Link to home
Start Free TrialLog in
Avatar of Bob Schneider
Bob SchneiderFlag for United States of America

asked on

TelNet Capabilities with VB6 Program

I am incorporating a TelNet utility into my vb6 program.  I have never done anything with TelNet.  The utility I am using is this:  http://www.freevbcode.com/ShowCode.asp?ID=2839

I am using it to get data from a timing machine into my timing software in near-real time...constant stream as runners finish.  Here is what i need to know:

1)  Is there a limit to how much a TelNet client can log?  We will often have 15,000 reads to process....occasionally more.

2) Is there a limit to how much "density" a TelNet client can log simultaneously.  We could easily have 50-100 folks finish in a minute and each one of them typically generates 2-4 RFID reads.

3)  What do I do if I need to get data that is in the source file before I start the TelNet client?  In other words, it is not unusual to carry the timing box to a different place for the race start than where we set up for the finish.  We typically carry our timing box to the start, get all the start reads as the race starts, and then carry the timing box back to the finish and re-connect our timing mats.  How would TelNet get me that data?

Thank you very much!
ASKER CERTIFIED SOLUTION
Avatar of David Favor
David Favor
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of Bob Schneider

ASKER

Thanks for the advice.  The start times that I get remotely do not have to be "real time" since we don't need that data until runners finish.  So if I have, for instance, 1000 reads in the timing box from the start and I bring that back to the finish and re-connect, will TelNet pull that data in or does it only pull data as it comes in when connected?

I will look at the security you suggest.  Are you saying my entire system could be compromised using TelNet?  Or just my race data?  If just my race data, what would be the consequences.  It is absolutely nothing of value to anyone else in the world except me and those running the race.  Would this simply be a malicious effort to corrupt my data or is something else at risk?
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Thanks.  What if no security is passed and all that is transmitted is strings of data like this:

aaA2000000018a4100011903232023015779FS
aaA2000000018a4100011903232023015779BS
aaA2000000018a2400011903232023035da9FS
aaA2000000018a2400081903232023050780BS
aaA2000000018a4300011903232023061479FS
aaA2000000018a4200011903232023062378FS
aaA2000000018a4300011903232023061479BS
aaA2000000018a4200011903232023062378BS
aaA4000000018a410009190323202304107bLS
aaA8000000018a0d00011903232023093bdfFS
aaA8000000018a0d00011903232023093bdfBS
aaA4000000018a240010190323202306377fLS
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial