######################################################################################################################## # Server controlling all jammers (except HackRF which requires another server running under "GNURadio Command Prompt") # ######################################################################################################################## 1. Login @10.1.141.71 (windows testing laptop), then open "PowerShell" 2. Install python library >> pip3 install flask_httpauth >> pip3 install flask >> pip3 install waitress 3. Check out GPSTOOLS. DSD library is needed for server.py to control jamming devices on windows. >> cd [PATH_TO_INSTALL] >> cvs co GPSTools # Folder structure: # GPSTools/ # ├─ pythonTools # │ └─ DSD # └─ AntiJamTest # └─ server_control_jammer 4. Run Backend and Frontend with python3 >> set -Name "GPSTOOLS" -Value [PATH_TO_GPSTools] (eg. "C:\Users\\GPSTools") >> cd $GPSTOOLS\AntiJamTest\server_control_jammer >> python server.py >> cd $GPSTOOLS\AntiJamTest\server_control_jammer\web\app\ >> python app.py OR # Edit run_control.cmd, run_web.cmd with the correct path, then double click them for launching OR # Edit and add run_control.cmd and run_web.cmd to Windows Task Scheduler to keep it running after reboot(need admin account) 5. Check server at http://10.1.141.71:10002/site-map # Notes: # Do not mouse click PowerShell prompt. When QuickEdit mode is on, left click will freeze the server under PowerShell. # You may turn off QuickEdit mode by Right click prompt's title bar -> Properties -> Options -> (uncheck) QuickEdit Mode.