linuxreverse-engineeringar.drone

dev/ttyO0 used in AR Drone 2.0 - Reverse Enginnering


I read an interesting article about coding for the AR Drone 2.0 from Parrot. In this code they us nodeJS to talk to the drone. Therefore the code starts out with creating a Stream to /dev/ttyO0

I am starting out to learn more about the background of linux functionalities and would like to know:

I know this is not a short and easy answer, but I would be happy to learn more about that or find out, where to learn about that. But initially the question about finding the right device would be very interesting.

Thank you


Solution

  • I don't know the answer to the first part of your question, but I can address the second part.

    Yes, the AR.Drone uses TCP and UDP for all communications between the drone and the controller app, including commands, telemetry and video. You can use a standard network sniffer, like tcpdump or Wireshark. When you connect to the drone, its default IP address is 192.168.1.1. Configure the sniffer to capture all traffic to and from that address. Here are some highlights of what you can see:

    Another thing you may notice: