Проблема получения данных о температуре с датчиков DS18B20 1-Wire

первый скетч

3:53:22.090 -> 28-92-1E-75-D0-01-3C-F6: ROM does not follow expected pattern 28-xx-xx-xx-xx-00-00-crc. Error.
23:53:22.190 ->   Scratchpad Register: 90/01/55/05/7F/A5/A5/66/B4
23:53:22.223 ->   Info only: Scratchpad bytes 2,3,4 (55/05/7F):  not Maxim default values 4B/46/7F.
23:53:22.322 ->   Scratchpad byte 5 (0xA5):  should have been 0xFF according to datasheet. Error.
23:53:22.388 ->   Scratchpad byte 6 (0xA5):  unexpected value. Error.
23:53:22.455 ->   Scratchpad byte 7 (0x66):  should have been 0x10 according to datasheet. Error.
23:53:22.554 ->   0x4E modifies alarm registers:  ok.
23:53:22.588 ->   0x4E accepts 10 bit resolution:  ok.
23:53:22.621 ->   0x4E preserves reserved bytes:  ok.
23:53:22.654 ->   0x4E accepts 12 bit resolution:  ok.
23:53:22.720 ->   0x4E preserves reserved bytes:  ok.
23:53:22.753 ->   Checking byte 6 upon temperature change: not necessary. Skipped.
23:53:22.820 ->   --> Sensor appears to be counterfeit based on 4 deviations.
23:53:22.886 -> 
23:53:22.886 -> ------------------------------------------------

второй -

23:53:29.623 -> classify_fake_DS18B20.ino version 2020/05/25
23:53:29.656 -> 
23:53:29.656 -> This sketch performs a minimal test to classify
23:53:29.723 ->   1-wire sensors attached to pin 3 according to
23:53:29.756 ->   https://github.com/cpetrich/counterfeit_DS18B20/
23:53:29.822 ->   assuming they belong to one of the DS18B20
23:53:29.855 ->   Families in circulation in 2019.
23:53:29.889 ->   The script evaluates the sensors based on their
23:53:29.955 ->   response to undocumented function codes.
23:53:29.988 ->   Proceed at your own risk!
23:53:30.021 -> 
23:53:30.021 ->   Make sure power pin is connected to either Vcc or GND.
23:53:30.088 ->   Hit enter to start analysis.
23:53:30.121 -> 
23:53:46.348 -> 28-92-1E-75-D0-01-3C-F6: Family D2 (Clone w/o parasitic power).

да, вы правы ))

хотя

всё же про Family D1: Noisy Rubbish with Supercap

P.S. а вот те, что “работают” с WB - Family B1
JFI

00:08:40.517 -> 28-75-8C-7E-19-20-06-E2: ROM does not follow expected pattern 28-xx-xx-xx-xx-00-00-crc. Error.
00:08:40.617 ->   Scratchpad Register: 50/05/4B/46/7F/FF/7F/10/FF
00:08:40.649 ->   Info only: Scratchpad bytes 2,3,4 (4B/46/7F):  Maxim default values.
00:08:40.716 ->   Scratchpad byte 5 (0xFF):  ok.
00:08:40.749 ->   Scratchpad byte 6 (0x7F):  unexpected value. Error.
00:08:40.815 ->   Scratchpad byte 7 (0x10):  ok.
00:08:40.848 ->   0x4E modifies alarm registers:  ok.
00:08:40.881 ->   0x4E accepts 10 bit resolution:  ok.
00:08:40.948 ->   0x4E preserves reserved bytes:  no, got: FF/3F/10. Error.
00:08:41.014 ->   0x4E accepts 12 bit resolution:  ok.
00:08:41.047 ->   0x4E preserves reserved bytes:  no, got: FF/7F/10. Error.
00:08:41.114 ->   Checking byte 6 upon temperature change: not necessary. Skipped.
00:08:41.180 ->   --> Sensor appears to be counterfeit based on 4 deviations.
00:08:41.246 -> 
00:08:41.246 -> ------------------------------------------------
00:08:47.816 -> classify_fake_DS18B20.ino version 2020/05/25
00:08:47.849 -> 
00:08:47.849 -> This sketch performs a minimal test to classify
00:08:47.915 ->   1-wire sensors attached to pin 3 according to
00:08:47.949 ->   https://github.com/cpetrich/counterfeit_DS18B20/
00:08:48.015 ->   assuming they belong to one of the DS18B20
00:08:48.048 ->   Families in circulation in 2019.
00:08:48.081 ->   The script evaluates the sensors based on their
00:08:48.147 ->   response to undocumented function codes.
00:08:48.181 ->   Proceed at your own risk!
00:08:48.214 -> 
00:08:48.214 ->   Make sure power pin is connected to either Vcc or GND.
00:08:48.280 ->   Hit enter to start analysis.
00:08:48.313 -> 
00:08:50.005 -> 28-75-8C-7E-19-20-06-E2: Family B1 (Clone).