<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Experimental analysis RIGADO R41Z Eval Board in industrial environment in Wireless MCU</title>
    <link>https://community.nxp.com/t5/Wireless-MCU/Experimental-analysis-RIGADO-R41Z-Eval-Board-in-industrial/m-p/846563#M5692</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Diego,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's some feedback.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- At PHY level in code, you can debug the actual frame to be sent OTA (Over The Air) in the "PhyPdDataRequest()" from the PhyPlmeData.c file. But it will probably be hard to analyze as it will be encrypted by the network layer from Thread.&lt;/P&gt;&lt;P&gt;I'd recommend you to look at a sniffer capture using &lt;A href="https://www.ubilogix.com/ubiqua/"&gt;Ubiqua Protocol Analyzer&lt;/A&gt; or &lt;A href="https://www.wireshark.org/"&gt;Wireshark&lt;/A&gt;. You will also require an sniffer like the &lt;A href="https://www.nxp.com/products/wireless-connectivity/bluetooth-low-energy-ble/bluetooth-low-energy-ieee-802.15.4-packet-sniffer-usb-dongle:USB-KW41Z"&gt;USB-KW41Z&lt;/A&gt;. You should be able to see something like this:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="pastedImage_2.png"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/68125iED1DC042D1789A84/image-size/large?v=v2&amp;amp;px=999" role="button" title="pastedImage_2.png" alt="pastedImage_2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- You can verify the number of hops left from a packet in the 6LoWPAN header. See below an ICMPv6 echo request from a node that will require 2 hops to reach its destination:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="pastedImage_6.png"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/68189iCE819233B718FA54/image-size/large?v=v2&amp;amp;px=999" role="button" title="pastedImage_6.png" alt="pastedImage_6.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- The path a packet takes to reach its destination is dynamic and will depend on Thread topology and link costs, you can also use the sniffer to trace the route taken by a packet to reach its destination. Just follow the IP address and MAC address to identify the hops that the packet will be taking. See image for reference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Thread uses a MESH topology.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- See the sniffer logs to analyze MLE advertisements or use the shell and type "thr get neighbors" and "thr get routes" to see the L2 links of the current device.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="pastedImage_1.png"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/68595i3A338FF994D0E6A8/image-size/large?v=v2&amp;amp;px=999" role="button" title="pastedImage_1.png" alt="pastedImage_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- The RSSI of a given packet can be seen in the sniffer capture from Ubiqua, see the Frame Information section (see first image). In code, you can obtain the RSSI of the last received packet with the PhyGetLastRxRssiValue() function.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer to &lt;A class="link-titled" href="https://www.threadgroup.org/ThreadSpec" title="https://www.threadgroup.org/ThreadSpec"&gt;Thread 1.1 Specifications&lt;/A&gt; for details about Thread stack's expected behavior.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;JC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 05 Sep 2018 19:41:18 GMT</pubDate>
    <dc:creator>jc_pacheco</dc:creator>
    <dc:date>2018-09-05T19:41:18Z</dc:date>
    <item>
      <title>Experimental analysis RIGADO R41Z Eval Board in industrial environment</title>
      <link>https://community.nxp.com/t5/Wireless-MCU/Experimental-analysis-RIGADO-R41Z-Eval-Board-in-industrial/m-p/846562#M5691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello everybody,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am inmerged in a project that involves the experimental analysis of Thread protocol thorugh the Rigado R41Z Eval Board in industrial environments where we have face inmmunity and interference issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know how to handle the board at user level with CoAP, manage UART consol, program periphericals, etc. At this point I am able to send though CoAP protocol a message froma node to another. But in order to obtain the needed experimental results of the communication performed, I need to know some data from the board and network:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The full frame of the message sent between nodes.&lt;/LI&gt;&lt;LI&gt;The number of hops performed when I send a message from a node to another.&lt;/LI&gt;&lt;LI&gt;Path routing of the message sent between nodes.&lt;/LI&gt;&lt;LI&gt;What topology or routing path have the Thread architecture at the moment.&lt;/LI&gt;&lt;LI&gt;The MLE advertisement containing the path costs between routers.&lt;/LI&gt;&lt;LI&gt;The RSSI between nodes.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To sum up all the relevant information used to characterizate the communication in Thread.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The idea is to&amp;nbsp;place some kind of instrument emitting interference near a node and see in real time the new routing path choosed in the Thread network to solve the interference problem, how many hops performs the node now, the new path costs, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I obtain this information from the user application? Is the info located somewhere of the R41Z's Thread Stack?&amp;nbsp;Do I need to use Wireshark to analyze the network? What I need to do to obtain the info?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Diego Comin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2018 10:27:44 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Wireless-MCU/Experimental-analysis-RIGADO-R41Z-Eval-Board-in-industrial/m-p/846562#M5691</guid>
      <dc:creator>diegocomin</dc:creator>
      <dc:date>2018-08-30T10:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: Experimental analysis RIGADO R41Z Eval Board in industrial environment</title>
      <link>https://community.nxp.com/t5/Wireless-MCU/Experimental-analysis-RIGADO-R41Z-Eval-Board-in-industrial/m-p/846563#M5692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Diego,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's some feedback.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- At PHY level in code, you can debug the actual frame to be sent OTA (Over The Air) in the "PhyPdDataRequest()" from the PhyPlmeData.c file. But it will probably be hard to analyze as it will be encrypted by the network layer from Thread.&lt;/P&gt;&lt;P&gt;I'd recommend you to look at a sniffer capture using &lt;A href="https://www.ubilogix.com/ubiqua/"&gt;Ubiqua Protocol Analyzer&lt;/A&gt; or &lt;A href="https://www.wireshark.org/"&gt;Wireshark&lt;/A&gt;. You will also require an sniffer like the &lt;A href="https://www.nxp.com/products/wireless-connectivity/bluetooth-low-energy-ble/bluetooth-low-energy-ieee-802.15.4-packet-sniffer-usb-dongle:USB-KW41Z"&gt;USB-KW41Z&lt;/A&gt;. You should be able to see something like this:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="pastedImage_2.png"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/68125iED1DC042D1789A84/image-size/large?v=v2&amp;amp;px=999" role="button" title="pastedImage_2.png" alt="pastedImage_2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- You can verify the number of hops left from a packet in the 6LoWPAN header. See below an ICMPv6 echo request from a node that will require 2 hops to reach its destination:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="pastedImage_6.png"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/68189iCE819233B718FA54/image-size/large?v=v2&amp;amp;px=999" role="button" title="pastedImage_6.png" alt="pastedImage_6.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- The path a packet takes to reach its destination is dynamic and will depend on Thread topology and link costs, you can also use the sniffer to trace the route taken by a packet to reach its destination. Just follow the IP address and MAC address to identify the hops that the packet will be taking. See image for reference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Thread uses a MESH topology.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- See the sniffer logs to analyze MLE advertisements or use the shell and type "thr get neighbors" and "thr get routes" to see the L2 links of the current device.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="pastedImage_1.png"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/68595i3A338FF994D0E6A8/image-size/large?v=v2&amp;amp;px=999" role="button" title="pastedImage_1.png" alt="pastedImage_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- The RSSI of a given packet can be seen in the sniffer capture from Ubiqua, see the Frame Information section (see first image). In code, you can obtain the RSSI of the last received packet with the PhyGetLastRxRssiValue() function.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer to &lt;A class="link-titled" href="https://www.threadgroup.org/ThreadSpec" title="https://www.threadgroup.org/ThreadSpec"&gt;Thread 1.1 Specifications&lt;/A&gt; for details about Thread stack's expected behavior.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;JC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2018 19:41:18 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Wireless-MCU/Experimental-analysis-RIGADO-R41Z-Eval-Board-in-industrial/m-p/846563#M5692</guid>
      <dc:creator>jc_pacheco</dc:creator>
      <dc:date>2018-09-05T19:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: Experimental analysis RIGADO R41Z Eval Board in industrial environment</title>
      <link>https://community.nxp.com/t5/Wireless-MCU/Experimental-analysis-RIGADO-R41Z-Eval-Board-in-industrial/m-p/846564#M5693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot JC! I am now using the USB-KW41Z as sniffer and&amp;nbsp;I&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;am able to trace all the Thread variables I&amp;nbsp;need.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="pastedImage_1.png"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/68877i55141D1D6F4A9E6B/image-size/large?v=v2&amp;amp;px=999" role="button" title="pastedImage_1.png" alt="pastedImage_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In my case I used a Host_controlled_device&amp;nbsp;connected to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;my Raspberry Pi&amp;nbsp;with a&amp;nbsp;TAP interface to perform as a Border Router but Ubiqua does not recognize it as the Border Router (it actually recognize it as a normal Router), it is normal?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Diego Comin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2018 12:01:00 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Wireless-MCU/Experimental-analysis-RIGADO-R41Z-Eval-Board-in-industrial/m-p/846564#M5693</guid>
      <dc:creator>diegocomin</dc:creator>
      <dc:date>2018-09-11T12:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: Experimental analysis RIGADO R41Z Eval Board in industrial environment</title>
      <link>https://community.nxp.com/t5/Wireless-MCU/Experimental-analysis-RIGADO-R41Z-Eval-Board-in-industrial/m-p/846565#M5694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it's expected&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2018 21:46:57 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Wireless-MCU/Experimental-analysis-RIGADO-R41Z-Eval-Board-in-industrial/m-p/846565#M5694</guid>
      <dc:creator>jc_pacheco</dc:creator>
      <dc:date>2018-09-11T21:46:57Z</dc:date>
    </item>
  </channel>
</rss>

