Obvius BACnet User Manual

Page 4

Advertising
background image

6.1

T

YPICAL

U

SES OF THE

D

ISCOVER PAGE

.................................................................................. 28

6.2

BAC

NET

D

ISCOVER

SHOW

: [

NETWORK

], [

FIRMWARE

], [

STATS

] ............................................. 28

6.2.1

show: [basic]............................................................................................................. 28

6.2.2

show: [network]......................................................................................................... 28

6.2.3

show: [firmware] ....................................................................................................... 29

6.2.4

show: [stats].............................................................................................................. 29

6.2.5

show: [all].................................................................................................................. 30

6.3

BAC

NET

D

ISCOVER

→ O

BJECTS

............................................................................................ 30

6.3.1

Typical Uses of Discover

→ Objects link ................................................................. 31

6.4

BAC

NET

D

ISCOVER

→ O

BJECTS

→ EPICS............................................................................ 32

6.4.1

Typical Uses of the EPICS ....................................................................................... 32

7

HOW DO I... ............................................................................................................................ 33

7.1

H

OW

D

O

I... C

HOOSE

D

EVICE

ID

S AND

N

ETWORK

N

UMBERS

? ................................................. 33

7.1.1

Background: Permanent Names ............................................................................. 33

7.1.2

Background: Detecting Name and ID Conflicts....................................................... 33

7.2

H

OW

D

O

I... C

HOOSE

T

IMEOUTS

? .......................................................................................... 33

7.3

H

OW

D

O

I... O

PTIMIZE

R

ESPONSE

T

IME

?................................................................................ 34

7.4

H

OW

D

O

I... O

PTIMIZE

P

OLLING

?............................................................................................ 35

7.4.1

Background: Caching Behavior............................................................................... 35

7.5

H

OW

D

O

I... F

IX

U

NIT

I

SSUES

? ............................................................................................... 35

7.6

H

OW

D

O

I... U

SE

R

ELAY

O

UTPUTS

? ....................................................................................... 36

7.7

H

OW

D

O

I... S

PAN

S

UBNETS WITH A

BBMD? .......................................................................... 36

7.8

H

OW

D

O

I... S

PAN

S

UBNETS WITH

F

OREIGN

D

EVICE

R

EGISTRATION

? ...................................... 38

7.8.1

Typical Uses of Foreign Device Registration: .......................................................... 38

8

TROUBLESHOOTING ........................................................................................................... 39

8.1

S

YMPTOM

: N

OT

BTL L

ISTED

? ............................................................................................... 39

8.2

S

YMPTOM

: C

AN

T

“D

ISCOVER

THE

A

CQUI

S

UITE

?................................................................... 39

8.3

S

YMPTOM

: “D

ISCOVERY IS

B

ROKEN OR

N

OT

W

ORKING

OR

“M

Y

C

ONTROLLER

D

OESN

T

S

UPPORT

D

ISCOVERY

”?................................................................................................................................... 41

Advertising