Daintree Networks 2400E 2.4GHz Sensor Network Adapter User Manual usermanual
Daintree Networks Inc. 2.4GHz Sensor Network Adapter usermanual
User Manual
Sensor Network Analyzer User Guide Version 1.1.1 May 2005 SENSOR NETWORK ANALYZER USER GUIDE Version History Edition Publication Date 1.0 February 2005 1.1 April 2005 1.1.1 May 2005 References [1] [2] [3] [4] [5] [6] [7] IEEE Standard 802.15.4-2003, IEEE Standard for Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for Low Rate Wireless Personal Area Networks (LR-WPANS). ZigBee Network Layer Specification, Version 1.00, ZigBee Alliance. Application Support Sub-layer Specification, Version 1.00, ZigBee Alliance. ZigBee Device Objects, Version 1.00, ZigBee Alliance. Security Services Specification, Version 1.00, ZigBee Alliance. ZigBee Application Framework, Version 1.00, ZigBee Alliance. ZigBee Device Profile, Version 1.00, ZigBee Alliance. DAINTREE NETWORKS PAGE 2 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Table of Contents System Overview ......................................................................................................................................... 5 Installation & Licensing .............................................................................................................................. 6 2.1 Software Installation............................................................................................................................... 6 2.2 Software Activation................................................................................................................................ 7 2.3 Capture Hardware Installation ............................................................................................................... 8 2.4 Connecting the 2400E Sensor Network Adapter .................................................................................. 9 2.5 Configure SNA For Capture Hardware...............................................................................................12 2.6 2400E Regulatory Guidelines ..............................................................................................................13 Sensor Network Analyzer Overview........................................................................................................15 3.1 Major Components ...............................................................................................................................15 3.2 Opening the Example Capture Files....................................................................................................15 3.3 Capture from live network ...................................................................................................................18 Operating the Sensor Network Analyzer .................................................................................................19 4.1 Single and Multi-Node Operation .......................................................................................................19 4.2 Modes of Operation..............................................................................................................................19 4.3 SNA Operating Model..........................................................................................................................20 4.4 Initiating a Capture Session .................................................................................................................21 4.5 Capture Options ....................................................................................................................................23 4.6 Multi-Node Capture..............................................................................................................................24 The Protocol Decoder................................................................................................................................25 5.1 Packet List Window..............................................................................................................................26 5.2 The Packet Decode Window................................................................................................................27 5.3 The Packet Data Window.....................................................................................................................29 5.4 Protocol Decoder Display Filters.........................................................................................................29 5.5 Logging .................................................................................................................................................33 Device Tree ................................................................................................................................................35 6.1 Device Tree Window............................................................................................................................35 6.2 Device Tree Options.............................................................................................................................36 Measurements ............................................................................................................................................38 7.1 Measurements Window........................................................................................................................38 7.2 Context Menus......................................................................................................................................39 7.3 Measurements Options .........................................................................................................................42 7.4 Available Measurements ......................................................................................................................43 Visual Device Tree ....................................................................................................................................45 8.1 MAC Layer Visualization ....................................................................................................................45 8.2 Network Layer Visualization...............................................................................................................46 8.3 Application (APS) Layer Visualization ..............................................................................................50 8.4 Context Menus......................................................................................................................................52 8.5 Visualization Options ...........................................................................................................................56 8.6 Custom Icons.........................................................................................................................................57 8.7 Device Naming Table...........................................................................................................................58 Security.......................................................................................................................................................62 9.1 Security Options ...................................................................................................................................62 DAINTREE NETWORKS PAGE 3 OF 86 SENSOR NETWORK ANALYZER USER GUIDE 9.2 Decoding Encrypted Packets ...............................................................................................................62 9.3 MAC Layer Security ............................................................................................................................63 9.4 NWK Layer Security............................................................................................................................64 9.5 APS Layer Security..............................................................................................................................65 Appendix A: Application Navigation.................................................................................................................67 Appendix B: Capture File Formats.....................................................................................................................71 Appendix C: Protocol Decoder Display Filter Fields........................................................................................74 Appendix D: 2400E Firmware Upgrade ............................................................................................................83 Appendix E: Sensor Network Access Point (Model 2400A) Firmware Upgrade...........................................84 Appendix F: IEEE 802.15.4 Channels and Frequencies ...................................................................................85 DAINTREE NETWORKS PAGE 4 OF 86 SENSOR NETWORK ANALYZER USER GUIDE System Overview Welcome to Version 1.1 of the Daintree Networks Sensor Network Analyzer (SNA). The Sensor Network Analyzer combines a powerful protocol analyzer with network visualization, measurements and diagnostics for IEEE 802.15.4™ and ZigBee™ applications. The analyzer provides automatic display of network formation, topology changes, and router and coordinator state changes allowing rapid detection of incorrect network behavior and identification of device or network failures. The Sensor Network Analyzer works in conjunction with other products in the Daintree Networks Sensor Network product family, like the 2400E Sensor Network Adapter, to provide analysis for small and large networks. With multi-node capture, analysis of large networks across wide areas (such as multiple rooms within a facility) is possible. The SNA application also supports several chipset evaluation boards as capture devices, allowing flexibility in making use of existing development hardware. SENSOR NETWORK ADAPTER SINGLE NODE ANALYSIS MULTI-NODE ANALYSIS USB ETHERNET DEVELOPER AND EVALUATION BOARDS SENSOR NETWORK ANALYZER SOFTWARE Figure 1 DAINTREE NETWORKS SENSOR NETWORK ADAPTERS System Overview PAGE 5 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Installation & Licensing Installation consists of the following steps: • • • • 2.1 Installing SNA software Entering activation code to activate license Attaching capture hardware (Daintree supplied, and/or third party development kit) Configuring SNA software for the specific capture hardware Software Installation To install the SNA software, follow these steps: • • • Make sure you have at least 100 MB of available disk space for a typical installation, Run the SNA install executable - CD Version: Insert the Sensor Network Analyzer CD; the installation starts automatically. If the installation does not start automatically, browse to the CD and manually run Setup.exe, - Downloaded Version: unzip and run the downloaded executable SNA_Setup_v1.1.exe (or applicable file name), Follow the installation instructions: - Read and accept (or decline) the License Agreement (as shown below) If you accept the License Agreement: - Enter User Information, - Accept the default installation location, or choose an alternative location, then proceed through confirmation to begin the install process. , - If you have a previous version of the SNA it will be automatically uninstalled at this time, - The Installation will proceed to completion. As described above, the End User License Agreement is presented at installation time and outlines the full terms and conditions of use. Subsequent to installation, this file can also be viewed in the Daintree Networks\Sensor Network Analyzer installation directory. Once the installation is complete you will be presented with the following screen. It is suggested that you view the readme file at this time, which contains notes specific to this release. Choose to launch the DAINTREE NETWORKS PAGE 6 OF 86 SENSOR NETWORK ANALYZER USER GUIDE program at this time to continue with the activation process. Otherwise run the application at a later time when you are ready to activate. 2.2 Software Activation The Daintree Networks Sensor Network Analyzer requires an activation code to enable the software. Activation consists of an on-line validation of the activation code. Note that the computer on which the software is to be activated must be connected to the Internet during the activation process. If you are upgrading from a previous version of the SNA which was activated under a perpetual license the preexisting activation will be preserved and you will not be prompted for a new activation. The software provides support for a 30 day evaluation license. The evaluation period begins when the activation code is entered. When a license is purchased, a permanent activation code is provided. This will enable activation for perpetual use of the software. The software may be activated for perpetual use during installation, or an evaluation license upgraded during or following an evaluation period. At the end of the evaluation period, and in the absence of a perpetual license, the software will default back to a 802.15.4 MAC and ZigBee NWK layer protocol analyzer providing packet sniffing and decode capability. The unique SNA visualization and measurement features and application layer decodes will not be available. Enquiries related to the evaluation and/or purchase of the Daintree Networks Sensor Network Analyzer software, including access to an activation code, can be made by email to sales@daintree.net, or contact Daintree Networks or a representative directly. For contact details see the Daintree Networks web site at www.daintree.net. When the application is first run you will be presented with an activation screen. Enter either a trial or perpetual activation code and continue. DAINTREE NETWORKS PAGE 7 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Once activated, the software is tied to the PC on which the software was activated. The activation code cannot be used to activate the software on another PC. Questions relating to the use of the licensing mechanisms and activation codes should be sent to support@daintree.net. If you are using the software under an evaluation version of the license you will be presented with an evaluation status screen following activation, and again each time the application is started during the trial period. You may continue the evaluation during the trial period, or enter a perpetual activation code which is supplied when the product is purchased. 2.3 Capture Hardware Installation To capture and analyze packets from a live 802.15.4/ZigBee network, the Sensor Network Analyzer (SNA) must be connected to one or more capture devices. The SNA supports the following capture devices: • Daintree Networks 2400E Sensor Network Adapter. • Daintree Networks 2400A Sensor Network Access Point. Note that the 2400A provides equivalent functionality to the 2400E when used as an analyzer capture device. • Development and evaluation hardware components from a number of third parties, including Chipcon, Ember, Freescale, Atmel and ZMD. Refer to the SNA release notes (readme file viewable within the program file installation directory for a list of supported hardware components). DAINTREE NETWORKS PAGE 8 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Multi-node capture is only supported using the 2400E Sensor Network Adapter. Use of multiple 2400E Adapters enables analysis of a physically distributed network, where one or more devices in the network are outside of the range of a single capture device. To purchase the 2400E contact Daintree Networks or a representative. Contact information can be found at www.daintree.net. Figure 2 Multi-node Capture This User Guide describes how to use the SNA with the Daintree Networks 2400E Sensor Network Adapter. To use one of the chipset vendor evaluation boards as a capture device, consult the appropriate or Daintree Networks SNA Getting Started Guide supplied with the evaluation kit, or Daintree Networks Application Note. Application Notes are available on the web at www.daintree.net or by contacting support@daintree.net. 2.4 Connecting the 2400E Sensor Network Adapter The 2400E Sensor Network Adapter is shown below. The 2400E can be connected to the system using USB or Ethernet. The connections are at the rear of the device, as shown below. Figure 3 Sensor Network Adapter and Connectors DAINTREE NETWORKS PAGE 9 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Adapter Indicators Various indicators provide status information for the adapter. The indicators at the front are as follows: • • POWER will light when powered by means of USB or the DC jack, RADIO ACTIVITY flashes to indicate receipt of packets over the wireless interface on the selected channel, • STATUS will be on and green when the adapter is ready to be used. This LED will turn orange when the adapter is booting or having its firmware updated. It will be red or will not lit should there be some problem with the hardware device Sensor Network Adapter Indicators - Front Figure 4 There are two indicators integrated into the Ethernet connector. • RX / TX indicates activity on the network, • Figure 5 LINK indicates that an Ethernet connection has been established. Sensor Network Adapter Ethernet Indicators Connecting via USB If you connect the 2400E to the SNA PC using USB, the adapter will draw power from the USB connection. The adapter may also be powered using 9V DC power. When a 9VDC source is applied, the 2400E will draw power from that source and not the USB. A multi-country AC adapter is included with the purchase of the 2400E. If installing for the first time, the Found New Hardware wizard will prompt you to install drivers for the new hardware. • Select “Install from a list or specific location” and click Next. • Select “Search for the best driver in these locations”, and “Include this location in the search” and Browse for the Program Files\Daintree Networks\Drivers\2400E (or alternative application installation) directory. • Select Next and the wizard will automatically find and install the required drivers. Note that during installation you will see a Windows warning message “The software you are installing for this hardware: Daintree Networks – 2400E Sensor Network Adapter has not passed Windows Logo testing to verify its compatibility with windows XP.” Click Continue. DAINTREE NETWORKS PAGE 10 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Connecting via Ethernet To connect the 2400E Sensor Network Adapter to the SNA application via Ethernet the 2400E must first be configured for use on the network using one of two methods: • By means of the Device Configuration utility. The Device Configuration utility enables the configuration of the Hostname and IP address of the 2400E. By default, 2400E’s ship with DHCP enabled and the hostname is set to the unit’s serial number. The utility is found under the SNA’s Settings menu. • Manually, by editing the resources.txt file as explained later in this document (‘Configure SNA for Capture Hardware’). The Device Configuration utility is available for the capture device currently selected in the capture device Source drop down toolbar list. The given device may be connected via Ethernet or USB for the purpose of configuration. If there is no currently selected capture device, the Device Configuration utility will not be available. It is recommended that the 2400E be connected via USB if the current IP configuration parameters are unknown. Figure 6 Device Configuration Utility The Device Configuration Utility provides useful information about the current device configuration and allows the user to configure: • • Hostname (Default value corresponds to Device serial number), IP Address - Obtain automatically (using DHCP), or DAINTREE NETWORKS PAGE 11 OF 86 SENSOR NETWORK ANALYZER USER GUIDE • - Define static IP Address, User Defined Location String (to help identify the unit) • Options to update resources.txt (see next section below). NOTE: When using the Device Configuration utility to change the hostname and/or IP address of a Daintree capture device (2400E or 2400A), it is possible for connectivity to the device is lost. This will occur if the IP address is not valid on the current subnet, or if the IP address for a given hostname is changed and a router/gateway/server device caches the previous hostname binding. If IP connectivity is lost to a given device it can be reconfigured by connecting it to the PC via USB. 2.5 Configure SNA For Capture Hardware The resources.txt file is currently used to enumerate hardware available to the SNA. Inclusion of entries for capture hardware you wish to use in conjunction with the SNA is a necessary pre-requisite to it being available to the SNA. The only exceptions to this are capture devices connected via USB, once installed, they will be automatically recognized and do not require an entry in resources.txt. When operating over the Ethernet interface an entry is required to specify the IP address or hostname of the device. The resources.txt file is located in the Daintree Networks\Sensor Network Analyzer directory (or other program installation directory as chosen at installation time). It should also be available through the Start > Program Files menu for the SNA. This file can be edited using your favorite text editor. Resources.txt File Entries Figure 7 File Format The format of each line in the resources.txt file is as follows: MFR TYPE [PARAMS] Where MFR = manufacturer code (DTREE = Daintree Networks) TYPE = capture device type [PARAMS] = device specific configuration parameters DAINTREE NETWORKS PAGE 12 OF 86 SENSOR NETWORK ANALYZER USER GUIDE The resources.txt file also supports the concept of device groups for the purpose of multi-point capture. To nominate the specific devices to be used in a multi-point session, enclose the device identifiers between the following statements: DTREE … DTREE GROUP BEGIN,[Group Name] GROUP END,[Group Name] Where [Group Name] is a user-defined common name for the group of devices, for example “Warehouse”. Note that the commas are required. Multiple groups may be defined in the same file. The same device may be listed multiple times in the same file. To capture using the group, select the group by name from the list of available capture sources. Supported Devices Daintree Networks Sensor Network Access Point Model 2400A Config Format: DTREE SNAP2400A [PARAMS] [PARAMS]: IPAddress | Hostname where IPAddress = IP Address of 2400A Daintree Networks Sensor Network Adapter 2400E Config Format: DTREE 2400E [PARAMS] [PARAMS]: IPAddress | Hostname where IPAddress = IP Address of 2400E Daintree adapters can be referred to by hostname or by IP address. The use of a hostname depends on the ability of the network to respond to address queries for the given hostname based on protocols such as DNS or NetBIOS. If such facilities are not available, the 2400E (or 2400A) can be referred to by its’ IP address. Other third party development kits are also supported. Specific hardware supported is listed in the release notes for the SNA, viewable at install time or by opening the file SNA Read Me.htm located in the application program file directory. Instructions for configuring third party hardware via the resources.txt file are contained in application notes describing how to use the SNA with that specific hardware component. These may be found at www.daintree.net. Using the Device Configuration Utility to Update resources.txt When using the Daintree Networks’ supplied 2400A or 2400E units, the IP address and hostname can be configured using the Device Configuration utility as described in the previous section. When changing the IP address or the hostname, the resources.txt file will be automatically updated with the new device configuration parameters. There is a selection available which allows the user to select whether to update the resources.txt file with the hostname or the IP address. The IP address option is not available if the “Obtain an IP address automatically” option is selected. If the user chooses to define a static IP address the user can choose to write the IP address or the hostname into resources.txt. 2.6 2400E Regulatory Guidelines The Daintree Networks 2400E Sensor Network Adapter is a Low Power Wireless Communications Device and as such is subject to various international regulations with respect to emissions and associated regulatory standards. The product should be installed with a minimum separation distance from persons of 20 cm. Changes or modifications not expressly approved by Daintree Networks could void the user's authority to operate the equipment. DAINTREE NETWORKS PAGE 13 OF 86 SENSOR NETWORK ANALYZER USER GUIDE NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: -- Reorient or relocate the receiving antenna. -- Increase the separation between the equipment and receiver. -- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -- Consult the dealer or an experienced radio/TV technician for help. The 2400E may only be used with the supplied antenna. Use of the device with any other antenna is a violation of FCC rules and will void the user's authority to operate the equipment. DAINTREE NETWORKS PAGE 14 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Sensor Network Analyzer Overview This section provides a brief overview of the Sensor Network Analyzer (SNA) application. Subsequent sections will provide additional detail on each major application area. The Sensor Network Analyzer is a tool for developers of wireless sensor networking technology and applications. A range of hardware devices enable comprehensive network analysis through passive observation from one or more vantage points. The analyzer provides visualization, measurements and packet decodes for IEEE 802.15.4™ and ZigBee™ wireless communications. With device tree visualization, the network structure can be analyzed and changes to the network structure can be observed. Overlaid on the same device tree are routes and application endpoint flows. These allow developers and implementers to rapidly determine how packets are flowing through the network, how alternate routes are used and to analyze end-to-end application-layer connectivity. A measurement system also provides detailed measurements such as packet counts and latency. With integrated diagnostic tools that provide detailed packet-by-packet, field-by-field information, switching between summary visual and measurement information, and detailed protocol information will allow rapid diagnosis of root causes of problems. The Sensor Network Analyzer works in the Daintree Sensor Network family to provide analysis for small and large networks. With multi-node capture, analysis of large networks across wide areas or multiple rooms is possible. The analyzer also supports several chipset evaluation boards to allow flexibility in using available hardware. 3.1 Major Components To get started with the SNA application, launch the application. From the Start menu, choose All Programs, Daintree Networks, Sensor Network Analyzer. Enter activation code as required. You will see each of the major components of the SNA application: • Visual Device Tree window, used to display network topology using a device association tree, • Measurement window, used to display network wide statistics, • Packet List window, used to display a scrolling list of packets, • Packet Decode window, which provides the detailed decode of the selected packet in the Packet List. Each window can be maximized, minimized, hidden, or resized. There are two additional windows that are minimized by default: • Device Tree window, which provides a textual view of the device association tree, • Packet Data window, used to display raw hex dump of the selected packet in the Packet list. All application windows can be reached via the menu items listed in the menu bar along the top of the main application window. Toolbars are available for the most commonly used features. 3.2 Opening the Example Capture Files The best way to learn the key features of the application is to open files from previously captured live networks. This can be done prior to installing capture hardware. Two sample capture files are provided with the standard installation and can be found in the Daintree Networks/Sensor Network/Analyzer/Capture Files directory (or alternative installation directory if chosen): • “topology_and_route.dcf”, which demonstrates the formation of a small network, and • “HCL_demo.dcf”, which demonstrates a simple Home Control Lighting application. DAINTREE NETWORKS PAGE 15 OF 86 SENSOR NETWORK ANALYZER USER GUIDE First Example: topology_and_routes.dcf Use the File -> Open menu item or corresponding toolbar item to open the example “topology_and_routes.dcf” file. This can be found in the “Capture Files” directory. Once the capture playback is complete, you will see the following screen shot: Figure 8 Default screen layout after loading “topology_and_routes” capture file This highlights each of the major components of the application: The Visual Device Tree window shows network topology by means of a device association tree: • Devices are added dynamically based on 802.15.4 Association Response messages, • Routes are displayed on the Visual Device Tree. The number of Routes shown may be varied using the “Show Last N” option available from the Visualization Options or directly from the toolbar, • Routes can be filtered to show only those routes between two devices by selecting (clicking on) the devices on the Visual Device Tree, • A given route can be selected by clicking on the route itself; each of the devices traversed by the given route are highlighted. The Measurements window displays network wide statistics: • Measurements are broken down by Device, Stream (Source/Destination Device Pair), and Route, • Expand the Measurements view to display the full set of available statistics. DAINTREE NETWORKS PAGE 16 OF 86 SENSOR NETWORK ANALYZER USER GUIDE The Packet List window shows a scrolling list of packets: • The selected Packet from the Packet List is shown in the Packet Decode window, • There is an additional Packet Data window (hidden by default) that shows a raw hexadecimal and ASCII dump of the selected packet, • A Filter can be applied to the Packet List to display only packets matching a given criteria (typically the value of one or more protocols fields), • Filters can be defined from the Filters menu, Filters Toolbar or by right-clicking on a protocol field in the Packet Decode window. Second example: HCL_demo.dcf Open the file “HCL_demo.dcf”, which is located in the same Daintree Networks\Sensor Network Analyzer\Capture Files directory. After opening this file, the SNA will look like the following screen shot. Figure 9 Default screen layout after loading “HCL_demo” capture file This file contains additional application layer endpoint information. This reveals additional information in the Visual Device Tree and Measurements windows. In particular: The Visual Device Tree window contains an extra layer of information corresponding to APS endpoints: The lines linking the endpoints represent the flow of APS messages between endpoints and typically correspond to APS layer bindings, • Endpoint 0 represents the ZigBee Device Object (ZDO) on each device, and the lines linking them represent ZDO messages between devices. There is an option available to turn off the display of ZDO endpoints and bindings to reduce clutter on the screen, • DAINTREE NETWORKS PAGE 17 OF 86 SENSOR NETWORK ANALYZER USER GUIDE • A line directly linking a non-zero endpoint corresponds to a direct binding from source to destination, • The “INDIRECT” endpoint is used to indicate the flow of indirectly addressed packets to and from the ZigBee coordinator. This does not correspond to an actual APS endpoint, • Lines linking endpoints to and from the logical “INDIRECT” endpoint, show the flow of indirectly addressed APS packets from source endpoint to coordinator and coordinator to destination endpoint, • Bindings to and from a given endpoint can be filtered by selecting (clicking on) an endpoint, • A Binding can be selected by clicking on the line linking two endpoints, • The Application layer profile and clusters corresponding to a given binding are shown when the binding is selected. The Measurements window is extended with the list of endpoints detected on each device. 3.3 Capture from live network To setup the Sensor Network Analyzer application to capture from a live capture device, follow the following steps: • Ensure required capture hardware has been installed and configured (refer to the installation section earlier in this document). • Select Capture Device from list of available capture devices, • Select Channel, • Start Capture. Select the Capture Source from the list of available devices as shown below. If the given device is not shown but it has been added to the resources.txt and connected to the PC, click the antenna like icon search for capture devices. If the device is correctly connected it will be shown in the list of available devices. to Select channel Select Capture Device Figure 10 Start Capture Selecting Capture Source Select the Channel from the drop down list of available channels. The list of channels will automatically update based on the available frequency range. Start Capture using the Capture -> Start menu item or using the start button on the main toolbar. If the Auto Start option is selected the Measurements will automatically start when capture starts. Measurements may be started and stopped independently of the capture. Restarting measurements clears all statistics from the measurements window, and clears all routes and endpoint bindings from the Visual Device Tree. DAINTREE NETWORKS PAGE 18 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Operating the Sensor Network Analyzer 4.1 Single and Multi-Node Operation One of the key differentiating features of the Sensor Network Analyzer over basic “sniffers” is its multinode capability. This is important for the following reasons. The low power nature of 802.15.4-based wireless sensor radios means that there transmission range is relatively limited. With the help of the ZigBee networking protocol, the fact that such devices can link with each other and forward traffic on behalf of one another helps overcome what would otherwise be a major limitation. Nevertheless, from a passive analysis point of view this provides a significant challenge. It is important that an analyzer operating in as a passive observer of the network to be able to see all communications between devices. The SNA addresses this by enabling multiple capture devices (observational points) to be networked together to provide a complete view of network activity. The analyzer is able to both synchronize traffic streams from Daintree’s capture devices, and filter out duplicate packets, and in so doing create a composite and correctly time ordered sequence of packets representing the overall network traffic. It is very important that for reliable analysis, sufficient capture devices be placed around the network to observe all traffic. Failure to do so may lead to missing transactions resulting to incorrect conclusions being drawn about network activity. For example, a device association not observed during network formation may result in significant inaccuracies in the network topology represented. For more information on capture device placement and conditions which may lead to loss of multi-node synchronization, contact Daintree Networks directly. 4.2 Modes of Operation The SNA is able to operate in two modes: • Live network analysis; • Post-analysis using logs of previously captured live traffic. DAINTREE NETWORKS PAGE 19 OF 86 SENSOR NETWORK ANALYZER USER GUIDE 4.3 SNA Operating Model Capture Hardware Live Network Capture Source and Channel Selection Capture Controls Start, Pause, Stop Capture File Logging Controls Protocol Decoder Display Filters Enable/Disable Table of Devices Packet List Device Tree Packet Data Packet Decode Measurements DAINTREE NETWORKS Measurement Controls Visual Device Tree PAGE 20 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Figure 11 SNA Operating Model The available controls include: • Start/Stop Capture: this is the master control whether the analyzer is capturing from a live network or replaying a previously saved capture. When capture is started, ALL data from a previous capture is cleared including the Packet List, the Device Tree and any measurements, • Enable/Disable Device Tree: this will enable/disable the Device Tree, Measurements and Visualization. However it is independent of the Packet List, • Start/Stop Measurements: this will stop and stop the collection of measurements and much of the derived information (NWK layer routes, APS layer bindings) that are used to populate the Visual Device Tree. For a given capture session, measurements can be stopped and restarted multiple times. Subsequent sections of this User Guide will describe each of these components and their corresponding window in more detail. 4.4 Initiating a Capture Session A capture session is a discrete and continuous period of time during which all air interface activity is captured to memory and displayed (subject to any display filters in effect). A capture session can be initiated and controlled by means of the Capture Menu or the Capture Toolbar. All incoming data during a capture session can be logged to disc as it arrives. Alternatively, the capture data can be saved to a log file post-capture. In this way it can be retrieved and analysed at a later time. Note that while the results from a previous capture session are open within the viewer a new capture session cannot be initiated. Figure 12 Capture Menu Each of the Capture Menu items is described below: Select Source… Allows selection of a capture source through a dialog box. The dialog box includes the search button, drop down list of sources and channel selection. Start Capture Starts capture operations from the selected device. Pause Display Toggles the updating of the display of captured data, allowing the user to check through the data whilst the capturing continues. Stop Capture Stops capture operation. DAINTREE NETWORKS PAGE 21 OF 86 SENSOR NETWORK ANALYZER USER GUIDE The most common capture controls are also available from the Capture toolbar. Figure 13 Capture Toolbar Each of the capture menu and toolbar items is described below. Select Source Select Source enables selection of the source for the capture session. If there is a capture operation in progress, this menu item is disabled. Otherwise it results in a dialog box as follows. The Source drop down list will list all available capture devices. Otherwise, after selection of a capture device, a specific channel may be selected from the drop down box. The channel will default to the first channel in the band. The dialog box also includes a Search for Capture Devices button (see below). (Search for Capture Devices) Results in an operation whereby new capture sources are identified. Refer to the sections of this manual detailing hardware configuration for more information. Channel Enables selection of the receive channel by means of a drop down list. The channel number is shown in both decimal and hexadecimal. Note that only valid channels for the specific source device are listed. The frequency of the selected channel is displayed adjacent to the channel number. If the Resource Manager has been launched and is active then this button will be disabled. Start Capture Begins a new capture session. If there is no capture source selected or if a capture operation is already in progress this menu item is disabled. Whether or not the display is cleared at the start of the capture session is determined by application configuration settings. To erase the existing display contents at the start of a new capture session, enable ‘Clear Display on Capture Start’ on the Capture tab of the Options panel in the Settings. Pause Display This will not pause the capture session itself, but will ensure that incoming packets are not presented via the display. This can be useful for studying existing display contents without the distraction of updates being presented. If there is no capture operation in progress, this menu item is disabled. Clicking the ‘Pause Display’ toolbar button again will result in the display being updated with all received information since the pause began. Stop Capture Clicking on this toolbar button (or selecting the action from the Capture Menu) terminates the capture session. If there is no capture operation in progress this menu item is disabled. DAINTREE NETWORKS PAGE 22 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Frames: 4.5 Displays the total number of frames received since the capture session began. Note that this may be different to the number displayed in the packet list if the user chose not to clear the display when the capture session was initiated, or if filters have been applied. Capture Options The capture options dialog is as shown below. Figure 14 Capture Options The following options are available: Clear Display on Capture Start To erase the existing display contents at the start of a new capture session. Include FCS Errors If enabled, packets with FCS errors are forwarded to the Packet List, otherwise they are discarded. If enabled, the Packet List will automatically scroll to show the latest packets as they arrive. This option is also available on the Capture Toolbar. Auto Scroll Open Capture File with Original Timestamps DAINTREE NETWORKS When a capture file is saved, it is saved together with a marker indicating the time at which each of the packets arrived. This option allows the capture file to be played back at a the same rate as the original capture from the live network. Furthermore there is an additional option to replay at an integer multiple of the normal rate to speed up the playback. If this option is not enabled captured packets are played back at the maximum rate possible. PAGE 23 OF 86 SENSOR NETWORK ANALYZER USER GUIDE 4.6 Multi-Node Capture Multi-node capture is available by setting up a node-group in the resources.txt file as shown below. Figure 15 Multi-node Capture Setup Multiple groups may be defined in the same resources.txt file. Furthermore the same device may be defined multiple times in the same resources.txt, potentially appearing in multiple groups. Figure 16 Multi-node Group Selection A multi-node group may then be selected as the current capture source. Once selected, packets from each of the nodes will be correlated together and presented to the SNA application as a single stream of packets for decode and analysis. DAINTREE NETWORKS PAGE 24 OF 86 SENSOR NETWORK ANALYZER USER GUIDE The Protocol Decoder Together the Packet List, Packet Decode and Packet Data windows provide a comprehensive protocol decoder for 802.15.4 and ZigBee networks. Packet List Window Lists received packets sequentially with summary information. Packet Decode Window Displays the decoded structure of an individual packet. Packet Data Window Displays the packet data itself in hexadecimal and ASCII. DAINTREE NETWORKS PAGE 25 OF 86 SENSOR NETWORK ANALYZER USER GUIDE 5.1 Figure 17 Packet List Window Packet List Window The Packet List shows packets received sequentially, in the time order they were received. Display filters can be used to define a subset of received information for display. For example, only MAC command frames may be displayed. Each individual packet is listed on a separate line, and includes summary information for that packet. Selecting a packet in the list (by clicking on it) will result in a decode of that packet appearing in the Packet Decode window if open. The packet list can be scrolled through using the up and down arrow keys. The available summary fields are as follows. The user can control which fields are shown (fields that are disabled by default are highlighted as such in the table below). Src PAN Src Dest PAN Dest Index (sequence) number of the packet. The index is initialized to 1 at the beginning of a capture session. Note that indices are assigned to all packets received, so an index omitted in this list will be indicative of a filter being applied. Time at which the packet was received, as provided by the capture device. The format is ‘seconds.microseconds’ where ‘seconds’ is the time in seconds since midnight, January 1, 1970, and ‘microseconds’ is an offset in microseconds from this time. The MAC Source PAN field (disabled by default) The MAC source address field. The MAC Destination PAN field (disabled by default) The MAC destination address field. MAC Seq No NWK Src NWK Dest The MAC Sequence Number (disabled by default) The NWK source address field. The NWK destination address field. NWK Seq No APS Src EP APS Dest EP APS Profile APS Cluster AF Seq No Protocol The NWK Sequence Number (disabled by default The APS Source Endpoint (disabled by default) The APS Destination Endpoint (disabled by default) The APS Profile ID (disabled by default) The APS Cluster ID (disabled by default) Application Frame Sequence number (disabled by default) The appropriate protocol layer corresponding to the packet. All packets will be decoded to the maximum extent possible, unless protocol layer Index Time DAINTREE NETWORKS PAGE 26 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Packet Type decoding is disabled through the Protocols Menu. The actual packet type. For example, ZigBee NWK layer packet types may be ‘Command’ or ‘Data’. The list of summary fields can be manipulated using the Packet List Options dialog available from the Settings -> Options menu item. Figure 18 5.2 Packet List Options The Packet Decode Window The Packet Decode window shows the decoded structure of the packet currently selected in the Packet List window. DAINTREE NETWORKS PAGE 27 OF 86 SENSOR NETWORK ANALYZER USER GUIDE The decode appears as an expandable tree. The state of each node defaults to ‘collapsed’ when the application starts. Clicking on a node (the [+] or [-] symbols) will expand or collapse that branch of the tree accordingly. The application will remember which nodes in the decode tree have been expanded. As subsequent packets are selected, the same expanded or contracted state of equivalent nodes will be carried over, provided they are contained within the packet. Figure 19 Packet Decode Window Right-clicking on a node inside the Packet Decode tree brings up the context sensitive menu. Figure 20 Packet Decode Context Sensitive Menu Expand/Collapse Expands or Collapses the current level of the tree Add to Filter… Opens the Define Filter… dialog with a pre-defined filter based on the highlighted field and its current value. Copy As Text Copy the requested text to the Clipboard for pasting into another application (e.g. text editor) DAINTREE NETWORKS PAGE 28 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Expand/Collapse All Expands of Collapses the entire decode Selecting particular fields within the Packet Decode window will cause the packet data corresponding to that field to be highlighted in the Packet Data window when that window is displayed. 5.3 The Packet Data Window The Packet Data window displays all data contained within the packet in its raw hexadecimal and ASCII form, 16 octets per line. The first column is an index of octet numbering. Packet data corresponding to a field which has been selected within the Packet Decode window will be highlighted. Figure 21 Packet Data Selecting particular bytes in the Packet Data window will automatically highlight the corresponding fields in the Packet Decode window. 5.4 Protocol Decoder Display Filters Display filters provide a means of pre-selecting the types of packets displayed within the Packet List (and hence Packet Decode and Packet Data) windows. This can be useful when wishing to observe particular device or network activity, for example, only NWK layer commands initiated by a particular device. Display filters invoke filtering for display purposes only. In other words they limit what is displayed according to the conditions specified by the filter. Defining and applying a filter will not result in data accumulated within a capture session to be discarded. When a display filter is removed, the Packet List window will revert to containing all received packets during that particular capture session. Display filters are applied to the protocol decoder windows only. They do not provide filtering for measurements or visualization. Defining Filters Several methods are available to define a filter. • Using the Filter Menu or the Filter Toolbar (if displayed). See below. • By right clicking on a field within the Packet Decode window. Right clicking on a field within the Packet Decode window will provide an option to define a new filter using that field by means of the ‘Define Filter’ menu item. Selecting this will launch the Define Filter dialog box with the field in question pre-selected. Filter Menu and Filter Toolbar The Filters Menu may be used to define the filter conditions. DAINTREE NETWORKS PAGE 29 OF 86 SENSOR NETWORK ANALYZER USER GUIDE This menu item brings up the ‘Filters’ dialog box. If a capture operation is in progress, this menu item will be disabled. Define… Filters may also be defined using the Filters Toolbar. In addition, the Filters Toolbar allows Filters to be applied or reset. Indicates any display filter currently applied. If no filter is active then the field will be blank. A drop down list can be used to retrieve recently defined filters. An existing filter may be edited or a new filter typed or pasted into this toolbar field. Filter: This drop down list will display the filter as it is being created and will also allow the user to manually update the filter string. The user will also be able to choose from the drop down list any of the last 10 defined filters. Reset Filter Disables any currently active filtering, clearing the Filter field in the Filter Toolbar. Apply Filter Applies a filter which has just been defined. Define Filter Opens the filter definition window, enabling construction of a new filter. Note that when filters are active the display window titles will be appended with ‘Filtered’. Filter Expressions Filters may be specified to varying degrees of complexity, as described below. Simple Filters A simple filter is a conditional relationship between a single protocol field and some defined value, expressed in the format ( FIELD field operator VALUE ), where FIELD is the name of a specific protocol field. Valid field names and their descriptions are listed in an appendix to this document. field operator is a comparator which can be one of the following == != <= Equal to Not equal to Less than Greater than Less than or Equal to DAINTREE NETWORKS PAGE 30 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Greater than or Equal to >= VALUE is a constant Example: ( mac-layer.seqNo == 170 ) Note that simple filter expressions are required to be bracketed. Compound Filters A compound filter consists of two or more simple filter conditions conjugated in the following manner ( ( SIMPLE FILTER ) append operator ( SIMPLE FILTER ) ) where append operator is a comparator which can be one of the following && || Example: And Or ((mac-layer.seqNo == 170) || (mac-layer.seqNo == 87)) As with simple filters, compound filter expressions are required to be bracketed. Multi-Stage Filters Typical syntax for multi stage filters: ( ( SIMPLE FILTER ) append operator ( SIMPLE FILTER ) append operator ( SIMPLE FILTER ) ) ( ( SIMPLE FILTER ) append operator ( COMPOUND FILTER ) ) ( ( COMPOUND FILTER ) append operator ( SIMPLE FILTER ) ) ( ( COMPOUND FILTER ) append operator ( COMPOUND FILTER ) ) Example: ((mac-layer.seqNo == 170) || (mac-layer.seqNo == 87) && ( mac-layer.fcFrmType == 0)) Again, multi-stage filter expressions are required to be bracketed. The Define Filters Dialog Box The Define Filters dialog box may be launched from the Filter Menu, Filter Toolbar or from within the Packet Decode window. The appearance and use of the define filters dialog box is described below. Refer to the information above concerning filter expressions for more information on field operators and append operators. DAINTREE NETWORKS PAGE 31 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Field Name The name of a specific protocol field in shorthand notation. Valid names are listed later in this manual. The protocol field name may be typed or pasted. Alternatively, it may be selected from the drop down list, which contains all possible field names. When the define filter dialog box is launched from the Packet Decode window using the right click it will be preloaded with the relevant filter name. When launched from the Filter Menu or Filter Toolbar it will default to blank. Field Description Is a textual description of the protocol field shown in Field Name above it. This is an informational display only, but does allow a protocol field to be chosen from the drop down list, providing a more meaningful field description. If a protocol field is chosen from this drop down list, it’s shorthand notation will be shown in Filed Name above it, replacing any previously selected field name. Comparator Is the field operator described above in the reference information on filter expressions. A comparator may only be selected from the drop down list. Value A constant, being the VALUE described in the reference information on filter expressions above. This text field will allow the user to enter the protocol field value against which the comparison is to take place. Append using This button will append the currently defined filter onto the end of the preview string using the selected operator as the append operator. This allows the user to build compound filters. Valid operators are && (and) and || (or), chosen from the drop down list. Apply This button will replace the contents of the preview string with the defined simple filter. Preview This drop down list will display the filter as it is being created and will DAINTREE NETWORKS PAGE 32 OF 86 SENSOR NETWORK ANALYZER USER GUIDE also allow the user to manually update the filter string. The user is also be able to choose from the drop down list any of the last 10 defined filters. OK Accept the filter and close the dialog. If the filter has changed this will apply the new filter and make it active. Cancel Closes the dialog, causing any changes to be discarded. 5.5 Logging If enabled, logging saves incoming packets as they are received as a background activity, automatically and transparently to the user. An alternative to logging is to save a capture session to a log file at the end of that session. Logging options are available from the Settings -> Options Menu item as shown below. Figure 22 Logging Options Each of the available options is described below: Enable Logging Background logging will not occur unless this box is checked. If logging is disabled, all remaining fields in this tab will be inactive. The application will initially default to logging disabled. Open log file for each This radio button selection allows the user to determine whether the log file logic is executed once only at application start up time or each time a capture session is started. If ‘Application session’ is selected, one log file will be created, consisting of all data including that from multiple capture sessions. If ‘Capture session’ is selected, a new log file will be created at the start of each capture session. That is, the log file is opened concurrent with a Start Capture operation, and closed when a Stop Capture operation DAINTREE NETWORKS PAGE 33 OF 86 SENSOR NETWORK ANALYZER USER GUIDE occurs. Prompt for filename If checked, each time the application launches or a capture session is initiated (depending upon the ‘Open log file for each’ preference) the user will be prompted to manually enter a log file name. Filename Specifies the log file name. If ‘Prompt for file name’ is selected this field will be disabled and its contents ignored. The file extension defaults to .dcf unless otherwise specified, and assumes default text format. Refer to the description of capture file formats later in this document for more information. The contents of this field will default to the last filename specified even if it is from a previous application session. To enable automatic unique file name creation facilitating completely automatic background operation, the file name may be constructed from or appended with date and time descriptors. For example, specifying c:\temp\mycapturefile_%M%D%Y_%h%m%s.dcf would result in a log file name of the format c:\temp\mycapturefile_08272004_140312.dcf. When an existing log file is opened This radio selection will allow the user to specify what happens to an existing log file of the same name when the log file logic is executed. If ‘Overwrite’ is selected the log file will be overwritten without warning. If ‘Append’ is selected the log file is appended with new data. DAINTREE NETWORKS PAGE 34 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Device Tree The Device Tree offers a network and device-centric view of an 802.15.4 or ZigBee network. It automatically detects network formation, reports changes to the network structure and notifies of the states of individual devices in the network, especially with regard to formation. The Device Tree is created from the same packet stream, using the same live capture packets or opened capture file as the Protocol Decoder Windows. Note that Protocol Decoder Display Filters have no affect on the Device Tree (or for that matter, measurement or visualization windows). 6.1 Device Tree Window The Device Tree window displays the network topology by observing 802.15.4 ASSOCIATION-Response messages. It provides a tree-view of the network topology, as shown below. Short Address Field Long Address Field Information Field Figure 23 Device Tree Window The Device Tree provides topology information for multiple PANs, and within each PAN, each device’s long and short addresses, and the device hierarchy. An additional information field is provided which may display: • If the device is accepting associations • If the device has reassociated to another location in the device tree. • Disassociated devices are shown in a separate section. Each level of the tree may be expanded or collapsed as implied by the tree display format. The Device Tree window will be updated only when a change occurs to the table, but no more often than once a second. DAINTREE NETWORKS PAGE 35 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Figure 24 Device Tree - with Dis-associations and Re-associations NOTE: The Device Tree uses MAC layer Association Response messages to detect new devices joining the network. As such it is important for the capture session to begin when the network is formed such that it detects these association messages. If a capture session is started after the formation of the network, the Visual Device Tree will not be displayed. 6.2 Device Tree Options The Settings -> Options menu item contains a Devices tab. DAINTREE NETWORKS PAGE 36 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Figure 25 Devices Options The first option is a checkbox option to disable the Table of Devices. This will default to “Enabled”. If “Disabled”, the Table of Devices will not process any subsequent packets, and this will disable all measurements and visualization features which are dependent on the Table of Devices. Under normal operation, when disabled, the Table of Devices simply slaves off the capture system controls. The other options associated with the Table of Devices are concerned with coordinator detection. Coordinator detection is complicated by the fact that there is no message defined in 802.15.4/ZigBee networks that carries both the short and long address of the coordinator. The Device Tree component typically requires the first device that associates with the coordinator to be a Router device. It uses detection of the Short Address of 0x0001 to identify such an association. If instead an End-Point device, with short address other than 0x0001, joins the coordinator the default algorithm used to identify the coordinator and device tree may be unreliable. To overcome this issue the user should define a User Defined Coordinator, or set the Cskip parameters in the Device Options (Options menu, Devices Tab). When using the User Defined Coordinator, the SNA will look for the device with the supplied long address and when detected configure it as the coordinator with address 0x0000. When using the CSKIP based approach, the SNA will calculate which short addresses the coordinator may assign to its children and if its see one of those addresses being allocated it assumes the parent device is the coordinator with address 0x0000. DAINTREE NETWORKS PAGE 37 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Measurements 7.1 Measurements Window The measurement system provides summary information on the state of devices, streams and routes. Figure 26 Measurements Window The Measurements window is a multi-column display with the first column containing an expandable/collapsible tree that will adjust the display (ie., show/hide) for the entire row (across all columns). The hierarchy supported in the tree is PAN, device, stream, route type, and route. All but the route can be expanded and collapsed. A Stream is defined as all packets transmitted at the NWK layer between two devices. A Route is defined as a unique sequence of nodes traversed by a given stream of packets. Hence a stream will be comprised of one or more routes. Packets on a given route are tracked using the Source device and the NWK layer sequence number. Route Types A number of route types are supported. These include: Route Type Description SUCCESSFUL A given packet correctly arrived at its destination and all hops from source to destination device were detected. A given packet correctly arrived at its destination but some hops were not detected and the analyzer cannot be 100% sure of the path taken by the packet. For this route type, the first hop was detected. MALFORMED MALFORMED-S DAINTREE NETWORKS A variant of the MALFORMED route where the first hop was not detected. PAGE 38 OF 86 SENSOR NETWORK ANALYZER USER GUIDE REROUTE FAILED For packets that arrive at the destination but via a re-route. A given network layer packet was detected at one or more hops but the packet was not detected arriving at its intended destination. Note the comments on multi-node capture earlier in this user guide for appropriate configuration of the system and placement of capture hardware. Start/Stop Controls The Measurement System is provided with an additional set of start/stop controls. This enables multiple measurement sessions within a single capture session (the Start/Stop capture controls provide the overriding capture controls for the analyzer). When the measurement system is turned on, any existing measurements will be flushed (set to zero). Measurements will be taken from the time it is turned on. The measurement system cannot be turned on (and its controls must be disabled) if the capture system is off. For more information see the chapter on operating the SNA, earlier in this user guide. When a logfile is loaded, the measurement system is turned on automatically. There is an option to disable this Auto-Start feature in the measurements tab of the Options dialog box. The Measurement System is subject to a sampling interval that determines how often the measurements are updated. The sampling interval is set to 1 sec by default but can be changed to any integral number of seconds. When Measurements are stopped, the current sampling interval is completed and the measurements updated. The Measurement Start/Stop controls, sampling interval and Auto-Start selection are available from the Measurement Toolbar. Figure 27 7.2 Measurements Toolbar Context Menus Each level of the Measurements hierarchy provides a unique right-click context menu. Context menus enable the selection (and highlighting) of corresponding items in the Visual Device Tree, or provide shortcut packet filter operations to filter the packets shown in the packet list based on the selected item in the Measurements View. Different context menu items are available for different items. Device Context Menu The Device Context menu is available by right-clicking on a device in the measurements window. Figure 28 Device Context Menus DAINTREE NETWORKS PAGE 39 OF 86 SENSOR NETWORK ANALYZER USER GUIDE The following context menus are available: • MAC Layer Filters to match all packets where the selected device is the Source, Destination, or either (this will match both short and long addresses), • Mac Layer Filter to match when this device has participated in the MAC layer association sequence; this is useful to debug network formation issues, • NWK Layer Filters to match all packets where the selected device is the Source, Destination, or either. Stream Context Menu As described earlier, a Stream represents all of the Network layer packets flowing between two devices. At the stream level the following context menus are available. Figure 29 Stream Context Menus The following context filters are available: • NWK Layer Filters to match all packets corresponding to this stream i.e. between the given source and destination, • Select Visual -> Source and Destination option to highlight the given source and destination device in the Visual Device Tree. Route Context Menu As described earlier, a Route represents all of the Network layer packets flowing between two devices along a given path (identified by the sequence of nodes traversed by the packets). The Route Context Menu is available by right-clicking on a Route in the Measurement window. Figure 30 Route Context Menus The following context menus are available: DAINTREE NETWORKS PAGE 40 OF 86 SENSOR NETWORK ANALYZER USER GUIDE • NWK Layer Filters to match all packets corresponding to the associated stream i.e. between the given source and destination, • Select Visual -> Source and Destination option to highlight the given source and destination device in the Visual Device Tree • Select Visual -> Route to select and highlight the corresponding route in the Visual Device Tree. APS Binding Context Menu An APS Binding represents all of the APS layer packets flowing between two APS end-points on two different devices. The APS Binding context menu is available by right-clicking on an APS binding in the Measurements window. Figure 31 APS Binding Context Menus The following context menus are available: • NWK Layer Filters to match all packets corresponding to the associated stream i.e. between the given source and destination, • APS Layer Filters to match packets flowing from the Source Endpoint and/or to the Destination Endpoint • Select Visual -> APS Binding to select and highlight the corresponding APS Binding in the Visual Device Tree. APS Cluster Context Menu An APS Cluster identifies a specific class of Application layer attributes being exchanged by two APS endpoints on two different devices. The APS Cluster Context Menu is available by right-clicking on an APS Cluster in the Measurements window. DAINTREE NETWORKS PAGE 41 OF 86 SENSOR NETWORK ANALYZER USER GUIDE APS Cluster Context Menus The following context menus are available: Figure 32 • APS Layer Filters to match all packets on the given cluster between the given source device/endpoint and the given destination device/endpoint. Expand Context Menu The Expand right-click context menu is available for the entire Measurements Window and is not specific to different levels of the measurement hierarchy. The Expand menus determine to what level the Measurements hierarchy is expanded and collapsed and hence determines what is shown at any point in time. Figure 33 Expand Context Menus The following context menus are available: • Expand Devices will show the device level but collapse all others, • Expand Streams will show Devices and Streams but collapse routes and APS Endpoints, • • Expand Routes will show Devices, Streams and Routes, but not APS Endpoints, Expand Endpoints will show Devices, Streams and APS Endpoints but not Routes, • Expand All will show everything. 7.3 Measurements Options There is an Options tab in the Options dialog available from the Settings -> Options menu item. DAINTREE NETWORKS PAGE 42 OF 86 SENSOR NETWORK ANALYZER USER GUIDE This provides an alternate location for setting the sampling interval and for selecting the Auto-Start feature. The Options dialog also provides for setting of a “Route Detection Timeout”. This is the amount of time in seconds during which the Analyzer will wait for all hops of a given route to be detected. If at the end of the route detection timeout the final hop has not been detected the given Route will be marked as FAILED. Routes are timed out at the end of each sampling interval if it has been longer than the Route Detection Timeout since the last packet was detected on the route. The “Display User Labels” option will show user labels for devices shown in the Measurements view based on the label defined in the Device Naming Table (see later section). If selected the user label will be shown instead of the devices long address. This option is disabled by default. 7.4 Available Measurements Transmission Measurements Device Stream Status ReTx Ratio Yes RSSI Min Yes RSSI Avg Yes RSSI Max Yes Retransmission ratio: the proportion of retransmitted packets detected RSSI values are as reported by the Capture Device for each packet. Basic Packet Measurements Uni Tx Uni Rx Yes (MAC) Yes (NWK) Yes (MAC) Yes (NWK) Uni Loss Bcst MAC Yes Bcst NWK (Tot) Yes Bcst NWK (Unique) Yes Yes (NWK) DAINTREE NETWORKS PAGE 43 OF 86 SENSOR NETWORK ANALYZER USER GUIDE All of these are running in Alpha-1 (except for UNI Loss) These measurements are basic counts that do not do any route tracking. They simply count on the basis of packets transmitted from source (MAC or NWK) and packets received at destination (MAC or NWK) Route Discovery Measurements RReq RRep Rrep Cost Rerr Yes Yes Yes Yes Packet Performance Measurements Stream Simple Reroute Malformed Failed Status Notes Tx Rx Loss SeqErr Duplicate BitErr Count Count Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes* Yes Yes Yes Yes** These measurements are all reliant on the use of a unique sequence number, identifying the packet uniquely transiting through the network. The four types of routes are : Simple (normal transmission through the network), Reroute (one or more reroute occurred), Malformed (missing hops or did not see initial transmission) and Lost (packet did not arrive at destination, or did not see last hop) * Tx count may be less than Rx count. ** By definition, Rx count = 0 and Loss = 100%. Latency Measurements Stream Simple Reroute Malformed Failed Status Delay Min Yes Yes Yes Yes* Delay Avg Yes Yes Yes Yes* Delay Max Yes Yes Yes Yes* Latency measurements are only possible for packets that were detected through their final hop. DAINTREE NETWORKS PAGE 44 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Visual Device Tree The Visual Devices Tree Window provides a graphical rendition of network topology and information flows between devices. Figure 34 8.1 Visual Device Tree MAC Layer Visualization In its most basic form, the Visual Device Tree Window provides a graphical tree diagram that represents the latest device association tree. This corresponds to the Device Tree Window contents. Devices are shown as circles (or icons as described below) with links between them corresponding to each MAC layer association. Devices are labeled with the Short Address. Fly-over help is available for each device which displays the long IEEE address. The Visual Device Tree Window displays the device association tree for a single PAN at a time. The current PAN ID will be shown in a rectangle as the root of the tree. Right clicking on the PAN ID will allow the user to select from a list of available PANs. The window has a resize option which can be useful for optimizing the visibility of various sized networks. The user may choose from large, medium and small devices and fonts. This essentially provides a three level zoom-in and zoom-out capability. This selection is available from the toolbar and by right-clicking anywhere in the Visual Device Tree window. If the network is too large to fit in the current window scrollbars will appear enabling the user to scroll around the diagram. DAINTREE NETWORKS PAGE 45 OF 86 SENSOR NETWORK ANALYZER USER GUIDE NOTE: The Visual Device Tree uses MAC layer Association Response messages to detect new devices joining the network. As such it is important for the capture session to begin when the network is formed such that it detects these association messages. If a capture session is started after the formation of the network, the Visual Device Tree will not be displayed. Reassociations In 802.15.4 networks it is not uncommon for a device to lose its association and reassociate with another device in the tree. For these reassociated devices, the previous location in the tree is shown in grey (for the default application icons). There is a grey arrow linking the old location to the new location in the tree with an arrow head indicating the old and new location. A chain of linked re-associated nodes is used to display multiple reassociations of the same device. A configuration option is available to hide re-associated nodes and an additional option to disable the reassociation arrows (which is only available if the user chooses to show the reassociated nodes). Reassociated nodes can only be hidden if they do not have any active children. The following demonstrates the appearance of a Reassociation, where device previously a child of 0e3b assigned short address 0e3c has reassociated elsewhere as 0196. Visual Reassociations Note that inactive devices, such as a device that has been powered off or removed, will reassociate if reintroduced to the network, but will remain displayed until such a reassociation occurs. As such it is often difficult to identify idle or inactive devices. This is an artifact of there being no requirement in 802.15.4/ZigBee that a device make such an event known, or polling-like events which would reveal it. Figure 35 8.2 Network Layer Visualization The network layer visualization adds NWK layer routing information to the visualization. This will show the flow of packets between devices. The display of NWK layer routes can be enabled or disabled explicitly by the user using the Protocol Menu selections. DAINTREE NETWORKS PAGE 46 OF 86 SENSOR NETWORK ANALYZER USER GUIDE The Visual Devices Tree Window will display routes that indicate the flow of packets through the network. Each route is shown as a spline that intersects each device the route traverses. An arrow-head is used to show the direction of the route. Routing information is based on the same route detection algorithm used by the Measurement System. As such routes will only be displayed if the Measurement System is active. Whenever the Measurement System is restarted, all routes are cleared from the measurement system data structures, and all routes will be removed from the visualization. The device association tree will remain intact. Routes are shown in a variety of colors. The color of an individual route is selected from a color palette of 16 different colors, different from the color used to draw the devices. If more routes are required than number of available colors, colors are reused. Colors are used to differentiate the routes; there is no special meaning associated with any particular color. Figure 36 Visual Display of Routes Device Selection The user can choose to restrict display of routes to those between a particular source and destination device. Devices are selected by clicking the devices on the diagram, first the source and then the destination. Devices are unselected by clicking in an open area of the display. The selected devices are highlighted. Both source and destination are highlighted using the same highlighting mechanism, but the user can distinguish them based on the arrow-head on the route/s. If there are no devices selected, routes will be shown for the entire PAN. DAINTREE NETWORKS PAGE 47 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Figure 37 Device Selection In the example shown above device 0002 has been selected as the source, and device 071f has been selected as the destination. Only the routes between those two devices are shown. Route Selection Routes can be selected by clicking on the spline representing the route. When a route is selected, each of the devices the route traverses will be highlighted using the same colour as the route spline. The route can be unselected by clicking on an open area of the display. Figure 38 Route Visualization The system will auto-select the latest route such that when a new route is detected, it is automatically highlighted together with each of the devices it traverses. This applies whether or not there is a selected source and destination device. If there is a currently selected source and destination device only the latest route between those two devices is auto-selected. If the user explicitly selects a route the SNA will maintain the user selection. Auto-selection only occurs when there is no current user selected route. Displaying different route types The Visual Device Tree displays SUCCESSFUL, FAILED, MALFORMED and MALFORMED-S routes: • For FAILED routes the SNA shows only the segment of the route that was detected , DAINTREE NETWORKS PAGE 48 OF 86 SENSOR NETWORK ANALYZER USER GUIDE • FOR MALFORMED-S routes the SNA shows the route from the first node detected up to its destination • For MALFORMED routes the SNA shows the complete route from source to destination with dashed lines indicating the missed hops. There is an option to disable the display of FAILED/MALFORMED routes and as such only display SUCCESSFUL routes. DAINTREE NETWORKS PAGE 49 OF 86 SENSOR NETWORK ANALYZER USER GUIDE 8.3 Application (APS) Layer Visualization The APS layer visualization adds application endpoint and binding information to the visualization. This includes: • Extended device tree to show endpoint information on the end devices • Display of (implicit) bindings between endpoints on different devices, • Display of the flow of packets (routes) between endpoints. The APS layer support can be enabled or disabled explicitly by the user using the Protocol Menu selections. Like the network layer visualization, the application layer visualization will only be displayed if the Measurement System is active. The APS layer analysis is based on the detection of APS data packets. The APS packet header includes the source endpoint, Profile ID, cluster ID, and destination endpoint (although source or destination EP may be absent in when indirect addressing is used). One of the complexities involved with APS layer analysis is the use of indirect addressing. Indirect addressing is used when a particular end device does not have direct support for binding i.e. it doesn’t know the final destination for the APS packets it sends. Instead the end device will forward the APS packets to the co-ordinator, the co-ordinator performs a binding table lookup and then forwards the packets to the associated destination/s. Direct (unicast) and indirect addressing are treated separately as described below. Direct (Unicast) Addressing APS Packet Flows between end devices are identified. These packet flows are broken down by end-point pairs and then further broken down by profile ID and cluster ID. When a new packet flow is detected between endpoints, the visualization is updated to show the endpoints on each end device, and a link between the source and destination endpoints to represent the (implicit) binding. We mean implicit in that the link is based on the flow of APS data packets as opposed to the detection of explicit bind requests. The link will be shown as a line linking the endpoints as shown below. Figure 39 APS Layer Visualization – Direct Addressing DAINTREE NETWORKS PAGE 50 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Endpoint Selection The user is able to select an end-point, and if multiple bindings exist for the given endpoint, the selected endpoint acts as a filter that results in the display of only those bindings associated with this endpoint. If a single binding exists for this end-point, this will select the corresponding source and destination end devices for the purpose of showing routing information. The selected end-points, devices and binding are be highlighted. If an existing binding does not exist, the selection acts as a filter whereby only future bindings that include this endpoint will be shown. Under these circumstances, when a new binding is added, the corresponding source and destination device are automatically selected for the purpose of drawing routes. The selection can be unselected by selecting another device, end-point or clicking on an empty area of the display. While selected, the drawing of new bindings is suppressed. ZDO and Endpoint 0 ZDO bindings (those between end-point zero) are shown by default on the visual representation just like any other APS binding. However there is an option to disable the display of ZDO bindings (enabled by default). Disabling the display of ZDO bindings can reduce clutter on the screen since there is usually significant ZDO activity on the network. Endpoint Flyover Help Flyover help is provided on each endpoint to display the Profile ID and the list of Cluster IDs (incoming and outgoing) active on the end-point. It is important to note that the list of Cluster IDs only include those clusters where the measurement system has detected a packet flow, as opposed to the full list of Cluster IDs supported by the end-point. Binding Selection A binding can be selected by selecting the line drawn between two endpoints. Once selected, information about the binding including the Profile ID and the list of cluster IDs is shown directly under the selected binding. Indirect Addressing Indirect addressing is handled by considering separately the following packet flows: • The flow of packets from the source end-point (EP) to the co-ordinator • The flow of packets from the co-ordinator to destination end-points (EPs). Each segment is shown independently in the Visual Devices Tree window. These are displayed as follows: • There is a special INDIRECT endpoint associated with the coordinator. All indirect bindings are shown intersecting with this special endpoint. • Packet flows from source endpoint to the coordinator are shown as a binding from the source endpoint to the INDIRECT endpoint. • Packet flows from the co-ordinator to destination endpoints are shown as a binding from the INDIRECT endpoint to the destination endpoints. • Selecting a source endpoint results in automatic selection of the corresponding end device and route to the coordinator. DAINTREE NETWORKS PAGE 51 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Visually this will look something like the following diagram. Figure 40 8.4 APS Layer Visualization – Indirect Addressing Context Menus The Visual Device Tree provides context menus to quickly access important functions relative to various items in the Visual Device Tree window. The right-click menu item can be selected after moving the mouse above interesting item in the VDT window and selecting the right-click menu button. Device Context Menu A right-click menu item is available when clicking on a device in the Visual Device Tree. Figure 41 Device Context Menu The available menu items include: DAINTREE NETWORKS PAGE 52 OF 86 SENSOR NETWORK ANALYZER USER GUIDE • • Edit… menu item to bring up the Device Naming Table to edit the device properties, MAC Layer Filters to match all packets where the selected device is the Source, Destination, or either (this will match both short and long addresses), • Mac Layer Filter to match when this device has participated in the MAC layer association sequence; this is useful to debug network formation issues, • NWK Layer Filters to match all packets where the selected device is the Source, Destination, or either. • A Select Measurement -> Device menu option that will select the corresponding device entry and bring it into focus in the Measurements window. Route Context Menu As described earlier, a Route represents all of the Network layer packets flowing between two devices along a given path (identified by the sequence of nodes traversed by the packets). The Route Context menu is available by right-clicking on the route spline on the Visual Device Tree window. Figure 42 Route Context Menus The following context menus are available: • NWK Layer Filters to match all packets corresponding to the associated stream i.e. between the given source and destination, • Select Measurement -> Stream option to highlight the given source and destination device in the Measurements window • Select Measurement -> Route to select and highlight the corresponding route in the Measurements window. APS Endpoint Context Menu The Route Context menu is available by right-clicking on the APS Endpoint on the Visual Device Tree window. DAINTREE NETWORKS PAGE 53 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Figure 43 APS Endpoint Context Menus The following context menus are available: • APS Layer Filters to match all packets corresponding to the associated endpoint, as a Source, a Destination or either. DAINTREE NETWORKS PAGE 54 OF 86 SENSOR NETWORK ANALYZER USER GUIDE APS Binding Context Menu An APS Binding represents all of the APS layer packets flowing between two APS end-points on two different devices. The Route Context menu is available by right-clicking on the APS Endpoint on the Visual Device Tree window. Figure 44 APS Binding Context Menus The following context filters are available: • NWK Layer Filters to match all packets corresponding to the associated stream i.e. between the given source and destination, • APS Layer Filters to match packets flowing from the Source Endpoint and/or to the Destination Endpoint • APS Layer Filters to match packets between the associated endpoints on a specific APS Cluster ID • Select Measurement -> Stream option to highlight the given source and destination device in the Measurements window • Select Measurements -> APS Binding option to select and highlight the corresponding APS Binding in the Measurements window. Common Context Menus There are other context menu items available from the Visual Device Tree that do not depend on the currently selected item. These include: • View menu to select Large, Medium or Small icons, • Print and Print Preview menu items. Printing the Visual Device Tree There is a Print option available from all Visual Device Tree context menus. To preview the Print option, select the Print Preview option. DAINTREE NETWORKS PAGE 55 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Figure 45 Visual Device Tree Print Preview The Print Preview window provides a preview of what the Print will look like. The Preview image can be zoomed in and out and if too large to fit on one page the image can be viewed a page at a time. 8.5 Visualization Options There are visualization options which can be set within the Visualization tab in the Options dialog, available from the Settings -> Options menu item. DAINTREE NETWORKS PAGE 56 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Figure 46 Options Dialog The user can choose to show routes based on the last N packet flows or the last N distinct routes, where the user nominates the number N. The default value is 10. The same value N applies to routes shown for the entire PAN or for a selected source and destination. The analyzer stores the routes for the last N packet flows (or routes) for the entire PAN and for all streams (source/destination pairs) such that as the user changes the selected nodes, routes will appear for the last N rather than having to wait for the next N for routes to be drawn. NOTE: There is an option to show the last N routes (regardless of the number of packet flows). This option results in a deterministic number of routes being shown as opposed to the last N flows option which could result in 1 route or N routes. Reassociations and Reassociation arrows may be hidden. This can help reduce clutter on an otherwise busy visualization. Failed/Malformed Routes can be hidden such that only SUCCESSFUL routes are shown. ZDO Bindings/Endpoints may be hidden. This essentially removes control messages and leaves only those endpoints and endpoints carrying application layer data messages. There is also an option to show long addresses for each of the devices in the Visual Device Tree. By default, only short addresses, and if defined, user labels from the Device Naming Table are shown. While long addresses are typically very informative, they occupy significant real estate. 8.6 Custom Icons Each device in the visualization is drawn based on the contents of a standard Windows® bitmap (.bmp) file stored externally to the analyzer. Default icons are shipped with the application. Furthermore the default icons are compiled into the application such that they can still be displayed if the external files are not available. The user may override the default icons by replacing the external icon files with an icon of their own creation or choosing. The default icons are stored in the Daintree Networks\Sensor Network Analyzer\Graphics directory (or an alternative program directory of the user’s choosing at install time). Standard Windows® bitmap files which are used to create node and other icons in the Visual Devices Tree Window. The application uses three sizes of icons, depending upon whether the view scale is Small, DAINTREE NETWORKS PAGE 57 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Medium or Large. The icons are provided as 48x48, 256 color bitmaps and are then resized by the application based on the currently selected scale. The standard icon files are • • • Node.bmp (standard node) NodeSel.bmp (a selected node) Endpoint.bmp (standard endpoint) • • EndpointSel.bmp (a selected endpoint) PAN.bmp (PAN symbol at the top of the tree) 1. Locate the the SNA application graphics subdirectory. The default location is \Program Files\Daintree Networks\Sensor Network Analyzer\Graphics\ Save the existing icons for re-installation in future if required, for example for the node icons by renaming as follows: Node.bmp to Node_default.bmp NodeSel.bmp to NodeSel_default.bmp Place the custom icons into this directory as Node.bmp and NodeSel.bmp. For example NodeSpecial.bmp as Node.bmp NodeSpecialSel.bmp as NodeSel.bmp 2. 3. 8.7 Device Naming Table The Device Naming Table stores information about wireless devices under test and impacts how each device is represented by the SNA software. Devices may be associated with a logical name (text label) and/or custom icon to highlight the purpose of the device in the network. The device naming table is available from the Settings -> Device Naming Table menu item. It is also possible to bring up the Device Naming Table from the Visual Device Tree by right-clicking on a device and selecting the Edit… menu item. The Device Naming Table is shown in the figure below. DAINTREE NETWORKS PAGE 58 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Figure 47 Device Naming Table The Device Naming Table contains a list of device identified by the IEEE Address, and listing various attributes associated with each device. These attributes include: • User Label: this label will be shown on the Visualization and optionally on the measurements window. • Device Type: this differentiates between coordinator, device or the endpoints on each device, • Icons: Unselected, Selected or Invalid icons can be associated with each device. The Device Naming Table provides the following operations: • Load: the contents of the DNT can be loaded based on the devices detected as part of the current capture session, • Add…: to add a new device, • • Edit…, to edit the currently selected device, Remove, the currently selected device, • Remove All; clear the Device Naming Table, • • Save…; save the contents of the DNT to file, Restore…; restore a previously saved DNT file. When adding or editing a device entry, the following edit… dialog is displayed: DAINTREE NETWORKS PAGE 59 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Figure 48 Device Naming Table – Edit Device Description It is possible to edit the details of a device or its endpoints. When editing a device, the endpoint field is blank. Both devices and endpoints can have an associated User Label and/or Custom Icons associated with it. The Icons may indicate the purpose of the device or endpoint, the vendor or any other visual description that can meaningfully be associated with it. Icons are selected by browsing to the location of the icon in the file system. By default icons are stored in the Daintree Networks/Sensor Network Analyzer/Graphics directory. After assigning user labels and/or custom icons to a device, the representation of the device in the Visual Device tree is modified accordingly, as shown in the image below. Figure 49 Visual Device Tree – with User Labels and Custom Icons DAINTREE NETWORKS PAGE 60 OF 86 SENSOR NETWORK ANALYZER USER GUIDE In this example, devices are shown with icons representing different ZigBee platform vendors, while endpoints are shown based on their application layer purpose e.g. light or switch. Example device icons are provided in the Daintree Networks/Sensor Network Analyzer/Graphics directory. DAINTREE NETWORKS PAGE 61 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Security The SNA application, and more specifically the protocol decoder and network analysis capability can operate on encrypted traffic streams. The software decrypts these traffic streams and presents the decrypted streams for subsequent decoding and analysis. Decryption requires access to the appropriate key/s as described below. ZigBee uses the CCM* mode of authentication and encryption. The CCM* mechanisms are described in the Appendices of the ZigBee Security Services specification. 9.1 Security Options There is a Security tab available from the Options dialog (available from the Settings menu). There will be a field available to enter the Network Key as a 16 digit hex string. The key is defined in user order (the opposite of Network byte order). The default key is all zeroes. There will be a field available for the user to enter the current security level. This will default to 0x05 corresponding to the default security level used by the Home Controls (Residential) Stack Profile. In a future release we will consider having the Security Level automatically detected as one of the Settable Parameters associated with the current Stack Profile (as carried in the Beacon Payload). Each of these options will apply to the MAC, NWK and APS layer security. 9.2 Decoding Encrypted Packets This section describes how encrypted packets are handled by the Packet List, Packet Decoder and Packet Data windows. Packet List Window Packets that are successfully decrypted are shown in the Packet List as if they were never encrpypted. Subsequent fields in the packet are displayed as usual. If packets are encrypted and cannot be decrypted DAINTREE NETWORKS PAGE 62 OF 86 SENSOR NETWORK ANALYZER USER GUIDE that Packet Type field in the Packet List will show to what layer the packet was decoded and highlight that the subsequent contents are encrypted using the (Secured) identifier. Packet Decode Window The Packet Decode will decode the contents of the decrypted payload (as if the payload was never encrypted) Additional security headers and trailers added to the encrypted packet like the Auxiliary Header and MIC field will be left in place and decoded. If decryption fails, the Decode will show the payload as “Encrypted Payload: Decryption Failed” and not attempt to decode the payload any further. Packet Data For packets that have security enabled, the packet data window will display the decrypted data (after decryption) such that it corresponds to the data shown in the Packet Decode window. 9.3 MAC Layer Security MAC Layer security requirements are spread across the 802.15.4 spec and the ZigBee Security Services spec. The Daintree Networks SNA Security support is based on the ZigBee 1.0 specifications. The SNA will decrypt secure MAC layer packets that were encrypted as follows: Encrypted MAC layer packets have the “Security Enabled” flag set in the MAC Frame Control field. There is a common Network wide key used to secure all layers of the ZigBee Stack. There is a common security level operating across all layers of the ZigBee Stack (as defined by the active Stack profile) The Nonce is formed using the 64-bit Source Address, 32-bit Frame Counter and 8-bit Security field (in that order). All fields are stored in Network byte order. The 8-bit Security Field corresponds to the Security Level currently in use (all other bits in the Security field are clear). When encryption is applied to MAC layer packets, the encryption will only apply to the payload portion of the MAC payload, i.e. the Beacon payload, the Command payload or the Data payload, depending on the type of the MAC frame type. The Secured Payload consists of the Frame Counter, the Key Sequence Number (Security Field?), Encrypted Payload and Encrypted Integrity Code. Authentication occurs over the Full MAC Header and MAC payload (including the additional Frame Counter and Key Sequence Number field). NOTE: This description describes the Daintree interpretation of the ZigBee MAC layer specifications. Hence an encrypted MAC layer Command frame looks like the following: MAC Header Command Frame Identifer Frame Counter Key Sequence Number Payload (Encrypted) MIC (Encrypted) Secured Payload MAC Payload DAINTREE NETWORKS PAGE 63 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Hence MAC frames are decrypted as follows: Use the user supplied Network Key and Security Level. The security level determines whether encryption is used and the length of the message integrity check (MIC) field used to authenticate the packet. Create the nonce string using the fields from the Packet in the following order: MAC Source Address (8 octets), Frame Counter (4 octets), Security Control Field (1 octet). Each field is set in the nonce using network byte order. If the security level indicates that decryption is required (4 <= Level <= 7) invoke the CCM* decryption routine with the MAC command payload as the encrypted payload (including the additional integrity bytes) and the MAC Header and unencrypted MAC payload fields (including the Frame Counter and Key Sequence Number/Security Control Field) as the additional unencrypted authentication data. If authentication succeeds the CCM* decryption routine returns the decrypted payload. The decrypted payload can be used to override the previously encrypted NWK payload in the packet for subsequent downstream processing by the decode engine or analysis algorithms. If decryption is not required we will not even bother to authenticate the packet, but instead will just decode each of the additional security fields. 9.4 NWK Layer Security NWK Layer Security features are as defined in the ZigBee 1.0 Security Services specification. The Daintree SNA can decrypt secure NWK layer packets that were encrypted as follows: Encrypted NWK layer packets have the “Security Enabled” flag set in the NWK Frame Control field. There is a common Network wide key used to secure all layers of the ZigBee Stack. There is a common security level operating across all layers of the ZigBee Stack (as defined by the active Stack profile) The AUX Security Header is placed in the NWK layer packet between the NWK Header and Network Payload. The AUX Header consists of the Security Field, Frame Counter, Source Address, and Key Sequence Number. The Nonce is formed using the 64-bit Source Address, 32-bit Frame Counter and 8-bit Security field from the AUX Header. All fields are stored in Network byte order. The low order three bits of the Security Field correspond to the current Security Level. These bits are masked out (set to zero) in the AUX Header prior to transmission (but after authentication). These bits must be masked back in at the receiver prior to authenticating and decrypting the received packet (in both the AUX Header and the Nonce). When encryption is applied to NWK layer packets, the encryption applies to the entire NWK payload. Authentication occurs over the Full NWK Header, the AUX Header and the NWK payload. Hence an encrypted NWK layer frame that looks like the following: NWK Header Aux Header NWK Payload MIC (Encrypted) (Encrypted) The SNA will decrypt the frame as follows: DAINTREE NETWORKS PAGE 64 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Use the user supplied Network Key and Security Level. The security level determines whether encryption is used and the length of the message integrity check (MIC) field used to authenticate the packet. Create the nonce string using the fields from the AUX Header in the following order: Source Address (8 octets), Frame Counter (4 octets), Security Control Field (1 octet). Each field is set in the nonce using network byte order. If the security level indicates that decryption is required (4 <= Level <= 7), invoke the CCM* decryption routine with the NWK payload as the encrypted payload (including the additional integrity bytes) and the NWK Header and AUX Header as the additional unencrypted authentication data. If authentication succeeds the CCM* decryption routine returns the decrypted payload. The decrypted payload is used to override the previously encrypted NWK payload in the packet for display by the Packet Decode engine or subsequent downstream processing by the Measurements or Visualization analysis algorithms. 9.5 APS Layer Security APS Layer Security features are as defined in the ZigBee 1.0 Security Services specification. The Daintree SNA can decrypt secure APS layer packets that were encrypted as follows: Encrypted APS layer packets have the “Security Enabled” flag set in the APS Frame Control field. There is a common Network wide key used to secure all layers of the ZigBee Stack. There is a common security level operating across all layers of the ZigBee Stack (as defined by the active Stack profile). Note however that APS command frames are always secured using a security level of 7. The AUX Security Header is placed in the APS layer packet between the APS Header and APS Payload. The AUX Header consists of the Security Field, Frame Counter, and Key Sequence Number. The Nonce is formed using the 64-bit Source Address, 32-bit Frame Counter and 8-bit Security field. The Source Address is derived from the Network layer source address by looking up the corresponding IEEE long address in the AID address table (or using a ZDO query). The Frame Counter and Security field are derived from the AUX Header. All fields are stored in Network byte order. The low order three bits of the Security Field correspond to the current Security Level. These bits are masked out (set to zero) in the AUX Header prior to transmission (but after authentication). These bits must be masked back in at the receiver prior to authenticating and decrypting the received packet (in both the AUX Header and the Nonce). When encryption is applied to APS layer packets, the encryption applies to the entire APS payload. Authentication occurs over the Full APS Header, the AUX Header and the APS payload. Hence an encrypted NWK layer frame that looks like the following: APS Header Aux Header DAINTREE NETWORKS APS Payload MIC (Encrypted) (Encrypted) PAGE 65 OF 86 SENSOR NETWORK ANALYZER USER GUIDE The SNA will decrypt the frame as follows: Use the user supplied Network Key and Security Level. The security level determines whether encryption is used and the length of the message integrity check (MIC) field used to authenticate the packet. Create the nonce string using the Source Address (derived from NWK source address) and fields from the AUX Header in the following order: Source Address (8 octets), Frame Counter (4 octets), Security Control Field (1 octet). Each field is set in the nonce using network byte order. If the security level indicates that decryption is required (4 <= Level <= 7), invoke the CCM* decryption routine with the APS payload as the encrypted payload (including the additional integrity bytes) and the APS Header and AUX Header as the additional unencrypted authentication data. If authentication succeeds the CCM* decryption routine returns the decrypted payload. The decrypted payload is used to override the previously encrypted APS payload in the packet for display by the Packet Decode engine or subsequent downstream processing by the Measurements or Visualization analysis algorithms. DAINTREE NETWORKS PAGE 66 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Appendix A: Application Navigation The application provides the following menu items: File Menu Menu Item Open…(Ctrl-O) Close (Ctrl-W) Save…(Ctrl-S) Exit Function and Action Resulting Opens a previous capture file in the decoder. The dialog box’s “Files of Type” list box will contain “Capture Files (*.dcf) ” and “All Files (*.*) ” with the former being the default. Displays the first PDU’s in the list, selects the first and decodes it. If there is any unsaved data the user will be prompted to save it, using the same operation as described for File|Save . If a capture is currently in progress, this menu item is disabled. Closes the capture file and clears the capture windows. If the current capture has not been saved, provides the option to save the capture to a file before closing. Otherwise the capture data is lost (unless it has been saved using the logging functionality). If a capture is currently in progress then this menu item is disabled. Allows the user to save a capture to a named file prompting for a filename in all cases. The input field will be preloaded with the previous filename used. The dialog box’s “Save as Type” list box will contain “Capture File (*.dcf)”. The user will be able to choose whether the data saved consists of filtered or unfiltered data. If a capture is currently in progress then this menu item is disabled. Exits the application, prompting the user to choose a file name for saving of the capture data if they wish, using the same operation as described for File|Save . View Menu Menu Item Packet List Packet Decode Packet Data Device Tree Measurements Visual Device Tree All Toolbars Capture Filter File Measurements Visualization Function and Action Resulting Opens/closes the packet list window (check mark against item in list when displayed). Opens/closes the packet decode window (check mark against item in list when displayed). Opens/closes the packet data window (check mark against item in list when displayed). Open/Close the device tree, a tabular view of all devices detected on the network Open/Close the Measurements View Open/Close the Visual Device Tree Opens/closes all display windows. Selecting this item will cause all unopened windows to be opened. This is a submenu. Displays/hides the capture toolbar (check mark against item in list when displayed). Displays/hides the filter toolbar (check mark against item in list when displayed). Displays/hides the file toolbar (check mark against item in list when displayed). Displays/hides the measurements toolbar (check mark against item in list when displayed). Displays/hides the visualization toolbar (check mark against item in list when displayed). DAINTREE NETWORKS PAGE 67 OF 86 SENSOR NETWORK ANALYZER USER GUIDE All Displays/hides all toolbars. Capture Menu NOTE: If the user is viewing a file previously recorded this menu will be disabled. Menu Item Select Source… Start Capture Pause Display Stop Capture Function and Action Resulting Allows selection of a capture source (from those available) through a dialog box. The dialog box includes the search button, drop down list of sources and channel selection. If there is a capture operation in progress, this menu item is disabled. Starts capture operations from the selected device. If there is no source selected or a capture operation is in progress, this menu item is disabled. Toggles the updating of the display of captured data, allowing the user to check through the data whilst the capturing continues. If there is no capture operation in progress, this menu item is disabled. Stops capture operation. If there is no capture operation is progress, this menu item is disabled. Protocols Menu Menu Item ZigBee NWK ZigBee APS Function and Action Resulting Toggle ZigBee NWK layer decodes and analysis. Toggles check mark against the item in list. The value of this setting is stored in the registry. Upon application start up this item will be reinitialised to its last setting. Toggle ZigBee APS layer decodes and analysis. Toggles check mark against the item in list. The value of this setting is stored in the registry. Upon application start up this item will be reinitialised to its last setting. If ZigBee NWK decodes are disabled data remaining after the 802.15.4 header information is decoded will be labelled “MAC Payload.” If ZigBee APS decodes are disabled, data remaining after the NWK header information is decoded will be labelled “NWK Payload.” In both cases, the length of data will be appended to the name. For example: “MAC Payload (41 octets)”. The data will not be displayed in the “Decode” window, only in the “Data” window. If ZigBee NWK is disabled then ZigBee APS will be disabled by default. If ZigBee APS in enabled, ZigBee NWK will be enabled by default. Filters Menu Menu Item Define… Reset Function and Action Resulting This menu item brings up the “Filters” dialog box. If a capture operation is in progress, this menu item will be disabled. Clear any active filter and display all packets DAINTREE NETWORKS PAGE 68 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Settings Menu Menu Item Options Device Naming Table… Device Configuration… Firmware Upgrade… Function and Action Resulting Displays a tabbed dialog box which allows the user to alter configurable settings. These settings are persevered in the system registry. The supported tabs are: • LogFile • Capture • Packet List Window • Measurements • Devices • Visualization. The device naming table allows users to assign custom icons and logical names to devices based on their 802.15.4 IEEE Address. This menu item is used to configure the networking properties of the device and also reports device specific information. If a capture operation is in progress, a capture file is open or a third party capture device is currently selected this menu item will be disabled. This menu item allows the firmware upgrade of 2400E Adapters connected via USB. If a capture operation is in progress, a capture file is open or a third party capture device is currently selected this menu item will be disabled. Window Menu Menu Item Cascade Tile Horizontally Tile Vertically Tile Default Layout Arrange Icons (Window Selection) Function and Action Resulting Cascades the currently open windows so that they are overlapped in the top left hand corner of the screen. Tiles the currently open windows horizontally so that they share the screen space evenly. Tiles the currently open windows vertically so that they share the screen space evenly. Tile all windows according to the default layout with: • Measurements shown in top left corner, 40% width, 60% height of the total screen size, • Visualization shown in the top right corner, 60% width and 60% height, • Packet List shown bottom left, 40% height, 60% width, • Packet Decode shown bottom right, 40% height, 40% width. This provides a quick overview of the full capabilities of the application with the visualization taking up the a sizeable portion of the screen area. The Packet Data and Device Tree windos will be hidden by default. Arranges the minimised window icons in the bottom left hand corner of the screen. A dynamically created list of the open windows. This allows the user to select between the currently open windows. Help Menu Menu Item Quick Start Guide Function and Action Resulting Causes this user guide to be displayed. It will open a PDF file using the DAINTREE NETWORKS PAGE 69 OF 86 SENSOR NETWORK ANALYZER USER GUIDE User’s Guide (F1) About default PDF viewer (if installed). Causes this user guide to be displayed. It will open a PDF file using the default PDF viewer (if installed). Displays copyright, identification and version information. Toolbars A toolbar exists for each major function of the application to provide easy access to common tasks. The description of each toolbar will be contained in the relevant section of the document. DAINTREE NETWORKS PAGE 70 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Appendix B: Capture File Formats The Sensor Network Analyzer uses a default file extension of .dcf (for Daintree Capture File). Format Descriptor To convey the format of the information in the capture file, the first line or record of the file may contain be formatted as below: #Format=type where type is the format type specification. For example, #Format=1 If this line is not present in the file then file format 1 is assumed. Note that including the format descriptor will be ignored if it appears on any line or in any record other than the first. Format 1 This is the format used by the Sensor Network Protocol Decoder (SNPD) and pre-1.0 release versions of the SNA. It consists of readable text, fields are delimited by a white space (one ASCII space character). Records (packets) are delimited by a new line (CR LF characters). Field Descriptions Field Name Length (chars) 1–10 Field Data Type (all fields appear as text) 32-bit unsigned decimal integer. Timestamp 1–10.1–6 32-bit unsigned decimal integer.32-bit unsigned decimal integer. Length 8-bit unsigned decimal integer. Data 2–250 Concatenated 8-bit hexadecimal. Signal 8-bit signed hexadecimal integer. 8-bit unsigned hexadecimal integer Sequence Number Description Sequence number for the packet. The Sequence Number is initialised to 1 at the beginning of a capture session. Time at which the packet was received, as provided by the capture device. The first integer is the time in seconds since midnight, January 1, 1970. The second integer is an offset in microseconds from this time. The integers are separated by a period (‘.’). This is the number of octets represented in the Data and Signal fields combined. The actual packet data. This comprises the IEEE 802.15.4 PSDU (PHY Service Data Unit, or payload), in other words, the entire MAC frame. Its length is indicated by the Length field, being Length - 4. This contains information concerning signal strength and packet checksum. It’s format is capture device dependent. Signal Field Details Capture Device First Octet Second Octet Daintree Networks Sensor Network Access Point RSSI (Received Signal Strength Indicator). Most significant bit indicates received packet Frame Check Sequence (FCS) status. 1 = FCS OK DAINTREE NETWORKS PAGE 71 OF 86 SENSOR NETWORK ANALYZER USER GUIDE 0 = FCS in error. The least significant 7 bits is an unsigned integer being a measure of the average signal strength correlation between the first 8 symbols of the received PHY protocol data unit. It can be considered a measure of the “chip error rate” of the received signal. A value of ~110 indicates a maximum quality frame, a typical value of ~50 is indicative of lowest quality frame reception. Example A log file example is shown below. #Format=1 1 1087369893.0 13 0080d8addebeba44cf000002eb 2 1087369893.139287 21 23c8dfaddebebaffff0989952248000000018e02eb 3 1087369893.140347 5 0200df01eb 4 1087369893.245415 21 0080d9addebeba44cf0010098995224800000001ec 5 1087369893.251246 18 63c8e0addebeba09899522480000000402e9 Format 2 This is the default format used since SNA Version 1.0. Fields are delimited by a white space (one ASCII space character). Records (packets) are delimited by a new line (CR LF characters). Field Descriptions Field Name Length (chars) 1–10 Field Data Type (all fields appear as text) 32-bit unsigned decimal integer. Timestamp 1–10.1–6 32-bit unsigned decimal integer.32-bit unsigned decimal integer. Length 8-bit unsigned decimal integer. Data 2–250 Concatenated 8-bit hexadecimal. LQI FCS 16-bit unsigned decimal integer. 0 or 1 Sequence Number DAINTREE NETWORKS Description Sequence number for the packet. The Sequence Number is initialised to 1 at the beginning of a capture session. Time at which the packet was received, as provided by the capture device. The first integer is the time in seconds since midnight, January 1, 1970. The second integer is an offset in microseconds from this time. The integers are separated by a period (‘.’). This is the number of octets represented in the Data and Signal fields combined. The actual packet data. This comprises the IEEE 802.15.4 PSDU (PHY Service Data Unit, or payload), in other words, the entire MAC frame. Its length is indicated by the Length field, being Length - 4. This is the LQI of the packet. This is the FCS correctness of the packet. If 1 the FCS was correct. If 0 it was incorrect. PAGE 72 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Example An example of the log file is shown below: #Format=2 1 1087369893.0 13 0080d8addebeba44cf0000ffff 22 1 2 1087369893.139287 21 23c8dfaddebebaffff0989952248000000018effff 23 1 3 1087369893.140347 5 0200dfffff 25 1 4 1087369893.245415 21 0080d9addebeba44cf00100989952248000000ffff 19 1 5 1087369893.251246 18 63c8e0addebeba098995224800000004ffff 21 1 6 1087369893.252211 5 1200e0ffff 23 1 DAINTREE NETWORKS PAGE 73 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Appendix C: Protocol Decoder Display Filter Fields The following tables list the valid protocol decoder display filter arguments and their descriptions. CAPTURED FRAME hdr-frame.frmLength Frame Length hdr-frame.capLength Capture Length hdr-frame.malformedData Malformed Packet MAC Mac IEEE 802.15.4 mac.fc MAC Frame Control mac.fcFrmType MAC Frame Control Frame Type mac.fcSec MAC Frame Control Security Enabled mac.fcFrmPend MAC Frame Control Frame Pending mac.fcAckReq MAC Frame Control Acknowledgment Request mac.fcIntraPAN MAC Frame Control Intra PAN mac.fcResBits789 MAC Frame Control Reserved Bits 7-9 mac.fcDestAddrMode MAC Frame Control Destination Addressing Mode mac.fcResBits1213 MAC Frame Control Reserved Bits 12-13 mac.fcSrcAddrMode MAC Frame Control Source Addressing Mode mac.seqNo MAC Sequence Number mac.destPANId MAC Destination PAN Identifier mac.destAddr MAC Destination Address mac.srcPANId MAC Source PAN Identifier mac.srcAddr MAC Source Address mac.Pay MAC Payload mac.PaySupFrm MAC Beacon Superframe Specification mac.PaySupFrmBcnOrd MAC Beacon Superframe Specification Beacon Order mac.PaySupFrmSupOrd MAC Beacon Superframe Specification Superframe Order mac.PaySupFrmFinalCAP MAC Beacon Superframe Specification Final CAP Slot mac.PaySupFrmBatExtn MAC Beacon Superframe Specification Battery Life Extension mac.PaySupFrmResBit13 MAC Beacon Superframe Specification Reserved Bit 13 mac.PaySupFrmPANCord MAC Beacon Superframe Specification PAN Coordinator mac.PaySupFrmAssPermit MAC Beacon Superframe Specification Association Permit mac.PayGTSSpec MAC Beacon GTS Information GTS Specification DAINTREE NETWORKS PAGE 74 OF 86 SENSOR NETWORK ANALYZER USER GUIDE mac.PayGTSSpecDescCount MAC Beacon GTS Information GTS Descriptor Count mac.PayGTSSpecResBits36 MAC Beacon GTS Information Specification Reserved Bits 3-6 mac.PayGTSSpecPermit MAC Beacon GTS Information GTS Permit mac.PayGTSDir MAC Beacon GTS Directions mac.PayGTSDirMask MAC Beacon GTS Information GTS Directions Mask mac.PayGTSDirResBit7 MAC Beacon GTS Information Directions Reserved Bit 7 mac.PayGTSListDesc MAC Beacon GTS Information GTS List mac.PayGTSListDescDevAddr MAC Beacon GTS Information GTS List Device Short Address mac.PayGTSListDescStartSlot MAC Beacon GTS Information GTS List GTS Starting Slot mac.PayGTSListDescLength MAC Beacon GTS Information GTS List GTS Length mac.PayPendAddrSpec MAC Beacon Pending Address Specification mac.PayPendAddrSpecAddrPend MAC Beacon Pending Address Specification Number of Short Addresses Pending mac.PayPendAddSpecResBit3 MAC Beacon Pending Address Specification Reserved Bit 3 mac.PayPendAddrSpecExtAddrPend MAC Number of Extended Addresses Pending mac.PayPendAddSpecResBit7 MAC Beacon Pending Address Specification Reserved Bit 7 mac.PayPendAddrSpecShortAddr MAC Beacon Pending Address Pending Short Address mac.PayPendAddrSpecExtendAddr MAC Beacon Pending Address Pending Extended Address mac.PayCmdFrmId MAC Command Frame Identifier mac.PayCmdFrmArqCapInfo MAC Command Association Request Capability Information mac.PayCmdFrmArqCapInfoAltPAN MAC Command Association Request Capability Info Alternate PAN Coordinator mac.PayCmdFrmArqCapInfoDev MAC Command Association Request Capability Info Device Type mac.PayCmdFrmArqCapInfoPowerSrc MAC Command Association Request Capability Info Power Source mac.PayCmdFrmArqCapInfoReceiver MAC Command Association Request Capability Info Receiver On When Idle mac.PayCmdFrmArqCapInfoResBits45 MAC Command Association Request Capability Info Reserved Bits 4-5 mac.PayCmdFrmArqCapInfoSecCAP MAC Command Association Request Capability Info Security Capability mac.PayCmdFrmArqCapInfoAllocAddr MAC Command Association Request Capability Info Allocate Address mac.PayCmdFrmArsShortAddr MAC Command Association Response Short Address mac.PayCmdFrmArsAssStat MAC Command Association Response Association Status mac.PayCmdFrmDntDisReas MAC Command Disassociation Notification Disassociation Reason mac.PayCmdFrmCrlPANID MAC Command Coordinator Realignment PAN Identifier mac.PayCmdFrmCrlCordAddr MAC Command Coordinator Realignment Coordinator Short Address DAINTREE NETWORKS PAGE 75 OF 86 SENSOR NETWORK ANALYZER USER GUIDE mac.PayCmdFrmCrlLogChan MAC Command Coordinator Realignment Logical Channel mac.PayCmdFrmCrlShortAddr MAC Command Coordinator Realignment Short Address mac.PayCmdFrmGTSChar MAC Command GTS Request GTS Characteristics mac.PayCmdFrmGTSCharLength MAC Command GTS Request GTS Characteristics GTS Length mac.PayCmdFrmGTSCharDir MAC Command GTS Request GTS Characteristics GTS Direction mac.PayCmdFrmGTSCharType MAC Command GTS Request GTS Characteristics Characteristics Type mac.PayCmdFrmGTSReqResBits67 MAC Command GTS Request GTS Characteristics Reserved Bits 6-7 mac.BcnPay MAC Beacon Payload mac.BcnPayProt MAC Protocol ID mac.FCS MAC Frame Check Sequence NWK nwk ZigBee NWK nwk.fc NWK Frame Control nwk.fcFrmType NWK Frame Control Frame Type nwk.fcProtoVer NWK Frame Control Protocol Version nwk.fcDiscRoute NWK Frame Control Discover Route nwk.fcResBits78 NWK Frame Control Reserved Bits 7-8 nwk.fcSec NWK Frame Control Security nwk.fcResBits1015 NWK Frame Control Reserved Bits 10-15 nwk.destAddr NWK Destination Address nwk.srcAddr NWK Source Address nwk.bcstRadius NWK Broadcast Radius nwk.bcstSeqNo NWK Broadcast Sequence Number nwk.Pay NWK Payload nwk.PayCmdFrmID NWK Network Command Identifier nwk.PayCmdFrmCmdOpt NWK Network Command Options nwk.PayCmdFrmResBits06 NWK Network Command Reserved Bits 0-6 nwk.PayCmdFrmCmdOptRouteRepair NWK Command Options Route Repair nwk.PayCmdFrmRouteRequestID NWK Command Route Request Identifier nwk.PayCmdFrmRouteRequestDestAddr NWK Command Route Request Destination Address nwk.PayCmdFrmRouteReplyOrgAddr NWK Command Route Reply Originator Address nwk.PayCmdFrmRouteReplyRespAddr NWK Command Route Reply Responder Address nwk.PayCmdFrmRoutePathCost NWK Command Route Path Cost nwk.PayCmdFrmRouteErrorCode NWK Command Route Error Code nwk.PayCmdFrmRouteErrorDestAddr NWK Command Route Error Destination Address DAINTREE NETWORKS PAGE 76 OF 86 SENSOR NETWORK ANALYZER USER GUIDE nwk.Information NWK Network Layer Information nwk.InfoProf NWK Stack Profile nwk.InfoVer NWK Network Protocol Version nwk.InfoSec NWK Network Security Level nwk.InfoRteCap NWK Device Router Capacity nwk.InfoDepth NWK Device Depth nwk.InfoCap NWK Device Capacity nwk.InfoTxOff NWK Tx Offset APS aps ZigBee APS aps.fc APS Frame Control aps.fcFrmType APS Frame Control Frame Type aps.fcDeliveryMode APS Frame Control Delivery Mode aps.fcSrcEPPresent APS Frame Control Source Endpoint Present aps.fcSec APS Frame Control Security aps.fcAckReq APS Frame Control Ack Request aps.fcResBit7 APS Frame Control Reserved Bit 7 aps.destEP APS Destination Endpoint aps.HCLClustID APS Cluster Identifier aps.ZDOClustID APS Cluster Identifier aps.profileID APS Profile Identifier aps.srcEP APS Source Endpoint aps.SecFrmHeader APS Auxiliary Frame Header aps.SecCtrl APS Auxiliary Frame Header Security Control aps.SecCtrlSecLevel APS Auxiliary Frame Header Security Control Security Level aps.SecCtrlKeyID APS Auxiliary Frame Header Security Control Key Identifier aps.SecCtrlExtndNonce APS Auxiliary Frame Header Security Control Extended Nonce aps.SecCtrlReserved APS Auxiliary Frame Header Security Control Reserved Bits 6-7 aps.FrmCounter APS Auxiliary Frame Header Frame Counter aps.SrcAddr APS Auxiliary Frame Header Source Address aps.KeySeqNo APS Auxiliary Frame Header Key Sequence Number aps.SecAPSPay APS Encrypted APS Payload aps.Pay APS Payload aps.PayCmdFrmID APS Command Frame Command Identifier aps.PayCmdSKKEInitAddr APS Security SKKE Command Initiator Address aps.PayCmdSKKERespAddr APS Security SKKE Command Responder Address DAINTREE NETWORKS PAGE 77 OF 86 SENSOR NETWORK ANALYZER USER GUIDE aps.PayCmdSKKEData APS Security SKKE Command Data aps.PayCmdTKeyKeyType APS Security Transport-key Command Key Type aps.PayCmdTKeyKeyDesc APS Security Transport-key Command Key Descriptor aps.PayCmdTKeyKeyDescKey APS Security Transport-key Command Key Descriptor Field Key aps.PayCmdTKeyKeyDescDestAddr APS Security Transport-key Command Key Descriptor Destination Address aps.PayCmdTKeyKeyDescSrcAddr APS Security Transport-key Command Key Descriptor Source Address aps.PayCmdTKeyKeyDescSeqNo APS Security Transport-key Command Key Descriptor Sequence Number aps.PayCmdTKeyKeyDescPartnerAddr APS Security Transport-key Command Key Descriptor Partner Address aps.PayCmdTKeyKeyDescInitFlag APS Security Transport-key Command Key Descriptor Initiator Flag aps.PayCmdUpdDevDevAddr APS Security Update-Device Command Device Address aps.PayCmdUpdDevStat APS Security Update-Device Command Status aps.PayCmdRemoveDevChildAddr APS Security Remove Device Command Child Address aps.PayCmdReqKeyKeyType APS Security Request Key Command Key Type aps.PayCmdReqKeyPartnerAddr APS Security Request Key Command Partner Address aps.PayCmdSwitchKeySeqNo APS Security Switch Key Command Sequence Number ZIGBEE DEVICE OBJECTS zdo ZigBee ZDO zdo.IEEEAddr ZDO Discovery IEEE Address zdo.ReqType ZDO Discovery Request Type zdo.StartIndex ZDO Discovery Start Index zdo.NWKAddrOfInterest ZDO NWK Address Of Interest zdo.InterfaceEndpoint ZDO Endpoint/interface zdo.Interface ZDO Interface zdo.Endpoint ZDO Endpoint zdo.ProfileId ZDO Profile Id zdo.NumInClust ZDO Number of Input Clusters zdo.InClustList ZDO Input Cluster List zdo.NumOutClust ZDO Number of Output Clusters zdo.OutClustList ZDO Output Cluster List zdo.NWKAddr ZDO Network Address zdo.LocalCoord ZDO Local Coordinator zdo.SrcAddr ZDO Surce Address zdo.SrcEndPint ZDO Source End Point DAINTREE NETWORKS PAGE 78 OF 86 SENSOR NETWORK ANALYZER USER GUIDE zdo.ClustId ZDO Cluster Id zdo.DstAddr ZDO Destination Address zdo.DstEndPint ZDO Destination End Point zdo.ScanChannels ZDO Scan Channel zdo.ScanChanVal ZDO Channel Frequency zdo.ScanChanReserved ZDO Reserved zdo.DevAddr ZDO Device Address zdo.Stat ZDO Status zdo.IEEEAddrRemDev ZDO IEEE Address of Remote Device zdo.NWKAddrRemDev ZDO Nework Address of Remote Device zdo.NumAssocDev ZDO Number of Associated Device zdo.AssocDevList ZDO Associated Device List zdo.NWKAddrAssocDev ZDO Network Address of Associate Device zdo.StatDisRegRsp ZDO Discovery Register Response Status zdo.StatEndDevAnnceRsp ZDO Discovery End Device Announce Response Status zdo.StatEndDevBindRsp ZDO End Device Bind Response Status zdo.StatBindRsp ZDO Bind Response Status zdo.StatUnbindRsp ZDO Unbind Response Status zdo.StatActiveEPIFRsp ZDO Active End Point/InterfaceStatus zdo.ActiveEPIFCount ZDO Active End Point/Interface Count zdo.ActiveEPIFList ZDO Active End Point/Interface List zdo.MatchLength ZDO Match Length zdo.StatActiveMatchList ZDO Match List zdo.ActiveNetworkCount ZDO Active Network Count zdo.ActiveNetworkListCount ZDO Active Network List Count zdo.ActiveNetworkListCount ZDO Active Network List zdo.Length ZDO Length zdo.NodeDesc ZDO Node Descriptor zdo.NodeDescLogReserved ZDO Logical Type and Reserved zdo.NodeDescLogType ZDO Logical Type zdo.NodeDescLogReserved ZDO Reserved zdo.APSFlagFreq ZDO APS Flags and Frequency zdo.APSFlags ZDO APS Flags zdo.Freq ZDO Frequency band zdo.MACCapFlags ZDO MAC capability flags zdo.MACCapFlagsAltPANCoord ZDO Alternate PAN coordinator zdo.MACCapFlagsDevType ZDO Device Type DAINTREE NETWORKS PAGE 79 OF 86 SENSOR NETWORK ANALYZER USER GUIDE zdo.MACCapFlagsPowerSrc ZDO Power source zdo.MACCapFlagsReceiver ZDO Receiver on when idle zdo.MACCapFlagsReserved1 ZDO Reserved zdo.MACCapFlagsSecCap ZDO Security capability zdo.MACCapFlagsReserved2 ZDO Reserved zdo.MFGCode ZDO Manufacturer code zdo.MaxBufSize ZDO Maximum buffer size zdo.MaxTransferSize ZDO Maximum transfer size zdo.PowerDesc ZDO Node Power Descriptor zdo.PowerDescCurrentMode ZDO Current power Mode zdo.PowerDescAvailNode ZDO Avaliable power sources zdo.PowerDescCurrentSrc ZDO Current power source zdo.PowerDescCurrentSrcLevel ZDO Current Power source level zdo.SimpleDescRspStat ZDO Status zdo.SimpleDescRspLength ZDO Length zdo.SimpleDesc ZDO Simple Descriptor zdo.SimpleDescEPIface ZDO End Point/Interface zdo.SimpleDescEndPoint ZDO End Point zdo.SimpleDescIface ZDO Interface zdo.SimpleDescAppProfileId ZDO Application Profile Identifier zdo.SimpleDescAppDevId ZDO Application Device Identifier zdo.SimpleDescAppDevVerFlags ZDO Application Device Version/Flags zdo.SimpleDescAppDevVer ZDO Application Device Version zdo.SimpleDescAppFlags ZDO Application Flags zdo.SimpleDescAppInpClustCount ZDO Application Input Cluster Count zdo.SimpleDescAppInpClustList ZDO Application Input Cluster List zdo.SimpleDescAppInpClustVal ZDO Cluster zdo.SimpleDescAppOutClustCount ZDO Application Output Cluster Count zdo.SimpleDescAppOutClustList ZDO Application Output Cluster List zdo.SimpleDescAppOutClustVal ZDO Cluster zdo.ComplexDesc ZDO Complex Descriptor zdo.ComplexDescFieldCount ZDO Field Count zdo.ComplexDescField ZDO Field zdo.ComplexDescFieldXMLTag ZDO Compressed XML Tag zdo.ComplexDescFieldData ZDO Field Data zdo.ComplexDescLanguageCode ZDO ISO 639-1 language code zdo.ComplexDescCharSetId ZDO Character set identifier DAINTREE NETWORKS PAGE 80 OF 86 SENSOR NETWORK ANALYZER USER GUIDE zdo.UserDesc ZDO User Description zdo.NWKCount ZDO Network Count zdo.NWKListCount ZDO Network List Count zdo.NWKList ZDO Network List zdo.NWKDesc ZDO Network Descriptor zdo.NWKDescPANId ZDO PAN ID zdo.NWKDescFlags ZDO Network Descriptor Flags zdo.NWKOpMode ZDO Operational Mode zdo.NWKLogChan ZDO Logical Channel zdo.NWKBcnOrder ZDO Beacon Order zdo.NWKPermitJoining ZDO Permit Joining zdo.NbrTableEntries ZDO Neighbor Table Entries zdo.NbrListCount ZDO Neighbor Table List Count zdo.NbrList ZDO Neighbor Table List zdo.NbrEntries ZDO Neighbor Entry zdo.NbrPANID ZDO PAN ID zdo.NbrExtAddr ZDO Extended Address zdo.NbrNWKAddr ZDO Network Address zdo.NbrDevType ZDO Device Type zdo.NbrRelationship ZDO Relationship zdo.NbrDepth ZDO Depth zdo.NbrRNCapacity ZDO RN Capacity zdo.NbrBcnOrder ZDO Beacon Order zdo.NbrRNCapacity ZDO Permit Joining zdo.NbrTransFail ZDO Transmit Failure zdo.NbrPotentialParent ZDO Potential Parent zdo.NbrLQI ZDO LQI zdo.NbrLogChan ZDO Logical Channel zdo.RtgTableEntries ZDO Routing Table Entries zdo.RtgListCount ZDO Routing Table List Count zdo.RtgList ZDO Routing Table List zdo.RtgEntries ZDO Routing Entry zdo.RtgDestAddr ZDO Destination Address zdo.RtgStat ZDO Status zdo.RtgNextHopAddr ZDO Next-Hop Address zdo.BdgTableEntries ZDO Binding Table Entries zdo.BdgListCount ZDO Binding Table List Count DAINTREE NETWORKS PAGE 81 OF 86 SENSOR NETWORK ANALYZER USER GUIDE zdo.BdgList ZDO Binding Table List zdo.BdgEntries ZDO Binding Entry zdo.BdgSrcAddr ZDO Source Address zdo.BdgDstAddr ZDO Destination Address MSG msg ZigBee MSG msg.transSeqNo MSG Transaction Sequence Number msg.transLength MSG Transaction Length msg.transData MSG Transaction Data KVP kvp ZigBee KVP kvp.transSeqNo KVP Transaction Sequence Number kvp.transAttrType KVP Transaction/Attribute Data Type kvp.transType KVP Transaction Type kvp.attribDataType KVP Attribute Data Type kvp.attribId KVP Attribute Identifier kvp.errorCode KVP Error Code kvp.attribData KVP Attribute Data kvp.attribDataCharCount KVP Character Count kvp.attribDataCharData KVP Character Data kvp.attribDataOctetCount KVP Octet Count kvp.attribDataOctetData KVP Octet Data DAINTREE NETWORKS PAGE 82 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Appendix D: 2400E Firmware Upgrade There is a firmware upgrade utility available for the 2400E. Under normal circumstances the firmware loaded on to the module prior to shipment is suitable for use with the Sensor Network Analyzer software. If the SNA software detects the need for an upgrade it will display detailed instructions to the user. Under all other circumstances the user should not run the Firmware Upgrade utility to upgrade the firmware of the 2400E unless requested to do so and given detailed instructions by a Daintree support representative. DAINTREE NETWORKS PAGE 83 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Appendix E: Sensor Network Access Point (Model 2400A) Firmware Upgrade The firmware used on Daintree Networks 2400A Sensor Network Access Point capture devices needs to be upgraded for these devices to function as capture devices with the SNA Version 1.1 software. This firmware upgrade is achieved on the 2400A by connecting to the 2400A’s serial port and using a terminal emulation program, such as HyperTerminal, which supports the XMODEM protocol. Procedure • Start HyperTerminal (or other terminal program) and connect to the 2400A’s serial port. The connection settings are 115200, 8N1: • Choose “Transfer|Send File…” option from the menu. • Ensure that “Xmodem” is selected and enter the name of the .bin file to download to the 2400A. The firmware file to download can be found at Program Files\Daintree Networks\Firmware\2400\sna_2400a.bin (or alternative application installation directory): • Power cycle the 2400A’s power connection. • Press the send button in HyperTerminal within 5 seconds of turning the 2400A’s power on. • A dialog box will appear, showing the progress of the transfer: • When the transfer has completed the firmware will have been successfully upgraded and be ready for use. DAINTREE NETWORKS PAGE 84 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Appendix F: IEEE 802.15.4 Channels and Frequencies CHANNEL LOGICAL SEQ NUM 868MHz BAND CHANNEL CHANNEL NUMBER NUMBER (DECIMAL) (HEX) CHANNEL LOGICAL SEQ NUM 915MHz BAND CHANNEL CHANNEL NUMBER NUMBER (DECIMAL) (HEX) 01 02 03 04 10 CHANNEL LOGICAL SEQ NUM 10 05 06 07 08 09 0A 2.4GHz BAND CHANNEL CHANNEL NUMBER NUMBER (DECIMAL) (HEX) 11 0B 12 0C 13 0D 14 0E FREQ. MHz 868.3 FREQ. MHz 906 908 910 912 914 916 918 920 922 924 FREQ. MHz 2405 2410 2415 2420 10 15 16 17 18 19 20 0F 10 11 12 13 14 2425 2430 2435 2440 2445 2450 11 12 13 14 15 16 21 22 23 24 25 26 15 16 17 18 19 1A 2455 2460 2465 2470 2475 2480 DAINTREE NETWORKS PAGE 85 OF 86 SENSOR NETWORK ANALYZER USER GUIDE Copyright This document and the Sensor Network Analyzer software are subject to Copyright © Daintree Networks Inc, 2003-2005. All Rights reserved. Windows is a registered trademark of Microsoft Corporation. ZigBee is a trademark of the ZigBee Alliance. 802.15.4 is a trademark of the Institute of Electrical and Electronics Engineers Notice Information in this document is subject to change without notice. DAINTREE NETWORKS INC. MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Rev. April 15, 2005 DAINTREE NETWORKS PAGE 86 OF 86
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : No Page Count : 86 XMP Toolkit : XMP toolkit 2.9.1-13, framework 1.6 About : uuid:5092878b-15e9-42a6-a6c1-2de87d8d3355 Producer : Acrobat PDFWriter 4.05 for Windows NT Create Date : 2005:05:30 09:51:56Z Creator Tool : usermanual.doc - Microsoft Word Modify Date : 2005:07:29 11:32:43-04:00 Metadata Date : 2005:07:29 11:32:43-04:00 Document ID : uuid:6af6440f-6a50-48be-9ddb-5b48a56f7ff6 Format : application/pdf Title : usermanual.PDF Creator : peterc Author : petercEXIF Metadata provided by EXIF.tools