-node network <strong>in</strong> which one mach<strong>in</strong>e, typically <strong>the</strong>portable device, can access resources available to <strong>the</strong> o<strong>the</strong>r unit, such asa pr<strong>in</strong>ter.Infrared transceivers also clip on to a serial port and can transferdata between ports. This allows <strong>the</strong> <strong>in</strong>frared l<strong>in</strong>k on any portable systemto exchange files with o<strong>the</strong>r computers or to access its resources. Thereare also versions that attach to a pr<strong>in</strong>ter, lett<strong>in</strong>g you send files to <strong>the</strong>pr<strong>in</strong>ter via <strong>in</strong>frared technology. Complete wireless-LANs are availablefrom companies such as NCR.The NCR WaveLAN PCMCIA network adapter card fits <strong>in</strong>to <strong>the</strong>mobile user’s notebook, <strong>the</strong>n sends and receives RF signals from a networkbridge which is connected to <strong>the</strong> LAN server. PCMCIA stands for<strong>the</strong> Personal Computer Memory Card International Association. This<strong>in</strong>dustry group determ<strong>in</strong>es <strong>the</strong> standards for all credit card-size peripherals,<strong>in</strong>clud<strong>in</strong>g modems.A key issue <strong>in</strong> wireless LANs is security. Most wireless LANs radiate<strong>the</strong>ir <strong>in</strong>formation <strong>in</strong> a nonencrypted format, so sensitive <strong>in</strong>formationis vulnerable. Encryption should be widely used <strong>in</strong> <strong>the</strong> future.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>IrDA <strong>Control</strong>The Infrared Data Association (IrDA) <strong>Control</strong> technology is a command-and-controlarchitecture for communication with wireless peripheraldevices. It has an operat<strong>in</strong>g range of approximately 7-m. This systemis oriented toward control data packets. It is not <strong>in</strong>tended to passfiles.The IrDA <strong>Control</strong> system is a polled-host topology. The host devicepolls up to eight peripheral devices <strong>in</strong> an ordered sequence, provid<strong>in</strong>gservice requests and handl<strong>in</strong>g <strong>the</strong> peripheral-device responses. The hostcan be personal computers with peripheral devices such as a mouse andkeyboard. After <strong>the</strong> system boots up, <strong>the</strong> keyboard and mouse operatewith <strong>the</strong> host PC <strong>in</strong> <strong>the</strong> same manner as a wired keyboard and mouse.Portable devices are us<strong>in</strong>g low-cost, high-speed, wireless connectivityto support <strong>in</strong>teroperability. Infrared (IR) technology can be embedded<strong>in</strong>to portable devices such as notebook computers, personal digitalassistants (PDAs), wireless phones and digital cameras. It can offer valuable<strong>HVAC</strong> system ma<strong>in</strong>tenance features <strong>in</strong>clud<strong>in</strong>g walk-up <strong>in</strong>terrogation,file transfer and network access. To ensure platform<strong>in</strong>teroperability, <strong>the</strong> Infrared Data Association communications standardis optimized for low-cost, short-range, po<strong>in</strong>t-to-po<strong>in</strong>t communications.The IrDA standard communications protocol is def<strong>in</strong>ed to m<strong>in</strong>imizecode size and maximize efficiency. There are several operat<strong>in</strong>gspeeds and modulation schemes.IR technology <strong>in</strong> wireless systems offers some advantages over RFtechnology. These <strong>in</strong>clude lower communications subsystem parts cost,smaller physical space and no Federal Communications Commission(FCC) test<strong>in</strong>g and approval requirements. IR-equipped devices also supportmore secure data transmissions s<strong>in</strong>ce <strong>the</strong>y provide shorter coverageranges and IR light cannot escape areas enclosed by walls.The IrDA standard covers <strong>in</strong>teroperability by address<strong>in</strong>g <strong>the</strong> softwarelayers and physical modulation schemes needed for transmission.The hardware <strong>in</strong>cludes an IR controller and a transceiver. The controllerhas <strong>the</strong> follow<strong>in</strong>g functions:• <strong>in</strong>terface to <strong>the</strong> system bus,• converts data from parallel to serial,• executes <strong>the</strong> modulation and demodulation needed, and• performs external transceiver control.©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetThe transceiver is an analog device which converts electrical and opticalsignals and uses <strong>the</strong> follow<strong>in</strong>g parts:• Digital-to-analog converter (DAC),• Analog-to-digital converter (ADC),• Preamplifier, and• Ga<strong>in</strong>-control circuitry.In <strong>the</strong> protocol stack, each layer has certa<strong>in</strong> responsibilities. ThePhysical Layer specifies <strong>the</strong> optical characteristics, encod<strong>in</strong>g scheme andfram<strong>in</strong>g def<strong>in</strong>ition. The L<strong>in</strong>k Access Protocol establishes <strong>the</strong> basic connection.An object- exchange protocol which enables <strong>the</strong> transfer of filesand o<strong>the</strong>r objects. There is also serial and parallel port emulation andlocal area network access for notebook computers and o<strong>the</strong>r mobiledevices.The IrDA <strong>Control</strong> specification def<strong>in</strong>es <strong>the</strong> transmission speeds,modulation schemes, and <strong>in</strong>frared (IR) wavelengths of <strong>the</strong> optical signalsemitted by <strong>the</strong> transmitter as well as those signals received by <strong>the</strong>receiver.An encoder and decoder reside <strong>in</strong> <strong>the</strong> bitstream path and handledata cod<strong>in</strong>g as well as <strong>the</strong> modulation process. Data are passed from <strong>the</strong>controll<strong>in</strong>g device to <strong>the</strong> encoder/decoder and <strong>the</strong>n on to <strong>the</strong> transceiver.A 1.5-MHz subcarrier process and <strong>the</strong> cod<strong>in</strong>g of <strong>the</strong> transmissionsignals are used to m<strong>in</strong>imize <strong>in</strong>terference with o<strong>the</strong>r transmission systems.When an action is to be completed, <strong>the</strong> controller makes a decisionand sends data out through <strong>the</strong> IR l<strong>in</strong>k to <strong>the</strong> o<strong>the</strong>r device. When polledby <strong>the</strong> host, <strong>the</strong> device responds, <strong>in</strong>form<strong>in</strong>g <strong>the</strong> host that it has <strong>in</strong>formationto send. The host <strong>the</strong>n requests <strong>the</strong> <strong>in</strong>formation and <strong>the</strong> devicesends it.The controller passes <strong>the</strong> data on to <strong>the</strong> modem function, whichhandles <strong>the</strong> cod<strong>in</strong>g and modulation. The transceiver performs <strong>the</strong> electrical-to-opticaltranslation between systems.Two types of packets are used <strong>in</strong> <strong>the</strong> IrDA <strong>Control</strong> system shortpackets and long packets. The 1.5-MHz subcarrier pulses <strong>in</strong> <strong>the</strong> data bitsare transmitted for a logical “1” and are not transmitted for a logical “0.”The host manages its communications with multiple peripheralson a time-division basis, us<strong>in</strong>g polled-response handshakes. The hostpolls all of <strong>the</strong> peripherals to determ<strong>in</strong>e which items need to be serviced.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The peripherals respond to <strong>the</strong> poll from <strong>the</strong> host, and do not <strong>in</strong>itiatetransmission. The peripheral devices do not transmit unless <strong>the</strong>y aregiven response permission.An exception is when <strong>the</strong> host is <strong>in</strong> sleep mode and a peripheral<strong>in</strong>itiates a wake-up call for service. Then <strong>the</strong> host steps back <strong>in</strong>to <strong>the</strong>poll<strong>in</strong>g sequence and looks for devices to service. If <strong>the</strong>re is not anytransmission between <strong>the</strong> host and any peripheral for a set time, <strong>the</strong> hostaga<strong>in</strong> enters <strong>the</strong> sleep mode. Hosts do not communicate with each o<strong>the</strong>r.If multiple hosts are used, <strong>the</strong>y detect each o<strong>the</strong>r and di<strong>the</strong>r <strong>the</strong>ir transmissionsto reduce <strong>the</strong> chance of <strong>in</strong>terference.The requirements for IrDA <strong>Control</strong> communication vary depend<strong>in</strong>gon <strong>the</strong> application. The sleep mode is used to m<strong>in</strong>imize power consumptionwhen a host and its peripherals do not need to communicate.The normal operational mode supports peripherals that may have differentbandwidth requirements.PagersAlphanumeric pagers are used for short messages. They usuallydisplay a few words or <strong>the</strong> caller’s number. For lengthier messages, youcan plug a PCMCIA device <strong>in</strong>to your notebook or PDA to receive wirelesse-mail. PCMCIA pagers can serve as pocket-size pagers and <strong>the</strong>ycan be plugged <strong>in</strong>to a notebook when you want to read and composelonger messages.Wide-area RF equipment may utilize one-way and two-way dataflow. One-way data flow is <strong>the</strong> usual technology that is used for digitalelectronic pagers. In a one-way system, a carrier service, such as SkyTel,transmits a message and an address (<strong>the</strong> pager ID) over <strong>the</strong> geographicarea it serves.The pager recognizes its ID, <strong>the</strong>n receives and displays <strong>the</strong> <strong>in</strong>com<strong>in</strong>gdigital message. Two-way service is similar except that <strong>the</strong> receiv<strong>in</strong>gunit also sends data back to <strong>the</strong> carrier, which forwards <strong>the</strong> data toano<strong>the</strong>r computer on <strong>the</strong> LAN. There are also PCMCIA cards that canreceive and hold pager calls.Wireless RF modems can be used to connect portable computers toa LAN. A cellular modem or modem/adapter that uses analog audiosignals to convey digital <strong>in</strong>formation is called a voice-band modem or ananalog cellular modem.©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetCircuit Switch<strong>in</strong>gThis is <strong>the</strong> common type of telephone data communications, wheretwo users or <strong>the</strong>ir send<strong>in</strong>g and receiv<strong>in</strong>g modems have <strong>the</strong> exclusiveand full use of a telephone circuit or cellular channel until <strong>the</strong> connectionis released. Circuit switch<strong>in</strong>g modems can be analog or digital.Unlike circuit switch<strong>in</strong>g, with packet switch<strong>in</strong>g no circuit is used on adedicated basis. Data packets are sent along any channel or l<strong>in</strong>e availableat <strong>the</strong> time <strong>the</strong>y are received.Digital cellular modems use digital ra<strong>the</strong>r than analog signals toconvey <strong>in</strong>formation. The advantage is that digital elim<strong>in</strong>ates static, l<strong>in</strong>enoise and signal loss dur<strong>in</strong>g hand-offs. These handoffs occurs when cellular-basedcalls are transferred from one cell site to ano<strong>the</strong>r as <strong>the</strong> userroams. Roam<strong>in</strong>g occurs when you use a cellular phone <strong>in</strong> a city o<strong>the</strong>rthan <strong>the</strong> one <strong>in</strong> which you orig<strong>in</strong>ally set up your account.TDMA (Time Division Multiple Access) is a multiplex<strong>in</strong>g methodfor digital cellular phones <strong>in</strong> which each user is assigned a time slot ona channel. Often, ten users are assigned to a channel.Code Division Multiple Access (CDMA) is a multiplex<strong>in</strong>g methodfor digital cellular phones that uses a spread-spectrum technique. Allspeech bits (or phone calls) are assigned codes that are encrypted, transmitted,decrypted, <strong>the</strong>n reassembled. By spread<strong>in</strong>g <strong>the</strong> signals across <strong>the</strong>same broad frequency spectrum and assign<strong>in</strong>g each a unique code,CDMA allows more calls to occupy <strong>the</strong> same space as each cellularchannel is shared.RF ModemsRadio frequency modems operate <strong>in</strong> <strong>the</strong> radio band, which is <strong>the</strong>portion of <strong>the</strong> electromagnetic spectrum from 100 kHz to 20 GHz. Widearearadio-frequency services use an RF modem, which transmits andreceives data <strong>in</strong> packets 128 bytes <strong>in</strong> size.The advantage of packet data is that it optimizes throughput evenunder adverse l<strong>in</strong>e conditions. The send<strong>in</strong>g modem sends a series ofpackets, without wait<strong>in</strong>g to see if each is received successfully. If a packetis corrupted by noise or <strong>in</strong>terference, <strong>the</strong> receiver asks <strong>the</strong> send<strong>in</strong>g modemto resend <strong>the</strong> corrupt packet. The send<strong>in</strong>g modem will cont<strong>in</strong>ue tosend<strong>in</strong>g new packets until it receives this request. It <strong>the</strong>n resends <strong>the</strong> errantpacket and resumes normal transmission. S<strong>in</strong>ce each packet is num-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>bered, <strong>the</strong>y can be resent quickly, even out of order and correctly reassembledby <strong>the</strong> receiv<strong>in</strong>g modem without warm<strong>in</strong>g <strong>the</strong> throughput.The Intel Wireless Modem uses firmware that allows <strong>the</strong> modem touse standard AT modem commands. O<strong>the</strong>r wireless modems may requirespecial software to operate s<strong>in</strong>ce <strong>the</strong> data packets are assembledand disassembled by <strong>the</strong> computer. AT-type RF modems can be used byany popular communications package s<strong>in</strong>ce <strong>the</strong> packet assembly/disassembly(PAD) hardware is right <strong>in</strong> <strong>the</strong> modem.Circuit-switched Cellular TechnologyVoice-band cellular or circuit-switched cellular systems use cellulartelephone networks, <strong>the</strong>ir land l<strong>in</strong>es and microwave technology to make<strong>the</strong> connection. Cellular phones are part of <strong>the</strong> mobile radio-telephonesystem that transmits data over a range of geographic sites, called cellswhich use low-power transmitters and receivers. The cellular phone cantransmit data <strong>in</strong>stead of voice us<strong>in</strong>g <strong>the</strong> audio signals produced by amodem. It is similar to a connection with two land-l<strong>in</strong>e-based modems.But, you can remotely access your LAN or call o<strong>the</strong>r mobile computers.You substitute a cellular phone for its land-l<strong>in</strong>e-based version.The equipment needed for cellular data transmission is a specialtype of modem. The cellular modem connects to a cellular phone. Thereare also cellular adapters, which connect to both <strong>the</strong> modem and <strong>the</strong>cellular phone.Most cellular modems can also use land l<strong>in</strong>es to transmit data andto send and receive fax images. These elim<strong>in</strong>ate <strong>the</strong> need for a separateland-l<strong>in</strong>e-based modem.Not all cellular phones, modems, and adapters are compatible. Acellular modem or adapter must be able to control <strong>the</strong> bus of <strong>the</strong> cellularphone. Some companies such as NEC and Mitsubishi use open specificationswhich are widely supported by various cellular modem andadapter vendors. O<strong>the</strong>rs are not quite as open, and <strong>the</strong>ir modems andcellular phones must be used toge<strong>the</strong>r.Cellular ProblemsCellular channels can have problems with signal quality. Landbasedtelephone l<strong>in</strong>es offer more consistent quality with m<strong>in</strong>imal noise.©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetWhen noise is encountered it is usually due to a faulty connection.This noise can result <strong>in</strong> a lower-than-usual transmission rate. Cellularchannels are vulnerable to noise and <strong>in</strong>terference which can change<strong>in</strong> <strong>in</strong>tensity and frequency. Throughput can drop off quickly and <strong>the</strong>error correction and speed-sett<strong>in</strong>g techniques used for land-l<strong>in</strong>e telephoneswill not help.The throughput may be cut <strong>in</strong> half when a large number of dataerrors are corrected. Compared to <strong>the</strong> faster modems <strong>the</strong> throughputseems slow and more costly, especially when send<strong>in</strong>g and receiv<strong>in</strong>glarge files.Cell ProtocolSeveral companies have developed special cellular protocols.Microcom created an extension to its MNP-10 protocol. Unlike modems,which try <strong>the</strong> highest speeds first and <strong>the</strong>n settle for lower ones until areliable connection is achieved, MNP-10 starts at <strong>the</strong> low end and worksits way up to <strong>the</strong> highest reliable rate. This allows modems to connectfaster. MNP-10 boosts performance by shr<strong>in</strong>k<strong>in</strong>g and expand<strong>in</strong>g <strong>the</strong> sizeof a data block as l<strong>in</strong>e conditions degenerate or improve. ZyXEL hasmodems with its ZyCellular protocol. AT&T Paradyne uses ETC (enhancedthroughput cellular).Cellular SecurityCellular telephone traffic, <strong>in</strong>clud<strong>in</strong>g data from cellular modems, iseasy to <strong>in</strong>tercept with <strong>in</strong>expensive equipment. In <strong>the</strong> past even RadioShack sold receivers capable of receiv<strong>in</strong>g cellular transmissions. Federallaws now prevent <strong>the</strong> sale of such devices, but many units still rema<strong>in</strong><strong>in</strong> use. While <strong>the</strong> chances of <strong>in</strong>terception may be small, <strong>the</strong>y are still veryreal. Unless some form of encryption is used, cellular modem users needto be careful about what <strong>the</strong>y send over a cellular phone.CDPDThe advent of digital cellular phone systems provided a wholenew class of wireless technology called CDPD (cellular digital packetdata). CDPD is compell<strong>in</strong>g bus<strong>in</strong>esses and consumers to convert from©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>analog to digital cellular. CDPD works by transmitt<strong>in</strong>g 128-byte blocksof data over <strong>the</strong> cellular phone system, look<strong>in</strong>g for unused time <strong>in</strong> <strong>the</strong>digital cellular channels network, which is typically idle about 30% of<strong>the</strong> time. Dur<strong>in</strong>g <strong>the</strong> idle period, CDPD modems send short bursts ofdata packets to <strong>the</strong> cellular network. A cellular adapter connects a standardmodem to a cellular phone (via <strong>the</strong> RJ-11 jack) and enables it to beused for cellular communication.Unlike voice communications, CDPD automatically <strong>in</strong>cludes errordetectionand retransmission so that no data are lost. It also has dataencryption to secure <strong>the</strong> transmissions. Ano<strong>the</strong>r advantage over RFmodems and circuit-switched cellular, is that CDPD modems can exchangedata with a designated host or service provider or be configuredto work with any land-l<strong>in</strong>e network and modem.CDPD modems use <strong>the</strong> same circuitry as digital cellular phonesand some can double as digital cellular phones. Some modems are designedto work with portable computers like <strong>the</strong> IBM Th<strong>in</strong>kPad. O<strong>the</strong>rsare more flexible and work with any PC system.Satellite TechnologySatellite technology can connect almost any two po<strong>in</strong>ts <strong>in</strong> <strong>the</strong>world. Satellite equipment for a satellite-based phone <strong>in</strong>cludes <strong>the</strong> dish,stand, and transceiver. Some models only transmit Teletype and voice.Satellite units are called VSATs (very small aperture term<strong>in</strong>als).Wireless LANsFor local area wireless access between two mach<strong>in</strong>es, <strong>the</strong> hardwarecan be <strong>in</strong>frared or RF transceivers. Wireless local area networks(WLANs) may show significant growth. There are extensions for <strong>the</strong>802.11 standard for E<strong>the</strong>rnet-speed WLANs. Data rates are 20 Mb/s andhigher <strong>in</strong> <strong>the</strong> 5-GHz frequency range and 10 Mb/s <strong>in</strong> <strong>the</strong> 2.4-GHz band.The Wireless LAN Alliance (WLANA) is a not-for-profit consortium ofWLAN vendors which has pushed for <strong>the</strong> standard. It removes mostobstacles to wireless LAN <strong>in</strong>teroperability.The modulation scheme used for <strong>the</strong> 2.4-GHz band was developedby Lucent Technologies and Harris Corporation. It is known as complementarycode key<strong>in</strong>g (CCK). This technology works <strong>in</strong> a wide range of©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> Internetdifferent environments, <strong>in</strong>clud<strong>in</strong>g offices, retail spaces, and warehouses.At slower speeds, <strong>the</strong> system shifts <strong>in</strong>to a fall-back mode mak<strong>in</strong>g itpossible to <strong>in</strong>crease <strong>the</strong> coverage areas as it falls back to lower data rates.This works on direct-sequence, spread-spectrum (DSSS) technology.This fall-back is similar to cell phones, when <strong>the</strong>re is a hand-offfrom one base station to ano<strong>the</strong>r as a signal gets weaker and <strong>the</strong>n stronger.In a wireless LAN, you essentially talk to an access po<strong>in</strong>t somewhere<strong>in</strong> <strong>the</strong> build<strong>in</strong>g, connected to <strong>the</strong> wired network. As you get far<strong>the</strong>raway from it, ra<strong>the</strong>r than los<strong>in</strong>g connectivity, it downshifts to alower data rate, keep<strong>in</strong>g <strong>the</strong> connection.In multipath environments <strong>the</strong>re are reflections which cause a delay-spreadissue. When two wireless units communicate with each o<strong>the</strong>r,<strong>the</strong>re will be reflected signals that will arrive at <strong>the</strong> antenna at latertimes. The delay spread is measured <strong>in</strong> nanoseconds and determ<strong>in</strong>eshow long <strong>the</strong> radio will wait for <strong>the</strong> ma<strong>in</strong> signal to arrive. The longer <strong>the</strong>delay spread, <strong>the</strong> more data that can be received and <strong>the</strong> greater <strong>the</strong>accuracy of <strong>the</strong> received signal. As you <strong>in</strong>crease delay spread, you <strong>in</strong>crease<strong>the</strong> complexity of <strong>the</strong> unit and have to add equalizers to handle<strong>the</strong> reflected signals.Wireless LAN products may use different modulation schemes,however <strong>the</strong>re is a maturity <strong>in</strong> <strong>the</strong> 2.4-GHz technology. In <strong>the</strong> future wewill see products at 5-GHz that match <strong>the</strong> specifications and requirementsseen presently at 2.4-GHz. At 2.4-GHz <strong>the</strong>re is <strong>the</strong> advantage ofbe<strong>in</strong>g close enough to <strong>the</strong> 1900-MHz personal communications services(PCS) phone band to be able to share low-cost components like filtersand VCOs.In older units, <strong>the</strong>re are between 200 and 400 components—<strong>in</strong>clud<strong>in</strong>gfilters, resistors, capacitors, voltage-controlled oscillators (VCOs)and <strong>the</strong> <strong>in</strong>tegrated circuits (ICs) on a PCMCIA card. In newer units <strong>the</strong>component count is down to 75.As <strong>the</strong> trend to a high-data-rate pipel<strong>in</strong>e to <strong>the</strong> home beg<strong>in</strong>s toevolve, through cable modems and ADSL, <strong>the</strong> problem is that once <strong>the</strong>data gets to <strong>the</strong> home, <strong>the</strong>re is no practical way to move it around. Itgoes <strong>in</strong>to one PC, which is ample if <strong>the</strong>re is only one user. But, <strong>the</strong>re arealmost 20 million homes <strong>in</strong> North America with multiple PCs. In mostcases, <strong>the</strong>se are not on a wired network. These could be wirelessly connectedgiv<strong>in</strong>g every user <strong>in</strong> <strong>the</strong> household access to that high-data-ratel<strong>in</strong>e. WLANs can make it possible for multiple users to use <strong>the</strong> sameInternet service provider (ISP) account. The wireless LAN <strong>in</strong>dustry is©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>matur<strong>in</strong>g, has standards <strong>in</strong> place, and is mov<strong>in</strong>g toward <strong>the</strong> next evolution<strong>in</strong> products.Pocket CommunicationsWireless systems devices are evolv<strong>in</strong>g as hand-held, multifunctional,portable communicators comb<strong>in</strong>e <strong>the</strong> capabilities of digital cellularphones with personal digital assistants (PDAs). The latest designs<strong>in</strong>tegrate features from multiple communications products <strong>in</strong>clud<strong>in</strong>gdigital cell phones, pagers, data/fax modems, voice messag<strong>in</strong>g andhigh-end PDAs <strong>in</strong>to a s<strong>in</strong>gle hand-held unit. Each of <strong>the</strong>se functions istypically handled by separate signal-process<strong>in</strong>g <strong>in</strong>tegrated circuits (ICs)called digital-signal-processors (DSPs).Integrat<strong>in</strong>g <strong>the</strong>se functions <strong>in</strong>to a s<strong>in</strong>gle DSP requires signal-process<strong>in</strong>gperformance beyond <strong>the</strong> capabilities of traditional DSPs whichuse DSP assembly code and required highly skilled, specialized programmers.This time-consum<strong>in</strong>g and expensive method results <strong>in</strong> codethat is difficult to ma<strong>in</strong>ta<strong>in</strong>.<strong>New</strong> more-efficient DSP architectures have appeared which usetechniques and architectures from high-performance microprocessors.Some examples are superscalar/reduced-<strong>in</strong>struction-set-computer(RISC) and very-long-<strong>in</strong>struction-word (VLIW) architectures. Both of<strong>the</strong>se can provide 10 times <strong>the</strong> performance of traditional DSPs. TheseDSPs have <strong>the</strong> follow<strong>in</strong>g characteristics:• wired functions data/fax modem,• wireless functions cellular phone, pag<strong>in</strong>g, and voice messag<strong>in</strong>g,• telephony functions telephone-answer<strong>in</strong>g with digital record<strong>in</strong>gand playback.The development of wireless solutions comb<strong>in</strong>es <strong>in</strong>tegrated-circuittechnology advancements with system-level analysis of <strong>the</strong> desired application.Innovative IC designs follow<strong>in</strong>g a cont<strong>in</strong>ually improv<strong>in</strong>g processtechnology allow wireless manufacturers to provide cost-effectiveproducts. Advancements <strong>in</strong> ICs for wireless applications <strong>in</strong>clude:• faster digital-signal-processors (DSPs) with more million <strong>in</strong>structionsper second (MIPS),• programmability,©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> Internet• <strong>in</strong>creased levels of <strong>in</strong>tegration with<strong>in</strong> <strong>the</strong> DSP,• larger amounts of on-chip memory,• <strong>in</strong>telligent <strong>in</strong>put/output (I/O) peripherals and,• coprocessor for accelerat<strong>in</strong>g specialized functions.A cellular base transceiver station (BTS) serves as <strong>the</strong> <strong>in</strong>terfacebetween mobile term<strong>in</strong>als and <strong>the</strong> rest of <strong>the</strong> cellular network. The frequencyspectrum is allocated <strong>in</strong> 200-kHz channels, with each channel’sbandwidth support<strong>in</strong>g up to eight users concurrently.The BTS conta<strong>in</strong>s one transceiver for each channel that is allocatedto <strong>the</strong> cell. The BTS must send, receive, and process all of <strong>the</strong> cellulartransmissions <strong>in</strong> <strong>the</strong> cell. Besides <strong>the</strong> speech or data <strong>in</strong>cluded <strong>in</strong> <strong>the</strong>cellular transmissions, tim<strong>in</strong>g, synchronization, and control data areused to make <strong>the</strong> cellular network function nearly seamlessly and transparentlyto <strong>the</strong> cell phone users as <strong>the</strong>y roam among <strong>the</strong> cells.The size of a cell depends on <strong>the</strong> terra<strong>in</strong> and <strong>the</strong> amount of call<strong>in</strong>gtraffic. Cell sizes range from a maximum radius of approximately 35 km(macrocells) to a few kilometers (microcells) or several hundred meters(picocells). Picocells are needed <strong>in</strong> densely populated areas.In a channel, a time division multiple access (TDMA) format isused so that all users share <strong>the</strong> same bandwidth. The TDMA has timeslots for eight users. The cellular data are transmitted <strong>in</strong> bursts and eachburst fits <strong>in</strong>to an allocated time slot.The base-station controller (BSC) controls BTS functions for severalcells. It hands off communications from one BTS to ano<strong>the</strong>r as a communicat<strong>in</strong>gmobile term<strong>in</strong>al travels from cell to cell. It also performs speechcod<strong>in</strong>g and rate adoption to seamlessly connect <strong>the</strong> calls between <strong>the</strong>cellular network and <strong>the</strong> public-switched (land-based) network.The transmit function <strong>in</strong>volves channel encod<strong>in</strong>g, <strong>in</strong>terleav<strong>in</strong>g, andencryption. The receive path must perform equalization, de<strong>in</strong>terleav<strong>in</strong>g,channel decod<strong>in</strong>g, and decryption.Speech Cod<strong>in</strong>gIn <strong>the</strong> transmit path, <strong>the</strong> digitized speech is first encoded. Speechencod<strong>in</strong>g compresses <strong>the</strong> speech through process<strong>in</strong>g that uses speechmodel<strong>in</strong>g and prediction. Speech encod<strong>in</strong>g also detects pauses <strong>in</strong> speechand ensures that <strong>the</strong> data generated dur<strong>in</strong>g <strong>the</strong> pauses will not be transmitted.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>The channel encoder packs <strong>the</strong> data of each speech frame wi<strong>the</strong>rror-correction <strong>in</strong>formation so that <strong>the</strong> data are immune to <strong>the</strong> <strong>in</strong>terferencesthat can occur when signals are transmitted over <strong>the</strong> air.The data are encrypted to ensure security dur<strong>in</strong>g cellular transmissions.Encryption uses <strong>the</strong> XOR<strong>in</strong>g of <strong>the</strong> data bits with a key sequencegenerated by an encryption algorithm.Equalization is used because of <strong>the</strong> multipath effects of <strong>the</strong> receivedsignal. A transmitted signal may take multiple paths to <strong>the</strong> receiverantenna which creates multiple versions of <strong>the</strong> same signal. Eachof <strong>the</strong>se arrives at slightly different times and with different signalstrengths. An error-correction coprocessor operates <strong>in</strong> parallel with <strong>the</strong>DSP and accelerates <strong>the</strong> equalization and <strong>the</strong> channel cod<strong>in</strong>g.To assist <strong>the</strong> receiver <strong>in</strong> detect<strong>in</strong>g <strong>the</strong> true signal from <strong>the</strong> multipleversions, <strong>the</strong> transmitter encodes a tra<strong>in</strong><strong>in</strong>g sequence <strong>in</strong>to <strong>the</strong> burst. Thereceiver’s equalizer knows <strong>the</strong> tra<strong>in</strong><strong>in</strong>g sequence and uses it to identify<strong>the</strong> transmitted signal.The trend is to <strong>in</strong>tegrate <strong>the</strong> DSP with analog-to-digital converters(ADCs), digital-to-analog converters (DACs), a clock syn<strong>the</strong>sizer, andsystem control units that <strong>in</strong>clude a memory controller, an <strong>in</strong>terrupt controller,and serial I/O controllers. The functionality that is usually <strong>in</strong>tegratedacross an entire chip set is created on a s<strong>in</strong>gle chip.The BTS must be software upgradeable <strong>in</strong> <strong>the</strong> field so that it can beeasily reconfigured to support evolv<strong>in</strong>g standards over its life cycle. Onchipflash memory is used so that application software can be loadedand debugged on <strong>the</strong> spot.The protocols of narrowband personal communication services (N-PCS) <strong>in</strong>clude Motorola’s FLEX. The N-PCS frequencies lie <strong>in</strong> narrowbandwidths just above 900 MHz. Some of this spectrum is allocated to12.5-kHz pag<strong>in</strong>g response channels, allow<strong>in</strong>g pagers to transmit repliesto received messages. Four-level frequency shift key<strong>in</strong>g (FSK) modulationis used by FLEX. A synchronous protocol allows <strong>the</strong> pager to switchon periodically (every few m<strong>in</strong>utes) and check if a message is be<strong>in</strong>g sent.Decod<strong>in</strong>g starts with frame synchronization where <strong>the</strong> decoderaligns its receive buffer to <strong>the</strong> frames <strong>in</strong> <strong>the</strong> received bit str<strong>in</strong>g. Datadecod<strong>in</strong>g algorithms allow <strong>the</strong> extraction of message data, error-controldata, and ID data from <strong>the</strong> frames. The error control code is used tocorrect errors <strong>in</strong> <strong>the</strong> frame data. In some protocols, such as <strong>the</strong> EuropeanRadio Messag<strong>in</strong>g System (ERMES) and <strong>the</strong> Motorola FLEX pag<strong>in</strong>g protocol,de<strong>in</strong>terleav<strong>in</strong>g is also performed.©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetThe address field encoded <strong>in</strong>to <strong>the</strong> frames determ<strong>in</strong>es if <strong>the</strong> messageis for <strong>the</strong> particular pager. If not, <strong>the</strong> decoder <strong>in</strong>forms <strong>the</strong> controllerand <strong>the</strong> controller conserves power by shutt<strong>in</strong>g off parts of <strong>the</strong> receiver.The message data may be passed to <strong>the</strong> controller, which <strong>the</strong>n delivers<strong>the</strong> <strong>in</strong>formation to <strong>the</strong> user ei<strong>the</strong>r by a liquid-crystal display (LCD) orspeaker.Wireless and wired functions are similar <strong>in</strong> some ways and <strong>in</strong> o<strong>the</strong>rways <strong>the</strong>y are not. Send<strong>in</strong>g data over a wireless channel poses someproblems due to <strong>the</strong> channel’s corruptive nature, compared to datatransmission over phone l<strong>in</strong>es, which offers a relatively clean channel.Compared to voice, data transmission via a wireless channel hastwo added complexities every bit is equally significant and must berecovered at <strong>the</strong> receiver, and <strong>the</strong> data rates are much higher.The multifunctional communicator’s DSP system must be capableof on-<strong>the</strong>-fly reconfiguration. The multiband and multimode capabilitiesof cellular-phones require <strong>the</strong> DSP to reconfigure <strong>the</strong> phone depend<strong>in</strong>gon <strong>the</strong> user’s location. There are different carriers and standards thatmay be available locally. The software must reconfigure <strong>the</strong> unit tohandle a function like narrowband cellular phone, digital audio receiver,or wideband high-speed data transfer.Multiband capability means that <strong>the</strong> cell phone must be able toperform a search algorithm that determ<strong>in</strong>es <strong>the</strong> available air <strong>in</strong>terface.Multimode capability determ<strong>in</strong>es <strong>the</strong> carrier, cellular standard, andquality level available.The DSP also performs filter<strong>in</strong>g that was previously handled by<strong>the</strong> RF transmitter/receiver. This allows <strong>the</strong> DSP to control <strong>the</strong> operat<strong>in</strong>gfrequency band of <strong>the</strong> unit. This filter<strong>in</strong>g takes large amounts of data athigh speed, which requires a high DSP throughput.One of <strong>the</strong> algorithms used <strong>in</strong> digital cellular phones is a speechcodec. This algorithm takes digitized speech and compresses it to a lowerbit rate to conserve transmission bandwidth. Ano<strong>the</strong>r is error correction.The error protection and correction technique is called convolutional encod<strong>in</strong>gand decod<strong>in</strong>g, which adds redundancy and structure to <strong>the</strong> compressedvoice data to correct for bit errors. Convolutional decod<strong>in</strong>g uses<strong>the</strong> Viterbi algorithm to recover data bits from <strong>the</strong> received data. In asymmetrical-digital-subscriber-l<strong>in</strong>e(ADSL) systems data rates are so highthat a Reed-Solomon algorithm is comb<strong>in</strong>ed with bit <strong>in</strong>terleav<strong>in</strong>g and acyclic redundancy check (CRC) to protect and recover data.Equalization is used <strong>in</strong> wireless receivers to clean up <strong>the</strong> received©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>data stream of digital data. Transmitt<strong>in</strong>g data <strong>in</strong> a mobile environmentwill corrupt <strong>the</strong> transmitted signal due to multipath and Doppler frequencyshifts. An equalizer uses <strong>the</strong> Viterbi algorithm to reverse <strong>the</strong>seeffects and resynchronize <strong>the</strong> bit stream.Next-generation DSPs are enabl<strong>in</strong>g <strong>the</strong> next generation of PDAs byprovid<strong>in</strong>g <strong>the</strong> horsepower required to implement multiple tasks on as<strong>in</strong>gle device. Quality voice storage and playback are part of <strong>the</strong> PDA of<strong>the</strong> future. The DSP can compress, store, and reconstruct speech. If <strong>the</strong>DSP is perform<strong>in</strong>g speech cod<strong>in</strong>g, speech samples are transferred between<strong>the</strong> DSP and <strong>the</strong> voice-band codec.S<strong>in</strong>ce <strong>the</strong> system must be reconfigurable, it must be programmableand capable of handl<strong>in</strong>g multiple tasks simultaneously and shift<strong>in</strong>g tonew tasks as needed. This means <strong>the</strong> DSP must offer flexiblemultitask<strong>in</strong>g support for <strong>the</strong> simultaneous operation of functions.The PDA of <strong>the</strong> future uses a group of DSP algorithms that aredynamically executed. The development of <strong>the</strong>se algorithms usuallybeg<strong>in</strong>s with a high-level-language (HLL) model. A compiler allows <strong>the</strong>port<strong>in</strong>g of <strong>the</strong> model to assembly language with some hand-cod<strong>in</strong>gsupport to optimize <strong>the</strong> f<strong>in</strong>al program.Next-generation DSP architectures are based on superscalar mach<strong>in</strong>esto provide <strong>the</strong> required throughput needed. Superscalar DSPs usemultiple execution units coupled with high data bandwidth to executemany <strong>in</strong>structions per cycle.Superscalar DSPs are scaleable s<strong>in</strong>ce <strong>the</strong> architecture can be tailoredto an application by chang<strong>in</strong>g <strong>the</strong> number or type of executionunits to fit particular needs. Superscalar devices will cont<strong>in</strong>ue to evolveto address <strong>the</strong> cont<strong>in</strong>u<strong>in</strong>g demands of wireless applications.Data ExchangePersonal digital assistants (PDAs) along with pagers and smartcellular telephones can share W<strong>in</strong>dows data. There have been a numberof advances <strong>in</strong> this explod<strong>in</strong>g world of m<strong>in</strong>iature, mobile electronics.Apple’s <strong>New</strong>ton MessagePad and <strong>the</strong> Sharp Expert Pad are notwed to any one operat<strong>in</strong>g system. The W<strong>in</strong>dows version of <strong>the</strong> <strong>New</strong>tonConnection Kit lets you transfer data between this <strong>in</strong>frared-equippedPDA and W<strong>in</strong>dows systems. Some PCMCIA-based <strong>New</strong>ton applicationsare also available <strong>in</strong> W<strong>in</strong>dows versions so you can run <strong>the</strong> same softwareon both mach<strong>in</strong>es.©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetThe first PDAs from Apple, Sharp, Tandy and Casio were designedas comput<strong>in</strong>g devices, with communications available as an option.Later devices like <strong>the</strong> Simon cellular telephone were designed as cellphones with computational functions added <strong>in</strong>. Developed by IBM, <strong>the</strong>Simon used a tap-sensitive LCD screen that you use to access built-<strong>in</strong>features or to dial a number. Most PDAs prefer PCMCIA <strong>in</strong>terfaces.BellSouth’s Simon cellular phone uses a predictive keypad. Insteadof cramm<strong>in</strong>g a full set of t<strong>in</strong>y characters on <strong>the</strong> screen, it displays on apen-<strong>in</strong>put screen only <strong>the</strong> characters most likely to follow <strong>the</strong> previouscharacter you entered. If it guesses <strong>in</strong>correctly, you hit an icon to call upano<strong>the</strong>r set of possibilities.Computers are gett<strong>in</strong>g more portable with units like Xybernault’swearable PC. It has a 233-MHz processor, 128 MB of RAM and a 4.3 GBhard drive. The 28-ounce processor units attaches to your belt and <strong>the</strong>keyboard can be strapped to your arm. Qual Comm’s PdQ Smartphonecomb<strong>in</strong>es a 3 Com Palm III and a Qual Comm digital cellular phone.You can dial directly from <strong>the</strong> Palm III address book.Internet phones are ano<strong>the</strong>r develop<strong>in</strong>g area. PC-based Internetphones use programs that let you talk to o<strong>the</strong>rs on <strong>the</strong> Internet. Youneed a sound card, speakers, microphone and modem. IDT’s Net 2Phone is a program that connects your computer to a real phone.<strong>New</strong> generations of digital cellular modems will use <strong>the</strong> entirechannel for data and connect with any o<strong>the</strong>r modem. These modemsus<strong>in</strong>g digital technology promise to be more immune to noise and tooffer higher data throughput rates.Third-generation WirelessThird-generation wireless phones will drive <strong>the</strong> convergency ofcomput<strong>in</strong>g while creat<strong>in</strong>g a range of new wideband wireless multimediaproducts that are capable of deliver<strong>in</strong>g not only voice, but also videoand data-<strong>in</strong>tensive <strong>in</strong>formation, such as real-time Internet access.QUALCOMM has been <strong>in</strong>volved <strong>in</strong> next-generation mobile phonestandards which would <strong>in</strong>tegrate <strong>the</strong> well-entrenched Global System forMobile Communications (GSM) network with a standard known ascdmaOne, which depends on code-division multiple access (CDMA).Ericsson has been work<strong>in</strong>g with Japan Telecom to develop widebandCDMA (WCDMA) as an enabl<strong>in</strong>g technology for third-generation services.These new, emerg<strong>in</strong>g services may be developed for time-divi-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>sion-multiple-access (TDMA), as well as GSM and Japan’s PersonalDigital Cellular (PDC) service. Vodaphone, which is a major UnitedK<strong>in</strong>gdom mobile phone service provider has conducted field trials of asystem that <strong>in</strong>tegrates <strong>the</strong> GSM network with <strong>the</strong> cdmaOne <strong>in</strong>terface.Software-def<strong>in</strong>able radios are ano<strong>the</strong>r possible approach.While <strong>the</strong>re is not a world phone, <strong>the</strong>re is growth <strong>in</strong> easy-to-upgradesoftware-based handsets. As you move around <strong>the</strong> world, youwould load different software to adapt to <strong>the</strong> phone systems you wantto use. This still requires huge doses of <strong>in</strong>tegration and computer power.Services based on <strong>the</strong> Universal Mobile Telecommunications StandardInstitute (UMTS) should be runn<strong>in</strong>g <strong>in</strong> <strong>the</strong> 2-GHz band. UMTSshould deliver wide-area, high-mobility data rates of 384 kb/s and localarea,low-mobility rates up to 2 Mb/s.Almost 240 operators <strong>in</strong> over 100 countries operate GSM soEricsson, Nokia, and Siemens are all committed to <strong>the</strong> standardization ofUMTS based on GSM.The focus of UMTS has shifted from broadband <strong>in</strong>tegrated-servicesdigital network (ISDN) to <strong>the</strong> Internet. The first phase of UMTS shouldhave voice services augmented by data services at 144 to 512 kb/s.IMT-2000 is Europe’s proposed system that would <strong>in</strong>tegrate wirelesssystems, <strong>in</strong>clud<strong>in</strong>g satellites. It would optimize <strong>the</strong> use of <strong>the</strong> Internet.Japan has its own version of IMT-2000.IMT-2000 services <strong>in</strong>clude high-quality voice/audio, high-speeddata transmission with still images, video conferenc<strong>in</strong>g and multimedia.Subscribers to IMT-2000 will be able to carry on voice conversationswhile access<strong>in</strong>g a corporate Intranet, or take part <strong>in</strong> video conferenceswhile send<strong>in</strong>g and/or receiv<strong>in</strong>g e-mail or data.Mobile InternetMobile is posed to become a major access medium for Internet andon-l<strong>in</strong>e services. Web browsers for cellular phones and personal digitalassistants (PDAs) are <strong>in</strong> use and thriv<strong>in</strong>g. Internet pag<strong>in</strong>g is also grow<strong>in</strong>grapidly.Analog and digital cellular systems already provide circuitswitchedInternet access. Much faster direct digital connectivity will beavailable as multislot transmission over GSM networks. Ano<strong>the</strong>r highspeeddata transmission technique for GSM is General Packet RadioServices (GPRS). It is currently work<strong>in</strong>g its way through <strong>the</strong> standard-©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> Internetization process. In time-division-multi-access (TDMA) networks, cellulardigital packet data (CDPD) can also be used to provide Internet access.High-speed circuit-switched data (HSCSD) will allow <strong>the</strong> download<strong>in</strong>gof graphics-heavy pages from <strong>the</strong> World Wide Web (www) to beas simple over mobile as it is over terrestrial services. GPRS is perfect fore-mail and data access services, where users do not want to pay high callcharges for short transmissions. GPRS also allows <strong>the</strong> user to receivevoice calls simultaneously when send<strong>in</strong>g or receiv<strong>in</strong>g data calls.HSCSD has built-<strong>in</strong> bandwidth-on-demand capability. So, it willnot matter what speed <strong>the</strong> user needs for any particular application, <strong>the</strong>service will provide whatever speed is required, up to 64 kb/s.Ano<strong>the</strong>r emerg<strong>in</strong>g service is voice-over-IP, or Internet telephony.Voice-over-IP is generally delivered from one personal computer to ano<strong>the</strong>rthrough modems and special software. Instead of runn<strong>in</strong>g on general-purposeprocessors, improved voice quality is possible us<strong>in</strong>g digital-signal-processors(DSPs).Bellcore’s Mobile Network Comput<strong>in</strong>g Protocol (MNCP) for <strong>the</strong>Internet community may become an open standard. It is a generic protocolspecification that allows any cellular, personal-communicationsservices(PCS), or pag<strong>in</strong>g network to provide wireless Internet <strong>in</strong>formationaccess from mobile computers and hand-held devices.This standard would allow portable and accessible mobile comput<strong>in</strong>gdevices to offer easy desktop connectivity and allow users to remotelyperform computer operations such as control system management.In <strong>the</strong> future networks and mobile phones will evolve <strong>in</strong> parallel toprovide services that are <strong>in</strong>creas<strong>in</strong>gly personalized to <strong>the</strong> users’ needs.This will happen as a result of <strong>in</strong>creas<strong>in</strong>g <strong>in</strong>telligence with<strong>in</strong> <strong>the</strong> networksalong with <strong>in</strong>creas<strong>in</strong>g competition and segmentation for services.Smart AntennasSmart antennas are becom<strong>in</strong>g <strong>in</strong>tegral elements of evolv<strong>in</strong>g analogand digital cellular networks. A smart antenna system is a highlyconfigurable antenna system that senses <strong>the</strong> radio environment, <strong>in</strong>clud<strong>in</strong>gtraffic and <strong>in</strong>terference levels, and <strong>the</strong>n modifies its operation tooptimize performance for local conditions.The <strong>in</strong>telligence of <strong>the</strong> antenna system resides <strong>in</strong> <strong>the</strong> algorithmsthat monitor <strong>the</strong> RF environment and adjust <strong>the</strong> antenna’s radiation©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>pattern <strong>in</strong> order to <strong>in</strong>crease carrier-to-<strong>in</strong>terference ratios, reduce network-<strong>in</strong>terferencelevels, control hand-off boundaries or redistributetraffic loads.Smart antennas will be used with code division multiple access(CDMA) technology <strong>in</strong> mobile cellular and personal-communicationservices(PCS) networks as well as fixed-term<strong>in</strong>al-wireless-local-loopsystems. Smart antennas are emerg<strong>in</strong>g as a major component ofwideband CDMA standards for third-generation mobile systems <strong>in</strong>North America, Europe, and Asia.The technology of smart antennas evolved from phased-array techniquesused <strong>in</strong> military and radar applications. These advanced electronicsconcepts are now practical for wireless communications networks.A smart antenna platform uses a phase-array antenna to syn<strong>the</strong>sizecustom antenna patterns.In Advanced Mobile Phone System (AMPS) networks, smart antennascreate narrowbeam antenna patterns that track subscribers as<strong>the</strong>y move around <strong>the</strong> cell site. The narrow antenna beams improve callquality. Smart antennas can provide network-wide <strong>in</strong>terference control,traffic-load balanc<strong>in</strong>g, resource allocation and dynamic network management.In <strong>the</strong> CDMA operat<strong>in</strong>g mode, <strong>the</strong> smart antenna uses a phasedarray to create custom sector-antenna patterns through a process calledsector syn<strong>the</strong>sis. This is done with software management. Sector syn<strong>the</strong>siscontrols <strong>the</strong> azimuth angles, beamwidths and ga<strong>in</strong>s.Service providers can match antenna patterns for <strong>the</strong> different sectorsof a CDMA cell. The smart antenna system monitors traffic load<strong>in</strong>gand <strong>in</strong>terference levels on <strong>the</strong> CDMA l<strong>in</strong>ks. The smart system <strong>the</strong>n respondsto <strong>the</strong> traffic load and <strong>in</strong>terference levels by creat<strong>in</strong>g antennapatterns that are used to equalize traffic loads and reduce <strong>in</strong>terference.In cellular networks, traffic loads are unevenly distributed acrosscells and sectors. A cell may have one sector near <strong>the</strong> block<strong>in</strong>g po<strong>in</strong>t,while <strong>the</strong> cell’s o<strong>the</strong>r two sectors are lightly loaded.Traffic load balanc<strong>in</strong>g is used to shift <strong>the</strong> traffic load from heavilyloaded sectors to underused sectors. This results <strong>in</strong> a reduction <strong>in</strong> <strong>the</strong>peak load<strong>in</strong>g levels and allows an <strong>in</strong>crease <strong>in</strong> <strong>the</strong> traffic or networkcapacity. Without traffic load balanc<strong>in</strong>g, only about 1/2 of <strong>the</strong> subscribers<strong>in</strong> <strong>the</strong> highly loaded spot receive acceptable service.Smart antennas also allow rotation of <strong>the</strong> azimuth angle of <strong>the</strong>sectors <strong>in</strong> order to shift hand-off boundaries. A feature called soft hand-©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> Internetoff allows subscriber units to be simultaneously connected to multiplesectors. This results <strong>in</strong> an <strong>in</strong>crease <strong>in</strong> <strong>the</strong> total average transmit powerper subscriber, which wastes valuable resources.Excessive hand-off activity can also result <strong>in</strong> dropped calls due tohand-off failures <strong>in</strong> areas where <strong>the</strong>re is no dom<strong>in</strong>ant server. Smart antennasmake it possible to syn<strong>the</strong>size radiation patterns that reducehand-off problems and ma<strong>in</strong>ta<strong>in</strong> coverage.Vary<strong>in</strong>g <strong>in</strong>terference levels across <strong>the</strong> network mean that coverage,quality and capacity change based on geography and time of day. Dur<strong>in</strong>gnetwork <strong>in</strong>stallation and network ma<strong>in</strong>tenance, a significant amountof time and effort is used to f<strong>in</strong>e-tune <strong>in</strong>terference levels. Operatorsadjust transmit powers, change antenna patterns and tweak networkparameters to elim<strong>in</strong>ate <strong>in</strong>terference <strong>in</strong> problem areas. Smart antennasprovide exceptional flexibility <strong>in</strong> tun<strong>in</strong>g <strong>the</strong> RF footpr<strong>in</strong>t of each sector.Transmit power can be turned up <strong>in</strong> certa<strong>in</strong> directions to enhance <strong>in</strong>build<strong>in</strong>gcoverage. In o<strong>the</strong>r directions, transmit power can be reduced tom<strong>in</strong>imize <strong>in</strong>terference, control handoffs and reduce coverage overshoot.The flexibility of smart antennas allows service providers to customizeRF coverage footpr<strong>in</strong>ts to precisely manage <strong>in</strong>terference, hand-off levelsand traffic load balanc<strong>in</strong>g. Sens<strong>in</strong>g <strong>the</strong> radio environment and provid<strong>in</strong>ga flexible way of respond<strong>in</strong>g to changes allows smart antennas to playa lead<strong>in</strong>g role <strong>in</strong> build<strong>in</strong>g communications management.ISDNThe Integrated Services Digital Network (ISDN) is based onswitched digital technology. It can be used to upgrade analog telephonesystems to an all-digital end-to-end network. ISDN can be used forvoice, data, video, fax, and image transmission. ISDN fills a gap betweenslower switched analog (modem) connections and dedicated digital(leased-l<strong>in</strong>e) connections. ISDN is both switched and digital. A switchedconnection lets anyone on a network make an on-demand connectionfrom one site to ano<strong>the</strong>r.ISDN is all digital, so with computer-generated <strong>in</strong>formation already<strong>in</strong> digital form, you do not have to convert computer data fromdigital to analog form and convert it back to digital on <strong>the</strong> o<strong>the</strong>r end.ISDN has a low bit-error rate compared with modem transmissions andyou also have <strong>the</strong> advantage of virtual connections. With a virtual con-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>nection, you can dial <strong>in</strong>to an ISDN bridge or router from a remote siteand log <strong>in</strong> to a file server. While connected, you may get a phone call,or some o<strong>the</strong>r distraction, and stop work on your computer. S<strong>in</strong>ce <strong>the</strong>connection is idle for a few m<strong>in</strong>utes, <strong>the</strong> equipment could drop <strong>the</strong> l<strong>in</strong>ewhile ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g your log-<strong>in</strong> to <strong>the</strong> file server. It does this by spoof<strong>in</strong>g<strong>the</strong> protocols.When you later require access to <strong>the</strong> file server, <strong>the</strong> ISDN equipmentre-establishes <strong>the</strong> connection, typically <strong>in</strong> less than one second.This is very fast compared to <strong>the</strong> time required to establish a connectionbetween two modems.ISDN equipment is termed customer premises equipment. There isa basic rate <strong>in</strong>terface and a primary rate <strong>in</strong>terface. The basic rate <strong>in</strong>terface(BRI) uses <strong>the</strong> telephone company’s exist<strong>in</strong>g two-wire copper l<strong>in</strong>esand multiplexes three channels over <strong>the</strong>m. The primary rate <strong>in</strong>terface(PRI) has 23 B channels and one D channel <strong>in</strong> <strong>the</strong> United States while 30B channels and one D channel are used <strong>in</strong> Europe. In <strong>the</strong> United States,PRI runs on a T-1 local-loop circuit. In Europe, an E-1 circuit is used.The B channel can be used to transmit voice, data, video, image, orfax. It can operate as circuit switched voice (CSV), circuit switched data(CSD), or packet switched data (PSD) which is also called packet modedata, or PMD. It runs at 56 Kbps or 64 Kbps, depend<strong>in</strong>g on <strong>the</strong> switch<strong>in</strong>gmode and on whe<strong>the</strong>r <strong>the</strong> telephone system can handle clear-channeldata calls.The D channel provides call-setup times of about one second. TheD channel can also be used for packet-switched data. The ISDN equipmentcan use <strong>the</strong> traffic between sites to add additional B channels to<strong>in</strong>crease <strong>the</strong> throughput. The number of B channels used can fluctuateup and down throughout <strong>the</strong> day, provid<strong>in</strong>g <strong>in</strong>creased bandwidth atpeak times and dropp<strong>in</strong>g back dur<strong>in</strong>g low traffic periods to reducephone charges.ISDN equipment can also compress data with compression ratioscomparable to those of modems. Typically, ISDN achieves compressionratios of about 2:1, but 4:1 or even 8:1 are possible under ideal conditions.ISDN gives twice as many phone l<strong>in</strong>es (B channels) per number ofcopper-wire pairs as analog, with packet-mode data on <strong>the</strong> D channelalso be<strong>in</strong>g available. With standard four-wire copper cable, analog telephonesand modems, you get a maximum of two telephone l<strong>in</strong>es. ISDNusers can have four numbers on <strong>the</strong>se same four wires along with twoadditional 9.6-Kbps packet-mode connections.©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetInternet ConnectionsOne of <strong>the</strong> major uses of modems is Internet access. The Internetconsists of local connections, long-haul connections, routers, servers,and a variety of protocols. These components work toge<strong>the</strong>r <strong>in</strong> <strong>the</strong> follow<strong>in</strong>gways.Users connect by dial<strong>in</strong>g <strong>in</strong> to an Internet Service Provider (ISP) us<strong>in</strong>ga modem over telephone l<strong>in</strong>es. These are often <strong>the</strong> same k<strong>in</strong>d oftwisted pair, copper wires that have been used s<strong>in</strong>ce <strong>the</strong> telephone was <strong>in</strong>vented.At <strong>the</strong> ISP end is ano<strong>the</strong>r conventional modem. These modemsconvert <strong>the</strong> computer’s digital <strong>in</strong>formation to analog signals and <strong>the</strong>nback to digital on <strong>the</strong> remote end. Connection speed is at best, not count<strong>in</strong>gfactors like l<strong>in</strong>e noise, <strong>the</strong> speed of <strong>the</strong> slower of <strong>the</strong> modems.If you are connected to <strong>the</strong> Internet through a network, your PC ispart of a local area network (LAN). Your PC has a network <strong>in</strong>terface card(NIC) that ties it to <strong>the</strong> network which is typically E<strong>the</strong>rnet.The cable com<strong>in</strong>g out of <strong>the</strong> NIC is ei<strong>the</strong>r coaxial cable or a largerversion of your telephone wire. Your network will be probably connectedto an ISP not by a modem, but through a higher-speed connectionleased from <strong>the</strong> local phone company. <strong>New</strong>er technologies offerhigh-speed connections to users.Internet GrowthThe Internet was born over decades ago <strong>in</strong> <strong>the</strong> form of a U.S.Defense Department network called <strong>the</strong> ARPAnet. This was an experimentalnetwork designed to support military research <strong>in</strong> communicationnetworks that could withstand partial outages from military operationsand still function.In <strong>the</strong> late 1960s most computers were not capable of send<strong>in</strong>ggraphics across networks or even view<strong>in</strong>g <strong>the</strong>m. The traffic that traversed<strong>the</strong> network was generally text-based <strong>in</strong> <strong>the</strong> form of electronic mail messagesand <strong>the</strong> direct <strong>in</strong>terconnection of one computer with ano<strong>the</strong>r.In <strong>the</strong> 1970s <strong>the</strong> Internet began to be <strong>in</strong>terconnected with largeuniversities and research organizations. The nature of <strong>the</strong> traffic beganto move towards on-l<strong>in</strong>e research, but it was still government-oriented.To send a message on <strong>the</strong> network, a user only had to put <strong>the</strong> data<strong>in</strong> an envelope, called an Internet Protocol (IP) packet, and address <strong>the</strong>packets correctly. The communicat<strong>in</strong>g computers were also given <strong>the</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>responsibility to ensure that <strong>the</strong> communication was completed.By <strong>the</strong> late 1970s, <strong>the</strong>re was a need to standardize <strong>the</strong> way computerson <strong>the</strong> Internet communicated with each o<strong>the</strong>r. This resulted <strong>in</strong> TCP/IP. TCP/IP stands for Transmission <strong>Control</strong> Protocol and Internet Protocol.These network<strong>in</strong>g protocols allow different types of computers tocommunicate.In <strong>the</strong> mid-1980s, <strong>the</strong> government became concerned about <strong>the</strong>security of defense <strong>in</strong>formation and split <strong>the</strong> network <strong>in</strong>to ARPAnet andMilNet. The responsibility of ARPAnet was moved over to <strong>the</strong> NationalScience Foundation (NSF), which merged ARPAnet <strong>in</strong>to <strong>the</strong> high-speednetwork called NSFnet.NFSnet became <strong>the</strong> prototype for national backbones. The highspeedl<strong>in</strong>ks were T1 phone l<strong>in</strong>es which served as <strong>the</strong> ma<strong>in</strong> traffic arteriesacross <strong>the</strong> country. Network traffic <strong>in</strong>creased until <strong>the</strong> computers controll<strong>in</strong>g<strong>the</strong> network and <strong>the</strong> telephone l<strong>in</strong>es connect<strong>in</strong>g <strong>the</strong>m were overloaded.In 1987 <strong>the</strong> old network was replaced with faster telephone l<strong>in</strong>esand faster computers to control it.The system began to be used for a wider variety of data and <strong>the</strong>national Internet emerged. In 1992 <strong>the</strong> NSFnet backbone was upgradedto higher-speed T3 l<strong>in</strong>ks, which operated at a speed of 45 Mbps.In 1995 NSF released control of <strong>the</strong> Internet backbone to <strong>the</strong> commercialcarriers. S<strong>in</strong>ce <strong>the</strong>n, NSF has focused on provid<strong>in</strong>g regional Internetconnections and build<strong>in</strong>g a faster backbone. The Internet grewand became a practical method of communication for different computersfrom various sites and companies.The Internet is <strong>the</strong> largest network we have, with all types of differentcomputers connected to it. These computers talk to each o<strong>the</strong>rus<strong>in</strong>g protocols, which set <strong>the</strong> rules of communication. Without a commonset of rules <strong>the</strong> different computers would not be able to send andreceive <strong>in</strong>formation among <strong>the</strong>mselves.The protocols that make up <strong>the</strong> Internet are <strong>the</strong> Transmission <strong>Control</strong>Protocol (TCP) and Internet Protocol (IP). TCP breaks down <strong>in</strong>formation<strong>in</strong>to packets or envelopes of data for transfer and reassembles<strong>the</strong>m at <strong>the</strong> dest<strong>in</strong>ation po<strong>in</strong>t. IP ensures <strong>the</strong> proper delivery of data to<strong>the</strong> right address.Any computer that wants to communicate with any o<strong>the</strong>r computeron <strong>the</strong> Internet must use TCP/IP. Associated with <strong>the</strong> TCP/IPprotocol are several TCP/IP applications or tools for send<strong>in</strong>g and receiv<strong>in</strong>gelectronic mail, transferr<strong>in</strong>g files, and access<strong>in</strong>g files remotely.©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetTCP/IP is a packet-switch<strong>in</strong>g network<strong>in</strong>g scheme. Information issent across <strong>the</strong> network <strong>in</strong> a packet that conta<strong>in</strong>s source and dest<strong>in</strong>ation<strong>in</strong>formation. S<strong>in</strong>ce each packet has its address<strong>in</strong>g <strong>in</strong>formation built <strong>in</strong>, itcan travel <strong>in</strong>dependently. This allows large numbers of packets to flowthrough <strong>the</strong> network tak<strong>in</strong>g different routes. Packets may arrive out oforder, but because each packet also conta<strong>in</strong>s sequence <strong>in</strong>formation, <strong>the</strong>receiv<strong>in</strong>g computer can reconstruct <strong>the</strong> orig<strong>in</strong>al data.The high-speed central networks <strong>in</strong> <strong>the</strong> Internet are known asbackbones. They are like a superhighway system and <strong>the</strong>y deliver datato mid-level networks. The mid-level networks take <strong>the</strong> traffic from <strong>the</strong>backbones and distribute it to regional networks which are more likelocal highways <strong>in</strong> <strong>the</strong> automobile world.Client/Server SystemsAny two computers connected on <strong>the</strong> Internet act like <strong>the</strong>y are <strong>in</strong>a client/server mode. A client is a computer connected to a host computer,which is called a server. The client software is used to run programsacross <strong>the</strong> network. The client program provides <strong>the</strong> user <strong>in</strong>terfacefor work<strong>in</strong>g with <strong>the</strong> server. It takes commands you execute fromyour computer and transfers <strong>the</strong>m to <strong>the</strong> server program runn<strong>in</strong>g on <strong>the</strong>host computer. For example, a client program called browsers allowsyou to connect and work with a World Wide Web server.Although <strong>the</strong> Internet uses <strong>the</strong> telephone system, it is not a networkprimarily based on dedicated telephone l<strong>in</strong>es. The telephone networkis a circuit-switched network. When you make a call, you get aswitched or dedicated connection. Even if you are not talk<strong>in</strong>g or listen<strong>in</strong>g,this connection is unavailable to o<strong>the</strong>rs who may want to use it.This means <strong>the</strong>re is some under utilization of this resource. The Internetworks more like a mail service where mail is mixed toge<strong>the</strong>r and sent <strong>in</strong>a bag or packet to ano<strong>the</strong>r location and sorted out for its dest<strong>in</strong>ation.RoutersThe Internet uses computers called routers to connect <strong>the</strong> variousnetworks toge<strong>the</strong>r. These can be LANs (Local Area Networks), regionalnetworks and even telephone l<strong>in</strong>es. Information on <strong>the</strong> Internet movesthrough <strong>the</strong> telephone l<strong>in</strong>es and <strong>the</strong> o<strong>the</strong>r nets. The routers make decisionson how to route <strong>the</strong> data packets so <strong>the</strong>y reach <strong>the</strong>ir dest<strong>in</strong>ation.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Each router needs to know what connections are available for <strong>the</strong> nexthop to get <strong>the</strong> packet closer to its dest<strong>in</strong>ation.The routers are like <strong>the</strong> hubs of <strong>the</strong> network. Each router connectsseveral different networks. The router calculates <strong>the</strong> best routes for <strong>the</strong>packets to take and moves <strong>the</strong> packets through <strong>the</strong> different networks.The Internet Protocol (IP) takes care of address<strong>in</strong>g, so <strong>the</strong> routersknow what to do with <strong>the</strong> data packet when it arrives. The Internetrelies on its routers to get data to <strong>the</strong> right network, and <strong>the</strong>n that networkgets <strong>the</strong> data to <strong>the</strong> right computer, or host, on <strong>the</strong> network.Address<strong>in</strong>gEach computer connected to <strong>the</strong> Internet must have its own uniqueaddress. The address<strong>in</strong>g <strong>in</strong>formation goes at <strong>the</strong> beg<strong>in</strong>n<strong>in</strong>g of <strong>the</strong> message.This gives <strong>the</strong> network enough <strong>in</strong>formation to deliver <strong>the</strong> packetof data.The two ma<strong>in</strong> types of addresses on <strong>the</strong> Internet are IP addressesand doma<strong>in</strong> names. Each computer that uses TCP/IP protocols is dist<strong>in</strong>guishedfrom o<strong>the</strong>r computers on <strong>the</strong> Internet by a unique IP address.The IP address is made up of four numbers separated by periods. Thesefour areas of <strong>the</strong> IP address are hierarchical.Each number is less than 256. The beg<strong>in</strong>n<strong>in</strong>g of <strong>the</strong> address tells <strong>the</strong>Internet routers what network you are part of. The last part of <strong>the</strong> addresstells that network which computer or host should receive <strong>the</strong>packet.Orig<strong>in</strong>ally, <strong>the</strong> Internet used only IP numeric addresses, but <strong>the</strong>seproved cumbersome to remember, so a text system was developedcalled <strong>the</strong> doma<strong>in</strong> name system (DNS). These doma<strong>in</strong> names <strong>in</strong>dicate<strong>the</strong> name and type of service or organization that conducts <strong>the</strong> serviceas shown below:Doma<strong>in</strong>comedugovorgnetOrganizationCommercial and <strong>in</strong>dustrial organizationsEducation (universities and o<strong>the</strong>r educational organizations)government (non-military)O<strong>the</strong>r organizations (nonprofit and research organizations)Network operation and service organizations©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetAs long as <strong>the</strong> data are placed <strong>in</strong> an IP envelope, <strong>the</strong> network has<strong>the</strong> <strong>in</strong>formation it needs to get your packet from your computer to itsdest<strong>in</strong>ation. The <strong>in</strong>formation <strong>in</strong> a packet is usually between 1 and about1500 characters long. This prevents any one user of <strong>the</strong> network frommonopoliz<strong>in</strong>g <strong>the</strong> network. It also means that <strong>the</strong> network becomesslower as more people try to use it.Many <strong>in</strong>formation transfers are longer than 1500 characters andnetworks sometimes lose packets, or damage <strong>the</strong>m <strong>in</strong> transit. Packetscan also arrive out of sequence. The next layer of <strong>the</strong> network providesa way to transfer longer messages and also takes care of some of <strong>the</strong>degradation that can occur <strong>in</strong> <strong>the</strong> network.Transmission <strong>Control</strong> Protocol (TCP)TCP is <strong>the</strong> protocol that handles most of <strong>the</strong>se problems. It makessure <strong>the</strong> packets arrive and pastes <strong>the</strong>m toge<strong>the</strong>r <strong>in</strong> <strong>the</strong> right order. TCPtakes <strong>the</strong> <strong>in</strong>formation you want to transmit and breaks it <strong>in</strong>to sections.Each section is numbered so receipt can be verified and <strong>the</strong> data can beput back <strong>in</strong> <strong>the</strong> proper order. The sequence number is sent <strong>in</strong> a packetof its own. Some or all of your data are placed <strong>in</strong> a TCP packet.Dur<strong>in</strong>g transmission, packets can be lost, or affected by noise ontelephone l<strong>in</strong>es. TCP handles this by calculat<strong>in</strong>g a checksum. This is anumber based on <strong>the</strong> parity of <strong>the</strong> transmitted bytes. Parity <strong>in</strong>volvescount<strong>in</strong>g <strong>the</strong> number of 1s and determ<strong>in</strong><strong>in</strong>g if this number is even (evenparity) or odd (odd parity).When <strong>the</strong> packet arrives at its dest<strong>in</strong>ation, <strong>the</strong> receiv<strong>in</strong>g TCP softwarecalculates what <strong>the</strong> checksum should be and compares it to <strong>the</strong> onesent by transmitter. If <strong>the</strong>y do not match, an error has occurred dur<strong>in</strong>g<strong>the</strong> transmission. The TCP software throws out that packet and requestsa retransmission.The TCP packet is placed <strong>in</strong>side an IP packet and given to <strong>the</strong>network for transmission. On <strong>the</strong> receiv<strong>in</strong>g end, <strong>the</strong> TCP software collects<strong>the</strong> packets, extracts <strong>the</strong> data, and puts it <strong>in</strong> <strong>the</strong> proper order. Ifsome of <strong>the</strong> <strong>in</strong>formation is miss<strong>in</strong>g, it asks <strong>the</strong> sender to retransmit <strong>the</strong>m.When it has all <strong>the</strong> <strong>in</strong>formation <strong>in</strong> <strong>the</strong> proper order, it passes <strong>the</strong> data to<strong>the</strong> application program that is us<strong>in</strong>g its services.TCP appears to <strong>the</strong> user as a dedicated wire between two applications.There is not a dedicated l<strong>in</strong>k between <strong>the</strong> sender and receiver©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>s<strong>in</strong>ce o<strong>the</strong>rs will use <strong>the</strong> same routers and network wires <strong>in</strong> <strong>the</strong>ir transmission.Dial-up Internet AccessThe easy and most popular way to get network access is to get anaccount on a computer that already has dedicated access. Then you useyour computer to log <strong>in</strong> to this system. Dial-up access is not as good ashav<strong>in</strong>g your own connection, but it is easier and less costly to set up.Your computer does not actually become part of <strong>the</strong> Internet. It accessesa service computer from an Internet service provider that is permanentlyconnected to <strong>the</strong> network. There are many organizations that providethis type of service now. They are generally known as Internet ServiceProviders (ISPs).Future Internet ServiceA significant number of Internet users will access <strong>the</strong> net over cableor DSL connections that are up to 50 times faster than 56-kbps modems.Many people will use <strong>the</strong> Internet for video conferenc<strong>in</strong>g, telephony,telecommut<strong>in</strong>g, and on-l<strong>in</strong>e control monitor<strong>in</strong>g applications. These applicationsdemand raw bandwidth and a level of reliability <strong>the</strong> presentInternet cannot provide. In <strong>the</strong> near future <strong>the</strong> Net will have to carrymore data than it does today and with more reliability.At 56 kbps, today’s modems are go<strong>in</strong>g about as fast as today’sphone l<strong>in</strong>es will let <strong>the</strong>m. Access speeds vary from 28.8 kbps, or slower,for older modems, to 56 kbps for newer models and for some users, 256kbps to 1.5 mbps for DSL, and up to 3 mbps for cable modems. Thereare a variety of broadband options, <strong>in</strong>clud<strong>in</strong>g T1 l<strong>in</strong>es and o<strong>the</strong>r dedicated,high-speed connections (Table 9-4).Cable and DSL are two technologies try<strong>in</strong>g to replace traditionalmodem connections. Current cable connections can manage speeds upto 3 mbps. DSL implementations run between 256 kbps and 1.5 mbps.Ano<strong>the</strong>r option is Spr<strong>in</strong>t’s Integrated On-demand Network (ION)which can deliver voice, video, and data at speeds up to 620 mbps. AnION Integrated Service Hub is wired <strong>in</strong>to your phone jack and attachedto an E<strong>the</strong>rnet card <strong>in</strong> <strong>the</strong> PC.©2001 by The Fairmont Press, Inc. All rights reserved.


Table 9-4. Internet Services——————————————————————————————————————————————Service Availability Typical Features (pros and cons)TypePerformance(downstream/upstream)——————————————————————————————————————————————Dial-up Universal 56 kbps/33.6 kbps Cheap, easy to <strong>in</strong>stall, and readily available.Slow service ties up a phone l<strong>in</strong>e.ISDN Widespread 128 kbps/128 kbps Twice speed 56-kbps modems plus phone servicefeatures like cell handl<strong>in</strong>g. Costly.Satellite Widespread 400 kbps/33.6-kbps Good downstream speed, need clear view ofsou<strong>the</strong>rn sky. Uses dial-up for upstream connections,complex <strong>in</strong>stallation.Cable Limited 1-5 mbps/33.6 kbps Where available, <strong>in</strong>expensive cont<strong>in</strong>uous high-2.5 mbps speed connection. Cannot select ISP. Sharednodes can cause security and speed problems.DSL Very Limited 144 kbps-8 mbps/ Turns your phone l<strong>in</strong>e <strong>in</strong>to a fast connection that64 kbps-8 mbps is always on.Frame Widespread 56 kbps-45 mbps/ Bus<strong>in</strong>ess-oriented/speed guarantees/quickRelay & 56 kbps-45 mbps repair. Costly, complex hardware.T1/T3——————————————————————————————————————————————©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Some companies like Teligent and W<strong>in</strong>star offer transmission us<strong>in</strong>gwireless radio frequencies <strong>in</strong>stead of congested copper l<strong>in</strong>es. Voice ordata would be transmitted from a small dish antenna on <strong>the</strong> roof to acentral office, which would <strong>the</strong>n transmit <strong>the</strong> <strong>in</strong>formation to your ISP.Designed primarily for urban areas, this arrangement could be a lotcheaper than conventional cables.The Future of ISPAs end users and bus<strong>in</strong>esses move up to faster connections, <strong>the</strong>bottleneck may shift to <strong>the</strong> ISPs. The problem is one of capacity. Iflarge numbers of users with access to 1 mbps. DSL signs up for <strong>the</strong>service, <strong>the</strong> <strong>in</strong>frastructure would probably be able to handle it. But,this is not true for 7-mbps DSL and 20- to 25-mpbs DSL will be available<strong>in</strong> <strong>the</strong> near future. The network will not be able to handle thistraffic.In addition to sell<strong>in</strong>g access to end users and bus<strong>in</strong>esses, largenational ISPs such as Spr<strong>in</strong>t, MCI WorldCom, and AT&T sell bandwidthto smaller ISPs. Those smaller ISPs connect at Network AccessPo<strong>in</strong>ts (or NAPs), which <strong>in</strong> turn connect <strong>the</strong>m to <strong>the</strong> backbones (SeeFigure 9-2).Few bus<strong>in</strong>esses have cable s<strong>in</strong>ce <strong>the</strong> cable companies did notwire bus<strong>in</strong>ess and <strong>in</strong>dustrial areas. But, <strong>the</strong>y do have access to highspeeddedicated l<strong>in</strong>es rang<strong>in</strong>g from 56-kbps frame relay to 1.5-mbpsT1 l<strong>in</strong>es and beyond.The Internet backbone is really several backbones today. The bignational ISPs, along with several smaller firms, own high-speed fiberopticnetworks that connect major metropolitan areas at speeds up to38 gbps. In a few years, those connections could be as fast at 200gbps.Besides T1 or frame relay l<strong>in</strong>es, o<strong>the</strong>r technologies <strong>in</strong>clude <strong>the</strong>Integrated Services Digital Network or satellite-dish access that canprovide even faster access.For many, <strong>the</strong> future lies <strong>in</strong> cable modems and Digital SubscriberL<strong>in</strong>es. Both cable and DSL are much faster than analog modems.Each provides a reliable connection and fast connect times.At <strong>the</strong> end of 1998, <strong>the</strong> number of cable modems <strong>in</strong> use <strong>in</strong>North America was about 513,000 and <strong>the</strong> number of DSL l<strong>in</strong>es <strong>in</strong> <strong>the</strong>©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> InternetFigure 9-2. Internet connections.United States was just 39,000. In contrast, <strong>the</strong>re are tens of millions ofconsumers around <strong>the</strong> world connected to <strong>the</strong> Internet via dial-upmodems.A lack of standards has impeded wider cable and DSL availability,but that should change soon. Growth is projected at 1000% ormore per year for both technologies <strong>in</strong> <strong>the</strong> near future.Dial-up connections are cheap but slow. Frame relay and T1/T3l<strong>in</strong>es are fast but expensive. Alternatives <strong>in</strong>clude speedy, affordableDSL services or cable with fast performance and even lower prices.While cable TV l<strong>in</strong>es are available to more than 100 millionNorth American homes, only 20% of <strong>the</strong>se can get cable modem service.That number will grow as cable companies offer two-wayfiberoptic networks that deliver more TV channels as well as highspeedInternet connections.Cable services can deliver connection speeds at least 10 timesfaster than a 56-kbps modem for about twice <strong>the</strong> price of a typicaldial-up account.Gett<strong>in</strong>g a cable modem requires a PC with an E<strong>the</strong>rnet card,which <strong>the</strong> cable company can supply and <strong>in</strong>stall. The cable companywill often lease <strong>the</strong> modem as part of <strong>the</strong> monthly fee. Most cablesystems offer always-on service that does not tie up a phone l<strong>in</strong>e.About 15% use telco return, which requires a standard dial-up l<strong>in</strong>e tosend data from your PC to <strong>the</strong> Internet.A Web page that takes several m<strong>in</strong>utes to download with a 56-©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>kbps dial-up modem could be done <strong>in</strong> under 5 seconds with a cablemodem. Most cable modems can speed up file transfers by 250 to1000%.Cable modem service cannot abate Internet traffic that occursoutside its own network. But, many services cache recently visitedWeb sites on <strong>the</strong>ir own servers, so popular pages and files can downloadmore quickly.Cable performance can match and sometimes beat that of moreexpensive T1 l<strong>in</strong>es. Cable modem service can deliver cheaper speed<strong>in</strong> part because it does not give you a dedicated fast connection to<strong>the</strong> Internet. It divides <strong>the</strong> total cable which may be capable of transferrates up to 36 mbps between users on your node. Depend<strong>in</strong>g onyour service provider and your location, you might share your connectionwith hundreds or even thousands of o<strong>the</strong>r users.If too many users on your node hit <strong>the</strong> Internet simultaneously,your connection could suffer. Some cable modem users reported <strong>in</strong>cidentswhere performance dropped off to 2 or 3 kbps. Cable modemscan add more capacity. They have <strong>the</strong> architecture to allow highercapacity.Internet2Internet2 will connect only academic and government users. Therest of <strong>the</strong> Internet will benefit <strong>in</strong>directly as high-bandwidth Internet2applications trickle down. There will be greatly improved multimediaand video conferenc<strong>in</strong>g capabilities. Internet2 groups are develop<strong>in</strong>gtechniques for tagg<strong>in</strong>g voice data packets so <strong>the</strong>y get a higher priorityas <strong>the</strong>y pass through <strong>the</strong> network.Ano<strong>the</strong>r promis<strong>in</strong>g development is occurr<strong>in</strong>g <strong>in</strong> a branch ofphysics called photonics. Today, <strong>in</strong>formation travels down fiberopticcables <strong>in</strong> <strong>the</strong> form of laser-generated light. Photonics <strong>in</strong>volves ways ofhandl<strong>in</strong>g <strong>the</strong>se light waves to <strong>in</strong>crease <strong>the</strong> fiber’s transmission capabilities.One technique is Dense Wave Division Multiplex<strong>in</strong>g (DWDM). Itsends multiple frequencies of light down <strong>the</strong> same fiber at <strong>the</strong> sametime. Spr<strong>in</strong>t uses DWDM to <strong>in</strong>crease <strong>the</strong> company’s fiber capacity bya factor of 32.In <strong>the</strong> future it may be able to <strong>in</strong>crease capacity by a factor of©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> Internet100 or more. Some cable companies are us<strong>in</strong>g AT&T’s DWDM-basedbackbone to carry data traffic.SilkRoad has ano<strong>the</strong>r photonics technology called RefractiveSynchronization Communication (RSC). It has demonstrated datatransfer rates of 200 gbps over 200 miles, without any signal amplification,on a s<strong>in</strong>gle wavelength of light. The fastest fiber <strong>in</strong> use todayhas a data rate of 40 gbps. SilkRoad has been negotiat<strong>in</strong>g with localtelephone companies and larger carriers that could use RSC technologysoon. Expect to see local area network RSC-enabled hubs andswitches used by bus<strong>in</strong>esses and homes that have fiber connections.The entire Internet backbone could be us<strong>in</strong>g photonics <strong>in</strong> <strong>the</strong> nearfuture.Internet BottlenecksOne segment of <strong>the</strong> Internet could accelerate its data rate, but<strong>the</strong> o<strong>the</strong>rs must struggle to keep up. Now, <strong>the</strong> bottleneck is at <strong>the</strong>desktop. As cable and DSL use grows, <strong>the</strong> ISPs and backbone providerswill have to speed up <strong>the</strong>ir segments to accommodate <strong>the</strong> newtraffic.The telecom <strong>in</strong>dustry is <strong>in</strong> <strong>the</strong> middle of a transition from circuitswitch<strong>in</strong>g to an advanced public network. Service providers are progressivelybuild<strong>in</strong>g a packet-switched and cell-based <strong>in</strong>frastructurethat can handle data, video and voice. The transactional network willuse a jumble of gateways to connect legacy circuit switch<strong>in</strong>g withcells and packet switch<strong>in</strong>g.The new public network will have a packet and cell-based <strong>in</strong>frastructurethat will be equally adept at handl<strong>in</strong>g data, video, andvoice. When this convergence is complete, it will change everyth<strong>in</strong>g.Instead of buy<strong>in</strong>g pipes for bandwidth, you will be able to signup for a new class of VPNs (virtual private networks) that will runover managed backbones. These will be tuned to deliver differenttypes of traffic. Cheaper bandwidth will be offered. The new technologyshould also allow 1-Mbit/s ADSL modems. Bandwidth will <strong>in</strong>crease<strong>in</strong> <strong>the</strong> same way that memory has <strong>in</strong>creased <strong>in</strong> PCs.Data traffic is grow<strong>in</strong>g at a remarkable rate. Today, <strong>the</strong>re are about15 million fiber circuits <strong>in</strong> North America and 120 million copper l<strong>in</strong>es.Creat<strong>in</strong>g <strong>the</strong> new public network means most of <strong>the</strong> equipment needs to©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>be upgraded from <strong>the</strong> central offices to <strong>the</strong> <strong>in</strong>frastructure.Conventional circuit switch<strong>in</strong>g will not do <strong>in</strong> <strong>the</strong> 21st centuryand boost<strong>in</strong>g bandwidth may require gear like dense wavelength-divisionmultiplexers (DWDMs). The new technologies also <strong>in</strong>cludeterabit routers.Ano<strong>the</strong>r factor is <strong>the</strong> Internet, which dumps a huge amount ofdata onto public networks. Data on some backbones is grow<strong>in</strong>g at800% annually. In 1996, <strong>in</strong>ternational Internet traffic was so low comparedwith voice that it was scarcely a ripple, but <strong>in</strong> only 18 monthsit rocketed up to exceed voice.This data explosion is forc<strong>in</strong>g carriers to curb <strong>the</strong>ir <strong>in</strong>vestment<strong>in</strong> circuit-switched equipment. The Internet is also forc<strong>in</strong>g carriers tostandardize on IP (Internet Protocol).The old public network was for voice. Everyth<strong>in</strong>g is standardizedon 64 kbit/s voice channels. Voice does not need 64-kbit/s anymore, it can be compressed without sacrific<strong>in</strong>g quality. Try<strong>in</strong>g to accommodatebursty packet data on fixed circuits is fundamentally <strong>in</strong>efficient.Most capacity rema<strong>in</strong>s idle much of <strong>the</strong> time.Each data service runs over lots of overlaid networks. This results<strong>in</strong> <strong>in</strong>flated service charges. In <strong>the</strong> new public network, trafficwill be streamed <strong>in</strong>to a s<strong>in</strong>gle fiber that can handle up to 80 Gbit/s.There are already predictions of even faster optical switches.<strong>New</strong> types of equipment <strong>in</strong>clude monster RASs (remote accessservers) that term<strong>in</strong>ate thousands of analog calls from analog modems.The new public network is supposed to be packet-or cellswitched.But, <strong>the</strong> old public net will be part of <strong>the</strong> <strong>in</strong>frastructure foryears with its old circuit-switched <strong>in</strong>frastructure.In <strong>the</strong> new network, switches read packet and cell headers. Theyrefer to a directory that provides data type and encryption. More Webservers will be shifted to <strong>the</strong> network as well as hardware and softwarethat oversee access rights. O<strong>the</strong>r servers will be used for newapplications like e-commerce. Users will specify whatever capacity<strong>the</strong>y want. Provision<strong>in</strong>g is faster because switches can be configuredremotely.The new public net also elim<strong>in</strong>ates overlays. Carriers will shiftfrom exist<strong>in</strong>g data services to a s<strong>in</strong>gle underly<strong>in</strong>g <strong>in</strong>frastructure,elim<strong>in</strong>at<strong>in</strong>g duplicated resources.Sonera is F<strong>in</strong>land’s ma<strong>in</strong> long distance ATM backbone. It will<strong>in</strong>itially feature three levels of data service. ATM is used by o<strong>the</strong>r car-©2001 by The Fairmont Press, Inc. All rights reserved.


Build<strong>in</strong>g Automation, Wireless Technology and <strong>the</strong> Internetriers to carry voice and data on <strong>the</strong> backbone.Spr<strong>in</strong>t is plann<strong>in</strong>g <strong>the</strong> Integrated On-Demand Network (ION)which is an early part of <strong>the</strong> new public network. Calculated sav<strong>in</strong>gscompared with its older equipment is 70% cheaper. Access l<strong>in</strong>es areestimated to be 60% to 80%. Ma<strong>in</strong>tenance is estimated at 50% less.In <strong>the</strong> new public network, o<strong>the</strong>r new products will allow usersto plug <strong>in</strong> all <strong>the</strong>ir communications gear. Traffic from <strong>the</strong>se sources isshunted to <strong>the</strong> carrier. These are more than superconcentrators. Thetechnology delivers service classes based on bit rates like most ADSL(asymmetric digital subscriber l<strong>in</strong>e) services. AT&T is plann<strong>in</strong>g anequivalent service code-named INC (Integrated Network Connect).O<strong>the</strong>r companies like Xedia offer Access Po<strong>in</strong>t which lets carriers offerbundled services with bandwidth management over a s<strong>in</strong>gle accessl<strong>in</strong>e. The new public network should allow carriers to cut costsand roll out new services more rapidly.In <strong>the</strong> new <strong>in</strong>frastructure, virtual networks will not have much<strong>in</strong> common with <strong>the</strong>ir rudimentary equivalents where every connectionmust be manually configured. The new public networks willelim<strong>in</strong>ate most configuration chores and run over managed backboneswhich guarantees throughput and latency for different types of traffic.Carriers will be able to add services on <strong>the</strong> fly.Intelligence will also be added <strong>in</strong> <strong>the</strong> form of directory-enabledprovision<strong>in</strong>g. O<strong>the</strong>r products will become available that will delivercomplete security so that even banks will do wire transfer over publicnetworks.ReferencesBraun, Cedric R., “Wireless LAN Standard Proposal Highlights <strong>the</strong>Need for Speed,” Wireless Systems Design, Vol. 3 Number 9, September1998, pp. 13-16.Feuerste<strong>in</strong>, Marty, and Michael Zhao, “Smart Antennas Tune <strong>in</strong> toCDMA Cellular Networks,” Wireless Systems Design, Vol. 3 No. 6,June 1998, pp. 38-40.Heywood, Peter, and Andrew Cray, “Build<strong>in</strong>g <strong>the</strong> Brave <strong>New</strong> World -Conventional Circuit Switch<strong>in</strong>g Won’t Cut it <strong>in</strong> <strong>the</strong> 21st Century,”Data Communications, Vol. 10 No. 20, October 1, 1998, pp.44-49.©2001 by The Fairmont Press, Inc. All rights reserved.


<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Mera, Narciso, and Robert T. Franzo, “Contrast<strong>in</strong>g System-level forDSP-based Wireless Systems,” Wireless Systems Design, Vol. 1Number 9, November 1996, pp. 36-41.Navarrete, Angela, “Web Warp Speed,” PC World, Vol. 17 No. 1,March 1999, pp. 164, 170.Peterschmidt, Eric, “Software Isn’t Enough: Your State-of-<strong>the</strong>-ArtBuild<strong>in</strong>g <strong>Control</strong>s System,” Build<strong>in</strong>gs, Vol. 91 No. 4, April 1997,p. 30.Schneiderman, Ron, “Competition Heats Up Over Third-GenerationConcepts,” Wireless Systems Design, Vol. 3 No. 1, January 1998,pp. 22-25.Sweeney, John, “<strong>New</strong> DSP Architectures Put Desktop Capability <strong>in</strong>Pocket Communicators,” Wireless Systems Design, September1998, Vol. 3 No 9., pp. 37-42.Taglione, John and Jeff Molson, “IR Provides High-speed WirelessConnectivity for Portable Devices,” Wireless Systems Design, Vol.2 No. 5, May 1997, pp. 45-46.©2001 by The Fairmont Press, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!