This document provides information about Z-Wave integrated locks from various manufacturers that can be used with ELAN g! home automation controllers. It discusses code compliance, licensing, and manufacturer instructions that installers should follow. Supported lock models and finishes from Baldwin, Kwikset, Yale, and Schlage are listed. Worthington Distribution offers training, sales, and support for these Z-Wave integrated locks.
Home automation systems provide a centralized control and monitoring function for heating, ventilation and air conditioning (HVAC), lighting and physical security systems. The central control panel and various household devices such as security sensors and alarm systems are connected with each other to form a mesh network over wireless or wired communication links and act as a “smart home”. As you arrive home, the system can automatically open the garage door, unlock the front door and disable the alarm, light the downstairs, and turn on the TV. According to a study by the consulting firm AMA Research, in 2011, the UK home automation market was worth around £65 million with 12% increase on the previous year. The total number of home automation system installations in the UK is estimated to be 189000 by now. The home automation market in the US was worth approximately $3.2 billion in 2010 and is expected to exceed $5.5 billion in 2016.
Zigbee and Z-wave wireless communication protocols are the most common used RF technology in home automation systems. Zigbee is based on an open specification (IEEE 802.15.4) and has been the subject of several academic and practical security researches. Z-wave is a proprietary wireless protocol that works in the Industrial, Scientific and Medical radio band (ISM). It transmits on the 868.42 MHz (Europe) and 908.42MHz (United States) frequencies designed for low-bandwidth data communications in embedded devices such as security sensors, alarms and home automation control panels. Unlike Zigbee, no public security research on Z-Wave protocol was available before our work. Z-wave protocol was only mentioned once during a DefCon 2011 talk when the presenter pointed the possibility of capturing the AES key exchange phase without a demonstration.
The Z-Wave protocol is gaining momentum against the Zigbee protocol with regards to home automation. This is partly due to a faster, and somewhat simpler, development process. Another benefit is that it is less subjected to signal interference compared to the Zigbee protocol, which operates on the widely populated 2.4 GHz band shared by both Bluetooth and Wi-Fi devices.
Z-wave chips have 128-bit AES crypto engines, which are used by access control systems, such as door locks, for authenticated packet encryption. An open source implementation of the Z-wave protocol stack, openzwave , is available but it does not support the encryption part as of yet. Our talk will show how the Z-Wave protocol can be subjected to attacks.
Home Automation Products and Suppliers in UAEBeatriz john
Home Automation
Home Automation has been a work in progress for several decades.
With complete control of home systems and appliances,
Today, automation is at its peak.
Smart homes are the latest in luxury living,
A few of its applications include:
Automated lighting:
lighting systems can be controlled remotely or through smart controls.
These smart controls include motion sensors and heat sensors.
Motion controlled Automated lighting is an effective power-saving technique,
It saves power using only those lights in rooms with activity.
Security and Surveillance:
With Home automation, you can
-Remotely control surveillance equipment, and
-Enjoy the ease of remote access control.
Smart security systems have proven to be extremely secure.
Homeowners get security updates when
-invalid PIN/passwords are entered,
-someone breaks in, and
-when doors are left unlocked or open.
Smart Sensors:
Smart sensors include heat and motion sensors.
Automation uses these sensors to
-save power, and
-detect threats like fires and burglars.
Today, Automation includes appliances that are not internet-connected.
IP-controlled power switches allow users to remotely power on/off appliances from anywhere.
Constant and rapid development in this field holds promises of complete control and effective power-saving features, with smart logical programming.
Visit yellowpages-uae.com to Contact Home Automation Products and Suppliers in UAE i.e. at http://www.yellowpages-uae.com/uae/home-automation
The paper presents an Arduino-based wireless sensor network to monitor parking lots using a non-standard low-power energy-balanced system. The event-driven routing protocol follows the hierarchical clustering philosophy. Energy is saved by minimising the number of transmissions needed to forward information to the base station. The smart sensor platform is build using the popular Arduino development platform, Sharp IR distance sensors and nRF24 low-power radio modules. Our practical results show that this platform is easy to use, but not the most appropriate platform to develop low-power wireless sensor network applications.
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosPeter R. Egli
Rapid technological advances in the past made possible the miniaturization of network devices to meet the cost and power consumption requirements in IoT and M2M scenarios. What is missing in this picture is a radio technology with both long range capability and a very low cost footprint. Existing radio technologies such as 3G/4G or Short Range Radio do not aptly meet the requirements of IoT scenarios because they are either too expensive or are not able to provide the required range. Other wireless technologies are geared towards high bandwidth which is in most cases not a requirement for IoT.
Emerging LPWAN technologies such as ETSI LTN or LoRAWAN are poised for filling the gap by providing long range (up to 40km) and low power connectivity. These technologies allow low cost radio devices and operation thus enabling scaling up IoT applications.
Overview of which LPWAN technologies (LoRa, Sigfox, Weightless, etc.) are right for various IoT applications. Clear look at the pros and cons of each technology.
With the WiDom flush-mounted Double Switch Relay, you can integrate existing electrical installations (e.g. lighting, airing systems…) into a Z-Wave network.
Home automation systems provide a centralized control and monitoring function for heating, ventilation and air conditioning (HVAC), lighting and physical security systems. The central control panel and various household devices such as security sensors and alarm systems are connected with each other to form a mesh network over wireless or wired communication links and act as a “smart home”. As you arrive home, the system can automatically open the garage door, unlock the front door and disable the alarm, light the downstairs, and turn on the TV. According to a study by the consulting firm AMA Research, in 2011, the UK home automation market was worth around £65 million with 12% increase on the previous year. The total number of home automation system installations in the UK is estimated to be 189000 by now. The home automation market in the US was worth approximately $3.2 billion in 2010 and is expected to exceed $5.5 billion in 2016.
Zigbee and Z-wave wireless communication protocols are the most common used RF technology in home automation systems. Zigbee is based on an open specification (IEEE 802.15.4) and has been the subject of several academic and practical security researches. Z-wave is a proprietary wireless protocol that works in the Industrial, Scientific and Medical radio band (ISM). It transmits on the 868.42 MHz (Europe) and 908.42MHz (United States) frequencies designed for low-bandwidth data communications in embedded devices such as security sensors, alarms and home automation control panels. Unlike Zigbee, no public security research on Z-Wave protocol was available before our work. Z-wave protocol was only mentioned once during a DefCon 2011 talk when the presenter pointed the possibility of capturing the AES key exchange phase without a demonstration.
The Z-Wave protocol is gaining momentum against the Zigbee protocol with regards to home automation. This is partly due to a faster, and somewhat simpler, development process. Another benefit is that it is less subjected to signal interference compared to the Zigbee protocol, which operates on the widely populated 2.4 GHz band shared by both Bluetooth and Wi-Fi devices.
Z-wave chips have 128-bit AES crypto engines, which are used by access control systems, such as door locks, for authenticated packet encryption. An open source implementation of the Z-wave protocol stack, openzwave , is available but it does not support the encryption part as of yet. Our talk will show how the Z-Wave protocol can be subjected to attacks.
Home Automation Products and Suppliers in UAEBeatriz john
Home Automation
Home Automation has been a work in progress for several decades.
With complete control of home systems and appliances,
Today, automation is at its peak.
Smart homes are the latest in luxury living,
A few of its applications include:
Automated lighting:
lighting systems can be controlled remotely or through smart controls.
These smart controls include motion sensors and heat sensors.
Motion controlled Automated lighting is an effective power-saving technique,
It saves power using only those lights in rooms with activity.
Security and Surveillance:
With Home automation, you can
-Remotely control surveillance equipment, and
-Enjoy the ease of remote access control.
Smart security systems have proven to be extremely secure.
Homeowners get security updates when
-invalid PIN/passwords are entered,
-someone breaks in, and
-when doors are left unlocked or open.
Smart Sensors:
Smart sensors include heat and motion sensors.
Automation uses these sensors to
-save power, and
-detect threats like fires and burglars.
Today, Automation includes appliances that are not internet-connected.
IP-controlled power switches allow users to remotely power on/off appliances from anywhere.
Constant and rapid development in this field holds promises of complete control and effective power-saving features, with smart logical programming.
Visit yellowpages-uae.com to Contact Home Automation Products and Suppliers in UAE i.e. at http://www.yellowpages-uae.com/uae/home-automation
The paper presents an Arduino-based wireless sensor network to monitor parking lots using a non-standard low-power energy-balanced system. The event-driven routing protocol follows the hierarchical clustering philosophy. Energy is saved by minimising the number of transmissions needed to forward information to the base station. The smart sensor platform is build using the popular Arduino development platform, Sharp IR distance sensors and nRF24 low-power radio modules. Our practical results show that this platform is easy to use, but not the most appropriate platform to develop low-power wireless sensor network applications.
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosPeter R. Egli
Rapid technological advances in the past made possible the miniaturization of network devices to meet the cost and power consumption requirements in IoT and M2M scenarios. What is missing in this picture is a radio technology with both long range capability and a very low cost footprint. Existing radio technologies such as 3G/4G or Short Range Radio do not aptly meet the requirements of IoT scenarios because they are either too expensive or are not able to provide the required range. Other wireless technologies are geared towards high bandwidth which is in most cases not a requirement for IoT.
Emerging LPWAN technologies such as ETSI LTN or LoRAWAN are poised for filling the gap by providing long range (up to 40km) and low power connectivity. These technologies allow low cost radio devices and operation thus enabling scaling up IoT applications.
Overview of which LPWAN technologies (LoRa, Sigfox, Weightless, etc.) are right for various IoT applications. Clear look at the pros and cons of each technology.
With the WiDom flush-mounted Double Switch Relay, you can integrate existing electrical installations (e.g. lighting, airing systems…) into a Z-Wave network.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
ZWave Lock Programming
1. Welcome
ELAN g! Integration Locks
Revision 10/24/2012
Sales/Support: 800-282-8864
sales@worthdist.com
Web / Catalog: www.worthingtondistribution.com
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864 Training: www.worthingtonu.com
2. This Presentation was created by the
good folks at Worthington Distribution
and adapted for distribution to ELAN g!
dealers to aide in their Z-Wave education.
Worthington Distribution carries all of the
Z-Wave locks and peripherals and offers
great technical support to its’ customers.
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
3. Code, Insurance and Installation
• Always Follow
• National Code
• State Code
• Local Code
• National Electric Code (NEC)
• When No Code Exists the Code Defaults to the NEC
• Licensing and Insurance
• What are the Licenses Required?
• Are Employees Covered for Electrical and other Trade Work?
• Worthington University Classes Are A Complement To But Not A
Replacement For Manufacturer Trainings
• Always Consult Product Manuals And Follow Safety Warnings
• Do Not Make Product Modifications Or Alterations
• Install All Product In Accordance With UL And CE Listings
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
4. Manufacturer Instructions
• Worthington University Training Documents Are A Complement To
But Not A Replacement For Manufacturer Trainings
• Always Consult Product Manuals And Follow Safety Warnings
• Do Not Make Product Modifications Or Alterations
• Install All Product In Accordance With UL And CE Listing
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
5. What Can Do?
• ELAN g! controllers support two-way integration
with locks
• The g! controllers can lock and unlock the locks
and monitor changes in the states of the locks
• Provide convenient user code management
• Extensive event triggering allows the state of the
lock can be used as a condition in automation
programming
• Lock control is supported in all g! interfaces
• TS7/TS10 touchscreens
• iOS & Android devices
• HR2 & TS2
• PC viewer
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
6. Supported Locks
Entry Set Deadbolt Deadbolt Deadbolt Deadbolt Deadbolt Entry Set
Entry Set Deadbolt Deadbolt Deadbolt Deadbolt Deadbolt Entry Set
Touch Pad
Technology Z-Wave Z-Wave Z-Wave Z-Wave Z-Wave Z-Wave Z-Wave
ZigBee HA ZigBee ZigBee ZigBee HA ZigBee HA
HA HA
Motorized Y Y Y Y Y N* N*
Lock/Unlock
Lock Status Y Y Y Y Y Y Y/N*
Pinpad / Key reports Y Y Y Y Y Y Y/N*
User Codes 30 30 30 250 (30 250 (30 19 19
supported supported
by g!) by g!)
• Lock status only reflects the status of the lock, not the door. 4-AA
Batteries 4-AA 4-AA 4-AA 4-AA 3-AA,1-9V 4-AA
• A deadbolt can be extended if the door is open. An entry set door must be closed to be secure.
• *Schlage deadbolts must be manually turned, the deadbolt is not motorized
• *Schlage entry sets can be locked/unlocked via command when the key is in the locked position
• When a Schlage entry set is manually unlocked with a key, the lock/unlock state is not correctly
represented. A lock command will not lock the door, the state will show as locked.
• A Schlage manual key unlock override on the entry set is not reported to the HAI via Z-Wave
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
8. Kwikset Finishes
Deadbolts Contemporary Entry Set
Deadbolts
BD99100-006 BD99100-014 BD99100-006
Z-Wave Z-Wave Z-Wave
Venetian Bronze Venetian Bronze Venetian Bronze
BD99100-005 BD99100-011 BD99100-005
Z-Wave Z-Wave Z-Wave
Satin Nickel Satin Nickel Satin Nickel
BD99100-004 BD99100-012 BD99100-004
Z-Wave Z-Wave Z-Wave
Satin Chrome
Polished Brass Polished Brass
BD99100-013
Z-Wave
Polished Chrome
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
9. Yale Finishes
Capacitive Touch Pinpad
Deadbolts Deadbolts
YALD220ZW619 YALD210ZW619
Z-Wave Z-Wave
Satin Nickel Satin Nickel
YALD220ZW0BP YALD210ZW0BP
Z-Wave Z-Wave
Oil Rubbed Bronze Oil Rubbed Bronze
YALD220ZW605 YALD210ZW605
Z-Wave Z-Wave
Bright Brass Bright Brass
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864 (soon)
10. Schlage Finishes
Deadbolts Entry Set
SCHBE369619 SCHFE599619
Z-Wave Z-Wave
Satin Nickel Satin Nickel
SCHBE369716 SCHFE599716
Z-Wave Z-Wave
Aged Bronze Aged Bronze
SCHBE369505 SCHFE599505
Z-Wave Z-Wave
Bright Brass Bright Brass
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
11. Are ZigBee and Z-Wave the Same?
Both are mesh network
• All products can be on the same • New HA Profile is creating a
network protocol layer for interoperability
• Basic interoperability for all • HA Profile products are starting to
products ship from HAI, Centralite and
coming from Somfy
• Very large number of currently
shipping interoperable products • Multiple chip manufacturers
building to an IEEE standard
• 1 Chip manufacturer
• HA Profile locks coming from
• Locks from Kwikset, Yale,
Kwikset, Baldwin and Yale
Baldwin and Schlage currently
shipping • Currently shipping ZigBee locks
are not HA Profile
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
12. Z-Wave Setup
• Leviton Vizia rf+ Installer Software
• Lock Inclusion
• 2-Way Communication Setup
• Worthington Distribution recommends Z-Wave
technology in traditional wood frame residential
applications up to 7,500 sq/ft.
• For unusual applications, give us a call.
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
13. Getting Started: What You Will Need
• Z-Wave lock compatibility
• g!5.9 and above
• Leviton VRCOP Serial interface
• It must be a ‘3’ series (see image)
• Firmware must be updated
• All VRCOP units sent from Is your VRCOP compatible?
Worthington Distribution as of Look on the back for ‘vizia rf+ 3’
1/1/2012 is updated and a
sticker is added to the box
before shipment (see image)
• Firmware updates for the
VRCOP ‘3’ series can be
updated from Leviton.com Worthington Distribution is updating serial
(Click on Home Automation) interfaces before shipping (as of 1/1/2012).
• Use a Leviton VRUSB-1US USB Look for the sticker above on the box
programming stick (pictured)
The Leviton USB stick is needed for use
Property of Worthington Distribution. with the Vizia RF+ Installer software
May Not Be Reproduced Without Permission
800-282-8864
14. vizia rf+ Installation Software
• The software is free
• Locks require 1.1.0.0 or later
• Download from
www.leviton.com/rfinstaller
• A LEVVRUSB-1US USB stick is required
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
15. Z-Wave Overview
• Z-Wave Technology
• Expanding Communication Coverage
• Beaming Command
• Best Practices
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
16. Z-Wave Mesh Networking
• Networking technology to route information between
devices
• Allows reconfiguration around blocked paths by "hopping“
• Mesh network
• No repeaters required
• More devices = better coverage
• Estimated 75’ (open air) range between devices
• Results vary based on construction and environment,
35’+ installed distance is typical
• Self-healing: network can still operate even when a device
breaks down or a connection goes bad
• 900MHz frequency at 9.6K and 40K baud
• Only uses devices that have been programmed into the
network
• Enough devices must be in network for sufficient coverage
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
17. More modules = Better Coverage
• Z-Wave is a mesh network
• AC Powered devices can repeat
R1 R2 R3
transmissions to reach devices that the
serial module can not reach directly
• Worthington Distribution has found
R4 Z-Wave to be effective in traditionally
constructed homes up to 7,500
• Z-Wave devices that are running on
batteries DO NOT repeat Z-Wave
commands
• Examples: Locks and battery powered
thermostats
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
18. Choose Modules with Beaming
• Understanding Beaming is critical to success with locks
• When the serial module is unable to talk directly to a lock it will need
the assistance of other AC powered (non-battery) devices in the
network to repeat the messages
• ONLY DEVICES WITH BEAMING SUPPORT CAN WAKE A LOCK
• Beaming is required to ‘wake-up’ 2-way battery devices
• Many (most) shipping Z-Wave devices do not feature beaming support
• All devices with new chipsets include beaming support; however, not all
products feature the new chips
• Without beaming, the locks will not communicate no matter how many
non-beaming devices are added to the network
• Beaming communication does have noticeable delay
Beam
Command
Serial
Interface Wake Up!
Lock
Property of Worthington Distribution.
May Not Be Reproduced Without Permission Device with
Beaming support
800-282-8864
19. Known Products With Beaming
• As of October 24, 2012 the current shipping versions of the
following products are known to have Beaming support.
Note: Leviton vizia rf+ is fully
compatible with HAI
controllers and LEVVRCZ4-M0 LEVVRCS4-M0
vizia rf+ 4 Button LEVVRP03 LEVVRC0P vizia rf+ 4 Button
features automatic
Zone Controller Lamp Module Serial Interface Scene Controller
status updates
Note: Evolve devices can
be controlled by HAI;
however,
status must be polled EVOLDM-15 EVOLRM-AS
Plug-in Lamp module Decorator style dimmer EVOLOM-15
EVOLPM-15 EVOLSM-15 Wall Outlet
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
Plug-in Appliance module Decorator style switch
800-282-8864
20. Z-Wave Best Practices
Stay away from controlling devices
mounted outdoors and in outbuildings
• Exterior materials can effect signal
• Examples
• Aluminum siding
• Wire mesh – stucco and stone
• Foil backed installation
• Low-E Glass
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
• Low temperatures are a concern
800-282-8864
21. Z-Wave Best Practices
• Best practice is to expand coverage in pairs
• More options allows the mesh to try alternate paths
• The temptation when expanding coverage is to just add a single
device half way. While this has been known to work, for
consistent results add 2 devices around the halfway point.
• When using plug-in modules, choose locations that are unlikely to
be unplugged or moved
• Behind furniture is often a great location
• If out of site, label “Communication Device, Do Not Remove”
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
• Once placed and programmed DO NOT RELOCATE ZWAVE
800-282-8864 DEVICES
22. Z-Wave is RF: Think Metal!
• Z-Wave uses RF signals
• Metal reflects signals
• Metal does not mean it will not work, just be aware of
large metal objects and plan accordingly
• Metal junction boxes effect RF transmission patterns
• Often more devices are needed for the same
coverage
• Do not place the Leviton Z-Wave Serial Interface in a
metal structured wiring enclosure or equipment rack
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
23. Z-Wave
Programming
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
24. Create A New File
• Start by creating a new file
• The USB stick will be reset
• You will be prompted for a new file name
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
25. Learn the Locks
Install First
•Install the locks in the FINAL location before enrolling
• It is NOT advisable to learn the locks and then install them
•Once you hit OK, use the following slides for the proper enrollment procedure
Exclude before Include
•It is a good habit to Exclude a device prior to Including it in
your new Zwave network
• In enough cases to be troublesome a device is tested
on the production line but not removed from their test
network
• This causes issues with learning the lock into a new
network
•Excluding a device is very similar to including a device. Start
by selecting Exclude Device then skip to the instructions for
your lock
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
26. Learn The Locks
Include
•After Excluding you may now Include
•Select Include Device and press “OK” BEFORE putting the lock into include mode
•See the slide for your device for setting it to include
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
27. Learning Kwikset and Baldwin
• Install the locks in the FINAL location before enrolling
• It is NOT advisable to learn the locks and then install them
• Ensure you have fresh batteries and that a green Z-Wave radio is installed
• A non-communicating version of the lock is available in which a radio is not
installed. The RF cards are not available separately.
• A ZigBee radio is red and is not compatible with Z-Wave products
• When the lock is powered up, follow the instructions to set user code 1
• Press the big button (circled in red) one time
• Enter a code
• Press the lock button
• As shown in the previous slide, click ‘Include Device’
• When the dialog box pops up, press ‘OK’
• Press the top left microswitch (finger pointing on the left)
• The blue LED on the USB stick will flash, it can take 30 seconds for a lock to
enroll
• Give the lock a name
• Repeat for additional locks
• If for any reason the lock will not learn, click ‘Exclude Device’ and then the
Microswitch. Once removed from all networks, attempt Inclusion again.
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
28. Learning Yale
• Install the locks in the final location before enrolling
• It is not advisable to learn the locks and then install them
• Ensure you have fresh batteries
• When the lock is powered up you have to set an installer code
• Enter 12345678#
• Enter 1#
• Enter an Installer Code (4-6 digits) followed by #
• As shown in the previous slide, click ‘Include Device’
• When the dialog box pops up, press ‘OK’
• Learn in the deadbolt
• Enter the new Installer Code followed by #
• Enter 7#
• Enter 1#
• The blue LED on the USB stick will flash, it can take 30 seconds for a lock to
enroll
• Give the lock a name
• Repeat for additional locks
• If for any reason the lock will not learn, click ‘Exclude Device’
• Enter the new Installer Code followed by #
• Enter 7#
• Enter 3#
• Once removed from all networks
attempt Inclusion again
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
29. Learning Schlage
• Before installing, write down the Prog and User Codes on the yellow sticker
(below)
• Install the locks in the final location before enrolling
• It is not advisable to learn the locks and then install them
• Ensure you have fresh batteries
• The deadbolt has 2 sets of batteries
• 3 AA power the Z-Wave radio and 9V controls the lock/pinpad
• As shown in the previous slide, click ‘Include Device’
• When the dialog box pops up, press ‘OK’
• Type the Prog Code in on the Pinpad
• The Schlage logo will turn Amber
• Press 0
• The blue LED on the USB stick will flash, it can take 30 seconds for a lock to enroll
• Give the lock a name
• Repeat for additional locks
• If for any reason the lock will not learn, click ‘Exclude Device’ and then type the
Prog Code followed by 0
• Once removed from all networks attempt Inclusion again.
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
30. Additional Devices for Communication
• Many installations will require additional Z-Wave
modules to ensure reliable communication
• Beaming compatible devices are required
R1 R2 R3 • See slide 19
• Plug-in lamp and appliance modules have been
popular with other installers
• Pro: Quick installation with no electrical license
R4 required
• Con: The customer can move or unplug the
modules
• Light switches and outlets provide a more custom
installation
• Pro: Devices are not going to move and
customers often request more devices once they
can control lights on a schedule and from
portable devices
• Con: Devices should be installed by an
electrician
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
31. Additional Devices for Communication
• Programming
• Click Include Device
• Click OK and wait 2 seconds
• The LED on the stick will flash
for a moment
• Follow the Include Device instructions
for the device
• Leviton – Tap the device on
• Evolve – Double tap the device
on
• Once all additional devices are added
• Right mouse click on the serial
interface
• Now has a green box
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
32. Add the Leviton Serial Interface
• It is best to have the locks installed and learned before adding the serial interface
• If a lock is added after learning in the serial, simply repeat the serial learning process
• Put the VRC0P interface into learning BEFORE pressing ‘Include Device’ on the PC
• With the LED flashing green, press and hold the LED until it turns amber
• If the LED turns amber and then red, the serial is defaulted. Just wait until the
LED turns green again and start over
• With the LED flashing amber, click ‘Include Device’ followed by clicking ‘OK’ when
the dialog box pops up
• Once included, give the serial interface a name like ‘serial interface’
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
33. Set the Serial Interface For 2-Way
• Before executing this step, the locks must be in the network and the serial interface should
be learned in last
• Choose Diagnostics / RS232 Setup
• The LevSerialInterfaceConfig dialog box will open
• Use the pull down next to RS232 Modules and choose the
serial interface connected to the HAI
• Place a check mark next to each lock
• Click Set Association
• The Set Association button will gray out during communication
• Be patient, this can take a minute or two
• The blue LED on the USB stick will flash
• The process is complete when the Set Association button
is no longer grayed out. You can now close the dialog box.
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
34. Note the Node Numbers
• The last step before closing the software is to note the node numbers for each lock
• g! imports all the devices automatically but does not import device names
• In the upper left corner, expand the ‘All Devices’ section in the tree
• Note the device name and node numbers shown in the parenthesis ()
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
35. USB Stick Orientation
Blind spot at • RF devices often do not radiate evenly in all directions
close
distance • The USB stick radiates out the sides more than the end
• Typically this is a non-issue except in very close range applications
• The time to be aware of the USB stick radiation pattern is when you
have a laptop cradled in your arm
• If the USB stick is in the back, installers like to get the stick
near the target device; unfortunately, that puts the device right
in the ‘blind spot’
• Point the side of the stick towards the device for better results
Not
Much better
recommended
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
36. A Device Will not learn
• In current Z-Wave versions, a device must be within
the standard (3’) or long range (75’ open air) inclusion
circle during the learning phase
R1 R2 R3 • Depends on when the device was designed
• Beaming devices typically support long range
inclusion
• If other devices will be needed to ‘hop’ to the USB stick
R4
then it will likely not learn
• It is best to have the PC and stick in the room
when learning
• This is most important with locks
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
37. When Things Go Wrong: Static Routes
• Z-Wave is an excellent technology; however, like
many technologies, it is only as good as the
R
1
R
2
R
3
installation
• Static Routes
R • Z-Wave is a mesh network that depends
4
on other devices in the network to ensure
commands get to their destination
• Learning devices into the USB stick
establishes the paths
• Removing or Moving a device disrupts
the path and causes serious issues
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
38. Rediscovery
• Z-Wave paths are critical to success
• Paths are traditionally established during the learn process
• Rediscovery establishes new paths using devices currently
R R R3 assigned to the network
1 2
• Start by learning all of the devices into the USB stick
• Place the devices in their final location
R • Use the rediscovery feature
4
• Update the VRC0P using ‘Update Routes’ after rediscovery
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
39. Rediscovery Power Level
• Choose Power Level
• The Power Level is useful for ensuring there is
‘room for error’ when routes are chosen
• Lowering Power Level means devices transmission range is
lowered as routes are discovered so fewer devices are available
• The devices chosen for routes during low power rediscovery
will have high signal strength during normal operation
• Choosing a power level
• In typical installations, start with -6dB
• The only exception is when the home has a large amount
of Z-Wave (every light switch in the home)
• A low Power Level will cause the system to hop more
than it needs to resulting in slower communication
• Start the Network Rediscovery
• If you start with -6dB and all devices don’t pass, try -4dB
• If -4dB does not pass you likely need more modules
• Always update the serial interface after a Network Rediscovery
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
40. Update Routes
• When a Rediscovery is used the serial needs to be updated
• The serial update allow the serial to use the new paths that
were discovered
• After the serial has been updated, the locks need to be offered
the newly discovered pathways for speaking back to the serial
• Under Diagnostics choose Update Routes
• Check each lock
• Click Update Routes
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
41. Time for g!
• Connect the VRC0P to your ELAN g! controller using the
white serial cable and see the ELAN Zwave Door Locks
integration note to complete programming
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
42. Worthington Distribution
• Worthington Distribution Can Provide
• Product
• Competitive Pricing
• Great Stocking Levels in Tafton, PA
• Knowledgeable, Helpful Staff
Richard Richie Scholl Tom Morgan
• Training Scholl VP, Technical VP, Worthington
President Sales University
• Worthington University
• On-Line
• Technical Support
• System Design Support Debbie Scholl
Tricia Seybold
Customer Service
Customer Service Manager
Property of Worthington Distribution.
May Not Be Reproduced Without Permission
800-282-8864
800-282-8864 Nolan Male
Technical Support
Steve Hoh
Technical Support
Barry Hampe
Technical Support