Deployment of a Sensor Network : Différence entre versions

De Ensiwiki
Aller à : navigation, rechercher
Ligne 5 : Ligne 5 :
 
[[Catégorie:Projets de spécialité]]
 
[[Catégorie:Projets de spécialité]]
 
{{Projet de spécialité étudiant
 
{{Projet de spécialité étudiant
  |encadrants=[mailto:etienne.duble@imag.fr Etienne Dublé], [mailto:franck.rousseau@imag.fr Franck Rousseau]
+
  |encadrants=[mailto:franck.rousseau@imag.fr Franck Rousseau], [mailto:etienne.duble@imag.fr Etienne Dublé]
 
  |titre=Projet Spécialité 2A 2012: Deployment of a Sensor Network
 
  |titre=Projet Spécialité 2A 2012: Deployment of a Sensor Network
 
  |page principale=Projet Spécialité 2A 2012: Deployment of a Sensor Network}}
 
  |page principale=Projet Spécialité 2A 2012: Deployment of a Sensor Network}}
Ligne 15 : Ligne 15 :
 
==Introduction ==
 
==Introduction ==
 
Some vocabulary:
 
Some vocabulary:
sensor STM32W [[Image: |thumb|700px|left]]
+
* the sensors are STM32W108B
node
+
* node is the computer linked with at least one sensor
controler
+
* controler is the pricipal machine which monitors all the network
  
 
==Collect of informations from nodes ==
 
==Collect of informations from nodes ==
The first part of the project consisted in finding some ways to collect informations from the nodes linked with the sensor(s).
+
The first part of the project consisted in finding some ways to collect informations from the nodes linked with the sensor(s). The user defines a scenario to play in which he specifies all the comands that the controler will send to each node. He can see the evolution of the scenario not only on the standard output but also on the graphic wireshark.
  
 
===Flash the sensor ===
 
===Flash the sensor ===
Using the flasher from [www.st.com/ ST Microelectronics], we could flash all the sensors with the useful version of the Contiki firmware. To be more efficient,each command is executed in a separated thread.
+
Using the flasher from [www.st.com/ ST Microelectronics], we could flash all the sensors with the useful version of the Contiki firmware. To be more efficient,each command is executed in a separated thread. In the script the user launchs, he can specify which firmware he wants to use: for each node at the beginning and for each sensor by the end of our project.  
  
 
===Listen to the sensor ===
 
===Listen to the sensor ===
 
Then, the node has to be able to listen to its emulated serial port using tools such as:
 
Then, the node has to be able to listen to its emulated serial port using tools such as:
 +
* serialDump, a tool from senslab
 
* [http://pyserial.sourceforge.net/pyserial_api.html pySerial] a python library
 
* [http://pyserial.sourceforge.net/pyserial_api.html pySerial] a python library
 
* [http://twistedmatrix.com/documents/current/api/twisted.internet.serialport.html SerialPort] from the twisted framework
 
* [http://twistedmatrix.com/documents/current/api/twisted.internet.serialport.html SerialPort] from the twisted framework
Ligne 32 : Ligne 33 :
  
 
===Forward to the controler ===
 
===Forward to the controler ===
 +
A TCP server on the controler is listening on sockets froms each node.
 
* netcat
 
* netcat
  
 +
==Parsing and utilization of the datas ==
 +
Once all the informations collected on the controler, we may parse those packets. Indeed, on the output of the serial port of the sensor, the type of the packet is "slip". This kind of layer is just used to know the end of each frame. With the tool slip2pcap implemented by Etienne Dublé, we can use real-time Wireshark
 
==Exprimentations ==
 
==Exprimentations ==
 
ideas of experimentations:
 
ideas of experimentations:
Ligne 52 : Ligne 56 :
 
|-
 
|-
 
| align='center' width="25%" |'''Tutors'''
 
| align='center' width="25%" |'''Tutors'''
| align='center' width="75%" |[mailto:etienne.duble@imag.fr Etienne Dublé], [mailto:franck.rousseau@imag.fr Frank Rousseau]
+
| align='center' width="75%" |[mailto:franck.rousseau@imag.fr Frank Rousseau], [mailto:etienne.duble@imag.fr Etienne Dublé]
 
|-
 
|-
 
| align='center' width="25%" |'''Institution'''
 
| align='center' width="25%" |'''Institution'''

Version du 30 mai 2012 à 14:26

Mycomputer.png  Deuxième Année  CDROM.png  Informatique 

Project schedule.png
Titre du projet Projet Spécialité 2A 2012: Deployment of a Sensor Network
Cadre Projets de spécialité
Page principale Projet Spécialité 2A 2012: Deployment of a Sensor Network

Encadrants Franck Rousseau, Etienne Dublé


NB: this page is just a draft because we are presently doing this project. It will end June the 15th 2012.

For the 2nd year ENSIMAG-2012 Speciality Project, we worked on Sensor Networks.

Introduction

Some vocabulary:

  • the sensors are STM32W108B
  • node is the computer linked with at least one sensor
  • controler is the pricipal machine which monitors all the network

Collect of informations from nodes

The first part of the project consisted in finding some ways to collect informations from the nodes linked with the sensor(s). The user defines a scenario to play in which he specifies all the comands that the controler will send to each node. He can see the evolution of the scenario not only on the standard output but also on the graphic wireshark.

Flash the sensor

Using the flasher from [www.st.com/ ST Microelectronics], we could flash all the sensors with the useful version of the Contiki firmware. To be more efficient,each command is executed in a separated thread. In the script the user launchs, he can specify which firmware he wants to use: for each node at the beginning and for each sensor by the end of our project.

Listen to the sensor

Then, the node has to be able to listen to its emulated serial port using tools such as:

  • serialDump, a tool from senslab
  • pySerial a python library
  • SerialPort from the twisted framework
  • other basic tools like minicom or cat

Forward to the controler

A TCP server on the controler is listening on sockets froms each node.

  • netcat

Parsing and utilization of the datas

Once all the informations collected on the controler, we may parse those packets. Indeed, on the output of the serial port of the sensor, the type of the packet is "slip". This kind of layer is just used to know the end of each frame. With the tool slip2pcap implemented by Etienne Dublé, we can use real-time Wireshark

Exprimentations

ideas of experimentations:

  • interferences with the 802.11: use the 26th channel?
  • adjust the emission power of the sensors instead of filtering the MAC addresses
  • include the date in the parsed packet collected in the controler

Authors

2012 2nd Year Speciality Project: Deployment of a Sensor network
Speciality Project 2012 Experimentations in a Sensor Network
Team Mouhamed Soumaré, Thomas-Elliot Tollardo, Julien Vipret
Tutors Frank Rousseau, Etienne Dublé
Institution Grenoble INP -- Ensimag
Date May-June 2012