Hi everyone!

A few days ago I ran a sniffer application using CC1101 transceiver.
Sniffing device is connected via UART<->USB adapter to PC. A python sniffer
application redirects the frames to Wireshark (v. 2.0.0).
Sniffer was gathering frames from one node programmed with gnrc-networking
example application. This node was sending a frame in every 10 seconds. The
problem is that Wireshark did not recognize any 803.15.4 frames. Digging
deeper into a 803.15.4 frame, controll part (first octet) look like:

bits        description
0-2         frame type (000 Beacon, 001 Data, 010 Ack, 011 MAC command,
100-111 Reserved)
3            security
4            frame pending
5            AR
6            PAN ID Compression
7-9        Reserved
10-11    Dest. Addressing Mode (00 PAN and addr. not present, 01 Reserved,
10 Short address, 11 Ext. Address)
12-13    Frame Version (00 IEEE802.15.4-2003 compatible, 01 IEEE802.15.4
compatible)
14-15    Source Addressing Mode (00 PAN and addr. not present, 01 Reserved,
10 Short address, 11 Ext. Address)

The received data has wrong source address mode (picture in attachment).
Why is there no compatibility with IEEE802.15.4 standard?
Is there anyone with knowledge concerning sniffing radio packets in RIOT
powered mesh using Wireshark? Is there a possibility to recognize 802.15.4
packet types using standard Wireshark dissector?

Best regards,
Kubaszek Mateusz
_______________________________________________
devel mailing list
devel@riot-os.org
https://lists.riot-os.org/mailman/listinfo/devel

Reply via email to