Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
The Dashboard provides a summary of deployed devices and coverage of all Sites available to you (based on role, client, or reseller).
After logging in to the Site Management app, the Dashboard is displayed.
User role
The Dashboard provides access to all available Sites.
The side menu provides options for accessing the Sites:
Sites view (displays a provides access to each Site)
Map view (displays a world map showing the location of each Site)
Alert center (displays fire alerts generated by any Site)
User Management list users in your organization that are registered to use the Site Managment app. Administrators can add users here.
Selecting Collapse minimizes the side menu. Selecting the right arrows maximizes the side menu.
The Dashboard displays totals of Wildfire Sensor, Gateways and number of Sites in your organization. It also provides quick access to your Sites.
Total Sensors
Total Sensors: Number of deployed Wildfire Sensors in all Sites associated with an organization (client)
Sensors in each site: Number of Wildfire Sensors deployed in each Site. Site names are also linked to the Site Dashboard of a site.
Total Gateways
Total Gateways: Number of deployed Mesh Gateways and Border Gateways in all Sites associated with an organization (client).
Gatways in each site: Number of Mesh Gateways and Border Gateways deployed in each Site. Site names are also linked to the Site Dashboard of a site.
Total Number of Sites
Total Number of Sites: Number of Sites belonging to an organization (client).
Covered area of each Site: Area (in hectares) protected by a Silvanet deployment for each Site. Site names are also linked to the Site Dashboard of each site.
Sites View displays all Sites to which you are permitted access.
The Sites view displays sites that you (admin users only) or a Reseller have created or to which you access.
User role (client)
Open the Ellipsis menu next to a Site name and select Open to display a Site. Alternately, select a Site name to open a Site.
The Site details page is displayed.
Only users with an Admin Role can add a new Site to their own organization. If you are a reseller, you can add new Sites for your clients.
If you are a user with a Standard Role, request a new Site from your organization's Admin user or from your reseller.
User role
Select Sites from the side menu, then select Create Site.
In the Create Site dialog, enter a Site Name and select a Region.
If required, you can create a new organization by checking Create new Organization.
When completed, Select Create Site.
The new Site appears in the Sites view.
The new Site also appears in the Dashboard.
The name of a Site can be edited or changed as required. However, the Site ID cannot be changed.
User role
Site ID
The Site ID can be found in the URL of the Site as well as part of breadcrumbs when a Site is opened.
Open a Site.
From the Ellipsis menu next to a Site name, select Edit.
In the Edit Site dialog, enter a new name, then select Save Changes.
Select preferences for units, date and time used throughout the Site Management app.
Any registered user can set preferences for measurement units and date/time.
User role
Hover over the user profile image (upper-right corner) to reveal a menu, then select Settings.
Set your preferences:
Unit system: Select Metric or Imperial for measurements, distance, area, temperature, pressure.
Date format: Select from either (DMY) dd/mm/yyyy or (YMD) yyyy-mm-dd. Other traditional methods such as mm/dd/yyyy are not supported.
Time format: Select 24 hour clock (22:00) or 12-hour clock (10:00 PM).
Select the Dryad logo to return to the Dashboard Overview.
Explore the features of Silvanet Suite: Silvanet Border and Mesh Gateways, Wildfire Sensors and Silvanet apps.
The Silvanet Suite is designed to detect forest fires in their ultra-early smoldering phase. It consists of a mesh network of Border Gateways, Mesh Gateways and Wildfire Sensors deployed in a Site.
The Silvanet Border Gateways are connected via the Internet to the Silvanet Cloud which provides data and alerts from the deployed Wildfire Sensors to the Site Management and Deployment apps.
Learn the basic steps required to successfully deploy Silvanet Border Gateways, Mesh Gateways and Wildfire Sensors.
Use the Planning tool to plan the amount and location of Silvanet Border Gateways, Mesh Gateways and Wildfire Sensors.
Log in to the Site Management app: Use the credentials provided by Dryad or reseller. \
Select or create a Site: In the Site Management app, select or create a Site (if you have permissions). The Site is where you prepare the deployment plan.
Estimate coverage requirements using the Planning tool: Use the Planning tool to draw paths, areas and connectivity. This results in a total number of Silvanet devices needed to cover the Site. It also generates the location of each device - Silvanet Border Gateways, Mesh Gateways and Wildfire Sensors. \
Export a planning summary document: A summary of the deployment plan can be exported to a docx file, which can be printed and used by the workers who deploy the Silvanet devices.
Send deployment plan to Deployment app: Select Release Deployment Plan to send the plan to the Deployment app. The Planning tool then checks the plan and triggers any issues that need to be changed in the plan before the tool releases it to the Deployment app.
See Also
For more information, see Coverage estimation.
Before deploying the Silvanet Gateways and Wildfire Sensors, ensure you are prepared in advance.
Understand the guidelines for deploying Silvanet: Review the Preparation guidelines, such as Gateway ratios, ranges, Border Gateway deployment scenarios and Wildfire Sensor range and ratios.
Bring into the deployment areas the required tools: Pack the appropriate deployment tools, including a foldable ladder, hammers, shears, cordless drill, drill bits and other necessary tools.
Install the Deployment app on a fully charged Smartphone: Ensure the Deployment app is installed on a Smartphone and the Smartphone is fully charged. Launch the app in an area where mobile connectivity is good before heading into the deployment area.
Open the Site: Select the Site which displays the released deployment plan.
See Also
For more information, see Preparation guidelines.
Begin by deploying the Border Gateway at the planned location.
Select the Border Gateway: Using the Deployment app, select the Border Gateway from the list of devices to display the deployment location.
Register the Border Gateway: Once at the location, scan the device's QR Code to register the Border Gateway.
Prepare the deployment location: Find the location on the tree or pole that is at a minimum of 3 m above ground level.
Run a range test: Run the connectivity test to ensure the Border Gateway has connectivity to the Silvanet Cloud.
Mount the Border Gateway: Use treenails (for trees) or C-Clamps (for poles) to mount the Border Gateway. The Dryad logo must be right side up.
Mount the solar panel: Mount the solar panel vertically, ideally above the Border Gateway and facing towards the sun (where it would be at 12:00 noon). Ensure the solar panel is connected to the Border Gateway.
Provide a mains power supply (if available): If a mains is available to provide a power supply, use the PoE Injector to connect to the mains. If a router is available, connect the router to the PoE Injector, as described in Border Gateway scenarios.
See Also
For more information, see Deploy Border Gateways.
With the Border Gateway connected to Silvanet Cloud (Connectivity test passed), deploy the Mesh Gateways at the planned location.
Select the Mesh Gateway: Using the Deployment app, select a Mesh Gateway from the list of devices to display the deployment location.
Register the Mesh Gateway: Once at the location, scan the QR Code to register the Mesh Gateway.
Prepare the deployment location: Find the location on the tree or pole that is at a minimum of 3 m above ground level and is oriented towards the sun (at 12:00 noon).
Run a range test: Before permanently installing the Mesh Gateway, perform the range test (Connectivity test) at the planned height (minimum 3 m height) to ensure it is online and has a good signal with line-of-sight to other planned Gateways and sensors.
Mount the Mesh Gateway: Using tree nails (for trees) or C-Clamps (for poles), mount the Mesh Gateway.
Deploy the next Mesh Gateway: Use the same procedures to deploy the next Mesh Gateway, ensuring it has been registered, mounted at the correct height and orientation and has connectivity to the Mesh Network.
See Also
For more information, see Deploy Mesh Gateways.
With the Mesh Gateways deployed (and all Connectivity tests passed), deploy the Wildfire Sensors based at their planned locations.
Select a Wildfire Sensor: Using the Deployment app, select a Wildfire Sensor from the list of devices to display its deployment location.
Register the Wildfire Sensor: Once at the location, scan the QR Code to register the Wildfire Sensor.
Prepare the deployment location: Find the location on the tree that is at a minimum of 3 m above ground level. Use a chisel or axe to remove any protruding bark at the location. Do not overly damage the bark.
Mount the Wildfire Sensor: Using a tree nail and spacer, mount the Wildfire Sensor.
Calibrate the Wildfire Sensor: Allow 14 days for the Wildfire Sensors to calibrate.
See Also
For more information, see Deploy Wildfire Sensors.
Silvanet devices are connected in a mesh network using LoRaWAN where each device implements LoRa, a low power wireless platform for IoT.
Silvanet Wildfire Sensors and Mesh Gateways form the Silvanet Mesh Network to forward messages from remote Wildfire Sensors to Border Gateways. This network is designed to work in areas where mobile coverage is weak or non-existent, which allows for large off-grid deployments.
Silvanet devices use the long-range, low power LoRa modulation to communication between devices using LoRaWAN.
LoRaWAN uses frequencies based on country-specific regulations.
The Silvanet Mesh Network uses LoRaWAN, which allows large-scale deployment of Wildfire Sensors in the challenging environment of forests where leaves, trees, hills and topology often inhibit radio waves. In these types of environments, the range of traditional LoRaWAN gateways is very limited.
Border Gateways are responsible for transmitting messages to all devices in the Silvanet Mesh Network for firmware updates using FUOTA.
The Silvanet Mesh Network connects to Silvanet Border Gateways using LoRaWAN. This allows the Gateway to communicate with the proprietary Silvanet Mesh Gateways or directly to Wildfire Sensors if they are within range.
Silvanet devices - Border Gateways, Mesh Gateways and Wildfire Sensors - are IoT devices based on LoRa. The frequency bands used by these devices depend on the region in which they is deployed:
Europe: 868 MHz
North America: 915 MHz
Asia: 923 MHz
These frequencies are set in the Silvanet devices by Dryad.
Maximum radio frequency power transmitted (Tx) in frequency bands in which the sensor operates (EU and North America):
EU Max Tx power: 25 mW EIRP
US Max Tx power: 25 mW EIRP
For a full list, see The Things Network Frequency Plans by Country.
If a Wildfire Sensor detects a smoldering fire, it immediately sends fire alerts to notify users.
Dryad's Silvanet Wildfire Sensors are attached directly to trees using tree nails to detect environmental air quality within a radius of 80 m to 100 m (260 ft to 320 ft).
These solar-powered devices monitor the microclimate of the forest using an internal gas sensor along with a Machine Learning model to detect the presence of a smoldering fire within range of the sensor.
Smoldering fire
A smoldering fire is defined to be a slow, flameless combustion of a biomass material such as forest floor material, branches, leaves, and so on.
Attached directly to trees The Wildfire Sensor is designed with a sturdy loop that allows the device to be attached directly to trees using treenails (permanent attachment) or with garden wire (temporary use only).
Solar powered Energy is harvested by its built-in solar panel to allow the sensors to operate without the need of batteries. Energy is stored in supercapacitors which provide maintenance-free operation for 10 to 15 years. Storing energy is supercapacitors rather than batteries is a precaution against the device itself starting a fire. As an added benefit, this avoids the use of lithium and other toxic materials.
Bosch gas sensor The Wildfire Sensor includes a Bosch gas sensor that combines ultra-low-power Air Quality sensing with a precise gas sensing mode. Carbon monoxide, hydrogen and VOCs (Volatile Organic Compounds) are detected at the ppm level with built-in artificial intelligence (AI) to reliably detect a fire and avoid false positives.
LoRa/LoRaWAN connectivity Connectivity to the Silvanet Network (Mesh Gateways and Border Gateways) is provided by a LoRA-integrated radio to send and receive messages across a robust LoRaWAN-enabled mesh network. This network allows the sensors to be deployed across large forested environments or along linear areas such as rail lines, power lines and hiking paths.
Wildfire Sensors are shipped in a box containing the following components:
Ten Silvanet Wildfire Sensors
Ten treenails and spacers (to keep the sensor away from the tree bark)
The dimensions of the Silvanet Wildfire Sensor are (LxWxH) 19 cm x 9.2 cm x 1.34 cm. It weighs 136 g.
Ingres protection: Ingress protection of the housing is IP67. This means the housing is completely protected against dust and is watertight.
The Silvanet Wildfire Sensor uses a Bosch gas sensor to monitor the microclimate of the forest. It is a low-energy hydrogen sensor that detects the presence of a smoldering fire over distances of up to 115 m.
The gas sensor detects the presence of CO (Carbon Monoxide), H2, (Hydrogen), VOCs (Volatile Organic Compounds) and VSCs (Volatile Sulfur Compounds). It detects VOC and VSC compounds at <20 ppm. It monitors the microclimate of the forest by providing measurements under the following conditions:
Air pressure: 300hPa to 1100 hPa
Humidity: 0% to 100%
Temperature: -40°C to 85°C
The Silvanet Wildfire Sensor includes a 60 mm x 60 mm solar cell on its front housing. It continuously generates energy during the daytime and recharges the device with sufficient power for the next 24 hours. After sunset, it begins to discharge until sunrise. After sunrise, it begins to recharge to 100% within about an hour.
Sufficient ambient light is available in forests to provide sufficient light for the solar panel. Forests are never entirely dark during the day, even with a thick forest canopy.
Each day the solar panel harvests 7Ws in the constrained conditions of a forest.
As a precaution against the device itself starting a fire, the sensor stores its energy in supercapacitors rather than batteries.
The solar panel provides sufficient energy supply to support continuous operation over a 24 hr period while still having enough reserve power to support the powering of the gas sensor and to send a burst of messages when a smoldering fire is detected.
The Silvanet Wildfire Sensor has very low energy consumption which is provided by its built-in solar panel. The two key components that consume energy are the gas sensor and the LoRa radio. The gas sensor consumes ~3.9 mA in standard gas scan mode.
The Wildfire Sensor consumes the following energy:
This allows it to operate in a shaded location for ~6 hrs.
Normally, the Silvanet Wildfire Sensor is in idle mode. Every 60 seconds it enter active mode to read the air quality. Then, every 2 hours it reads the environment, after which it sends a single packet to the Silvanet Cloud Platform via Mesh Gateways and Border Gateways.
These data packets contain normal (non-fire detection) environmental data which includes temperature, pressure and humidity internal values. These values are then displayed in the Site Details section of the Site Management app.
The Silvanet Wildfire Sensor uses a set of supercapacitors to store energy for use by the radio, gas sensor and other components. It stores the energy for day-to-day tasks and has a reasonable amount of reserve power to operate the gas sensor and radio module in case a potential fire is detected. As supercapacitors have an expected lifespan of 10 years or more, the sensors are essentially maintenance free. This allows for an expected lifespan of the sensor between 10 and 15 years.
Supercapacitors have a high capacity but a small maximum voltage of 2.7 V so a series of capacitors are loaded to 4 V. Capacitors are fully charged to 5.2 V.
Why use supercapacitors: Power supply is stored in supercapacitors rather than rechargeable batteries as they can potentially ignite. Consequently, using batteries would defeat the purpose of a wildfire detection system.
After deployment, the Wildfire Sensor requires 14 days to calibrate. Until then it can generate false-alarms. See Sensor Calibration for details.
Access the Site Management app using your user credentials provided to you by Dryad or Reseller.
Accessing the Site Management app (dryad.app) requires a user who has been given access rights by a user with Admin rights.
User role
After registration, a user is provided with login credentials. After logging in, the user is required to change their password.
Recommended Browser
The Site Management app works in all browsers. However, Dryad recommends using Google Chrome to access the Site Management app.
Enter the app URL dryad.app. The login page appears.
In the form, enter your username and password provided to you by Dryad, then select Sign In.
If this is your first log in, you are required to change your password. You cannot change your username.
Enter a new password in the Update Password form, then select Submit.
The Dashboard Overview appears.
To logout of the Site Management app, select the User Profile icon and from the dropdown menu, select Logout.
Using LoRaWAN, Silvanet Mesh Gateways act as range extenders to allow for widespread deployment of Wildfire Sensors in a linear or irregular areas.
Each forest is unique with varied topology and changing terrain such as hills, slopes, rock outcroppings, even mountains, valleys and cliffs. Linear areas such as railroad tracks, power lines, hiking trails can also have the same varied topology. So, each forest can have features that can interfere with reliable transmissions between devices. These challenges are overcome by using Dryad's Silvanet Mesh Gateways.
The Silvanet Mesh Gateway acts as a range extender by using the same Mesh Network used by the sensors to receive and forward messages to other Mesh Gateways and/or Border Gateways.
By forwarding messages, large-scale deployments of Silvanet sensors can be implemented throughout extensive forested areas or along remote stretches of rail lines, power lines and hiking trails.
As the Silvanet Mesh Gateway is proprietary to Dryad, the device is not open to 3rd party applications.
Connects to the Silvanet Mesh Network (including Border Gateways) using LoRaWAN.
Range between Gateways (Mesh and Border) is typically between 2 km to 6 km depending on topology and physical placement of the Mesh Gateways.
Low power consumption that allow it to operate using only its solar panel for its daily energy requirements. The power consumption is calculated to be 3997Ws.
Firmware is remotely updated using FUOTA (Firmware Update Over-the-Air).
Each Mesh Gateway supports up to 100 sensors.
Automatically registers with the Silvanet Cloud during the deployment process using the Device ID (scanned using a QR code).
Each shipment of a Mesh Gateway includes the following components:
Silvanet Mesh Gateway
Treenails (for permanent deployment)
U-bolt Clamps, M10 nuts and washers
5 meter roll of garden wire (for temporary deployment)
LoRa antenna (North America: 915 MHz, EU: 868 MHz, Asia: 433 MHz)
The dimensions of the Silvanet Mesh Gateway are (LxWxH) 68 cm (87 cm with antenna) x 29 cm x 5 cm and weighs 2.8 kg.
Messages from Wildfire Sensors hop from Mesh Gateway to Mesh Gateway until they reach the Silvanet Border Gateway. This allows for a Silvanet Mesh Network to be extended to a very large-scale deployment consisting of hundreds or even thousands of sensors.
The patent-pending architecture uses a multi-hop mesh network of Mesh Gateways each serving as a standard LoRaWAN gateway to Silvanet Wildfire Sensors.
The Silvanet Cloud Platform captures data received from Silvanet Border Gateways sent via the Silvanet Mesh Network from Wildfire Sensors.
Silvanet Border Gateways receive data sent from Wildfire Sensors via Mesh Gateways. This data is then sent over the Internet - via mobile networks, an Ethernet connection or satellite - to the Silvanet Cloud Platform and made available in the Silvanet Site Management app and the Silvanet Deployment app.
Each registered Dryad user receives unique login credentials (username and password) to access the Silvanet web-based and mobile apps.
Use the Site Management app to plan and manage deployments of Silvanet devices and to view Wildfire Sensor data.
Registered standard and admin users are given access to the web-based Site Management app available at dryad.app to plan deployments of Silvanet devices and to monitor environmental conditions after the devices have been deployed.
Admin users have additional privileges to manage users and add Sites.
The Silvanet Border Gateway provides connectivity via the Internet between the Silvanet Mesh Network and the Silvanet Cloud Platform.
Dryad's Silvanet Border Gateway provide the connectivity between the Silvanet Mesh Network and the Silvanet Cloud Platform. It is assumed to be always on (24 hour operation) to listen for messages sent by Wildfire Sensors in the Site. It can operate using its solar panel or in combination with a mains power supply and its solar panel. Internet connectivity can be wireless (mobile), wired (Ethernet) or satellite.
The Border Gateway is ideally placed at the edge of a forest. As the Border Gateways are LoRaWAN compliant, they can also communicate directly with Wildfire Sensors if any are within range of the Border Gateway.
Deployment scenarios The Border Gateway can be set up in various deployment scenarios depending on the availability of power supplies, internet connectivity and deployment locations. See Border Gateway deployment scenarios.
Mount directly to trees or poles
Includes a solar panel and PoE Injector
Uses LoRaWan to connect with the Silvanet Mesh Network.
Internet connectivity:
4G/LTE-M (with 2G/GPRS fallback) or NB-IoT.
Ethernet using the PoE Injector.
Satellite for remote deployments and for backup.
Energy source:
mains power supply using the supplied PoE Injector.
Solar panel to provide daily energy requirements.
Supports FUOTA (Firmware Update Over-the-Air) for remote firmware updates.
Supports deployment of up to 20 Mesh Gateways.
Directly receives messages from sensors if they are within range.
Each shipment of a Border Gateway includes the following components:
Silvanet Border Gateway
Solar panel
Treenails (for permanent deployment)
U-Bolt Clamps, M10 nuts and washers
5 meter roll of garden wire (for temporary deployment)
LoRa antenna (North America: 915 MHz, EU: 868 MHz, Asia: 433 MHz)
LTE-M antenna
Satellite antenna
PoE Injector and one power cable
RJ45 CAT6 Ethernet network cable for use with the PoE
The dimensions of the Silvanet Border Gateway is (LxWxH) 27.5 cm (63 cm with antennas) x 46 cm (with the satellite antenna) x 4.5 cm and weighs 1.3 kg.
The Silvanet Border Gateway includes a PoE Injector to connect to a mains power source. If a router is available, it can be connected via Ethernet to the PoE.
The PoE provides a voltage range of between 36 V and 57 V and is IEEE 802.3af compliant.
For more details, see Border Gateway deployment scenarios.
For off-grid locations or when a mains power supply is unavailable, the solar panel provides the Border Gateway's daily energy requirements and ensures the supercapacitors are charged.
During the night when the solar panel loses generating capacity, the supercapacitors allow the device to continue receiving power. This ensures a continuous power supply to the Border Gateway.
The cable between the Border Gateway and the solar panel is 2 m long and is pre-connected.
When a relatively short power outage occurs, the Border Gateway's supercapacitors allow the device to continue receiving power.
Should a power outage occur for an extended period, such as 10 hours of even several days, the solar panel guarantees a power supply to the Border Gateway by charging its supercapacitors until the power supply is restored.
To reduce overall power requirements, the Border Gateway's modem wakes up ever hour and stays on for five minutes to send a message (a "heartbeat") to the Silvanet Cloud to indicate it is alive.
The Border Gateway's internal supercapacitors provide a power supply of 5415Ws. They provide a large amount of power for a short duration (for example, when it sends a "heartbeat") and are continuously recharged from an external power supply (PoE or solar panel).
Use of supercapacitors Power supply is stored in supercapacitors rather than rechargeable batteries as rechargeable batteries can ignite. This would defeat the purpose of a wildfire detection system.
The Border Gateway provides a range of options to connect to the Internet.
It supports LTE-M (Cat-M1)/NB-IoT which requires access to a 4G network with 2G fallback (GPRS). An LTE-M antenna is provided to connect to a 4G network.
If a router is available, the Border Gateway can be connected to the router using the PoE Injector and Ethernet.
Satellite (backup) connectivity is provided should Ethernet and LTE-M become unavailable or if the Border Gateway is deployed in a remote location without access to mobile towers. An antenna is provided for Satellite uplink.
Satellite uplinks provide Fire alerts only A satellite uplink should only be used for remote deployments where there is no mobile network coverage AND no access to mains power. However, the Border Gateway sends only fire alerts when using satellite connectivity.
The Border Gateway supports FUOTA (Firmware Update Over The Air) with high flexibility. Large file transfers are successfully made securely and reliably even with eventual interruptions of the power supply and, consequently, sensor operation.
Firmware is updated using a chunked image transfer (no compression). All Silvanet sensors in a Site are updated at the same time using Multicast. To do this, the LoRaWAN Network Protocol is temporarily switched to Class B which allows two-way communication.
To cope with low power and the various regional regulatory requirements, both the downlink fragment size as well as the periodicity are highly configurable allowing for stretching a FUOTA process even to a week.
For more details, see Firmware Updates (FUOTA).
Map View shows all your Sites on a global map and provides access to device details. It also enables a Fire risk view.
Use the Map view to locate your Sites on an embedded world map.
User role
Each Site is shown as an icon. Once located, zoom in to view the Site. You can choose between 2D and 3D Terrain views and add a Fire Risk overlay to the map. By selecting a device, the status of the device is displayed.
Selecting 3D Terrain displays the terrain otherwise hidden hills and valleys (in 2D view) may cause problems with communication between sensors and gateways.
Select the Enable Terrain (mountain) button to switch to 3D Terrain view.
Use the right mouse button or hold the control key + mouse pad movements to rotate the map in 3D View.
Select the Reset button (compass) to toggle to 2D View.
Selecting a status icon from a Site to display a device's latest status information.
Selecting the Fire icon displays the Fire Risk overlay for a selected area shows areas of higher levels of fire risk.
The Device Info link opens the Technical details page which displays device technical information.
Name: User-readable Device ID.
Notes (editable): If a note was added during deployment, it appears here. Otherwise, a note can be added by making the field editable.
Installed device location (editable): Provides current GPS coordinates (Latitude/Longitude) set during deployment. If the device has been moved, update the GPS coordinates in these fields.
Update GPS location after relocating a device
If a Silvanet device has been relocated from its deployed location, its GPS coordinates (latitude and longitude) needs to be updated. This can occur when a tree on which a sensor is attached falls or if a pole on which a Mesh Gateway is deployed must be moved. The GPS coordinates of a device can be easily changed.
Displays uneditable technical information about the Silvanet device.
Sensor ID: Identifies the device in the Silvanet System.
EUI: 64-bit Extended Unique Identifier.
Join EUI: Internal use only.
LoRaWAN PHY Version: PHY Version.
LoRaWAN Version: MSC version corresponding to the PHY Layer version.
Device Address: 32-bit device address (non-unique).
Firmware Version: Indicates which version (and related Region) installed on the device.
ML Version: Indicates which Machine Learning (ML) firmware applied to the device.
NS End Device ID: LoRaWAN Network Server (NS) End-Device ID.
Display the sensor data based on a selected time range. This is the same data as displayed in Device Details.
Displays the QR Code used in the Silvanet Deployment App.
The Site Details provides at a glance the status of all deployed Silvanet devices in a Site and shows, if triggered, which Wildfire Sensor has triggered a Fire Alert.
The Site details page provides detailed information of the current status of a Site.
User role
Use the Site details page to do the following:
Access the : The Planning tool is used to generate a coverage estimation for the Site.
Monitor the Site: Environmental data provided by each deployed Wildfire Sensor is provided.
Locate source of fire alerts: Locate which Wildfire Sensor(s) has detected a fire. GPS coordinates are provided to identify where the Sensor is that triggered a fire alert.
The Site details page is accessible from the , and .
After a Site is created, it is assigned a Side ID which cannot be changed. You can find the Site ID in the URL of the Site as well as part of breadcrumbs on a Site details page.
The Site name and Organization to which the Site belongs is shown in the line below the Site ID.
Select the Ellipsis menu to access the following Site tools:
Select to edit or rename the Site name. The Site ID cannot be changed (located as part of the breadcrumbs and URL).
Select to open the Planning Tool used to rapidly generate Site details such as coverage area, number and placement of Border and Mesh Gateways as well as number and placement of Wildfire Sensor. The result is a set of deployment Packets available in the Silvanet Deployment app.
Planning tool
Select to Packets make modifications to Packets prepared by the Planning tool. Packets can be added or deleted as required.
Packet editor
Under the Site name, you can quickly see how many Silvanet Border Gateways, Mesh Gateways and Wildfire Sensors are Active, Inactive and/or triggering Fire Alerts.
An embedded Site map allows you to easily navigate around the Site and get an overview of the Site's terrain without leaving the Site details page.
Use the tools to expand the map, toggle on/off 3D Map View, Fire Risk View and more.
See Also
The Device overview section lists all deployed devices in a Site. Devices are sorted into Active, Inactive and Fire Alert. Troubleshooting messages are displayed when expanding a device that shows alerts or warnings.
See Also
The Device Info link opens the Technical details page which displays device technical information.
See Also
Dryad's Silvanet System is a complete solution for early wildfire detection — detect wildfires in their ultra-early stages.
Contact to start protecting your forests and critical assets from wildfires using Silvanet's ultra-early fire detection system. Subscribe to .
Dryad's Silvanet Suite is designed to detect forest fires in their ultra-early smoldering phase. It consists of a mesh network of , and deployed throughout a Site.
Border Gateways are connected (via the Internet) to the which provides to the and data and alerts from a Site's Wildfire Sensors.
Learn how to plan a Site and deploy Silvanet devices using our .
Read the to learn about for the latest updates.
Feedback on our docs
If a sensor determines with a high probability that a smoldering fire has occurred then fire alerts are immediately sent to notify users of the fire.
When the Silvanet system detects a smoldering fire, fire alerts are immediately sent to registered users via and are displayed in the .
Smoldering fires A smoldering fire is defined to be a slow, flameless combustion of a biomass material such as forest floor material, branches or leaves.
Warning - Wildfire Sensors require 14 days for calibration
Silvanet Wildfire Sensors are ready to detect fires ONLY after the sensors have been calibrated for 14 days after deployment.
Consequently, before the calibration period ends, the Wildfire Sensors do not provide useful information and may generate false alerts.
After the Wildfire Sensor has been calibrated, the gas sensor continuously monitors the microclimate of the forest air to measure:
Air pressure
Temperature
Humidity
At the same time the Wildfire Sensor "smells" the air around the sensor for the presence of Volatile Organic Compounds (VOCs) and carbon monoxide.
VOCs
Volatile Organic Compounds (VOCs) are compounds that have a high vapor pressure and low water solubility. Wildfire smoke contains many toxic VOCs depending on the type of fuel source of the fire.
Index of Air Quality (IAQ)
The sensor “smells” the air on a regular basis to determine if the air quality has deviated from the saved Normal Air Quality (see below). Air quality is quantified as an Index of Air Quality (IAQ) which has a range of values that indicate the quality of air within range of the sensor.
This continuous monitoring allows the Wildfire Sensor to distinguish between normal and declining Air Quality:
Normal Air Quality:
Normal Air Quality is the baseline reading of the Wildfire Sensor. It is the result of the 14 day calibration period of the sensor.
This process continues after calibration.
Declining Air Quality:
When the Air Quality deviates from the baseline reading (Normal Air Quality), this is considered a decline of Air Quality.
However, this decline could have many causes. It could be the result of similar gasses which the sensor has detected. These gases could be diesel fumes from a passing truck, cigarette smoke or other factors that can cause a decline in air quality.
The role of the Wildfire Sensor is to determine if this decline is the result of a smoldering fire or some other source.
Once per minute, the Sensor wakes up and performs an environmental monitoring gas scan. During each gas scan, hydrogen, carbon monoxide and other Volatile Organic Compounds (VOCs) are measured. It also measures air pressure, temperature and humidity.
The Wildfire Sensor uses a default sliding time window of 5 minutes to "smell" the air. If the Wildfire Sensor detects a significant deterioration of air quality within the past four gas scans, a prescribed set of gas scans are triggered to determine if the observed deterioration is from a smoldering fire or from some other source.
The Wildfire Sensor only needs only 2-3 minutes to determine if a fire is present.
For each gas scan, the results of the gas scan are compared with with a pre-trained Machine Learning (ML) Model. This is done to determine if the observed decline in air quality can be classified as wildfire smoke or from some other source. As these gas scans consume a lot of energy, they are kept to a minimum.
Returning to normal values after tests
After the sensor performs gas scans, it needs approximately 30-60 minutes for the sensor to return to baseline. During this time, the sensor does not perform fire detection.
Machine Learning models
These models have been trained in Dryad's lab to detect typical gas compositions of smoke from burning trees.
fire alerts contain the following information:
Total number of fire alerts sent from the detecting sensor.
Number of alerts sent from the detecting sensor within the last two hours.
Sensor ID of the Wildfire Sensor that detected the fire
Date
Timestamp
Location (Latitude and Longitude) of the Wildfire Sensor.
Link to Google Maps opens to show the location of the Wildfire Sensor that detected the fire. If Google Maps is not installed, it launches a browser and opens Google Maps in the browser.
When a sensor detects a fire, a fire alert email is immediately sent to registered users who can then act to extinguish the fire.
When a sensor detects a fire, the same fire alert that is sent as an email also appears as a fire alert in the Site Management app.
Fire alert notifications from specific sensors can be muted.
From the Alert Center, select a Site generating fire alerts.
From the Site, select a sensor generating fire alerts.
Select the checkbox next to the Sensor name. The Mute notification icon appears.
From the dropdown choose the reason for clearing the alert:
Test Alert: Alert sent during testing the deployment with a controlled burn.
False Alert: Alert sent during the sensor calibration phase.
Fire Extinguished: Detected fire that caused the fire alert to be sent has been extinguished.
An MQTT interface is available for 3rd party alarm interfaces / apps.
See Also
Use the Deployment app to deploy the planned Silvanet devices and to run Connectivity Tests between Gateways.
The Silvanet Deployment app is used to deploy Border Gateways, Mesh Gateways and Wildfire Sensors. During deployment, a device's ID is into the app which links the current GPS location (longitude and latitude) to the device. This data is then saved to the Silvanet Cloud.
During Border and Mesh Gateway deployments, the Deployment app requires that a connectivity test is run before the device is mounted to the tree or pole. This ensures the gateways have reliable connectivity before the Wildfire Sensors are deployed.
Android installations
If you already have the Deployment app installed, to access the latest features, open the Play Store on your Android device, search for our app 'Silvanet Deployment', and select 'Update' to install the newest version.
Search for Silvanet Deployment on your Smartphone's App Store or Google Play, then install the app.
Ensure you have given the Silvanet Deployment app the appropriate permissions, including Location and Cellular Data.
Open the app, then in the Sign In screen enter your user credentials and tap Sign In. If required, you can the language used for the Sign In screen.
Once signed in, the app remembers your login credentials, unless you log out.
The Select Site screen appears displaying all Sites to which you have access. Any Site that has been added to an Organization in the Site Management app is displayed in the Silvanet Deployment app.
From the list of Sites, tap a Site or the arrow to open the Site. The Site's devices appear in a list.
The Site view shows all planned and/or deployed devices in the Site, as well as the Packet to which each device belongs. You can either view the entire Site map or drill down to a specific device on the map.
For each device in the Site, the app shows:
Name of device.
Packet in which the device was added.
Status of device (see below).
Link (arrow) to open map show location of the device.
Button to show all devices on the map.
Planned (all devices): State of device after a Silvanet device has been added during a Site planning. The device has not yet been deployed.
Registered (all devices): State of device after scanning the QR Code.
Connectivity Test Running (Border and Mesh Gateways): State of a gatateway if it's currently running a connectivity test.
Connectivity Test Failed (Border and Mesh Gateways): State of a Border or Mesh Gateway if a Connectivity test fails between two Gateways. Reasons for the failure could include insufficient sunlight to charge the device, the device is currently charging or the device may need to be relocated.
Deployed (Border and Mesh Gateways): State of a Border Gateway or Mesh Gateway after the installer has performed Connectivity tests and the device is connected to the Mesh Network.
Deployed (Wildfire Sensors): State of a Wildfire Sensors after the installer has confirmed the device has been correctly mounted.
The Deployment app provides a selection of filter to find specific devices. You can filter the devices by:
Device type
Status
Deployment Packet
Tap a filter, then top Apply to view only the selected devices in the list. To view all devices again, tap Clear which clears the filter.
To view a the location of specific device, tap the link to a device on the Site page. The map opens with the device selected at its planned or deployed location on a map. The Status Icon shows the state of the device.
To view the Site to show all devices, tap Show Devices on Map on the Site page. Zoom or pan on the map in to locate specific devices.
The Alert center displays Fire Alerts triggered from any Wildfire Sensor in any Site to which you have access. You can then locate where a Wildfire Sensor detected the fire.
The Alert Center provides at a glance if any Wildfire Sensor from any accessible Site has generating a Fire Alert.
User role
If no sensors are triggering alerts, this page indicates the status as All sites are currently safe.
If one or more sensors have triggered a Fire Alert, they are listed in the Alert Center. It shows which sensors triggered the alert and a Map of the Site that has the alerts.
Expanding a sensor in the list displays which Wildfire Sensor triggered the alert, where it is located and a link which shows its location on a map.
Selecting the Location icon (arrow) opens a map (Google Maps) with a pin showing the location of the sensor that triggered the fire alert.
The Device overview section of the Sites page provides access to the current status of each Silvanet device deployed in a Site.
The Device overview section lists all deployed devices in a Site. Devices are sorted into Active, Inactive and Fire Alert. Troubleshooting messages are displayed when expanding a device that shows alerts or warnings.
If the Silvanet devices have not been deployed for a Site, the Device overview section is blank. As soon as devices have been deployed and are sending data to the Silvanet Cloud, the device listing appears.
For each Border Gateway, Mesh Gateway and Wildfire Sensor planned or deployed in a Site, the following is provided:
Expand icon: Expand to display device information and data from the device shown as line graphs. Select the duration for the line graph from the Time dropdown (6 hours, 12 hours, 24 hours, 3 days or 10 days).
Device icon: (Not sortable) Device type icon. Any alerts and warnings are overlaid on the icon.
Name: (Sortable) Device name assigned to the device during deployment planning. This cannot be changed.
Connectivity: (Sortable) Shows the device's level of signal strength based on RSSI (Receive Signal Strength Indicator) at the nearest Mesh Gateway.
Energy: (Sortable) Shows the energy level of a Wildfire Sensor's supercapacitors.
Firmware version: (Sortable) Current version of the firmware running in the device.
See Also
For an explanation of icon types, see Status Icons.
Calibrating: (Wildfire Sensors) The Wildfire Sensor is in calibration mode, which takes 14 days after deployment. During this period, the Sensor does not provide reliable data and alerts.
Active: (all devices) Indicates Silvanet Cloud can reach these devices and are sending data to the Silvanet Cloud.
Pending: (all devices) The device is currently experiencing delays in sending environmental data to the Silvanet Cloud. However, the device is still monitoring the environment. Fire detection is still operational.
Inactive: (all devices) Indicates device is not reachable. May be due to connectivity and/or charging issues. These issues need to be resolved immediately to ensure the device returns to Active state.
Fire Alert: (Wildfire Sensors) Indicates a Wildfire Sensor has transmitted an alert. This also appears as a blinking icon in the app's Title Bar.
If a device is not responding as expected, alert or warning icons are displayed which notify the user of an underlying issue that needs to be resolved. Expanding device details provides troubleshooting information.
See Also
For a complete list of troubleshooting messages, see Troubleshooting.
The following shows an example Alert which need to be immediately resolved to ensure the device continues normal environmental monitoring.
See Also
The following shows an example Warning which should be resolved as soon as possible to allow the device to return to normal functioning.
See Also
Additional information that do not require user-interaction but affect device performance are provided as well.
A key exception is the Device Calibration notification. It indicates the Wildfire Sensor is currently in calibration and needs to complete (14 days) before the device is ready for environmental monitoring.
Each Silvanet device sends data to the Silvanet Cloud. This data is then displayed as line graphs for a selected time period.
The default period is 24 hours. Select a time period for the displayed data sent in a range of 6 hours, 12 hours, 24 hours, 3 days or 10 days.
Validate the scalability of the Silvanet System using a Pilot deployment followed by a full-scale Live deployment.
Deploying a Silvanet Network in a forest is typically a two-stage process:
Pilot (2 - 4 months): Small-scale deployment of up to 400 sensors that demonstrates Silvanet's scalability and Mesh Network to detect controlled test fires.
Live (10-15 years): Large-scale deployment of the required Widlfire Sensors and Mesh/Border Gateways across a targeted forest area (the Site).
A Pilot deployment validates Silvanet System's core functionality and scalability. This type of deployment typically monitors an area of about 400 to 500 hectares (approximately 1000 acres to 1250 acres).
This deployment typically has a duration of approximately 2-4 months.
Use the to determine the required number of Wildfire Sensors, Border Gateways and Mesh Gateways.
400 Wildfire Sensors Garden wire can be used to temporarily mount the Wildfire Sensors to trees. Sensor spacing should be from 80m to 100m.
Four to eight Mesh Gateways For an area of 400 to 500 hectares, deploy at least four up to eight Mesh Gateways, depending on the terrain and RF signal propagation conditions (line-of-sight).
Topology and forest density determines number of Mesh Gateways Hilly areas need more Mesh Gateways. Less dense and relatively level forest floors need less Mesh Gateways where 4 should be sufficient.
One Border Gateway Only one Border Gateway is typically needed. Additional Border Gateways can be added for redundancy.
To deploy 400 sensors and Gateways, a team of 2 people can deploy 20 to 50 devices a day.
However, this depends entirely on the difficulty of the terrain and state of the forest floor. In general, deployment is achieved quicker when more teams are available to deploy the devices.
A Live deployment can use the results of a Pilot deployment (but not necessarily) to determine the number of sensors and gateways needed to effectively cover the entire Site.
This has a deployment duration of 10-15 years.
Site dimensions The size of the Site in hectares determines the number and type of Silvanet devices to effectively cover the Site area.
Topology and forest density determines number of Mesh Gateways Mesh Gateways require line-of-sight between other Mesh Gateways. Hills, ravines and other aspects of the topology may interfere with line-of-sight. Mounting Mesh Gateways higher than the recommended 3 meters or even mounting them on a hill may increase line-of-sight.
Effect of interactions on sensor calibrations Emissions from vehicles on lanes and roadways may interfere with Wildfire Sensor calibrations. Similarly, human interactions with the devices can be reduced by placing them away from roadways and hiking trails.
Device ratios Use the follow (maximum) device ratios:
Ratio of Wildfire Sensors to Mesh Gateways is 100 to 1.
Ratio of Mesh Gateways to Border Gateways is 20 to 1.
Wildfire Sensor density Distances between Wildfire Sensors is based on human activity and the Wildlife Urban Interface:
For areas of high human activity, distances between Wildfire Sensors should be no further than 100 meters between devices.
For areas of low human activity, distances between Wildfire Sensors can be increased to 400 meters to 500 meters between devices.
Prepare installation plans Consider how the deployment teams must traverse the forest so they can efficiently use the time. With such a large deployment area, several teams of two workers may be required to deploy all the sensors. Ensure you prepare one site Packet per team, considering how the team must navigate through the forest.
Learn how to use the Planning tool to plan density and locations of Wildfire Sensors, Mesh Gateways and Border Gateways and to ensure Gateway connectivity .
In this tutorial, we demonstrate how to use the Planning tool to prepare a deployment plan.
The plan uses a Site that has paths, railways, roads and structures within a forested area. This is a typical WUI (Wildland Urban Interface) where wildland (forests and meadows) intersect with urban areas.
The Site also has areas that are typically inaccessible to most people which for deploying some Silvanet devices requires hiking off-trail through these forests with deployment tools and devices.
Planning tool file
If you have already saved a Site Planning file, open the <filename.dryad>
from within the Planning tool to continue or to modify the plan.
Paths are typically areas that require a higher density of sensors. Examples of paths in the Planning tool include hiking paths, lanes and roadways, rail lines, power lines or other linear areas that have a higher level of human activity than a forested area.
Use the tool to define the density of sensors along elements of the Site expected to have human use, such as hiking paths, roadways and power lines.
Multiple paths
The cumulative number of sensors planned for all paths are included in the Sensor count.
Create a path: Select the Draw Path tool, then begin the path by selecting the start point and dragging the path along the route. End the path by double-clicking on the map. The GPS locations of the Wildfire Sensors in the path are automatically generated and saved.
Describe the path: Enter details in the Path Settings panel:
Name: Enter a descriptive name.
Path type: Select from Hiking Path, Road, Railway, Power Line or Other.
Protection Level: Use the slider to determine Wildfire Sensor density (Low, Mid, High). The distance between Sensors affects the amount deployed. The higher the protection level, the shorter the distance between Sensors.
Add Wildfire Sensors to path: If required, you can add Wildfire Sensors at specific points. Select Manual Planning, then select Add Sensor.
Save the project
Use the tool to define lower Wildfire Sensor density areas of the Site. It also can be used to define inaccessible areas within the Site.
Areas are large segments of the Site where a lower density of Wildfire Sensors are expected. They are usually areas of low (or lower) human activity or even no human activity. They can be areas off-limits to human activity, remote areas or forested areas that may have pathways running through them.
Multiple areas
To make planning easier, define multiple areas. Sensors from all areas are included in the total Sensor count.
Create an area: Using the Draw Area tool, begin the area by selecting a start point, then drag the path along the boundary of the area and then double-click on the map to complete the area. The GPS locations of the sensors in the area are automatically generated and saved.
Describe the area: Enter details in the Path Settings panel:
Name: Enter a descriptive name.
Surface area: This is automatically generated.
Accessible: Select this option of the area is accessible to humans. If it is inaccessible (such as private property, military area, restricted area) then no sensors can be deployed in the defined area.
Protection Level: Use the slider to determine Wildfire Sensor density (Low, Mid, High). The distance between Sensors affects the amount deployed. The higher the protection level, the shorter the distance between Wildfire Sensors.
Add a second area: Select Draw Area tool and using the same procedure add a second area.
Add an inaccessible area: If any areas are not accessible, use the Draw Area tool to define this area. In this case, slide the Accessible selector off. The area then is defined without Wildfire Sensors.
Save the project.
Add or remove sensors You can move, rename or delete a sensor. For details, see .
Use the Plan Connectivity tool to ensure the Wildfire Sensors have connectivity to the Silvanet Mesh Network and to the Border Gateway.
Wildfire Sensors need to be connected to Mesh Gateways to join the Silvanet Mesh Network. Connectivity is provided by first adding a Border Gateway to the plan, after which you add Mesh Gateways.
Line-of-sight: The line-of-sight of the Gateway is indicated by an irregular blue overlay that shows areas where the Gateway has connectivity.
Broken areas: Broken areas in the blue area indicate topology that prevents signals from reaching those areas. These areas require additional Mesh Gateways. They must be added within existing blue areas to allow the Mesh Gateways to connect with existing gateways.
Sufficient coverage
Add Mesh Gateways until you have achieved 90% to 100% coverage of the Site.
Select the Plan Connectivity tool.
Add Border Gateway: Place a Border Gateway on the map. The initial gateway is defined as a Border Gateway. The GPS location of the Border Gateway is automatically generated.
Add Mesh Gateway: Use the Plan Connectivity tool to add a Mesh Gateway. Ensure you add it within the blue zone of the Border Gateway. This ensures the Mesh Gateway has connectivity to the Border Gateway.
Add additional Mesh Gateways: Continue adding more Mesh Gateways until the Site has sufficient network coverage (90% to 100%), as shown in the green bar.
Save your project.
When you are satisfied with the deployment plan, you can then generate the Packets for use by the Silvanet Deployment app.
Select Release Deployment Plan.
Troubleshoot issues found: If the application identifies issues with the planned locations of sensors and gateways (such as Sensors not connected to Gateways), it prevents the generation of the Packets before the issues are corrected. Go through the list of issues and correct them.
Example: Unconnected Sensor identified: For example, move an unconnected sensor within the blue zone of a Mesh Gateway to resolve one of the issues. Move Sensor icon to connected area: Notice the sensor sitting within an unconnected area. This sensor can be moved a few meters to be within a connected area. Troubleshooting completed: With all issues resolved, the Deployment Plan is ready to be released.
Select Release Plan to generate the Packets.
Save your project.
Select Quit to close the Planning tool.
Modifying plan: Later if you need to modify the plan, open the project file and make any required changes.
Export Summary
In the latest release of the Planning tool, we have provided a Export Summary function. For details, see Planning Summary Export in Planning tool.
After completing the Coverage planning, switch between views to ensure you have coverage in areas that may be hidden such as hills or valleys.
Switching to Terrain view shows the topology of the path and how it may affect message transmissions to/from the sensors.
Switching to Map view highlights the urban and forested/park areas of the paths.
Select 3D View to rotate the site. This reveals areas that may not be covered by sensors or other deployment issues, such as steep hills that may be difficult to traverse.
The amount of Mesh Gateways supported by Border Gateways is variable but should not exceed these guidelines.
For every one Border Gateway deployed, up to 20 Mesh Gateways can be deployed, depending on the Site's topology. However, as Mesh Gateways act as repeaters, any number of Mesh Gateways can be deployed on a Site.
Ensure each Mesh Gateway can communicate with at least two other Mesh Gateways. This ensures a reliable Mesh Network in the forest.
Additional Border Gateways can be deployed as a backup for the Mesh Network.
In the following figure, one Border Gateway (plus a backup Border Gateway) receives communication from 20 Mesh Gateways. Note the connectivity paths between Mesh Gateways. With a few exceptions, each Mesh Gateway connects with at least two other Mesh Gateways.
Ensure Border Gateways and Mesh Gateways are within specified ranges of other Silvanet Gateways
The range of a Border Gateway to a Mesh Gateway is approximately 2 km to 3 km.
At approximately 2 km to 3 km, Mesh Gateway to Border Gateway range is similar to Mesh Gateway to Mesh Gateway.
The actual range between Gateways may vary depending on the Site topology. With direct line of sight between Gateways, the range can exceed 3 km or even up to 8 km (during conducted tests).
Increasing potential range
It is possible to increase the range between Gateways by mounting the device higher than the recommended 3 meters above the forest floor. This may also overcome line-of-sight issues where hills and other aspects of Site topology may interfere with line-of-sight.
Learn about the requirements for deploying Border Gateways, Mesh Gateways and Wildfire Sensors.
Use the Planning tool to quickly generate a rapid and precise coverage estimation of a Site.
The Planning tool provides a set of tools for rapidly estimating the number of Wildfire Sensors and Silvanet Gateways needed to cover a Site.
To generate an estimate of the number of Wildfire Sensors and Gateways needed for a given Site, use the Planning tool to do the following:
: Use the Path tool to define high-density deployment areas such as hiking paths, rail lines, power lines.
: Use the Area tool to define lower density deployment areas such as forested areas.
: Use the Connectivity tool to define the number and placement of Border Gateways and Mesh Gateways to build up a successful Mesh Network in the Site.
: Use the Comment tool to add relevant comments to the plan.
: Export your plan which appears as a set of devices with their planned deployment locations.
Saving your work
Frequently save your work to a drive. The Site Management app saves it as: <Planning - Site ##.dryad>
The Planning tool is accessible directly from the Site Dashboard of new and existing sites. Select Planning from the Ellipsis dropdown menu to open the Planning tool.
The Planning tool is displayed.
Save your work regularly
While working on the Planning project, save your progress regularly to a local drive on your computer or to a network drive.
If you quit or refresh the page, your progress will not be saved.
Planning tool file
A Planning project name is saved as name_of_project.dryad.
You can use a more descriptive file name but it must use the .dryad
extension.
The main menu provides access to saving and opening planning projects.
Open - Access saved Planning work on a local or network drive.
Save - Save and store your progress locally.
Export to CSV - Export device coordinates to a CSV file.
Help - Provides access to an external User Manual.
Quit - Closes the Planning tool. Any work is lost if you do not save your work before closing.
The Toolbar provides access to tools for estimating the number of sensors in an area defined by polygon and line shapes, as well as gateways to ensure the area has connectivity. Comments can be added for relevant information.
Select - Select items on the map.
Path - Draw path-like areas to cover with sensors.
Area - Draw areas to fill with sensors.
Connectivity - Build a mesh of gateways.
Comment - Add comments and annotation directly on the map.
The Draw Path tool defines areas requiring a high density of sensors. Examples include hiking paths, lanes, roadways, rail lines, power lines or other areas that have linear dimensions.
Start path: Start creating a new path by clicking on the map where you want the path to start.
End path: End the path by double-clicking on the map where you want the path to end.
Settings: Use the Path Settings panel to name the path, set its type and distance between sensors. See below.
Remember to save the project frequently.
The Path settings are accessed by selecting a path.
Name - Give the path a descriptive name.
Path type - Choose between different path presets which influence the placement of sensors on the path.
Hiking path
Road
Railway
Power line
Level of protection - Adjust the level of protection of this item. A low level of protection is 100m between each sensor, a high level is 20m between each sensor.
Distance between sensors - Level of protection slider sets the value in this field; however, you can enter a precise distance, as required.
Amount of sensors - the value in this field is based on the length of the path and density; however, you can enter a precise number of sensors, as required.
Select a path, then in the Edit Path view, select the Pencil icon. The path becomes editable.
Make changes as required:
Delete a point: Delete a point of the path by clicking on a white dot and press delete or backspace.
Move a path: Move a path by selecting and dragging a white dot on the path.
Add an angle: Add an angle (indicated by white dot) by selecting a yellow dot.
Remove a path dot: Remove a path dot by selecting a white dot and press Delete or Backspace.
Delete a path: When a path is active, select the Trash icon to delete a path.
Click anywhere on the map to deselect the path.
Save the project.
The Draw Area tool defines large areas of a Site where a lower density of sensors is needed, such as areas of low human activity or almost no human activity. This can be areas typically off-limits to human activity, remote areas or forested areas. They even may have pathways running through them.
Start an area: Start creating a new area by clicking on the map where you want the area to start.
End an area: End the area by double-clicking on the map where you want the area to end.
Settings: Use the Area Settings panel to name the area, define its accessibility (if inaccessible then no sensors are added), distance between sensors and amount of sensors.
The Area Settings is accessed by selecting an area.
Name - Give the path a descriptive name.
Surface covered - Automatically generated.
Accessible - The slider defines the area as accessible or inaccessible. Making the area inaccessible prevents any sensors or gateway placed in this area. For example, it can be used to highlight areas which are physically or legally not accessible for your deployment.
Protection Level - Slider to adjust the level of protection. A low level of protection is 500 m between each sensor, while a high level of protection is 100 m between each sensor. This is set by default at the mid-range of 200 m distance between sensors.
Distance between sensors - Can be set manually or automatically using the Protection Level slider.
Select an area, then in the Edit Area view, select the Pencil icon. The area becomes editable.
Make changes as required:
Add an angle: Select a a white dot, then drag it to add an angle. It also adds new midpoints.
Delete an angle: Select a white dot, then press Delete or Backspace to remove the angle.
Delete a dot: Select a dot, then press Delete or Backspace to remove the dot.
Delete an area: Select the Trash icon to delete a area.
Click anywhere on the map to deselect the path.
Save the project.
Expanding the Area moves the sensors as well. It may also add sensors to accommodate the increased size of the area. Ensure the sensors are placed correctly (not over structures, in open spaces, etc.).
The Planning tool provides a Manual Planning tab when a path or area is selected. You can manually add or remove any type of device and edit a device's name and location for precise Site planning.
For example, when drawing a Path or an Area, the tool may have placed a sensor in a location free of trees or perhaps in a location where a sensor cannot be deployed such as on a building.
Select an Area or a Path to display details.
Select the Manually Planning tab.
Select Add Sensor.
Move the mouse pointer over the map to move the new sensor to its final location, then click to place the sensor icon.
Save the project.
Any customizations of an area of path overwrite the default placement of sensors.
In an area or path, select a Wildfire Sensor.
In the Edit Sensor dialog:
Change name: Change to a descriptive name as required.
Move Sensor: Using the mouse, move the sensor to update the latitude and longitude settings of the sensor.
Delete Sensor: Select Delete Sensor. This cannot be undone.
Save the project.
After planning paths and areas, the sensors need LoRa connectivity to one or more gateways. The Plan Connectivity tool using the Site topology to define direct Line of Sight areas around a Border or Mesh Gateway. Each defined connectivity zone is identified by an irregular blue pattern on the map to show the range of a gateway based on the Site topology and the expected range of the gateway.
You first add a Border Gateway to ensure connectivity to the Internet. Find a location that is at the edge of a forest and, ideally, has access to a mains power supply. Then you add the Mesh Gateways to build up a Silvanet Mesh Network.
When placing a new gateway on the map, you can visualize the line of sight represented by a blue zone.
Ensure at least one Border Gateway per mesh network. If you create a site with several Border gateways, account for them manually.
Add Border Gateways: Place your first gateway by clicking on the map at the desired location. If you already know where your Border Gateway should be placed, start by placing your first gateway at this location.
Add Mesh Gateways: Extend network coverage by placing new gateways in the blue zone (connectivity zone) to extend the Mesh Network coverage. Place a gateway inside existing network coverage delimited by the blue zone.
Ensure sufficient network coverage: After placing gateways on the map, the tool estimates the network coverage. When it reaches a high enough coverage percentage, it is indicated by a Sufficient Coverage message.
Save the Project.
To build a resilient mesh network, we advise that each gateway should be in line of sight with at least 2 other gateways, when possible.
Location of Border and Mesh Gateways can be changed. Gateways can also be added or removed from the Connectivity Mesh (blue area).
Select the Connectivity Mesh.
Select a Gateway and make changes:
Change Name: Change the name as required.
Change Gateway type: Select either Mesh Gateway or Border Gateway to change the type of gateway to deploy.
Move Gateway: Move a Gateway by selecting a Gateway icon and dragging it to a new location. This updates the Latitude and Longitude settings.
Remove Gateway: Select a Gateway icon, then press Delete or Backspace to remove the Gateway from the map. This cannot be undone.
Moving Gateway outside of blue (connectivity) zone: By default, placing Gateways are not permitted outside of the mesh network coverage zone. However, you can override this limitation by holding Shift and placing a new gateway at the desired location.
Save the project.
The Comments tool allows users to include additional information about the deployment or any other relevant topic. They can be added anywhere on the map.
Add comment - select Comment and then click anywhere on the map to add a Comment field, then enter text. Remember to save the project.
Deleted comment - erase the comment text to delete the comment item, then save the project.
Once you have created all the paths and areas you wish to protect and have placed gateways to ensure sufficient mesh network coverage, the device counter on top of the map will display the estimated number of sensors and gateways required. This estimation can be used for quoting purposes.
The Device Counter keeps track in real time of all Border Gateways, Mesh Gateways and Sensors placed on the Site.
Gateway counters - shows estimated number of Border and Mesh Gateways required based on the number of gateways added to the map.
Sensor counter - shows estimated number of sensors required based on the paths and polygons added to map.
After completing the Site plan, export a Planning Summary. This generates an editable .docx file that includes an overview of site planning, details of the connectivity network and a comprehensive view of each planned packet. It also provides an estimate of the deployment time.
From the header bar of the Planning tool, select Export Summary.
Packets editor allows you to make modifications to Packets prepared by the Planning tool. Packets can be added or deleted as required.
Consider the following guidelines when planning where to place devices on the Map in the Site Management app:
Sensor density: The density of sensors in areas of a Site is based on the human activity in an area and the topology of the forest floor. See
Density per hectare: This is related to sensor density, except that in this case you need to know where in the forest is the (WUI) and where are the deep forest areas.
Device ratio: Ensure sufficient Mesh Gateways are deployed for the number of sensors deployed. Similarly, ensure at least one Border Gateway and possibly a backup Border Gateway is deployed based on the amount of Mesh Gateways deployed. See .
Device range: Ensure sensors are deployed within range of at least one Mesh Gateway. See .
Editing Packets
Prepared Packets can be edited to change the Packet's devices or locations. A Packet can also be deleted.
Packets are prepared using the Packet Planning page which displays any previously prepared Packets.
No map displayed?
If no Packet has been prepared, a blank area appears in the Map area. If devices have already been deployed to this Site, a map of the Site and the number of currently active gateways and sensors appears.
Log in to and from the Sites dashboard, select open a Site.
In the Dashboard of the Site, select from the ellipsis menu (upper-right corner) the Packet editor. Any existing Packets appear in the editor.
Select + Add Packet to open the Create Packet page. A default location should be shown in the embedded map.
Provide a unique name for the Packet in the Packet name field, then select Add devices to packet.
After adding a new Packet, find the Site location by centering the map on the Site location using the Search field.
Use the Map tools (zoom in or out, move the map) to find the geographical area (Site location) where the devices in the Packet are to be deployed.
Ensure you have enabled Location services on the Laptop or PC running the Silvanet Site Management app, otherwise no Map appears.
On the Packet Planning page, select Add devices to packet.
From the Device Type dropdown menu, select Border Gateway and enter the number of Border Gateways. Then, select Add.
Repeat the same procedure for Mesh Gateways.
Select Save to save the Packet (you may need to scroll down to see the Save button).
Packets can be saved without placing devices
If the approximate location of the Border Gateway(s) is not known beforehand, you can save the Packet by selecting Save.
Placing Border Gateways on the map generates the GPS location for each Border Gateway. Ensure the map is centered on your Site location.
Use full screen mode
You can switch to full screen mode to view a larger map.
Select the Gateway(s), then select Add devices to map.
The Gateway(s) appears on the map as icons centered in the view.
Drag the Gateway icons to the approximate location of the planned deployment. The GPS coordinates appear next to the device in the list.
Select Save to save the Packet (you may need to scroll down to see the Save button).
Select Back to go the Packet Planning page.
Multiple Packets
You can create multiple Packets where each Packet contains sufficient sensors for a day's deployment activity. More Packets can be added as required.
On the Packet Planning page, select Add devices to packet.Select Add devices to packet and select Sensor.
From the Device Type dropdown menu, select Sensor and enter the number of Sensors. Then, select Add.
Select Save to save the Packet.
Placing sensors on the map generates the GPS location for each sensor. Ensure the map is centered on your Site location. Ensure you follow the guidelines in Device Ratio and Ranges and Sensor density when placing the sensors.
Do not place sensors near paths or streets
Plan for sensors to be deployed away from paths or streets. Place the sensors a meter or so away from a path or street to prevent the device from damage due to vandalism.
You can view the map in full screen mode for easier placement. Use the standard map tools to move around the map. Distances between the three nearest sensors and the nearest gateway appear when an icon is selected.
Select the sensors, then select Place on map. The sensors appear on the map in a default location in the center. The GPS coordinates of the sensors appear in the list next to the devices.
Drag the sensor icons to their respective deployment locations. When selecting a sensor icon, the distance between the Wildfire Sensor and the nearest devices and Gateway are highlighted
Select Save to save the Packet
Select Back to go the Packet Planning page.
When the required number and type of Packets have been prepared, the new Packets appears in the Packet Planning page and in the Silvanet Deployment app.
Silvanet Deployment app and Packets
New Packets are automatically accessible in the Silvanet Deployment app to all users who have access to the Site. In the Silvanet Deployment app, a user can browse through all Packets prepared for a Site and select the Packet that a team is ready to deploy.
The Packet Planning page allows for a Packet to be modified such as deleting a device from a Packet.
Open the Packet editor from the ellipsis menu in the Site Dashboard.
Select a Packet, then select the Pencil (Edit) icon to open the Packet in Edit mode.
From the list of devices, select the devices to be edited.
To update GPS coordinates of a device, select the Pencil icon next to the device, make changes to the Latitude and Longitude, then save the changes.
To delete a Sensor or Gateway, select the device then selecting Remove.
This only removes the Sensor from the Packet. If a
Select Save to save the changes. A Packet saved message appears.
Deleting a Sensor or Gateway from Packets
If a Silvanet device has already been deployed, deleting a Silvanet device from a Packet does not delete the device from the Dryad database. Contact Dryad for more information.
If required, a Packet can be deleted from the Site Management app.
Deleting a device only removes it from the Packet
Open the Packet planning page in the Site Management app.
Select a Packet, then select the Trash (delete) icon.
Confirm the deletion.
Select Save to save the changes.
Deleting a Packet cannot be undone
Once a Packet has been deleted, it cannot be undone.
Operating channels (bandwidth) | Frequency channels (MHz) |
---|---|
Operating channels (bandwidth) | Frequency channels (MHz) |
---|---|
Region | Country | FB 1 | FB 2 | FB 3 | FB 4 | Freq. Antenna |
---|---|---|---|---|---|---|
To learn how to create a Site, see "" in .
An Organization can be created when creating a new Site. See "" in .
For details about using the Planning tool, see and .
For details about using the Packet editor, see .
For more information, see .
For details, see .
For details, see .
We welcome your feedback about Dryad documentation. Contact us at .
Low probability of fire (Sensor Normalization): If a source other than a fire caused the decline in air quality (diesel fumes or some other similar gasses), then the sensor stops the gas scans and does not trigger a fire alert. In this case the sensor normalization is required which takes 30-60 minutes. See .
High probability of fire (Fire Alerts): If a smoldering fire caused the decline in air quality, then the gas scans are terminated and the sensor immediately triggers a stream of fire alert packets to the Silvanet Mesh Network. Users are then notified via and through the p.
ML (Machine Learning) Models are pre-trained in the Dryad laboratory and can be fine-tuned / programmed specifically for the species of trees present in a particular deployment. Updated models can be remotely installed in the sensors by Dryad’s support team using .
Selecting displays all active fire alerts. Expanding the fire alert notification shows details of the detected fire.
For more information, Dryad API - MQTT Sensor Data Integration. For additional information, contact .
To learn about Organizations, see in .
The Map view shows devices as .
For more information about deploying devices, see .
Status: (Not sortable) See below.
For more information, see Alerts in .
For more information, see Warnings in .
Graph | Device | Description |
---|
Use the to determine the required number of Wildfire Sensors, Border Gateways and Mesh Gateways. Use treenails to permanently attach the sensors to trees.
When using the , the Connectivity tool helps to ensure Mesh Gateways have multiple paths to the Border Gateway.
Path length - Length of path in Imperial or Metric, depending on app settings. See .
Before adding Wildfire Sensor, review the .
If a device has not been deployed, it can be removed from the Packet. However, once a device has been deployed, removing a device requires sending a request to Dryad to remove the device from the Site database. In this case, send a to Dryad with the Device IDs of the devices you have removed from your Site.
125 kHz
23 channels: 865.1, 865.3, 865.5, 865.7, 865.9, 866.1, 866.3, 866.5, 866.7, 866.9, 867.1, 867.3, 867.5, 867.7, 867.9, 868.1, 868.3, 868.5, 868.7, 868.9, 869.1, 869.3, 869.5
250 kHz
10 channels: 865.1, 865.4, 865.7, 866, 866.3, 866.6, 866.9, 867.2, 867.5, 867.8
125 kHz
64 channels: 902.3 MHz and incrementing linearly by 200 kHz to 914.9 MHz
250 kHz
8 channels: 903.0 MHz and incrementing linearly by 1.6 MHz to 914.2 MHz
Europe
Germany
433.05-434.79
863-870
868
Greece
433.05-434.79
863-870
868
Spain
433.05-434.79
863-870
868
Portugal
433.05-434.79
863-870
868
Romania
433.05-434.79
863-870
868
Italy
433.05-434.79
863-870
868
Turkey
433.05-434.79
863-870
868
North and South America
USA
902-928
915
Canada
902-928
915
Brazil
902-907.5
915-928
915
Argentina
902-928
915-928
915
Australia
Australia
433-435
915-928
915
Asia
Indonesia
923-925
915
Thailand
433.05-434.79
920-925
915
South Korea
917-923.5
915
India
865-867
868
Africa
Egypt
433.05-434.79
863-870 / 865-868
868
Middle East
UAE
433.05-434.79
863-870 / 870-875.8
915-921
868
Saudi Arabia
433.05-434.7
863-870
868
Lebanon
433.05-434.79
863-870
868
Jordan
433.05-434.79
865-868
868
Air Pressure | Wildfire Sensor | Displays the environment's barometric Pressure (in hPa) over a selected time period. |
Temperature | Wildfire Sensor | Displays the air temperature (in Fahrenheit or Celsius depending on user settings) over a selected time period. |
Humidity | Wildfire Sensor | Displays the humidity level in the environment over a selected time period. |
Air Quality | Wildfire Sensor | Displays the quality of the air available in the environment around the sensor. |
Energy Level | Gateways and Sensors | Displays the level of energy stored in the supercapacitors throughout the day and during the night. Under normal conditions the Silvanet device should have sufficient energy stored to remain powered up throughout the night. |
Review these guidelines before starting the deployment of gateways and sensors.
Deployment app permissions
Ensure you have allowed the Silvanet Deployment app to access the Smartphone's location and camera.
Work in teams of two
When installing Silvanet devices in a forest, always work in teams of at least two people. When using the ladder, ensure it is securely leaned against the tree and is stable before climbing the ladder. If possible, have an assistant securely hold the ladder.
Before going to the Site to deploy the Silvanet devices, ensure you have prepared (at a minimum) for a day's Silvanet deployment efforts. You need to use the Deployment app to register the Device ID by scanning a QR Code on the device. Aftewards, you mount the device. Finally, you run Connectivity Tests for Border and Mesh Gateways. Wildfire Sensors need 14 days to calibrate (before this ends, the Sensor does not send usable data).
Correct number of devices for a day's work: Before going to the forest, ensure you have the correct number of devices, spacers, treenails and garden wire (if required) for deploying the amount of devices sufficient for a day's work.
Carefully carry devices while entering the forest: Pack the required number and type of Silvanet devices carefully in a strong backpack or toolbox.
Use toolboxes for the required devices and tools: Use a waterproof box with a handle to keep the devices safe and dry while in the forest. Another carry case can be used for the required tools. See Deployment tools.
Ensure the Smartphone is fully charged: Smartphones need to be fully charged. Bring a backup power supply.
Ensure Deployment app is installed: Make sure the Deployment app is installed on the Smartphone and the user is signed in. Also, ensure the app has been given Location and Cellular Data permissions.
Launch Deployment app while having good connectivity: Launch the Deployment app while you have a good wireless connection. Mobile connectivity may become unreliable in parts of the Site. This allows the app's local database to be updated with device information.
Open the relevant Site in the Deployment app: Before entering the forest, ensure you have the relevant Site opened. For details, see Deployment app.
Cache the Map: From the respective Site, load the Map view to cache the map. This ensures you have access to the Map view should a mobile connection become poor or unavailable.
Deploy the Silvanet Border Gateway to ensure it reliably communicates with the Mesh Network and Silvanet Cloud.
Choose deployment scenario
Mains (via PoE) and router (via Ethernet): Uses mains power supply and a router for Internet connectivity
Mains (via PoE) and mobile networks: Uses mains power supply and cellular networks for Internet connectivity
Remote locations: Uses solar panel and cellular networks for Internet connectivity
Loss of Internet and power supply: Uses solar panel and satellite connectivity.
Choose Border Gateway location
Forest edge: The Border Gateway location should be chosen carefully. If possible, mount the Border Gateway at the edge of a forest.
Sufficient sunlight: If the Border Gateway is powered by only by solar, select a sunny location with direct sunlight.
Mount in an elevated location: To maximize range, install the Border Gateway on a hill, or at least a higher location to maximize range.
Ensure reliable Internet connectivity
Mobile or router: Based on selected scenario, use a router for Internet connectivity (recommended) or mobile connectivity with its built-in 4G/LTE-M with 2G/GPRS fallback.
Satellite for backup: For satellite connectivity, the Border Gateway needs a clear line of sight to connect to a satellite.
Ensure within range to Mesh Network
2 km to 3 km: The range of a Border Gateway to a Mesh Gateway is approximately 2 km to 3 km. The actual range may vary depending on environmental conditions.
Line of sight: Ensure line of sight to at least one Mesh Gateway.
Mount Border Gateway correctly
Above 3 m on pole or tree: Mount the Border Gateway at least 3 m high on the pole or tree and, if possible, higher for better signal propagation.
Stable metal or wooden pole: Mount to a stable metal pole that is unlikely to be moved. Use the provided U-Bolt Clamps to securely hold the Border Gateway and can be tightened accordingly without damaging the device. Also, on a pole, the Border Gateway does not interfere with a living tree over the lifetime of the Border Gateway.
Correct diameter for pole (60.3 mm): The diameter of a pole used to support the Border Gateway must not be greater than 60.3 mm. A 17 mm wrench is used to attach the M10-nuts to the U-Bolt Clamps.
Mount towards the top of pole: To maximize the radio contact when attaching the Border Gateway to a pole, put the Gateway on top of the pole (if possible) so that the LoRa antenna is above the top of the pole.
Healthy tree: If the Border Gateway is attached to a tree, ensure it is attached to a healthy tree and not expected to be cut down.
Clear any obstructions
Whether the Border Gateway is installed on a tree or a pole, it needs a clear line of sight to communicate via wireless mobile networks or satellite communication.
It also needs an unobstructed area to obtain sufficient sunlight for the solar panel to charge the Border Gateway in case of power failure.
If it is installed on a tree, the solar panel should not be covered by branches
Mount solar panel correctly
Towards sun (at noon): Mount the solar panel facing the sun at 12:00 noon (northern or southern hemisphere).
True south/north: Use a compass to identify true South (in the northern hemisphere) or true North (in the southern hemisphere). This maximizes the amount of light that hits the solar panel.
Direct sunlight: Select a location with direct sunlight (such as a hillside) and keep it free from branches that obscure direct sunlight.
Use backup Border Gateway, if required
For 1000 sensors or more: Ideally, for deployments greater than 1000 sensors, provide a backup Border Gateway.
Dryad recommends visiting the Site prior to planning device locations to make notes about the topology and other Site features not visible from an online map tool.
If possible, visit the Site and make notes about the natural features such as hills, valleys, rock formations, streams and rivers. Also, note the locations of high human use such as paths or any structures within the site. Use this information when planning deployments.
Forest variations and density Look for areas of the forest that are lightly or thickly wooded, open areas, bushland and grasslands. Note the density of the trees in various parts of the forest as a thicker forest can have an effect on signal propogation through the forest. Also, take note of how much undergrowth does the forest have and is there evidence of recent unauthorized logging activity which may result in a tree with a deployed device being cut down.
High human use areas Identify paved roads, lanes, gravel logging roads, hiking trails, woodland paths and other means of traversing through the forest. Where are areas of high human use such as campsites, trailer parks, bridges, power lines or other wooden structures.
Areas that are difficult or impossible to traverse Note areas that are difficult to hike through to locate deployment positions, such as streams, steep hillsides, ravines, narrow bridges, etc. This may affect the time required to deploy the devices. Note also restricted areas where Silvanet cannot be implemented.
Power supply availability For Border Gateways, identify locations that could provide a mains power supply. Otherwise, the Border Gateway needs to be powered only from its solar panel.
Mounting poles Ideally Border Gateways should be mounted on poles, but this is not a requirement. Mesh Gateways can also be mounted on poles, if available.
Topology Mesh Gateways need line-of-sight to communicate with other Mesh Gateways and Border Gateways. Identify areas of the forest topology that might interfere with line-of-sight such as hills, ravines and hidden areas. This may require mounting the Mesh and Border Gateways higher than the recommended 3 meter to as much as 5 or 6 meters. Mounting a Gateway on a hilltop may also be a solution. In all cases, ensure line-of-sight between Mesh Gateways.
Deploy Mesh Gateways to allow extensive deployments of Wildfire sensors using the Silvanet Mesh Network.
Ensure correct range
2 km to 3 km to Border Gateway: Deploy at least one Mesh Gateway at least 2 km to 3 km from a Border Gateway, depending on environmental conditions including topology and type of forest.
2 km to 3 km to other Mesh Gateway(s): The range of a Mesh Gateway to other Mesh Gateways and Border Gateway is approximately 2 km to 3 km. The actual range may vary depending on environmental conditions.
Line of sight: Ensure line of sight to at least one Mesh Gateway.
Maximum 1 km radius from Wildfire Sensors: Place Mesh Gateways in locations that enable them to cover nearby sensors in a radius of approximately 1 km.
Mount Mesh Gateway correctly
Maximum 60.3 mm pole: U-Clamps are provide to attach the Mesh Gateway a (maximum) 60.3 mm metal pole that is at least 3 m high above the forest floor. Use a 17 mm wrench to attach the provided M10-nuts to the U-Bolt Clamps. Additionally, the device does not interfere with a living tree over the lifetime of the Mesh Gateway.
Above 3 m on pole or tree: To protect the Mesh Gateway from human or animal interference and to give a better line of sight to other Getaways within range, install the device at least 3 meters above the forest floor, or higher for better signal propagation.
Healthy tree: Deploy the Silvanet Mesh Gateway to a healthy tree or to a stable self-standing poles that is unlikely to be moved.
Towards sun (at noon): Mount the Mesh Gateway facing the sun at 12:0 noon (northern or southern hemisphere). To receive maximum sunlight, it is best installed on a pole.
Hillsides: To increase communication, mount on hillsides.
Free of obstructions: The Mesh Gateway has a large built-in solar panel to provide for the Mesh Gateway's increased power requirements. However, the solar panel needs an unobstructed area to obtain sufficient sunlight to charge the device.
Clear small branches: If installed on a tree, it should not be obstructed by branches. You may need to clear some branches away from the solar panel. Do not cut large branches.
Install sensors using treenails or garden wire, then let them calibrated for 14 days before they are ready to detect fires.
Practice safety first
Keep safety foremost when attaching sensors to trees. Make sure the ladder is stable when leaned against the tree, especially when leaned against thinner trees. Have the second person hold it to stabilize it while climbing the ladder.
Let the sensor calibrate after installation
After a sensor has been deployed and calibrated, do not interact with the sensor as this may cause errors with sensor values and could reset the sensor calibration.
AFTER SENSORS HAVE BEEN DEPLOYED, CALIBRATED AND SETTLED, DO NOT INTERACT WITH THE SENSORS IN ANY WAY.
Select a healthy tree
When locating a tree on which to install a sensor, look for indications that the tree may be in poor health. Also ensure the tree is not planned to be cut down or in any way unlikely to survive for the duration of the lifetime of a sensor. Find another tree within the designated radius (20m) of the planned location.
Average time to install a sensor
The average time to install sensors is about a half-hour per sensor. This includes finding the tree, setting up the ladder, scanning the QR Code, installing the sensor, then heading to the next deployment location.
Plan for a day's device deployment. Ensure you have brought sufficient sensors, treenails, spacers (and garden wire, if required) for the day's installation plans.
Ensure correct range
1 km to nearest Mesh Gateway: Ensure a Mesh Gateway is within range, which is no further than 1 km from the Wildfire Sensor.
Sensor density
WUI: 0.7/ha to 0.1/ha Based on WUI (Wildland Urban Interface), Dryad recommends 0.7/ha sensors for a dense WUI and 0.1/ha sensors for a sparse WUI. Spacing between sensors should be 80 m to 100 m for areas of high human activity, 400 m to 500 m for areas of low human activity.
Mount Wildfire Sensor correctly
Select a healthy, stable tree: The tree should be closest to the GPS coordinates set for a sensor using the Silvanet Deployment app. Also, ensure the tree is healthy and not likely to fall over or be harvested.
Above 3 m above forest floor: Install the sensor on the tree approximately 3 meters above the level of the forest floor. At this height, the device is most sensitive to fire detection and obtains an increased amount of light on its solar cell. Furthermore, at this height it avoids disturbances from most human and animal interactions.
Towards sun (at noon): The sensor needs to be oriented towards the direction of the sun (where it would be at 12:00 noon). Use a compass to identify true South (in the northern hemisphere) or true North (in the southern hemisphere). This maximizes the amount of light that hits the solar panel.
Use the spacer correctly: A 2 cm spacer is provided to deploy the sensor slightly away from the trunk of the tree. This avoids direct contact with the tree and allows tree sap to flow down the tree behind the sensor. The spacer also helps keep the sensor away from the moisture in the tree. Furthermore, the spacer allows the sensor to hang vertically rather than laying directly against the bark of the tree which could cause it to tilt at an angle. Also, hanging the sensor vertically improves the radio range of the device.
Plan for variable sensor density based on the level of human activity in or near Sites.
Planning tool
Sensor density guidelines are now incorporated into the Planning tool.
Sensor density per hectare is based on:
Human activity level in specific areas of the forest
Presence of WUIs (Wildland Urban Interfaces) in the site
By determining these factors, you can approximate the density values per hectare (Metric) or acre (Imperial).
Using this approach of variable density (low and high sensor density), you can reduce the overall cost of deploying the Silvanet System in the Site while maintaining good wildfire detection.
Locations with high human activity require dense deployment of sensors. These include Sites that have hiking paths, campsites, roads, railroad tracks, wooden bridges, poles and power line towers, residential housing and other types of buildings. Low human activity areas include deep within forested areas, hillsides or hard to access locations.
The following table shows the recommended sensor density values.
Human Activity | Density type | Distance between sensors | Density value |
---|---|---|---|
A Wildland Urban Interface (WUI) is defined as areas of a forest where wildland and urban areas intersect. It is the line, area or zone where structures and other human development meet or interspersed with undeveloped wildland or vegetative fuels.
Wildfire User Interface
WUI as defined by the United States Fire Administration as the zone of transition between unoccupied land and human development.
A broader term is Wildland Industrial Interface (See Canada Wildfire) where industrial infrastructure such as roads, power lines and railways intermingles with wildland fuels.
Carefully plan the location of Mesh Gateway to ensure a reliable Silvanet Mesh Network.
Mesh Gateways allows data from distant Wildfire Sensors to be received by a Border Gateway which is typically deployed where it has good wired or wireless connectivity.
To build up a Mesh Network, allow for the following conditions:
Range to Border Gateway: Maximum distance between the Border Gateway and the nearest Mesh Gateway is 2 km to 3 km. Each Mesh Gateway can be up to 3 km from other Silvanet Gateways, depending on the topology and height at which the device has been deployed on a tree.
Range to nearest Mesh Gateway: A Mesh Gateway must be within range of at least one other Mesh Gateway, which is 2 km to 3 km.
Connectivity between two Mesh Gateways: Ensure each Mesh Gateway can connect to at least two other Mesh Gateways, or one Mesh Gateway if no other are within range.
Ensure the correct ratio of sensors per Mesh Gateway, which is maximum 100 sensors to each Mesh Gateway. See Sensor ratios.
In the following example, note the paths a message can take through the Mesh Network. A message has several routes to the Border Gateway, except one isolated Mesh Gateway. This ensures reliability in the network.
For details, see Silvanet Mesh Gateways.
Plan sensor deployments based on ratios and ranges to Mesh Gateways.
The Silvanet Network supports any number of Wildfire Sensors through the use of the Silvanet Mesh Network. However, this support is possible only if range and ratio values are followed. The Planning tool takes into account these range and ratio values when preparing a deployment plan.
Planning tool
For more information about planning deployments, see Planning tool.
Gas detection range is 80 m to 100 m (260 ft to 320 ft): Depending on the topology and density of the forest, the Silvanet Wildfire sensor can detect gases, especially Volatile Organic Compounds (VOCs), in the surrounding air within a radius of 80 m to 100 m (260 ft to 320 ft). It can also detect smoke from a smoldering fire that drifts into its detection zone from beyond the gas detection range.
Site topology and range Range values are dependent on the Site topology such as hills, valleys, density of trees and structures in the forest deployment locations.
Maximum distance to a Mesh Gateway is 1 km: Sensors communicate with Mesh Gateways and Border Gateways that are approximately 1 km away from the sensor, depending on topology. In dense forests, the range may be less while direct line of sight to the Mesh Gateway may have a longer range.
100 sensors to 1 Mesh Gateway: For every 100 Wildfire Sensors deployed, use at least one Mesh Gateway or more, if necessary. This is dependent on Site topology which may or may not interfere with connectivity to Mesh Gateways.
No limit but must be in range: The Border Gateway does not have a limit on the number of Wildfire Sensors it can support. However, it can support sensors that are within range of the Border Gateway.
Use of Mesh Gateways
Do not deploy Wildfire Sensors without the use of Mesh Gateways.
Ensure you have the right tools to deploy Silvanet Gateways and Wildfire Sensors.
Provide a 16-foot (5 meter) ladder for installing sensors and gateways. A folding ladder is easier to carry through the uneven ground of a forest.
Provide a workbox or backpack for carrying devices, depending on how many and type of devices are planned for a day's deployment.
Provide at least the following tools for device deployment:
Knife and shears (snips) for trimming branches (if required) and for cutting lengths of garden wire
Small axe or chisel for removing small sections of the outer bark
Compass (analogue or an app on the Smartphone)
Cordless drill for drilling holes for treenails (min 18V) and backup battery pack
10 mm wood drill bit and an (optional) 6 mm wood drill bit to drill a pilot hole to prevent splitting, especially with hardwood trees
Hammer for treenails
17 mm wrench for the U-clamp bolts
Pencil and notepad
Backup power supply for Smartphones
Bring sturdy footwear for walking through forests and climbing rocks (as well as climbing the ladder to mount the devices).
The Border Gateway can be deployed in various scenarios based on power supply, internet connectivity and location.
For details about the Border Gateway, see Silvanet Border Gateway in Explore Silvanet.
In this setup, the Border Gateway uses a mains power supply (via PoE Injector) and a router (via Ethernet). The solar panel acts as a backup power supply.
When using the built-in Ethernet connection, this setup is supported only in combination with the PoE Injector. The solar panel does not provide enough energy to support Ethernet connectivity of the border gateway.
Internet connectivity: The Border Gateway is connected to a cable or ADSL router via Ethernet which is connected to the PoE injector. In case of loss of Internet connectivity via the router, the Border Gateway uses its built-in 4G/LTE-M (or 2G/GPRS) mobile radio or its satellite connectivity.
Power supply: The Border Gateway uses the PoE Injector connected to a mains power supply.
Backup power supply: In case of power failure, the solar panel is used.
PoE Injector
The Border Gateway includes a PoE Injector that provides a voltage range of between 36V and 57V. The PoE is IEEE 802.3af compliant. If a replacement is required, ensure it has the same specifications.
In this setup, the Border Gateway is deployed in a location without a fixed-line Internet connection (without a router) but has a mains power supplied by the PoE Injector.
Internet connectivity: Provided by the Border Gateway's built-in 4G/LTE 2G/GPRS radio. In case of loss of Internet connectivity via 4G/LTE-M (or 2G/GPRS) mobile radio, the Border Gateway uses satellite connectivity.
Power supply: The Border Gateway uses the PoE Injector connected to a mains power supply.
Backup power supply: In case of power failure, the solar panel is used.
Often Internet connectivity and a mains power source is unreliable in remote locations. Border Gateways deployed in these locations have neither fixed-line Internet connectivity nor a reliable power supply. In these cases, the Border Gateway uses its solar panel for a power supply. It uses mobile radio connectivity (if available) or a satellite uplink (to send fire alert signals to the Silvanet Cloud).
Internet connectivity: Provided by the Border Gateway's built-in LTE-M 2G/GPRS mobile radio, if a mobile tower is accessible. If a mobile tower is inaccessible, the Border Gateway uses a satellite uplink.
Power supply: Powered by the solar panel which charges the Border Gateway's internal energy storage. However, depending on the amount of sunlight, data transfer might be limited.
Normally, as a fallback, the Border Gateway supports several methods to ensure uninterrupted Internet connectivity. If the Border Gateway does not have wired or wireless Internet connectivity and/or power supply, the solar panel and satellite ensures uninterrupted Internet connectivity.
Satellite to replace wired or wireless Internet connectivity: If the Border Gateway loses Ethernet due to network failure and cannot connect to a mobile network, a satellite uplink provides as backup connection. However, only Fire alarms are sent.
Solar panel to replace mains power supply: The solar panel provides a backup emergency power supply. The solar panel charges the internal batteries and allows the mobile data connection to be used. As the system runs in power saving mode, no other sensor data other than fire alerts can be transmitted.
Natural disasters
Should the installation location of the Border Gateway have neither a mains power supply nor access to a mobile network (4G/LTE 2G/GPRS), the Border Gateway can still transmit minimal messages to the satellite.
However, messages are restricted to fire alerts only. This scenario is applicable, for example, where natural disasters like thunderstorms or earthquakes bring down Internet connectivity.
When deploying Silvanet devices, first deploy the Border and Mesh Gateways and when connectivity has been verified between the gateways, then deploy the Wildfire Sensors.
Deploying Silvanet Border Gateways, Mesh Gateways and Wildfire Sensors takes three simple steps:
Scan QR Codes
Mount the devices on a tree or pole (in the case of Border Gateways, mount solar panels)
Test connectivity (in the case of Gateways) or calibrate (in the case of Wildfire Sensors)
Learn how to register the Silvanet Border Gateway before mounting the device on a pole or tree and providing it with a power supply.
Each Silvanet Border Gateway has its own unique Device ID (also referred to as Serial ID). It is provided as a unique text string as well as a QR Code printed on a label attached to the Border Gateway. The Deployment app uses the smartphone's camera to allow the user to scan the device's QR Code.
After the Border Gateway is registered with the Silvanet Cloud, the latitude and longitude of the device in the Site is provided to the Site Details section of the Site Management app.
Relocating a Border Gateway
If a Border Gateway has been relocated, update the latitude and longitude of the device in the Device overview section of the Site Management app.
The following shows the steps to register the Device ID (Serial ID) by scanning the QR Code of the Border Gateway.
In the Silvanet Deployment app, select a Site.
In the list of devices that appears, select the Border Gateway. Alternately, select Show Devices on Map.
On the map that appears, tap Register Device. The blue dot on the map shows your current location.
Finding the deployment location
Note in the figure above the Border Gateway is 120 m away from the user. Use this map to move towards the deployment location.
If you tapped Show Devices on Map, the maps shows on overview of your Site. Your location is indicated by a blue dot.
Once the deployment location is found, scan the device's QR Code which is attached to the back of the Border Gateway. The Deployment app automatically fills in the Gateway's latitude and longitude using the Smartphone's GPS location.
QR Code not scannable?
If the QR Code cannot be scanned, manually enter the Device ID which is found as a text string next to the QR Code.
After a few moments, the Registration successful message appears. The device icon changes from Planned to Deployed. For more information, see Status icons.
After a successful registration, mount the Border Gateway to a tree or pole.
See also
For details, see Mount Border Gateway.
Learn how to mount a Gen 2 Silvanet Border Gateway to a pole or a tree.
After a successful Device Registration and Connectivity Test, the Border Gateway can be permanently mounted to the tree or pole. The Deployment app provided guidelines for mounting the Border Gateway.
Go ahead and mount the Border Gateway to a metal or wood pole or on a tree, as described in the following sections. Afterwards, mount the solar panel to provide a power supply. Alternately, use the PoE Injector to provide power from mains.
If a 60 mm (2.3 inch) wooden or metal pole is available, you can use the provided U-Clamps to attach the Border Gateway to the pole.
Loosely connect the U-Clamps to the Border Gateway, then slide the gateway onto the pole from the top (if possible).
Hand-tighten the nuts, then use the 17 mm wrench to tighten the nuts. Do not use excessive force to prevent damage to the Border Gateway.
Attach the antennas. The LoRa antenna is attached to the top connector, LTE antenna on the bottom connector and satellite antenna is on the side.
Attach the solar panel to the pole above the Border Gateway. And if used, connect the Ethernet cable to a router.
Run a connectivity test to ensure the Border Gateway is connected to the Silvanet Cloud.
If the Border Gateway is to be attached to a tree, ensure the tree is stable and unlikely to be cut.
Once a tree has been selected, use a safety strap to hold the ladder to the tree. Then, with an assistant stabilizing the ladder at the bottom locate a position on the tree that is approximately 3 m above forest floor.
Remove any branches and other obstructions at the deployment height. This allows the solar panel to have good irradiation from the sun to charge the device. Carefully remove a small portion of the bark with an axe or chisel where the holes in the tree will be drilled. This allows the gateway to hang vertically on the tree.
With a distance between the holes at 70 mm, drill approximately 6-7 cm (2 1/5 inches) into the tree for the top loops. Ensure you do not split the tree or drill on an angle. Use the 10mm drill bit. When drilling into a tree, first drill a pilot hole using a small drill bit (1/4 inch / 6mm) then drill the final hole with the 10mm drill bit. Also, ensure you are using a drill bit for wood. This ensures the wood in the tree does not split.
Carefully hammer the treenails through the top loops of the Border Gateway into the holes.
Carefully drill the bottom two holes using the lower holes as templates. Be careful not to damage the Gateway case while doing so. Also, use a drill bit with a sufficient length to ensure the holes are at the correct depth.
Carefully hammer the treenails through the bottom loops into the tree. Check to ensure the Border Gateway is securely attached to the tree and can not move.
Attach the antennas. The LoRa antenna is attached to the top connector, the LTE antenna to the bottom connector and the satellite antenna to the connector on side of the device.
Attach the solar panel to the tree above the Border Gateway. And if used, connect an Ethernet cable from a router. See below.
After installing the Border Gateway, attach the solar panel to the same pole or tree to provide a backup power supply.
The cable from the Border Gateway to the solar panel is pre-connected and is 2 m long.
After attaching the Border Gateway to either a pole or a tree, the solar panel needs to be attached to the same location, preferably above the Border Gateway. Garden wire is used to secure the solar panel to the support structure (tree or pole).
Mount on same tree or pole as Border Gateway: Ensure the solar panel is attached to the same tree or pole used for the Border Gateway.
Oriented towarss sun at 12:00 noon (northern/southern hemisphere): Locate the deployment location towards where the sun would be at 12:00 noon. This allows the solar panel to have maximum sunlight irradiation during daylight hours.
Protect cable from accidental damage: Ensure the solar panel cable is placed in such a way that it cannot be damaged by human or animal incidents.
Mount above Border Gateway: If the deployment location is a public area, the minimum height for both the Border Gateway and the solar panel should be at least 3m above the forest floor with the solar panel mounted above the Border Gateway. A higher deployment allows for better connections to Mesh Gateways.
Securely mount the solar panel to pole or tree: Ensure the solar panel is tightly connected to the tree or pole so that it cannot slip or turn during strong winds or other environmental actions.
To mount solar panel to pole or tree:
Cut two equal lengths of provided garden wire, each being twice the circumference of the tree or pole.
While the solar panel is at ground level, insert the garden wire through the holes.
Climb the ladder with the panel and place the solar panel on the opposite side of the tree or pole and pull it tight against the tree or pole using the top wire, then twist the cable tight. Ensure the panel faces south towards where the sun would be at 12:00 noon.
Follow the same procedure with the lower cable.
Twist the two ends of the cables together and bring the twisted cable within the back of the panel.
Ensure the solar panel is tight against the tree and pole and cannot move.
The following shows a completed Border Gateway and solar panel deployment.
If an Ethernet connection is available, use the PoE Injector to connect to a mains power supply. The Border Gateway provides a sealed RJ45 connector to attach an Ethernet cable to the device.
Open the Ethernet connector by unscrewing the cap.
Disassemble the Ethernet connector, including the end cap, sealing ring and housing.
Lead the Ethernet cable through the end cap, sealing ring and housing.
Connect the Ethernet cable with the Ethernet socket in the connector.
Reassemble the connector. Carefully seat the sealing rings in the housing without damaging the barbs, then screw the end cap on the housing and screw the housing to the connector.
Connect the supplied Ethernet cable to the PoE and then connect an Ethernet cable from the PoE to a router.
Plug in the PoE to a mains power supply.
After mounting the Border Gateway and providing it with a power supply, allow the superconductors to fully charge.
With the Border Gateway mounted and powered, run the Connectivity Test to ensure the Border Gateway connects with the Silvanet Cloud.
See Also
For details, see Border Gateway Connectivity Test.
Learn how to mount the Gen 2 Silvanet Mesh Gateway to a pole or a tree.
After a successful Device Registration and Connectivity Test, the Mesh Gateway can be permanently mounted to the tree or pole. The Deployment app provided guidelines for mounting the Mesh Gateway.
Go ahead and mount the Mesh Gateway to a metal or wood pole or on a tree, as described in the following sections.
To attach Mesh Gateways to a metal or wood pole, the maximum dimension of the pole must be 60 mm (2.3 inch). U-Clamps are provided to attach the Mesh Gateway to the pole.
Loosely attach the U-Clamps to the Mesh Gateway, then slide the Mesh Gateway onto the pole from the top, if possible.
Ensure the Gateway is oriented properly (facing the sun at 12:00 noon) with the antenna connector facing upwards. You may need assistance holding the Mesh Gateway.
Maximizing radio transmissions
Ensure the pole is not interfering with radio transmission. If a metal pole is used, ensure the top of the Mesh Gateway is level with the top of the pole to allow the antenna to free from interference from the metal.
Hand-tighten the nuts on the U-clamps, then use the 17 mm wrench to tighten the nuts. Do not use excessive force to prevent damage to the Border Gateway. Ensure the Mesh Gateway is securely connected to the pole and cannot move.
Attach the LoRaWAN antenna to the Mesh Gateway.
If the Mesh Gateway is to be attached to a tree, ensure the tree is stable and unlikely to be cut.
Once a tree has been selected, use a safety strap to hold the ladder to the tree. Then with an assistant stabilizing the ladder at the bottom, locate a position on the tree that is approximately 3 m above forest floor and facing the sun (at 12:00 noon).
Remove any branches that might interfere with maximum sunlight irradiation.
If required, carefully remove a small portion of the bark with an axe where the holes for the treenails will be drilled. This allows the Mesh Gateway to hang vertically on the tree.
Drill the top holes using the 10mm drill bit approximately 6–7 cm into the tree. The distance between the holes must be 70 mm.
When drilling into a hardwood tree, start with a smaller drill bit then drill to the final size with the 10 mm drill bit. Also, ensure you are using a drill bit for wood, not for steel or concrete.
Hammer the treenails through the top loops of the Mesh Gateway into the drilled holes. Be careful not to damage the device while doing so. You may need an assistant to support the Mesh Gateway while hammering the treenails into the tree.
With the Mesh Gateway attached to the tree at the top, drill through the bottom loops of the device approximately 6-7 cm into the tree. Do not damage the Mesh Gateway while drilling through the loops.
If you plan on drilling the bottom holes before attaching the Mesh Gateway to the tree, you can use the Mesh Gateway as a template to locate the positions to drill the bottom holes.
Carefully hammer the treenails through the bottom loops into the holes. Do not damage the device.
Attach the LoRaWAN antenna to the Mesh Gateway.
To maximize the radio connection of the Mesh Gateway, the antenna should have at least a finger-width distance from the trunk.
Check to ensure the Mesh Gateway is securely connected to the tree and does not move.
After mounting the Mesh Gateway and allowing it to fully charge, run the Connectivity Test to ensure the Mesh Gateway connects with either the Border Gateway or another Mesh Gateway.
See also
For details, see Mesh Gateway Connectivity Test.
Learn how to register the Silvanet Wildfire Sensor with the Silvanet Cloud before mounting the device on a tree.
Each Silvanet Wildfire Sensor has a unique Device ID (also referred to as Serial ID) provided as a unique text string as well as a QR Code printed on a label attached to the device.
Before mounting the Sensor, use the Deployment app to scan the device's QR Code. Afterwards, the Silvanet device is registered with the Silvanet Cloud. This provides the location of the device to the Silvanet Cloud. Afterwards, the registered device appears in the Site details section of the Site Management app.
Relocating a Wildfire Sensor
If a Wildfire Sensor has been relocated, update the latitude and longitude of the device in the Device overview section of the Site Management app.
In the Silvanet Deployment app, select a Site.
In the list of devices that appears, select a Wildfire Sensor. Alternately, select Show Devices on Map.
On the page that appears, tap Register Device. The blue dot on the map show your current location.
Finding the deployment location
Note in the figure above the Sensor is 120 m away from the user. Use this map to move towards the deployment location.
If you tapped Show Devices on Map, the map shows an overview of the Site on the map. Your location is indicated by a blue dot.
Once the deployment location is found, scan the device's QR Code which is attached to the back of the Sensor. The Deployment app automatically fills in the Sensor's latitude and longitude using the Smartphone's GPS location.
Entering Device ID (Serial ID) manually
If the QR Code cannot be scanned, the information can be entered manually. Tap Enter Serial ID Manually to continue.
After successfully scanning the QR Code, the Deployment app shows a Registration successful screen. The device icon changes from Planned to Deployed. For more information, see Status icons.
Calibration period
After the Wildfire Sensor has been mounted, it enters a 14 day calibration period. The device icon changes to Calibrating (orange). For more information, see Sensor Calibration.
After a successful registration, you can now mount the Wildfire Sensor to the tree.
See also
For details, see Mount Wildfire Sensors.
Start the connectivity test to ensure the Mesh Gateway has connectivity to the Border Gateway or neighboring Mesh Gateways.
Use the Deployment app to begin the Connectivity test. This checks if the Mesh Gateway can connect with any neighboring Mesh Gateways or Border Gateways.
The Mesh Gateway must be registered before the Border Gateway has been mounted. If this step has not been followed, see Register Mesh Gateway.
After mounting the Mesh Gateway, tap Confirm & Start Connectivity Test.
The Deployment app begins to connect with a Border Gateway.
The Mesh Gateway then runs the connectivity test and attempts to connect to another Mesh Gateway or Border Gateway.
If the Mesh Gateway could connect, a success message appears. You can close the dialog and continue deploying the next device or tap Show Device Details.
The Device Details screen appears. You can add additional information in the Notes field such as relevant details about the deployment location.
If the Silvanet Cloud could not reach the Border Gateway, troubleshooting information is provided.
If the Border Gateway could not be reached, the following dialog appears.
Review the information provided in Border Gateway not reachable for troubleshooting information.
If the Mesh Gateway could reach another Mesh Gateway but the signal is too weak, troubleshooting information is provided.
If the Device connectivity is too low, the following dialog appears.
You can close the dialog and after troubleshooting. Tap the Mesh Gateway icon from the map to return to this screen.
Check the following to troubleshoot connectivity:
Check device orientation: Make sure the Mesh Gateway is oriented towards the sun at 12:00 noon (northern/southern hemisphere). After confirming it is oriented in the correct direction, retry the Connectivity Test.
Wait for the device to be charged: If the superconductors in the device discharged during transit or were stored in a box or backpack, it can take some time to charge the superconductors and switch on. Give the device at least a half-day to charge then retry the Connectivity Test.
Find another location: If after confirming the device is oriented properly and is charged, the Mesh Gateway may be deployed too far away from the neighboring gateways. Move the device 60m (200ft) closer to an active gateway using the network map, then restart the Connectivity Test.
After troubleshooting, tap Confirm & Restart Connectivity Test.
Restart Connectivity Test
If you had closed the dialog, the The Device Details screen appears showing the current status of the Test.
Tap the circular arrow to restart the Connectivity Test.
If you have moved the Mesh Gateway to a new location, tap Reset Device to Current Location. If the Mesh Gateway is still in the same location, tap Keep Device Original Location.
If the Silvanet Cloud cannot reach the Mesh Gateway you are deploying, use the same troubleshooting steps as described in Signal too weak from neighboring gateways.
With the Mesh Gateway now connected to the Silvanet Cloud, go ahead and continue mounting the remaining Mesh Gateways in the deployment plan.
Wildfire Sensors require time to stabilize depending on the type of activity it has encountered.
After a Wildfire Sensor runs internal gas scans to test air quality, the sensor needs approximately 30 to 60 minutes to be ready to detect fires (stabilze).
When the Wildfire Sensor's internal Bosch gas sensor detects , it performs a set of gas scans to determine the type of VOC. After these gas scans are complete, it begins to stabilize and return to normal values.
This stabilization period allows for the dissipation of any smoke retained inside the sensor mesh (a small pot with a mesh cover used by the gas sensor). Ideally, the longer the wait, the more time the smoke has to dissipate.
Data during stabilization
While the Wildfire Sensor is stabilizing, it does not provide any accurate or usable values.
Interactions cause the Wildfire Sensor to repeat of the calibration process, but not a complete 14-day recalibration. This type of recalibration takes at least 5 days.
This includes, but not exclusively, the following types of interactions:
Touching the sensors, such as adjusting the angle of the sensor or attempting to pull it off the tree
Moving the sensors to another tree or to another location on the tree
Animals or humans breathing directly on the Wildfire Sensors.
Exhaust from vehicles (especially diesel trucks).
Bringing any source of VOC near the sensor such as cigarettes or fumes from running machinery.
Mounting the Wildfire Sensor at 3 meters height
Attaching the Wildfire Sensor to the tree or pole at least 3 m above the forest floor can prevent intentional or inadvertent interactions. If it is moved to a new location, it automatically runs the calibration process again (for 5 days).
Learn how to ensure the fire tests are conducted properly.
Before burning the test fire, ensure the local Fire Department and relevant authorities are notified of the test fire. Also, ensure a test fire is permitted.
We strongly recommend running the fire test in a location that is similar to the Pilot or Live deployment. Do not run the test in a location that is vastly different from the intended deployment location.
For example, running a test fire in an urban parking lot causes discrepancies. Wildfire Sensors are primarily forest sensors and urban areas can affect the functionality.
Use Map View
You can use the of the Silvanet Management app to find the ideal location for the test fire.
See .
Use a collection of homogeneous plant material (uniform in size and composition) for the test fire. Material should be of various sizes all of which are fast-burning branches or twigs but not logs.
Review the requirements for plant material in the following table.
To reflect conditions of real wildfires, the test fire should not diminish as the test runs, nor should the test fire resemble a BBQ fire.
As the wind direction cannot be controlled, provide sufficient time for smoke from the test fire to hit one or more Wildfire Sensors.
Ensure you continually feed the fire with material to keep the fire burning for at least 20-30 minutes to allow smoke from the test fire to reach one or more Wildfire Sensors. They are designed to detect fire at the smoldering phase - before there is an open fire.
Normally, detection time is within minutes (less than 1 hour from ignition). This is dependent on fuel volume, wind speed and wind direction. A denser deployment will decrease the time to detection and detection rate.
Because wildfire smoke behaves differently in different locations, select a location that is realistic and reflects the final deployment environment.
A parking lot, work yard or an urban area may not be the best location for a setup although it may be convenient. The results of a test in those type of locations would not be very useful. For example, under a forest canopy, wind behavior is different from wind behavior in an open area such as a work yard.
When performing fire tests, repeatedly lighting a fire and checking the response in short time interval (less than 1 hour) results in poor Wildfire Sensor performance.
The sensor needs a 1-hour time window to settle and restore fire detection sensitivity.
Wait 24 hours
For best results leave the sensors alone in the forest. Do not have vehicles nearby or anything that interacts with the sensors and then wait 24 hours before running another test.
Optionally, you can run test fires with a set of Wildfire Sensors to view fire alerts sent to a registered email address and the Site Management app.
When a Silvanet Wildfire Sensor, Mesh Gateway or Border Gateway is relocated, update the longitude and latitude settings in the Site Management app.
From time to time a Silvanet device may need to be moved to a new location. This can occur when a tree on which a sensor is attached falls (or is felled) or if a pole on which a Mesh Gateway is deployed must be moved. In these cases the GPS coordinates of the Silvanet device can be easily updated.
From the Site Management app, select the Site that includes the Silvanet device.
From the Device overview section, expand a Silvanet device to display device data, then select Device info.
From the Location tab, enter the new latitude and longitude values in the respective fields, then select Submit.
The updated latitude and longitude values are saved to the Silvanet Cloud.
After deployment, Wildfire Sensors require 14 days to calibrate before they are ready to detect fires.
Wildfire Sensors require 14 days after deployment to be calibrated to the environment. During this time the they do not provide useful data.
Calibration ready upon delivery
When a sensor is delivered to the customer, it is ready to be deployed, charged up and calibrated. No additional settings need to be made to the device.
When a Wildfire Sensor is deployed and charged, the status icon changes to Orange to indicate calibrating and then Green when ready.
After the Wildfire Sensor has been mounted, it requires 1 day to fully charge the supercapacitors. Once charged, the sensor’s solar panel continuously charges the supercapacitors, except of course during the night.
Use of semiconductors
After the Wildfire sensor has been fully charged, the sensor begins a 14-day initial calibration.
Once mounted, the Wildfire Sensor runs a calibration to prepare the device for fire detection. During this period, the Sensor does not provide any useful data may send false fire alerts, even after a month after deployment.
After this "settling in" period, the Wildfire Sensor is ready to detect fires.
After interactions
After interactions with the Wildfire Sensor, it requires at least 5 days to return to steady-state.
Requirement | Description |
---|
The Wildfire Sensor's power supply is stored in rather than rechargeable batteries as rechargeable batteries can potentially ignite. Using batteries would defeat the purpose of a wildfire detection system.
For more information, see .
For more information, see .
High
Dense deployment in high-risk areas.
80 m to 100 m
0.7/ha
Low
Sparse deployment in remote locations.
400 m to 500 m
0.1/ha
Use material similar to final deployment location. | Collect between 5 and 10 kg of plant material similar to the final deployment location, including smaller and bigger twigs, leaves as well as freshly cut and previously dried branches with needles. |
Leaves and needles create smoke. | To create smoke, ensure leaves or needles are still on the branches. |
Ensure material is dried and stored. | Dry out in advance the collected material and store them in a cool, dry location. Use the 14 day duration of the calibration period to allow the material to dry out and to be ready for burning. |
Weigh material. | Weigh the material before placing them on the fire pit. This ensures the same amount of material is used for subsequent test fire. |
Prepare enough material for a 30-minute burn. | Collect sufficient material to keep the fire burning for up to 30 minutes. |
We collected some Frequently Asked Questions about Silvanet apps (Site Management and Deployment apps) and Silvanet devices (Border Gateway, Mesh Gateway and Wildfire Sensor).
How do I contact Dryad Technical Support?
How do I edit my user information?
How do I access Silvanet apps?
Which frequency bands are used by Silvanet devices?
Do Silvanet devices require regular maintenance?
How high above the forest floor should Silvanet devices be mounted?
Will solar panels on Silvanet devices degrade over time?
Why does Wildfire Sensor calibration take 14 days?
How long after a gas scan is the Wildfire Sensor ready?
How long after an interaction occurs with a Wildfire Sensor is it ready to detect fires?
How do I remove a Wildfire Sensor from my Site?
Should Wildfire Sensors be replaced if a fire occurred nearby?
What is the role of Mesh Gateways in a Site?
What happens to sensor data if the Border Gateway loses Internet connectivity?
What happens to sensor data if the Border Gateway loses power supply?
Can I disconnect the solar panel from the Border Gateway?
What causes the Border Gateway to go offline?
How much time is required for the solar panel to charge the Border Gateway?
Only users with an Admin role can add a new Site to their own organization. If you are a reseller, you can add new Sites for your clients.
If you are a user with a Standard role, request a new Site from your organization's Admin user or from your reseller.
See Also
For more information, see Add a new Site.
Only users with Admin role or a reseller can add a new user.
A user with an Admin role has access to the Add User form available from the User Management view.
See Also
For more information, see User Management view.
Select Customer Support and in the form that appears enter the following information:
Email (required): Enter your company email address.
CC: Another contact email address that may be helpful.
Full name (required): Enter your full name.
Customer Type (required): Select from
Reseller
End Customer
I am not a customer
Request Type (required): Select from
Product Information
Payment & Billing
Shipping & Delivery
Deployment Assistance
Using Silvanet
About Dryad
Description (required): Enter a detailed description of the nature of your request. If your request is about a Dryad device, provide a Device Name (for example Pilot 2 MG 5) or Device ID (for example, mg-2m2nXX-641XXX000XXXXXXX).
Attachments: Attach a document, image file or other file type that helps explain your request.
Select Submit to send your request to Dryad Customer Service.
An email is immediately sent to the email address provided indicating Customer Support has received your request.
After obtaining results from the initial round, perform additional tests by modifying only one aspect of the test.
Change only one element of the test
When you modify the testing environment, change only one element at a time while keeping other elements of the test the same.
Possible modifications include:
Change Wildfire Sensor locations: Keep the Border Gateway in the same location but move the Wildfire Sensors to a new location, ensuring connectivity to the Border Gateway.
Change location of the fire pit: Keep the same distance between Wildfire Sensors but modify the fire pit location
Change distance between Wildfire Sensors: The further away the Wildfire Sensors are from the fire, the longer the detection time becomes. For example, modify the distance from 2 m to 15 m.
Burn different materials in the test fire. Clean out the ashes from the previous fire and replace with different material. Keep the distance between sensors the same.
Burn homogeneous material
Use same material as used during initial tests For modified tests, the same type and weight of material for burning MUST be identical to that used in the initial test, except when changing the type of material.
Allow Wildfire Sensors to stabilize
New location - 5 days: Any time the Wildfire Sensors are moved, they need at least 5 days to stabilize (recalibrate) in their new locations. Do not move them prior to testing.
Modify test - 30 to 60 minutes: If the locations remain the same but another aspect of the test is modified, allow 30-60 minutes for the Wildfire Sensors to settle (return to ready state).
Wind direction and speed
Be aware of wind direction and speed. This may affect which Wildfire Sensor(s) triggered a Fire alert.
If you change the location of the Wildfire Sensors within the 1 km range of the Border Gateway, you may not need to change the location of the Border Gateway. However, if the Sensors are moved out of range of the Border Gateway, you need to move the Border Gateway and update the GPS coordinates of the Border Gateway in the Site Management app.
Change the location of the Wildfire Sensors.
Update the sensor GPS coordinates in the Site Management app.
Allow 5 days for the Wildfire Sensors to stabilize (calibrate) to the new location. They need 5 days to stabilize (recalibrate). See Sensor normalization.
Burn a test fire, as described in Burning a test fire.
Record the results of the test, including wind conditions.
Keep the same distance between Wildfire Sensors (for example, 2m or 15m) but modify the fire pit location. This allows an analysis of the effect of wind direction and wind speed in the forest that affects the movement and direction of the smoke from the fire pit.
The further away the Wildfire Sensors are from the fire pit, the longer the detection time becomes. For example, modify the distance between from 2 m to 15 m between Wildfire Sensors.
Change the material that is burnt in the fire pit. Clean out the ashes in the fire pit from the previous fire and replace with different material.
If you burn forest material but need to test the Silvanet System with other materials such as creosote-soaked wood (railroad ties), then change ONLY the burning material without making any other modifications to the test.
After changing the material, allow the the sensors settle. Wait 24 hours before running the test.
Clear out the ashes from the previous test and replace with new material.
Wait 24 hours to begin the next test. See Sensor normalization.
Burn a test fire, as described in Burning a test fire.
Record the results of the test, including wind conditions.
This topic provides a suggested test plan for a four-week duration.
Avoid contact with sensors after deployment
AFTER SENSORS HAVE BEEN DEPLOYED AND CALIBRATED, DO NOT INTERACT WITH THE SENSORS AS THIS WILL CAUSE ERRORS WITH SENSOR VALUES AND COULD ALSO RESET THE SENSOR CALIBRATION.
The following shows a suggested test plan for a four-week duration.
Week | Test type | Day | Reset period | Material (examples only) | Sensor spacing |
---|---|---|---|---|---|
A test fire deployment can include one Border Gateway and only twenty sensors, without the need for a Mesh Gateway. Ensure you allow 14 days for sensor calibration.
A test deployment involves burning a small test fire in a metal fire pit (about the size of a BBQ fire) in the midst of the sensor deployments to receive Fire alerts from one or more sensors.
One Border Gateway can be deployed to send data from the Wildfire Sensors to the Silvanet Cloud.
The following example shows the Wildfire Sensors arranged in a grid pattern with a 2 m distance between the devices. The fire pit is placed in the center of the deployment. At the edge is the Border Gateway connected to the Internet using a mobile wireless connection.
Wait 24 hours between tests and do not interact with the Sensors between tests.
Deploy the Border Gateway where it can receive good wireless connectivity such as at the edge of the forest or near a path or roadway. This location should be free of obstructions to sunlight.
Ensure the deployed Border Gateway has:
Stable connection either through wireless (LTE-M/NB-IoT) or wired or wired (Ethernet using POE Injector).
Reliable power source (solar panel or mains with PoE Injector) and is fully charged before testing.
If the border gateway is powered only by the solar panels, then it most likely enters power saving mode during the night. Allow the Border Gateway to fully charge in the morning before testing.
Fire alerts are handled with priority and wake up the Border Gateway from power save mode.
Deploy the Wildfire Sensors using a grid pattern of 2 m distance between Sensors. Place the fire pit in the center of the deployment.
Ensure the Sensors are in range of the Border Gateway, otherwise a Mesh Gateway is required.
Wind direction and speed
Be aware of wind direction and speed. This may affect which sensor or sensors has triggered the fire detection process.
Do not skip calibration period
Before beginning the test fire, ensure you allow the sensors to perform the 14 day initial calibration period.
After deploying the Wildfire Sensors, wait 14 days for the calibration period to complete. No testing should be conducted prior to this.
Sensors will not provide accurate or useful readings when tested before or during the calibration period.
Afterwards, run the test fire.
Avoid contact with sensors after deployment
As described in Sensor Calibration, the gas sensor in the Silvanet sensor is very sensitive to changes in the environment. Consequently, moving, touching or interacting with the sensors beyond what is necessary influences the sensor readings and also the sensor calibration settings.
After deploying the Wildfire Sensors and Border Gateway, ensure they are communicating with the Silvanet Cloud. You can verify this using the Site Details section of the Site Management app.
Wildfire Sensor deployment modifications
When running fire tests, use a variety of deployment arrangements. Use different sensor spacings depending on the objective of the fire tests (quick detection vs. longer distances).
The fire pit can also be placed in different locations within the Sensor grid.
For more information, see Modify fire setups.
Possible solutions to Silvanet Gateway and Sensor alerts and warnings.
If a Silvanet device has connectivity, charging or other issues, troubleshooting messages are displayed the Device overview section of a Site. Messages can be alerts, warnings or notifications.
Icon | Message type | Description |
---|---|---|
Alerts need to be immediately resolved to ensure continued monitoring.
The device is not functioning properly. it is necessary to resolve the underlying issues as soon as possible to ensure continued monitoring.
The connectivity strength of this device is poor.
The connectivity is at one bar of strength. Resolve the issue as recommended. The device's connectivity strength affect features such as firmware updates or environmental monitoring.
To resolve this issue, check the following:
Range: Has the device been deployed near the edge of its range. Possible solutions include adding a Mesh Gateway or moving the Mesh Gateway closer to the sensors that are out of range.
Topology: Check if something is preventing or hindering transmitting signals, such as rocks, a new structure installed, or anything that would hinder a reliable connection. Possible solutions include adding an additional Mesh Gateway or moving the device higher on the tree.
Deployment: Has multiple connections for a Mesh Gateway been established during deployment to ensure redundancy.
The device is not charging as expected for 72 hours.
A Silvanet device has not been charging as expected for three days.
To resolve this issue, check the following:
Mains power supply: If the Border Gateway is connected to mains, ensure the power source has not been cut off - power supply switched off or the PoE has been disconnected.
Solar panel: Ensure the solar panel is still connected to the Border Gateway. Possible solutions include checking if the solar panel has been vandalized or tampered with, if the connection to the Border Gateway has been disconnected or taken down, or if it has been installed correctly.
To resolve this issue, check the following:
Solar panel: Check that the the solar panel is not obstructe. Inspect the solar panel for damage or vandalization.
Deployment: Check to make sure the device been correctly mounted on the tree or pole.
To resolve this issue, check the following:
Deployment: Ensure the Sensor has been correctly moounted.
Solar panel: Check if something is obscuring the solar panel.
Damage: Check if the Sensor has been vandalized or damaged.
We could not reach this device for 72 hours.
The Silvanet Cloud has not been able to reach this device for three days. Resolve this issue immediately to ensure reliable environmental monitoring. Firmware updates cannot be performed. If the problem persists, contact Customer Support.
To resolve this issue, check the following:
Charging: If the device has not been charging for an extended period (such as beyond three days), it cannot send a "is alive" message. Refer to Charging issues.
Connectivity: If the device has inadequate connectivity, refer to Connectivity issues.
Deployment: Check if the device has been properly mounted on a tree or pole. This may require visiting the Site to visually inspect the device.
Damage: Inspect to make sure the Wildfire Sensor has not been vandalized or damaged.
The underlying issues that triggered warnings need to be resolved as soon as possible.
The connectivity strength of this device is not optimal.
The connectivity is at two bars of strength. The device's connectivity strength is not optimal, which may affect features such as firmware updates or environmental monitoring.
To resolve this issue, check the following:
Range: Although within range, decreasing distance between Mesh gateways or between Mesh Gateways and Wildfire Sensors may improve connectivity.
Topology: Check if something is preventing or hindering transmitting signals, such as rocks, a new structure installed, or anything that would hinder a reliable connection. Possible solutions include adding an additional Mesh Gateway or moving the device higher on the tree.
Deployment: If necessary, add another Mesh Gateway to improve connectivity.
This device is not charging as expected for 24 hours.
Wait another 24 hours. If the device is still not charging after 72 hours, the cause must be resolved immediately. In this case an alert is sent (see Charging issue above).
The firmware of this device requires updating. Our team has been notified and will plan an update to the device's firmware.
Dryad Engineering or reseller is aware of the issue and has scheduled a firmware update.
The Wildfire Sensor is still calibrating.
Wait the full 14 days for the Wildfire Sensor to complete the calibration period and be ready for fire detection. During the calibration period, the Wildfire Sensor does not send usable data to the Silvanet Cloud.
Notifications indicate issues currently affecting the device but do not require user actions to resolve.
This device is experiencing delays in sending environmental data to the Cloud. Fire detection is still operational.
No user-actionable response required. Normal communication should be reestablished soon. If connectivity remains a problem, this will change to an Warning or Alert, depending on the duration and type of connectivity.
This section summarizes the changes for each release.
Affected Products
Silvanet Deployment App
Redesigned Silvanet Deployment app
We have completely redesigned our Silvanet Deployment app. You can now visualize your entire deployment planning at once and filter the devices on the map according to your needs. We have improved our Connectivity Test feature for the gateways and integrated in-app deployment guidelines and troubleshooting. Once you have deployed a device, you can edit its coordinates and add notes directly on the Device Details page.
Device List and Filtering
This new version allows you to visualize the complete device list of your site and to filter the list by device type, status or Deployment Packet.
Improved Connectivity Test
The Connectivity Test now displays an accurate “Remaining Time” counter. Also, the Connectivity Test results are now synchronized among all team members' Smartphones.
Deployment Guidelines and Troubleshooting
This new version provides Deployment Guidelines to ensure installers properly deploy Silvanet devices. It also provides Troubleshooting Guides to give assist installers when performing connectivity tests during deployment.
Device Details
You can now access the Device Details page after deploying a device to check its status, edit its coordinates or add a note.
Silvanet Site Management app
We have extended the capabilities of our Planning tool. You can now manually add or remove any type of device and edit their name or location for a precise site planning. Once the planning is complete you can release the Deployment Plan and access it in the Silvanet Deployment app to deploy your devices.
Manually add or remove any type of device and edit any device’s name and location for precise Site planning.
When releasing Deployment Plans, if the tool encounters planning errors, it provides warnings as well as troubleshooting guides to fix the errors. Once all errors have been resolved, the tool allows you to release the Deployment Plan.
Once the Deployment Plan has been released, you can access it directly in the Deployment app.
Silvanet Site Management app
We have released a completely redesigned Site Management view. This redesign offers you a more intuitive understanding of your site’s health, as well as crucial information related to your devices. The overall user experience has been revamped to make it even more easier for you to navigate through your site, whether using the device overview or the map.
Enhanced Device Overview: You can now visualize device connectivity strength, energy level, and firmware version, directly from the device overview.
Advanced Troubleshooting: Your devices are autonomously monitored and the device overview provides you with precise troubleshooting guides in case of issues.
Optimized Site Management Layout: Combined with the 3D map, the new layout of the Site Management view allows you navigate more easily from one device to another.
Silvanet Site Management app
We have released a Beta version of our new Planning tool in the Site Management app. This new feature allows you to estimate quickly and precisely the number of sensors and gateways needed to protect a desired area or asset. This new tool lets you enter paths and areas you want to protect and takes into account terrain elevation and line of sight prediction to help you place gateways and verify their mesh network coverage.
As this new feature will evolve as we add even more features, we welcome feedback that would assist us in fulfilling your requirements.
For support issues, reach out to our support team in case you’re facing any issues. Use this Support form to request support.
Thank you for your continued support and feedback. We look forward to empowering you with even more features and control over your Dryad experience.
Release Notes - 05.03.24
Silvanet Site Management app
We have improved our Site Map feature with an immersive 3D capability. Using the Map tools, you can now observe your deployed devices on an elevated terrain by tilting and rotating the map to navigate through your site.
We have also released an additional Map layer that displays hillside shading and contour lines. This allows for easier identification of changes in elevation throughout the deployment areas of a Site.
Silvanet Site Management app
Silvanet Deployment App (iOS only)
We've heard your feedback and enhanced the User Management view. In this release we have introduced role-based user management:
Admin role: Admin users are responsible for team organization. Admins can invite new users, edit user information and independently create new sites.
Standard User role: Standard users have access to the platform, can view the User Management overview and update their name and contact details. They cannot edit other users' details or invite new users.
In addition, we've revamped the User Management view to allow contact details of individuals to be added and made visible to all users.
The following table shows an overview of the roles and rights:
Users with an Admin role can now independently create new sites. While we are working on the ability to disable and delete existing sites, be mindful that creating too many sites generates clutter in the Dashboard Overview and may result in potential confusion in the workflow.
In this release we added a new feature in the Silvanet Deployment app that lets users check the connectivity of the gateways during the deployment.
Directly from the mobile app, you can now trigger a connectivity test on the gateway you are deploying and know immediately if the chosen location is suitable.
Silvanet Site Management app
Silvanet Deployment App
Dashboard Overview
User Management
Improved Packet Assignment Workflow
Other minor fixes
We have added a new landing page that allows you to have a better overview of your Sites and Deployments. It includes information on the number of sensors and gateways allocated to each site. It also improves navigation to specific sites.
You now have the power to invite users to our platform independently. Simply provide their basic information, including their name and email address, and we will send them an invitation via email complete with a link to join our application.
With this initial release all users will have the same access level categorized as "Standard User." However, we're happy to share that more roles and permissions are on the horizon. In the upcoming release, you'll have the ability to organize your team(s) better using multiple access levels and also create and manage new sites independently. We are committed to delivering this improvement by the end of the year.
We also improved the way deployment packets work to give you more flexibility and autonomy on the field - Packets are no longer assigned to an individual user. This means easier access and collaboration for everyone.
Once a packet has been created, it is automatically accessible to all the users of the site. With our mobile app, you can browse through all the packets of your site and select the one you or your team will deploy.
Last minute change of plans? Simply go back on the mobile app and select an alternative packet for deployment.
To access the latest features, open the Play Store on your Android device, search for our app Silvanet Deployment, and select Update to install the newest version.
Deployment Planning Map: The map is now centered around the device you are placing, providing a more intuitive experience.
Device Data Graph: The time frames of the graphs will no longer be fixed, offering clarity when observing the graphs for extended periods.
Fire Alerts: We've addressed multiple issues related to false alerts. This includes the implementation of an enhanced Machine Learning Model and improvements in how alerts are counted and visualized on the web application.
Learn how to use Dryad's API, the MQTT Sensor Data Integration
The Dryad external Message Queuing Telemetry Transport (MQTT) broker facilitates the integration of its sensor data with third-party systems. This includes customers and partners who wish to integrate the Dryad cloud platform with their own IT systems, such as command and control systems, and other data analytics platforms. For instance, this integration can be utilized for weather data analysis.
The MQTT is based on publish/subscribe architecture. It consists of
MQTT broker
MQTT clients
The term client refers to both publishers (Wildfire Sensors) and subscribers (third-party systems) for messages.
Dryad sensors, such as Wildfire Sensors, publish sensor readings to the Dryad external MQTT broker. The MQTT broker keeps track of subscribers who have subscribed to different topics. When the broker receives a message on a specific topic, it distributes the message to all subscribers who are subscribed to that topic.
For example, a wildfire sensor might publish its sensor readings to the topic:
If a subscriber (client) has subscribed to the same topic, it will receive the same message.
The message contains a payload (the actual sensor data) and metadata.
The connection is initiated when the client sends a CONNECT
message to the Dryad external MQTT broker. The broker responds with a CONNACK
message. Once the connection is established, the broker maintains it until either the client initiates a disconnect command or the connection is interrupted.
The CONNACK
message contains a return code indicating whether the connection was successful or not.
Return codes
Refer to the official MQTT documentation’s Connect Reason Code section to find out the possible return (reason) codes.
To receive messages on topics of interest as a client, you must first send a SUBSCRIBE
message to the Dryad external MQTT broker. The SUBSCRIBE
message can have a packet identifier and a list of subscriptions.
Each subscription contains
Case-sensitivity
MQTT topics are case-sensitive.
For example, the topic:
/sensor/envmon/Site-001/#
differs from the topic:
/sensor/envmon/site-001/#
To confirm each subscription, the Dryad MQTT broker sends a SUBACK
acknowledgement message.
The SUBACK
message contains the packet identifier of the original SUBSCRIBE
message and a return code. The return code indicates whether the subscription has been granted or rejected.
Refer to the official MQTT documentation's SUBACK payload section to find out the possible return (reason) codes.
After receiving the SUBACK
message, messages are received that match the topics you subscribed to when they were published.
If you no longer want to receive messages on a topic, you can send a UNSUBSCRIBE
message to the Dryad external MQTT broker.
With the UNSUBSCRIBE
message, you must include a list of topics from which you want to unsubscribe. To confirm the unsubscribe, the Dryad external MQTT broker sends a UNSUBACK
acknowledgement message.
The UNSUBACK
message contains a packet identifier, which is the same as the packet identifier of the UNSUBSCRIBE
message, along with a return code. The return code indicates whether the subscription has been granted or rejected.
See Also
Refer to the official MQTT documentation's UNSUBACK payload section to find out the possible return (reason) codes.
To subscribe to topics and receive messages, you need an MQTT client to connect with the Dryad external MQTT broker.
To configure your MQTT client to communicate with the Dryad external MQTT broker use one of the following options:
The site serial ID, username and password are provided separately via email with the username and password shared via a 1Password link. The 1Password link is valid for a period of 7 days.
See Also
For more information, see iPassword.
If your client supports Secure Socket Layer (SSL) connection mode, use that mode to communicate with the Dryad eternal MQTT broker whenever possible. The secure port uses SSL certificates generated by Let’s Encrypt. The ISRG Root X1 Certificate Authority (CA) certificate is available here and can be used for a secure connection. You can specify the file location of the isrgrootx1.pem when you connect to the broker with the secure port, 31393.
See Also
For SSL certificate details, see Let's Encrypt.
Dryad uses the default Quality of Service (QoS) level, which is QoS level 0 (delivery at most once) when publishing messages. Consequently, the maximum level of QoS the subscriber can expect is also 0.
See Also
For more information, see Eclipse Mosquitto MQTT man page.
This section describes the Dryad external MQTT topics that can be subscribe to, either securely or insecurely, along with examples.
Use of the term "sensor"
The term sensor
refers to a Wildfire Sensor, which is a LoRaWAN end device that collects data, including fire alerts, temperature, humidity and air pressure using its internal Bosch (BME 688) gas sensor.
The payload is created using this data, along with other information such as sensor ID, longitude, latitude, and so on.
Dryad MQTT topics are used to receive messages from all sensors deployed in a Site:
Site is indicated by <site serial id>
Sensors are indicated by #
You receive one sensor data reading at a time on the same MQTT topic.
The MQTT topic has the following form:
It returns the following message JSON payload.
The table below explains each field in the JSON payload.
New fields can be added at any time, and there may be times where this table lags behind recent changes.
Each payload received contains data from a single Wildfire Sensor.
There is no pre-defined sequence for receiving data from each wildfire sensor. You receive data as soon as it gets published by a wildfire sensor.
For example, to receive all sensor data from a site having the following Site ID:
Use the following topic:
The JSON payload of the message sends data similar to the following example.
Dryad supports many commonly used MQTT clients. Currently, instructions for using the following MQTT clients are provided:
More to be added.
Eclipse Mosquitto's mosquitto_sub
is part of the Mosquitto MQTT broker.
With mosquitto_sub
you can subscribe and unsubscribe from topics.
Using mosquitto_sub
, the command syntax for subscribing to a topic is as follows:
where:
Flags
Only the following flags are supported:
-d
to debug the messages
-i
to set the client id
-c
to enable persistent client mode
For example, to subscribe to the topic:
Use the following non-secure or secure mosquitto_sub
commands shown below.
Non-secure:
Secure (uses ISRG Root X1 CA certificate):
See Also
For more information about command line options, see the mosquitto_sub manual.
With mosquitto_sub
, the command syntax for unsubscribing from a topic is as follows:
where:
For example, to unsubscribe from the topic:
Use the non-secure or secure mosquitto_sub
commands shown below.
Non-secure:
Secure (uses ISRG Root X1 CA certificate):
See Also
For more information about command line options, see the mosquitto_sub manual.
The Silvanet Mesh Network is based on LoRa. The frequency bands used depend on the region in which it is deployed:
Europe: 868 MHz
North America: 915 MHz
Asia: 433 MHz
These are set in the Silvanet devices by Dryad.
See Also
For more information, see .
We do not anticipate that Wildfire Sensors, Border Gateways or Mesh Gateways need to be serviced or cleaned over the lifetime of the device.
However, unusual circumstances may present additional challenges for the Border or Mesh Gateways as they have a higher energy requirement than Wildfire Sensors. However, cleaning is normally not required.
As Silvanet devices mounted vertically, these effects are minimized.
The solar panels are placed vertically (by intention) on a tree or pole. This position minimizes dust buildup and allows rain to wash off any dust or dirt. This vertical position is intentionally to eliminate manual servicing (cleaning).
The solar panels have been intentionally oversized to allow for performance degradation over time while still maintaining functionality.
See Also
For more information, see .
Currently, users with an Admin or Standard role cannot delete a user. Only Dryad can delete users.
Send a request to have a user deleted to Dryad .
See Also
For more information, see .
You can edit your own name and phone number if you have a Standard user role.
All fields are editable if you have an Admin role, except email field.
For all user roles, the email field is not editable as this is the Username.
See Also
For more information, see .
Carefully follow the steps described in this topic to run test fires.
Ensure you have read through the before proceeding.
Contact the local fire department / authorities and clarify whether you are allowed to make a test fire.
Extinguish the fire after running the fire test
Take precautions and make sure you can extinguish the fire. Do not leave hot ash in the forest. Also, as a precaution, have sufficient water available to be able to extinguish the fire after the test.
Record the weight and type of material you plan on burning. You need this information for any follow up tests to ensure you consistently use the same weight and type of material for each test fire.
Record the type of material you plan on burning.
Record the weight of the material you plan on burning for the duration of this test fire, including the material you plan on adding to keep the fire burning.
After the sensors and Border Gateway have been deployed and the sensors have connectivity to the Silvanet network, you are ready to burn a test fire to generate smoke.
Artificial fire lighter
Do not use any artificial fire lighter as these have a different chemical composition and set free other burning gasses that can create false measurements from the sensors.
Smoke not sparks
Ensure the fire does not send out sparks and that it consists mostly of smoke due to the burning needles. Ensure the fire is generating smoke rather than having a burning camp-fire style fire.
Use proper fire pit
A BBQ may not provide the appropriate level of smoke, nor duration.
Use a metal fire pit with a diameter of approximately 1 m and place it in the middle of the deployed sensors.
Start the test fire by igniting small, dry branches and slowly grow the fire.
Burn the fire for approximately 30 minutes by using small branches to keep the fire going. Add smaller branches with needles on top of the fire. Constantly feed the fire with fresh material to ensure the fire continuously burns for 30 minutes.
Sensors need 1-5 min of smoke exposure to trigger a fire detection process.
Visually confirm smoke from the fire reaches the sensors.
The expected time between the ignition of the fire and receiving a fire alert should be within minutes. You should expect a fire alert in the Site Management app and receive a fire alert email.
A fire alert icon appears in the map for the Site displaying the fire's location. Open the details of the fire by clicking the fire alert Icon.
During and after the test, document the results of the test. It should include the following information:
Distance of the fire pit to the Sensor(s) that triggered a fire alert.
Weight of the amount of material used for the duration of the test fire, including the material added to the fire during the burn.
Duration of the burn.
Visual confirmation of smoke hitting the sensors (ideally as a video).
The test conditions must be documented precisely. For example, document the wind direction, wind speed, changing winds and other environmental conditions which allow for an accurate evaluation of the reaction of the sensors.
Record the test fire
Take videos and/or pictures of the fire during the test. They are useful during troubleshooting. The results are useful for creating and updating the ML model with data from real-world tests.
Ensure the fire is completely extinguished. Look for any embers under the burnt material. Do not let any embers escape the fire pit/bowl and ignite the surrounding ground material.
Completely extinguish the fire
Ensure that the burnt material has been put out thoroughly and there are no hidden embers. This is to avoid a fire unintentionally starting.
Repeating a fire test can be done but We highly recommend leaving a 4-hour time gap between fire tests.
See Also
After the Wildfire Sensor performs a set of gas scans to test the air quality, it needs approximately 30 to 60 minutes to return to normal values and be ready to detect smoldering fires.
See Also
For more information, see .
The solar panels on Silvanet devices have been intentionally oversized to allow for performance degradation over time while still maintaining functionality.
See Also
For more information, see .
Any interactions with a Wildfire Sensor causes a complete recalibration. This takes at least 5 days before the Sensor is ready to detect smoldering fires.
Interactions with the Wildfire Sensor are non-regular movements or activity around the Sensor that trigger a fire detection process. This could be
Touching the Sensor, either by a human or animal that may breath on the Sensor.
Moving the Sensor to a new location on the tree or in the Site.
Exhaust from vehicles (especially diesel vehicles) driving near the Sensor.
Bringing any source of VOCs near the Sensor such as cigarattes or machinery.
See Also
For more information, see .
To protect the Silvanet device from human or animal interference and to give the device better line of sight to Mesh or Border Gateways, mount the device at least 3 m (10 feet) or higher above the forest floor.
See Also
See , and .
Section | Functionality | Admin | Standard User |
---|---|---|---|
Return code | Description |
---|---|
Return code | Description |
---|---|
Host | Port | Connection type | Encryption |
---|---|---|---|
Name | Type | Description |
---|---|---|
Parameter | Description |
---|---|
Parameter | Description |
---|---|
For more information, see in .
1-2
Initial
1 - 14
14 days
n.a.
n.a.
3
Initial
1
1 day
Douglas Fir
5 m
3
Material
2
1 day
Creosote railroad ties
5 m
3
Material
3
1 day
Pressure-treated poles
5 m
3
Distance
4
1 day
Douglas Fir
10 m
3
Distance
4
5 hr
Douglas Fir
15 m
3
Distance
5
1 day
Douglas Fir
80 m
3
Distance
5
1 day
Douglas Fir
100 m
4
Location
6 - 10
5 days
n.a
n.a
5
Initial
11
1 days
Douglas Fir
5 m
5
Material
12
1 day
Larch
5 m
5
Material
13
1 day
Maple
5 m
5
Distance
14
1 day
Douglas Fir
10 m
5
Distance
14
1 day
Douglas Fir
15 m
5
Distance
15
1 day
Douglas Fir
80 m
5
Distance
15
1 day
Douglas Fir
100 m
User management
User overview
✅
✅
Invite new user
✅
❌
Update users details
✅
❌
Sites
Access to Sites menu
✅
✅
Add new sites
✅
❌
Deployment planning
Packet preparation
✅
✅
Deployment
Device installation
✅
✅
0
Successful
0
Successful
ext.mqtt.dryad.app
31383
TCP
None (Non-secure)
ext.mqtt.dryad.app
31393
TCP
TLS/SSL (Secure)
siteId
String
Unique identifier for the site where the sensor is deployed. It's the same as the site serial id. Format:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
applicationNSId
String
The sensor's application ID Format: xxxxxxxx-xxxx-xxxx-xxxx-x
sensorNSId
String
The sensor ID Format: sn-silvav{version_number:number}nxxx-xxxxxxxx-xxxx-xxxx-xx
time
String ISO 8601
Timestamp indicates the time the data was recorded. The format of the timestamp is "YYYY-MM-DDTHH:MM:SS.mmmmmmZ". For example, if the timestamp is 2024-03-07T16:54:34.106672Z the following can be extracted. 2024-03-07: Indicates the date in the format of year-month-day. T: Separates the date and time components. 16:54:34.106672: Indicates the time in the format of hours:minutes:seconds.microseconds. Z: Denotes that the timestamp is in Coordinated Universal Time (UTC), also known as Greenwich Mean Time (GMT).
fireAlertStatus
int
Represents the fire alert status
0 : No alert
2 : Alert. Smoke/fire detected
temperature
float
Temperature [ambient] reading by the sensor in Celcius.
humidity
float
Relative Humidity [ambient] reading by the sensor as a percentage.
airPressure
float
Air pressure reading recorded by the sensor in Pascal (Pa)
latitude
float
Latitude coordinates of the sensor's location
longitude
float
Longitude coordinates of the sensor's location.
batteryPct
int
Battery capacity as a percentage.
airQuality
float
Index for Air Quality (IAQ).
-h <hostname>
Specifies the MQTT broker's hostname.
-p <port>
Specifies the MQTT broker's port number.
-u <username>
Specifies the username for authentication
-P <password>
Specifies the password for authentication.
--cafile <path_to_ca_cert.pem>
[optional, only use with SSL] Specifies the path to the CA certificate file in PEM format.
-t <message-topic>
Specifies the MQTT topic to which you want to subscribe.
-h <hostname>
Specifies the MQTT broker's hostname.
-p <port>
Specifies the MQTT broker's port number.
-u <username>
Specifies the username for authentication.
-P <password>
Specifies the password for authentication.
--cafile <path_to_ca_cert.pem>
[optional, only use with SSL] Specifies the path to the CA certificate file in PEM format.
-U <unsub-topic>
Specifies the MQTT topic to which you want to unsubscribe.
Mesh Gateways enable large scale deployments of Wildfire Sensors across a Site.
They receive messages from Wildfire Sensors and forwards them to other Mesh Gateways within range or to Border Gateways if they are within range.
Messages sent from Wildfire Sensors hop through the Silvanet Mesh Network until they reach the Border Gateway.
See Also
For more information, see Silvanet Mesh Gateways.
When there is a wildfire directly where the sensors are, they will, of course, be destroyed by the flames and need to be replaced, if the tree is still alive. However, they will continue to run fire detection processes up to the point when they are destroyed.
In general, after a wildfire has been detected by our Sensors and firefighting occurs in the area of the sensors, the Sensors in the area should be replaced. Also, if the Sensors that have been massively soaked in chemicals, such as to extinguish fires, they are most likely going to be contaminated and should be replaced. The sensors may continue to work, but to ensure they function, we recommend replacing them after fire fighting.
However, even in cases where a fire occurred nearby, Silvanet Wildfire Sensors can survive as they are made from durable plastics and all electronic components are sealed with resin.
If the solar panel is not charging the Border Gateway, it may be damaged.
Disconnect the solar panel from Border Gateway and measure the voltage. It should be around 20 V. If not, it may not have sufficient light or the solar cell is damaged.
See Also
For more information, see Silvanet Border Gateway.
A Border Gateway may be offline due to several reasons, including:
Connectivity strength of the device is poor.
The device has gone into power saving mode.
The device has not been charging.
See Also
For more information, see Device troubleshooting.
Dryad does not recommend disconnecting the solar panel from the Border Gateway as this causes the supercapacitors of the Border Gateway to drain. The solar panel also acts as a backup power supply if the PoE is used.
If required, the Solar Panel can be disconnected from the Border Gateway.
See Also
For more information, see Mount Border Gateways.
If you want to remove a Wildfire Sensor from your Site, cut the treenail at the bark level and remove the device. The remaining part of the treenail will not damage the tree. However, the device will continue to appear in the Site Management app for your Site. '
Contact Dryad Support to have the device removed from the Site Management app. Provide the Device ID (Sensor or Gateway ID) to have the ID removed from the Site database.
See Also
For more information finding the Device ID in the Site Management app, see Site details.
Updating firmware in Silvanet Devices uses FUOTA (Firmware Update Over the Air). Update times vary depending on device energy levels and communication strength between devices.
About FUOTA
FUOTA is a standard for distributing firmware updates to many devices as the same time in an efficient and secure manner.
The Silvanet Cloud uses LoRaWAN which supports FUOTA. Updating Wildfire Sensors use End-to-End 128-bit AES encryption.
When the firmware needs updating, Dryad Engineering uses FUOTA (Firmware Update Over The Air) to send updates simultaneously to specific Silvanet devices in a Site from the Silvanet Cloud.
FUOTA uses Multicast as it is the most efficient and secure method to update a Site's firmware. During an update, the LoRaWAN Network Protocol is temporarily switched to allow two-way communication. Firmware is then updated using a chunked image transfer (no compression).
Updates are sent in data packets of a restricted size and then are reconstituted in the Silvanet devices before an update is done.
Border Gateways: If the firmware in Silvanet Border Gateways require updating, Dryad sends a command for the Silvanet Cloud to update Border Gateways.
Mesh Gateways: If the firmware in Mesh Gateways require updating, Dryad sends a command for the Border Gateway(s) to update the Mesh Gateways.
Wildfire Sensors: If the firmware in Wildfire Sensors require updating, Dryad sends a command for either Border Gateways or Mesh Gateways to update the Wildfire Sensors.
About updating Border Gateways
When Silvanet Border Gateways require firmware updates, large file transfers are successfully made securely and reliably even with eventual interruptions of power supply and, consequently, sensor operation.
The Wildfire Sensors come with a factory install of firmware. If this version of the firmware is not the latest, Dryad engineering checks the current firmware version and updates are scheduled, sometimes during the Calibration phase of the Sensors.
Notifications
Dryad engineering notifies the customer before performing any firmware updates to a Silvanet deployment.
The update times vary depending on a number of factors.
Number and type of Silvanet devices to be updated.
Connectivity strength between the Silvanet Wildfire Sensors and Mesh Gateways or between Mesh/Border Gateways. For more information, see Connectivity is not optimal.
Full or charging status of a Silvanet device, which reflects the supercapacitor energy storage levels (high vs low energy storage). For more information, see Charging is not optimal.
To cope with low power and the various regional regulatory requirements, both the downlink fragment size as well as the periodicity are highly configurable allowing for stretching a FUOTA process to a week or more.
Description of terms and phrases used in Silvanet Dryad Documentation.
Air quality is quantified as an Index of Air Quality (IAQ) which indicates the quality of air within range of the sensor. It is used by the Silvanet sensor to trigger the fire detection process, if it passes a defined threshold. See IAQ below.
A Silvanet device (Border Gateway, Mesh Gateway or Wildfire Sensor) is considered in Active state after it has been registered with the Silvanet Cloud. It does not necessarily indicate the device is sending messages to the Silvanet Cloud via Silvanet Mesh Network. An active state is indicated by a green status icon.
Random access protocol. LoRaWAN networks use an ALOHA-based protocol so end devices do not need to peer with specific gateways.
A Border Gateway receives messages from Silvanet sensors via Mesh Gateways using LoRaWAN and forwards the messages to the Silvanet Cloud using one of three services: LTE-M (mobile), Ethernet (PoE adapter and router) or satellite.
Once deployed, the Silvanet Wildfire Sensor needs to perform a 14-day calibration after deployment. This is critical for allowing the sensor to detect a smoldering fire. During this period the Sensor does not detect smoldering fires.
LoRA is based on Chirp Spread Spectrum (CSS) where a CHIRP (Compressed High Intensity Radar Pulse) is a type of signal that is the carrier of data. Chirps have two types of signals: up-chirp and down-chirp. An up-chirp increases in frequency while a down-chirp decreases in frequency.
According to the ISO model, data packets are data units within the Network Layer. They include the source and destination IP addresses, as well as other information. Packets are essentially a connection-oriented protocol. It ensures each single packet is not dropped or compromised. It is considered reliable communication.
A Device ID is a unique identifier of a node in a LoRaWAN network, for example Sensor ID and Gateway ID. In Silvanet, these nodes include the Silvanet Border Gateway, Mesh Gateway and Wildfire Sensors.
The Device ID is provided as a unique text string and QR Code. The Device ID is used to register the device with the Silvanet Cloud. It also allows the Silvanet Cloud to know the location of the device in a Site.
Address by which the device is known in the Mesh network. It is composed of two parts: the address prefix and the network address. It defines an end device within the current network and all communication between devices use it after joining the network.
Messages sent from Gateways to devices lower down in the hierarchy; for example, messages sent from the Silvanet Cloud to Border Gateways, Border Gateways to Mesh Gateways or Mesh Gateways to sensors are downlink messages. Satellites do not send downlink messages to Border Gateways.
In Silvanet, it is the Wildfire Sensor that sends LoRa-modulated wireless messages to Silvanet Gateways (Border or Mesh) and receives messages from these Gateways.
Extended Unique Identifier. It is a 64-bit unique identifier as defined by IEEE. Dryad assigns a unique identifier (EUI) to each device. Each device's EUI consists of a unique combination of a DevEUI and a JoinEUI.
During the calibration period and up to one month after deploying, the sensor may trigger false fire alerts. This is normal behavior and is expected.
A sensor triggers a fire alert after the sensor determines with a high probability that a fire has been detected. The fire alert is sent immediately to registered users via the Silvanet Cloud.
The most important measure of fire behavior is fire intensity. Fire intensity (I) represents the heat released per meter of fire front (kW/m of fire front). It is a function of the following:
Heat yield of fuel (kilojoules/kg)
Amount of fuel per unit area (kg/m2)
Rate of forward spread of fire front (km/h)
Version of the firmware loaded in the device memory.
Firmware Update Over the Air.
Firmware update Over the Air (FUOTA) is a standard for distributing firmware updates. It allows firmware updates to be delivered to many devices at the same time efficiently and securely.
FUOTA uses a chunked image transfer (no compression). To allow for any low power periods as well as various regional regulatory requirements, FUOTA processes can be configured to stretch over an extended period such as a week. It can be configured by downlink fragment size and periodicity of transmissions.
The Silvanet Cloud (Network Server) prepares to send updates as a multicast distribution. The firmware is chunked into transmittable parts. The Silvanet Cloud schedules each update chunk as a download message to the multicast group. The Network Server then verifies that each device has received all chunks, synthesizes them and verifies the update signature.
The end device (Silvanet Sensor) applies the firmware update and delivers a firmware update complete
uplink message to the Network Server.
The gas sensor in the Silvanet sensor runs a set of gas scans to test if the sensor has detected a fire or some other VOC.
The gas sensor runs consecutive gas scans which is the real test for a fire. However since gas scans consume a significant amount of energy, they are kept to a minimum and only start if the sensor detects a change in the gas composition of the air consistent with smoke from a fire.
Unique text string and QR Code that identifies a Gateway (Border or Mesh) in the Silvanet Cloud. Same as Device ID. See Device ID.
Index of Air Quality. It is an index that has a range of values that indicates or quantifies the quality of the air in the environment surrounding the sensor. The threshold value which triggers a fire detection process is defined by Dryad.
Interacting with a sensor causes the sensor to be recalibrated. Interactions can include touching the sensors in any way, moving the sensors in any way, being in proximity to the sensors and running machinery and vehicles, especially diesel, near the sensor. It can also include bringing any source near the sensor that could trigger the fire detection such as cigarettes and even breathing on the sensor.
Internet of Things. Silvanet devices are IoT devices.
A 64 bit extended unique identifier.
LoRA (Long Range") is a proprietary modulation technique by Semtech.
The key advantages for using LoRa is its low power usage and long range. It is ideal for Silvanet devices as they send small amounts of data over long distances periodically (under normal conditions). This allows the devices to operate using solar panels.
It also allows Silvanet Gateways to be located at greater distances from Wildfire Sensors, thus reducing the number of gateways required per deployment.
LoRa networks can achieve a maximum throughput of 50 Kbps (100 bytes/min in normal conditions). Additionally, it is approved as a standard for Low Power Wide Area Networking (LPWAN) by the ITU (International Telecommunication Union). As it operates in the license-free sub-gigahertz bands (such as 915 MHz, 868 MHz and 433 MHz), it is subject to interference and retransmissions.
LoRaWAN ("LoRa Wide Area Network") is a standard of ITU and is managed by the LoRa Alliance.
LoRaWAN is a Medium Access Control (MAC) Layer protocol that manages communication between Silvanet Gateways and Wildfire Sensors in the Silvanet Network. It is a software built on top of LoRa hardware and defines, amongst other things, when data packets are transmitted and the format of those messages.
LoRaWAN is optimized to operate in low power mode and can transmit as far as 10 km in open fields, less in forests and up to 3 km in urban areas with significant interference. LoRaWAN also allows for firmware updates and updates to the ML Model on sensors over the air (FUOTA).
Each node (device) in a LoRaWAN network contains its own unique Device ID.
Indicates the MAC layer version used by a Silvanet device, for example MAC_V1_0_3.
Indicates the PHY Version used by a Silvanet device, for example PHY_V1_0_3_REV_A.
LTE-M which is a type of 4G cellular network. It is designed for IoT devices to connect to mobile networks. Dryad Border Gateways use LTE Cat M1. It is designed to allow IoT devices to go into Power Saving Mode to reduce energy consumption. It also allows FUOTA without draining the supercapacitors in the Border Gateway. (Optionally, the Border Gateway can also support NB-IoT.)
Mesh Gateways receives messages from sensors and forwards the messages to other Mesh Gateways or, if in range, to a Border Gateway using the Silvanet Mesh Network. Messages sent from Wildfire Sensors hop through Mesh Gateways until reaching a Mesh Gateway within range of a Border Gateway.
A LAN topology in which nodes can connect directly in a non-hierarchical way to as many other nodes as possible to find the most efficient route to end nodes. Silvanet implements mesh networking.
A ML (machine learning) model is a program that has been trained to recognize certain types of patterns. In Silvanet, the ML Model has been trained to recognize certain types of patterns, in this case the gases from a smoldering fire.
A version of the Machine Learning (ML) model loaded in the memory of the Silvanet Device. It is updated to all sensors in a Site using FUOTA.
MQTT is a Client Server publish/subscribe messaging transport protocol that is lightweight, open, simple, and designed to be easy to implement. It is typically used for communication in Machine to Machine (M2M) and Internet of Things (IoT) contexts where a small code footprint is required and/or network bandwidth is at a premium. It is used by third-parties to communicate with a Silvanet Network.
In the Silvanet System, the Network Server is the Silvanet Cloud which manages the entire Silvanet network. If It receives multiple copies of the same message, it keeps a single copy of the message and discards the others (preventing message duplication).
Network Server Gateway ID. Same as Gateway ID.
Over The Air Activation. FUOTA (Firmware Update Over the Air) uses OTAA to update Wildfire Sensor firmware.
A Deployment Packet defines the Silvanet Wildfire Sensors and Gateways deployed (or in the process of being deployed) in a Site. It typically include the planned deployment locations of the devices. More than one Packet can be prepared for Site deployments. They are prepared using the Site Management app and made available in the Silvanet Deployment app.
A Phase 1 alert is not necessarily an indicator of a fire. However, when a Silvanet sensor triggers a Phase 1 alert (yellow), it indicates a deterioration in air quality in the surrounding environment. Phase 1 alerts are used as an optimization to reduce the number of gas scans (which check for fire) and only do so when there is a change in the gas composition of the air.
If the sensor determines a fire is the most likely cause for the deterioration of air quality (which is indicated by a Phase 1 alert), the sensor immediately issues a Phase 2 fire alert sent to the Site's registered users.
The Border Gateway is supplied with a PoE Injector (Adapter) that provides a voltage range of between 36V and 57V. The PoE is IEEE 802.3af compliant.
To save energy, the Border Gateway switches into power saving mode for 60 minutes then wakes up for 5 minutes to listen to the Silvanet Mesh Network and sends all messages from sensors that have been queued. In case of fire alerts, it wakes up immediately and sends the alerts to the Silvanet Cloud.
The Silvanet Wildfire Sensor is designed to detect forest fires during the early stages (even during the smoldering phase) within minutes. The sensor monitors the microclimate by measuring temperature, humidity and air pressure.
Unique text string and QR Code that identifies a Silvanet Wildfire Sensor in the Silvanet Cloud. Same as Device ID. See Device ID.
Same as Device ID. See Device ID.
A Site is a geographical area which has a dimension that is dynamically calculated based on the placement of Silvanet devices in a forest. A user creates Packets within a Site.
The Site Management app (dryad.app) displays all currently created Sites. Using your username and password, you are granted access to all Sites to which you are registered. After deployment, a Site can be monitored within the Site Management app.
A Site ID is a unique ID assigned to a Site by Dryad.
It appears in the URL of a Site as well as the breadcrumbs line when a Site is opened. For example, dryad.app/sites/<Site ID>
.
A Site name can be changed but the Site ID cannot be changed. Use this Site ID when requesting support for a specific Site.
A smoldering fire is defined to be a slow, flameless combustion of a biomass material such as forest floor material, branches, leaves, and so on.
A supercapacitor is a high capacity capacitor that can accept and deliver charges faster than batteries and tolerates many more charge and discharge cycles than rechargeable batteries.
Transmissions sent by end-devices to the Network Server relayed by one or many gateways. Satellites only receive Fire Alerts messages from Border Gateways.
A VOC (Volatile Organic Compound) is an organic chemical compound that evaporates easily at room temperature. They vaporize into air and dissolve in water, for example smoke from fires. Organic compounds are chemicals that contain carbon and are found in all living things, especially trees. VOCs are also emitted from, for example, oil and gas fields and diesel exhaust which is why the sensors use ML Models to distinguish between VOCs from fires and VOCs from other sources.
The US EPA (Environmental Protection Agency) defines VOCs as follows:
Volatile organic compounds (VOC) means any compound of carbon, excluding carbon monoxide, carbon dioxide, carbonic acid, metallic carbides or carbonates and ammonium carbonate, which participates in atmospheric photochemical reactions, except those designated by EPA as having negligible photochemical reactivity.
Yes, the Border Gateway supports NB-IoT in cases where LTE-M is not available.
See Also
For more information, see Silvanet Border Gateway.
The solar panel needs 3 to 4 hours to charge the superconductors in the Border Gateway before it comes online.
However, if the PoE is disconnected or if a power failure occurs in the power supply, the solar panel will fully charge the Border Gateway in 1 to 2 days before it begins operating properly.
See Also
For more information, see Silvanet Border Gateway.
If the Border Gateway loses network connectivity, it queues all the sensor data it receives from Wildfire Sensors and Mesh Gateways. After the network connection has be reestablished, it sends the data to the Silvanet Cloud Platform.
The same process occurs if the Border Gateway is in power saving mode.
See Also
For more information, see Silvanet Border Gateway.
The Silvanet device requires immediate action to resolve the underlying issues.
The Silvanet device is not performing optimally. The underlying issue should be resolved, but the device is still functioning normally.
No user-actionable resolution required. Information only.
Status icons allow for easy identification of device status in Map views in Silvanet apps.
Status icons allow users to quickly identify the status of each device in a Site.
The Site Management app and the Deployment app share a common set of status icons for Wildfire Sensors, Mesh Gateways and Border Gateways. These color-coded icons allows the status of WildFire Sensors and Gateways to be easily identified.
Multiple Wildfire Sensors
Areas with multiple sensors deployed in a tight configuration are displayed as a single numbered icon when zoomed out in Map view.
Icon | Description |
---|---|
Icon | Description |
---|---|
This equipment should be installed and operated with a minimum distance of 24 cm between the radiator and your body. EU Compliance
Equipment | Model | PoE Layout | Cellular (WWAN) | Satellite |
---|
Bands | Gain (dBi) | Power (dBm) | EIRP (dBm) |
---|
Bands | Gain (dBi) | Power (dBm) | EIRP (dBm) |
---|
Bands | Gain (dBi) | Power (dBm) | EIRP (dBm) |
---|
Referred to Article 10(9), CE simplified EU declaration of conformity.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause undesired operation.
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
This device and its antenna(s) must not be co-located or operating in conjunction with any other antenna or transmitter.
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 23cm between the radiator and your body.
Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
This device contains licence-exempt transmitter(s)/receiver(s) that comply with Innovation, Science and Economic Development Canada’s licence-exempt RSS(s). Operation is subject to the following two conditions:
This device may not cause interference.
This device must accept any interference, including interference that may cause undesired operation of the device.
The transmitter module may not be co-located with any other transmitter or antenna.
L’émetteur/récepteur exempt de licence contenu dans le présent appareil est conforme aux CNR d’Innovation, Sciences et Développement économique Canada applicables aux appareils radio exempts de licence. L’exploitation est autorisée aux deux conditions suivantes :
L’appareil ne doit pas produire de brouillage;
L’appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d’en compromettre le fonctionnement.
Le module émetteur peut ne pas être coïmplanté avec un autre émetteur ou antenne.
This equipment complies with ISED RSS-102 radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 34cm between the radiator and your body.
Cet équipement est conforme aux limites d’exposition aux rayonnements IC établies pour un environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 34cm de distance entre la source de rayonnement et votre corps.
This product is intended to be supplied by a Listed PoE Adapter marked “L.P.S.” (or Limited Power Source or PS2) rated 36-57V DC, 0.3A minimum, maximum altitude during operation below 5000m. For more information regarding approved power sources, please contact Dryad Networks GmbH.
Icon | Description |
---|---|
Bands | Gain (dBi) | Power (dBm) | EIRP (dBm) |
---|
Hereby, Dryad Networks GmbH declares that the radio equipment type 1. Silvanet Border Gateway, SBG-2; 2. Silvanet Mesh Gateway, SMG-2 are in compliance with Directive 2014/53/EU. The full text of the EU declaration of conformity is available at the following address:
FCC Company contact details Name: Dryad Networks GmbH Contact:
Silvanet Border Gateway | SBG-2 | With | With | With |
Silvanet Mesh Gateway | SMG-2 | Without | Without | Without |
M | 5 | 11.02 | 16.02 |
N | 5 | 10.65 | 15.65 |
P | 5 | 19.30 | 24.30 |
900 | -0.03 | 35 | 34.97 |
1800 | 2.45 | 35 | 37.45 |
B1 | 1.38 | 25.70 | 27.08 |
B3 | 2.45 | 25.70 | 28.15 |
B8 | -0.03 | 25.70 | 25.67 |
B20 | -0.4 | 25.70 | 25.30 |
B28 | -0.25 | 25.70 | 25.45 |
B1 | 1.38 | 25.70 | 27.08 |
B3 | 2.45 | 25.70 | 28.15 |
B8 | -0.03 | 25.70 | 25.67 |
B20 | -0.4 | 25.70 | 25.30 |
B28 | -0.25 | 25.70 | 25.45 |
Planned: The location of the sensor has been defined in the Packet but has not been deployed.
Deployed: Sensor is deployed but is not yet connected to the Silvanet Cloud.
Calibrating: Sensor is currently within the 14 day Calibration period.
Active: Sensor has connected to the Silvanet Mesh Network and is sending/receiving data.
Monitor: Sensor has not sent data to the Silvanet Cloud within the last 6 to 12 hours.
Inactive: Sensor has not sent data for more than 12 hours. Sensor not connected to Border Gateway, superconductors are drained or other issues.
Fire Detected: Sensor detected a fire and has sent a Fire alert to the Silvanet Mesh Network.
Planned: The location of the Mesh Gateway has been defined in the Packet but not yet deployed.
Deployed: The Mesh Gateway is deployed but is not yet connected to the Silvanet Cloud.
Active: Mesh Gateway has connected to the Silvanet Cloud and is forwarding messages on from sensors or from other gateways.
Monitor: Mesh Gateway has not sent data to the Silvanet Cloud within the last 6 to 12 hours.
Inactive: Mesh Gateway has not sent data to the Silvanet Cloud for 12 hours.
Planned: The location of the Border Gateway has been defined in the Packet but not yet deployed.
Deployed: The Border Gateway is deployed but not yet connected to the Silvanet Cloud.
Active: Border Gateway has connected to the Silvanet Cloud and is sending/receiving messages from the Silvanet Mesh Network.
Monitor: Border Gateway has not sent data to the Silvanet Cloud within the last 6 to 12 hours.
Inactive: Border Gateway has not sent data to the Silvanet Cloud for 12 hours.
Explore the features of Silvanet Suite: Silvanet Border and Mesh Gateways, Wildfire Sensors and the Silvanet apps.
Learn how to use the Planning tool to plan a deployment of Silvanet devices in a Site.
Learn how to deploy Silvanet Border Gateways, Mesh Gateways and Wildfire Sensors at their planned locations.
Test a Silvanet deployment using a controlled fire to ensure sensors receive fire alerts.
Resources
The Silvanet Cloud Platform captures data received from Silvanet Border Gateways sent via the Silvanet Mesh Network from Wildfire Sensors.
Silvanet devices are connected in a mesh network using LoRaWAN where each device implements LoRa, a low power wireless platform for IoT.
(Gen 2)
The Silvanet Border Gateway provides connectivity via the Internet between the Silvanet Mesh Network and the Silvanet Cloud Platform.
(Gen 2)
Using LoRaWAN, Silvanet Mesh Gateways act as range extenders to allow for widespread deployment of Wildfire Sensors in a linear or irregular areas.
(Gen 2)
Wildfire Sensors monitor the environment to detect the presence of a smoldering fire during its ultra-early stage.
Use the Site Management app to plan and manage deployments of Silvanet devices and to view Wildfire Sensor data.
Use the Deployment app to deploy the planned Silvanet devices and to run Connectivity Tests between Gateways.
If a Wildfire Sensor detects a smoldering fire, it immediately sends fire alerts to notify users.
The Planning tool allows for a rapid and precise coverage estimation of a customer's forest location. The output is a set of Packets for use during Silvanet deployments.
Learn how to use the Planning tool to plan density and locations of Wildfire Sensors, Mesh Gateways and Border Gateways and to ensure Gateway connectivity.
Packets editor allows you to make modifications to Packets prepared by the Planning tool. Packets can be added or deleted as required.
Validate the scalability of the Silvanet System using a Pilot deployment followed by a full-scale Live deployment.
Dryad recommends visiting the Site prior to planning device locations to make notes about the topology and other Site features not visible from an online map.
Guidelines for deploying Border Gateways, Mesh Gateways and Wildfire Sensors
The amount of Mesh Gateways supported by Border Gateways is variable but should not exceed these guidelines.
Ensure Border Gateways and Mesh Gateways are within specified ranges of other Silvanet Gateways.
Plan Border Gateway deployments based on requirements and scenarios to ensure an always-on functionality.
The Border Gateway can be deployed in various scenarios based on power supply, internet connectivity and location.
Carefully plan the location of Mesh Gateway to ensure a reliable Silvanet Mesh Network.
Plan sensor deployments based on Sensor ratios as well as ranges to Mesh Gateways
Plan for variable sensor density based on the level of human activity in or near Sites
When deploying Silvanet devices, first deploy the Border and Mesh Gateways and when connectivity has been verified between the gateways, then deploy the Wildfire Sensors.
Before beginning the deployment of gateways and sensors, ensure you review the preparation guidelines.
Before deploying a Silvanet gateway or sensor, scan the device's QR Code to register its Device ID with the Silvanet Cloud.
Entering a forest requires that you have the correct tools to deploy the gateways and sensors. Ensure you read this topic before entering the forest.
Learn how to deploy the Silvanet Border Gateway to ensure it has connectivity with the Silvanet Cloud.
Learn how to deploy Mesh Gateways to ensure each Mesh Gateway has sufficient energy and can communicate with the Mesh Network.
Learn how to install the Wildfire Sensors using treenails (permanent) or garden wire (temporary).
After deployment, ensure the Wildfire Sensors have been calibrated for 14 after installation before they are ready to detect fires.
Learn how to ensure the fire tests are conducted properly.
A test deployment can include one Border Gateway and up to twenty sensors. Ensure you allow 14 days for sensor calibration.
A suggested test plan for a four week duration.
Carefully follow the steps described in this topic to run test fires.
After obtaining results from the initial round, perform additional tests by modifying only one aspect of the test.
User Management view allows administrators to add new users, delete users and assign user roles.
The Dryad Site Management app defines two types of users: Standard and Admin. Access to features of the Site Management app is dependent on the type of user role.
Admin Users with an Admin role are responsible for team organization. Admins can invite new users, edit user information and independently create new sites.
Standard Users with a Standard role have access to the platform, can use the User Management app to plan and prepare Sites. They can also update their name and contact details. However, they cannot edit other users' details or invite new users.
The following table shows an overview of the roles and rights:
Section | Functionality | Admin User | Standard User |
---|---|---|---|
User role
Use the Search field to search for an existing user.
User role
You must have Admin rights (including Resellers) to add new users.
From the site menu, select User Management, then select Add User. The New User form opens.
Add new user details:
First Name and Last Name.
Email (required): Enter the new user's email address. This becomes the Username.
Phone Number (optional):
Accepts the following separators /
, -
, ( )
and .
Country (required): Select from list of countries.
Client (required): Select a client from the available options. Resellers can select from multiple clients. Standard or Admin users can only select from a Client to which they belong. However, clients can have multiple Sites.
Role (required): Select from the available options. Typically this includes Standard User or Admin.
Select Submit to add the new user.
Dryad (or Reseller) sends an invitation to the email provided in the form to the new user, such as the following:
This is to inform you that an update request for your account has been initiated by the administrator.
We request you to update your Dryad Networks account by performing the following action(s): Update Password. Click on the link below to start this process. Link to account update This link will expire within 3 days.
If you are unaware that your administrator has requested this, just ignore this message and nothing will be changed.
Best Regards, Dryad Support
After selecting the link, the new user enters a new password in the Update password form, then selects Submit.
The new user now has access to the Site Management app.
Forgot Password?
If you have forgot your password, select the Forgot Password? link on the Sign In form. In the form that appears, enter a new password and select Submit.
User role
Users having a Standard role can ONLY update their own profile, except Email address and Permission level.
Users having an Admin role can update profiles of ALL users in an Organization, except a user's Email address.
Select the Edit User icon (Pencil icon) next to a user.
In the Edit User form, make changes as required, then select Submit.
User role
Users with an Admin or Standard role cannot delete a user. Currently, only Dryad can delete a user.
Send a request to Dryad Support to have a user deleted.
Plan Border Gateway deployments based on requirements and scenarios to ensure an always-on functionality.
Border Gateways are designed to be deployed at the edge of the forest and ideally on a permanent structure. It needs to be free from obstructions, provided with mains power and access to Internet connectivity.
For details about the Border Gateway, see in Explore Silvanet.
Always on: As the Border Gateway is considered "always-on", it needs a reliable power supply. Ideally, it should be installed in a location with mains power but its solar panel is sufficient. The device's LTE-M radio (for connecting with mobile networks) uses a reasonable amount of power so ensure it has a sufficient power supply.
Internet connection: It needs a reliable and continuous connection to the Internet, which can be Ethernet, mobile or satellite.
Mesh Gateways within range: Ensure one or more Mesh Gateways are within range of the Border Gateway. See .
Attached to healthy trees or stable poles: When attached to trees, ensure they are healthy and unlikely to be removed. When attached to metal poles, ensure they are to stable and unlikely to be moved or tampered with.
The Border Gateway can be deployed in locations without Ethernet connectivity as it can connect to a mobile network. It also can be deployed in locations without mains power as it can use its solar panel for power supply.
An additional Border Gateway can be added to provide a backup Border Gateway or to provide load balancing.
, , , , and much more.
User management
User overview
✅
✅
Invite new user
✅
❎
Update users details
✅
❎
Sites
Access to Sites menu
✅
✅
Add new sites
✅
❎
Deployment planning
Packet preparation
✅
✅
Deployment
Device installation
✅
✅
Reseller
Full rights. Can add Sites, add users.
✅
❎
Learn how to register the Silvanet Border Gateway before mounting the device on a tree or pole.
Each Silvanet Mesh Gateway has its own unique Device ID (also referred to as Serial ID). It is provided as a unique text string as well as a QR Code printed on a label attached to each Silvanet device. Use the Deployment app to scan the device's QR Code.
After the Mesh Gateway is registered with the Silvanet Cloud, the device's latitude and longitude is provided to the Silvanet Cloud.
Relocating a Mesh Gateway
If a Mesh Gateway has been relocated, update the latitude and longitude of the device in the Device overview section of the Site Management app.
In the Silvanet Deployment app, select a Site.
In the list of devices that appears select a Mesh Gateway. Alternately, select Show Devices on Map.
On the page that appears, tap Register Device. The blue dot on the map shows your current location.
Finding the deployment location
Note in the figure above the Mesh Gateway is 120 m away from the user. Use this map to move towards the deployment location.
If you tapped Show Devices on Map, the map shows an overview of the Site. Your location is indicated by a blue dot.
Once the deployment location is found, scan the device's QR Code which is attached to the back of the Mesh Gateway. The Silvanet Deployment app automatically fills in the Mesh Gateway's location (latitude and longitude) using the Smartphone's GPS location.
QR Code not scannable?
If the QR Code cannot be scanned, manually enter the Device ID which is found as a text string next to the QR Code.
After a few moments, the Registration successful message appears. The device icon changes from Planned to Deployed. For more information, see Status icons.
After a successful registration, you can now mount the Mesh Gateway to a tree or pole.
See also
For details, see Mount Mesh Gateway.
Install sensors using treenails or garden wire, then let them calibrated for 14 days before they are ready to detect fires.
After the Registration successful message appears in the Deployment app. Brief instructions are provided for mounting correctly the Wildfire Sensor.
Tap Confirm.
After you have correctly mounted the Wildfire Sensor (see mounting instructions below) and is fully charged, an Installation successful message appears.
You can dismiss the dialog by tapping Close or you can view the Device Details by tapping Show Device Details.
Treenails are wooden pegs used to securely mount sensors to a tree. As they are made from wood, they do not affect the health of the tree. Over time the tree's moisture causes the treenails to expand which securely attaches the sensor to the tree.
Drill a 10 mm hole into the tree 3 m from the forest floor on the side of the tree where sunlight would strike the tree at 12:00 noon. The treenails are fed through a loop in the sensor and a spacer and then hammered into the tree.
With the help of an assistant, stabilize the ladder against the tree.
Locate the correct height (3 m) and direction (facing sun at 12:00 noon).
Carefully remove a small portion of the bark with an axe at that location. Try not to excessively damage the tree.
Carefully drill a hole approximately 6-7 cm into the tree using the 10mm drill bit. Do not drill deeper than this recommended depth to prevent unnecessary damage to the tree. When drilling into a hardwood tree, start with a smaller drill bit to drill a pilot hole then drill with the 10mm drill bit to complete the drill hole. Ensure you are using a drill bit for wood.
Insert a treenail through the sensor's loop, slip a spacer onto the treenail and then carefully hammer the treenail into the hole. Ensure the treenail is not damaged by the hammering.
Ensure the sensor is securely deployed to the tree and hanging loosely and vertically.
Sensors can be mounted using garden wire for short term installations. Garden wire is typically used in agricultural and garden settings such as greenhouses. This solution should only be used for a limited time as the wire will eventually interfere with growth in the tree's girth.
With the help of an assistant, stabilize the ladder against the tree.
Locate the correct height (3 m) and direction (facing sun at 12:00 noon).
Cut a length of garden wire twice as long than the circumference of the tree.
Insert garden wire through the spacer and sensor as shown below.
Tighten the garden wire around the tree. Ensure it is securely attached and that the sensor cannot slip or move.
Allow the Wildfire Sensor to calibrate for 14 days.
See also
For details, see Sensor Calibration.
Start the connectivity test to ensure the Border Gateway can connect with the Silvanet Cloud.
Use the Deployment app to begin the Connectivity test. This checks if the Border Gateway can connect with the Silvanet Cloud.
The Border Gateway must be registered before the Border Gateway has been mounted. If this step has not been followed, see Register Border Gateway.
After mounting the Border Gateway, tap Confirm & Start Connectivity Test.
The Silvanet Cloud attempts to reach the Border Gateway. A popup dialog appears over the map with a progress indicator. This popup can be minimized.
If the Silvanet Cloud could reach the Border Gateway, a Connectivity Test successful message appears. Tap Show Device Details or Close to dismiss the popup dialog.
If you have tapped Show Device Details, the following screen appears. You can add additional information in the Notes field.
If the Silvanet Cloud could not reach the Border Gateway, troubleshooting information is provided.
If the Border Gateway could not be reached, the following dialog appears.
You can close the dialog and after troubleshooting. Tap the Border Gateway icon from the map to return to this screen.
Check the following to troubleshoot connectivity:
Power supply: Check the power supply. Is the PoE correctly connected to mains power source? Is the solar panel correctly connected to Border Gateway, correctly oriented towards the sun (at noon), and no obstructions in front of the solar panel.
Border Gateway not fully charged: Wait for the Border Gateway to be fully charged. If the device has not had sufficient time to charge its superconductors, wait until it has been fully charged.
Border Gateway has no connection to a mobile network: It is possible the planned location for the Border Gateway does not have connectivity to a mobile network. In this case, the device needs to be relocated to a location where it has connectivity.
After troubleshooting, tap Confirm & Restart Connectivity Test.
If you had closed the dialog, the The Device Details screen appears showing the current status of the Test. Tap the circular arrow to restart the Connectivity Test.
If you have moved the Border Gateway to a new location, tap Reset Device to Current Location. If the Border Gateway is still in the same location, tap Keep Device Original Location.
After restarting the Connectivity Test, the Silvanet Cloud attempts to reach the Border Gateway. If successful, the Connectivity Test successful message appears.
With the Border Gateway now connected to the Silvanet Cloud, Mesh Gateways can now be deployed according to the deployment plan.
Deploy Mesh Gateways
For details, see Deploy Mesh Gateways.
After a Wildfire Sensor has been deployed, the device's requires 14 days to calibrate, to "settle in" to the environment in which it has been deployed.
14 days are required for initial calibration.
After calibration, the Wildfire Sensors are ready to detect fires.
Warning
Before calibration has completed, the Wildfire Sensor does not provide useful data.
See Also
For more information, see .
If the Border Gateway is down due to low power, the entire Silvanet system will be offline. In this case, Mesh Gateways continue to attempt sending data to the Border Gateway but since the Border Gateway is down, the data will be lost.
In this case, a backup Border Gateway is important and should be implemented.
See Also
For more information, see .
The Site Management app is a web-base app which is accessed using .
Accessing the Site Management app requires a user to be registered with Dryad. After registration, a user is provided with login credentials.
After logging in, the user is required to change their password.
See Also
For more information, see in .
The Silvanet Deployment app is downloaded from Google or Apple Store onto a smartphone.
The same credentials used to sign in to the Silvanet Management app are used to sign in to the Silvanet Deployment app.
See Also
For more information, see .