Debuging NRFL with wireshark

Found on hackaday [url=http://hackaday.com/2014/08/05/sniffing-nrf24l01-traffic-with-wireshark/]http://hackaday.com/2014/08/05/sniffing-nrf24l01-traffic-with-wireshark/[/url]

We?re sure that some of our readers are familiar with the difficult task that debugging/sniffing nRF24L01+ communications can be. Well, [Ivo] developed a sniffing platform based on an Arduino Uno, a single nRF24L01+ module and a computer running the popular network protocol analyzer Wireshark (part1, part2, part3 of his write-up).

As these very cheap modules don?t include a promiscuous mode to listen to all frames being sent on a particular channel, [Ivo] uses for his application a variation of [Travis Goodspeed]?s technique to sniff Enhance Shockburst messages. In short, it consists in setting a shorter than usual address, setting a fix payload length and deactivating the CRC feature. The Arduino Uno connected to the nRF24L01+ is therefore in charge of forwarding the sniffed frames to the computer. An application that [Ivo] wrote parses the received data and forwards it to wireshark, on which can be set various filters to only display the information you?re interested in.

Pages:
1 [url=http://yveaux.blogspot.nl/2014/07/nrf24l01-sniffer-part-1.html]http://yveaux.blogspot.nl/2014/07/nrf24l01-sniffer-part-1.html[/url]
2 [url=http://yveaux.blogspot.nl/2014/07/nrf24l01-sniffer-part-2.html]http://yveaux.blogspot.nl/2014/07/nrf24l01-sniffer-part-2.html[/url]
3 [url=http://yveaux.blogspot.nl/2014/07/nrf24l01-sniffer-part-3.html]http://yveaux.blogspot.nl/2014/07/nrf24l01-sniffer-part-3.html[/url]