Intelligent Buildings (NT3042) L12V3 Networking

Download as pdf or txt
Download as pdf or txt
You are on page 1of 36

Intelligent Buildings (NT3042)

Lecture 12
Systems & Networking in
Intelligent Buildings
UClan/SHAPE (VTC)
Department of Real Estate and
Facilities Management, IVE(MH)

1
What is a network?
A collection of computers, digital stations and other devices connected
in a way that allows them to send out and receive data
A computer network facilitates interpersonal communications allowing
users to communicate efficiently and easily via various means: email,
instant messaging, chat rooms, telephone, video telephone calls, and
video conferencing. Providing access to information on shared storage
devices is an important feature of many networks.
A network allows sharing of files, data, and other types of information
giving authorized users the ability to access information stored on other
computers on the network.
A network allows sharing of network and computing resources. Users
may access and use resources provided by devices on the network,
such as printing a document on a shared network printer.
The size of the network is commonly given various names of
Local Area Network (LAN)
Wide Area Network (WAN) is a computer network that covers a large geographic area
Metropolitan Area Network (MAN) is a large computer network that usually spans a city2
or a large campus.
A typical home or small office router

Common networks

Common network topologies

A typical home or small office router


showing the ADSL telephone line and
Ethernet network cable connections 3
Computer Network at home

4
Source: http://greencloudcomputers.com/home-networking/
Terms of network
(Server): is a computer program or a machine that waits for requests from
other machines or software (clients) and responds to them. The purpose of a
server is to share data or hardware and software resources among clients.
Typical computing servers are database servers, file servers, mail servers,
print servers, web servers, game servers, and application servers.

(Clients): is a relatively small desktop computer, let user can access the
shared network resources.

(Users): is a person who is using the terminals / resources of network.

(Media): is a physical connection between computers in a network.

(Resources): the objects which any terminals can access on it in a network.

(Protocols): is a communication standard or rules in a network.

5
LAN and WAN
1. Local area network (LAN)
A computer network that spans a relatively small area,
e.g. within a building or a company
Usually privately owned
With high-speed switched connections to 1Gbps

2. Wide area network (WAN)


A system of LANs connected over any distance via
telephone lines and radio waves
Usually leased from telecommunication service
providers
Common ISPs (like internet service for residentials)
Dedicated lease lines of a certain bandwidth (e.g.
256kbps, 1Mbps)

6
Characteristics

LAN MAN WAN

Characteristics Cover scope : Cover scope : Cover scope :


small large largest
Transmission Transmission Transmission
speed : high speed : normal speed : slow
Transmission Transmission Transmission
error: little error: few error: big chance

7
LAN Topologies
THREE (3) most popular topologies
1.Star topology: all nodes are connected to a special central
node. This is the typical layout found in a Wireless LAN, where
each wireless client connects to the central Wireless access point.
2.Bus topology: all nodes are connected to a common medium
along this medium. This was the layout used in the original
Ethernet, called 10BASE5 and 10BASE2.
3.Ring topology:each node is connected to its left and right
neighbour node, such that all nodes are connected and that each
node can reach each other node by traversing nodes left- or
rightwards. The Fiber Distributed Data Interface (FDDI) made use
of such a topology.

The topology of a network is how each node (computer,


device) is connected to its partners both physically and
logically 8
Centralized Network

Centralised Network

1. Less reliability – if central node fails, the whole system fails


2. Network controller (master) that controls the data transfers between all
nodes (slaves) in the network
3. All transfers must pass through the central node
4. Simpler network protocol
9
Decentralised Network

Decentralised Network
1. All nodes have the same right to use and control over the
network links
2. All nodes governed by the same rules
3. No distinct network master required
4. Failure of any one node will not affect the others
5. Network protocol is more complicated than a centralised one
10
Topology: Star, Ring, Bus

11
LAN Standard
Developed under IEEE 802.x
Includes the Data Link and Physical Layers of the OSI Seven Layer
Model
Top layer is the Logical Link Control (LLC)
Below LLC is the Medium Access Control (MAC) and standardized
as
◦802.3 CSMA/CD Networks
◦802.4 Token Bus Networks
◦802.5 Token ring Networks
◦802.6 Metropolitan Area Networks
◦802.7 Broadband Technical Advisory Group
◦802.8 Fiber Optic Technical Advisory Group
◦802.9 Integrated Voice and Data LAN Interface
◦802.10 Standard for Interoperable LAN Security
◦802.11 Wireless LAN (a,b,g,n…)

However, LLC layer is seldom used to improve efficiency, e.g. use


of IP address (Network Layer) to directly access the MAC layer.
12
Wireless LAN
Most Ethernet networks used in building automation use coaxial,
twisted-pair or fiber-optics cable. Wireless LAN (WLAN) offers another
way that can be used to connect remote locations.

Transmission with WLAN is transparent. This means that you will not
normally distinguish the difference between WLAN and cable
transmission.

WLAN, However, is less reliable and more prone to interference.

The most widespread standards are 802.11b and 802.11g, which use
the 2.4 GHz frequency band.

Other Wireless Technologies such as Bluetooth, Zigbee and wireless


audio also use the same frequency band.

13
LAN區域網絡 and Gateway閘道器
Networks comprise additional basic system building blocks, such as network interface
controller (NICs), repeaters, hubs, bridges, switches, routers, modems, and firewalls.

(LAN) connects 連接
中繼器(Repeater)-A repeater is an electronic device that receives a network signal,
cleans it of unnecessary noise and regenerates it. The signal is retransmitted at a
higher power level, or to the other side of an obstruction, so that the signal can cover
longer distances without degradation.
橋接器(Bridge)-connects and filters traffic between two network segments at the
data link layer (layer 2) of the OSI model to form a single network.
集線器(Hub) - Hubs have been mostly obsoleted by modern switches; but
repeaters are used for long distance links

(Gateway) a network node equipped for interfacing with another network that uses
different communication protocols
用來轉換不同的協定和資料型態: 為兩個不相容網路彼此間連線的連接點或交
換點,e.g. LAN與WAN作連線
讓兩種不同技術類型的網路之間得以互相通 訊所需的軟硬體=> 協定轉換 14
15
16
Unshielded twist pair
Short for Unshielded Twisted Pair, a UTP
cable is a cable used in computer
networking that consists of two shielded
wires twisted around each other. The
image shows various network cables,
including UTP

17
Ethernet port

RJ45

乙太網路(Ethernet)
目前最普遍的網路種類
有數種不同類型,e.g. :
10Base-5
10Base-2
10Base-T
100VG-AnyLAN
全部都使用CSMA/CD的媒體存取方式
18
BNC coaxial connector

19
OSI - Open System Interconnection
OSI uses the layered architecture. All the networking functions are
partitioned into several groups - called layers - in such a way that
upper layers uses the services provided by lower layer.
1. Physical layer
2. Data-Link Layer
3. Network Layer
4. Transport layer
5. Session Layer
6. Presentation Layer
7. Application layer

OSI model partitions networking functions into seven layers.


IEEE developed the 802.3, 802.4 and 802.5 standards for datalink
layers implementing CSMA/CD, token-bus and token-ring
medium-assess methods.
20
The ISO/OSI Reference Model
Application Layer
An Interaction between application program and network. E.g. File Transfer
Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol
(POP), Hypertext Transfer Protocol (HTTP)
◦Using different protocols will decode the message accordingly
Presentation Layer
Coordination data exchange format
Session Layer
Allows users to use a simple name to establish connections
Transport Layer
Allow point to point connection (datagram and segment)
Network Layer: Provides users with a means of communicating between logical
networks, including network routing, addressing and flow control
Data Link Layer: Defines rules for sharing the use of the Physical Layer among
network nodes in the LAN
Physical Layer: Specifies the electrical signaling, and the mechanical or
physical connections applicable to the medium 21
Description of OSI layers

https://en.wikipedia.org/wiki/OSI_model 22
TCP/IP principles –
Internet Protocol (TCP/IP)
Transmission Control Protocol (TCP)
TCP is a transport layer protocol used by applications that require
guaranteed delivery.負責資料的分割及重組

Internet Protocol (lP) The Internet Protocol is a Network Layer


protocol that contains addressing information and some control
information that enables packets to be routed.負責控制資料傳送

• Internet Protocol (IP)‐based network systems are becoming


increasingly common as a communications backbone for
facility systems.
• Intelligent Building systems use Local Area Networks (LAN)
on a single IP‐based network.

Most manufacturers of BAS and related sensors and controls


are designing their products to operate on an IP network.
23
IP address format
IP address format: The 32- bit IP address is grouped 8 bits at a time,
separated by full stops (‘dots’), and represented in decimal format
(known as dotted decimal notation). Each bit in the octet has a binary
weight (128, 64, 32, 16, 8, 4, 2, 1). The minimum value for an octet is 0,
and the maximum value for an octet is 255. Figure 6.3 illustrates the
basic format of an IP address.

IP address classes: IP addressing supports five different address


classes: A, B, C, D and E. Only classes A, B, and C are available for
commercial use. The left- most (high- order) bits indicate the network
class. The high- order bits in each class are fixed. Figure 6.4 illustrates
the format of the commercial IP address classes.

24
An IP address consists of 32
bits , group into 4 octets

25
26
An IP address is a 32-bit address allocated to a device connected to the
Internet. It consists of two fields: net-id and host-id. To facilitate IP address
management, IP addresses are divided into five classes

27
Range of possible values for the
first octet of each address class

For example, an IP address of 172.31.1.2, the first octet.


Since 172 is between 128 and 191, 172.31.1.2 is a Class B address.
28
Class A B C D

29
The TCP/IP model or Internet layering scheme and its relation to common protocols often layered on top of it.

Communications protocols
A communications protocol is a set of rules
for exchanging information over network links.
In a protocol stack (also see the OSI model),
each protocol leverages the services of the
protocol below it. An important example of a
protocol stack is HTTP (the World Wide Web
protocol) running over TCP over IP (the
Internet protocols) over IEEE 802.11 (the Wi-
Fi protocol). This stack is used between the The TCP/IP model or Internet
wireless router and the home user's personal layering scheme and its
computer when the user is surfing the web. relation to common protocols
often layered on top of it.
IP is a network layer protocol whereas TCP
is a transport layer protocol.

Souce:// https://en.wikipedia.org/wiki/Computer_network 30
31
32
Interoperability
Integration and Interoperability
Integration might be defined as the ability to group intelligent,
standalone unit controllers into a cohesive Building Management
System.

Interoperability is defined as the ability to link multiple standalone


building systems from variety of manufacturers (such as those for
HVAC, fire & life safety, lighting or access control) into a
comprehensive unit. It is the ability of devices from different vendors
to work together through the digital exchange of information. It allows
the project designer of having a wider range of products to choose
from multiple manufacturers and different generations, therefore,
ensures expandability of installation, because the new device can be
used with older ones.

They are of the very important features to be concerned in selecting


BMS systems. Network with open protocols are the trend of network 33
development and market need.
The major advantages of interoperable
systems include the followings (Piper, 2006):

1) Lifecycle cost is lower due to more competition


between system and component vendors.

2) The use of a single user interface reduces training


costs while increasing data accessibility.

3) Greater access to data allows better management of


resources and facilities.

4) Integrating independent functions into a single,


interoperable system makes operations more flexible and
efficient.
34
Gateways (= intelligent translator) as an interface
between close proprietary systems and BACnet

Source: http://www.bacnet.org/Bibliography/EC-9-97/EC-9-97.html 35
END

36

You might also like