<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/7592/ble-sniffer-limited-to-65535-packets</link><description>Hi!
I&amp;#39;m using the nRF Sniffer software (Windows 1.0.1 Rel.1111) with nRF51-DK Board (Rev. 1.1.0) and Wireshark (1.12.5).
Everything works fine until the number of 65535 (0xFFFF) captured packets is reached.
In the log.txt lost packets are reported</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 02 Nov 2016 11:52:33 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/7592/ble-sniffer-limited-to-65535-packets" /><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27096?ContentTypeID=1</link><pubDate>Wed, 02 Nov 2016 11:52:33 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9443f546-8b8e-4c78-a13d-acfaf0ce5586</guid><dc:creator>Kai Harrekilde</dc:creator><description>&lt;p&gt;I have plenty of logs. I&amp;#39;ll make sure to reproduce it today and send you a fresh one.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27095?ContentTypeID=1</link><pubDate>Wed, 02 Nov 2016 11:47:20 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:96e66485-5ee4-46f7-b77e-5b716e1bc293</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;The issue with the event counter supposed to be fixed with the unofficial FW. Could you provide a sniffer trace when issue occurs ?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27094?ContentTypeID=1</link><pubDate>Wed, 02 Nov 2016 11:42:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:58ee1d96-7858-4141-8eba-22da05699eb3</guid><dc:creator>Kai Harrekilde</dc:creator><description>&lt;p&gt;@Hung, I still see the 16-bit packet counter issue as described by Karl-E. If I get more than 65535 packets in a single session, I get errors in the log file. This is with the unofficial FW.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27093?ContentTypeID=1</link><pubDate>Wed, 02 Nov 2016 11:37:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:96faec34-baeb-4679-b81b-864f01ccac60</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;@KAI: Could you describe the issue you have ? Some time I got &amp;quot;UART read timeout&amp;quot; but the sniffer still worked fine.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27092?ContentTypeID=1</link><pubDate>Wed, 19 Oct 2016 17:28:52 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b02c904b-d2b0-4c5a-817f-a8b2fbb62f9a</guid><dc:creator>Kai Harrekilde</dc:creator><description>&lt;p&gt;@Hung Bui: I&amp;#39;m also seeing this issue (UART read timeout).
nRF51-Dongle (PCA10031) module with the 1.0.1_1111 sniffer software. I programmed the unofficial SNIFF150 FW that you posted &lt;a href="https://devzone.nordicsemi.com/question/66725/why-does-my-ble-sniffer-stops-after-2h-and-a-ll_channel_map_req/?answer=73531#post-id-73531"&gt;here&lt;/a&gt;, but I still get this issue.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27091?ContentTypeID=1</link><pubDate>Tue, 16 Jun 2015 13:03:04 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6df9b3b4-8c47-4ded-9d10-b640fef94614</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;I would suggest you next time to try with a phone, Android or iOS and also with our nRFMaster Control Panel on PC.&lt;/p&gt;
&lt;p&gt;In the log on my PC here I am seeing the same info report&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;16-Jun-2015 13:28:17 (W. Europe Daylight Time) INFO: gap in packets, between 65535 and 0 packet before: [6, 19, 1, 255, 255, 6, 10, 11, 31, 43, 142, 248, 21, 28, 0, 0, 165, 67, 101, 80, 1, 0, 41, 242, 246] packet after: [6, 19, 1, 0, 0, 6, 10, 9, 31, 43, 142, 248, 151, 0, 0, 0, 165, 67, 101, 80, 5, 0, 250, 244, 246]
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;But the sniffer managed to follow the connection with no issue.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27090?ContentTypeID=1</link><pubDate>Tue, 16 Jun 2015 12:47:53 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5388a6ed-cb6d-483b-8ab8-6ba1b3827778</guid><dc:creator>Karl-E.</dc:creator><description>&lt;p&gt;I use custom devices based on the Alpwise BLE Stack. I&amp;#39;m not able to do another trace in the moment, but I remember the channel map update event being the last event in a former trace. And yes, the connection is kept.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27089?ContentTypeID=1</link><pubDate>Tue, 16 Jun 2015 12:42:51 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:64a7f688-1d49-4e5b-be3c-73ce84b34883</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;@Karl-E: Sorry that I missed that part that you tried with Wireshark v1.10 already. There was only 20 advertising packets, and I believe we only count the packets we received. So still it&amp;#39;s pretty strange number.&lt;/p&gt;
&lt;p&gt;Which central device did you use for testing ? Could you update another trace ? In your trace I saw that the last packet from the central was a channel map update. If this appear to be the same on other trace then it could tell something.&lt;/p&gt;
&lt;p&gt;I assume that the connection was kept, independent of the issue on the sniffer ?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27088?ContentTypeID=1</link><pubDate>Tue, 16 Jun 2015 12:20:15 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:805e25af-f78e-4c76-aba9-1fa365dd5fea</guid><dc:creator>Karl-E.</dc:creator><description>&lt;p&gt;Hi! As I mentioned, I already did that v1.10 test - without success. Regarding the number of packets: I suspect that only packets within the connection count. There are also advertising packets and lost packets (see log) - so the counter stops somewhere above 65xxx. I even tried a connection which I stopped at around 32000 packets. Then re-connected and about 65xxx packets later the protocol stopped...&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27087?ContentTypeID=1</link><pubDate>Tue, 16 Jun 2015 12:12:03 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7c1903d0-eda1-448d-a2a1-c89667ef957b</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;@Karl-E: I will report your issue to the developers.&lt;/p&gt;
&lt;p&gt;Could you try with Wireshark v1.10 to see if that helps?&lt;/p&gt;
&lt;p&gt;In your trace it actually stopped at packet 69459, so might be it&amp;#39;s not related to the size of unsigned short.
I haven&amp;#39;t seen this issue reported before.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27086?ContentTypeID=1</link><pubDate>Tue, 16 Jun 2015 06:57:34 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:017f5a96-ec22-4314-bc1b-6d0dbcbf44e1</guid><dc:creator>Karl-E.</dc:creator><description>&lt;p&gt;Hi and thanks for the quick reply!
I did another test using Wireshark 1.10. Same results: Scanning stopped after a while.&lt;/p&gt;
&lt;p&gt;I attached the sniffer log file and the pcapng file.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/1157.log.txt"&gt;log.txt&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/Capture_5F00_stopped.pcapng"&gt;Capture_stopped.pcapng&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Also a sniffer log file from an attempt, when the sniffer crashed (only happened once, but it may contain a hint?!)
&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/log_2D00_sniffer_2D00_crashed.txt"&gt;log-sniffer-crashed.txt&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27085?ContentTypeID=1</link><pubDate>Mon, 15 Jun 2015 14:25:55 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fbde750b-6d2f-427b-aa49-e745fcb9e3a9</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Hi Karl-E,&lt;/p&gt;
&lt;p&gt;I attached here the trace I just recorded. It passed 90k packets but haven&amp;#39;t got issue. Only one connect session, connection interval was 7.5ms.
I used Wireshark v1.10. Could that be the reason ?&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/test.pcapng"&gt;test.pcapng&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27084?ContentTypeID=1</link><pubDate>Mon, 15 Jun 2015 13:05:30 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a7f0f751-fd92-492c-b338-dfd6013c1e04</guid><dc:creator>Karl-E.</dc:creator><description>&lt;p&gt;Yes, the Wireshark also stopped (without any message - so I looked it up in the logfile). I did some additional testing: 65535 is not a problem &amp;quot;in general&amp;quot;. The problem only occurs when all data is produced within one connected session. (We use a 10ms connection intervall with data transmitted every interval - so we reach 0xFFFF packets within under 5 minutes.)
When I cut the connection within the 65535 packets and re-connect, more than 65536 packets will be displayed in Wireshark (though the problem will occur later if the transmission continues within the same connection).&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE sniffer limited to 65535 packets?</title><link>https://devzone.nordicsemi.com/thread/27083?ContentTypeID=1</link><pubDate>Mon, 15 Jun 2015 11:08:56 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:dacb35a2-7485-4db5-acc3-3fed7f6f1fc8</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;@Kark-E: Did the trace on Wireshark also stopped at packet #65535 ?
I believe the packet number in the log is just for internal use and should not cause any packet missing or hanging.&lt;/p&gt;
&lt;p&gt;I was trying here and haven&amp;#39;t seen any issue on wireshark capturing more than 65535 packets.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>