nexmonster / nexmon_csi

Channel State Information for Raspberry Pi. Use the pi-5.10.92 branch.
https://github.com/nexmonster/nexmon_csi/tree/pi-5.10.92
63 stars 26 forks source link

weird sequence number 0 #36

Open Z-Yannn opened 1 year ago

Z-Yannn commented 1 year ago

Hi @zeroby0, thanks for your CSI explorer in advance!

I am writing to provide a problem when I try to collect csi using raspberry pi 4B. I set the system to work at 20MHz and channel 36. If I do not add MAC filter in Nexmon:

mcp -c 36/20 -c 1 -N 1

The csi explorer can work correctly to return the sequence number of all packets. Below is the result of running the python code and using Wireshark to analyze all transmitted packets.

Screenshot 2023-02-10 at 01 48 02 Screenshot 2023-02-10 at 01 51 19

However, if I add MAC filter in Nexmon:

mcp -c 36/20 -c 1 -N 1 -m 9c:3e:53:8f:88:62

The csi explorer returns me some weird sequence number 0 packets which do not occur in the Wireshark.

Screenshot 2023-02-10 at 01 56 01 Screenshot 2023-02-10 at 01 56 55

I am wondering what these packets mean and why they occur. Can I just simply omit them? BTW, my system is set up as: a computer pings 100 packets/second to an access point (router). The MAC filter in Nexmon uses the computer's MAC address. The raspberry pi is in the middle to receive csi.

Thanks again for your help!