Deployment of a Sensor Network
|Titre du projet||Projet Spécialité 2A 2012: Deployment of a Sensor Network|
|Cadre||Projets de spécialité|
|Page principale|| Projet Spécialité 2A 2012: Deployment of a Sensor Network
|Encadrants||Franck Rousseau, Etienne Dublé|
NB: this page is just a draft because we are presently doing this project. It will end June the 15th 2012.
For the 2nd year ENSIMAG-2012 Speciality Project, we worked on Sensor Networks.
- the sensors are STM32W108B
- node is the computer linked with at least one sensor
- controler is the pricipal machine which monitors all the network
Collect of informations from nodes
The first part of the project consisted in finding some ways to collect informations from the nodes linked with the sensor(s). The user defines a scenario to play in which he specifies all the comands that the controler will send to each node. He can see the evolution of the scenario not only on the standard output but also on the graphic wireshark.
Flash the sensor
Using the flasher from [www.st.com/ ST Microelectronics], we could flash all the sensors with the useful version of the Contiki firmware. To be more efficient,each command is executed in a separated thread. In the script the user launchs, he can specify which firmware he wants to use: for each node at the beginning and for each sensor by the end of our project.
Listen to the sensor
Then, the node has to be able to listen to its emulated serial port using tools such as:
- serialDump, a tool from senslab
- pySerial a python library
- SerialPort from the twisted framework
- other basic tools like minicom or cat
Forward to the controler
A TCP server on the controler is listening on sockets froms each node.
Parsing and utilization of the datas
Once all the informations collected on the controler, we may parse those packets. Indeed, on the output of the serial port of the sensor, the type of the packet is "slip". This kind of layer is just used to know the end of each frame. With the tool slip2pcap implemented by Etienne Dublé, we can use real-time Wireshark
ideas of experimentations:
- interferences with the 802.11: use the 26th channel?
- adjust the emission power of the sensors instead of filtering the MAC addresses
- include the date in the parsed packet collected in the controler
|Speciality Project 2012||Experimentations in a Sensor Network|
|Team||Mouhamed Soumaré, Thomas-Elliot Tollardo, Julien Vipret|
|Tutors||Frank Rousseau, Etienne Dublé|
|Institution||Grenoble INP -- Ensimag|