Specification Proposal: Alarm Signalling over IP Revision: SIGNATORIES AS REQUIRED

Size: px
Start display at page:

Download "Specification Proposal: Alarm Signalling over IP Revision: 1.2.2 SIGNATORIES AS REQUIRED"

Transcription

1 Specification Proposal: Alarm Signalling over IP Revision: Approved: Company Approved: Company Approved: Company Approved: Company ADD APPROVAL SIGNATORIES AS REQUIRED Date Position Date Position Date Position Date Position

2 Disclaimer The content of this document ( ) has been composed with great care. Experience however has learned us that even despite our carefulness it can occur that the information offered is out of date, incomplete or incorrect. Therefore we ask you to please check the website of VEBON, for the newest information. Liability VEBON is not responsible for any dammage (in-) directly caused by or related to the use of the information available in this document/ . " Revision History Revision Date Summary of Change By Draft 1 18/01/06 Initial revision DH Draft 2 10/03/06 Updated after first review DH Draft 3 16/06/06 Updated after second review DH /08/06 Updated after meeting at Enai on 22 nd August 2006 DH /09/06 Updated after several conversations KJO /09/06 Rearranged chapters and paragraphs KJO /09/06 Protocol version added to PPK_REP message KJO /01/07 Disclaimer edit KJO Page 2 of 42

3 Table of Contents 1. Scope Objective References Definitions Introduction Message Header Connection Handle Message ID Sequence Number Handling Device ID Message Layout Layout Setup messages Layout communication messages Layout path-check messages Data Encryption Communication Setup Setup sequence Step 1: ARC_ENC Step 2: PPK_COM Step 3: PPK_REP Step 4: ARC_ENC Setup message validation Sequence after communication setup Setup timing Path Supervision Supervision Message Formats Supervision Polling Message Formats Re-establish connection to force key exchange Path checking Path Check setup messages Path Check Poll messages Alarm Signalling Protocol Description Alarm Message Format Communication failure...29 APPENDIX A CRC Routine...30 APPENDIX B SHA1-256 METHOD...31 APPENDIX C PROTOCOL IDENTIFIERS...32 APPENDIX D ERROR CODES...36 APPENDIX E RSA Encryption...37 APPENDIX F AES Encryption...41 Page 3 of 42

4 1. Scope This document is published by, and is the responsibility of, the Vebon Group. The scope of this document is to describe the operation of a protocol for SIA alarm transmission over IP, using UDP, with a view to establishing a common working practice, throughout Europe, that complies with the current European and National standards for alarm transmission: The standards referenced are EN50131, EN50136 and BORG AL1 & AL2. This document s primary focus is to establish a message format and as such will not introduce any time constraints on the alarm reporting system as that is already covered within the relevant specifications. Page 4 of 42

5 2. Objective The objective is to achieve compatibility and inter-operability of alarm transmission where the transmission equipment and annunciation equipment of different equipment manufacturers is involved. Page 5 of 42

6 3. References Reference to: European Norms (EN50131 and EN50136) where applicable. BORG AL1 & AL2 AES Encryption: Federal Information, Processing Standards Publication 197, November 26, 2001 RFC US Secure Hash Algorithm 1 (SHA1) Page 6 of 42

7 4. Definitions Explanation of terms and definitions used in this standard ARC Alarm Receiving Centre ATE Alarm Transmission Equipment Page 7 of 42

8 5. Introduction This chapter introduces the different global aspects from the Vebon IP protocol Message Header Byte Index Bytes Description 0 2 Connection Handle ( 0xFFFF if not assigned yet) 2 1 Message ID (See section 5.1.2) 3 2 Sequence number 5 16 Device ID Connection Handle Some Internet Service Providers have inactivity timeouts and as such if the connection times out, then the module could be assigned a different IP address when the connection is re-established. This presents the ARC with the problem of trying to choose the correct key to use to decrypt messages coming from that particular ATE. To circumvent this each message will be prefixed by an unencrypted Connection Handle, assigned to it by the ARC. The connection handle will remain the same as long as the connection exists. This will also cater for installations that use network address translation, where the network behind the external interface is represented by one IP address and only the port numbers change. The connection handle will be contained with in the Message Header that will prefix every message. If there is no connection yet, e.g. connection setup scene, the connection id 0xFFFF should be used. A, by the receiver assigned, connection handle will be in range from [0x xFF00]. Connection handle value 0xFFFF will be used by the ATE in order to indicate that is needs a new connection. Connection handle value 0xFFFE could be used by the receiver, in order to inform the ATE that the connection could not be accepted. The receiver could also implement this information as a result code in the ARC_ENC message. Advantage is that this information is encrypted. Disadvantage, it takes a bit longer and the receiver needs more resources. ATE should implement both. Page 8 of 42

9 Message ID Message Name Description Size Encryp -ted Messa ge ID ATE_ENC Communication setup request (sent by ATE). This message is always ARC_ENC Communication setup response acknowledge (sent by the ARC). 258 N 0x Y RSA 0x81 PPK_COM PPK_REP PATH_SUPERVISION_ REQUEST ARC transmits it s public key to the ATE. ATE response with it s configuration and AES key. ATE request for supervision polling with an interval 258 N 0x Y AES 130 Y AES 0x82 0x10 PATH_SUPERVISION_ RESPONSE POLL MESSAGE ARC response. 130 Y AES ATE transmits a path supervision message 130 Y AES 0x90 0x11 POLL ACKNOWLEDGE ARC response to the path supervision message. 130 Y AES 0x91 PATHCHECK_REQUEST ATE request for path-checking 130 Y AES 0x20 PATHCHECK_ RESPONSE ARC response to pathcheck request. 130 Y AES 0xA0 PATHCHECK_POLL Path Check Poll message from ATE 8 N 0x21 PATHCHECK_ RESPONSE Path Check Poll response from ARC 8 N 0xA1 ALARM Alarm message from ATE. 130 Y AES ALARM_ACK Alarm response to ATE. 130 Y AES 0x30 0xB0 Page 9 of 42

10 Sequence Number Handling The sequence number is used to determine if a message is missing or duplicated. Both ends will have a transmit sequence number and a receive sequence number. A new initiated message has a new sequence number and the receiver will respond with the same sequence number. The connection setup scene will reset the sequence numbers. Most messages will be initiated by the ATE but some by the ARC. Every response message will have the same sequence number as the corresponding originator. The first transmitted message will have sequence number 1. If the sequence number is not as expected then a communication fail should be generated. If the sequence number is the previous number the message will be answered as usual but will not be passed 1 to processing part of the transmitter (this to prevent duplicated alarms). Thus a retry of a message should be sent with it s original sequence number. A message ID < 0x80 is a command by ATE or ARC and will increase the TXsequence number of the sender. The receiver should compare this with it s Rxsequence number. Message ID >= 0x80 is a reply on a command and this will increase the Rxsequence number of the receiver. On a fail of the sequence numbers the session needs to be restarted. Example sequence numbering: MSG ATE ARC TxSeq RxSeq TxSeq RxSeq ATE-ENC (tx) 1 0 ATE-ENC (rx) 0 1 PPKCOM (tx) 1 1 PPKCOM (rx) 1 1 PPKREP (tx) 1 1 PPRREP (rx) 1 1 Sup-Setup (tx) 2 1 Sup-Setup (rx) 1 2 Sup-Rsp (tx) 1 2 Sup-Rsp (rx) 2 1 Poll (tx) 3 1 Poll (rx) 1 3 Poll-Rsp(tx) 1 3 Poll-Rsp(rx) nd poll (tx) nd poll (rx) nd poll rsp (tx) nd poll rsp (rx) Previous sequence number may occur if the transmitter retried the message, because it did not receive a reply within certain time. Page 10 of 42

11 Device ID Device ID s are used to detect if the device you re communicating with did not change. The ATE can detect if the ARC is still the same and the ARC can detect if the ATE is still the same. Device ID s will only be transmitted encrypted over the connection. If ID s change this should result into a substitution alarm. E.g. ATE might sent a substitution alarm to the ARC via an alternative route and the ARC will generate internally a substitution alarm for the ATE. The DeviceID of the ATE, transmission equipment, is generated but must remain the same for that device. The best method could be to use the mac-address or usage of unique identifier hardware (such as a dallas chip). The DeviceID of the ARC receiver is a randomly generated ID that is unique within the receiver. So the receiver generates a unique DeviceID for each connected ATE Message Layout The Vebon IP protocol defines the following 3 types of messages: Setup messages. These are required to setup a connection and exchange encryption information. Communication messages. These messages are used to transmit alarms and path supervision messages (is the communication path end to end available?). Path check messages. These messages can be used in addition to the path supervision messages, with the difference that these are NOT encrypted and can only be used to detect a path/communication fail. Because these messages are not encrypted they can be used in a high speed, say seconds Layout Setup messages Byte Index Bytes Description 0 21 Message Header Message Data 205 bytes for communication setup bytes random padding and 2 bytes CRC 16 The size of these setup messages is always: 258 bytes. Page 11 of 42

12 Layout communication messages Byte Index Bytes Description 0 21 Message Header Message Data 77 bytes 30 bytes random padding and 2 bytes CRC or 32 bytes SHA1-256 hash (depending on CRC-mode). The size of these communication messages is always 130 bytes. During communication setup, the ATE informs the ARC about the message validation (CRC-16 or SHA1-256). For security reasons the message size, during communication, is always 130 bytes. This way it is not possible to detect the validation method by means of the message size. So if CRC-16 mode is used, there are always 30 random bytes before the actual CRC-16 value to occupy the same space in the message as the SHA1-256 data Layout path-check messages Byte Index Bytes Description 0 2 Connection Handle 2 1 Message ID 3 1 Random Character OR Error reason 4 2 Path Check ID 6 2 CRC-16 The size of these messages is always 8 bytes. NOTE: The path check message do not have the complete header (only the first 3 bytes of it). Page 12 of 42

13 6. Data Encryption Data Encryption for remote communications is mandatory at certain grades. The encrypted link exists between the ATE and the ARC. The encryption must use 128 bit Private Key Advanced Encryption Standard (AES) 2 for message data encryption and 1024 bit RSA (Public Key) for exchange of the AES Private Key. Initially the ATE is responsible for generating the AES Private Key. There will be a separate key for every connection 3 and a new key will be generated for each session on a path. A session is defined as either the duration of a UDP connection, or the duration of a stable end-to-end connection, as monitored by Path Supervision. Data Encryption is controlled by extended link set-up handshaking. During communication setup a Private Key is required, the ARC will issue its RSA Public Key to the ATE. The ARC will periodically change it s RSA key-pair. When the ATE receives the Private Key request message, it generates an AES Private Key, constructs a key message block containing this key and the Session Identifier, encrypts 4 the message block using the RSA Public Key, and the constant Public Exponent 5, and sends the resulting cipher to the ARC. The ARC then decrypts 6 the cipher to reveal the message block. The message block is considered valid if Session Identifier matches with the value sent in the Private Key request message. Both ends of the link now have the AES Private Key for encrypting and decrypting the subsequent data messages. 2 AES encryption functions can be found in appendix F. 3 If the ATE maintains multiple connections with different ARC s, than for each ARC there is a different key. The ARC will have a different key for each ATE. 4 Because RSA encryption with 1024 bits only encrypt 128 bytes, this encryption is executed 2 times first for byte 2 till 130 and second for byte 131 till RSA Public exponent and functions can be found in appendix E. 6 See note 1, decryption will also be done twice. Page 13 of 42

14 7. Communication Setup Communication will be setup by the ATE. If there is a communication fail, or a new ATE, communication needs to be setup with the receiver. The messages are used for this scene are shown in the diagram below. ATE ARC Application IP Stack IP Stack Application UDP set-up ATE-ENC PPKCOM PPKREP ARC-ENC Only sent if a session private key has not already been exchanged Send Alarm Data All subsequent messages encrypted under the session private key Figure 1: Communication setup 7.1. Setup sequence Steps: 1. ATE will transmit an UNENCRYPTED ATE_ENC message to the ARC. 2. ARC will respond with an UNENCRYPTED PPK_COM message, containing the public RSA key (1024 bits). 3. ATE will respond with an RSA ENCRYPTED PPK_REP message containing configuration information of the ATE and the AES key that will be used during the rest of the session. 4. ARC will respond to the ATE with the ARC_ENC indication if the connection is accepted or not. Page 14 of 42

15 Step 1: ARC_ENC ATE ARC Note: This message will be sent UNENCRYPTED. Byte Index Bytes Description Message Header: 0 21 Connection handle (0xFFFF) Sequence = 1 Device ID = random Session Identification number (will be 0) Random padding Random padding CRC-16 Checksum Step 2: PPK_COM ARC ATE Note: This message will always be sent UNENCRYPTED at the initialisation of a session. Byte Index Bytes Description Message Header 0 21 Connection handle, defined by the receiver. Sequence = 1 Device ID = random 21 2 Session Identification number (will be 0) bit RSA public key Random padding Random padding CRC-16 Checksum Page 15 of 42

16 Step 3: PPK_REP ATE ARC Byte Index Bytes Description 0 21 Message Header 21 1 Protocol Version Manufacturer id (string) Panel type (ASCII) 54 8 Panel version (ASCII) 62 6 Account code (6 ASCII digits: ) 68 1 CRC-mode ( 01 = CRC-16, 02 = SHA-1) 69 2 Session Identification number (non-zero, it s encrypted now) Private Key Message Block (128-bit AES) Random padding Random padding CRC Checksum Sequence number = 1 The Key Message Block is contained in the PPKREP message and has the following format: Byte Index Bytes Description 0 1 Version set to 0x AES Private Key 7 Protocol version set to 1 Page 16 of 42

17 Step 4: ARC_ENC ARC ATE Byte Index Bytes Description 0 21 Message Header 21 1 Error Code* n Session Identification number (must match value of PPK_REP message) Random padding chars to take message length up to a multiple of 16 bytes CRC Checksum Sequence number = 1 *Error code could be: ERR_SUCCESS ERR_PROTOCOL_VERSION_NOT_SUPPORTED ERR_PPK_BLOCK_VERSION_NOT_SUPPORTED ERR_CRC_MODE_NOT_SUPPORTED ERR_ACCOUNT_CODE_NOT_ALLOWED ERR_CONNECTION_NOT_ALLOWED 8 8 This value could be used by the ARC receiver if the information (receiver full) needs to be encrypted. Otherwise the receiver might sent a dummy PPK_COM with connection handle 0xFFFE. ATE should support both ways. Page 17 of 42

18 7.2. Setup message validation During the setup, the ATE will inform the ARC about the method of message validation (CRC16 or SHA-1 (256bits)). Before this information has taken place CRC16 is used to validate the setup message Sequence after communication setup If the communication setup is finished, the ATE can send any kind of messages. With only a few restrictions: 1. If supervision is enabled, then supervision setup must be sent within 60 seconds of the communication setup. So high priority alarms might be transmitted first. After 60 seconds the connection will be terminated for an ARC that demands supervision. 2. If path checking is enabled, the ATE must FIRST setup supervision. Otherwise patch checking will NOT be accepted Setup timing The communication setup needs to be completed within 30 seconds. Therefore, the ATE will wait 30 seconds after transmitting the ATE_ENC for the ARC_ENC response and the ARC will wait 30 seconds after transmission of PPK_COM for the PPK_REP message. Page 18 of 42

19 8. Path Supervision Path Supervision uses the same host port number as setup and alarm message. This is required because the receiver must be able to detect a line/route failure. A line failure could be caused by an interruption of the network. A route failure might be a sabotage of network equipment such as blocking the alarm port on a firewall. A Path Identification Value is included in every Path Supervision message to identify individual monitored paths. Each Path Supervision message has Path Identification Code to uniquely identify the ATE to the ARC, independently of account number. Path Supervision is started following initial communication between the ATE and an ARC. Following the initial exchange, the ATE issues a Path Supervision Request message to inform the ARC that Path Supervision is required and the selected polling period. The ARC then issues an acknowledgement of the request. If the ARC does not support Path Supervision, or Path Supervision at the rate requested is not supported, then the Path Supervision Response will contain the corresponding error code. In this case the ATE will indicate a heartbeat failure on the associated link. If the rate is not supported, then the supported polling rate will be returned in the Path Supervision Response, the ARC will generate a configuration error message such as polling too slow or polling to fast, the ARC will NOT terminate the connection. Heartbeat failure might be indicated by the ATE. Application ATE IP Stack IP Stack ARC Application Path Supervision Request Path Supervision Response Response Figure 2: Initiation of Path Supervision Response sent if ARC accepts Path Supervision The ATE issues a heartbeat Poll Message to the ARC at a rate determined by the polling period. To allow for communications latency and asynchronous timekeeping, the ARC allows a tolerance beyond the end of the polling period before an error is reported. If the polling period is less than 300 seconds, the heartbeat can be accepted up to 20 seconds late otherwise (greater or equal to 300 seconds), the heartbeat can be up to 1 minute late. This may be used to satisfy the monitoring of the alarm transmission system up to T5, as per Table 4 in EN In order to achieve the T6 rate, the path checking 9 method should be used as an addition to the path supervision. 9 See chapter 9 path checking Page 19 of 42

20 When the ARC receives the heartbeat Poll Message, it issues a Poll Acknowledgement and resets its polling window timer. When the ATE receives the Poll Acknowledgement it restarts its timer for the next heartbeat. Application ATE IP Stack IP Stack ARC Application Poll Message (heartbeat) Poll Acknowledge Figure 3: Path Supervision Poll ARC resets polling window when Poll Message received. In response to error conditions the ATE and ARC will post messages in accordance with the standards Page 20 of 42

21 8.1. Supervision Message Formats The Path Supervision Request message is encapsulated in a datagram with the format: ATE ARC Byte Index Bytes Description 0 21 Message Header 21 2 Path Identification Code 23 4 Heartbeat Time seconds ( >= 60 seconds) Random padding chars to take message length up to a multiple of 16 bytes byte Padding + CRC Checksum or SHA-1 The Path Supervision Response message is encapsulated in a datagram with the format: ARC ATE Byte Index Bytes Description 0 21 Message Header 21 1 Error Code* (See Appendix D for values) 22 2 Path Identification Code (must match value in Path Sup. Request) 24 4 Heartbeat Time seconds Random padding byte padding + CRC Checksum or SHA-1 *Error code could be: ERR_SUCCESS ERR_SUPERVISION_NOT_SUPPORTED ERR_SUPERVISION_REQUEST_TOO_FAST ERR_SUPERVISION_REQUEST_TOO_SLOW Page 21 of 42

22 8.2. Supervision Polling Message Formats The Poll Message is encapsulated in a datagram with the following format: ATE ARC Byte Index Bytes Description 0 21 Message Header 21 2 Path Identification Code (must match value in Path Sup. Request) Random padding byte padding + CRC Checksum or SHA-1 The Poll Acknowledge is encapsulated in a datagram with the following format: ARC ATE Byte Index Bytes Description 0 21 Message Header 21 1 Error Code * (See Appendix D for values) 22 2 Path Identification Code (must match value in Request) Random padding byte padding + CRC Checksum or SHA-1 *Error code could be: ERR_SUCCESS ERR_SUPERVISION_NOT_SUPPORTED ERR_REESTABLISH_CONNECTION See 8.3 Page 22 of 42

23 8.3. Re-establish connection to force key exchange For connections that last long, it might be desired to change the encryption key. Connections will be maintained by path supervision polling. Therefore the error-reason in the Path Supervision Poll Response will be used to indicate the ATE that the connection should be re-established (starting with the unencrypted ATE_ENC on connection ID 0xFFFF). This will ensure that a new AES key is exchanged with the new RSA public key. The ARC will set this result code into the path supervision response message only if the connection was not re-established for another reason and lasted for more than days. (Programmable in the receiver). It is the responsibility of the ATE to start with the new ATE_ENC. Page 23 of 42

24 9. Path checking In order to achieve the higher monitoring rates as specified in Table 4 of EN , there is a requirement for a high speed, low overhead, message that can be used in conjunction with the Path Supervision messages. Typically this requires one successful path check every 20 seconds. This would also be subject to the tolerances mentioned in section 8.1 above. The proposal therefore is to use a simplified Path Supervision protocol and allow a polling interval of 10 seconds for the path checking message, with the recipient allowing it to be up to 5 seconds late. If the ARC supports Path Checking then it will respond to the Path Check Request with the Path Check Accept. The ATE will then send out the first Path Check command. If either the ARC or the ATE do not receive the Path Check message within the allotted time, then the appropriate fault messages will be generated. This path checking also uses the same host port number as path supervision and alarm messaging. Path checking will be used in addition to path supervision. The major purpose of Path checking is to detect a communication line failure and will therefore ONLY generate an device OFFLINE alarm and never a restore. The restore can only be given by a successful supervision polling or communication setup. If path checking is required, the supervision setup MUST be done before. Page 24 of 42

25 9.1. Path Check setup messages The Path Check Request is encapsulated in a datagram with the following format: ATE ARC Byte Index Bytes Description 0 21 Message header Padding chars (random) byte padding + CRC Checksum or SHA-1 The Path Check Accept is encapsulated in a datagram with the following format ARC ATE Byte Index Bytes Description 0 21 Message header 21 1 Error Code* 22 1 Path Check ID Padding chars (random) byte padding + CRC Checksum or SHA-1 *Error code could be: ERR_SUCCESS ERR_PATHCHECK_NOT_SUPPORTED Page 25 of 42

26 9.2. Path Check Poll messages The Path Check Message is encapsulated in a datagram with the following format: ATE ARC Byte Index Bytes Description 0 2 Connection Handle 2 1 Message ID 0x Random Character 4 2 Path Check ID 6 2 CRC-16 The Path Check Acknowledge is encapsulated in a datagram with the following format ARC ATE Byte Index Bytes Description 0 2 Connection Handle 2 1 Message ID 0xA1 3 1 Error Code* 4 2 Path Check ID 6 2 CRC-16 *Error code could be: ERR_SUCCESS ERR_PATHCHECK_NOT_SUPPORTED Page 26 of 42

27 10. Alarm Signalling With Alarm Signalling the ATE sends the Alarm data when it is received from the panel. The Alarm data is transmitted in a single datagram which is acknowledged by the SIA End-Point ATE ARC Application IP Stack IP Stack Application udp_open Alarm Message (single Datagram) bind Alarm Ack Figure 4: Basic UDP Alarm Signalling Sequence Protocol Description All messages have a corresponding response to acknowledge receipt message sequence numbers are used to match acknowledgements with messages Alarm Message Format The Alarm/Event Message has the following format: ATE ARC BYTE Index Bytes Description 0 21 Message header 21 1 Protocol Identifier: 01 = SIA (Refer to Appendix C for definition and message layout) 22 1 Length of alarm data (L) L L (length of data) 98 (23 + L) <SIA Account Block><SIA Event Block><SIA ASCII Block> Random padding byte random padding + CRC Checksum or SHA-1 Page 27 of 42

28 Alarm/Event Response Format: ARC ATE Byte Index Bytes Description 0 21 Message Header 21 1 Error Code* (See Appendix D for values) Random padding byte padding + CRC Checksum or SHA-1 *Error code could be: ERR_ACKNOWLEDGE ERR_NEGATIVE_ACKNOWLEDGE ERR_ARC_COULD_NOT_PROCESS_MESSAGE ERR_PROTOCOL_ID_NOT_SUPPORTED Page 28 of 42

29 11. Communication failure There are several ways for the ATE and ARC to detect communication failure s. Most errors will be cause by network troubles or congestion. If path checking is enabled (every seconds a message) this detection is much faster (20 sec to the ARC) than with normal polling (fastest at max. 60 sec sec = 80 sec). The difficulty is that these communication failures cannot be distinguished from sabotage. In order to prevent a very heavy load on the receiver side and the risk of real alarms coming through late the ATE must handle the following reconnection scene after a communication fail. We distinguish 2 situations: 1) ATE has a real alarm (other than periodic test and line fault report). 2) ATE has no real alarm (no alarm, periodic test message or a line error report with the ARC) In the first situation the ATE is allowed to connect directly with the ARC and should keep trying this until it has transmitted it s alarms (if there is no other communication route available). In the seconds situation, the ATE should try to reconnect en should keep trying it but every time with a randomly chosen interval between 60 seconds and 300 seconds. If a real alarm situation occurs, the ATE is allowed to switch to the above scene. Page 29 of 42

30 APPENDIX A CRC Routine The following is a possible CRC routine that could be used for the IP messages, written in C. /*********************************************************************/ /* Function : calculate_crc */ /* */ /* Parameters : ptr - pointer to the data to be processed */ /* count - byte length of the data */ /* */ /* Returns : crc value */ /* */ /* Purpose : This function calculates a CRC of the supplied data.*/ /* */ /*********************************************************************/ UINT16 calculate_crc (char *ptr, UINT16 count) { #define CRC16_SEED 0x1021 UINT16 crc; UINT8 i; crc = 0; while (count-- > 0) { crc = crc ^ ((UINT16)*ptr++ << 8); for (i = 0; i < 8; i++) { if (crc & 0x8000) { crc = crc << 1 ^ CRC16_SEED; } else { crc = crc << 1; } } } return (crc); } Page 30 of 42

31 APPENDIX B SHA1-256 METHOD Source can be derived from: Usage example: SHA1_256 Calculation example: // psha must point to a 32 byte character array where the SHA hash will be placed in. static void CalculateSHA1_128 ( unsigned char *pdata, unsigned char *psha ) { unsigned char SHA1[32]; SHA256_CTX sha; unsigned char *ptocalculate = &pdata[2]; // Skip connection handle memset (SHA1, 0, sizeof (SHA1)); sha256_init (&sha); sha256_update (&sha, ptocalculate, 256); sha256_final (&sha, SHA1); } memcpy ( psha, SHA1, 32); Page 31 of 42

32 APPENDIX C PROTOCOL IDENTIFIERS The protocols listed below, other than SIA are suggestions only and have yet to be ratified, but give and indication of what would be possible. 01: SIA 02: Ademco Contact ID 03: Scancom 04: SIA-HS 05.. xx not defined!!! 01: SIA layout: The following SIA blocks must be present into an alarm message with the SIA protocol identifier: # Account block N New event block, OR O OLD event block. Additional the message may contain the following block: A ASCII text. If the combination: #N, #O, #NA, #OA is present in the alarm message, the message will be acknowledged by the receiver. The message header byte and the column parity will NOT be included in the SIA message format to the ARC, the message is already validated at the ATE side and the integrity of the message is guaranteed by the SHA1-256 hash (or the CRC-16). Other block like: & (origin), L (listen in), X (configuration) etc may (in addition to the above mentioned blocks) exists in the message but will not necessarily be processed by the receiver. Blocks will be separated by a sign. Thus a valid message will look like: #1234 NCL001 AVebonMember #1234 OBA012 AFrontdoor All modifiers and textual additions as specified in SIA DC (R ) may occur in the event block. Page 32 of 42

33 02: Ademco Contact ID The Ademco Contact ID messages, sometimes called POINT ID, have the following layout between ATE and ARC: AAAAMTQXYZGGCCC Where: AAAA = Account code [4..6] digits MT = Message type (18 or 98) Q = Qualifier, value 1, 3 or 6 XYZ = Event code GG CCC = Group number = Zone number The if the length of the message is within range: [15..17] and the MT equals 18 or 98. The account code must be 4 digits long minimum and 6 digits max. Account code digits must be in the range [ ] (0x30..0x39). Message type and Qualifier have fixed values as defined above. All other digits must be in the range: [ B.. F ] The checksum value should NOT be present in the message Account 1234 is reporting a Perimeter Burglary Alarm on Zone 15 of Partition 1. The length of the account code [4, 5, or 6 digits] will be determined by the total message size. Page 33 of 42

34 03: Scancom Fast format The scancom fast format message can contain 8, 16 or 24 channels and also 1 up to 6 account digits. The correct format can be determined by the receiver just by checking the length of the received message size. Layout of 8 channels scancom message: AAAACCCCCCCCS Where: AAAA = Account code C = Status of the channel (value s: 1, 2, 3, 4, 5, 6). S = System channel (value s: 7, 8, 9). The account code can vary between decimal digits. The number of channels can be: 8, 16 or 24. The system channel is always 1 digit. The length of an 8 channels message than can be: 10 up to 15 digits. The length of a 16 channels message than can be: 18 up to 23 digits. The length of a 24 channels message than can be: 26 up to 31 digits. All bytes must be in the range: The receiver will acknowledge the message if the size is expected (within the above values) and all bytes have the values in the correct range: Page 34 of 42

35 04: SIA HS: SIA HS is defined by Alphatronics as an alternative to SIA. Some SIA event codes have another meaning in HS than in normal SIA. Therefore a special protocol identifier is used to distinguish between SIA and SIA HS. The layout of the message part also differs. A SIA HS message will always start with: AAAANEE Where: AAAA = Account code 4 digit ( ) account code. N = New event (only N ). EE = SIA HS event code ( AA.. ZZ ). = See below.. Can be: 1) nothing Only event is given. 2) 16 characters text information. Event and text info 3) ZZ,SECTION^S^^^^^^^,[S[sss]] where ZZ is the zone field (2, 3 or 4 digits) (or user field, depending on the event code) and Section S 11 defines the area, [S[sss]] can also define the area (1 up to 4 areas). 4) ZZ,Text^Info.^^^^^^,[S[sss]] Like above only tekst information added. 5) ZZ,UU,Text^info.^^^^^^,[S[sss]] Like above only now an additional userfield (2, 3 or 4 digits) is added. 11 Area s are numbered from A.. Z as area and for number and 0 for area 36. Page 35 of 42

36 APPENDIX D ERROR CODES // Default error if all went okay #define ERR_SUCCESS 0x00 // Error reasons that could be sent into: // MSG_ID_ALARM_REPLY #define ERR_ACKNOWLEDGE #define ERR_NEGATIVE_ACKNOWLEDGE #define ERR_ARC_COULD_NOT_PROCESS_MESSAGE #define ERR_PROTOCOL_ID_NOT_SUPPORTED 0x01 0x02 0x03 0x04 // Error reasons that could be sent into: // MSG_ID_ARC_ENC #define ERR_PROTOCOL_VERSION_NOT_SUPPORTED #define ERR_PPK_BLOCK_VERSION_NOT_SUPPORTED #define ERR_CRC_MODE_NOT_SUPPORTED #define ERR_ACCOUNT_CODE_NOT_ALLOWED #define ERR_CONNECTION_NOT_ALLOWED 0x05 0x06 0x07 0x08 0x0D // Error reasons that could be sent into: // MSG_ID_SUPERVISION_SETUP_REPLY & // MSG_ID_SUPERVISION_POLL_REPLY #define ERR_SUPERVISION_NOT_SUPPORTED 0x09 // Error reasons that could be sent into: // MSG_ID_SUPERVISION_SETUP_REPLY #define ERR_SUPERVISION_REQUEST_TO_FAST #define ERR_SUPERVISION_REQUEST_TO_SLOW 0x0A 0x0B // Error reasons that could be sent into: // MSG_ID_PATHCHECK_SETUP_REPLY & // MSG_ID_PATHCHECK_POLL_REPLY #define ERR_PATHCHECK_NOT_SUPPORTED 0x0C // Special response reason on: MSG_ID_SUPERVISION_POLL_REPLY // This result code tells the ATE to re-establish the connection // from scratch (starting with the unencrypted ATE_ENC) #define ERR_REESTABLISH_CONNECTION 0x80 #define ERR_UNKNOWN 0xFF Page 36 of 42

37 APPENDIX E RSA Encryption For the RSA encryption/decryption the BIGDIGITS library is used: /******************** COPYRIGHT AND LICENCE NOTICE ******************** This source code is part of the BIGDIGITS multiple-precision arithmetic library Version 2.1 originally written by David Ireland, copyright (c) D.I. Management Services Pty Limited, all rights reserved. You are permitted to use compiled versions of this code at no charge as part of your own executable files and to distribute unlimited copies of such executable files for any purposes including commercial ones provided you agree to these terms and conditions and keep the copyright notices intact in the source code and you ensure that the following characters remain in any object or executable files you distribute AND clearly in any accompanying documentation: "Contains BIGDIGITS multiple-precision arithmetic code originally written by David Ireland, copyright (c) by D.I. Management Services Pty Limited < and is used with permission." David Ireland and DI Management Services Pty Limited make no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. Our liability will be limited exclusively to the refund of the money you paid us for the software, namely nothing. By using the software you expressly agree to such a waiver. If you do not agree to the terms, do not use the software. Please forward any comments and bug reports to < The latest version of the source code can be downloaded from < Last updated: 19 August *************** END OF COPYRIGHT AND LICENCE NOTICE ******************/ Page 37 of 42

38 The following functions will help to generate a private and public key-pair and encrypt/decrypt the messages: // #define PK_BITS 1024 // // Public exponent is required for KEY generation // // Default public exponent... // DIGIT_T npublicexponent[32] = { // Fermat Primes... 3, 5, 17, 257, 65537, // Fibonacci primes 2, 3, 5, 13, 89, 233, 1597, 28657, , , , // Kynea primes 7, 23, 79, 1087, 66047, , , , // Lucas primes 11, 29, 47, 199, 521, 2207, 3571, 9349 }; // 32 primes... // // Public exponent should match the value with the receiver!!!!! // void E_RSA_SetPublicExponent ( DIGIT_T *ppublicexponent ) { WORD nmoddigitsize = ( ( PK_BITS - 1 ) / ( sizeof ( DIGIT_T ) * 8 ) ) + 1; int i; mpsetzero( ( DIGIT_T * )npublicexponent, nmoddigitsize ); } for ( i = 0; i < nmoddigitsize; i++ ) npublicexponent[i] = ppublicexponent[i]; Page 38 of 42

39 // // Decode a message block with the sizeof 256 bytes... // Function called by the ARC to decrypt the PPK_REP message. // BOOL E_RSA_DecodeMessageBlock256( DIGIT_T *psourcemessageblock, DIGIT_T *presultmessageblock, DIGIT_T *ppublickey, DIGIT_T *pprivateexponent ) { WORD nmoddigitsize = ( ( PK_BITS - 1 ) / ( sizeof ( DIGIT_T ) * 8 ) ) + 1; // Decrypt 1st part... mpmodexp( &presultmessageblock[ 0], &psourcemessageblock[ 0], pprivateexponent, ppublickey, nmoddigitsize ); // Decrypt 2nd part... mpmodexp( &presultmessageblock[32], &psourcemessageblock[32], pprivateexponent, ppublickey, nmoddigitsize ); } return ( TRUE ); Page 39 of 42

40 // // Encode a message block with the sizeof 256 bytes... // // This function will only be used by the ATE. No need // to call: E_RSA_SetPublicExponent because the exponent will // be passed as a parameter to this function. // // Function called by the ATE to encrypt the PPK_REP mesage. // BOOL E_RSA_EncodeMessageBlock256( DIGIT_T *psourcemessageblock, DIGIT_T *presultmessageblock, DIGIT_T *ppublickey, DIGIT_T *ppublicexponent ) { WORD nmoddigitsize = ( ( PK_BITS - 1 ) / ( sizeof ( DIGIT_T ) * 8 ) ) + 1; // E_RSA_SetPublicExponent ( ppublicexponent ); // Encrypt 1st part mpmodexp( &presultmessageblock[ 0], &psourcemessageblock[ 0], npublicexponent, ppublickey, nmoddigitsize ); // Encrypt 2ndt part mpmodexp( &presultmessageblock[32], &psourcemessageblock[32], npublicexponent, ppublickey, nmoddigitsize ); } return ( TRUE ); Page 40 of 42

41 APPENDIX F AES Encryption #define NB_128_BIT 4 #define NK_128_BIT 4 #define ROUNDS_128_BIT 10 void E_AESDecryptData128(BYTE* data, BYTE *privatekey) { AESexpandKey(expanded_key, privatekey, NB_128_BIT, NK_128_BIT, ROUNDS_128_BIT); AESdecrypt(&data[ 0], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[ 16], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[ 32], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[ 48], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[ 64], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[ 80], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[ 96], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[112], expanded_key, NB_128_BIT, NK_128_BIT); } void E_AESDecryptData256(BYTE* data, BYTE *privatekey) { AESexpandKey(expanded_key, privatekey, NB_128_BIT, NK_128_BIT, ROUNDS_128_BIT); AESdecrypt(&data[ 0], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[ 16], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[ 32], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[ 48], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[ 64], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[ 80], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[ 96], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[112], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[128], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[144], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[160], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[176], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[192], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[208], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[224], expanded_key, NB_128_BIT, NK_128_BIT); AESdecrypt(&data[240], expanded_key, NB_128_BIT, NK_128_BIT); } Page 41 of 42

42 void E_AESEncryptData128 (BYTE *data, BYTE *privatekey) { AESexpandKey(expanded_key, privatekey, NB_128_BIT, NK_128_BIT, ROUNDS_128_BIT); AESencrypt(&data[ 0], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[ 16], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[ 32], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[ 48], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[ 64], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[ 80], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[ 96], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[112], expanded_key, NB_128_BIT, NK_128_BIT); } void E_AESEncryptData256 (BYTE *data, BYTE *privatekey) { AESexpandKey(expanded_key, privatekey, NB_128_BIT, NK_128_BIT, ROUNDS_128_BIT); AESencrypt(&data[ 0], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[ 16], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[ 32], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[ 48], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[ 64], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[ 80], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[ 96], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[112], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[128], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[144], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[160], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[176], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[192], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[208], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[224], expanded_key, NB_128_BIT, NK_128_BIT); AESencrypt(&data[240], expanded_key, NB_128_BIT, NK_128_BIT); } Page 42 of 42

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Nemo 96HD/HD+ MODBUS

Nemo 96HD/HD+ MODBUS 18/12/12 Pagina 1 di 28 MULTIFUNCTION FIRMWARE 2.30 Nemo 96HD/HD+ MODBUS COMMUNICATION PROTOCOL CONTENTS 1.0 ABSTRACT 2.0 DATA MESSAGE DESCRIPTION 2.1 Parameters description 2.2 Data format 2.3 Description

More information

Improved Digital Media Delivery with Telestream HyperLaunch

Improved Digital Media Delivery with Telestream HyperLaunch WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news

More information

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All

More information

Network Security Part II: Standards

Network Security Part II: Standards Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Communicating with a Barco projector over network. Technical note

Communicating with a Barco projector over network. Technical note Communicating with a Barco projector over network Technical note MED20080612/00 12/06/2008 Barco nv Media & Entertainment Division Noordlaan 5, B-8520 Kuurne Phone: +32 56.36.89.70 Fax: +32 56.36.883.86

More information

IPRS-7 IP/GPRS PC Receiver Software Quick Start V1.2

IPRS-7 IP/GPRS PC Receiver Software Quick Start V1.2 IPRS-7 IP/GPRS PC Receiver Software Quick Start V1.2 Overview Introduction Before You Begin Installation The IPRS-7 Main Page Configuring the IPRS-7 (IPRS-7 splash screen pictured) Introduction The IPRS-7

More information

Conettix D6600/D6100. Computer Interface Manual. Receiver/Gateway

Conettix D6600/D6100. Computer Interface Manual. Receiver/Gateway Conettix D6600/D6100 EN Computer Interface Manual Receiver/Gateway Conettix D6600/D6100 Computer Interface Manual Trademarks Trademarks Microsoft, Windows, Windows NT are either registered trademarks or

More information

Single channel data transceiver module WIZ2-434

Single channel data transceiver module WIZ2-434 Single channel data transceiver module WIZ2-434 Available models: WIZ2-434-RS: data input by RS232 (±12V) logic, 9-15V supply WIZ2-434-RSB: same as above, but in a plastic shell. The WIZ2-434-x modules

More information

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This

More information

Application Note: AN00121 Using XMOS TCP/IP Library for UDP-based Networking

Application Note: AN00121 Using XMOS TCP/IP Library for UDP-based Networking Application Note: AN00121 Using XMOS TCP/IP Library for UDP-based Networking This application note demonstrates the use of XMOS TCP/IP stack on an XMOS multicore micro controller to communicate on an ethernet-based

More information

Appendix B RCS11 Remote Communications

Appendix B RCS11 Remote Communications Appendix B RCS11 Remote Communications B.1 Host Computer Remote Communications Control and status messages are conveyed between the RCS11 and the host computer using packetized message blocks in accordance

More information

Technical Support Bulletin Nr.18 Modbus Tips

Technical Support Bulletin Nr.18 Modbus Tips Technical Support Bulletin Nr.18 Modbus Tips Contents! Definitions! Implemented commands! Examples of commands or frames! Calculating the logical area! Reading a signed variable! Example of commands supported

More information

WA Manager Alarming System Management Software Windows 98, NT, XP, 2000 User Guide

WA Manager Alarming System Management Software Windows 98, NT, XP, 2000 User Guide WA Manager Alarming System Management Software Windows 98, NT, XP, 2000 User Guide Version 2.1, 4/2010 Disclaimer While every effort has been made to ensure that the information in this guide is accurate

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

WIZnet S2E (Serial-to-Ethernet) Device s Configuration Tool Programming Guide

WIZnet S2E (Serial-to-Ethernet) Device s Configuration Tool Programming Guide WIZnet S2E (Serial-to-Ethernet) Device s Configuration Tool Programming Guide Rev 0.2 This document describes how to make your own Configuration Tool for WIZ100SR, WIZ105SR and WIZ110SR of WIZnet. And

More information

Nokia E61i Configuring connection settings

Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or

More information

his document discusses implementation of dynamic mobile network routing (DMNR) in the EN-4000.

his document discusses implementation of dynamic mobile network routing (DMNR) in the EN-4000. EN-4000 Reference Manual Document 10 DMNR in the EN-4000 T his document discusses implementation of dynamic mobile network routing (DMNR) in the EN-4000. Encore Networks EN-4000 complies with all Verizon

More information

PROPERTY MANAGEMENT SYSTEM

PROPERTY MANAGEMENT SYSTEM PROPERTY MANAGEMENT SYSTEM COMMUNICATION INTERFACE SPECIFICATION NEC America, Inc. NDA-305-00 Revision.0 June, 998 Stock # 24727 LIABILITY DISCLAIMER NEC America reserves the right to change the specifications,

More information

VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0

VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0 VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0 1. Installation Requirements 1.1. PC Pentium III processor or higher. Minimum RAM memory: 128 Mbytes Operating system: Windows XP

More information

Funkwerk UTM Release Notes (english)

Funkwerk UTM Release Notes (english) Funkwerk UTM Release Notes (english) General Hints Please create a backup of your UTM system's configuration (Maintenance > Configuration > Manual Backup) before you start to install the software update.

More information

Develop a Dallas 1-Wire Master Using the Z8F1680 Series of MCUs

Develop a Dallas 1-Wire Master Using the Z8F1680 Series of MCUs Develop a Dallas 1-Wire Master Using the Z8F1680 Series of MCUs AN033101-0412 Abstract This describes how to interface the Dallas 1-Wire bus with Zilog s Z8F1680 Series of MCUs as master devices. The Z8F0880,

More information

First Semester Examinations 2011/12 INTERNET PRINCIPLES

First Semester Examinations 2011/12 INTERNET PRINCIPLES PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

More information

Implementing and testing tftp

Implementing and testing tftp CSE123 Spring 2013 Term Project Implementing and testing tftp Project Description Checkpoint: May 10, 2013 Due: May 29, 2013 For this project you will program a client/server network application in C on

More information

SMTP-32 Library. Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows. Version 5.2

SMTP-32 Library. Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows. Version 5.2 SMTP-32 Library Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows Version 5.2 Copyright 1994-2003 by Distinct Corporation All rights reserved Table of Contents 1 Overview... 5 1.1

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

Local Interconnect Network Training. Local Interconnect Network Training. Overview

Local Interconnect Network Training. Local Interconnect Network Training. Overview Overview Local Interconnect Network Training History and introduction Technical features The ISO/OSI reference model and LIN Frames Message Frames Communication concept of LIN Command Frames and Extended

More information

Device Management API for Windows* and Linux* Operating Systems

Device Management API for Windows* and Linux* Operating Systems Device Management API for Windows* and Linux* Operating Systems Library Reference September 2004 05-2222-002 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

Serial Communications / Protocol in AirTest Products

Serial Communications / Protocol in AirTest Products Serial Communications / Protocol in AirTest Products General The standard sensor has two different ways of serial communication with sensor s peripherals and the outside world. One is through the UART

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

Table of Contents. Cisco Cisco VPN Client FAQ

Table of Contents. Cisco Cisco VPN Client FAQ Table of Contents Cisco VPN Client FAQ...1 Questions...1 Introduction...2 Q. Why does the VPN Client disconnect after 30 minutes? Can I extend this time period?...2 Q. I upgraded to Mac OS X 10.3 (known

More information

Send Email TLM. Table of contents

Send Email TLM. Table of contents Table of contents 1 Overview... 3 1.1 Overview...3 1.1.1 Introduction...3 1.1.2 Definitions... 3 1.1.3 Concepts... 3 1.1.4 Features...4 1.1.5 Requirements... 4 2 Warranty... 5 2.1 Terms of Use... 5 3 Configuration...6

More information

Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr

Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc cadmium@x9c.fr Released under the LGPL version 3 February 6, 2010 Abstract: This

More information

Application Note. Introduction AN2471/D 3/2003. PC Master Software Communication Protocol Specification

Application Note. Introduction AN2471/D 3/2003. PC Master Software Communication Protocol Specification Application Note 3/2003 PC Master Software Communication Protocol Specification By Pavel Kania and Michal Hanak S 3 L Applications Engineerings MCSL Roznov pod Radhostem Introduction The purpose of this

More information

Traffic monitoring with sflow and ProCurve Manager Plus

Traffic monitoring with sflow and ProCurve Manager Plus An HP ProCurve Networking Application Note Traffic monitoring with sflow and ProCurve Manager Plus Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. About the sflow protocol...

More information

Signalling Control System Serial Train Information Interface

Signalling Control System Serial Train Information Interface Specification Signalling Control System Serial Train Information Interface Issued Date: 04 April 2014 Important Warning This document is one of a set of standards developed solely and specifically for

More information

Virtual Integrated Design Getting started with RS232 Hex Com Tool v6.0

Virtual Integrated Design Getting started with RS232 Hex Com Tool v6.0 Virtual Integrated Design Getting started with RS232 Hex Com Tool v6.0 Copyright, 1999-2007 Virtual Integrated Design, All rights reserved. 1 Contents: 1. The Main Window. 2. The Port Setup Window. 3.

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

RS-485 Protocol Manual

RS-485 Protocol Manual RS-485 Protocol Manual Revision: 1.0 January 11, 2000 RS-485 Protocol Guidelines and Description Page i Table of Contents 1.0 COMMUNICATIONS BUS OVERVIEW... 1 2.0 DESIGN GUIDELINES... 1 2.1 Hardware Design

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Getting Started Guide

Getting Started Guide Snap-Link Mobile allows you to monitor and control lights, security, audio, temperatures and webcams on handheld mobile devices, such as Smartphones, PDAs or other devices running Windows Mobile operating

More information

73M1866B/73M1966B FXOCTL Application User Guide November 2, 2009 Rev. 4.1 UG_1x66B_009

73M1866B/73M1966B FXOCTL Application User Guide November 2, 2009 Rev. 4.1 UG_1x66B_009 Simplifying System Integration TM 73M1866B/73M1966B FXOCTL Application User Guide November 2, 2009 Rev. 4.1 73M1866B/73M1966B FXOCTL Application User Guide 2009 Teridian Semiconductor Corporation. All

More information

Modbus Communications for PanelView Terminals

Modbus Communications for PanelView Terminals User Guide Modbus Communications for PanelView Terminals Introduction This document describes how to connect and configure communications for the Modbus versions of the PanelView terminals. This document

More information

IP Office Release 7.0 IP Office Embedded Voicemail User Guide

IP Office Release 7.0 IP Office Embedded Voicemail User Guide IP Office Embedded Voicemail User Guide 15-604067 Issue 09a - (21 February 2011) 2011 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document

More information

MBP_MSTR: Modbus Plus Master 12

MBP_MSTR: Modbus Plus Master 12 Unity Pro MBP_MSTR 33002527 07/2011 MBP_MSTR: Modbus Plus Master 12 Introduction This chapter describes the MBP_MSTR block. What s in this Chapter? This chapter contains the following topics: Topic Page

More information

PC Base Adapter Daughter Card UART GPIO. Figure 1. ToolStick Development Platform Block Diagram

PC Base Adapter Daughter Card UART GPIO. Figure 1. ToolStick Development Platform Block Diagram TOOLSTICK VIRTUAL TOOLS USER S GUIDE RELEVANT DEVICES 1. Introduction The ToolStick development platform consists of a ToolStick Base Adapter and a ToolStick Daughter card. The ToolStick Virtual Tools

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

SDN Adaptive Load Balancing. Feature Description

SDN Adaptive Load Balancing. Feature Description SDN Adaptive Load Balancing Feature Description VERSION: 4.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

IPsec Details 1 / 43. IPsec Details

IPsec Details 1 / 43. IPsec Details Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS

More information

Chapter 4 Virtual Private Networking

Chapter 4 Virtual Private Networking Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between

More information

NESS-APX. Training Manual

NESS-APX. Training Manual NESS-APX IP Reporting Module Training Manual NESS-APX IP Monitoring Module Training Manual Rev1 N55 Product Part No. 106-201 Document Part No. 890-433 Innovative Electronic Solutions www.ness.com.au NSW

More information

PRODUCT MANUAL SKX OPEN SKX ADVANCE ZN1RX-SKXOPEN. Edition 2 Version 1.1

PRODUCT MANUAL SKX OPEN SKX ADVANCE ZN1RX-SKXOPEN. Edition 2 Version 1.1 PRODUCT MANUAL SKX OPEN SKX ADVANCE ZN1RX-SKXOPEN Edition 2 Version 1.1 INDEX 1. Introduction... 3 1.1. SKX Interface... 3 1.2. SKX Installation... 5 1.3. SKX Advance: Application Program... 5 1.3.1. SKX

More information

Intel EP80579 Software for Security Applications on Intel QuickAssist Technology Cryptographic API Reference

Intel EP80579 Software for Security Applications on Intel QuickAssist Technology Cryptographic API Reference Intel EP80579 Software for Security Applications on Intel QuickAssist Technology Cryptographic API Reference Automatically generated from sources, May 19, 2009. Reference Number: 320184, Revision -003

More information

Application Note AN0008. Data Logging Extension. For. Venus 8 GPS Receiver

Application Note AN0008. Data Logging Extension. For. Venus 8 GPS Receiver Application Note AN0008 Data Logging Extension For Venus 8 GPS Receiver Ver 1.4.17 July 25, 2014 Introduction The data logging option for the SkyTraq GPS receiver firmware allows storage of position, velocity,

More information

Cisco TelePresence VCR MSE 8220

Cisco TelePresence VCR MSE 8220 Cisco TelePresence VCR MSE 8220 Getting started 61-0008-05 Contents General information... 3 About the Cisco TelePresence VCR MSE 8220... 3 Port and LED location... 3 LED behavior... 4 Installing the VCR

More information

Crow Limited Warranty. Print Version 017

Crow Limited Warranty. Print Version 017 Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose

More information

Terminal Server Configuration and Reference Errata

Terminal Server Configuration and Reference Errata Doc. No. 78-0944-06A0 June 14, 1993 Terminal Server Configuration and Reference Errata This document supplies corrections and additional informaiton for the 9.0 version of the Cisco publication Terminal

More information

WS_FTP Professional 12. Security Guide

WS_FTP Professional 12. Security Guide WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...

More information

Configuring connection settings

Configuring connection settings Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90

More information

KeyStone Architecture Security Accelerator (SA) User Guide

KeyStone Architecture Security Accelerator (SA) User Guide KeyStone Architecture Security Accelerator (SA) User Guide Literature Number: SPRUGY6B January 2013 Release History www.ti.com Release Date Description/Comments SPRUGY6B January 2013 Added addition engine

More information

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Application Note Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Version 1.0 January 2008 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089

More information

BIT COMMANDER. Serial RS232 / RS485 to Ethernet Converter

BIT COMMANDER. Serial RS232 / RS485 to Ethernet Converter BIT COMMANDER Serial RS232 / RS485 to Ethernet Converter (Part US2000A) Copyrights U.S. Converters 1 Contents Overview and Features... 3 Functions..5 TCP Server Mode... 5 Httpd Client Mode.5 TCP Auto mode....6

More information

SUDT AccessPort TM Advanced Terminal / Monitor / Debugger Version 1.37 User Manual

SUDT AccessPort TM Advanced Terminal / Monitor / Debugger Version 1.37 User Manual SUDT AccessPort TM Advanced Terminal / Monitor / Debugger Version 1.37 User Manual Version 1.0 - January 20, 2015 CHANGE HISTORY Version Date Description of Changes 1.0 January 20, 2015 Initial Publication

More information

SPA-Bus Communication Protocol V2.5. Technical description

SPA-Bus Communication Protocol V2.5. Technical description EN Issued 96-01-23 Modified 2001.07.31 Version C Checked MP Approved TK SPA-bus Communication Protocol V2.5 Data subject to change without notice Contents 1.0 Introduction... 4 2.0 General description...

More information

flarq flarqhelp-main The main screen dialog for flarq is: Windows image - identical in Linux

flarq flarqhelp-main The main screen dialog for flarq is: Windows image - identical in Linux help-main fast light automatic repeat request is a file transfer application that is based on the ARQ specification developed by Paul Schmidt, K9PS. It is capable of transmitting and receiving frames of

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

BLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE

BLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE BLUETOOTH SERIAL PORT PROFILE iwrap APPLICATION NOTE Thursday, 19 April 2012 Version 1.2 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for

More information

IP Office Technical Tip

IP Office Technical Tip IP Office Technical Tip Tip no: 195 Release Date: October 26, 2007 Region: GLOBAL Using Packet Capture Software To Verify IP Network VoIP Quality Of Service (QoS) Operation Converged networks can experience

More information

Process Control and Automation using Modbus Protocol

Process Control and Automation using Modbus Protocol Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

EE122 Project 2B: P2P tiny World of Warcraft. Instructor: Prof. Ion Stoica (istoica@eecs.berkeley.edu)

EE122 Project 2B: P2P tiny World of Warcraft. Instructor: Prof. Ion Stoica (istoica@eecs.berkeley.edu) EE122 Project 2B: P2P tiny World of Warcraft Instructor: Prof. Ion Stoica (istoica@eecs.berkeley.edu) TAs: Junda Liu (liujd@eecs.berkeley.edu) DK Moon (dkmoon@eecs.berkeley.edu) David Zats(dzats@eecs.berkeley.edu)

More information

Netop Remote Control Security Server

Netop Remote Control Security Server A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days

More information

Internet/Intranet Alarm Communications. Maximize security and convenience with Internet/Intranet alarm communications

Internet/Intranet Alarm Communications. Maximize security and convenience with Internet/Intranet alarm communications Internet/Intranet Alarm Communications Maximize security and convenience with Internet/Intranet alarm communications Features and Benefits Receipt of all transmitted data packets, whether initiated from

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing

More information

Troubleshooting Second B channel Call Failures on ISDN B

Troubleshooting Second B channel Call Failures on ISDN B Troubleshooting Second B channel Call Failures on ISDN B Table of Contents Troubleshooting Second B channel Call Failures on ISDN BRI Links..1 Introduction.1 Prerequisites..1 Prior Steps..1 Hardware and

More information

Modbus and ION Technology

Modbus and ION Technology 70072-0104-14 TECHNICAL 06/2009 Modbus and ION Technology Modicon Modbus is a communications protocol widely used in process control industries such as manufacturing. PowerLogic ION meters are compatible

More information

Serial Communications

Serial Communications Serial Communications 1 Serial Communication Introduction Serial communication buses Asynchronous and synchronous communication UART block diagram UART clock requirements Programming the UARTs Operation

More information

IP Office Platform. Avaya IP Office Platform Embedded Voicemail User Guide (IP Office Mode) 15-604067 Issue 15b - (22 January 2015)

IP Office Platform. Avaya IP Office Platform Embedded Voicemail User Guide (IP Office Mode) 15-604067 Issue 15b - (22 January 2015) Avaya Embedded Voicemail User Guide (IP Office Mode) 15-604067 Issue 15b - (22 January 2015) 2015 AVAYA All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Data sheet Wireless UART firmware version 4.02

Data sheet Wireless UART firmware version 4.02 Data sheet Wireless UART firmware version 4.02 BLUETOOTH is a trademark owned by Bluetooth SIG, Inc., U.S.A. and licensed to Free2move Rev: 22 December 2008 Table of contents 1 GENERAL INFORMATION...4

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

Dolphin In-Circuit programming Updating Firmware in the field

Dolphin In-Circuit programming Updating Firmware in the field Dolphin In-Circuit programming Updating Firmware in the field 1 Introduction In systems e.g. gateways, where an external microcontroller is connected to a Dolphin based product like a TCM300 it might be

More information

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6 (Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

Inwall 4 Input / 4 Output Module

Inwall 4 Input / 4 Output Module Inwall 4 Input / 4 Output Module IO44C02KNX Product Handbook Product: Inwall 4 Input / 4 Output Module Order Code: IO44C02KNX 1/27 INDEX 1. General Introduction... 3 2. Technical data... 3 2.1 Wiring Diagram...

More information

Chapter 2: Remote Procedure Call (RPC)

Chapter 2: Remote Procedure Call (RPC) Chapter 2: Remote Procedure Call (RPC) Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ Contents - Chapter 2 - RPC

More information

EMC DATA DOMAIN ENCRYPTION A Detailed Review

EMC DATA DOMAIN ENCRYPTION A Detailed Review White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to

More information

The Answer to the 14 Most Frequently Asked Modbus Questions

The Answer to the 14 Most Frequently Asked Modbus Questions Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in

More information

Keil C51 Cross Compiler

Keil C51 Cross Compiler Keil C51 Cross Compiler ANSI C Compiler Generates fast compact code for the 8051 and it s derivatives Advantages of C over Assembler Do not need to know the microcontroller instruction set Register allocation

More information

BrightStor ARCserve Backup for Windows

BrightStor ARCserve Backup for Windows BrightStor ARCserve Backup for Windows Tape RAID Option Guide r11.5 D01183-1E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's

More information

CONCEPT1 RS232 COMMUNICATION

CONCEPT1 RS232 COMMUNICATION Concept 1 RS-232 Communication Communication with Concept 1 via RS-232 is done with simple ASCII Commands and Replies. The port settings are 19200Baud, 8bits, no parity and 1 stop bit. The physical connection

More information