Hacking hermetic home automation system to make it a valid part of IoT...
##Implementation progress:
-
Serial-to-Ethernet Module NE-4110S
- TCP client mode
- Real COM mode
- telnet/ssh restart command
- event trapping and notifications
- trap SNMP receiver
-
communication / system
- packets decoder
- packets encoder
- device registration
- errors and unknown devices handling
-
additional features
- mqtt forwarding
- redis as device state storage
- Digital IO
- moxa telnet/ssh settings
- auth
-
drivers
- NPort TTY driver update for kernel 3.11
##What we know now:
Packet structure
Haddr
SERIAL_ID-DESTINATION-DEVICE_ID
incoming:
<;DEVICE_ID;VALUE;DESTINATION;0;SEQUENCE_NUMBER;PACKET_TYPE;CRC_FLAG;>\r\n
outgoing:
<;DEVICE_ID;VALUE;0;DESTINATION;SEQUENCE_NUMBER;PACKET_TYPE;CRC_FLAG;>\r\n
- DEVICE_ID & DESTINATION - translated as
{DEVICE_ID}-{DESTINATION}
string and forwarded to serial gateway - PACKET_TYPE - can be a (answer) or s (set)
- SEQUENCE_NUMBER - taken from answer packets and incremented by 1, max 1024
- CRC_FLAG - crc81wire based on all values joined together
Known serial numbers
002J6, 002JE, 002H9, 002H3, 002JH, 002Ie
##Devices ###Serial-to-Ethernet Module NE-4110S
NPort Fixed TTY Driver for Unix
http://www.moxa.com/support/download.aspx?type=support&id=880
NPort Even More Fixed TTY Driver for Unix (my fixes for kernel 3.11)
https://github.com/Baael/node-red-moxa/tree/master/tty_driver
Additional links: