WHAT IS BACNET WHO-IS/I-AM?

what is a bacnet who-is and i-am and why do we have it
An excess of Global Who-Is/I-Am messages can devastate BACnet networks. Particularly on a big network with many devices, limiting broadcasts to only the necessities is important.

An excess of Global Who-Is/I-Am messages can devastate BACnet networks. Particularly on a big network with many devices, limiting broadcasts to only the necessities is important.

But Global Who-Is messages play an important part in the BACnet network. They are vital for the smooth functioning of the system. And, if the devices are configured properly, they needn’t overwhelm the system at all. So, it is important to understand when and why Who-Is and I-Am messages are useful — and equally important to know when those messages might become a problem. Reading further will provide you with more insights into their significance and how they can affect your network.

A Who-Is broadcast aims to get the network addresses of devices on the network. These network addresses are critical to allow devices to communicate with one another without broadcasting the entire system. So, a device that needs another’s address will send a message “specifying a Device Object Instance Number or a range of Instance Numbers,” as the BACnet website explains. For example, it will send a “Who-is device 3001” or “Who-is device 3000 to 3099.”

The responding devices send an I-Am to a local remote network or the full network. “This allows other devices that may need to know about the responders to acquire the address information without creating more network traffic,” BACnet explains, and it allows the responding device to figure out its route. Importantly, this also means there’s no need to manually add devices’ addresses into each BACnet device.

Now, targeted Who-Is messages are one matter, but often devices will send out Global Who-Is requests. That’s when the Who-Is message is sent, but it doesn’t specify a device or a range of devices. In this case, every device on the network responds with an I-Am.

This becomes a problem, though, when the Who-Is messages—and the I-Am responses—are sent too frequently, or without real cause. In Optigo Visual Networks, our Global Who-Is check fails if a total of three Who-Is requests are seen during a capture.

First, a Who-Is should be a targeted message to one, or a few, devices — not the entire network. If a device address is already known, there is no need to request an I-Am from it again. And if devices are requesting I-Ams from every device on the network, you will quickly end up with a broadcast storm.

Second, Global Who-Is messages should only be sent very sparingly — not once every minute, or five minutes, or even 30 minutes. Think about it: there’s no need to poll every device on the network for their “name and address” several times a day, or even several times a week. If your devices are configured to send out periodic Global Who-Is requests, check the frequency and consider whether that is really necessary. Some devices’ configurations can be changed to eliminate these requests, while others can only be reduced. If you can’t delete them, increase the amount of time between Global Who-Is messages to the maximum amount allowed.

Third, if these automatic messages are required, consider setting up a Segmented Who-Is, rather than Global. A Segmented Who-Is breaks up the requests into many smaller ones, looking for ranges with the entire BACnet device ID range, excluding known device IDs. For example, a device will say “Who-Is 0–99” and then send “Who-Is 100–199,” minimizing the number of concurrent I-Am messages.

Global Who-Is and Global I-Am messages can save you lots of time spent programming device addresses and, if done correctly, do not have to flood your network.

An image of a laptop with OptigoVM Diagnostic results displayed, showing BACnet MSTP troubleshooting issues

How many issues will you solve today?

Share This Post

Don't want to wait?

Sign up now to get posts delivered right to your inbox the moment they go live.

An overhead photograph of a solar farm in an urban setting, possibly a parking lot.

How OT Networks Drive Decarbonization and Energy Efficiency

Energy efficiency is at the heart of many organizations’ policies to address their overall carbon footprints. For facilities operators, campus managers, and their vendors, the drive to decarbonize falls under their purview. Let’s look at what exactly decarbonization is, what impacts this policy has on OT networks, and some of the ways facilities and systems integrators have begun to tackle the problem.

Read More »
A photograph of a blue pad lock on top of an open laptop

Is BACnet/SC the Key to Securing OT Networks?

The success of BACnet/SC will depend on how widely it is adopted and how well it integrates with other security technologies. That said, with the right implementation strategies, and a focus on maintaining flexibility and interoperability, BACnet/SC has the potential to play a central role in securing OT networks against future threats.

Read More »

Need Help Solving BACnet Issues?

Optigo Visual Networks is the industry leading software for troubleshooting and monitoring building automation networks, and it’s free!

An image of a laptop displaying the results of a diagnostic report run from Optigo Visual Networks BACnet monitoring app.