Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

foren6 can't analysis and show packets because of tshark error #13

Open
SSnoda opened this issue Aug 28, 2016 · 1 comment
Open

foren6 can't analysis and show packets because of tshark error #13

SSnoda opened this issue Aug 28, 2016 · 1 comment

Comments

@SSnoda
Copy link

SSnoda commented Aug 28, 2016

/platform information**_/
ubuntu 14.04 LTS
tshark 1.10.6
foren6 1.0
sniffer Telosb
/_
**************************/

Here is main problem:
foren6 seems can't use tshark to analysis the packets form sniffer
(sniffer's packets can be seen by ubuntu's serial-tool minicom)

Here is the description of problem:
I followed the example on ARNG's example and used a pair of Telosb to send,receive packets,one Telosb as sniffer.
I can see the sniffer's packets sent out to PC by USB through a ubuntu serial-tool 'minicom', however ,foren6 can't show any packet in UI (as the following picture).
I got some error messages in Terminal.

Here is the true error message printed by Terminal ( and there is a screenshot ):
/***************************************************/
tshark: -R without -2 is deprecated. For single-pass filtering use -Y.

(process:5327): GLib-CRITICAL **: g_hash_table_lookup_extended: assertion 'hash_table != NULL' failed

(process:5327): GLib-CRITICAL : g_hash_table_insert_internal: assertion 'hash_table != NULL' failed
/
*************************************************/
tosebastien

I really appreciate everyone's help . thanks !

@SSnoda
Copy link
Author

SSnoda commented Sep 9, 2016

After debug several days, finally answer emerges from the water!
It's the problem of the ARNG example!
I don't know why this example lead the node to send message which is not ipv6, then all packets without "ipv6" will be refused by foren6.
Then I didn't use collect-view-shell and replace the program with contiki/example/ipv6/rpl-collect.
(the shortage is that u have to upload sink-node with udp-sink and sender-node with udp-sender.

Then Start!
(U are advised to change the sending-period of sender, which make it faster)
and wait for some minutes!

(if there is some_place u are not clear, feel free to contact me ([email protected]) )

@SSnoda SSnoda closed this as completed Sep 9, 2016
@SSnoda SSnoda reopened this Sep 9, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant