DMRlink/rcm.py

131 lines
4.8 KiB
Python
Raw Normal View History

#!/usr/bin/env python
#
2013-11-24 23:01:30 -05:00
# This work is licensed under the Creative Commons Attribution-ShareAlike
# 3.0 Unported License.To view a copy of this license, visit
# http://creativecommons.org/licenses/by-sa/3.0/ or send a letter to
# Creative Commons, 444 Castro Street, Suite 900, Mountain View,
# California, 94041, USA.
# This is a sample application that uses the Repeater Call Monitor packets to display events in the IPSC
# NOTE: dmrlink.py MUST BE CONFIGURED TO CONNECT AS A "REPEATER CALL MONITOR" PEER!!!
# ALSO NOTE, I'M NOT DONE MAKING THIS WORK, SO UNTIL THIS MESSAGE IS GONE, DON'T EXPECT GREAT THINGS.
from __future__ import print_function
from twisted.internet.protocol import DatagramProtocol
from twisted.internet import reactor
from twisted.internet import task
from binascii import b2a_hex as h
import time
2014-05-18 16:23:19 -04:00
import datetime
2013-11-24 23:01:30 -05:00
import binascii
import dmrlink
from dmrlink import IPSC, NETWORK, networks, get_info, int_id, subscriber_ids, peer_ids, talkgroup_ids, logger
2013-11-24 23:01:30 -05:00
__author__ = 'Cortney T. Buffington, N0MJS'
2014-04-28 23:07:34 -04:00
__copyright__ = 'Copyright (c) 2013, 2014 Cortney T. Buffington, N0MJS and the K0USY Group'
__credits__ = 'Adam Fast, KC0YLK, Dave K, and he who wishes not to be named'
__license__ = 'Creative Commons Attribution-ShareAlike 3.0 Unported'
__version__ = '0.2a'
__maintainer__ = 'Cort Buffington, N0MJS'
__email__ = 'n0mjs@me.com'
__status__ = 'Production'
try:
from ipsc.ipsc_message_types import *
except ImportError:
sys.exit('IPSC message types file not found or invalid')
2013-11-24 23:01:30 -05:00
class rcmIPSC(IPSC):
def __init__(self, *args, **kwargs):
IPSC.__init__(self, *args, **kwargs)
#************************************************
# CALLBACK FUNCTIONS FOR USER PACKET TYPES
#************************************************
#
2013-11-24 23:01:30 -05:00
def call_mon_origin(self, _network, _data):
2014-05-18 16:23:19 -04:00
_source = _data[1:5]
2013-11-26 17:05:21 -05:00
_ipsc_src = _data[5:9]
2014-05-18 16:23:19 -04:00
_seq_num = _data[9:13]
_ts = _data[13]
_status = _data[15] # suspect [14:16] but nothing in leading byte?
_rf_src = _data[16:19]
_rf_tgt = _data[19:22]
_type = _data[22]
_prio = _data[23]
_sec = _data[24]
2013-11-26 17:05:21 -05:00
2014-05-18 16:23:19 -04:00
_source = get_info(int_id(_source), peer_ids)
2013-12-01 21:59:53 -05:00
_ipsc_src = get_info(int_id(_ipsc_src), peer_ids)
2013-11-26 17:05:21 -05:00
_rf_src = get_info(int_id(_rf_src), subscriber_ids)
2013-12-01 21:59:53 -05:00
if _type == '\x4F' or '\x51':
2013-11-26 17:05:21 -05:00
_rf_tgt = get_info(int_id(_rf_tgt), talkgroup_ids)
else:
_rf_tgt = get_info(int_id(_rf_tgt), subscriber_ids)
2014-05-18 16:24:24 -04:00
print('Call Monitor - Traffic Origin')
2014-05-18 16:23:19 -04:00
print('TIME: ', datetime.datetime.now())
print('DATA SOURCE: ', _source)
2013-11-26 17:05:21 -05:00
print('IPSC: ', _network)
2013-12-01 21:59:53 -05:00
print('IPSC Source: ', _ipsc_src)
2013-11-26 17:05:21 -05:00
print('Timeslot: ', TS[_ts])
2014-05-18 16:23:19 -04:00
try:
print('Status: ', STATUS[_status])
except KeyError:
print('Status (unknown): ', h(status))
try:
print('Type: ', TYPE[_type])
except KeyError:
print('Type (unknown): ', h(_type))
2013-11-26 17:05:21 -05:00
print('Source Sub: ', _rf_src)
print('Target Sub: ', _rf_tgt)
print()
2014-05-18 16:23:19 -04:00
def call_mon_rpt(self, _network, _data):
_source = _data[1:5]
_state = _data[6]
_source = get_info(int_id(_source), peer_ids)
print('Call Monitor - Repeater State')
print('TIME: ', datetime.datetime.now())
print('DATA SOURCE: ', _source)
try:
print('Repeat State: ', REPEAT[_state])
except KeyError:
print('RPT State (unknown): ', h(_state))
print()
def call_mon_nack(self, _network, _data):
_source = _data[1:5]
_nack = _data[5]
2013-12-01 21:59:53 -05:00
2014-05-18 16:23:19 -04:00
_source = get_info(int_id(_source), peer_ids)
print(' Call Monitor - Transmission NACK')
print('TIME: ', datetime.datetime.now())
print('DATA SOURCE: ', _source)
try:
print('NACK Cause: ', REPEAT[_nack])
except KeyError:
print('NACK Cause (unknown): ', h(_nack))
print()
2013-12-01 21:59:53 -05:00
def repeater_wake_up(self, _network, _data):
_source = _data[1:5]
_source_dec = int_id(_source)
_source_name = get_info(_source_dec, peer_ids)
2014-05-18 16:23:19 -04:00
#print('({}) Repeater Wake-Up Packet Received: {} ({})' .format(_network, _source_name, _source_dec))
2013-11-24 23:01:30 -05:00
2013-11-24 23:01:30 -05:00
if __name__ == '__main__':
logger.info('DMRlink \'rcm.py\' (c) 2013, 2014 N0MJS & the K0USY Group - SYSTEM STARTING...')
2013-11-24 23:01:30 -05:00
for ipsc_network in NETWORK:
if NETWORK[ipsc_network]['LOCAL']['ENABLED']:
networks[ipsc_network] = rcmIPSC(ipsc_network)
2013-11-24 23:01:30 -05:00
reactor.listenUDP(NETWORK[ipsc_network]['LOCAL']['PORT'], networks[ipsc_network])
reactor.run()