ok. here is how i got a message in the first place. The data server
developers released this one windows app that simulates a real app. In
that it logs into the server and sends and receives commands. instead
of putting in the data servers ip though, i put in the ip address of
the linux box i am bu
Marc 'BlackJack' Rintsch wrote:
> In <[EMAIL PROTECTED]>, nephish wrote:
>
> > tohex gave me
> > '53 54 58
>
>S T X
>
> > 00 00 00 34
>
> Length!? Decimal 57.
3 * 16 + 4 -> 52 where I come from -- assuming hex means hexadecimal
and not witchcraft :-)
>
> > 00 00 00 c8
>
> Type!? Decimal 2
In <[EMAIL PROTECTED]>, nephish wrote:
> tohex gave me
> '53 54 58
S T X
> 00 00 00 34
Length!? Decimal 57.
> 00 00 00 c8
Type!? Decimal 200.
> 70 69 76 6f 74 72 61 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 74 72 61 63 31 70 69 76 6f 74 00 00 00 00 00 00 00 00 00 00 00 00
[EMAIL PROTECTED] wrote:
> ok. indeed i did do '' instead of ' '.
> here is an example of a message
> 'STX\x00\x00\x004\x00\x00\x00\xc8stateman\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00state1man\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00ENX'
>
> tohex gave me '53
ok. indeed i did do '' instead of ' '.
here is an example of a message
'STX\x00\x00\x004\x00\x00\x00\xc8stateman\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00state1man\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00ENX'
tohex gave me '53 54 58 00 00 00 34 00 00 00 c8 70 6
Grant Edwards wrote:
> On 2006-07-24, Steve Holden <[EMAIL PROTECTED]> wrote:
> > [EMAIL PROTECTED] wrote:
> >
> >> now the 17758 is significant because it is the actual unit number of
> >> the machine we want to monitor. I just dont know how to extract the
> >> real values out of this message.
>
[EMAIL PROTECTED] wrote:
> the starting and ending deliminators are ASCII 'STX' and 'ENX'. i
> wondered why they did it like that also. But they did.
>
> the message length is a 4 byte integer indicating how long the message
> body is.
> the message type is also 4 bytes. There is a table in the d
On 2006-07-24, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> ok, i did this print ' '.join(["%02.2x" % ord(b) for b in message])
> and i got this in the text file
> 535458002c00ea31373538343636383535d6090d54454e58
No, I don't think so.
ok, i did this print ' '.join(["%02.2x" % ord(b) for b in message])
and i got this in the text file
535458002c00ea31373538343636383535d6090d54454e58
so, yes, more of the info seems discernable now.
according to their docs, all of their va
On 2006-07-24, Steve Holden <[EMAIL PROTECTED]> wrote:
> [EMAIL PROTECTED] wrote:
>> hello there, all.
>>
>> i have a difficult app that connects to a server to get information for
>> our database here.
>> this server is our access point to some equipment in the field that we
>> monitor.
>>
>> th
[EMAIL PROTECTED] wrote:
> hello there, all.
>
> i have a difficult app that connects to a server to get information for
> our database here.
> this server is our access point to some equipment in the field that we
> monitor.
>
> the messages come in over a socket connection. And according to the
hello there, all.
i have a difficult app that connects to a server to get information for
our database here.
this server is our access point to some equipment in the field that we
monitor.
the messages come in over a socket connection. And according to their
(very limited) documentation, are set
12 matches
Mail list logo