<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Start/stop sniffing by external event</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/46757/start-stop-sniffing-by-external-event</link><description>I have Wireshark setup with old PCA10028 board connected as a sniffer, FW sniffer_pca10028_51296aa.hex Now I&amp;#39;m working with NRF52 family and sometimes I need to observe some long periods of time. I&amp;#39;d like to request a new feature for sniffer. Is it possible</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Sat, 18 May 2019 14:57:27 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/46757/start-stop-sniffing-by-external-event" /><item><title>RE: Start/stop sniffing by external event</title><link>https://devzone.nordicsemi.com/thread/187726?ContentTypeID=1</link><pubDate>Sat, 18 May 2019 14:57:27 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d39c76cc-e8a5-4150-9277-d6f684ee9ff4</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;We can consider the feature but, our backlog for the next few releases are already filled. Why don&amp;#39;t you try the Sniffer API with the python and see if that works for you.&lt;/p&gt;
&lt;p&gt;The latest beta(pre-releasee) &lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/40647/nrf-sniffer-decryption-is-not-working-after-entering-passkey/184933#184933"&gt;with stability fixes is posted on this case&lt;/a&gt;.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Start/stop sniffing by external event</title><link>https://devzone.nordicsemi.com/thread/187725?ContentTypeID=1</link><pubDate>Sat, 18 May 2019 14:35:51 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4aa0c699-f0af-42a1-b56c-c2279a907043</guid><dc:creator>ekrashtan</dc:creator><description>&lt;p style="padding-left:30px;"&gt;&lt;em&gt;Wireshark will perform badly when you hit more than 1 million packets in the capture.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Yes, that&amp;#39;s why I requested such feature.&lt;/p&gt;
&lt;p&gt;1.&amp;nbsp;One-two days, but only when equipment in an active state, It means total 10-20 minutes in short periods (few seconds)&lt;/p&gt;
&lt;p&gt;2. Yes, I thought about this possibility, but I need to catch only one wrong sequence and still have no idea how to filter the necessary period without an external toggle.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Start/stop sniffing by external event</title><link>https://devzone.nordicsemi.com/thread/187724?ContentTypeID=1</link><pubDate>Sat, 18 May 2019 13:05:15 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:37cd3e5f-c643-4ce9-903a-7adc5583c936</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;I would suggest upgrading to a nRF52 based DK board as our tests show that the nRF51 based DKs perform worse when we need to sniff large number of packets.&lt;/p&gt;
&lt;p&gt;We have attempted to improve stability of the UART link so we can observe for &amp;quot;long&amp;quot; periods of time.&lt;/p&gt;
&lt;p&gt;1. However what do you mean by &amp;quot;long&amp;quot; ?&lt;/p&gt;
&lt;p&gt;2. You can also use the python based Sniffer API instead of wireshark so large number of packets can be received and analyzed.&lt;br /&gt;Wireshark will perform badly when you hit more than 1 million packets in the capture.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>