This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

Understanding Wireshark logs

Hi,

I am trying to understand Wireshark logs when sniffing packets. Please check the attachment. I have been reading about the description of advertising packets. Can you please check my logs and explain me which are the actual data packets? These logs were captured for BLE_UART example.uart_log.pcapng

Parents
  • Hello,

    I looked at your sniffer log, and it contains a lot of advertising devices, not only your BLE UART device. I can't see that the devices actually connect from your log, and I can't see the packets from when they are in a connection (these packages are on different channels than the advertising channels). I see that there are many different devices by the source addresses of the devices.

    If you want to capture the packets from your connection you have to select your device from the drop down menu near the top of the wireshark window. When it is selected the sniffer will filter out any other BLE packets, and it will follow the channel hopping when a device connects to your UART device.

    So to answer your question, the data packets are not included in this sniffer trace. If you filter on the Nordic UART device before you connect, you should be able to see the data packets in between the empty PDU packets that will be sent each connection interval if the devices doesn't have any actual payload to send.

    Let me know if you still can't find them after filtering on your device.

    Best regards,

    Edvin

  • So nordic DK with Wireshark, does it act as hardware or software protocol analyzer?

Reply Children
No Data
Related