Need help writing decoder #3473
-
|
I've followed the tutorial as best I can but keep getting hung up when it comes time to mess with the decoder. I don't have any programming experience so thats not helping. I'm trying to decode some 2GIG 345Mhz glass break detectors. The data sheet is here: Pertinent info is I already have my honeywell/2gig 345 door sensors working from protocol 70 in the software. Their data sheet is here: Pertinent info is that it has the same (or very similar) radio parameters and the device file for those known devices inludes: modulation = OOK_PULSE_MANCHESTER_ZEROBIT, With that information and working through the tutorial I came up with This is where I'm stuck. With the above command I get my 64 length readouts and its hexadecimal code. I've made a glassbreak.c file and through many combinations of tutorial and new device template, I've hit a wall. I've attached all of my radio tests that include pressing the tamper button, putting it into test mode and playing a glass break sound to trigger it, all laid out in the data sheet. I think I've captured all of its functions. I'll come back and try again tomorrow but I've been at this all day and I'm going cross-eyed. Any helps or hints are greatly appreciated! |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 12 replies
-
|
Getting reliable codes is pretty good already. Try to put the codes in a BitBench and annotated them. You might spot something or others will help out. |
Beta Was this translation helpful? Give feedback.
-
|
Thanks for the quick reply and the link to bitbench, I hadn't come across that yet. I'm going to type out a wall of text but its mostly to help me organize my thoughts. Please redirect me if I'm way off base but no one needs to read all of this. I have 2 separate glass break detectors so I ran the same tests with them and got the following data: 00016808e5fd3e7f [wakeup with tamper switch open] 000164525bfd9cff [wakeup with tamper switch open] Let me know if I'm on the right track: It seems like the first 5 digits 00016 are always the same and can be ignored, the preamble if I'm understanding things correctly. So that leaves "808e5" and "4525b" as a device ID. The last position is always an "f" so that can be ignored. Maybe that's a battery state? Both devices show "bf" immediately after their device id when the tamper switch is open/not pressed and no other condition exists. I'm tempted to drop the "f" after those except that it isn't present in the same position during the wakeup message. It seems the data I'm really interested in is all in that 11th position. There is obviously lots of other data to be decoded in here but maybe in the meantime I can make a half-assed decoder that just looks at that 11th position and gives me 1 of 4 conditions. If you made it this far, thanks for reading! |
Beta Was this translation helpful? Give feedback.
-
|
Absolutely incredible! I go to bed and wake up to see all of this has been accomplished. I am floored and truly grateful, thanks so much to both of you!! |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.


it should be
-R 70. Notice that the last nibble of the CRC is always0which looks strange but is actually ok, all codes work with a CRC-16 poly 0x8050 init 0.Support added with 14bba0c -- please check all your codes if the flags are as expected. You can test your codes with e.g.
rtl_433 -R 70 -y 00016808e5fd3e7f