Knowhow of logging information.(SECS Message data)

Knowhow of logging information.(SECS Message data)
This page details knowhow of logging information.(SECS Message data).


  1. Open the folder set by “SECS Log Directry” of the Setting Window by the Explorer.
    See “Details setting of the output directory etc.”.
  2. Open the SECS logging file that you want to check by Text-Editor or Viewer like Note-Pad.

    [Note]
    You should use Monospaced font(like “MS Gothic”) on Text-Editor like Note-Pad.
    Otherwise,you will not be able to be seen in a correct image.




    In default, extension of SECS logging file is “.txt”.
    The logging file name format is “YYYYMMDD_HHmmSS_MS.txt”(MS:MicroSec.).
    You will only have to select a near file name according to the date that you want to check, and to open.


    Number in Figure Content
    1 Sending and receiving information
    # Recv… : It means reception information.
    # Send… : It means transmission information.
    After the above-mentioned character string, logging file will be written of [Send-IP Addr:Port No -> Receive-IP Addr:Port No].

    ex)
    [ 192.168.1.51:2493 -> 192.168.1.31:5000 ]
    Send IP address: 192.168.1.51
    Send Port number: 2493
    Receive IP address: 192.168.1.31
    Receive Port number: 5000

    2 Binary dump information
    If you check “Output to Binary information” of the Setting Window, this information will be output to loggin file.
    Each information is as follows.
    #  size = 25 (0x19)      <- message byte size
    #  0  1  2  3  4  5  6  7  8  9  A  B  C  D  E  F     0123456789ABCFEF
    #  00 00 81 0d 00 00 00 00 01 38 01 02 41 06 42 47    .. ......8..A.BG 
    #  48 53 4d 53 41                                     HSMSA 
        ^                                                  ^
        |                                                  |
    binary dump of message.                           character dump of message
    

    3 Start position of SECS message information.

    >> (s) : Start position of SECS message information .

    4 Date and Time when SECS Message was logged.
    2007/08/23 17:15:29 : Date and Time when SECS Message was logged.(Date Time)

    5 Size of SECS Message.
    0x00000019 : Size of SECS Message(dump raw data(hex))

    Structure of Packet
    +--------------------------+ 
    | IP  Packet               | 
    +--------------------------+ 
    | TCP Packet               | 
    +--------------------------+ 
    | Size of SECS Message     | 4 byte
    +--------------------------+ 
    | Header of SECS Message   | 10 byte (see 6.)
    +--------------------------+ 
    
    6 Header of SECS Message.
    0000810D0000000003B4 : Header of SECS Message(dump raw data(hex))

    Structure of SECS Message Header
    
     7   6  5  4  3  2  1  0
    +--+--+--+--+--+--+--+--+
    +-----------------------+ 
    | Upper Session ID      | 0
    +-----------------------+ 
    | Lower Session ID      | 1
    +--+--------------------+ 
    |W | Header Byte 2      | 2
    +--+--------------------+ 
    | Header Byte 3         | 3
    +--+--------------------+ 
    |E |      P type        | 4
    +--+--------------------+ 
    |         S type        | 5
    +-----------------------+ 
    | Upper Source ID       | 6
    +-----------------------+ 
    | Lower Source ID       | 7
    +-----------------------+ 
    | Upper Transaction ID  | 8
    +-----------------------+ 
    | Lower Transaction ID  | 9
    +-----------------------+ 
    
    7 Stream and Functio nnumber.
    <SnnFmm W : Stream and Functio nnumber
        W : Reply required ( none: Reply not required )
    – Nn: Stream number zero suppression none(two digit fixed display)
    – Mm: Function number zero suppression none(two digit fixed display)
    – The range bundled to with <> becomes the range of information.
        ex)
         <S01F13 W — >
         “S01F13 W — “:information

    Also, the message only of peculiar header information to HSMS without attribute information (As follows) might be written here.

    Select  .req
    Select  .rsp
    Deselect.req
    Deselect.rsp
    Linktest.req
    Linktest.rsp
    Reject  .req
    Reject  .rsp
    Separate.req
    Separate.rsp
    ????    .??? : illegal message
    								

    8 SECS message attribute information
    <L[2]
        <A[6]    "BGHSMS">
        <A[3]    "1.0">
    >
    								
    attribute key content
    <L[n] > List
    It means it has the attribute list of n piece between < and >.
    <A[n] “m”> Character (Ascii)
    It means it has the attribute character of n length between < and >.
    The character string is bundled by “.
    <I1[1] n> : 1 byte integer
    <I2[2] n> : 2 byte integer
    <I4[4] n> : 4 byte integer
    <I8[8] n> : 8 byte integer
    Integer information with sign
    It means it has the integer attribute with the sign of n value between < and >.
    <U1[1] n> : 1 byte unsigned integer
    <U2[2] n> : 2 byte unsigned integer
    <U4[4] n> : 4 byte unsigned integer
    <U8[8] n> : 8 byte unsigned integer
    Integer information with unsign
    It means it has the unsigned integer attribute of n value between < and >.
    <D4[4] n> : 4 byte float
    <D8[8] n> : 8 byte double
    Floating point
    It means it has the floating point attribute of n value between < and >.
    The floating point is output by the exponent format.
    ex) 2.123E+001
    <BOOLEAN[n] m>
    Boolean
    It means it has the boolean attribute of m value between < and >.
    n; byte size.(hex dump)
    <B[n] m>
    Binary Data
    It means it has the binary data attribute of m value between < and >.
    n; byte size.(hex dump)
    m and n will be dumped raw data by HEX.

    9 End position of SECS message information.

    << (e) : End position of SECS message information .



    < Back |