Am Dienstag 10 März 2009 20:41:44 schrieb emeliot:
> On 10 Mar, 17:19, GWater <[email protected]> wrote:
> > Am Dienstag 10 März 2009 14:19:10 schrieb emeliot:
> > > Hi and thanks for yours answers :)
> > >
> > > I find that the sensor is :
> > >
> > > ;VGA Sensor
> > > %USBPCamDesc% =    SN.USBPCam,USB\VID_0c45&PID_6270            ;
> > > SN9C201 + MI0360\MT9V111
> > >
> > > so the same like Stefan tell. What's the problem what you think ??
> > >
> > > Mateusz
> >
> > Could you please provide us with a log?
> >
> > Here is a guide (if too complicated simplify - we just need records from
> > plug- in to
> > video-stream.)http://groups.google.com/group/microdia/web/usb-sniffing-on
> >-windows
> >
> > BTW I have a nice python script to extract the sensor_init. No need for
> >
> > copying the values with grep and hands-on anymore.
>
> sorry but my English is not so advanced and I don't understand this
> sentence...
>
> > GWater
> >
> >  signature.asc
> > < 1KWyświetlPobierz
>
> Ok I get this log it's here:
>
> http://www.eupload.pl/pfiles/2347/0c45_6270_init_start_stop_sequences.rar
>
> I hope so I do them good
>
> Mateusz
>
> --~--~---------~--~----~------------~-------~--~----~
> Lets make microdia webcams plug'n play, (currently plug'n pray)
> To post to this group, send email to [email protected]
> Visit us online https://groups.google.com/group/microdia
> -~----------~----~----~----~------~----~------~--~---

Thank you.

This explains why it didn't work, gives us the data we need but also rasies 
some questions. (These questions are not for you - just in general.)

1. The webcam didn't work because it has the slave ID 0x48.

2. The *.inf claims it is the mt9v111 sensor. However the senor_init looks 
like the mt9v112 to me.
3. This is important because we need to probe for the sensor and these two 
have different serial-numbers.
4. Hopefully only mt9v112 needs to be fixed and then everything works.

GWater

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to