iot-lab / aggregation-tools

Tools to aggregate iot-lab nodes tcp outputs.
Other
3 stars 7 forks source link

Proper way to label/filter sniffer data #19

Closed fkerem closed 3 years ago

fkerem commented 3 years ago

Hi,

When I'm using the sniffer aggregator, I would like to label/filter some packets using the timestamp that I flash the firmware.

Scenario - Shell Script: 1) Run sniffer_aggregator. 2) Flash the firmware while sniffer_aggregator is running -> Record the timestamp as tsX. 3) Stop sniffer_aggregator. 4) Filter the captured traffic that is collected after the timestamp tsX.

Here, I record the time that I flash the firmware but I'm afraid there can be a sync issue with the node so that when I filter the pcap data using this timestamp, it can be wrong. Is this the proper way to do this? What do you think?

fkerem commented 3 years ago

I run the sniffer aggregator for 300 seconds but the last packet in the pcap file has the timestamp 285.044947. The node always floods messages so that the last timestamp should be very close to 300, I believe. What can be the reason behind this?

fkerem commented 3 years ago

Thanks, I got it. The timestamp of the first packet captured is 0 and the timestamp of the other packets captured afterwards are determined based on it.