[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

EVI-D31,  VISCA protocol

Posted on 1998-12-01
3
Medium Priority
?
2,404 Views
Last Modified: 2013-11-21
I have a Sony EVI-D31 camera. I want to control the movement of this camera with an application written in Visual Basic 5.
I have the command list for controlling the cam, but I don't know the VISCA protocol.
How do I initialize the communication?
It is neccesary to send any string before or after the command?

Thanks in advance for your colaboration,

Best regards

Sergio Preciado
TECISA'74
0
Comment
Question by:tecisa74
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 

Author Comment

by:tecisa74
ID: 1013324
Adjusted points to 200
0
 
LVL 3

Accepted Solution

by:
mitrakis earned 400 total points
ID: 1013325
Hi,

the VISCA protocol was developed by SONY.
The most important thing to know is that each command is answered with an acknowledge (ACK) and after its completion the controller sends completion message (or error message).
In case you send an inquiry, an ACK is sent by the camera controller and after completion an inquiry message (or error message) is sent !

The command list you have IS the VISCA protocol =;-))
To start communication via COM-Port, just use a simple terminal program like "tera term pro".

(I just have the list for a EVI-G21 here, but this works also !)

Example:
- cam is connected to COM1
- switch cam on (let pan/tilt initialize until ready)
- from the terminal sent the following strings exactly as I post it here, to initialize camera

88 30 01 FF (sets the address of camera. If only 1 cam connected, address is 1)
88 01 00 01 FF (resets the command buffer of the EVI-D31

then, you can send almost every command or inquiry you want.

Another simple example, let us move the camera to the maximum left down position, with high speed:

81 01 06 02 7F 7F 0C 03 02 06 0E 01 09 03 FF

The contoller receives the command and immediately sends ACKNOWLEDGE or better:
90 41 FF (or 90 42 FF) it depends which command buffer has received the command

after completing the movement, the controller send completion:
90 51 FF (or 90 52 FF) see above for further info

if an error occured, you'll get:
90 60 xx FF where xx is an described error code.

I've already developed a remote control for exactly this camera =;-)
In addition to this, I wrote an applet to control it via internet.

If you wanna have a look on it, please visit:
http://bvlab12.fh-reutlingen.de

If you want further details, please contact me via email:
mitrakis@bvlab.fh-reutlingen.de

Best regards
-Stavi-
0
 

Expert Comment

by:qlong
ID: 5449401
mitrakis ,can you tell me the list of the codes of EVI-D31 and connection level  between computer serial port and EVI-D31,example 1 to 1 or 1 to 6 .Now I want to write a programme with C++Builder to control the camera.Thank you!

0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Issue: One Windows 2008 R2 64bit server on the network unable to connect to a buffalo Device (Linkstation) with firmware version 1.56. There are a total of four servers on the network this being one of them. Troubleshooting Steps: Connect via h…
Know what services you can and cannot, should and should not combine on your server.
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question