Solved

EMS format explanation needed

Posted on 2002-03-10
13
952 Views
Last Modified: 2009-12-16
Hello!

I do need the explanation of EMS format messages, i.e. PICTURE, ANIMATION, FORM, etc...

I have various documentation, but there's no byte-by-byte (octet-by-octet) explanation of the headers, user data, etc.

Without this information and basing only on overall information, i surely can't program the format :)

Thanks in advance,
Dmitry.
0
Comment
Question by:wizzard
  • 7
  • 6
13 Comments
 
LVL 4

Accepted Solution

by:
svindler earned 300 total points
ID: 6859957
0
 

Author Comment

by:wizzard
ID: 6860075
actually, i was seeking for the examples on coding the graphics, inserting it to the object, etc, for i of course have the specificatios from 3gpp and other sources and figured out most of the thingies.
0
 
LVL 4

Expert Comment

by:svindler
ID: 6860080
The format of the bitmaps are defined in Annex E
0
 

Author Comment

by:wizzard
ID: 6860103
It's written in any specification, that's clear.

but regarding defining the Extended Object itself... there should be position or something... or can I send the logo or picture just glueing it to the HEADER? header, then UDH then UD - just my coded picture? That's how it works for logos and plain pictures, without text? Am I correct?

Finalize this and you'll get the points ;)
0
 
LVL 4

Expert Comment

by:svindler
ID: 6860124
It's explained in 9.2.3.24.10.1. You have to specify the type, position and length of each object. If that's what you mean by gluing then you are correct.
You probably want to read all of 9.2.3.24, and skim through the rest of the document.
I am very vague on details as I haven't written any programs for this myself. I just RTFM ;-)
0
 

Author Comment

by:wizzard
ID: 6860580
hmm, last question - is EMS operator-independant? meaning does the operator have to support EMS in order to just simply pass ems messages to the recepients supporting it?
0
Free camera licenses with purchase of My Cloud NAS

Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

 
LVL 4

Expert Comment

by:svindler
ID: 6860608
The SMSC probably does some parameter checking in the messages and provide for a way to allow only certain types of messages/objects through. Allowing new types through could require reconfiguration or upgrade of the SMSC.
I would expect (suspect) some operators to use this to charge more for EMS, or to block new types.
0
 

Author Comment

by:wizzard
ID: 6863798
hmm, there are no information how to send SIEMENS or any other LOGO... gmmmm......
0
 
LVL 4

Expert Comment

by:svindler
ID: 6863833
For logo programming you would have to contact each phone manufaturer, like Nokia, Siemens, Ericcson etc as the logos are in proprietary format as far as I know.
0
 

Author Comment

by:wizzard
ID: 6863851
Ahaa... hmmm... for nokia is using it's personal SmartMessaging and that I cracked long ago... they have special PORTS for that... it's being pointed in the IEDL. but for EMS - nothing like that can be found, sadly...

* If you will ever develop something based on 3gpp docs, i'm warning you that they've got lotsa bugs i discovered and "repaired"...

I'll grant you with the points now... But please, if you'll find anything regarding LOGO ports or etc for siemens, ericsson, etc EMS phones... tell me :)

And i will make a new question and you'll get more points ;)
0
 
LVL 4

Expert Comment

by:svindler
ID: 6864090
I found some references to source code to manage Siemens phones. You'll have to check the quality and usability yourself.
0
 

Author Comment

by:wizzard
ID: 6864149
ohh, will you send that to me or want me to create another question? :)
0
 

Author Comment

by:wizzard
ID: 6910692
svindler, where are you? I *AM* interested in the sources.... :-\
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Multi-source agreements are important because they set standards that all manufacturers should follow to ensure that devices are compatible with multiple vendors. The multi-source agreement (MSA) is an agreement that establishes how multiple vendors…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now