We have moved at community.getvera.com

Author Topic: Debuging NRFL with wireshark  (Read 902 times)

Offline aPL

  • Developers
  • Jr. Member
  • *****
  • Posts: 74
  • Karma: +1/-2
Debuging NRFL with wireshark
« on: August 06, 2014, 03:06:54 am »
Found on hackaday http://hackaday.com/2014/08/05/sniffing-nrf24l01-traffic-with-wireshark/

We?re sure that some of our readers are familiar with the difficult task that debugging/sniffing nRF24L01+ communications can be. Well, [Ivo] developed a sniffing platform based on an Arduino Uno, a single nRF24L01+ module and a computer running the popular network protocol analyzer Wireshark (part1, part2, part3 of his write-up).

As these very cheap modules don?t include a promiscuous mode to listen to all frames being sent on a particular channel, [Ivo] uses for his application a variation of [Travis Goodspeed]?s technique to sniff Enhance Shockburst messages. In short, it consists in setting a shorter than usual address, setting a fix payload length and deactivating the CRC feature. The Arduino Uno connected to the nRF24L01+ is therefore in charge of forwarding the sniffed frames to the computer. An application that [Ivo] wrote parses the received data and forwards it to wireshark, on which can be set various filters to only display the information you?re interested in.

Pages:
1 http://yveaux.blogspot.nl/2014/07/nrf24l01-sniffer-part-1.html
2 http://yveaux.blogspot.nl/2014/07/nrf24l01-sniffer-part-2.html
3 http://yveaux.blogspot.nl/2014/07/nrf24l01-sniffer-part-3.html
working @ Vera / MiOS | anything stated is my own opinion and does not reflect the thoughts and opinions of my employer