Difference between revisions of "Project:Java-Rako"

From London Hackspace Wiki
Jump to navigation Jump to search
Line 11: Line 11:
 
==Proposed method==
 
==Proposed method==
 
# Construct a minimal Rako system with one channel and an Ethernet bridge '''[Complete]'''
 
# Construct a minimal Rako system with one channel and an Ethernet bridge '''[Complete]'''
 +
# Contact Rako to see if they have an API available '''[In progress]'''
 
# Obtain connectivity between the bridge and the iPhone app and/or RakoSoft on a network that allows snooping '''[In progress]'''
 
# Obtain connectivity between the bridge and the iPhone app and/or RakoSoft on a network that allows snooping '''[In progress]'''
 
# Monitor traffic between iPhone app/RakoSoft/Bridge Web UI to determine a suitable candidate for reverse engineering
 
# Monitor traffic between iPhone app/RakoSoft/Bridge Web UI to determine a suitable candidate for reverse engineering
 
# Reverse enginner protocol
 
# Reverse enginner protocol
 
# Implement the protocol with Java :-)
 
# Implement the protocol with Java :-)
 +
 
==Notes==
 
==Notes==
 
I have had a little snoop on the RakoSoft traffic with [http://www.wireshark.org/ WireShark] and it appears to use non-trivial protocol - darn...
 
I have had a little snoop on the RakoSoft traffic with [http://www.wireshark.org/ WireShark] and it appears to use non-trivial protocol - darn...

Revision as of 11:26, 10 February 2010

Project maintained by teabot, contact via IRC

Summary

Initial project goals are to allow the setting of room scenes from a Java based API via the Rako Ethernet bridge. If this is successful the plan is to also implement features necessary to configure/program Rako devices in a similar manner to RakoSoft.

Current equipment

  • 500w dimmer
  • 7 button control panel
  • Rako Ethernet bridge
  • RakoSoft
  • iPhone with Rako app

Proposed method

  1. Construct a minimal Rako system with one channel and an Ethernet bridge [Complete]
  2. Contact Rako to see if they have an API available [In progress]
  3. Obtain connectivity between the bridge and the iPhone app and/or RakoSoft on a network that allows snooping [In progress]
  4. Monitor traffic between iPhone app/RakoSoft/Bridge Web UI to determine a suitable candidate for reverse engineering
  5. Reverse enginner protocol
  6. Implement the protocol with Java :-)

Notes

I have had a little snoop on the RakoSoft traffic with WireShark and it appears to use non-trivial protocol - darn...