assignment build tech

Upload: christina-miles

Post on 11-Oct-2015

22 views

Category:

Documents


0 download

DESCRIPTION

bla

TRANSCRIPT

ATBQ 4094 Advanced Building Technology & Practices The Implementation of Integrated Solution to BuildingDescription of work done of each memberDescriptionsDone by

AcknowledgementLee Kian Woei

AbstractHo Pui Wua

List of figuresLee Kian Woei

1.0 Introduction Lee Kian Woei

1.1 Case Studies on the implementation of Integrated Solution to BuildingLee Chun Hong

2.0 Level of System IntegrationLee Chun Hong

2.1 Level of Integration system for the library: Level 3 proprietary, Multi PlatformLee Chun Hong

2.1.1 Attributes of Multi PlatformLee Chun Hong

2.2 Back-up power systemsLee Chun Hong

2.3 Lighting control systemLee Chun Hong

2.4 HVAC Lee Chun Hong

2.5 Fire DetectionLee Chun Hong

2.6 Security SystemLee Chun Hong

2.6.1 ACCESS CONTROL AND INTRUDER ALARMS Lee Chun Hong

2.6.2 Network Controllers Lee Chun Hong

2.6.3 Interface Panels Lee Chun Hong

3.0 IMPROVEMENT OF THE LEVEL OF SYSTEM INTEGRATION (LEVEL 5-SEMI-INTEGRATED BUILDING)Ho Pui Wua

3.1 Library RFID Management SystemHo Pui Wua

3.2 Lighting Control SystemHo Pui Wua

3.3 Fire Alarm SystemHo Pui Wua

3.4 Temperature Control SystemHo Pui Wua

4.0 Slow ImplementationLiew Peng Yan

5.0 AdvantagesLee Kian Woei

5.1 Energy EfficiencyLee Kian Woei

5.2 Seamless exchange of dataLee Kian Woei

5.3CostLee Kian Woei

5.4 SecurityLee Kian Woei

5.5 SystemLee Kian Woei

5.6 Communication

6.0 DisadvantagesLee Yen Lim

6.1 Cost6.2 Storage SpacingLee Yen Lim

6.3 Lack of Installation and Maintenance ExpertLee Yen Lim

6.4 Lack of Design ExpertLee Yen Lim

7.0 ConclusionLiew Peng Yan

ReferencesLee Yen Lim

BibliographyLee Yen Lim

AppendicesLee Yen Lim

SoftcopyLee Kian Woei

AcknowldgementThis report compiled and written by Lee Chun Hong, Ho Pui Wua, Liew Peng Yan, Lee Kian Woei and Lee Yen Lim with the assignment question The Implementation of Integrated Solution to Building is relate the knowledge of integrated solution to the design and construction of intelligent buildings. We would also like to thank those students who have discussed with us for this assignment. Their opinion and suggestion are the essential part for this report. We really appreciate for their cooperation.Furthermore, we would also like to thank Ms. Mazura BT Mahdzir and Mr. Yeo Shou Pin, our lecturer and tutor for Advanced Building Technology & Practices. They had given us many ideas and guidelines on the way to complete this assignment. They also direct us from the mistakes and points out the important parts that we need to concentrate on.For these reason, we could only finished this report before the submission date and completed it with all the meaningful information.Thank You.

AbstractThe invention of computer has yet again bringing an evolution to the design of building. Now newly built buildings are integrated with computers to manage, maintain and improve the building itself. Computer integrated building allow communication among its systems, incorporating maximum automation thus minimizing manual operation to ensure maximum ease and comfort.The building we selected as a case study is a library; it is a new built library. Therefore, it has a high level of integrated solution. The system is completely dependent and it run with a common control system. Therefore, it is convenient to the building user.

Abbreviations RZK - Real-Time Kernel HVAC - Heating, Ventilating, and Air Conditioning BOS - Building Operating System CCTV Closed Circuit Television

List of FigureFigure 1: Building A8

Figure 2: Back- up Power10

Figure 3: Lighting Control 11

Figure 4: Temperature & humidity control12

Figure 5: Fire detection and smoke control13

Figure 6: Fire detection System13

Figure 7: Security system16

Figure 8: Management System17

Figure 9: Various types of occupancy sensors21

Figure 10: Fire Safety System23

Figure 11: Hardware Block Diagram of an Automatic Temperature Control System Using RZK25

Figure 12: Connection Between the eZ80F91 Development Platform and the Thermostat Board26

Figure 13: Test Setup For an Automatic Temperature Contol System Using RZK26

1.0 IntroductionInengineering,system integrationis the bringing together of the componentsubsystemsinto one system and ensuring that the subsystems function together as a system. In information technology, systems integration is the process of linking together different computing systems and software applications physically or functionally.Thesystem integratorbrings together discrete systems utilizing a variety of techniques such ascomputer networking,enterprise application integration,business process managementor manual programming. Asystemis an aggregation of subsystems cooperating so that the system is able to deliver the over-arching functionality. System integration involves integrating existing (often disparate) subsystems. The subsystems will have interfaces. Integration involves joining the subsystems together by gluing their interfaces together. If the interfaces dont directly interlock, the glue between them can provide the required mappings. System integration is about determining the required glue.System integration is also about adding value to the system, capabilities that are possible because of interactions between subsystems.In todays connected world, the role of system integration engineers is becoming more and more important: more and more systems are designed to connect together, both within the system under construction and to systems that are already deployed.

1.1 Case Studies on the implementation of Integrated Solution to BuildingBuilding A- LibraryThe building in which the survey is conducted is categorized as a Level 3 in Integrated Solution. Level 3 buildings, also known as building with only Hardwired Links incorporates no integration.As such, systems in a Level 3 building are completely dependent where it is an open system. It is operating with a shared cabling infrastructure and runs with a common control system. It is uses open control protocol to control.

Figure 1 : Building A

2.0 Level of System Integration2.1 Level of Integration system for the library: Level 3 proprietary, Multi Platform

Fire Detection and Smoke Control

Center Work Station

Lighting Control

Temperature & Humidity Control (HVAC)

Back-up Power

Security System

Ethernet

2.1.1 Attributes of Multi Platform1. The system is operated within 1 area.2. It is completely dependent. For example, when the temperature control figured out temperature inside the library is over high, the fire detection system will operate to check whether the library is on fire.3. It is an open system.4. This system is operating with a shared cabling infrastructure.5. All the system is runs with common control system.2.2 Back-up power systemsEmergency back-up power systems are a type of system, which may include lighting, generators, fuel cells and other apparatus, to provide backup power resources in a crisis or when regular systems fail. They find uses in a wide variety of settings from residential homes to hospitals, scientific laboratories, data centers, telecommunication equipment and modern naval ships. Emergency power systems can rely on generators, deep cycle batteries, flywheel energy storage or hydrogen fuel cells. Finally, some homebrew emergency power systems use regular lead-acid car batteries.

Figure 2 : Back-up power

2.3 Lighting control systemA Lighting control system consists of a device that controls electric lighting and devices, alone or as part of a daylight harvesting system, for a public, commercial, or residential building or property, or the theater. Lighting control systems are used for working, aesthetic, and security illumination for interior, exterior, and landscape lighting, and theater stage lighting productions. They are often part of sustainable architecture and lighting design for integrated green building energy conservation programs.Lighting control systems, with an embedded processor or industrial computer device, usually include one or more portable or mounted keypad or touchscreen console interfaces, and can include mobile phone operation. These control interfaces allow users the ability to remotely toggle (on-off) power to individual or groups of lights (and ceiling fans and other devices), operate dimmers, and pre-program space lighting levels.

Figure 3: Lighting control

2.4 HVAC HVAC (Heating, Ventilating, and Air Conditioning) refers to technology of indoor or automotive environmental comfort. HVAC system design is a major subdiscipline of mechanical engineering, based on the principles of thermodynamics, fluid mechanics, and heat transfer. Refrigeration is sometimes added to the field's abbreviation as HVAC&R or HVACR, or ventilating is dropped as in HACR (such as the designation of HACR-rated circuit breakers).HVAC is particularly important in the design of medium to large industrial and office buildings such as skyscrapers and in marine environments such as aquariums, where safe and healthy building conditions are regulated with temperature and humidity, as well as "fresh air" from outdoors.

Figure 4 : Temperature & humidity control

2.5 Fire DetectionIntegrated spark and fire suppression systems provide protection for your production. The system detects fires in the early developing stages and extinguishes the flames before they can escalate into uncontrolled fires and potential dust explosions. Alarms are activated to alert the operator of the situation so additional action can be taken. The fire suppression system is integrated into production equipment to monitor cabinet spaces where materials are worked, milled, and processed.

Figure 5: Fire detection and smoke control

Figure 6 : Fire detection System2.6 Security System2.6.1 ACCESS CONTROL AND INTRUDER ALARMS Access control system shall be integrated with building automation, lighting controls and other security systems using the Building Operating System (BOS) as the integration platform. Access control shall be implemented with proximity readers, control nodes, electronic keys and electronic locks. Users can be classified so that they have access only to the spaces they are allowed to enter according to programmed time schedules. The access control system is connected to BOS for full control and reporting, and integrated into the central user interface. Intruder alarm system shall include perimeter protection and indoor surveillance. Monitored doors and windows shall be equipped with magnetic contacts. Movement detectors used in indoor surveillance shall be sensitive enough for presence detection of a single person, so that they can also be used for lighting controls and air-conditioning controls. Intruder alarms are seamlessly integrated on software level to access control, CCTV/DVR/NVR, lighting control and building automation. Granted access disarms the alarm zones automatically. In case of burglary the system gives an alarm, which is relayed through BOS to Service Center and/or to specified mobile phones.

2.6.2 Network Controllers Network Controllers shall connect access control and intruder alarm system with Management Level using an open interface utilizing TCP/IP protocol. Network Controllers shall connect with up to 32 Interface Panels using RS-485 bus. The door/reader Interface Panels shall operate also autonomously with no connection to a Network Controller. Network Controllers shall buffer the offline transactions from Interface Panels when connection to the BOS server is down and send the transactions when the connection is restored. The Network Controller shall enable access control database with 44.000 card holders. The memory of the Network Controller shall be easily expandable to accommodate up to 250.000 card holders. Each card holder can belong to max 8 access groups. The total number of available access groups in the system shall be 65.535. Each access group shall have a schedule based access to defined door groups. The Network Controllers shall be able to communicate with each other to create large-scale area control solutions with independent control logics. Area control solutions shall be expandable using TCP/IP network to include door/reader Interface Panels located under several Network Controllers. Network Controller shall have local inputs for tamper and battery failure for indications and alarms. 2.6.3 Interface Panels The selection of Interface Panels shall include at least Door/Reader Interface Panel, Input Monitor Interface Panel and Output Control Interface Panel. The Interface Panels shall connect with Network Controllers using RS-485 bus. Door/Reader Interface Panels shall have two reader interfaces utilizing standard Wiegand protocol. Depending on application, the panel can be configured to control two sets of separate doors with a reader and an exit button, or one door with two-side readers (entry/exit). In addition to the two reader interfaces, the Door/Reader Interface Panels shall have the following inputs and outputs: door monitor input, exit button input, strike relay output, auxiliary relay output.

Figure 7 : Security system 3.0 IMPROVEMENT OF THE LEVEL OF SYSTEM INTEGRATION (LEVEL 5-SEMI-INTEGRATED BUILDING)3.1 Library RFID Management System

Figure 8: Management SystemRFID Technology for Libraries1. RFID (Radio Frequency Identification) is the latest technology to be used in library theft detection systems. Unlike EM (Electro-Mechanical) and RF (Radio Frequency) systems, which have been used in libraries for decades, RFID-based systems move beyond security to become tracking systems that combine security with more efficient tracking of materials throughout the library, including easier and faster charge and discharge, inventorying, and materials handling.2. RFID is a combination of radio-frequency-based technology and microchip technology. The information contained on microchips in the tags affixed to library materials is read using radio frequency technology regardless of item orientation or alignment (i.e., the technology does not require line-of-sight or a fixed plane to read tags as do traditional theft detection systems) and distance from the item is not a critical factor except in the case of extra-wide exit gates. The corridors at the building exit(s) can be as wide as four feet because the tags can be read at a distance of up to two feet by each of two parallel exit sensors.3. The targets used in RFID systems can replace both EM or RF theft detection targets and barcodes.Rapid check-out / check-inThe use of RFID reduces the amount of time required to perform circulation operations. The most significant time savings are attributable to the facts that information can be read from RFID tags much faster than from barcodes and that several items in a stack can be read at the same time. While initially unreliable, the anti-collision algorithm that allows an entire stack to be check-out or check-in now appears to be working well.The other time savings realized by circulation staff are modest unless the RFID tags replace both the EM security strips or RF tags of older theft detection systems and the barcodes of the library management system - i.e., the system is a comprehensive RFID system that combines RFID security and the tracking of materials throughout the library; or it is a hybrid system that uses EM for security and RFID for tracking, but handles both simultaneously with a single piece of equipment. There can be as much as a 50 percent increase in throughput. The time savings are less for check-out than for check-in because the time required for check-out usually is extended by social interaction with patrons.Simplified patron self-check-out / check-inFor patrons using self-check-out, there is a marked improvement because they do not have to carefully place materials within a designated template and they can check out several items at the same time.Patron self-check-in shifts that work from staff to patrons. Staffs are relieved further when readers are installed in book-drops.High reliability1. The readers are highly reliable. RFID library systems claim an almost 100 percent detection rate using RFID tags.2. There is no false alarm than with older technologies once an RFID system is properly tuned.3. RFID systems encode the circulation status on the RFID tag. This is done by designating a bit as the "theft" (EAS) bit and turning it off at time of check-out and on at time of check-in. If the material that has not been properly check-out is taken past the exit sensors, an immediate alarm is triggered.High-speed inventoryingA unique advantage of RFID systems is their ability to scan books on the shelves without tipping them out or removing them. A hand-held inventory reader can be moved rapidly across a shelf of books to read all of the unique identification information. Using wireless technology, it is possible not only to update the inventory, but also to identify items which are out of proper order.Automated materials handlingAnother application of RFID technology is automated materials handling. This includes conveyer and sorting systems that can move library materials and sort them by category into separate bins or onto separate carts. This significantly reduces the amount of staff time required to ready materials for re-shelving.Long tag lifeFinally, RFID tags last longer than barcodes because nothing comes into contact with them. Most RFID vendors claim a minimum of 100,000 transactions before a tag may need to be replaced.3.2 Lighting Control SystemAnother integrated solution to the building is the adoption of automatic lighting controls that switch the lights based on occupancy. Occupancy sensors are automatic switching devices that sense human occupancy and control the lighting system accordingly, either by turning on or off the lighting system. This system can reduce the hours of operation for a lighting system which can significantly reduce energy use and associated costs. By turning off the lights when occupants are not present using occupancy sensors, this can reduce energy waste that can result in a reduction in lighting energy consumption.One of the occupancy sensors that can be used in the building is Infrared energy which it is suitable to install in the reading areas of the library. It is able to reach the sensor through the opaque window because the plastic used is transparent to infrared radiation. This plastic sheet or bubble prevents the introduction of dust which could obscure the sensor's field of view.A person entering the monitored area is detected when the infrared energy emitted from the person's body is focused by a lens or a mirror segment and overlaps a section on the chip which had previously been looking at some much cooler part of the protected area. As the person moves, so does the hot spot on the surface of the chip - moving hot spots cause the electronics connected to the chip to de-energize the relay, operating its contacts and illuminating the lamp circuit.Relays can be incorporated in the lighting circuit to have more than one detector operating the same lights for example both end of a corridor or to switch between dimmed lighting when areas are unoccupied and full output when movement is detected.Occupancy sensor placement is very important to the successful implementation of the control design intent. Occupancy sensors must be located to ensure that they will not detect movement outside of the desired coverage area, through an open doorway, for example. Ultrasonic devices are sensitive to air movement and should not be placed near an HVAC diffuser, where air movement may cause false tripping.Occupancy controls can be used in conjunction with dimming or daylight controls to keep the lights from turning completely off when a space is unoccupied, or to keep the lights off when daylight is plentiful and the room is occupied. This control scheme may be appropriate when occupancy sensors control separate groups of luminaires, or "zones", in a large space, such as in a laboratory or an open office area. In these situations, the lights can be dimmed to a predetermined level in one specific area when the space is unoccupied.

Figure 9: Various types of occupancy sensors

3.3 Fire Alarm SystemThere are many reasons for integrating fire alarm systems with other building automation and control systems. Examples include smoke control, single seat access to building information, easier maintenance, sharing sensor data, obtaining information about the location of people during an emergency, and providing infrastructure for new technology to improve performance and safety.Fire detection systems have been integrated with door locks and with HVAC fan and damper controls for smoke management for several years, but these systems have relied on relays controlled by the fire alarm system to override the normal controls. This kind of integration has primarily involved constant-volume HVAC systems and required only on/off control of fans and dampers to be moved to fully open or fully closed positions. Many modern HVAC systems are far more complex. Variable air volume systems are used to reduce energy consumption. These systems require sophisticated control algorithms to operate either a continuously variable-speed fan or inlet guide vanes to control the static pressure in the supply air duct. Variable air volume boxes control the airflow from the supply duct into individual rooms by modulating dampers. The control algorithms for these systems are complicated and require interlocks and safeties to prevent overstressing ductwork in the event that dampers do not open when fans are turned on. Smoke management is much more complicated with these systems and outside of the capability of most fire alarm systems. What is needed is a way for the fire alarm system to command the HVAC control system to enter a smoke control mode and let the HVAC controllers manage the equipment. New sensors are being developed that can recognize various contaminants in the air that can represent a fire signature or a hazardous contaminant that poses a life safety threat. In an integrated system, these sensors could be used by the HVAC control system to control ventilation rates with no adverse impact on their life safety functions. Multiple uses for the same information will make it more cost-effective to implement new sensor technology. In some buildings, access control systems monitor the location of building occupants. Providing access to this information to the life safety systems could be very helpful in an emergency. Emergency response personnel would know where to look for occupants who need to be evacuated. They could also reduce the risk to themselves by avoiding dangerous areas where no people are present.

Figure 10: Fire Safety System3.4 Temperature Control SystemReal-Time Kernel (RZK) is temperature control software which can be used to control various devices to maintain a temperature. This temperature control application reads a value from a temperature sensor and determines when to switch a fan or bulb off or on according to minimum and maximum temperature limit settings. These settings can be changed using upper and lower limit set switches. The limit settings and the current temperature are displayed on an LCD panel.

Software ImplementationThe software implementation for the automatic temperature control system provides the functionality to maintain a temperature within a specified limit. The main functions provided by this application are listed below:

Automatic fan ON/OFF Automatic bulb ON/OFF Set lower and upper limits by pressing a switch Read a temperature from a temperature sensor Display the current temperature and the lower and upper limits on LCD

The automatic ON/OFF of the bulb and fan, and the setting of the lower and upper limits is controlled by the TempControlTask. If the temperature read by RZKTempReadTask is greater than the set upper limit, then this task switches off the bulb and switches on the fan. If the read temperature is lower than the set limit, RZKTempRead-Task switches the bulb on and switches off the fan.

RZKTempReadTask

This function reads the current temperature from I2C temperature sensor.

TempControlTask

These functions perform the following functions:

1. Set the upper and lower limit.2. Upload the current temperature, upper, and lower limit to display array. 3. Compare the upper and lower set limit with current temperature and Switch ON/OFF the fan/bulb accordingly.

TempDisplayTaskThis function reads and updates the temperature on LCD display. It displays the current temperature, lower, and upper limit of temperature. The main operations performed by this function are read display buffer and update the display with current temperature with lower and upper limit

RZKKeyControlTaskThis function scans the switches for setting the lower and upper limit of temperature. The main operations performed by this function are:

1. Scan the switches.2. If switch SW1 is pressed, decrease the lower limit (LL).3. If switch SW2 is pressed, decrease the upper limit (UL).4. If switch SW1 and SW3 are pressed, increase the lower limit (LL).5. If switch SW2 and SW3 are pressed, increase the upper limit (UL)

Figure 11

Figure 12

Figure 134.0 Slow ImplementationAlthough the systems integration is conceptually important and benefit, but the reality shows that the implementation of high level system integration in Malaysia nowadays is still slow. The implementation of high level systems integration to buildings is slow is because the reasons of lack of funding, costly, high complexity and lack of awareness.Funding will be the one of the reason is because of funding for most of the companies are not much and to implement or upgrade the system integration can cause a various change and need a big amount of money, thus it will cause over budget for most of the companies. Without that, the previous building component will be totally change when upgrade the system integration and it will cause the business of the companies cannot be process during the installation period and the change of building component will also need a big amount of money. That is why it is very difficult for those buildings that desire to upgrade.The second reason is costly, this also the major reason why the systems integration is slow implement to building. This is because the equipments and services of the systems integration are mostly on internet technology based and the I.T based equipment and services are costly. Therefore, to upgrade the systems integration mean almost all the equipment and services also needed to change to the new I.T based equipment and services and it is costly. However, if the owners are desire to upgrade it, the maintenance fees for the high level systems integration is also a big amount, especially the maintenance fees for the I.T based equipments and services.The third reason is high complexity; the complexity level is depending to the systems integration. So, the higher the systems integration, the more complex the systems is. Therefore, most of the owners will decline to implement or upgrade the systems integration due of the high complexity, because it may difficult to manage or control.

The last reason is lack of awareness, the systems integration still a kind of new knowledge to the people in Malaysia, so the awareness of systems integration in Malaysia is not that common, without that, there is not much expertise in this field. Therefore, most of the buildings are still stay static in their form and the level of systems integration are remain in common transport or lower level. Without that, the government also did not put much effort in encouraging the integration system to all building. As a result, there is slow implementation of high level systems integration to buildings.

5.0 AdvantagesThe advantage of system integration to building is that it can improve: the building performance, human comfort, flexibility and efficiency, communications, energy consumption and security and safety. Additionally, it also has the benefits of reducing: risk level, labour cost, operating cost service cost and improve maintenance cost and trouble-shooting. 5.1 Energy Efficiency Conserving energy has become a crucial challenge globally as natural resources are close to exhaustion, energy costs are rising, power grids are reaching capacity and environmental concerns are increasingly prevalent. It is estimated that over 60% of operations and maintenance expenses are for energy use alone and can be reduced by up to 20% through more efficient monitoring and maintenances.5.2 Seamless exchange of data As mentioned above, communications, collaboration and conferencing tools often need to interact with each other. Some examples acontact management systemneeding to pull contacts from email, tasks involving working together on a document, meeting invites to be sent from the calendar system needing to pull contacts from the contact management system. If all these systems are separate need to be created to move data between systems, or it needs to be moved manually. In an integrated system however, data in the form of documents, contacts, emails, tasks, discussions can seamlessly flow between different parts.

5.3 Cost - Low operating cost. An Integrated results in less staff training to support a single cabling solution than is necessary with multiple discrete networks and cabling solutions. This lowers the cost of administration and maintenance. An Integrated has a modular design that is based on the future needs of the facility or campus allowing for ease of system expansion. An Integrated may reduce the overall human resource requirement from what is necessary with multiple discrete networks. A potential reduction in staff requirements may result in lower cost for installation, administration, and maintenance5.4 Security - Improve of better security and safety. Channels all the information from each building or controller within the system into a single visualization environment. Access to all of this data is provided via user security. In this way, a single tenant with space in multiple buildings can have a single view for alarms and system control. At the same time, a separate view of the building, regardless of the tenant, is available for building services or security.5.5 System - Is more efficient and more productive. Library staff and patrons can have access to all pertinent information at one location. For example, in an integrated system, a patron can view a bibliographic record in the online catalog and also see that the book has been checked out and when it is due back to the library. Of course, privacy of borrowers can be protected by preventing patrons from viewing borrower information. Also, patrons can tell by looking at the onlne catalog, in an integrated system, that a book has been ordered, but not yet received. In a system which is not integrated, that information would be available to library staff only through the acquisitions module.

5.7 Communication- Better or improve communication. Staff can use webcam to communicate with other staff. Integration system will improve better communication to get the thing done efficiency and systematic. Communications are performed over a common medium such as a fiber-optic or coaxial backbone. Communications protocols vary depending on the vendor and systems to be interconnected. Hopefully, within this decade, an internationally accepted, open systems network protocol will be agreed upon.

6.0 DisadvantagesThe disadvantages of system integration to buildings are high in cost; storage spacing; longer downtime period; lack of expertise in design and operation and maintenance.6.1 Cost Installation, design and upgrading cost for integration system is much higher compared than systems of lower level building as it incorporates high-end technologies into the system. Example: installation of an occupancy sensors lighting control system.6.2 Storage Spacing To install a multiple systems, the storage required to store these systems as well as the central computer (server sized) will requires a larger space to store them.6.3 Lack of Installation and Maintenance Expert System integration was just introduced in these couple of years, so there still lack of expert to install the system to the building.6.4 Lack of Design Expert To design a good multiple system, it needs an experience expert to design. Because of the reason of the system was just become popular recently, so there are still a lot of improvement needed in the design of system.

7.0 ConclusionIt is good for a building that has a high level of integration solution. A buildings with high level of integration solution make human life easy. For example, we can save the operating cost since the system is operate by computer, it can also improve of better security and safety. Besides that, it can also improve human comfort. The disadvantage of this highly integrated building is high installation and design cost. It is also needed human expertise to design and maintain it. Dislike manual operate system, integrated system will encounter down time. Lastly, it is concluded that it is not the time for buildings in Malaysia to fully embrace high level of integrated solution due to the lack of expertise and availability of product in the market.

References Moore, [Online] Available at http://en.wikipedia.org/wiki/System_integration ( Accessed 10 November 2010)

[Online] Available at http://www.rfid-library.com/en/default_e.html (Accessed on 11 November 2010) [Online] Available at http://www.wbdg.org/resources/electriclighting.php (Accessed on 11 November 2010) [Online] Available at http://www.lightingstyles.co.uk/Accessories-switch-plates-dimpull-lamps/Indoor-PIR-movement-detectors/ (Accessed on 11 November 2010) [Online] Available at http://www.zilog.com/docs/appnotes/an0199.pdf (Accessed on 11 November 2010) [Online] Available at http://www05.abb.com/global/scot/scot209.nsf/veritydisplay/0504c8888239106fc12574b700305173/$File/2CDC500046B0201.pdf (Accessed on 11 November 2010) [Online] Available at http://www.concretethinker.com/casestudies/Highland-Library-ICF.aspx (Accessed on 11 November 2010) [Online] Available at http://khup.com/keyword/integrated-systems-building-services.html (Accessed on 11 November 2010)

Bibliography [Online] Available at http://www.ibswebsite.com/Build.html (Accessed on 11 November 2010) [Online] Available at http://www.osgi.org/wiki/uploads/Markets/SuccessStory_Prosyst_Raumcomputer.pdf (Accessed on 11 November 2010) [Online] Available at http://www.redbooklive.com/page.jsp?id=300 (Accessed on 11 November 2010)

Appendices

Softcopy

4TUNKU ABDUL RAHMAN COLLEGE