Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

example of l2cap command in hci acl packet format

Posted on 2002-03-06
4
Medium Priority
?
753 Views
Last Modified: 2013-12-14
hi,
i'm using ericsson development kit for bluetooh, and i am trying to send al2cap command over hci.
therefore i wanna send the packet in hex format.
my question is could somebody give me an exampleof al2cap command into anhci acl packet??
for instance echo request: the sturcture of the l2cap packet is:
0x06 then identifier( what kind of data is this?? i need an example data for this) and length
my major problem is what to put in the identifier field.
every kind of help is more than welcome and appericiated,
thanks in advance!!
das.
0
Comment
Question by:dasco1632
1 Comment
 

Accepted Solution

by:
prasad_eee earned 200 total points
ID: 7103555
Consider you are sending a request from Master then you have to fill this value in L2cap (any value u like ranging from 0 to ff)in the identifier. The slave will response to the request by filling the same identifier value in its response.
So identifier is used to identify for which request(command of the master) the slave have responded.

Example for L2CAP Connect Response Packet

(All Values are in Hex)
L2CAP Connect response

0c 00 01 00 03 01 08 00 40 00 40 00 00 00 00 00

0c 00 - Payload length
01 00 - SIG Command (Connection Oriented)
03 - UcCode (Connect Rsp)
01 - Identifier (This should be the same value that is received in the Identifier from L2cap Connect Request)
08 00 - Length
40 00 - Local Channel Identifier
40 00 - Remote Channel Identifier (same value recieved from Master)
00 00 - Result
00 00 - Status

I think u can understand..

Regards,
Prasad
email: prasad.k@lntinfotech.com
0

Featured Post

[Webinar] Database Backup and Recovery

Does your company store data on premises, off site, in the cloud, or a combination of these? If you answered “yes”, you need a data backup recovery plan that fits each and every platform. Watch now as as Percona teaches us how to build agile data backup recovery plan.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
The Summer 2017 Scholarship Winners have been announced!
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Suggested Courses
Course of the Month11 days, 2 hours left to enroll

571 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question