You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is there any way to detect the content of the messages on the otns for identification? Is it possible to accurately detect the type of message that is being sent?
For example, when the frame_control is 56417 and the message is sent in unicast, it can be Parent Request, Child Request or a Child response .
How can I know all the possible values for the frame control?
Is it possible to decrypt the capture "current.pcap"?
The text was updated successfully, but these errors were encountered:
The details of every frame can be seen in the PCAP file. But as you indicate, you can only see details once the frames are decrypted in Wireshark. To make decryption easy (configure only once in Wireshark), otns uses a fixed network key. This key needs to be set in the "IEEE 802.15.4 protocol parameters" in Wireshark (add key -> set "Thread hash" hash type for key).
This is a necessary detail that I wanted to add in the updated tutorial for OTNS2 somewhere in the coming weeks/months.
I have some questions:
Is there any way to detect the content of the messages on the otns for identification? Is it possible to accurately detect the type of message that is being sent?
For example, when the frame_control is 56417 and the message is sent in unicast, it can be Parent Request, Child Request or a Child response .
How can I know all the possible values for the frame control?
Is it possible to decrypt the capture "current.pcap"?
The text was updated successfully, but these errors were encountered: