Deployment of a Sensor Network

De Ensiwiki
Aller à : navigation, rechercher

Mycomputer.png  Deuxième Année  CDROM.png  Informatique 

Project schedule.png
Titre du projet Projet Spécialité 2A 2012: Deployment of a Sensor Network
Cadre Projets de spécialité
Page principale Projet Spécialité 2A 2012: Deployment of a Sensor Network

Encadrants Franck Rousseau, Etienne Dublé

NB: this page is just a draft because we are presently doing this project. It will end June the 15th 2012.

For the 2nd year ENSIMAG-2012 Speciality Project, we worked on Sensor Networks.


Some vocabulary:

  • the sensors are STM32W108B
  • node is the computer linked with at least one sensor
  • controler is the pricipal machine which monitors all the network

Collect of informations from nodes

The first part of the project consisted in finding some ways to collect informations from the nodes linked with the sensor(s). The user defines a scenario to play in which he specifies all the comands that the controler will send to each node. He can see the evolution of the scenario not only on the standard output but also on the graphic wireshark.

Flash the sensor

Using the flasher from [ ST Microelectronics], we could flash all the sensors with the useful version of the Contiki firmware. To be more efficient,each command is executed in a separated thread. In the script the user launchs, he can specify which firmware he wants to use: for each node at the beginning and for each sensor by the end of our project.

Listen to the sensor

Then, the node has to be able to listen to its emulated serial port using tools such as:

  • serialDump, a tool from senslab
  • pySerial a python library
  • SerialPort from the twisted framework
  • other basic tools like minicom or cat

Forward to the controler

A TCP server on the controler is listening on sockets froms each node.

  • netcat

Parsing and utilization of the datas

Once all the informations collected on the controler, we may parse those packets. Indeed, on the output of the serial port of the sensor, the type of the packet is "slip". This kind of layer is just used to know the end of each frame. With the tool slip2pcap implemented by Etienne Dublé, we can use real-time Wireshark


ideas of experimentations:

  • interferences with the 802.11: use the 26th channel?
  • adjust the emission power of the sensors instead of filtering the MAC addresses
  • include the date in the parsed packet collected in the controler


2012 2nd Year Speciality Project: Deployment of a Sensor network
Speciality Project 2012 Experimentations in a Sensor Network
Team Mouhamed Soumaré, Thomas-Elliot Tollardo, Julien Vipret
Tutors Frank Rousseau, Etienne Dublé
Institution Grenoble INP -- Ensimag
Date May-June 2012