Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UKEssays.com.
As we known BMS are created to controlled central computer method which has 3 basis functions, which is controlling, monitoring and also optimizing.
However, there is a BMS server software to facilitate the works of facilities management which to functioning within the building and also to fulfill the building operation and maintenance.
The BMS server system is composed of 3 sets of reducant computers, which communicate with several kinds of input or output devices, subordinate computer system and higher order computer systems. The sections described the software required to achieve the desired functionality of the BMS.
The software design is based upon real time data acquisitions and control capability. Data including point values, parameters, messages, instructions, databases access statements, master clock synchronization and other forms of computers data exchange may originates from or be destined for other sub-system and computers and database which may form pat of TAMS.
It is responsibility of the BMS Sub-System Contractor to develop, test, document and debug software interface routines and supporting hardware to accomplish the interface requirement of BMS to TAMS and any other system or sub-system with which the BMS is required to communicate.
The BMS Sub-System Contractor will provide software for the BMS Sub-System, which is proven in actual field installation of a similar size and scope. The BMS Sub-System Contractor will provide complete information and responses with tenders including reference sites, name, and telephone number of reference site contracts.
KLIAB respects the propriety nature of certain software. Commercially available software purchased from a third party such as Microsoft Windows, UNIX, OS/2 and similar software packages are provided. Licenses are bound with the operation and maintenance manuals for BMS system.
BMS manufacturer’s proprietary software is provided fully licensed. All BMS manufacturer’s proprietary software will have complete sources codes, programs listings and supporting information deposited in an escrow account at the BMS Sub-System Contractor’s expense.
BMS Server Software
The BMS server computers will utilize a multi-user, multi tasking operating system designed for client server operations. The operating system will support all the required software functions and application described in the BMS specifications.
Standard services supported by Operating System on serves will include the following:
Multi- tasking Multi- user support
POSIX 1003, 1 compliance
TCP/IP, SLIP Network Support
Network File System (NFS)
C language complier
The BMS Sub-System Contractor will provide to the SMC one complete set of operating system user manuals and programmer’s references manuals bound as part of each BMS Operation and Maintenance Manual.
BMS Software Executive
The BMS Sub-System Contractor shall provide a complete BMS software executive module which provides at minimum:
Workstation communication sport
Printer quering and tasking
I/O Channel support for up to 99 communication channel
Disk optimization routines
On-line database backup and restoration
Memory management functions
Software watchdog functions
Server Redundancy Software
The BMS Sub-System Contractor will provide six complete server computers arranged as three sets of redundant ‘hot standby’ server system.
Each server computer are equipped with all hardware and software with complete capability to support the designated BMS tasks.
Each server will coexist on the BMS network and are able to automatically assume full operation of BMS without any loss of data, alarm, or status information.
The redundancy software provides full databases charges made to the primary server are propagated to the backup server without any operator intervention.
Changeovers from primary to backup server are accomplished within 10seconds, whether manually initialed or automatically initialed.
Detection of any server software execution failure will cause the automatic transfer of all server functions to the backup server and will initiate a primary server failure alarm.
These alarm are distributed a BMS Alarm Handling Software specifications. These sewer failure alarms are classified at the highest priority level.
The BMS Sub-System Contractor will provide a hardware or software switch to allow the user selection of which server computer is the primary server, and which is the backup server.
Such selections are made freely and at any time during the normal operations of the BMS Server System.
It is possible at any time to completely remove one of the server computers for repair, maintenance or other need without disrupting normal BMS operations.
BMS workstations will automatically switch the user interface and TCP/IP address to the server in control of the BMS, without operator intervention.
Alarm Handling Software
Complete Alarm Handling Software modules are provided in the BMS server software package.
The alarm handling software will provide comprehensive alarm detection and management facilities to allow fast and accurate notification to the BMS of abnormal point values or conditions.
Alarm Attribute Table
Each and every BMS point capable of alarm will have alarm attribute assigned in an alarm attribute table.
The alarm attribute table will govern the way and means by which the point alarm is reported by the BMS.
The alarm attribute table are on-line definable and changeable by an authorized BMS user. Each point defined in the Alarm Attribute Table will, upon change of state, read the table and be acted upon accordingly.
For each point the following attribute are definable:
Print alarm/ inhibit printing
Printers assigned to print point alarm
Print alarm only
Print all point events
Workstation assigned to display alarm
Alarm class 1-4 (normal, urgent, low, journal)
Alarm priority 1-9 (9 priorities within each class)
Unanswered Alarm Software
If dedicated BMS workstation is been assigned to receive an alarm, each incoming alarm will start a software timer who starts upon alarm generations and ends upon alarm acknowledgement.
If an alarm is not acknowledge within a user defined number of seconds, an unanswered alarm are automatically generates and displayed at the EOC monitoring room BMS workstations, whether or not the EOC monitoring room workstation were assigned to receive the original acknowledge alarm. The unanswered alarm events are recorded as a transaction in the historical transaction database file.
These software were helped the facilities management functioning within the building by utilizing Building Management System to fulfill the building operation and maintenance. It is also helped to ease of information availability problem diagnostics and helped computerized maintenance scheduling. However, this software was maintained effective use of maintenance staff and it is give more satisfied an occupants.
Cite This Work
To export a reference to this article please select a referencing stye below:
Related ServicesView all
DMCA / Removal Request
If you are the original writer of this essay and no longer wish to have your work published on the UKDiss.com website then please: