Programming instructions
Atmel AT02597: ZigBee PRO Packet Analysis with Sniffer [APPLICATION NOTE]
32210A−WIRELESS−09/2013
2
Table of Contents
1. Overview .............................................................................................. 3
1.1 The Wireshark Capture Interface from Atmel Gallery ........................................ 3
1.1.1 Setup Information ............................................................................... 4
1.2 BitCatcher ......................................................................................................... 5
1.2.1 Setup Information ............................................................................... 5
1.3 Perytons Network Analyser ............................................................................... 6
2. Sniffer Capture Session
Setup ............................................................. 7
2.1 Wireshark Capture Interface ............................................................................. 7
2.2 BitCatcher ......................................................................................................... 8
2.3 Perytons Network Analyser ............................................................................. 10
3. Configuring Sniffer Preferences
......................................................... 12
3.1 Wireshark Capture Interface ........................................................................... 12
3.2 BitCatcher ....................................................................................................... 14
3.3 Perytons Network Analyzer ............................................................................. 15
4. Analyzing Data Traffic in
ZigBee PRO Networks ............................... 17
4.1 ZigBee Frame Format Overview ..................................................................... 17
4.2 MAC Association ............................................................................................. 17
4.3 Network Rejoin with and without PDS ............................................................. 20
4.4 Self-Leave and Parent-Induced Leave ............................................................ 22
4.5 Network Link Status Frame ............................................................................. 23
4.6 Multicast .......................................................................................................... 24
4.7 Fragmentation ................................................................................................. 25
4.8 Service Discovery ........................................................................................... 26
4.9 Tunneling in Secure Networks ........................................................................ 26
5. Analyzing Data Traffic in
ZigBee PRO Public Profile Networks ......... 28
5.1 ZigBee Home Automation ............................................................................... 28
5.1.1 Service Discovery ............................................................................. 28
5.1.2 Attribute Reporting ............................................................................ 28
5.1.3 Commands ....................................................................................... 29
5.1.4 Security ….. ...................................................................................... 29
5.2 ZigBee Light Link ............................................................................................ 29
5.2.1 Touchlinking ...................................................................................... 29
5.2.2 Cluster Commands ........................................................................... 30
5.2.3 Security ….. ...................................................................................... 30
5.3 ZigBee Smart Energy ...................................................................................... 30
6. Exa
mple Application Scenarios.......................................................... 31
6.1 PAN Same Channel Co-Existence .................................................................. 31
6.2 End-to-End Establishment of Application Link Key ......................................... 31
6.3 ZLL – ZHA Interoperability .............................................................................. 32
7. References ......................................................................................... 33
8. Revision History
................................................................................. 34