Siemens simplifies building management

  • August 27, 2024
  • William Payne

Siemens Smart Infrastructure has launched a new building management system designed to provide open application that can scale from a single to multiple buildings of any size. Desigo Optic incorporates FIN 5, reduces building managment complexity and automates data handling. It improves data visibility and reduces operating expenses while extending asset life, increasing up-time and streamlining workflows by 33%.

Desigo Optic automatically applies standardized tags using the built-in Haystack 4 semantic tagging system.

Haystack tagging provides a standardized structure that makes the data interoperable to provide real-time insight into system operations. Haystack 4 is embedded in FIN 5, the openly distributed framework on which Desigo Optic is built. FIN 5 was designed to be open so it can support all major protocol standards used in buildings today, including BACnet, Modbus, KNX, SNMP and OPC.

Haystack seamlessly integrates with the Niagara framework and supports MQTT and REST protocols to provide visibility of real-time data in one place.

Desigo Optic dashboards provide data-driven intelligence about performance, operations, maintenance, health, comfort and safety that leads to better informed decisions.

The system can be installed through software installation or by installing the CFG3.F200 controller that’s embedded with the software. The software supports up to 100,000 data points and the embedded controller up to 5,000 points.

The embedded controller is sized for most commercial buildings, schools and institutional spaces. The deployment provides cloud-based building management with minimum infrastructure. As needs change or buildings are added, Desigo Optic can scale one controller at a time.

FIN Edge2Cloud provides a secure connection and eliminates the need for a virtual private network (VPN). The FIN Framework supervisory and control architecture is secure by design and has passed multiple hacker penetration tests. It uses authentication, encrypts key data, complies with IEC62443 and SAL2, and applies smart cyber security hardening guidelines.