ZENA™ Wireless Network Analyzer User’s Guide © 2008 Microchip Technology Inc.
Note the following details of the code protection feature on Microchip devices: • Microchip products meet the specification contained in their particular Microchip Data Sheet. • Microchip believes that its family of products is one of the most secure families of its kind on the market today, when used in the intended manner and under normal conditions. • There are dishonest and possibly illegal methods used to breach the code protection feature.
ZENA™ WIRELESS NETWORK ANALYZER USER’S GUIDE Table of Contents Preface ........................................................................................................................... 1 Chapter 1. ZENA™ Wireless Network Analyzer Overview 1.1 Introduction ..................................................................................................... 7 1.2 ZENA™ Wireless Network Analyzer Kit Contents .......................................... 7 1.3 ZENA™ Analyzer Overview ....................
ZENA™ Wireless Network Analyzer User’s Guide NOTES: DS51606C-page iv © 2008 Microchip Technology Inc.
ZENA™ WIRELESS NETWORK ANALYZER USER’S GUIDE Preface NOTICE TO CUSTOMERS All documentation becomes dated, and this manual is no exception. Microchip tools and documentation are constantly evolving to meet customer needs, so some actual dialogs and/or tool descriptions may differ from those in this document. Please refer to our web site (www.microchip.com) to obtain the latest documentation available. Documents are identified with a “DS” number.
ZENA™ Wireless Network Analyzer User’s Guide • Chapter 5. MiWi™ P2P Wireless Networking Protocol Tools - This chapter describes how to use the MiWi P2P protocol tools provided with the ZENA analyzer.
Preface RECOMMENDED READING This user’s guide describes how to use the ZENA Wireless Network Analyzer. Other useful documents are listed below. The following Microchip documents are available and recommended as supplemental reference resources. Readme for ZENA Wireless Network Analyzer For the latest information on using the ZENA Wireless Network Analyzer, read the Readme file in the ZENA software installation directory.
ZENA™ Wireless Network Analyzer User’s Guide THE MICROCHIP WEB SITE Microchip provides online support via our web site at www.microchip.com. This web site is used as a means to make files and information easily available to customers.
Preface CUSTOMER SUPPORT Users of Microchip products can receive assistance through several channels: • • • • Distributor or Representative Local Sales Office Field Application Engineer (FAE) Technical Support Customers should contact their distributor, representative or field application engineer (FAE) for support. Local sales offices are also available to help customers. A listing of sales offices and locations is included in the back of this document.
ZENA™ Wireless Network Analyzer User’s Guide NOTES: DS51606C-page 6 © 2008 Microchip Technology Inc.
ZENA™ WIRELESS NETWORK ANALYZER USER’S GUIDE Chapter 1. ZENA™ Wireless Network Analyzer Overview 1.1 INTRODUCTION This chapter introduces the ZENA Wireless Network Analyzer hardware and software, and briefly describes their capabilities. The ZENA analyzer provides three main tools to develop IEEE 802.15.4 solutions quickly and efficiently with the free Microchip Stacks for the ZigBee™ protocol and the MiWi™ protocol.
ZENA™ Wireless Network Analyzer User’s Guide FIGURE 1-1: ZENA™ WIRELESS NETWORK ANALYZER BOARD The ZENA Wireless Network Analyzer uses a USB mini-B cable to connect to the PC. The ZENA analyzer is powered by the USB bus. A PCB trace antenna receives the packets on the specified channel and sends the information over USB to the PC computer using the HID standard class. DS51606C-page 8 © 2008 Microchip Technology Inc.
ZENA™ WIRELESS NETWORK ANALYZER USER’S GUIDE Chapter 2. Getting Started 2.1 INTRODUCTION This chapter describes how to install the ZENA Wireless Network Analyzer software. 2.
ZENA™ Wireless Network Analyzer User’s Guide NOTES: DS51606C-page 10 © 2008 Microchip Technology Inc.
ZENA™ WIRELESS NETWORK ANALYZER USER’S GUIDE Chapter 3. ZigBee™ Protocol Tools 3.1 INTRODUCTION This chapter describes how to use the ZigBee™ protocol tools provided by the ZENA Wireless Network Analyzer. Both basic and advance monitoring techniques are demonstrated. 3.2 MICROCHIP STACK CONFIGURATION TOOL Microchip provides a freely available Stack as part of application note, AN965, “Microchip Stack for the ZigBee™ Protocol”.
ZENA™ Wireless Network Analyzer User’s Guide 3.2.1 Specifying ZigBee Protocol Device Information Select the ZigBee Device tab. FIGURE 3-1: DS51606C-page 12 ZENA™ STACK CONFIGURATION WINDOW, ZIGBEE DEVICE TAB © 2008 Microchip Technology Inc.
ZigBee™ Protocol Tools Using this window, you can configure the following items: TABLE 3-1: ZigBee™ PROTOCOL DEVICE CONFIGURATION SELECTION Configuration Option Description MAC Address Each and every ZigBee protocol device must have its own unique MAC address. The Microchip OUI is provided as a default for development purposes only. Please see AN1232, “Microchip ZigBee-2006 Residential Stack Protocol” for additional information.
ZENA™ Wireless Network Analyzer User’s Guide 3.2.2 Specifying Transceiver Information Select the Transceiver tab. FIGURE 3-2: ZENA™ STACK CONFIGURATION WINDOW, TRANSCEIVER TAB Using this window, you can configure the following items: TABLE 3-2: ZigBee™ PROTOCOL TRANSCEIVER CONFIGURATION SELECTION Configuration Option Description Transceiver Selects one of the transceivers supported by the Stack. Frequency Band This combo box shows the various available frequency bands of the selected transceiver.
ZigBee™ Protocol Tools 3.2.3 Specifying Profile and Endpoint Information Select the Endpoints tab. FIGURE 3-3: ZENA™ STACK CONFIGURATION WINDOW, ENDPOINTS TAB Using this window, you can specify the profile and endpoint structure that your application is using. See Table 3-3 for configuration options. CAUTION It is critical for ZigBee protocol interoperability that this section be accurate. © 2008 Microchip Technology Inc.
ZENA™ Wireless Network Analyzer User’s Guide TABLE 3-3: ZigBee™ PROTOCOL PROFILE/ENDPOINTS CONFIGURATION SELECTION Configuration Option Description Profile Header File Click Browse to browse to and select the header file for the application’s profile.
ZigBee™ Protocol Tools FIGURE 3-4: © 2008 Microchip Technology Inc.
ZENA™ Wireless Network Analyzer User’s Guide 3.2.4 Specifying Security Information Select the Security tab. FIGURE 3-5: ZENA™ STACK CONFIGURATION WINDOW, SECURITY TAB This tab is used to configure the security features of the ZigBee protocol Stack. If your application will utilize security, select the “Security Capable” option.
ZigBee™ Protocol Tools 3.2.5 Specifying ZDO Layer Information Click on the ZDO tab. FIGURE 3-6: ZENA™ STACK CONFIGURATION WINDOW, ZDO TAB This tab is used to configure the ZDO (ZigBee Device Object) Layer of the Stack. Many options on this tab are enabled or disabled based on the “ZigBee Device Type” that is selected on the ZigBee Device tab. ZigBee allows some network services to be distributed among different devices in the network.
ZENA™ Wireless Network Analyzer User’s Guide TABLE 3-5: ZigBee™ PROTOCOL ZDO CONFIGURATION SELECTION Configuration Option Description Include Optional Service Discovery Requests If selected, the application will support the optional ZDO service discovery requests. This feature is not yet supported by the Microchip Stack. Include Optional Node Management Services If selected, the application will support the optional ZDO node management services.
ZigBee™ Protocol Tools 3.2.6 Specifying APS Layer Information Click on the APS tab. FIGURE 3-7: ZENA™ STACK CONFIGURATION WINDOW, APS TAB This tab is used to configure the APS (Application Sub Support) Stack layer. Some options on this tab are enabled or disabled based on the “ZigBee Device Type” selected on the ZigBee Device tab. Many of these options affect the amount of RAM and nonvolatile memory that is used by the application.
ZENA™ Wireless Network Analyzer User’s Guide TABLE 3-7: ZigBee™ PROTOCOL APS CONFIGURATION SELECTION Configuration Option Description Max Frames From APL Layer Each frame sent down from the Application layer must be buffered for retransmission on failure and for reporting back transmission confirmation status. Enter the number of frames that can be in the process of transmitting at the same time.
ZigBee™ Protocol Tools TABLE 3-9: ZIGBEE™ PROTOCOL APS DUPLICATE PACKET REJECTION SELECTION Configuration Option Description Table Size The ZigBee™ protocol allows the application layer to individually tag each packet to be transmitted with a unique identifier called a sequence number. The sequence number is used by the receiving application to distinguish among the many packets it asynchronously receives.
ZENA™ Wireless Network Analyzer User’s Guide 3.2.7 Specifying NWK and MAC Layer Information Click on the NWK/MAC tab. FIGURE 3-8: ZENA™ STACK CONFIGURATION WINDOW, NWK/MAC TAB This tab is used to configure the NWK (Network) and MAC (Medium Access Controller) Stack layers. Many options on this tab are enabled or disabled based on the “ZigBee Device Type” specified on the ZigBee Device tab.
ZigBee™ Protocol Tools TABLE 3-10: ZigBee™ PROTOCOL NWK CONFIGURATION SELECTION Configuration Neighbor Table Size (1) Option Description All ZigBee™ protocol devices contain a neighbor table where they store information about other nodes in the network.
ZENA™ Wireless Network Analyzer User’s Guide 3.2.8 Specifying PIC MCU Information Select the PIC tab. FIGURE 3-9: ZENA™ STACK CONFIGURATION WINDOW, PIC TAB This tab is used to configure basic PIC MCU options (see Table 3-12). DS51606C-page 26 © 2008 Microchip Technology Inc.
ZigBee™ Protocol Tools TABLE 3-12: ZigBee™ PROTOCOL PIC® MCU CONFIGURATION SELECTION Configuration Target Device Option Description PIC® Select the MCU device used by the target application. If the exact device is not available, select a similar device and refer to AN965, “Microchip Stack for the ZigBee™ Protocol” for information on modifying the linker script for the target device. Clock Frequency (Hz)(1) Specify the input clock frequency to the PIC MCU in Hertz.
ZENA™ Wireless Network Analyzer User’s Guide 3.3 BASIC NETWORK MONITORING The ZENA Wireless Network Analyzer hardware and software provide a powerful network monitoring tool for use from development through installation. Connect the ZENA Wireless Network Analyzer hardware to the PC using the supplied USB mini-B cable. From the ZENA Analyzer Software Main window, select ZigBee™ Tools>Network Monitor.
ZigBee™ Protocol Tools 3.3.1 Real-Time Network Monitoring Before initiating real-time monitoring, set the following options on the ZigBee Network Monitor window: TABLE 3-14: REAL-TIME NETWORK MONITORING CONFIGURATION SELECTION Configuration Option Description Real-Time Display Select this option to display on-air messages that are received by the Network Analyzer hardware. Channel Select the desired channel to monitor.
FIGURE 3-11: ASSOCIATION REQUEST AND RESPONSE ZENA™ Wireless Network Analyzer User’s Guide DS51606C-page 30 © 2008 Microchip Technology Inc.
ZigBee™ Protocol Tools The various portions of the message are color coded for clarity. TABLE 3-15: PACKET SNIFFER COLOR CODING Field MAC Header Color White MAC Commands and Beacons Red NWK Header Lime NWK Commands Fuchsia APS Header Yellow APS Payload/Decoding Aqua Security Header and Encrypted Data Blue Unknown Olive Figure 3-12 shows a message being routed from the originator to the final destination and an APS level Acknowledge being routed back.
FIGURE 3-12: APPLICATION MESSAGE WITH APS LEVEL ACKNOWLEDGE ZENA™ Wireless Network Analyzer User’s Guide DS51606C-page 32 © 2008 Microchip Technology Inc.
ZigBee™ Protocol Tools Each message can contain a great deal of information, making it difficult to view on the screen. The Packet Sniffer window can be scrolled, but the ZENA analyzer also offers three different levels of viewing the MAC, NWK and APS level information. Each layer can be configured separately on the Network Monitor window by adjusting the “Verboseness Level”. There are three levels offered (see Table 3-16).
FIGURE 3-13: APPLICATION MESSAGE WITH NUMERIC DISPLAY ZENA™ Wireless Network Analyzer User’s Guide DS51606C-page 34 © 2008 Microchip Technology Inc.
FIGURE 3-14: APPLICATION MESSAGE WITH CONDENSED DISPLAY ZigBee™ Protocol Tools © 2008 Microchip Technology Inc.
ZENA™ Wireless Network Analyzer User’s Guide The data can be viewed and analyzed to some degree while real-time monitoring is in progress. For more advanced analysis, real-time monitoring must be halted by clicking the Stop button or selecting the Operation>Stop Sniffing/Playback menu option. To save the data for analysis at a later time, click the Save button or select the File>Save menu option. 3.3.1.
ZigBee™ Protocol Tools 3.3.2.2 USING THE PACKET FILTER Click the Filter button or select the Tools>Filter menu option to enlarge the Network Monitor window and display the filter options. FIGURE 3-15: NETWORK MONITOR WINDOW WITH FILTER The filter is useful for displaying only selected packets in the Packet Sniffer window. For example, suppose we want to see all beacons generated by our network. Set up the filter as follows: 1. 2. 3. 4. 5. 6. Clear all “MAC Commands” checkboxes except “MAC Beacon”.
DS51606C-page 38 If the “Source Address” and “Destination Address” areas are empty and are needed for your desired filter, replay the network formation portion of the data. If you will be working with a network that maintains the same structure, you may want to save a captured data file that contains the network formation for populating these fields. FILTERED BEACONS To close the filter and return the Network Monitor window to its original size, click the Filter toolbar button.
ZigBee™ Protocol Tools 3.3.2.3 HIDING AND UNHIDING PACKETS Packets in the Packet Sniffer window can be hidden in two ways: • Using the filter function as described in Section 3.3.2.2 “Using the Packet Filter” • Right clicking on a packet and selecting Hide from the pop-up menu Note: Multiple packets can be selected for hiding by holding down the control key while clicking each desired packet.
SECURITY DECRYPTED FIGURE 3-17: FIGURE 3-18: ZENA™ Wireless Network Analyzer User’s Guide DS51606C-page 40 © 2008 Microchip Technology Inc.
ZigBee™ Protocol Tools 3.4 ADVANCED NETWORK MONITORING AND ANALYSIS 3.4.1 Network Configuration Display Window The ZENA Wireless Network Analyzer provides an extra level of network monitoring and analysis with the Network Configuration Display (NCD). Open the ZENA™ Network Configuration Display window by clicking the Network Configuration Display button or by selecting the View>Network Configuration Display menu option on the Network Monitor window.
ZENA™ Wireless Network Analyzer User’s Guide When the ZENA analyzer receives a message from a device, it creates a node in the NCD window. The label for the node will be its 64-bit MAC address. To see the node’s PAN ID and 16-bit network address, hold the cursor over the node. If the node’s MAC address is not available, the label for the node will be the node’s PAN ID and 16-bit network address. If the ZENA analyzer monitors network creation, it can also color code the nodes according to device type.
ZigBee™ Protocol Tools 3.4.2 Viewing Network Formation The following sequence of figures shows how network formation appears on the NCD window. First, the ZigBee protocol coordinator sends a beacon request. FIGURE 3-20: NCD BEACON REQUEST Since there are no nodes on this channel, no beacons are received, and the ZigBee protocol coordinator forms a network. Next, a ZigBee protocol router tries to find a network to join.
ZENA™ Wireless Network Analyzer User’s Guide FIGURE 3-21: NCD BEACON Note that the ZENA analyzer can tell from the beacon that this device is a ZigBee protocol coordinator, but it does not yet know its MAC address. The ZigBee protocol router will now try to join the network by sending an Association Request. The ZENA analyzer can tell from the Association Request what type of device is trying to join the network. FIGURE 3-22: DS51606C-page 44 NCD ASSOCIATION REQUEST © 2008 Microchip Technology Inc.
ZigBee™ Protocol Tools After a short time, the ZigBee protocol router will send a Data Request, asking for the Association Response. The ZigBee protocol coordinator will respond by sending the Association Response. FIGURE 3-23: NCD ASSOCIATION RESPONSE Now the device has joined the network. This relationship can be seen by clicking Clear All Message Lines to display only the network association lines. FIGURE 3-24: © 2008 Microchip Technology Inc.
ZENA™ Wireless Network Analyzer User’s Guide Figure 3-25 shows the NCD window after the creation of a four-device network. FIGURE 3-25: Note: DS51606C-page 46 FOUR-DEVICE NETWORK If you will be working with a network that maintains the same structure, you may want to save a captured data file that contains the network formation. You can play back this file to establish the devices on the network, and then play back the various data files containing the network traffic you would like to monitor.
ZigBee™ Protocol Tools 3.4.3 Viewing Network Traffic After the network above was created, one of the devices attempted to send a message to another device. The path that the message followed is shown in Figure 3-26. FIGURE 3-26: NCD MESSAGE PATH The NCD window shows how the message went from device 00.04.A3.00.00.00.00.88 to device 00.04.A3.00.00.00.00.01, traveling through two other nodes. This particular message requested an APS Acknowledge. Figure 3-27 shows the path of the APS Acknowledge.
ZENA™ Wireless Network Analyzer User’s Guide 3.4.4 Customizing the Network Configuration Display Window When analyzing network traffic, it is often helpful to understand the physical relationship between the devices. The ZENA analyzer allows you to select a bitmap as the background of the NCD window. The nodes can then be dragged so that they match their physical location. For example, Microsoft® Visio® drawing and diagramming software can be used to generate a simple floor plan.
ZigBee™ Protocol Tools FIGURE 3-29: NCD WINDOW WITH FLOOR PLAN BACKGROUND When network formation is played back and displayed on the NCD window, the nodes can be moved to the location on the bitmap that represents their physical location. © 2008 Microchip Technology Inc.
ZENA™ Wireless Network Analyzer User’s Guide FIGURE 3-30: FOUR-NODE NETWORK WITH FLOOR PLAN BACKGROUND Repeating the above example, Figure 3-31 and Figure 3-32 show the application message and APS Acknowledge as they are routed through the network. DS51606C-page 50 © 2008 Microchip Technology Inc.
ZigBee™ Protocol Tools FIGURE 3-31: © 2008 Microchip Technology Inc.
ZENA™ Wireless Network Analyzer User’s Guide FIGURE 3-32: DS51606C-page 52 APS ACKNOWLEDGE PATH WITH FLOOR PLAN BACKGROUND © 2008 Microchip Technology Inc.
ZigBee™ Protocol Tools 3.4.5 Analyzing Network Traffic The ZENA Wireless Network Analyzer can provide a great deal of information about device and network operation. The Packet Sniffer window can be used to ensure that messages are appearing on the air as expected, and that the messages have the correct format. The NCD window can be used to ensure the network is formed in the correct manner. The ZENA analyzer can show how messages propagate through the network.
ZENA™ Wireless Network Analyzer User’s Guide NOTES: DS51606C-page 54 © 2008 Microchip Technology Inc.
ZENA™ WIRELESS NETWORK ANALYZER USER’S GUIDE Chapter 4. MiWi™ Wireless Networking Protocol Tools 4.1 INTRODUCTION This chapter describes how to use the MiWi protocol tools provided by the ZENA Wireless Network Analyzer. Both basic and advance monitoring techniques are demonstrated. 4.2 MICROCHIP STACK CONFIGURATION TOOL Microchip provides a freely available Stack as part of application note, AN1066, “MiWi™ Wireless Networking Protocol Stack”.
ZENA™ Wireless Network Analyzer User’s Guide FIGURE 4-1: DS51606C-page 56 ZENA™ STACK CONFIGURATION - MiWi™ PROTOCOL WINDOW, MiWi DEVICE TAB © 2008 Microchip Technology Inc.
MiWi™ Wireless Networking Protocol Tools Using this window, you can configure the following items: TABLE 4-1: MiWi™ PROTOCOL DEVICE CONFIGURATION SELECTION Configuration MAC Address Option Description Each and every MiWi™ protocol device must have its own unique MAC address. The Microchip OUI is provided as a default for development purposes only. For additional information, see AN1066, “MiWi™ Wireless Networking Protocol Stack”.
ZENA™ Wireless Network Analyzer User’s Guide 4.2.2 Specifying Transceiver Information Select the Transceiver tab. FIGURE 4-2: DS51606C-page 58 ZENA™ STACK CONFIGURATION – MiWi™ PROTOCOL WINDOW, TRANSCEIVER TAB © 2008 Microchip Technology Inc.
MiWi™ Wireless Networking Protocol Tools Using this window, you can configure the following items: TABLE 4-2: MiWi™ PROTOCOL TRANSCEIVER CONFIGURATION SELECTION Configuration Option Description Transceiver Select one of the transceivers supported by the Stack. Frequency Band This combo box shows the various available frequency bands of the selected transceiver. If the transceiver supports only one frequency band, that frequency will be displayed and the combo box will be disabled.
ZENA™ Wireless Network Analyzer User’s Guide 4.2.3 Specifying Security Information Select the Security tab. FIGURE 4-3: ZENA™ STACK CONFIGURATION – MiWi™ PROTOCOL WINDOW, SECURITY TAB Using this window, you can configure the following items: TABLE 4-3: MiWi™ PROTOCOL SECURITY CONFIGURATION SELECTION Configuration Option Description Security Capable Only “Residential” mode is currently supported by the Stack. Security Key If the network key is known, enter it here with the “Sequence Number”.
MiWi™ Wireless Networking Protocol Tools 4.2.4 Specifying NWK and MAC Layer Information Select the NWK/MAC tab. FIGURE 4-4: ZENA™ STACK CONFIGURATION – MiWi™ PROTOCOL WINDOW, NWK/MAC TAB This tab is used to configure the NWK (Network) and MAC (Medium Access Controller) Stack layers. Many options on this tab are enabled or disabled based on the “MiWi Device Type” specified on the MiWi Device tab. Many of these options have direct correlation to the amount of RAM required by the application.
ZENA™ Wireless Network Analyzer User’s Guide TABLE 4-4: MiWi™ PROTOCOL NWK/MAC CONFIGURATION SELECTION Configuration Option Description Transmit Buffer Size (bytes) Enter the number of bytes for the largest transmitted message. The largest possible message is 127 bytes. Receive Buffer Size (bytes) Enter the number of bytes for the largest received message. The largest possible message is 127 bytes.
MiWi™ Wireless Networking Protocol Tools 4.2.5 Specifying PIC MCU Information Select the PIC tab. FIGURE 4-5: ZENA™ STACK CONFIGURATION – MiWi™ PROTOCOL WINDOW, PIC TAB This tab is used to configure basic PIC MCU options. TABLE 4-5: MiWi™ PROTOCOL PIC® MCU CONFIGURATION SELECTION Configuration Option Description Target Device Family Select the device family of the application’s target processor. Clock Frequency (Hz) Specify the input clock frequency to the PIC® MCU in Hertz.
ZENA™ Wireless Network Analyzer User’s Guide 4.3 BASIC NETWORK MONITORING Basic monitoring of a MiWi protocol network is nearly identical to that of a ZigBee protocol network. Please review section Section 3.3 “Basic Network Monitoring”. This section will focus on the differences between the two protocols. Select MiWi Tools> Network Traffic Monitor to perform real-time network monitoring or packet analysis of a MiWi protocol network.
FIGURE 4-6: MiWi™ PROTOCOL ASSOCIATION REQUEST AND RESPONSE MiWi™ Wireless Networking Protocol Tools © 2008 Microchip Technology Inc.
ZENA™ Wireless Network Analyzer User’s Guide The various portions of the message are color coded for clarity. The coloring is similar to the ZigBee protocol color coding. TABLE 4-6: MiWi™ PROTOCOL PACKET SNIFFER COLOR CODING Field MAC Header Color White MAC Commands and Beacons Red NWK Header Lime Message Header Yellow Message Data Aqua Security Header and Encrypted Data Blue The MiWi protocol filter options are slightly different from the ZigBee protocol filter options.
FIGURE 4-7: SECURE MiWi™ PROTOCOL PACKETS MiWi™ Wireless Networking Protocol Tools © 2008 Microchip Technology Inc.
FIGURE 4-8: DECRYPTED OR UNSECURE MiWi™ PROTOCOL PACKETS ZENA™ Wireless Network Analyzer User’s Guide DS51606C-page 68 © 2008 Microchip Technology Inc.
ZENA™ WIRELESS NETWORK ANALYZER USER’S GUIDE Chapter 5. MiWi™ P2P Wireless Networking Protocol Tools 5.1 INTRODUCTION This chapter describes how to use the MiWi P2P protocol tools provided by the ZENA Wireless Network Analyzer. 5.2 MiWi™ P2P STACK CONFIGURATION TOOL The Microchip MiWi P2P Stack provides the user with the capability to communicate wirelessly in the star or P2P topology.
ZENA™ Wireless Network Analyzer User’s Guide 5.2.1 Specifying MiWi P2P Protocol Device Information Select the P2P Device tab (refer to Figure 5-1). Refer to Table 5-1 for configuration options for MiWi P2P devices. FIGURE 5-1: TABLE 5-1: ZENA™ STACK CONFIGURATION – MiWi™ P2P PROTOCOL WINDOW, P2P DEVICE TAB MiWi™ P2P PROTOCOL DEVICE CONFIGURATION SELECTION Configuration DS51606C-page 70 Option Description MAC Address Each and every MiWi™ P2P protocol device must have its own unique MAC address.
MiWi™ P2P Wireless Networking Protocol Tools 5.2.2 Specifying Transceiver Information Select the Transceiver tab (refer to Figure 5-2). FIGURE 5-2: ZENA™ STACK CONFIGURATION – MiWi™ P2P PROTOCOL WINDOW, TRANSCEIVER TAB Using this window, you can configure the following items detailed in Table 5-2. TABLE 5-2: MiWi™ P2P PROTOCOL TRANSCEIVER CONFIGURATION SELECTION Configuration Option Description Transceiver Select one of the transceivers supported by the Stack.
ZENA™ Wireless Network Analyzer User’s Guide 5.2.3 Specifying Security Information Select the Security tab (refer to Figure 5-3). FIGURE 5-3: ZENA™ STACK CONFIGURATION – MiWi™ PROTOCOL WINDOW, SECURITY TAB Using this window, you can configure the following items: TABLE 5-3: MiWi™ P2P PROTOCOL SECURITY CONFIGURATION SELECTION Configuration Option Description Security Capable Check this option to enable security features in the MiWi™ P2P Stack.
MiWi™ P2P Wireless Networking Protocol Tools 5.2.4 Specifying NWK and MAC Layer Information Select the NWK/MAC tab (refer to Figure 5-4). FIGURE 5-4: ZENA™ STACK CONFIGURATION – MiWi™ P2P PROTOCOL WINDOW, NWK/MAC TAB This tab is used to configure the NWK (Network) and MAC (Medium Access Controller) Stack layers. Many options on this tab are enabled or disabled based on the “IEEE Device Type” specified on the P2P Device tab.
ZENA™ Wireless Network Analyzer User’s Guide TABLE 5-4: MiWi™ PROTOCOL NWK/MAC CONFIGURATION SELECTION Configuration Option Description Transmit Buffer Size (bytes) Enter the number of bytes for the largest transmitted message. The largest possible message is 127 bytes. Receive Buffer Size (bytes) Enter the number of bytes for the largest received message. The largest possible message is 127 bytes. Indirect Buffer Management This option is only available for FFDs defined in the P2P Device tab.
MiWi™ P2P Wireless Networking Protocol Tools 5.2.5 Specifying PIC MCU Information Select the PIC tab (refer to Figure 5-5). FIGURE 5-5: ZENA™ STACK CONFIGURATION – MiWi™ P2P PROTOCOL WINDOW, PIC TAB This tab is used to configure basic PIC MCU options. TABLE 5-5: MiWi™ P2P PROTOCOL PIC® MCU CONFIGURATION SELECTION Configuration Option Description Target Device Family Select the device family of the application’s target processor.
ZENA™ Wireless Network Analyzer User’s Guide 5.2.6 Generating the Configuration Files When all of the options on the tabs are set appropriately, generate the Stack configuration file by clicking Generate Files. The ZENA analyzer will perform a validity check to ensure that all required fields have appropriate values and all protocol-specific ranges are met. If the validity check passes, the ZENA analyzer will prompt for an output directory for the configuration file, P2PDefs.h.
FIGURE 5-6: ZENA™ MiWi™ P2P PROTOCOL PACKET SNIFFER WINDOW MiWi™ P2P Wireless Networking Protocol Tools © 2008 Microchip Technology Inc.
ZENA™ Wireless Network Analyzer User’s Guide The various portions of the message are color coded for clarity. The coloring is similar to the ZigBee protocol color coding. TABLE 5-6: MiWi™ P2P PROTOCOL PACKET SNIFFER COLOR CODING Field MAC Header 5.4 Color White MAC Commands Red MAC Data Aqua Encrypted Data Blue ADVANCED NETWORK MONITORING Secure MiWi P2P protocol packets appear as shown in Figure 5-7.
FIGURE 5-7: SECURED MiWi™ P2P PROTOCOL PACKETS MiWi™ P2P Wireless Networking Protocol Tools © 2008 Microchip Technology Inc.
FIGURE 5-8: DECRYPTED OR UNSECURE MiWi™ P2P PROTOCOL PACKETS ZENA™ Wireless Network Analyzer User’s Guide DS51606C-page 80 © 2008 Microchip Technology Inc.
ZENA™ WIRELESS NETWORK ANALYZER USER’S GUIDE Index A Additional Connection Payload ................................ 74 Advanced Network Monitoring ......................41, 66, 78 Analyzing Traffic ............................................... 53 Configuration Display Window .......................... 41 Customizing Configuration Display Window ..... 48 Viewing Formation ............................................ 43 Viewing Traffic ..................................................
ZENA™ Wireless Network Analyzer User’s Guide PAN Identifier .................................................... 74 PIC MCU Configuration Selection..................... 75 Pin Assignment ................................................. 71 Receive Buffer Size .......................................... 74 Security Capable............................................... 72 Security Configuration Selection ....................... 72 Security Key ......................................................
Index Profile and Endpoint Specifying ......................................................... 15 Profile/Endpoints Configuration Selection (ZigBee) Device ............................................................... 16 Endpoints .......................................................... 16 Profile Header File ............................................ 16 Protocol Device Configuration Selection (ZigBee) Key Present in All Devices on the Network....... 18 Network Key Present ...........................
WORLDWIDE SALES AND SERVICE AMERICAS ASIA/PACIFIC ASIA/PACIFIC EUROPE Corporate Office 2355 West Chandler Blvd. Chandler, AZ 85224-6199 Tel: 480-792-7200 Fax: 480-792-7277 Technical Support: http://support.microchip.com Web Address: www.microchip.