Solved

EMS format explanation needed

Posted on 2002-03-10
13
951 Views
Last Modified: 2009-12-16
Hello!

I do need the explanation of EMS format messages, i.e. PICTURE, ANIMATION, FORM, etc...

I have various documentation, but there's no byte-by-byte (octet-by-octet) explanation of the headers, user data, etc.

Without this information and basing only on overall information, i surely can't program the format :)

Thanks in advance,
Dmitry.
0
Comment
Question by:wizzard
  • 7
  • 6
13 Comments
 
LVL 4

Accepted Solution

by:
svindler earned 300 total points
ID: 6859957
0
 

Author Comment

by:wizzard
ID: 6860075
actually, i was seeking for the examples on coding the graphics, inserting it to the object, etc, for i of course have the specificatios from 3gpp and other sources and figured out most of the thingies.
0
 
LVL 4

Expert Comment

by:svindler
ID: 6860080
The format of the bitmaps are defined in Annex E
0
 

Author Comment

by:wizzard
ID: 6860103
It's written in any specification, that's clear.

but regarding defining the Extended Object itself... there should be position or something... or can I send the logo or picture just glueing it to the HEADER? header, then UDH then UD - just my coded picture? That's how it works for logos and plain pictures, without text? Am I correct?

Finalize this and you'll get the points ;)
0
 
LVL 4

Expert Comment

by:svindler
ID: 6860124
It's explained in 9.2.3.24.10.1. You have to specify the type, position and length of each object. If that's what you mean by gluing then you are correct.
You probably want to read all of 9.2.3.24, and skim through the rest of the document.
I am very vague on details as I haven't written any programs for this myself. I just RTFM ;-)
0
 

Author Comment

by:wizzard
ID: 6860580
hmm, last question - is EMS operator-independant? meaning does the operator have to support EMS in order to just simply pass ems messages to the recepients supporting it?
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 4

Expert Comment

by:svindler
ID: 6860608
The SMSC probably does some parameter checking in the messages and provide for a way to allow only certain types of messages/objects through. Allowing new types through could require reconfiguration or upgrade of the SMSC.
I would expect (suspect) some operators to use this to charge more for EMS, or to block new types.
0
 

Author Comment

by:wizzard
ID: 6863798
hmm, there are no information how to send SIEMENS or any other LOGO... gmmmm......
0
 
LVL 4

Expert Comment

by:svindler
ID: 6863833
For logo programming you would have to contact each phone manufaturer, like Nokia, Siemens, Ericcson etc as the logos are in proprietary format as far as I know.
0
 

Author Comment

by:wizzard
ID: 6863851
Ahaa... hmmm... for nokia is using it's personal SmartMessaging and that I cracked long ago... they have special PORTS for that... it's being pointed in the IEDL. but for EMS - nothing like that can be found, sadly...

* If you will ever develop something based on 3gpp docs, i'm warning you that they've got lotsa bugs i discovered and "repaired"...

I'll grant you with the points now... But please, if you'll find anything regarding LOGO ports or etc for siemens, ericsson, etc EMS phones... tell me :)

And i will make a new question and you'll get more points ;)
0
 
LVL 4

Expert Comment

by:svindler
ID: 6864090
I found some references to source code to manage Siemens phones. You'll have to check the quality and usability yourself.
0
 

Author Comment

by:wizzard
ID: 6864149
ohh, will you send that to me or want me to create another question? :)
0
 

Author Comment

by:wizzard
ID: 6910692
svindler, where are you? I *AM* interested in the sources.... :-\
0

Featured Post

Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

Join & Write a Comment

With the purchase of CloudCommand by Comcast customers are left in a bind as subscriptions expire and render the AP's disabled. The following will explain how to flash your Ubiquiti AP's with CloudCommand firmware back to Ubiquiti firmware. HOWTO…
This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now