# hands-on * **cmd_get_firmware_version** * Request ``a0 03 ff 72 ec`` | Head | Len | Address | Cmd | Check | | -------- | -------- | -------- | -------- | -------- | | 0xA0 | 0x03 | | 0x72 | | * Response ``a0 05 ff 72 01 00 e9`` | Head | Len | Address | Cmd | Major | Minor | Check | | ----- | ----- | -------- | ----- | ----- | ----- | ----- | | 0xA0 | 0x05 | | 0x72 | | | |  * **cmd_real_time_inventory** * TCP Clinet (192.168.1.127) * send:``a0 04 ff 89 01 d3`` * received: a0130189e83000``000000000070022110424067``48d7 * 電子產品碼™ (EPC) 000000000070022110424067 * 網路層 TCP 協議自動回送 ACK,表示收到確認。 * received: ``a00aff8900002000000001ad`` * 網路層 TCP 協議自動回送 ACK,表示收到確認。 | Head | Len | Address | Cmd | Repeat | Check | | ----- | ----- | -------- | ----- | ------ | ----- | | 0xA0 | 0x04 | | 0x89 | | | * Wireshark Network Packet Capture  * TCP / UDP Debugger 
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up