Solved

USB Device programming

Posted on 2004-09-21
4
729 Views
Last Modified: 2010-04-21
I need to make an application(running on LINUX) that is intended to work for USB cameras. The application needs to control the camera activities and must be able to set the various configurable options and features.
Acc. to what I read about USB device drivers etc. I got to know that the USB file system is automatically mounted to /proc/bus/usb
The questiion that I have is - How to access and control the USB device (camera) ?? If the driver's API is not available ...is it still possible??
Also can someone give some pointers to some sources where some programming samples are given to program any type of USB device!!

-Aayush
(P.S: I am specifically told not to use apps like GPhoto and similar)
0
Comment
Question by:aayushpuri
4 Comments
 

Expert Comment

by:stefanoc
ID: 12116995
I think that a good starting point could be libusb (http://libusb.sourceforge.net/). It is library that defines an API to access USB device directly from use space. Unfortunately current version doesn't work with ISOCHRONOUS trasfers that are the most used in cameras, but you can try with your camera.
0
 
LVL 45

Accepted Solution

by:
sunnycoder earned 150 total points
ID: 12120277
>If the driver's API is not available ...is it still possible??
Yes ... Just that you will have to write the code to control and interface with the device

http://www.lvr.com/usb.htm
http://www.lvr.com/usbcode.htm
0
 
LVL 44

Assisted Solution

by:Karl Heinz Kremer
Karl Heinz Kremer earned 150 total points
ID: 12152265
The Linux Journal had a series of articles about how to program USB devices (and some information about reverse engineering unknown protocols).

http://www.linuxjournal.com/article.php?sid=7353
http://www.linuxjournal.com/article.php?sid=7466
http://www.linuxjournal.com/article.php?sid=7582

And another article that's a bit older:
http://www.linuxjournal.com/article.php?sid=4786
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The purpose of this article is to fix the unknown display problem in Linux Mint operating system. After installing the OS if you see Display monitor is not recognized then we can install "MESA" utilities to fix this problem or we can install additio…
The purpose of this article is to demonstrate how we can upgrade Python from version 2.7.6 to Python 2.7.10 on the Linux Mint operating system. I am using an Oracle Virtual Box where I have installed Linux Mint operating system version 17.2. Once yo…
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now