This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
doc:lps:toda3 [2018-10-31 18:21] kristoffer |
doc:lps:toda3 [2020-05-12 14:08] (current) kimberly |
||
---|---|---|---|
Line 1: | Line 1: | ||
+ | <WRAP center round important 60%> | ||
+ | This page has deprecated and moved to the new documentation framework of the main Bitcraze website. Please go to [[https:// | ||
+ | </ | ||
+ | |||
+ | |||
====== TDoA 3 set up ====== | ====== TDoA 3 set up ====== | ||
Line 16: | Line 21: | ||
You might have to move the Crazyflie close to all anchors to transfer the positions from the Crazyflie. | You might have to move the Crazyflie close to all anchors to transfer the positions from the Crazyflie. | ||
- | ===== Sniffing ===== | + | All the anchors work in the same coordinate |
- | + | ||
- | If an anchor is configured to act as a sniffer, it can be used to listen to the UWB messages | + | |
- | + | ||
- | ==== Basic sniffing ==== | + | |
- | + | ||
- | Connect the sniffer via USB and check in /dev which port that it uses. Use this as the first argument | + | |
- | The second argument is the output format, use yaml | + | |
- | example: '' | + | |
- | + | ||
- | ==== TDoA 3 parsing ==== | + | |
- | + | ||
- | Pipe the yaml into the TDoA 3 decoder to see TDoA 3 data unpacked | + | |
- | + | ||
- | example: '' | + | |
- | + | ||
- | This will show all data that the sniffer receives. To limit the output | + | |
- | + | ||
- | example: '' | + | |
- | + | ||
- | ==== Time of flight and anchor | + | |
- | + | ||
- | By piping the TDoA 3 data into the TOF tool, the measured anchor to anchor distances will be displayed. By adding the ' | + | |
- | + | ||
- | example: '' | + | |
===== 2D positioning ===== | ===== 2D positioning ===== | ||
Line 80: | Line 60: | ||
* There is a configuration setting for the preamble length | * There is a configuration setting for the preamble length | ||
+ | |||
+ | ===== Sniffing ===== | ||
+ | |||
+ | Sniffing the system is useful when you want to start digging into the radio messages exchanged between the anchor. It is a debug functionality. | ||
+ | |||
+ | If an anchor is configured to act as a sniffer, it can be used to listen to the UWB messages in the system. To set an anchor to sniffer mode, connect via USB and configure it to sniffer mode. | ||
+ | |||
+ | ==== Basic sniffing ==== | ||
+ | |||
+ | Connect the sniffer via USB and check in /dev which port that it uses. Use this as the first argument | ||
+ | The second argument is the output format, use yaml | ||
+ | example: '' | ||
+ | |||
+ | ==== TDoA 3 parsing ==== | ||
+ | |||
+ | Pipe the yaml into the TDoA 3 decoder to see TDoA 3 data unpacked | ||
+ | |||
+ | example: '' | ||
+ | |||
+ | This will show all data that the sniffer receives. To limit the output it is possible to filter which anchors to show. Add one or more ids at the end to only show data from only these anchors. | ||
+ | |||
+ | example: '' | ||
+ | |||
+ | ==== Time of flight and anchor to anchor distance ==== | ||
+ | |||
+ | By piping the TDoA 3 data into the TOF tool, the measured anchor to anchor distances will be displayed. By adding the ' | ||
+ | |||
+ | example: '' | ||
+ | |||