The latest release from Visual BACnet brings huge convenience and time saving for users with JACE controllers.
Now, you can capture BACnet data quickly and easily, sending it right from your JACE to Visual BACnet for analysis. There’s no additional hardware required, and no need to send staff on site.
The solution means that anyone with a JACE controller can capture the BACnet traffic they need with ease. All you need is a JACE running Niagara 4; Wireshark, or the Visual BACnet Capture Tool for Windows or Linux; a Visual BACnet account.
This technology allows you to capture BACnet data 100% remotely. If you capture using the Visual BACnet Capture Tool for Windows or Linux, your file will upload directly to Visual BACnet for analysis and diagnosis. You can even schedule or trigger captures remotely using the Windows or Linux Capture Tool, streaming from your JACE to Visual BACnet whenever you need.
Understand the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), and how they facilitate the sending and receiving of messages over IP networks.
A Virtual Private Network could be described as a “secure, encrypted tunnel,” and it’s a big topic these days as more folks work from home. Find out what a VPN is, and how it works.
Gateways and firewalls are how we route packets through the network, and permit and block traffic based on certain rules. Learn how gateways and firewalls work to manage traffic connections in the network.
What is an IP address? How does Dynamic Host Configuration Protocol (DHCP) work? And what’s the purpose of a static IP address? We’ll cover all of this as we venture into the world of the Internet.
Learn the differences between Virtual Local Access Networks (VLANs) and subnets, and their roles within a network.
Learn about different modes of network access, including Ethernet, Wi-Fi, hotspots, and clients. We’ll explore the pros and cons of each, and their different applications and uses.
Learn about the network layers and their roles. We’ll cover the differences between the OSI and TCP/IP Model, and how these layers form the basic network architecture.
Information Technology (IT) and Operational Technology (OT) are different in a lot of ways, from their design to their maintenance workflows and more.
It’s super important to have unique Device IDs on your BACnet system, but duplicates are a very common problem. You might not even realize you have duplicate IDs, with devices only responding periodically.