Nt1310 Unit 3 Assignment 1

Improved Essays
To do Cable calculation it has to meet the requirements from BS 7671.

Design Current

First thing to do is calculate the design current. (Ib) I=Watts/Volts. You do this so you can find out the total current.

Apply Diversity Factors (where applicable)

Diversity is described in the onsite guide Appendix A as a way to determine the maximum demand for an installation and includes the current demand for commonly used equipment. For example if in a domestic household there were 8 lights on a circuit, not all the lights would be on at the same time therefore the expected load will not reach the maximum amperes. The On Site Guide states in Table A2 that when completing a lighting circuit in small hotels, boarding houses or guest houses the diversity is 75% of total current demand. Therefore before calculating current using I=Watts/Volts you must first calculate 75% of the power. In some final circuits water heaters (thermostatically controlled),floor warming installations and thermal storage space heating no diversity allowable this is because there is no drop in the current demand with these. Select Circuit Protective Device (In) A circuit protective device or circuit breaker is used within a circuit to make, carry and break normal loads current. It is also used to break any abnormal currents e.g. short-circuit currents. Once current (Ib) is calculated then refer to Part 4, Table 41.3 in IET Wiring Regulations. The circuit breaker (In) has to be equal to or greater than design current (Ib). The current has to be able to pass through the circuit breaker it is used to protect the circuit from damage caused by overcurrent or short circuit. Circuit breakers have to comply with BS EN 60898. Calculate Tabulated Current Tabulated current (IT) comes into factors when cables are bunched together or embedded in insulation or in high ambient temperature (room) temperatures.
…show more content…
All the correction factors can be found appendix 4 table 4D5. A healthy circuit will always produce a certain amount of heat. When the heat builds up and can’t escape, the resistance will increase and will cause the PVC to melt and could catch fire. If the tabulated current is more than (Ib) you will need to increase the conductor size, instead of a 10mm conductor you might need to use a 16mm, it will create less heat as the cable will be larger so the current is below its capabilities. You can find the rating factors (Ca) for ambient air temperatures other than 30 degrees in table 4B1.The formula for tabulating current is It= In/ca so the protective device divided by the correct correction factor.

Select Cable

The cable (Iz) has to be greater or equal to than (It) Tabulated current. Now you would go to appendix 4 table 4D5. There is 6 different methods to choose. Example it could be reference method C, clipped direct or method 102 in a stud wall in thermal insulation with cables touching the inner wall. You would go down the list and pick the conductor that is capable of carrying the current. If the conductor is greater than 16mm you will need to go to table 4D2A.

Confirm Voltage Drop Meets Requirements The voltage drop is to determine the volt drop across the circuit. To calculate the volt drop = (mv) mini volts x amperes (ib) the design current x the metres of the cable run, and then divide them by 1000. So mv/a/m 1000 For low voltage installations directly from low voltage

Related Documents

  • Decent Essays

    Due to the age of the existing equipment, four new Cisco Catalyst 3560 V2 24 port switches will be use and configure for network redundancy by connecting each switch in a multiple links, single IP address with routing protocol Border Gateway Protocol (BGP). This multi-homing will detect when one of the links fail and not send traffic over that link anymore until the issue is resolved. This redundancy configuration will meet Western County Bank management requirement reducing unplanned outages and regular maintenance performed on the network equipment supporting 10 GB links as well as static or LACP-based (link aggregation control protocol) network interface controller (NIC) teaming. The Time Warner Cable, Business, Dedicated Internet Access, and AT&T Uverse Business Internet service will provide redundancy to the Internet…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Upgrade your iMac into the machine that will help you provide quality outputs at ultra-fast speeds. With a 4GB DDR3 SODIMM Laptop RAM, you’ll raise your iMac’s capacity beyond industrial standard and provide the consistent efficiency when you’re required to, or better yet, just for your personal use. With 4GB worth of RAM, this DDR3 upgrade provides an optimal processing speed for your iMac to work with data with incredible results. That means you can open apps instantly, access data with less loading time, and operate a more responsive system regardless of you’re doing a system-intensive task or project. At 1333 MHz, you’ll be able to finish projects faster, better and a lot more consistent than ever.…

    • 291 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    With a 27-inch Retina 5K display combined with the AMD Radeon R9 M290X graphics processor with 2GB of GDDR5 memory, it allows you to do precise pixel-for-pixel photo editing and see photos in a resolution you’ve never seen before in a computer. Also, you will be able to view and edit 4K videos without experiencing any problem. This is really important when it comes to a graphic design job, considering they work with high-resolution photos and videos. Having a fourth-generation quad-core 4.0GHz Intel Core i7 processor and 8GB RAM, the performance and speed is the best you would have ever experienced. You can multi-task without any problem and get the job done easier and faster than before.…

    • 254 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Additional wellbeing has been incorporated into this outline by making a "loopbacks" to the zero tally, with a yield of zero if the information state to the counter is inconceivable for the present number that it is on (for instance, a data condition of 010—NS, when the present check is 101—5, the NS tally ought to have as of now circled back). By circling back to zero, this will give the framework's movement express a more drawn out time to determine an "undetermined" state. Test Strategy: With a specific end goal to test the counter outline, we have chosen to test just a predetermined number of cases and test to see whether the configuration a) tallies accurately, and b) sends the yield T high at the right times. To do this, we will pick two or three states to…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    2. The IEEE 802.11n:- The IEEE 802.11n standard, appear in 2008, And become popular because the jump in data transfer rates from about 54 Mbps to nearly 600 Mbps. The IEEE 802.11n standard was officially completed in 2009 but most of the technical features were ratified in 2007. Most companies supported for the creation of a 60 GHz based standard for WLANs to succeed the 802.11n standard, and a lot of attention and effort was devoted to this activity.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    CAll on mute again from mark 11:01 to 22:21 then CAE explained that the current package of the customer is $147.45 and if she will add the internet it will become $211.30 since the more service that he will get from Comcast the higher discount he will get $179.94 and he will get a phone service and he will also have the highest internet speed.…

    • 65 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    is a software-based protocol that provides a way to locate files, devices or even individual in a network. LDAP uses port 389 and is uses by Microsoft as the main protocol that opens up this type of access. LDAP is lightweight which indicates a smaller version with a smaller code and it is part of X.500. The latter acts as a standard for network directory services. /***************************…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    I affixed a hold tag on container #28, which was formerly known as container #9 and it was bulk packaged in my presence. As Katie mentioned below, the bulk packaging only requires the operator to remove and change the drum label, thus the container is easy to locate and sample. Let me know if there is anything that I can do to…

    • 63 Words
    • 1 Pages
    Decent Essays
  • Brilliant Essays

    Nt1330 Unit 3 Assignment 1

    • 1374 Words
    • 6 Pages

    INTRODUCTION Midland Insulation Products (MIP) is a Carlow based manufacturing company who specialized in the manufacturing and distribution of insulation products that are employed for building. MIP has implemented Information Systems that handle Manufacturing, Warehousing & Distributions, Finances, Electronic Data Interchange (EDI), Marketing & Sales, Payroll, Customer Relation Management (CRM) & Human Resources (HR). All MIP servers are hosted, on premise and located in one of the two data centres. The CEO of MIP believes that data centres are too expensive to run and would like to work for cloud because cloud offers the best long term solution for hosting MIP servers and applications.…

    • 1374 Words
    • 6 Pages
    Brilliant Essays
  • Decent Essays

    As mentioned in 1a. , the students enrolling in the course are normally required to complete an out-of-class practice with a CALL software. Students who 1) do not take part in the research or 2) who later withdraw from the research will be recommended to refer back to the normal course principle and they will not be accounted as one of the participants (even in Group A) as they do not agree or no longer consent to take part in the research…

    • 82 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Hi, I currently see that you’re still grading assignments; therefore, I want to ask about the topic selection, research question, and short assignments. Will these two assignments (research question and topic question) be implemented to the final grade? The reason I am asking because the grades that I received for both assignments are zeros, and each assignment I did. From, John Stroman…

    • 62 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    One thing that this ACA-122 class has taught me is how to email somebody properly; such as a professor, teacher, or anyone really. It’s impacted me because I had questions and had to email someone, but I didn’t know the correct format and how. The second thing is time management. Yes, you will have a ton of assignments due, but you have at least three weeks to do it for ACA. It impacted me because I do procrastinate and if you do that, it can be a problem for ACA.…

    • 541 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). Here are my thoughts based on all that I have learned in this program over past few months. The medical office specialist (MOS) has a legal responsibility/duty to maintain the security of protected health information (PHI). The sharing of PHI is controlled by the privacy rule contained in HIPAA.…

    • 957 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1. As per my knowledge, students can --> contact the Student Help Desk by phone at 610.372.4721 ext. 5171, or by email at helpdesk@racc.edu and they will get help, or --> go to this website https://myracc.racc.edu/cas/login?service=https:%2F%2Fmyracc.racc.edu%2Fc%2Fportal%2Flogin and upon clicking on "Forgot Password", they should enter their username and click "OK". To reset the password, they should enter their username.…

    • 410 Words
    • 2 Pages
    Improved Essays