12.07.2015 Views

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>encryption and decryption, while asymmetric encryption schemes usedifferent keys.Both schemes rely on <strong>the</strong> strength of <strong>the</strong> key be<strong>in</strong>g subject to publicscrut<strong>in</strong>y by <strong>the</strong> cryptographic community. The ma<strong>in</strong> advantage of symmetricencryption schemes is <strong>the</strong> speed with which clear text can beconverted to or from cipher text. Symmetric encryption operates almost1000 times as fast as asymmetric encryption.Asymmetric encryption schemes use public/private key pairs.They utilize a def<strong>in</strong>ed ma<strong>the</strong>matical relationship between <strong>the</strong> public andprivate keys. The ma<strong>in</strong> drawback to us<strong>in</strong>g asymmetric schemes is <strong>the</strong>high computational load of <strong>the</strong> encryption/decryption algorithms.MSMQ uses a comb<strong>in</strong>ation of asymmetric and symmetric encryptionschemes to encrypt <strong>the</strong> body of <strong>the</strong> message. Asymmetric encryptionis used to ensure <strong>the</strong> <strong>in</strong>tegrity of <strong>the</strong> transfer of <strong>the</strong> symmetric key.The MSMQ Queue Manager generates a random symmetric keyand uses it to encrypt <strong>the</strong> body of a message. It must also guarantee <strong>the</strong>au<strong>the</strong>nticity of any public key used. Digital certificates are commonlyuse to solve this problem. If messages conta<strong>in</strong> sensitive <strong>in</strong>formation,<strong>the</strong>y should be both au<strong>the</strong>ntic and encrypted to prevent eavesdropp<strong>in</strong>gor tamper<strong>in</strong>g while <strong>the</strong>y are <strong>in</strong> transit.Direct Digital <strong>Control</strong>Direct digital control (DDC) technology is constantly chang<strong>in</strong>g. In<strong>the</strong> past several years, <strong>the</strong>re has been a race between controls companiesto provide lead<strong>in</strong>g edge hardware and software. Many build<strong>in</strong>g siteshave been converted to or built with direct digital control systems.Most systems are very close to each o<strong>the</strong>r <strong>in</strong> performance. Thelatest movement has been towards <strong>the</strong> ability to easily transfer DDCsystem <strong>in</strong>formation <strong>in</strong>to desktop software packages for data accumulationand process<strong>in</strong>g.The program is an <strong>in</strong>herent part of <strong>the</strong> system. If <strong>the</strong> computer isnot programmed to str<strong>in</strong>gent eng<strong>in</strong>eer<strong>in</strong>g practices, <strong>the</strong> DDC system canbe a liability ra<strong>the</strong>r than an asset. There are many DDC systems <strong>in</strong> usethat have no or little user <strong>in</strong>terface, that function with no comfort problems,and are cost effective. This is because <strong>the</strong>y are quite <strong>in</strong>telligent. Thesystem was designed specifically for a particular build<strong>in</strong>g and functionswell under all conditions. Users can make setpo<strong>in</strong>t adjustments without©2001 by The Fairmont Press, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!