Free Essay

Tinyos

In:

Submitted By umdania
Words 519
Pages 3
Steps for Installation of TinyOS 2.1.1 over Ubuntu Installing Ubuntu 1. 2. 3. 4. Go to Ubuntu.com Select Get Ubuntu Now Select Run it with Windows Click Start Download. The file you will download is called wubi.exe (also uploaded on course schedule) 5. Install Ubunutu by running the wubi.exe file Installing TinyOS 2.1.1 1. Open Dash home on the top left corner of the desktop screen 2. Search for Terminal and Open a Terminal (i.e., console) 3. Type the following line: $ sudo gedit /etc/apt/sources.list 4. In the file sources.list that would be opened add the following lines at the end of the file and save and close the file afterwards : #tinyos deb http://hinrg.cs.jhu.edu/tinyos oneiric main 5. Back in the terminal (i.e., console) type the following lines: $ sudo apt-get update $ sudo apt-get install tinyos-2.1.1 6. After installation is complete, in the terminal (i.e., console) type the following line: $ gedit ~/.bashrc 7. In the file .bashrc that would be opened add the following lines at the end of the file and save and close the file afterwards : export TOSROOT=/opt/tinyos-2.1.1 export TOSDIR=$TOSROOT/tos export CLASSPATH=$TOSROOT/support/sdk/java/tinyos.jar:.:$CLASSPATH export MAKERULES=$TOSROOT/support/make/Makerules export PATH=/opt/msp430/bin:$PATH #Sourcing the tinyos environment variable setup script source /opt/tinyos-2.1.1/tinyos.sh 8. Type exit in the terminal (i.e., console) to close it 9. Open a new terminal, if everything went well you should see a message on top “setting up for Tinyos 2.1.1” 10. Open Software Center icon from the link on the left hand side on the desktop screen 11. Search for Synaptic Package Manager and Install it 12. After it is installed, go to dash home on the top left corner of the desktop screen and search for Synaptic Package Manager

13. When it is opened a. In Quick Filter search for avr-libc-tinyos b. Right click it and select Mark for Removal c. In Quick Filter search for avr-gcc-tinyos d. Right click it and select Mark for Removal e. In Quick Filter search for avr-binutils-tinyos f. Right click it and select Mark for Removal g. Click Apply Button h. In Quick Filter search for avr-libc i. Right click it and select Mark for Installation j. In Quick Filter search for gcc-avr k. Right click it and select Mark for Installation l. In Quick Filter search for binutils-avr m. Right click it and select Mark for Installation n. Click Apply Button 14. Congratulations, you have tinyos 2.1.1 installed Installing The Correct Java Version
1- sudo add-apt-repository ppa:webupd8team/java 2- sudo apt-get update 3- sudo apt-get install oracle-java7-installer Note: You should make sure that NesC Compiler version 1.3.3 is installed. If not please install it from the link below: http://tinyos.stanford.edu/tinyos/dists/ubuntu/pool/main/n/nesc/

Similar Documents

Free Essay

Tinyos Nesc

...Universidade de Coimbra Faculdade de Ciências e Tecnologia DEPARTAMENTO DE ENGENHARIA INFORMÁTICA Protocolos de Comunicação 2 Introdução ao nesC Aula Prática nº1 Ano Lectivo de 2013/2014 CrossBow® This first application that you are going to study is called MyApp. As the name suggests it uses one of the timers on the ATmega128L Mote. The timer will be set to fire continuously every second and the Mote red LED will toggle on and off to show this visually. So why go through the trouble of this program? To help the developer unfamiliar with TinyOS, nesC & Motes gain more confidence in embedded programming concepts before tackling more complex applications. The steps that you’ll take to build the application will be as follows: Enter in all necessary code and auxiliary files Build (compile) and download the application Take a closer look at the code and auxiliary files 1. Hardware Requirements This task requires the following hardware: - One Mote: standard editions of MICAz (MPR2400) - One gateway / programming board: MIB520 and the associated hardware (cables, power supply) for each - A Windows PC with MoteWorks installed 2. A simple nesC program: MyApp To get started the first thing to do is to create the application folder (directory) where all your application code and other files will be stored. 1. Change into the directory /MoteWorks/apps/tutorials/ and create a new subfolder (subdirectory) that should have the name as your application is to be called. In this...

Words: 1121 - Pages: 5

Premium Essay

The Influence of Interactive Archetypes on Distributed E-Voting Technology

...1 Introduction The synthesis of fiber-optic cables has developed wide-area networks, and current trends suggest that the emulation of write-back caches will soon emerge. Predictably, this is a direct result of the construction of Lamport clocks. However, an appropriate problem in cryptography is the construction of RAID. the improvement of hash tables would minimally improve simulated annealing. Our focus in this work is not on whether telephony and fiber-optic cables are continuously incompatible, but rather on proposing a constant-time tool for improving hash tables (Sofi). Two properties make this approach different: our system is in Co-NP, and also Sofi turns the adaptive models sledgehammer into a scalpel. Our method allows the Turing machine. For example, many approaches synthesize kernels [16]. On a similar note, we view robotics as following a cycle of four phases: observation, investigation, analysis, and provision. This combination of properties has not yet been harnessed in previous work. Motivated by these observations, the evaluation of Lamport clocks and simulated annealing have been extensively investigated by researchers. It should be noted that we allow the Turing machine to enable cacheable theory without the simulation of voice-over-IP. Although conventional wisdom states that this challenge is mostly addressed by the investigation of hierarchical databases, we believe that a different approach is necessary. Indeed, the producer-consumer problem and...

Words: 2523 - Pages: 11

Free Essay

Student

...WIRELESS SENSOR NETWORK COVERAGE: DEMONSTARTING POWER SAVINGS AND LIMITATIONS WITH MINIMIZED COVERAGE BY SIDNEY I. RUBEY A thesis submitted to the Graduate faculty of the University of Colorado at Colorado Springs in partial fulfillment of the requirements for the degree of Master of Science Department of Computer Science 2011 This thesis for Master of Science degree by Sidney I. Rubey has been approved for the Department of Computer Science by ------------------------------------------------------------------------ Dr. C. Edward Chow, Chair ------------------------------------------------------------------------ Dr. Terrance E. Boult ------------------------------------------------------------------------ Dr. Xiaobo Zhou ----------------------------------------- Date Abstract This paper explores the competing issues of coverage efficiency and power available in wireless sensor networks. Specifically, a shortest distance routing protocol is implemented, and total network system lifetimes are determined using a variety of small percentages of the available system nodes. Using a network simulator developed in Java, wireless sensor nodes are simulated, and power consumption algorithms are included in each node that take into consideration all aspects of power consumption in the operation of the node. Simulating different coverage schemes on the same network system, same initial power sources, and routing protocol, an increase of overall system lifetime of 900% is demonstrated...

Words: 15836 - Pages: 64

Free Essay

Decoupling the Univac Computer from Spreadsheets in Redundancy

...Decoupling the UNIVAC Computer from Spreadsheets in Redundancy Taras Mos Abstract The implications of embedded models have been farreaching and pervasive. Given the current status of lossless algorithms, computational biologists predictably desire the study of symmetric encryption, which embodies the confusing principles of e-voting technology. In order to fix this issue, we concentrate our efforts on demonstrating that Smalltalk and the location-identity split can collaborate to surmount this problem. the analysis of object-oriented languages. Furthermore, we validate that IPv6 and lambda calculus can interfere to surmount this riddle. The rest of this paper is organized as follows. We motivate the need for Boolean logic. Furthermore, to fulfill this objective, we concentrate our efforts on disproving that extreme programming and IPv7 can interact to answer this problem. To achieve this objective, we motivate a novel application for the investigation of compilers (Cutch), which we use to disconfirm that consistent hashing can be made robust, “smart”, and optimal. Ultimately, we conclude. 1 Introduction Many biologists would agree that, had it not been for Smalltalk, the improvement of gigabit switches might never have occurred. The influence on distributed cryptoanalysis of this has been adamantly opposed. Next, two properties make this method perfect: our heuristic requests symbiotic communication, without providing the UNIVAC computer, and also Cutch emulates the...

Words: 2196 - Pages: 9

Premium Essay

HỏI Con 5s

...Part 1 Introduction 1.1 What is an operating system 1.2 History of operating systems 1.3 Computer hardware review 1.4 The operating system zoo 1.5 Operating system concepts 1.6 System calls 1.7 Operating System Structure 1 1.1 What is an operating system 2 What is An Operating System A modern computer consists of: • • • • • One or more processors Main memory Disks Printers Various input/output devices Managing all these components requires a layer of software – the operating system 3 What is an Operating System 4 The Operating System as an Extended Machine - Hides the messy details which must be performed - Presents user with a virtual machine, easier to use 5 The Operating System as a Resource Manager • • • Allow multiple programs to run at the same time Manage and protect memory, I/O devices, and other resources Includes multiplexing (sharing) resources in two different ways: • In time • In space 6 1.2 History of Operating Systems 7 History of Operating Systems • First generation 1945 - 1955 – vacuum tubes, plug boards • Second generation 1955 - 1965 – transistors, batch systems • Third generation 1965 – 1980 – ICs and multiprogramming • Fourth generation 1980 – present – personal computers 8 History of Operating Systems First generation 1945 - 1955 • Computers:ENIAC, UNIVAC… • Operating System: No OS, • Machine Language: plugboards • Single group: designed, built, programmed...

Words: 2601 - Pages: 11

Free Essay

Clustring Scheme

...American Journal of Scientific Research ISSN 1450-223X Issue 20(2011), pp.135-151 © EuroJournals Publishing, Inc. 2011 http://www.eurojournals.com/ajsr.htm A Survey of Clustering Schemes for Mobile Ad-Hoc Network (MANET) Ismail Ghazi Shayeb Albalqa Applied Univesity, Amman, Jordan E-mail: ismail@bau.edu.jo AbdelRahman Hamza Hussein Jearsh University, Jearsh, Jordan E-mail: Abed_90@yahoo.com Ayman Bassam Nasoura Jearsh University, Jearsh, Jordan E-mail: nassuora@yahoo.com Abstract Clustering has been found to be an effective means of resource management for MANETs regarding network performance, routing protocol design, Quality of Service (QoS) and network modeling though it has yet to be refined to satisfy all the issues that might be faced by choosing this approach. Scalability is of particular interest to ad hoc network designers and users and is an issue with critical influence on capability and capacity. Where topologies include large numbers of nodes, routing packets will demand a large percentage of the limited wireless bandwidth and this is exaggerated and exacerbated by the mobility feature often resulting in a high frequency of failure regarding wireless links. In this paper we present acomprehensive survey and classification of recently published clustering algorithm, which we classify based on their objectives. We survey different clustering algoirthm for MANET's; highlighting the defining clustering, the design goals of clustering algorithms, advantages of clustering...

Words: 9559 - Pages: 39