<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>nRF24L01+:the length of received data exceed 32</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/26489/nrf24l01-the-length-of-received-data-exceed-32</link><description>hello,we use nRF24l01+ for the communication of IoT.There are a lot of terminals work at a same channel,when the controllers send CMD,we have found:the length of reading from R_RX_PL_WID exceed 32 bytes.we donot know the reason. 
 so,i want to ask if</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Fri, 03 Nov 2017 09:48:00 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/26489/nrf24l01-the-length-of-received-data-exceed-32" /><item><title>RE: nRF24L01+:the length of received data exceed 32</title><link>https://devzone.nordicsemi.com/thread/104234?ContentTypeID=1</link><pubDate>Fri, 03 Nov 2017 09:48:00 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3c018970-4a03-4119-be8a-1d09638e9b95</guid><dc:creator>H&amp;#229;kon Alseth</dc:creator><description>&lt;p&gt;Hi, Your RF address looks be OK, and so is the CRC configuration. Using a 2 byte CRC may still give a &amp;quot;false payload&amp;quot; (noise), but the probability is not that high. It is always recommended to check the payload-width before reading out the payload.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF24L01+:the length of received data exceed 32</title><link>https://devzone.nordicsemi.com/thread/104237?ContentTypeID=1</link><pubDate>Wed, 01 Nov 2017 10:08:10 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e1a20364-db5b-43a8-b0f8-e9ae8bf357d8</guid><dc:creator>I6believe</dc:creator><description>&lt;p&gt;thank you!&lt;/p&gt;
&lt;p&gt;what you mean :CRC configuration and RF address configuration is very important.Actually,we  use 2 byte CRC,and RF address is 0x4C、0x45、0x44、0x52、0x00,i think it  fit in with your advice.&lt;/p&gt;
&lt;p&gt;but the project site appear a phenomenon：the length of reading from R_RX_PL_WID exceed 32 bytes. so we should found the reason. the version of software on the project site does not judge the length of    R_RX_PL_WID,I do not know whether it is the reason.&lt;/p&gt;
&lt;p&gt;please help me to analyze the reason,thank you  very much!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF24L01+:the length of received data exceed 32</title><link>https://devzone.nordicsemi.com/thread/104235?ContentTypeID=1</link><pubDate>Wed, 01 Nov 2017 09:11:33 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bb548566-5282-4f33-bca1-5ac4e3252cfd</guid><dc:creator>H&amp;#229;kon Alseth</dc:creator><description>&lt;p&gt;If your RF address includes longer sequences of bit &amp;#39;0&amp;#39; or &amp;#39;1&amp;#39;, like 0xFF or 0x00, or the address starts with patterns resembling the preamble (0x55/0xAA), then you are more prone to get an address match from demodulated noise. The CRC (if enabled) will filter out most of these, but if you use only 1 byte CRC, statistics state that 1 out of 256 &amp;quot;noise payloads&amp;quot; will pass as &amp;quot;OK&amp;quot;.&lt;/p&gt;
&lt;p&gt;Summarized:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We recommend to have an RF address that does not start with 00/0xFF/0xAA/0x55&lt;/li&gt;
&lt;li&gt;We also recommend to use CRC, preferably 2 byte configuration.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Cheers,
Håkon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF24L01+:the length of received data exceed 32</title><link>https://devzone.nordicsemi.com/thread/104236?ContentTypeID=1</link><pubDate>Wed, 01 Nov 2017 08:51:47 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a11fcbe1-7d3f-4659-b96c-1aae780c0cc8</guid><dc:creator>I6believe</dc:creator><description>&lt;p&gt;thank you!&lt;/p&gt;
&lt;p&gt;we have added mechanism which is same of your  suggestion.&lt;/p&gt;
&lt;p&gt;now,i want to know why the payload length exceed 32 bytes,whether there are so much data in the air or software configuration has some mistake,please tell me the reason.&lt;/p&gt;
&lt;p&gt;thank you very much!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF24L01+:the length of received data exceed 32</title><link>https://devzone.nordicsemi.com/thread/104233?ContentTypeID=1</link><pubDate>Wed, 01 Nov 2017 08:12:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6d55e144-99a7-44b4-8af2-75ce2a68583a</guid><dc:creator>H&amp;#229;kon Alseth</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;If a payload is received with size &amp;gt; 32 bytes &lt;em&gt;or&lt;/em&gt; size == 0, the FIFO must be flushed.
If you read out this payload, the state machine inside the nRF24L01+ may go into a bad state.&lt;/p&gt;
&lt;p&gt;This is mentioned in the PS, chapter 7.3.4:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Note: Always check if the packet width
reported is 32 bytes or shorter when
using the R_RX_PL_WID command. If its
width is longer than 32 bytes then the
packet contains errors and must be
discarded. Discard the packet by using
the Flush_RX command.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Cheers,
Håkon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>