How Penn State uses Visual BACnet Site Monitoring to reduce and maintain network traffic

How PSU uses Visual BACnet across their campuses

Four years ago, Penn State was at 90,000 packets per hour of broadcast traffic. At least a dozen different buildings were randomly dropping offline. The network team was on the phone almost every single night because something was down, something wasn’t communicating, or something had to be reset. They needed a powerful tool to drastically reduce and maintain network traffic. But they tried just about every program out there, and the programs were clunky, inflexible, and cost tens of thousands of dollars every year just to licence.

Hear how Tom Walker and his team at PSU have found the perfect solution for their network, with Visual BACnet Site Monitoring. You’ll learn:

  • What Penn State did to reduce their network traffic and make it healthy

  • How they use Visual BACnet across their campuses

  • And how the team at Penn State plans to continue lowering network traffic with Visual BACnet

Date and time: Wednesday July 11th at 11 a.m. PDT / 2 p.m. EDT

Do you need help analyzing and solving a problematic BACnet network? Send your pcaps in, and our team of BACnet buffs will show you how they dig into files, from start to finish.

Visual BACnet is a powerful visualization tool for building automation system service providers.

BACnet is a widely used protocol for building networks that provides many benefits for connected building automation systems. But there are many issues that commonly plague BACnet networks.

Find out all the power and control you can get out of Optigo OneView.

What are MAC addresses, and how can you use them to help secure your network? Learn how OneClick Secure from Optigo OneView helps you secure your Operational Technology network in an instant.

An Operational Technology network can be made up of unmanaged switches, managed switches, or a centralized Network Management System (NMS). Learn about the differences between these different systems, and some of the pros and cons of each.

There are many protocols that make up the application layer of an IP network. Learn about some protocols you may have heard about, the roles they play on the application layer, and the importance of encryption.

Understand the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), and how they facilitate the sending and receiving of messages over IP networks.

A Virtual Private Network could be described as a “secure, encrypted tunnel,” and it’s a big topic these days as more folks work from home. Find out what a VPN is, and how it works.