2013.01.04 - WR These files are for Bryce to test with BTAPS. First I ran four L0 esvy files through the L0_decompress utility, in order to decompress the CCSDS payloads. $ svn co https://efw.ssl.berkeley.edu/svn/SOC/software/L0_decompress/ $ cd L0_decompress $ python L0_decompress.py /disks/rbspdata/MOC_data_products/RBSPA/level_0_telemetry/efw/efw_rbspa_0123_243_03.ptp $ python L0_decompress.py /disks/rbspdata/MOC_data_products/RBSPA/level_0_telemetry/efw/efw_rbspa_0124_243_04.ptp $ python L0_decompress.py /disks/rbspdata/MOC_data_products/RBSPA/level_0_telemetry/efw/efw_rbspa_0125_243_05.ptp $ python L0_decompress.py /disks/rbspdata/MOC_data_products/RBSPA/level_0_telemetry/efw/efw_rbspa_0126_243_04.ptp This leaves you with ptp files of the same name in the current directory that have decompressed payloads. I then used the following script to strip the GDH and GA headers off of the CCSDS packets and write the packets to file as a stream of CCSDS packets. ================================================================================ strip_hdrs.py ================================================================================ import os import ptp filenames = os.listdir('.') for filename in filenames: if(filename.endswith('.ptp')): print "Processing: %s" % (filename) p = ptp.ptp_parser(filename) p.set_mode('gdh_ga_only') outfilename = os.path.splitext(filename)[0] + '.ccsds' f = open(outfilename, 'wb') pkt_count = 0 for pkt in p: f.write(pkt.serial) pkt_count += 1 f.close() print "Wrote %d packets to %s" % (pkt_count, outfilename) ================================================================================ $ python strip_hdrs.py This creates the .ccsds files: efw_rbspa_0125_243_05.ccsds efw_rbspa_0126_243_04.ccsds efw_rbspa_0124_243_04.ccsds efw_rbspa_0123_243_03.ccsds