Page 477 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 477

The readers will doubtless have raised concerns regarding the risk of hackers, viruses, or other
            malicious approaches to the integrity of the environment. The building control network has to be
            protected  and  experience  to  date  has  generally  shown  that  providing  that  the  network  is  not
            exposed to a public internet and remains as a private infrastructure there is a strong ability to ensure
            a  very  high  level  of  protection.  Since  the  intelligent  building  is  largely  a  real  time  operation
            monitoring a fixed number of fixed devices there is little opportunity for miscreants to have access
            or to inject undesirable code or devices into the network. However, if a high value operation of a
            client is involved in the building, such an attack does become an attractive proposition. Increasingly,
            the security integration and resilience parameters are showing greater through life efficiencies by
            not outsourcing but rather having localised community networks with intelligent local response.
            This ensures continued operation in the event of an ice storm of similar 'global' event in which large
            area access to the cloud and other public communication networks is lost. External monitoring is
            therefore sufficient and allows effective firewalls around the operational system.

            2.3  Technologies


            The discussion of individual and specific technologies related to the intelligent building has been
            smattered through the earlier discussion and provision of definitions for the intelligent building.
            These technologies are therefore seen to depend heavily on communications in order to perform
            the monitoring and provision of data to those responsible for controlling the buildings.

            Communications technology of choice today, is generally based on an IP‐based network running at
            any one of the standard protocols and speed. If video is not part of the intelligent building (which it
            often  is)  then  the  amount  of  data  actually  exchanged  between  devices  is  relatively  small.  For
            example reporting on the status of a lighting controller, the status of a fan motor, or the credentials
            presented by a user wishing to gain access to an elevator floor are all very limited. Video cameras,
            particularly those using 360° viewing fields, colour images, and real time imaging will generate vastly
            more  data.  Provision  of  fibre‐based  networks  easily  accommodate  these  kind  of  volumes  and
            images and the data used for such images can be significantly reduced by using well established
            technologies of only recording when data changes i.e., the use of an analytic process to control data
            flow. Therefore it is not easy to generalize what solution is most appropriate for the communication
            infrastructure in any given application.

            The  redundancy  or  resilience  of  the  communication  infrastructure  is  however  paramount,
            particularly if many disparate systems are going to share this infrastructure as is being advocated by
            this  report.  Use  of  a  single  infrastructure  is  desirable  but  clearly  occupants  will  become  very
            frustrated if the communication infrastructure suffers a malfunction and as a result such as lighting,
            telephone, signage, computer networks, access control in turn all become victims of that single
            failure.
            Adoption of an appropriate communication protocol to operate with each of the sub‐systems is a
            function which requires cooperation between all of the design engineers. While there are lighting
            control systems, access control systems, sound systems, signage systems, etc., all of which can
            communicate using an IP protocol, the base commands used by some of these systems may invoke
            other  protocols  or  may  restrict  the  selection  of  systems.  For  example  industry  standards  have
            evolved  for  access  control  systems,  which  have  used  traditionally  used  RS  485  based
            communications. While this is a changing situation, it is appropriate to analyse and decide whether
            a  purely  IP  solution  meets  all  of  the  needs  for  the  project.  Clearly,  reliable  power,  i.e.,  use  of
            uninterruptable power supplies (UPS) or generators is as crucial as needing the provision of network
            infrastructure  which  has  resilient  paths,  ports,  and  devices.  Self‐healing  networks  are  common



            ITU‐T's Technical Reports and Specifications                                                  467
   472   473   474   475   476   477   478   479   480   481   482