Hi all,

I'm trying to run UDPEcho and IPBaseStation in Avrora Simulator, but
something appears wrong. First I had to include -O0 CFLAGS on both Makefile
to it works.

Bot applications was compiled with make micaz blip and my tests was:

[maycon@darkside Simulacao]$ avrora -action=simulate
-simulation=sensor-network -monitors=leds,real-time,serial,packet
-nodecount=1,1 IPBaseStation.elf UDPEcho.elf
Avrora [Beta 1.7.115] - (c) 2003-2007 UCLA Compilers Group

Loading IPBaseStation.elf...OK
Loading UDPEcho.elf...OK
=={ Simulation events
}=======================================================
Node          Time   Event
------------------------------------------------------------------------------
Waiting for serial connection on port 2390...connected to /127.0.0.1:37609

After run java net.tinyos.sf.SerialForwarder -comm network@localhost:2390,
I received this:

   0       8028190  off off on
   0       8028235  off on  on
   0       8028280  on  on  on
   0       8028325  on  on  off
   0       8028370  on  off off
   0       8028415  off off off
   1       8083984  off off on
   1       8084029  off on  on
   1       8084074  on  on  on
   1       8084119  on  on  off
   1       8084164  on  off off
   1       8084209  off off off
   0       8763906  on  off off
   0     103033506  off off off

and after run ip-driver, I received this:

   0     103861498  off off on

The ip-driver application was run like this:

[maycon@darkside Simulacao]$ sudo ./ip-driver -c serial_tun.conf 127.0.0.1
9002
2012-04-15T17:18:26.080BRT: INFO: Read log level: DEBUG
2012-04-15T17:18:26.080BRT: INFO: Read config from 'serial_tun.conf'
2012-04-15T17:18:26.080BRT: INFO: Using channel 15
2012-04-15T17:18:26.080BRT: INFO: Retries: 5
2012-04-15T17:18:26.080BRT: INFO: telnet console server running on port 6106
2012-04-15T17:18:26.081BRT: INFO: created tun device: tun0
2012-04-15T17:18:26.090BRT: DEBUG: tun_read: read 0x4c bytes
2012-04-15T17:18:26.090BRT: DEBUG: tun_input: dropping packet with IPv6
options
2012-04-15T17:18:26.284BRT: DEBUG: interface configured (0x0) addr: 0x85fc
2012-04-15T17:18:26.284BRT: INFO: interface device successfully initialized
2012-04-15T17:18:26.284BRT: INFO: starting radvd on device tun0
2012-04-15T17:18:26.284BRT: DEBUG: tun_read: read 0x60 bytes
2012-04-15T17:18:26.284BRT: DEBUG: ip_to_pan
  nxthdr: 0x3a hlim: 0xff plen: 56
  src: 0xfe 0x80 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x1
  dst: 0xff 0x2 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x1
data [56]:
0x86 0x0 0x20 0xcf 0x40 0x0 0x0 0x0   0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
 0x3 0x4 0x40 0xc0 0x0 0x27 0x8d 0x0   0x0 0x9 0x3a 0x80 0x0 0x0 0x0 0x0
0xfe 0xc0 0x0 0x0 0x0 0x0 0x0 0x0   0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x1
 0x11 0x1 0x0 0x0 0x0 0x0 0x0 0x0
2012-04-15T17:18:26.284BRT: DEBUG: next hop: 0xffff
  nxthdr: 0x3a hlim: 0xff plen: 56
  src: 0xfe 0x80 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x1
  dst: 0xff 0x2 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x1
data [56]:
0x86 0x0 0x20 0xcf 0x40 0x0 0x0 0x0   0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
 0x3 0x4 0x40 0xc0 0x0 0x27 0x8d 0x0   0x0 0x9 0x3a 0x80 0x0 0x0 0x0 0x0
0xfe 0xc0 0x0 0x0 0x0 0x0 0x0 0x0   0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x1
 0x11 0x1 0x0 0x0 0x0 0x0 0x0 0x0
len: 77
02 4b 41 88 00 00 00 ff ff 11 7e 03 94 3a ff 00 01 a4 01 86 00 20 cf 40 00
00 00 00 00 00 00 00 00 00 00 03 04 40 c0 00 27 8d 00 00 09 3a 80 00 00 00
00 fe c0 00 00 00 00 00 00 00 00 00 00 00 00 00 01 11 01 00 00 00 00 00 00
9c 6a
2012-04-15T17:18:26.309BRT: DEBUG: send_fragments: result: 0x0 len: 0x40
len: 77
02 4b 41 88 00 00 00 ff ff 11 7e 03 94 3a ff 00 01 a4 01 86 00 20 cf 40 00
00 00 00 00 00 00 00 00 00 00 03 04 40 c0 00 27 8d 00 00 09 3a 80 00 00 00
00 fe c0 00 00 00 00 00 00 00 00 00 00 00 00 00 01 11 01 00 00 00 00 00 00
9c 6a


The tun0 interface is created with sucess and I can do ping6 at fec0::64
address, but what would to do to ping UDPEcho? I tried fec0::0, fec0::1,
fec0::2 so on, but ithout success. The Serial Forward does not display any
packet sent during ping6, just the 2 sent and 2 recv during initializing.

----
*Maycon Maia Vitali* (aka 0ut0fBound)
Offensive Security Certified Expert (OSCE)
Security Researcher @ Hack'n Roll
http://maycon.hacknroll.com
Hack'n Roll
_______________________________________________
Tinyos-help mailing list
[email protected]
https://www.millennium.berkeley.edu/cgi-bin/mailman/listinfo/tinyos-help

Reply via email to