# hands-on * **cmd_get_firmware_version** * Request ``a0 03 ff 72 ec`` | Head | Len | Address | Cmd | Check | | -------- | -------- | -------- | -------- | -------- | | 0xA0 | 0x03 | | 0x72 | | * Response ``a0 05 ff 72 01 00 e9`` | Head | Len | Address | Cmd | Major | Minor | Check | | ----- | ----- | -------- | ----- | ----- | ----- | ----- | | 0xA0 | 0x05 | | 0x72 | | | | ![image](https://hackmd.io/_uploads/Byh7t4Dq6.png) * **cmd_real_time_inventory** * TCP Clinet (192.168.1.127) * send:``a0 04 ff 89 01 d3`` * received: a0130189e83000``000000000070022110424067``48d7 * 電子產品碼™ (EPC) 000000000070022110424067 * 網路層 TCP 協議自動回送 ACK,表示收到確認。 * received: ``a00aff8900002000000001ad`` * 網路層 TCP 協議自動回送 ACK,表示收到確認。 | Head | Len | Address | Cmd | Repeat | Check | | ----- | ----- | -------- | ----- | ------ | ----- | | 0xA0 | 0x04 | | 0x89 | | | * Wireshark Network Packet Capture ![image](https://hackmd.io/_uploads/HyXSISD9a.png) * TCP / UDP Debugger ![image](https://hackmd.io/_uploads/ryMxZBPcp.png)