Differences: Networking - G2 protocols

WaveNet (online)

Virtual networking (virtual)

No networking (offline)

Functional principle

Data transmission with networked WaveNet devices (see Transmission paths and Devices).

Data transmission with identification media (except programming data).

Data transmission with programming devices.

Extension

WaveNet devices are connected via various transmission media. All types of data are transmitted using these transmission media.

In a virtual network, certain data is transferred to the identification media using a gateway (entries in the blacklist). If you operate this identification media on a virtually networked locking device, the data is transferred to the locking device.

Locking devices that are not networked can only exchange data with the programming device. You must go to the locking devices with the programming device.

Programming effort

Low.

Low.

Effort depends on the size of the locking system.

  • Small locking system: Low effort.
  • Medium locking system: Medium effort.
  • Large locking system: Extensive effort.

Transmission speed of the data exchange

Immediately. Data exchange with different transmission media.

Speed between gateway and locking devices highly dependent on the intensity of use of the locking devices. Identification media are transmission media - no data transmission without identification.

Slow.

Central activation/deactivation of locking devices

Possible.

Not possible.

Not possible.

Activation/deactivation centrally traceable

Possible.

Not possible.

Not possible.

Remote opening

Possible.

Not possible.

Not possible.

Remote monitoring (DoorMonitoring)

Possible.

Not possible.

Not possible.

Event management

Possible.

Not possible.

Not possible.

Access lists centrally retrievable

Possible.

Not possible (except SREL 3).

Not possible.

Software/server independent protective functions

Possible.

Not possible.

Not possible.

Immediate locking device system-wide response to critical situations (availability of protective functions, see I/O configuration and protection functions and RingCast)

Possible.

Not possible.

Not possible.