diff --git a/.gitignore b/.gitignore
new file mode 100644
index 0000000000000000000000000000000000000000..2d96ba31563dddd93aad5d1b03d9d8e17d267d84
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1 @@
+*.kate-swp
diff --git a/.vscode/TODO.code-snippets b/.vscode/TODO.code-snippets
new file mode 100644
index 0000000000000000000000000000000000000000..9fef7b395611842ff6260ad75439d6cd8c6992dd
--- /dev/null
+++ b/.vscode/TODO.code-snippets
@@ -0,0 +1,26 @@
+{
+	// Place your mitik-guide workspace snippets here. Each snippet is defined under a snippet name and has a scope, prefix, body and 
+	// description. Add comma separated ids of the languages where the snippet is applicable in the scope field. If scope 
+	// is left empty or omitted, the snippet gets applied to all languages. The prefix is what is 
+	// used to trigger the snippet and the body will be expanded and inserted. Possible variables are: 
+	// $1, $2 for tab stops, $0 for the final cursor position, and ${1:label}, ${2:another} for placeholders. 
+	// Placeholders with the same ids are connected.
+	// Example:
+	// "Print to console": {
+	// 	"scope": "javascript,typescript",
+	// 	"prefix": "log",
+	// 	"body": [
+	// 		"console.log('$1');",
+	// 		"$2"
+	// 	],
+	// 	"description": "Log output to console"
+	// }
+	"TODO": {
+		"scope": "markdown",
+		"prefix": "TODO",
+		"body": [
+			"{- TODO: $1 -} $0"
+		],
+		"description": "A todo highlited in red with diff"
+	}
+}
\ No newline at end of file
diff --git a/.vscode/settings.json b/.vscode/settings.json
new file mode 100644
index 0000000000000000000000000000000000000000..9d14cfb2c108e9f0823938972fa2ac5c6d0ce9d0
--- /dev/null
+++ b/.vscode/settings.json
@@ -0,0 +1,3 @@
+{
+    "ansible.python.interpreterPath": "/bin/python"
+}
\ No newline at end of file
diff --git a/README.md b/README.md
index 8aea806e191e0a49dd0a75cc392563d155446fc5..e654d68e4d0a56db8a304d58c5815f0533cf0b51 100644
--- a/README.md
+++ b/README.md
@@ -27,19 +27,22 @@ Therefore, there is a need to integrate all the current developments into one un
 
 # **MITIK management tool**
 
-This repository contains files and firmware that is used to manage practical experiments of MITIK project in La Rochelle.
-
-Basically this tool enables the management of sniffers through a "sniffer manager".
+MITIK-MGMT is a management tool made to set-up sniffers, synchronize experiments and extract the results.  
 
 ## **Sniffer manager**
 
-The sniffer manager comprises several functions:
+See [DOCUMENTATION.md](./docs/DOCUMENTATION.md) for installation, setup and usage instructions.\
+See [PLAYBOOKS.md](./docs/PLAYBOOKS.md) for information about the available playbooks.
 
-* Provide a tool that enables the configuration of multiple sniffers through organized instructions.
+The sniffer manager comprises several functions:
 
 * Centralized management of multiple sniffers (time synchronization, raw data capture, data transfer, data processing, among others).
 
-* Configuration of parameters and execution of code source of the MITIK project [1], [2].
+* One-step, one-time configuration of passwordless ssh access.
+
+* One-step configuration of multiple sniffers on all leverls: networking, software, gps...
+
+* Configuration of parameters and execution of code source of the MITIK-SENS project [1], [2].
 
 * Integration of functional blocks [4] developed for data capture / data anonymization/sanitization (Phase 1 - Per-technology sniffing engine) [1], handling of collected data (Phase 2 - Trace handling engine) [3], [5], [6], and analysis of human mobility (Phase 3 - Trace production engine), based on data collected from contacts of mobile devices detected by sniffers.
 
@@ -72,14 +75,17 @@ Instructions are defined in Ansible's playbooks used to prepare all instructions
 - [x] Integrate code sources from [1], [5]
 - [x] Make available pcap files to start next steps (Phase 2 - Trace handling engine)
 
-## Test and Deploy
+## Future plans
+
+- [ ] Positioning using GPS (coordinates lat, lon)
+- [ ] gzip compression
+- [ ] Data transfer to manager PC / Mitik server
 
-- [x] Time synchronization
-- [x] Interfaces configuration
-- [x] Sync and positioning using GPS (coordinates lat, lon)
-- [x] Timeout function in Scapy-sniffer
-- [x] gzip compression
-- [x] Data transfer to manager PC / Mitik server
+
+## **Installation**
+
+See [DOCUMENTATION.md](./docs/DOCUMENTATION.md) for installation, setup and usage instructions.\
+See [PLAYBOOKS.md](./docs/PLAYBOOKS.md) for information about the available playbooks.
 
 ***
 
@@ -92,10 +98,6 @@ Figure 3 shows the flowchart for configuring the per-technology sniffing engine.
 </figure>
 </center>
 
-## **Installation**
-
-Check the [installation guide](https://gitlab.inria.fr/fmorlano/mitik_management/-/blob/main/docs/Installation%20manual.md)
-
 ## **References**
 
 [1] Fernando Dias de Mello Silva, Abhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir, Anne Fladenmuller, and Luís Henrique M. K. Costa. Performance analysis of a privacy-preserving frame sniffer on a raspberry pi. In 6th Cyber Security in Networking Conference (CSNet), pages 1–7, October 2022.
diff --git a/ansible/tasks/README.md b/ansible/tasks/README.md
deleted file mode 100644
index d38102ad1cc0ce9135b137f634e3b69d43f32093..0000000000000000000000000000000000000000
--- a/ansible/tasks/README.md
+++ /dev/null
@@ -1,100 +0,0 @@
-# **Sniffers' configuration**
-
-Ansible[^1] involves a common set of concepts and tools for system automation. An inventory to define the hosts and groups of hosts participants that will be operated by the playbooks. Once the inventory has been defined, a set of playbooks have been programmed to perform tasks on the sniffers. The execution of the playbooks depends on the modules available in the Ansible platform. Finally, the system global interpreter is based on Python. 
-
-[^1]: https://www.ansible.com/
-
-The proposed topology is shown in Figure 1. One goal of using Ansible-based automation is to configure all sniffers simultaneously to guarantee that all nodes receive the same configuration, in addition to facilitating the manipulation of each device to be configured.
-
-<center>
-<figure>
-  <img src="https://gitlab.inria.fr/fmorlano/mitik_management/-/raw/main/Figures/mitik_topology.png" width="70%" height="70%" alt="mitik_topology"/>
-  <figcaption>Figure 1. Topology of Mitik project.</figcaption>
-</figure>
-</center>
-
-The sniffers' deployment require two roles to be developed. The first environment has been created to perform the installation and configuration tasks required on the hardware and the O.S.; the second environment executes the tasks necessary to start the sniffer according to the required parameters, in addition to synchronizing the data with the sniffer manager (Mitik laptop) and the Mitik server. Figure 3 shows the scenario to be automated by the Ansible management tool.
-
-<center>
-<figure>
-  <img src="https://gitlab.inria.fr/fmorlano/mitik_management/-/raw/main/Figures/ansible_implementation.png" width="70%" height="70%" alt="ansible_implementation"/>
-  <figcaption>Figure 3. Automating super-sniffers deployment.</figcaption>
-</figure>
-</center>
-
-## **Role 1. Hardware and software requirements**
-
-A modified version of Raspian has been provided by [1], as part of the experiments evaluating the performance of low-level libraries to capture network traffic in the sniffer. However, it is necessary to carry out additional configurations in the sniffer to add new functionalities on it.
-
-## **Sniffer manager**
-
-A sniffer manager is defined in a Mitik laptop (Macbook Pro). All the instructions executed in the sniffers are defined in the sniffer manager. To establish communication with the sniffers, an inventory with specific parameters is defined.Each sniffer is assigned a static IP. Besides that, sniffers are organized in groups (super-sniffers). _inventory_ shows the definition for each sniffer. Four groups (super-sniffers) are defined (ss1 to ss4), and each one contains five sniffers (sniffer#-ss#). 
-
-In addition to the inventory, the sniffer manager sends all the instructions and configurations contained in the playbooks to be executed in each sniffer. 
-
-### **Authentication**
-
-SSH key-based is used as authentication method between the sniffer manager and the sniffers. It is indispensable for the secure exchange information and data between the entities (sniffer manager and sniffers), besides of the execution of specific functions that requires SSH authentication. To enable the SSH Key-based authentication setup between the sniffer manager and the sniffers, _playbook_SSH_Keygen_ generates the public key of each sniffer, and also copy their SSH public keys to the sniffer manager.
-
-### **Sniffer Identification**
-
-Since each sniffer uses the O.S. from [1], _playbook_hostname_ and _playbook_hosts_ to redefine the hostname and local DNS of each sniffer based on the _inventory_ file and the static IP defined there.
-
-### **GPS Synchronization**
-
-Each step described in [README](https://gitlab.inria.fr/fmorlano/mitik_management/-/blob/main/docs/Installation%20manual.md) is executed in _playboork_GPS_sync_. 
-
-### **Wireless Interfaces**
-
-To avoid randomness in the network interface names, the **Predictable network interface names** is disabled, and new udev rules are defined for assigning static interface names for each USB port. 
-```
-#
-# +---------------+
-# | wlan1 | wlan3 |
-# +-------+-------+
-# | wlan2 | wlan4 |
-# +---------------+ (RPI USB ports distribution)
-#
-# | wlan0 | (onboard wifi)
-#
-ACTION=="add", SUBSYSTEM=="net", SUBSYSTEMS=="sdio", ATTR{address}=="<MAC address onboard antenna>", KERNELS=="brcmfmac", NAME="wlan0"
-ACTION=="add", SUBSYSTEM=="net", SUBSYSTEMS=="usb",  KERNELS=="1-1.3",       NAME="wlan1"
-ACTION=="add", SUBSYSTEM=="net", SUBSYSTEMS=="usb",  KERNELS=="1-1.4",       NAME="wlan2"
-ACTION=="add", SUBSYSTEM=="net", SUBSYSTEMS=="usb",  KERNELS=="1-1.1",       NAME="wlan3"
-ACTION=="add", SUBSYSTEM=="net", SUBSYSTEMS=="usb",  KERNELS=="1-1.2",       NAME="wlan4"
-```
-
-It is also defined a wireless network to connect each sniffer to the remote server through wlan0. These parameters are defined in _playbook_NIC_config_. It is worth noting that all wireless interfaces used to sniff must be connected in the same USB port for all sniffers.
-
-## **Role 2. Sniffer parameters**
-
-Unlike the single execution tasks of role 1, the tasks of role 2 can be executed multiple times, as long as they correspond to execution variables of the sniffer script. It is necessary to enter the online parameters to run the sniffer described in [1]. Host variables are defined in _playbook_scapy-sniffer_. Also, a timeout to stop sniffer execution has been added. By last, a job scheduling utility has been added to ensure that network time protocol set by Chrony is up to date for all sniffers. 
-
-To start the sniffers, following parameters must be defined:
-
-- Hour to start the experiment,
-- Minutes to start the experiment,
-- Runtime duration in seconds,
-- Wireless interface (by default, wlan1),
-- Packet capture filter (by default, probe-req, probe-resp, beacon),
-- Channel (by default, system),
-- Hash funtion (by default, MD5),
-- Hash pattern (by default, 15),
-- Folder destination.
-
-The capture filename structure produced by sniffers will have the next format: packet_capture_{sniffer_i-super-sniffer_id}-ts-{timestamp}-ch{channel}-gps{lat/lon}.pcap
-
-On the other hand, each single capture file from the sniffers is sent via SSH connection to the Mitik laptop or Mitik server to be analyzed in the **Trace handling engine** and the **Trace production engine**. The _playbook_data_transfer_ contains the instructions to send the data to the Mitik laptop or Mitik server. 
-
-# ------------------ **TODO** --------------------
-
-Tasks:
-
-- [x] UPLOAD FUNCTIONAL PLAYBOOKS OF THE FIRST TESTBED
-- [x] SPECIFY FEATURES OF EACH PLAYBOOK
-- [x] ORGANIZE FEATURES IN PLAYBOOKS BY TASK TYPE
-- [ ] CREATE MAIN.YML TO EXECUTE ALL THE PLAYBOOKS
-
-## **References**
-
-[1] Fernando Dias de Mello Silva, Abhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir, Anne Fladenmuller, and Lu ́ıs Henrique M. K. Costa. Performance analysis of a privacy-preserving frame sniffer on a raspberry pi. In 6th Cyber Security in Networking Conference (CSNet), pages 1–7, October 2022.
diff --git a/ansible/tasks/playbook_GPS_sync b/ansible/tasks/playbook_GPS_sync
deleted file mode 100644
index e69de29bb2d1d6434b8b29ae775ad8c2e48c5391..0000000000000000000000000000000000000000
diff --git a/ansible/tasks/playbook_GPS_sync.yml b/ansible/tasks/playbook_GPS_sync.yml
deleted file mode 100644
index 6aca59afc8693fa83f4e4ddf3132f52b7a5663d4..0000000000000000000000000000000000000000
--- a/ansible/tasks/playbook_GPS_sync.yml
+++ /dev/null
@@ -1,65 +0,0 @@
-- hosts: sniffers
-  user: gta
-  become: yes
-  become_user: root
-  tasks:
-
-   - name: Timezone config
-     command: sudo timedatectl set-timezone Europe/Paris
-
-   - name: Raspi-config serial_hw
-     command: sudo raspi-config nonint do_serial 2
-
-   - name: gpsd installation       
-     command: sudo apt install gpsd -y
-
-   - name: gpsd-clients installation
-     command: sudo apt install gpsd-clients -y
-
-   - name: pps-tools installation
-     command: sudo apt install pps-tools -y
-
-   - name: systemctl enable gpsd
-     command: sudo systemctl enable gpsd.socket
-
-   - name: Copy a new config gpsd device functionality
-     blockinfile: |
-      dest=/boot/config.txt
-      content="dtoverlay=pps-gpio,gpiopin=18
-       enable_uart=1
-       init_uart_baud=9600"
-
-   - name: Copy a new pps GPIO device in modules
-     blockinfile: |
-      dest=/etc/modules
-      content="pps-gpio"
-
-   - name: gpsd port pointer
-     command: sudo gpsd /dev/ttyS0 -F /var/run/gpsd.sock
-     
-   - name: Copy a new config gpsd device functionality
-     copy:
-      src: /etc/default/gpsd 
-      dest: /etc/default/gpsd
-
-   - name: Reconfigure gpsd
-     command: sudo dpkg-reconfigure gpsd
-
-   - name: Remove IPv6 bind
-     copy:
-      src: /home/pi/ansible/gpsd.socket
-      dest: /lib/systemd/system/gpsd.socket
-
-   - name: ntp uninstall
-     command: sudo apt remove ntp -y
-
-   - name: chrony installation
-     command: sudo apt install chrony -y
-
-   - name: chrony config file GPS time synchronization
-     copy:
-      src: /etc/chrony/chrony.conf
-      dest: /etc/chrony/chrony.conf
-
-   - name: systemctl enable chrony
-     command: sudo systemctl restart chrony
diff --git a/ansible/tasks/playbook_NIC_config.yml b/ansible/tasks/playbook_NIC_config.yml
deleted file mode 100644
index eb885323b3d2f26498d50b41ed13de90735d827f..0000000000000000000000000000000000000000
--- a/ansible/tasks/playbook_NIC_config.yml
+++ /dev/null
@@ -1,13 +0,0 @@
-- hosts: sniffers
-  user: gta
-  become: yes
-  become_user: root
-  tasks:
-
-   - name: Switch off predictable mechanism stuff
-     command: ls -nfs /dev/null /etc/systemd/network/99-default.link
-
-   - name: Copy new rules to identify interfaces based on USB positions
-     copy:
-      src: /etc/udev/rules.d/72-wlan-geo-dependent.rules
-      dest: /etc/udev/rules.d/72-wlan-geo-dependent.rules
diff --git a/ansible/tasks/playbook_SSH_keygen.yml b/ansible/tasks/playbook_SSH_keygen.yml
deleted file mode 100644
index c369424291b146a8c38bb28f7d6317c65cbbd9c9..0000000000000000000000000000000000000000
--- a/ansible/tasks/playbook_SSH_keygen.yml
+++ /dev/null
@@ -1,25 +0,0 @@
-- name: Exchange Keys between servers
-  hosts: sniffers
-  tasks:
-    - name: SSH KeyGen command
-      tags: run
-      shell: > 
-        ssh-keygen -q -b 2048 -t rsa -N "" -C "creating SSH" -f ~/.ssh/id_rsa
-        creates="~/.ssh/id_rsa"
-
-    - name: Fetch the keyfile from the node to master
-      tags: run
-      fetch: 
-        src: "~/.ssh/id_rsa.pub"
-        dest: "buffer/{{ansible_hostname}}-id_rsa.pub"
-        flat: yes
-
-    - name: Copy the key add to authorized_keys using Ansible module
-      tags: runcd
-      authorized_key:
-        user: gta
-        state: present
-        key: "{{ lookup('file','buffer/{{item}}-id_rsa.pub')}}"
-      when: "item != ansible_hostname"
-      with_items: 
-        - "{{ groups['sniffers'] }}"
diff --git a/ansible/tasks/playbook_data_transfer b/ansible/tasks/playbook_data_transfer
deleted file mode 100644
index e8d04303018d7105ec113e1144a61c6ac598d22e..0000000000000000000000000000000000000000
--- a/ansible/tasks/playbook_data_transfer
+++ /dev/null
@@ -1,25 +0,0 @@
-- hosts: sniffers
-  user: gta
-  #become: yes
-  #become_user: root
-
-  vars:
-    src_file: "/home/gta/sniffers/scapy-sniffer/capture-*.pcap"
-    dest_file: "/Users/fmolano/ansible/files/"
-    cap_file: capture-* 
-
-  tasks:
-
-    - name: find files to copy
-      find: 
-        paths: "/home/gta/sniffers/scapy-sniffer/"
-        recurse: no 
-        patterns: "*.pcap"
-      register: files_to_copy
-
-    - name: Copy files
-      fetch: 
-        src: "{{ item.path }}"
-        dest: /Users/fmolano/ansible/files/{{ ansible_hostname }}_{{ ansible_date_time.date }}/
-        flat: yes
-      with_items: "{{ files_to_copy.files }}"
\ No newline at end of file
diff --git a/ansible/tasks/playbook_hostname.yml b/ansible/tasks/playbook_hostname.yml
deleted file mode 100644
index c63110be3cdc335e46b397e3f885982e37cb9ad6..0000000000000000000000000000000000000000
--- a/ansible/tasks/playbook_hostname.yml
+++ /dev/null
@@ -1,4 +0,0 @@
-- hosts: all
-  tasks:
-   - name: set system hostname
-     command: sudo hostnamectl set-hostname {{ inventory_hostname }}
diff --git a/ansible/tasks/playbook_hosts.yml b/ansible/tasks/playbook_hosts.yml
deleted file mode 100644
index 8eacb9e5095b6a1d43b0ac48b2a61a552daf6939..0000000000000000000000000000000000000000
--- a/ansible/tasks/playbook_hosts.yml
+++ /dev/null
@@ -1,18 +0,0 @@
-  - name: host file update - Local DNS setup across all the servers
-    hosts: sniffers
-    gather_facts: yes
-    tasks:
-
-    - name: Update the /etc/hosts file with node name
-      tags: etchostsupdate
-      become: yes
-      become_user: root
-      lineinfile:
-        dest: "/etc/hosts"
-        regexp: ".*\t{{ hostvars[item]['ansible_hostname']}}\t{{ hostvars[item]['ansible_hostname']}}"
-        line: "{{ hostvars[item]['ansible_default_ipv4']['address'] }}\t{{ hostvars[item]['ansible_hostname']}}\t{{ hostvars[item]['ansible_hostname']}}"
-        state: present
-      register: etchostsupdate
-      when: 
-        ansible_hostname !=  "item" or ansible_hostname == "item"
-      with_items: "{{groups['sniffers']}}"
diff --git a/ansible/tasks/playbook_scapy-sniffer_GPS.yml b/ansible/tasks/playbook_scapy-sniffer_GPS.yml
deleted file mode 100644
index c237893a9f911ea838053a6ea7d39dccc3216d73..0000000000000000000000000000000000000000
--- a/ansible/tasks/playbook_scapy-sniffer_GPS.yml
+++ /dev/null
@@ -1,69 +0,0 @@
-- hosts: sniffers
-  user: gta
-  #become: yes
-  #become_user: root
-
-  vars_prompt:
-
-    - name: _file
-      prompt: Enter the folder name to save traces in the sniffer
-      private: no
-
-    - name: _location
-      prompt: Enter the location of the experiments
-      private: no
-
-    - name: _hour
-      prompt: Enter an hour to start the experiment
-      private: no
-
-    - name: _minute
-      prompt: Enter minutes to start the experiment
-      private: no
-
-    - name: _timeout
-      prompt: Please specify the runtime duration in sec
-      private: no
-
-    - name: _interface
-      prompt: Please specify the interface (e.g. wlan0). For default just press enter
-      default: 'wlan1'
-      private: no
-
-    - name: _filter
-      prompt: Please choose the filter to apply to packet capture. For default just press enter
-      default: 'type mgt and (subtype probe-req or subtype probe-resp or subtype beacon)'
-      private: no
-
-    - name: _channel
-      prompt: Please specify the channel (integer between 1-11, default=system). For default just press enter
-      default: 1
-      private: no
-
-    - name: _hash_function
-      prompt: Please specify the hash function (None, MD5, SHA256). For default just press enter
-      default: 'MD5'
-      private: no
-
-    - name: _hash_pattern
-      prompt: Please specify the bitmask for hashing of MAC1, MAC2, MAC3 and SSID (integer between 0-15, default=15). For default just press enter
-      default: 15
-      private: no
-
-  tasks:
-
-    - name: Create Folder
-      file: 
-        path: "{{ _file }}"
-        owner: gta 
-        group: gta 
-        #mode: 0755 
-        state: directory
-
-    - name: start scapy-sniffer
-
-      cron:
-        name: "ansible_scapy-sniffer {{ _hour }} {{ _minute }} {{ _channel }}"
-        minute: "{{ _minute }}"
-        hour: "{{ _hour }}"
-        job: "sudo python3 /home/gta/sniffers/scapy-sniffer/sniffer_GPS.py -F {{ _file }} -L {{ _location }} -i {{ _interface }} -c {{ _channel }} -f {{ _filter }} -e {{ _hash_function}} -p {{ _hash_pattern }} -t {{ _timeout }}"
\ No newline at end of file
diff --git a/config/ansible.cfg b/config/ansible.cfg
new file mode 100644
index 0000000000000000000000000000000000000000..0b363470b2d7bb2d4a150465ee3c9609f69687cc
--- /dev/null
+++ b/config/ansible.cfg
@@ -0,0 +1,696 @@
+[defaults]
+# (boolean) By default, Ansible will issue a warning when received from a task action (module or action plugin).
+# These warnings can be silenced by adjusting this setting to False.
+;action_warnings=True
+
+# (list) Accept a list of cowsay templates that are 'safe' to use, set to an empty list if you want to enable all installed templates.
+;cowsay_enabled_stencils=bud-frogs, bunny, cheese, daemon, default, dragon, elephant-in-snake, elephant, eyes, hellokitty, kitty, luke-koala, meow, milk, moofasa, moose, ren, sheep, small, stegosaurus, stimpy, supermilker, three-eyes, turkey, turtle, tux, udder, vader-koala, vader, www
+
+# (string) Specify a custom cowsay path or swap in your cowsay implementation of choice.
+;cowpath=
+
+# (string) This allows you to choose a specific cowsay stencil for the banners or use 'random' to cycle through them.
+;cow_selection=default
+
+# (boolean) This option forces color mode even when running without a TTY or the "nocolor" setting is True.
+;force_color=False
+
+# (path) The default root path for Ansible config files on the controller.
+;home=~/.ansible
+
+# (boolean) This setting allows suppressing colorizing output, which is used to give a better indication of failure and status information.
+;nocolor=False
+
+# (boolean) If you have cowsay installed but want to avoid the 'cows' (why????), use this.
+;nocows=False
+
+# (boolean) Sets the default value for the any_errors_fatal keyword, if True, Task failures will be considered fatal errors.
+;any_errors_fatal=False
+
+# (path) The password file to use for the become plugin. ``--become-password-file``.
+# If executable, it will be run and the resulting stdout will be used as the password.
+;become_password_file=
+
+# (pathspec) Colon-separated paths in which Ansible will search for Become Plugins.
+;become_plugins=/home/guigui/.ansible/plugins/become:/usr/share/ansible/plugins/become
+
+# (string) Chooses which cache plugin to use, the default 'memory' is ephemeral.
+;fact_caching=memory
+
+# (string) Defines connection or path information for the cache plugin.
+;fact_caching_connection=
+
+# (string) Prefix to use for cache plugin files/tables.
+;fact_caching_prefix=ansible_facts
+
+# (integer) Expiration timeout for the cache plugin data.
+;fact_caching_timeout=86400
+
+# (list) List of enabled callbacks, not all callbacks need enabling, but many of those shipped with Ansible do as we don't want them activated by default.
+;callbacks_enabled=
+
+# (string) When a collection is loaded that does not support the running Ansible version (with the collection metadata key `requires_ansible`).
+;collections_on_ansible_version_mismatch=warning
+
+# (pathspec) Colon-separated paths in which Ansible will search for collections content. Collections must be in nested *subdirectories*, not directly in these directories. For example, if ``COLLECTIONS_PATHS`` includes ``'{{ ANSIBLE_HOME ~ "/collections" }}'``, and you want to add ``my.collection`` to that directory, it must be saved as ``'{{ ANSIBLE_HOME} ~ "/collections/ansible_collections/my/collection" }}'``.
+
+;collections_path=/home/guigui/.ansible/collections:/usr/share/ansible/collections
+
+# (boolean) A boolean to enable or disable scanning the sys.path for installed collections.
+;collections_scan_sys_path=True
+
+# (path) The password file to use for the connection plugin. ``--connection-password-file``.
+;connection_password_file=
+
+# (pathspec) Colon-separated paths in which Ansible will search for Action Plugins.
+;action_plugins=/home/guigui/.ansible/plugins/action:/usr/share/ansible/plugins/action
+
+# (boolean) When enabled, this option allows lookup plugins (whether used in variables as ``{{lookup('foo')}}`` or as a loop as with_foo) to return data that is not marked 'unsafe'.
+# By default, such data is marked as unsafe to prevent the templating engine from evaluating any jinja2 templating language, as this could represent a security risk. This option is provided to allow for backward compatibility, however, users should first consider adding allow_unsafe=True to any lookups that may be expected to contain data that may be run through the templating engine late.
+;allow_unsafe_lookups=False
+
+# (boolean) This controls whether an Ansible playbook should prompt for a login password. If using SSH keys for authentication, you probably do not need to change this setting.
+;ask_pass=False
+
+# (boolean) This controls whether an Ansible playbook should prompt for a vault password.
+;ask_vault_pass=False
+
+# (pathspec) Colon-separated paths in which Ansible will search for Cache Plugins.
+;cache_plugins=/home/guigui/.ansible/plugins/cache:/usr/share/ansible/plugins/cache
+
+# (pathspec) Colon-separated paths in which Ansible will search for Callback Plugins.
+;callback_plugins=/home/guigui/.ansible/plugins/callback:/usr/share/ansible/plugins/callback
+
+# (pathspec) Colon-separated paths in which Ansible will search for Cliconf Plugins.
+;cliconf_plugins=/home/guigui/.ansible/plugins/cliconf:/usr/share/ansible/plugins/cliconf
+
+# (pathspec) Colon-separated paths in which Ansible will search for Connection Plugins.
+;connection_plugins=/home/guigui/.ansible/plugins/connection:/usr/share/ansible/plugins/connection
+
+# (boolean) Toggles debug output in Ansible. This is *very* verbose and can hinder multiprocessing. Debug output can also include secret information despite no_log settings being enabled, which means debug mode should not be used in production.
+;debug=False
+
+# (string) This indicates the command to use to spawn a shell under, which is required for Ansible's execution needs on a target. Users may need to change this in rare instances when shell usage is constrained, but in most cases, it may be left as is.
+;executable=/bin/bash
+
+# (string) This option allows you to globally configure a custom path for 'local_facts' for the implied :ref:`ansible_collections.ansible.builtin.setup_module` task when using fact gathering.
+# If not set, it will fall back to the default from the ``ansible.builtin.setup`` module: ``/etc/ansible/facts.d``.
+# This does **not** affect user defined tasks that use the ``ansible.builtin.setup`` module.
+# The real action being created by the implicit task is currently ``ansible.legacy.gather_facts`` module, which then calls the configured fact modules, by default this will be ``ansible.builtin.setup`` for POSIX systems but other platforms might have different defaults.
+;fact_path=
+
+# (pathspec) Colon-separated paths in which Ansible will search for Jinja2 Filter Plugins.
+;filter_plugins=/home/guigui/.ansible/plugins/filter:/usr/share/ansible/plugins/filter
+
+# (boolean) This option controls if notified handlers run on a host even if a failure occurs on that host.
+# When false, the handlers will not run if a failure has occurred on a host.
+# This can also be set per play or on the command line. See Handlers and Failure for more details.
+;force_handlers=False
+
+# (integer) Maximum number of forks Ansible will use to execute tasks on target hosts.
+;forks=5
+
+# (string) This setting controls the default policy of fact gathering (facts discovered about remote systems).
+# This option can be useful for those wishing to save fact gathering time. Both 'smart' and 'explicit' will use the cache plugin.
+;gathering=implicit
+
+# (list) Set the `gather_subset` option for the :ref:`ansible_collections.ansible.builtin.setup_module` task in the implicit fact gathering. See the module documentation for specifics.
+# It does **not** apply to user defined ``ansible.builtin.setup`` tasks.
+;gather_subset=
+
+# (integer) Set the timeout in seconds for the implicit fact gathering, see the module documentation for specifics.
+# It does **not** apply to user defined :ref:`ansible_collections.ansible.builtin.setup_module` tasks.
+;gather_timeout=
+
+# (string) This setting controls how duplicate definitions of dictionary variables (aka hash, map, associative array) are handled in Ansible.
+# This does not affect variables whose values are scalars (integers, strings) or arrays.
+# **WARNING**, changing this setting is not recommended as this is fragile and makes your content (plays, roles, collections) nonportable, leading to continual confusion and misuse. Don't change this setting unless you think you have an absolute need for it.
+# We recommend avoiding reusing variable names and relying on the ``combine`` filter and ``vars`` and ``varnames`` lookups to create merged versions of the individual variables. In our experience, this is rarely needed and is a sign that too much complexity has been introduced into the data structures and plays.
+# For some uses you can also look into custom vars_plugins to merge on input, even substituting the default ``host_group_vars`` that is in charge of parsing the ``host_vars/`` and ``group_vars/`` directories. Most users of this setting are only interested in inventory scope, but the setting itself affects all sources and makes debugging even harder.
+# All playbooks and roles in the official examples repos assume the default for this setting.
+# Changing the setting to ``merge`` applies across variable sources, but many sources will internally still overwrite the variables. For example ``include_vars`` will dedupe variables internally before updating Ansible, with 'last defined' overwriting previous definitions in same file.
+# The Ansible project recommends you **avoid ``merge`` for new projects.**
+# It is the intention of the Ansible developers to eventually deprecate and remove this setting, but it is being kept as some users do heavily rely on it. New projects should **avoid 'merge'**.
+;hash_behaviour=replace
+
+# (pathlist) Comma-separated list of Ansible inventory sources
+inventory=./inventory
+
+# (pathspec) Colon-separated paths in which Ansible will search for HttpApi Plugins.
+;httpapi_plugins=/home/guigui/.ansible/plugins/httpapi:/usr/share/ansible/plugins/httpapi
+
+# (float) This sets the interval (in seconds) of Ansible internal processes polling each other. Lower values improve performance with large playbooks at the expense of extra CPU load. Higher values are more suitable for Ansible usage in automation scenarios when UI responsiveness is not required but CPU usage might be a concern.
+# The default corresponds to the value hardcoded in Ansible <= 2.1
+;internal_poll_interval=0.001
+
+# (pathspec) Colon-separated paths in which Ansible will search for Inventory Plugins.
+;inventory_plugins=/home/guigui/.ansible/plugins/inventory:/usr/share/ansible/plugins/inventory
+
+# (string) This is a developer-specific feature that allows enabling additional Jinja2 extensions.
+# See the Jinja2 documentation for details. If you do not know what these do, you probably don't need to change this setting :)
+;jinja2_extensions=[]
+
+# (boolean) This option preserves variable types during template operations.
+;jinja2_native=False
+
+# (boolean) Enables/disables the cleaning up of the temporary files Ansible used to execute the tasks on the remote.
+# If this option is enabled it will disable ``ANSIBLE_PIPELINING``.
+;keep_remote_files=False
+
+# (boolean) Controls whether callback plugins are loaded when running /usr/bin/ansible. This may be used to log activity from the command line, send notifications, and so on. Callback plugins are always loaded for ``ansible-playbook``.
+;bin_ansible_callbacks=False
+
+# (tmppath) Temporary directory for Ansible to use on the controller.
+;local_tmp=/home/guigui/.ansible/tmp
+
+# (list) List of logger names to filter out of the log file.
+;log_filter=
+
+# (path) File to which Ansible will log on the controller. When empty logging is disabled.
+;log_path=
+
+# (pathspec) Colon-separated paths in which Ansible will search for Lookup Plugins.
+;lookup_plugins=/home/guigui/.ansible/plugins/lookup:/usr/share/ansible/plugins/lookup
+
+# (string) Sets the macro for the 'ansible_managed' variable available for :ref:`ansible_collections.ansible.builtin.template_module` and :ref:`ansible_collections.ansible.windows.win_template_module`.  This is only relevant to those two modules.
+;ansible_managed=Ansible managed
+
+# (string) This sets the default arguments to pass to the ``ansible`` adhoc binary if no ``-a`` is specified.
+;module_args=
+
+# (string) Compression scheme to use when transferring Python modules to the target.
+;module_compression=ZIP_DEFLATED
+
+# (string) Module to use with the ``ansible`` AdHoc command, if none is specified via ``-m``.
+;module_name=command
+
+# (pathspec) Colon-separated paths in which Ansible will search for Modules.
+;library=/home/guigui/.ansible/plugins/modules:/usr/share/ansible/plugins/modules
+
+# (pathspec) Colon-separated paths in which Ansible will search for Module utils files, which are shared by modules.
+;module_utils=/home/guigui/.ansible/plugins/module_utils:/usr/share/ansible/plugins/module_utils
+
+# (pathspec) Colon-separated paths in which Ansible will search for Netconf Plugins.
+;netconf_plugins=/home/guigui/.ansible/plugins/netconf:/usr/share/ansible/plugins/netconf
+
+# (boolean) Toggle Ansible's display and logging of task details, mainly used to avoid security disclosures.
+;no_log=False
+
+# (boolean) Toggle Ansible logging to syslog on the target when it executes tasks. On Windows hosts, this will disable a newer style PowerShell modules from writing to the event log.
+;no_target_syslog=False
+
+# (raw) What templating should return as a 'null' value. When not set it will let Jinja2 decide.
+;null_representation=
+
+# (integer) For asynchronous tasks in Ansible (covered in Asynchronous Actions and Polling), this is how often to check back on the status of those tasks when an explicit poll interval is not supplied. The default is a reasonably moderate 15 seconds which is a tradeoff between checking in frequently and providing a quick turnaround when something may have completed.
+;poll_interval=15
+
+# (path) Option for connections using a certificate or key file to authenticate, rather than an agent or passwords, you can set the default value here to avoid re-specifying ``--private-key`` with every invocation.
+;private_key_file=
+
+# (boolean) By default, imported roles publish their variables to the play and other roles, this setting can avoid that.
+# This was introduced as a way to reset role variables to default values if a role is used more than once in a playbook.
+# Starting in version '2.17' M(ansible.builtin.include_roles) and M(ansible.builtin.import_roles) can indivudually override this via the C(public) parameter.
+# Included roles only make their variables public at execution, unlike imported roles which happen at playbook compile time.
+;private_role_vars=False
+
+# (integer) Port to use in remote connections, when blank it will use the connection plugin default.
+;remote_port=
+
+# (string) Sets the login user for the target machines
+# When blank it uses the connection plugin's default, normally the user currently executing Ansible.
+;remote_user=
+
+# (pathspec) Colon-separated paths in which Ansible will search for Roles.
+;roles_path=/home/guigui/.ansible/roles:/usr/share/ansible/roles:/etc/ansible/roles
+
+# (string) Set the main callback used to display Ansible output. You can only have one at a time.
+# You can have many other callbacks, but just one can be in charge of stdout.
+# See :ref:`callback_plugins` for a list of available options.
+;stdout_callback=default
+
+# (string) Set the default strategy used for plays.
+;strategy=linear
+
+# (pathspec) Colon-separated paths in which Ansible will search for Strategy Plugins.
+;strategy_plugins=/home/guigui/.ansible/plugins/strategy:/usr/share/ansible/plugins/strategy
+
+# (boolean) Toggle the use of "su" for tasks.
+;su=False
+
+# (string) Syslog facility to use when Ansible logs to the remote target.
+;syslog_facility=LOG_USER
+
+# (pathspec) Colon-separated paths in which Ansible will search for Terminal Plugins.
+;terminal_plugins=/home/guigui/.ansible/plugins/terminal:/usr/share/ansible/plugins/terminal
+
+# (pathspec) Colon-separated paths in which Ansible will search for Jinja2 Test Plugins.
+;test_plugins=/home/guigui/.ansible/plugins/test:/usr/share/ansible/plugins/test
+
+# (integer) This is the default timeout for connection plugins to use.
+;timeout=10
+
+# (string) Can be any connection plugin available to your ansible installation.
+# There is also a (DEPRECATED) special 'smart' option, that will toggle between 'ssh' and 'paramiko' depending on controller OS and ssh versions.
+;transport=ssh
+
+# (boolean) When True, this causes ansible templating to fail steps that reference variable names that are likely typoed.
+# Otherwise, any '{{ template_expression }}' that contains undefined variables will be rendered in a template or ansible action line exactly as written.
+;error_on_undefined_vars=True
+
+# (pathspec) Colon-separated paths in which Ansible will search for Vars Plugins.
+;vars_plugins=/home/guigui/.ansible/plugins/vars:/usr/share/ansible/plugins/vars
+
+# (string) The vault_id to use for encrypting by default. If multiple vault_ids are provided, this specifies which to use for encryption. The ``--encrypt-vault-id`` CLI option overrides the configured value.
+;vault_encrypt_identity=
+
+# (string) The label to use for the default vault id label in cases where a vault id label is not provided.
+;vault_identity=default
+
+# (list) A list of vault-ids to use by default. Equivalent to multiple ``--vault-id`` args. Vault-ids are tried in order.
+;vault_identity_list=
+
+# (string) If true, decrypting vaults with a vault id will only try the password from the matching vault-id.
+;vault_id_match=False
+
+# (path) The vault password file to use. Equivalent to ``--vault-password-file`` or ``--vault-id``.
+# If executable, it will be run and the resulting stdout will be used as the password.
+;vault_password_file=
+
+# (integer) Sets the default verbosity, equivalent to the number of ``-v`` passed in the command line.
+;verbosity=0
+
+# (boolean) Toggle to control the showing of deprecation warnings
+;deprecation_warnings=True
+
+# (boolean) Toggle to control showing warnings related to running devel.
+;devel_warning=True
+
+# (boolean) Normally ``ansible-playbook`` will print a header for each task that is run. These headers will contain the name: field from the task if you specified one. If you didn't then ``ansible-playbook`` uses the task's action to help you tell which task is presently running. Sometimes you run many of the same action and so you want more information about the task to differentiate it from others of the same action. If you set this variable to True in the config then ``ansible-playbook`` will also include the task's arguments in the header.
+# This setting defaults to False because there is a chance that you have sensitive values in your parameters and you do not want those to be printed.
+# If you set this to True you should be sure that you have secured your environment's stdout (no one can shoulder surf your screen and you aren't saving stdout to an insecure file) or made sure that all of your playbooks explicitly added the ``no_log: True`` parameter to tasks that have sensitive values :ref:`keep_secret_data` for more information.
+;display_args_to_stdout=False
+
+# (boolean) Toggle to control displaying skipped task/host entries in a task in the default callback.
+;display_skipped_hosts=True
+
+# (string) Root docsite URL used to generate docs URLs in warning/error text; must be an absolute URL with a valid scheme and trailing slash.
+;docsite_root_url=https://docs.ansible.com/ansible-core/
+
+# (pathspec) Colon-separated paths in which Ansible will search for Documentation Fragments Plugins.
+;doc_fragment_plugins=/home/guigui/.ansible/plugins/doc_fragments:/usr/share/ansible/plugins/doc_fragments
+
+# (string) By default, Ansible will issue a warning when a duplicate dict key is encountered in YAML.
+# These warnings can be silenced by adjusting this setting to False.
+;duplicate_dict_key=warn
+
+# (boolean) Whether or not to enable the task debugger, this previously was done as a strategy plugin.
+# Now all strategy plugins can inherit this behavior. The debugger defaults to activating when
+# a task is failed on unreachable. Use the debugger keyword for more flexibility.
+;enable_task_debugger=False
+
+# (boolean) Toggle to allow missing handlers to become a warning instead of an error when notifying.
+;error_on_missing_handler=True
+
+# (list) Which modules to run during a play's fact gathering stage, using the default of 'smart' will try to figure it out based on connection type.
+# If adding your own modules but you still want to use the default Ansible facts, you will want to include 'setup' or corresponding network module to the list (if you add 'smart', Ansible will also figure it out).
+# This does not affect explicit calls to the 'setup' module, but does always affect the 'gather_facts' action (implicit or explicit).
+;facts_modules=smart
+
+# (boolean) Set this to "False" if you want to avoid host key checking by the underlying connection plugin Ansible uses to connect to the host.
+# Please read the documentation of the specific connection plugin used for details.
+;host_key_checking=True
+
+# (boolean) Facts are available inside the `ansible_facts` variable, this setting also pushes them as their own vars in the main namespace.
+# Unlike inside the `ansible_facts` dictionary where the prefix `ansible_` is removed from fact names, these will have the exact names that are returned by the module.
+;inject_facts_as_vars=True
+
+# (string) Path to the Python interpreter to be used for module execution on remote targets, or an automatic discovery mode. Supported discovery modes are ``auto`` (the default), ``auto_silent``, ``auto_legacy``, and ``auto_legacy_silent``. All discovery modes employ a lookup table to use the included system Python (on distributions known to include one), falling back to a fixed ordered list of well-known Python interpreter locations if a platform-specific default is not available. The fallback behavior will issue a warning that the interpreter should be set explicitly (since interpreters installed later may change which one is used). This warning behavior can be disabled by setting ``auto_silent`` or ``auto_legacy_silent``. The value of ``auto_legacy`` provides all the same behavior, but for backward-compatibility with older Ansible releases that always defaulted to ``/usr/bin/python``, will use that interpreter if present.
+;interpreter_python=/usr/bin/python3.11
+
+# (boolean) If 'false', invalid attributes for a task will result in warnings instead of errors.
+;invalid_task_attribute_failed=True
+
+# (boolean) By default, Ansible will issue a warning when there are no hosts in the inventory.
+# These warnings can be silenced by adjusting this setting to False.
+;localhost_warning=True
+
+# (int) This will set log verbosity if higher than the normal display verbosity, otherwise it will match that.
+;log_verbosity=
+
+# (int) Maximum size of files to be considered for diff display.
+;max_diff_size=104448
+
+# (list) List of extensions to ignore when looking for modules to load.
+# This is for rejecting script and binary module fallback extensions.
+;module_ignore_exts=.pyc, .pyo, .swp, .bak, ~, .rpm, .md, .txt, .rst, .yaml, .yml, .ini
+
+# (bool) Enables whether module responses are evaluated for containing non-UTF-8 data.
+# Disabling this may result in unexpected behavior.
+# Only ansible-core should evaluate this configuration.
+;module_strict_utf8_response=True
+
+# (list) TODO: write it
+;network_group_modules=eos, nxos, ios, iosxr, junos, enos, ce, vyos, sros, dellos9, dellos10, dellos6, asa, aruba, aireos, bigip, ironware, onyx, netconf, exos, voss, slxos
+
+# (boolean) Previously Ansible would only clear some of the plugin loading caches when loading new roles, this led to some behaviors in which a plugin loaded in previous plays would be unexpectedly 'sticky'. This setting allows the user to return to that behavior.
+;old_plugin_cache_clear=False
+
+# (path) A number of non-playbook CLIs have a ``--playbook-dir`` argument; this sets the default value for it.
+;playbook_dir=
+
+# (string) This sets which playbook dirs will be used as a root to process vars plugins, which includes finding host_vars/group_vars.
+;playbook_vars_root=top
+
+# (path) A path to configuration for filtering which plugins installed on the system are allowed to be used.
+# See :ref:`plugin_filtering_config` for details of the filter file's format.
+#  The default is /etc/ansible/plugin_filters.yml
+;plugin_filters_cfg=
+
+# (string) Attempts to set RLIMIT_NOFILE soft limit to the specified value when executing Python modules (can speed up subprocess usage on Python 2.x. See https://bugs.python.org/issue11284). The value will be limited by the existing hard limit. Default value of 0 does not attempt to adjust existing system-defined limits.
+;python_module_rlimit_nofile=0
+
+# (bool) This controls whether a failed Ansible playbook should create a .retry file.
+;retry_files_enabled=False
+
+# (path) This sets the path in which Ansible will save .retry files when a playbook fails and retry files are enabled.
+# This file will be overwritten after each run with the list of failed hosts from all plays.
+;retry_files_save_path=
+
+# (str) This setting can be used to optimize vars_plugin usage depending on the user's inventory size and play selection.
+;run_vars_plugins=demand
+
+# (bool) This adds the custom stats set via the set_stats plugin to the default output.
+;show_custom_stats=False
+
+# (string) Action to take when a module parameter value is converted to a string (this does not affect variables). For string parameters, values such as '1.00', "['a', 'b',]", and 'yes', 'y', etc. will be converted by the YAML parser unless fully quoted.
+# Valid options are 'error', 'warn', and 'ignore'.
+# Since 2.8, this option defaults to 'warn' but will change to 'error' in 2.12.
+;string_conversion_action=warn
+
+# (boolean) Allows disabling of warnings related to potential issues on the system running Ansible itself (not on the managed hosts).
+# These may include warnings about third-party packages or other conditions that should be resolved if possible.
+;system_warnings=True
+
+# (string) A string to insert into target logging for tracking purposes
+;target_log_info=
+
+# (boolean) This option defines whether the task debugger will be invoked on a failed task when ignore_errors=True is specified.
+# True specifies that the debugger will honor ignore_errors, and False will not honor ignore_errors.
+;task_debugger_ignore_errors=True
+
+# (integer) Set the maximum time (in seconds) that a task can run for.
+# If set to 0 (the default) there is no timeout.
+;task_timeout=0
+
+# (string) Make ansible transform invalid characters in group names supplied by inventory sources.
+;force_valid_group_names=never
+
+# (boolean) Toggles the use of persistence for connections.
+;use_persistent_connections=False
+
+# (bool) A toggle to disable validating a collection's 'metadata' entry for a module_defaults action group. Metadata containing unexpected fields or value types will produce a warning when this is True.
+;validate_action_group_metadata=True
+
+# (list) Accept list for variable plugins that require it.
+;vars_plugins_enabled=host_group_vars
+
+# (list) Allows to change the group variable precedence merge order.
+;precedence=all_inventory, groups_inventory, all_plugins_inventory, all_plugins_play, groups_plugins_inventory, groups_plugins_play
+
+# (string) The salt to use for the vault encryption. If it is not provided, a random salt will be used.
+;vault_encrypt_salt=
+
+# (bool) Force 'verbose' option to use stderr instead of stdout
+;verbose_to_stderr=False
+
+# (integer) For asynchronous tasks in Ansible (covered in Asynchronous Actions and Polling), this is how long, in seconds, to wait for the task spawned by Ansible to connect back to the named pipe used on Windows systems. The default is 5 seconds. This can be too low on slower systems, or systems under heavy load.
+# This is not the total time an async command can run for, but is a separate timeout to wait for an async command to start. The task will only start to be timed against its async_timeout once it has connected to the pipe, so the overall maximum duration the task can take will be extended by the amount specified here.
+;win_async_startup_timeout=5
+
+# (list) Check all of these extensions when looking for 'variable' files which should be YAML or JSON or vaulted versions of these.
+# This affects vars_files, include_vars, inventory and vars plugins among others.
+;yaml_valid_extensions=.yml, .yaml, .json
+
+
+[privilege_escalation]
+# (boolean) Display an agnostic become prompt instead of displaying a prompt containing the command line supplied become method.
+;agnostic_become_prompt=True
+
+# (boolean) When ``False``(default), Ansible will skip using become if the remote user is the same as the become user, as this is normally a redundant operation. In other words root sudo to root.
+# If ``True``, this forces Ansible to use the become plugin anyways as there are cases in which this is needed.
+;become_allow_same_user=False
+
+# (boolean) Toggles the use of privilege escalation, allowing you to 'become' another user after login.
+;become=False
+
+# (boolean) Toggle to prompt for privilege escalation password.
+;become_ask_pass=False
+
+# (string) executable to use for privilege escalation, otherwise Ansible will depend on PATH.
+;become_exe=
+
+# (string) Flags to pass to the privilege escalation executable.
+;become_flags=
+
+# (string) Privilege escalation method to use when `become` is enabled.
+;become_method=sudo
+
+# (string) The user your login/remote user 'becomes' when using privilege escalation, most systems will use 'root' when no user is specified.
+;become_user=root
+
+
+[persistent_connection]
+# (path) Specify where to look for the ansible-connection script. This location will be checked before searching $PATH.
+# If null, ansible will start with the same directory as the ansible script.
+;ansible_connection_path=
+
+# (int) This controls the amount of time to wait for a response from a remote device before timing out a persistent connection.
+;command_timeout=30
+
+# (integer) This controls the retry timeout for persistent connection to connect to the local domain socket.
+;connect_retry_timeout=15
+
+# (integer) This controls how long the persistent connection will remain idle before it is destroyed.
+;connect_timeout=30
+
+# (path) Path to the socket to be used by the connection persistence system.
+;control_path_dir=/home/guigui/.ansible/pc
+
+
+[connection]
+# (boolean) This is a global option, each connection plugin can override either by having more specific options or not supporting pipelining at all.
+# Pipelining, if supported by the connection plugin, reduces the number of network operations required to execute a module on the remote server, by executing many Ansible modules without actual file transfer.
+# It can result in a very significant performance improvement when enabled.
+# However this conflicts with privilege escalation (become). For example, when using 'sudo:' operations you must first disable 'requiretty' in /etc/sudoers on all managed hosts, which is why it is disabled by default.
+# This setting will be disabled if ``ANSIBLE_KEEP_REMOTE_FILES`` is enabled.
+;pipelining=False
+
+
+[colors]
+# (string) Defines the color to use on 'Changed' task status.
+;changed=yellow
+
+# (string) Defines the default color to use for ansible-console.
+;console_prompt=white
+
+# (string) Defines the color to use when emitting debug messages.
+;debug=dark gray
+
+# (string) Defines the color to use when emitting deprecation messages.
+;deprecate=purple
+
+# (string) Defines the color to use when showing added lines in diffs.
+;diff_add=green
+
+# (string) Defines the color to use when showing diffs.
+;diff_lines=cyan
+
+# (string) Defines the color to use when showing removed lines in diffs.
+;diff_remove=red
+
+# (string) Defines the color to use when emitting error messages.
+;error=red
+
+# (string) Defines the color to use for highlighting.
+;highlight=white
+
+# (string) Defines the color to use when showing 'OK' task status.
+;ok=green
+
+# (string) Defines the color to use when showing 'Skipped' task status.
+;skip=cyan
+
+# (string) Defines the color to use on 'Unreachable' status.
+;unreachable=bright red
+
+# (string) Defines the color to use when emitting verbose messages. In other words, those that show with '-v's.
+;verbose=blue
+
+# (string) Defines the color to use when emitting warning messages.
+;warn=bright purple
+
+
+[selinux]
+# (boolean) This setting causes libvirt to connect to LXC containers by passing ``--noseclabel`` parameter to ``virsh`` command. This is necessary when running on systems which do not have SELinux.
+;libvirt_lxc_noseclabel=False
+
+# (list) Some filesystems do not support safe operations and/or return inconsistent errors, this setting makes Ansible 'tolerate' those in the list without causing fatal errors.
+# Data corruption may occur and writes are not always verified when a filesystem is in the list.
+;special_context_filesystems=fuse, nfs, vboxsf, ramfs, 9p, vfat
+
+
+[diff]
+# (bool) Configuration toggle to tell modules to show differences when in 'changed' status, equivalent to ``--diff``.
+;always=False
+
+# (integer) Number of lines of context to show when displaying the differences between files.
+;context=3
+
+
+[galaxy]
+# (path) The directory that stores cached responses from a Galaxy server.
+# This is only used by the ``ansible-galaxy collection install`` and ``download`` commands.
+# Cache files inside this dir will be ignored if they are world writable.
+;cache_dir=/home/guigui/.ansible/galaxy_cache
+
+# (bool) whether ``ansible-galaxy collection install`` should warn about ``--collections-path`` missing from configured :ref:`collections_paths`.
+;collections_path_warning=True
+
+# (path) Collection skeleton directory to use as a template for the ``init`` action in ``ansible-galaxy collection``, same as ``--collection-skeleton``.
+;collection_skeleton=
+
+# (list) patterns of files to ignore inside a Galaxy collection skeleton directory.
+;collection_skeleton_ignore=^.git$, ^.*/.git_keep$
+
+# (bool) Disable GPG signature verification during collection installation.
+;disable_gpg_verify=False
+
+# (bool) Some steps in ``ansible-galaxy`` display a progress wheel which can cause issues on certain displays or when outputting the stdout to a file.
+# This config option controls whether the display wheel is shown or not.
+# The default is to show the display wheel if stdout has a tty.
+;display_progress=
+
+# (path) Configure the keyring used for GPG signature verification during collection installation and verification.
+;gpg_keyring=
+
+# (boolean) If set to yes, ansible-galaxy will not validate TLS certificates. This can be useful for testing against a server with a self-signed certificate.
+;ignore_certs=
+
+# (list) A list of GPG status codes to ignore during GPG signature verification. See L(https://github.com/gpg/gnupg/blob/master/doc/DETAILS#general-status-codes) for status code descriptions.
+# If fewer signatures successfully verify the collection than `GALAXY_REQUIRED_VALID_SIGNATURE_COUNT`, signature verification will fail even if all error codes are ignored.
+;ignore_signature_status_codes=
+
+# (str) The number of signatures that must be successful during GPG signature verification while installing or verifying collections.
+# This should be a positive integer or all to indicate all signatures must successfully validate the collection.
+# Prepend + to the value to fail if no valid signatures are found for the collection.
+;required_valid_signature_count=1
+
+# (path) Role skeleton directory to use as a template for the ``init`` action in ``ansible-galaxy``/``ansible-galaxy role``, same as ``--role-skeleton``.
+;role_skeleton=
+
+# (list) patterns of files to ignore inside a Galaxy role or collection skeleton directory.
+;role_skeleton_ignore=^.git$, ^.*/.git_keep$
+
+# (string) URL to prepend when roles don't specify the full URI, assume they are referencing this server as the source.
+;server=https://galaxy.ansible.com
+
+# (list) A list of Galaxy servers to use when installing a collection.
+# The value corresponds to the config ini header ``[galaxy_server.{{item}}]`` which defines the server details.
+# See :ref:`galaxy_server_config` for more details on how to define a Galaxy server.
+# The order of servers in this list is used as the order in which a collection is resolved.
+# Setting this config option will ignore the :ref:`galaxy_server` config option.
+;server_list=
+
+# (int) The default timeout for Galaxy API calls. Galaxy servers that don't configure a specific timeout will fall back to this value.
+;server_timeout=60
+
+# (path) Local path to galaxy access token file
+;token_path=/home/guigui/.ansible/galaxy_token
+
+
+[inventory]
+# (string) This setting changes the behaviour of mismatched host patterns, it allows you to force a fatal error, a warning or just ignore it.
+;host_pattern_mismatch=warning
+
+# (boolean) If 'true', it is a fatal error when any given inventory source cannot be successfully parsed by any available inventory plugin; otherwise, this situation only attracts a warning.
+
+;any_unparsed_is_failed=False
+
+# (bool) Toggle to turn on inventory caching.
+# This setting has been moved to the individual inventory plugins as a plugin option :ref:`inventory_plugins`.
+# The existing configuration settings are still accepted with the inventory plugin adding additional options from inventory configuration.
+# This message will be removed in 2.16.
+;cache=False
+
+# (string) The plugin for caching inventory.
+# This setting has been moved to the individual inventory plugins as a plugin option :ref:`inventory_plugins`.
+# The existing configuration settings are still accepted with the inventory plugin adding additional options from inventory and fact cache configuration.
+# This message will be removed in 2.16.
+;cache_plugin=
+
+# (string) The inventory cache connection.
+# This setting has been moved to the individual inventory plugins as a plugin option :ref:`inventory_plugins`.
+# The existing configuration settings are still accepted with the inventory plugin adding additional options from inventory and fact cache configuration.
+# This message will be removed in 2.16.
+;cache_connection=
+
+# (string) The table prefix for the cache plugin.
+# This setting has been moved to the individual inventory plugins as a plugin option :ref:`inventory_plugins`.
+# The existing configuration settings are still accepted with the inventory plugin adding additional options from inventory and fact cache configuration.
+# This message will be removed in 2.16.
+;cache_prefix=ansible_inventory_
+
+# (string) Expiration timeout for the inventory cache plugin data.
+# This setting has been moved to the individual inventory plugins as a plugin option :ref:`inventory_plugins`.
+# The existing configuration settings are still accepted with the inventory plugin adding additional options from inventory and fact cache configuration.
+# This message will be removed in 2.16.
+;cache_timeout=3600
+
+# (list) List of enabled inventory plugins, it also determines the order in which they are used.
+;enable_plugins=host_list, script, auto, yaml, ini, toml
+
+# (bool) Controls if ansible-inventory will accurately reflect Ansible's view into inventory or its optimized for exporting.
+;export=False
+
+# (list) List of extensions to ignore when using a directory as an inventory source.
+;ignore_extensions=.pyc, .pyo, .swp, .bak, ~, .rpm, .md, .txt, .rst, .orig, .ini, .cfg, .retry
+
+# (list) List of patterns to ignore when using a directory as an inventory source.
+;ignore_patterns=
+
+# (bool) If 'true' it is a fatal error if every single potential inventory source fails to parse, otherwise, this situation will only attract a warning.
+
+;unparsed_is_failed=False
+
+# (boolean) By default, Ansible will issue a warning when no inventory was loaded and notes that it will use an implicit localhost-only inventory.
+# These warnings can be silenced by adjusting this setting to False.
+;inventory_unparsed_warning=True
+
+
+[netconf_connection]
+# (string) This variable is used to enable bastion/jump host with netconf connection. If set to True the bastion/jump host ssh settings should be present in ~/.ssh/config file, alternatively it can be set to custom ssh configuration file path to read the bastion/jump host settings.
+;ssh_config=
+
+
+[paramiko_connection]
+# (boolean) TODO: write it
+;host_key_auto_add=False
+
+# (boolean) TODO: write it
+;look_for_keys=True
+
+
+[jinja2]
+# (list) This list of filters avoids 'type conversion' when templating variables.
+# Useful when you want to avoid conversion into lists or dictionaries for JSON strings, for example.
+;dont_type_filters=string, to_json, to_nice_json, to_yaml, to_nice_yaml, ppretty, json
+
+
+[tags]
+# (list) default list of tags to run in your plays, Skip Tags has precedence.
+;run=
+
+# (list) default list of tags to skip in your plays, has precedence over Run Tags
+;skip=
+
diff --git a/config/broadcast.yml b/config/broadcast.yml
new file mode 100644
index 0000000000000000000000000000000000000000..4b2fb6a2897647512c3b82912118c47b82379b65
--- /dev/null
+++ b/config/broadcast.yml
@@ -0,0 +1,9 @@
+# /etc/ansible/broadcast.yml
+---
+- name: Echoed stuff
+  hosts: ss1
+  become: true
+
+  tasks:
+    - name: say things to tty1
+      ansible.builtin.shell: echo {{ inventory_hostname }} | sudo tee /dev/tty1 && /bin/true
diff --git a/config/inventory b/config/inventory
new file mode 100644
index 0000000000000000000000000000000000000000..c4e50cf956c32822dd57903ea8f68727ee92a3d9
--- /dev/null
+++ b/config/inventory
@@ -0,0 +1,25 @@
+[sniffers:children]
+ss1
+ss2
+
+
+[ss1]
+; ss1-s6-whyred ansible_host=192.168.145.56
+; ss1-s1 ansible_host=192.168.1.184 ansible_ssh_user=user
+; ss1-s2 ansible_host=192.168.1.231
+; ss1-s3 ansible_host=192.168.1.239
+; ss1-s4 ansible_host=192.168.1.100
+
+[ss2]
+ss2-s6 ansible_host=192.168.1.244
+; ss2-s5 ansible_host=192.168.1.100
+
+# rp4  ansible_host=192.168.1.248
+
+
+
+[all:vars]
+ansible_connection=ssh
+ansible_ssh_user=tribe
+ansible_python_interpreter=/usr/bin/python3
+ansible_executable=/bin/bash
diff --git a/config/test.yml b/config/test.yml
new file mode 100644
index 0000000000000000000000000000000000000000..61ca897daed96385730754d3bb427b683bb3b6da
--- /dev/null
+++ b/config/test.yml
@@ -0,0 +1,9 @@
+- hosts:  sniffers
+  become: true
+  tasks:
+
+    - ansible.builtin.shell: whoami
+      register: iam
+
+    - debug:
+        var: iam.stdout
\ No newline at end of file
diff --git a/config/test_echo.yml b/config/test_echo.yml
new file mode 100644
index 0000000000000000000000000000000000000000..d9a962fb72aaeeabfe3b06d30df8e789bcb0161b
--- /dev/null
+++ b/config/test_echo.yml
@@ -0,0 +1,13 @@
+# if your target device has a GUI, replace the whole shell command with notify-send "Hello world !"
+---
+- name: Print stuff to tty (plug your monitor in !)
+  hosts: all
+  become: true # becomes root
+  vars_prompt:
+        name: usr_msg
+        prompt: Message to print
+        private: false
+        default: "Hello world !"
+  tasks:
+    - name: say things to tty1 (connect a screen to see the result)
+      ansible.builtin.shell: echo "{{usr_msg}}" | sudo tee /dev/tty1 || /bin/true
diff --git a/docs/DOCUMENTATION.md b/docs/DOCUMENTATION.md
new file mode 100644
index 0000000000000000000000000000000000000000..7cdc81ef8a0d6364540fd80d708c85f92479e5b9
--- /dev/null
+++ b/docs/DOCUMENTATION.md
@@ -0,0 +1,189 @@
+# Documentation
+
+[MITIK-MGMT](https://gitlab.inria.fr/mitik/measurement-management/mitik-mgmt/) is the tool used to start and sync the experiments.\
+It contains scripts and playbooks that can be ran with [Ansible](https://wiki.archlinux.org/title/Ansible), which uses SSH to control fleets of devices remotely (`nodes`).
+> Ansible is a radically simple IT automation engine that automates cloud provisioning, configuration management, application deployment, intra-service orchestration, and many other IT needs.
+
+## Table of Contents
+
+[TOC]
+
+## Playbooks
+
+Visit [PLAYBOOKS.md](./PLAYBOOKS.md) for detailed information about each playbook.
+
+## Installation
+It requires installing ansible on your controlling computer (`master`):
+```bash
+sudo apt install ansible -y
+```
+
+Then clone the MITIK-MGMT repository and enter that folder :
+```bash
+git clone https://gitlab.inria.fr/mitik/measurement-management/mitik-mgmt
+cd mitik-mgmt
+```
+### Folders structure
+```bash
+mitik-mgmt
+├── config # Configuration files for Ansible. Run commands from here.
+├── docs # Documentation for MITIK-MGMT
+├── figures # Illustrations for documentation
+├── files # Files sent to nodes for configuration
+├── playbooks # Instruction lists to be used with ansible commands
+└── results # Output of remote devices
+```
+
+Enter the `config` folder. When running ansible from this folder, it will read configuration files that are in that current directory.
+### `inventory` file
+==This step is mandatory==. Devices (`nodes`) you'll control (your `inventory`) are described inside the `inventory` file.  [[Ansible documentation](https://docs.ansible.com/ansible/latest/inventory_guide/intro_inventory.html)]
+
+In order yo fill your inventory, you'll need to know your nodes' username and IP address. A static IP for each node is highly recommended.
+
+In the following example, we create a group of devices `ss1` with two nodes inside. They are locally nicknamed `ss1-s1` and `ss1-s2`, and they are reachable using their respective IP addresses. Inline variables set here override variables defined globally.  
+It is important to specify the super-sniffer inside the hostname, because else when tasks run you'll only see the number of the sniffer and not its group
+```ini
+[ss1]
+ss1-s1 ansible_host=192.168.1.184
+ss1-s2 ansible_host=192.168.1.231
+```
+---
+The following adds members of the `ss1` and `ss2` groups to the `sniffers` group. Upon creating new groups, you might want to add them to the `sniffers`. This will let you run commands on all of its children at once.
+
+```ini
+[sniffers:children]
+ss1
+ss2
+```
+---
+The following sets variables for all devices listed. More variables are available and described in the Ansible documentation. These values override those of `ansible.cfg`.
+```ini
+[all:vars]
+ansible_connection=ssh
+ansible_ssh_user=tribe
+ansible_python_interpreter=/usr/bin/python3
+```
+---
+
+### `ansible.cfg` file
+This is more or less the default configuration file, generated running `ansible-config init --disabled > ansible.cfg`.
+The following option has been changed :
+
+```!yaml=137
+inventory=./inventory ; Inline comment.
+```
+This sets the location of our inventory file, relative to the `config` folder.
+
+
+## Usage
+Please run your playbooks from the config folder.
+You can make sure you're at the right place by typing `pwd` in your terminal.
+By default, all playbooks target the group `sniffers`. View the setup instructions if you're unsure what this means.
+You can run simple bash commands to nodes and view their results using:
+```bash
+ansible sniffers -m command -a "echo hello"
+```
+### First connection and ssh access
+If you didn't configure it before, your `master` device isn't authorized to connect to your remote device yet.
+For this to be solved, we're going to transfer the master's ssh key to the nodes so that it lets us in without password.
+++This is a one-time process.++
+
+Run the `ssh_setup.yml` playbook from the `config` folder :
+```
+sudo ansible-playbook ../playbooks/ssh_setup.yml
+```
+Fill in the prompt for nodes' ssh passord and your master's admin password, then wait for completion. From there on, you won't need to provide any authentication.
+
+
+### Testing the connection to your nodes
+
+
+Once your nodes are configured, test connections using:
+```bash
+ansible all -m ping
+```
+Green means good, red is bad.
+:::spoiler Sample output
+```bash
+$ ansible all -m ping
+
+rp4 | SUCCESS => {
+    "changed": false,
+    "ping": "pong"
+}
+s4 | SUCCESS => {
+    "changed": false,
+    "ping": "pong"
+}
+s2 | SUCCESS => {
+    "changed": false,
+    "ping": "pong"
+}
+s1 | SUCCESS => {
+    "changed": false,
+    "ping": "pong"
+}
+s3 | SUCCESS => {
+    "changed": false,
+    "ping": "pong"
+}
+s6 | SUCCESS => {
+    "changed": false,
+    "ping": "pong"
+}
+s5 | SUCCESS => {
+    "changed": false,
+    "ping": "pong"
+}
+```
+:::
+
+If you're still skeptical about it working, run
+```
+ansible-playbook ./test_echo.yml
+```
+which will make stuff appear in your nodes' tty1 (the one you see when you plug in a screen).
+
+#### Setting up nodes using ansible
+In order for your sniffers to work correctly, they need some configuration (installing some packages, the driver for the network adapters, the network interface names, etc).\
+If you've just flashed your sniffers with the official Lite image, ++do not skip this step++.\
+Detailed description of what this script does is to be found inside [Nodes setup and configuration](./PLAYBOOKS#nodes-setup-and-configuration)
+
+Simply run the `sniffer-setup` playbook :
+```
+ansible-playbook ../playbooks/sniffer_setup.yml
+```
+This can be ran just to make sure things are set up properly.
+
+
+
+#### Planning a sniffing session with cron and sens
+Detailed description of what this script does is to be found inside [Starting and Stopping mitik-sens](./PLAYBOOKS#starting-and-stopping-mitik-sens).\
+Run the `start_sens_sniffer.yml` playbook:
+```
+ansible-playbook ../playbooks/start_sens_sniffer.yml
+```
+And fill in the parameters to pass to the `sniffer.py` script.\
+When running this command, note that it expects all sniffers to have the same amount of external adapters plugged in the same interfaces
+
+
+#### Cancelling a future or running sniffing session
+Detailed description of what this script does is to be found inside [Starting and Stopping mitik-sens](./PLAYBOOKS#starting-and-stopping-mitik-sens).\
+Run the `stop_sens_sniffer.yml` playbook:
+```
+ansible-playbook ../playbooks/start_sens_sniffer.yml
+```
+
+#### Cancelling a future or running sniffing session
+Detailed description of what this script does is to be found inside [Starting and Stopping mitik-sens](./PLAYBOOKS#starting-and-stopping-mitik-sens).\
+Run the `stop_sens_sniffer.yml` playbook:
+```
+ansible-playbook ../playbooks/stop_sens_sniffer.yml
+```
+
+#### Testing current nodes statuses
+Detailed description of what this script does is to be found inside [Starting and Stopping mitik-sens](./PLAYBOOKS#testing-devices-and-statuses).\
+Run the `test_meta.yml` playbook:
+```
+ansible-playbook ../playbooks/test_meta.yml
+```
diff --git a/docs/Installation manual.md b/docs/Installation manual.md
deleted file mode 100644
index 81496a982b9499612192ee078ae10487ab2b1c05..0000000000000000000000000000000000000000
--- a/docs/Installation manual.md	
+++ /dev/null
@@ -1,100 +0,0 @@
-# **Installing the sniffer manager**
-
-The sniffer manager consists of several configuration components. Each tool used will be discussed below to ensure the succesfull tool implementation.
-
-## **Hardware**
-
-### **Raspberry Pi**
-The sniffers use Raspbian Bullseye simplified version installed on the Raspberry Pi 4B. Raspberry PI allows the use of low-cost controllers to enable other functionalities such as GPS.
-
-### **Wireless interfaces**
-Each Raspberry Pi is equipped with external TP-Link TL-WN722N wireless interfaces which make available the monitor mode, required for the analysis of captured network traffic in the sniffer. 
-
-### **GPS module**
-Each Raspberry Pi is equipped with an [u-blox NEO 6M-0-001](https://content.u-blox.com/sites/default/files/products/documents/NEO-6_DataSheet_%28GPS.G6-HW-09005%29.pdf). This module has one timepulse PPS module, in addition to the stand-alone GPS receiver.
-
-<center>
-<figure>
-  <img src="https://gitlab.inria.fr/fmorlano/mitik_management/-/raw/main/Figures/gps_module.png" alt="gps_module"/>
-  <figcaption>Figure 1. GPS module.</figcaption>
-</figure>
-</center>
-
-## **Software**
-
-### **Ansible**
-
-The sniffer manager uses Ansible to configure all the sniffer parameters. This can be used remotely or locally. So, we use our own made Ansible-based tool to configure the sniffers with all the required parameters. Ansible is compatible with Linux distributions Mac OS and Windows. Currently, we use a Macbook as manager for our development.
-
-```
-# apt install ansible -y
-```
-
-To establish communication with the sniffers, an inventory is defined. Each sniffer is configured with a static IP. Besides that, the sniffers are organized in groups (super-sniffers).
-
-### **Time synchronization and GPS configuration**
-
-We consider to use time synchronization via GPS PPS (Pulse Per Second) signal. 
-
-Install **gpsd** for GPS decoding of both time and position; **pps-tools** to verify PPS signals from the GPS; and **chrony** to handle PPS signals. 
-```
-# apt install gpsd gpsd-clients pps-tools chrony
-```
-
-Install **pynmea2** for interpretation of messages provided by the GPS based on the NMEA 0183 [1]. NMEA format has different properties, depending on its sentence type and the properties in the message data. For this application, $GPGGA format is udes to extract latitude, longitude and datetime.
-```
-# pip3 install pynmea2
-```
-
-PPS configuration requires intruction definitions in _/boot/config.txt_. For NMEA data from the serial communication, it is necessary to enable UART communication and set the baud rate. 
-
-```
-# bash -c "echo 'dtoverlay=pps-gpio,gpiopin=18' >> /boot/config.txt"
-# bash -c "echo 'enable_uart=1' >> /boot/config.txt"
-# bash -c "echo 'init_uart_baud=9600' >> /boot/config.txt"
-```
-
-It is also necessary to add PPS in _/etc/modules_.
-```
-# bash -c "echo 'pps-gpio' >> /etc/modules
-```
-
-#### **Pin connections**
-
-| GPS   | Raspberry Pi    |
-| :---: |      :---:      |         
-| PPS   | Pin 12 (GPIO 18)|
-| VCC   | Pin 4           |
-| GND   | Pin 6           |
-| RX    | Pin 8           |
-| TX    | Pin 10          |
-
-<center>
-<figure>
-  <img src="https://gitlab.inria.fr/fmorlano/mitik_management/-/raw/main/Figures/gps_conn.png" alt="gps_connection"/>
-  <figcaption>Figure 2. Wire up GPS module to Raspberry Pi.</figcaption>
-</figure>
-</center>
-
-It is needed to make the UART serial port enabled:
-
-```
-# raspi-config nonint do_serial 2
-```
-Configuration of **gpsd** in _/etc/default/gpsd_ to connect before polling whatever GPS must be associated with it. This is used to provide reference clock information to ntpd or chronyd. Moreover, the device argument should be defined as /dev/ttyS0 to /dev/pps0 to monitor the serial data for PPS.
-
-```
-# Default settings for the gpsd init script and the hotplug wrapper.
-START_DAEMON="true"
-USBAUTO="true"
-DEVICES="/dev/ttyS0 /dev/pps0"
-GPSD_OPTIONS="-n"
-GPSD_SOCKET="/var/run/gpsd.sock"
-```
-
-Configuration of PPS as time reference for **chrony** server. 
-
-```
-# bash -c "echo 'refclock SHM 0 delay 0.200 refid NMEA' >> /etc/chrony/chrony.conf"
-# bash -c "echo 'refclock PPS /dev/pps0 refid PPS' >> /etc/chrony/chrony.conf"
-```
diff --git a/docs/PLAYBOOKS.md b/docs/PLAYBOOKS.md
new file mode 100644
index 0000000000000000000000000000000000000000..51011fbcd52e3a70035e592c729d5290071827c7
--- /dev/null
+++ b/docs/PLAYBOOKS.md
@@ -0,0 +1,120 @@
+# Playbooks
+Playbooks are ran by ansible using `ansible-playbook path/to/playbook.yml`.
+The ansible commands should be ran from the `mitik-mgmt/config` folder.
+There are five main playbooks :
+```bash
+- device_setup.yml # set up a new device, or update configuration
+- ssh_setup.yml # set up ssh keys
+- start_sens_sniffer.yml
+- stop_sens_sniffer.yml
+- data_transfer.yml # retrieve results
+- test_meta.yml # test functions
+```
+
+All of them target the `sniffers` group by default. However, some tasks can be set to be run on the master device.
+## First master-nodes connection: SSH setup
+In order to ease configuring ssh keys and passwordless authentication, the playbook `ssh_setup.yml` (previously `playbook_SSH_keygen.yml`) has been re-written.  
+It will need to be ran with sudo, because it tries to install packages to master machine.
+- Asks for SSH password
+- Installs sshpass and keychain (master) (needs superuser powers)
+- Creates a ssh key (master)
+- Copy public ssh key to authorized_hosts (nodes)
+- Using `.bashrc`, autoload and load the ssh key (master)
+
+## Nodes setup and configuration
+Multiple configuration scripts, here called microstasks, have been put into a single playbook `device_setup.yml`
+- `microtask_network_drivers_update.yml` (nodes)
+    - install git and bc
+    - clone https://github.com/aircrack-ng/rtl8188eus/
+    - build and load driver
+- `microtask_networking_naming_scheme_udev_setup.yml` (nodes)
+    - Switch off predictable netfowk interface naming
+    - send file to set up udev rules for forced interface naming, and put interfaces to monitor mode on connection
+    - if any interface is named "wlanX", copy current active connection to work with wifi0
+- `microtask_networkmanager_un_manager_setup.yml` (nodes)
+    -  set up networkmanager to ignore wifi..8
+-  `microtask_hostname_update.yml` (nodes)
+    -  update device hostname to [inventory name]: ss1-s1
+- `microtask_hosts_update.yml` (nodes)
+    - Add addresses of all other sniffers to each sniffer's hosts file
+- `microtask_getty_autologin_setup.yml` (nodes)
+    - Sets up automatic login for internal console (accessible by connecting a keybpard to your node)
+- `microtask_mitik_sens_update.yml` (nodes)
+    - Gets and updates the mitik-sens files from git
+- `microstask_GPS_setup.yml` (nodes)
+    - Sets timezone to Europe/Paris
+    - enable GPIO
+    - install gpsd, gpsd-client, pps-tools, chrony
+    - enable gpsd, chrony systemctl units
+    - enable pps-gpio device tree inside /boot/firmware/config.txt
+    - configure gpsd to make ttyS0 use the socket /var/run/gpsd.sock
+    - copy the gpsd config file to `/etc/default/gpsd`
+    - reconfigure gpsd
+    - copy another config file to `/lib/systemd/system/gpsd.socket`
+    - uninstall ntp
+    - copy chrony config file `/etc/chrony/chrony.conf`
+- `microtask_reboot.yml` (nodes)
+    - ask the user if they want to reboot
+
+## Starting and Stopping mitik-sens
+ The playbook `start_sens_sniffer.yml` asks parameters to run mitik-sens :
+- The folder of mitik-sens on the nodes. Defaults to `/home/tribe/mitik-sens/`
+- hour and minute at which to start the experiment. Defaults to current time +15m
+- The format of the name of the output pcap file. Defaults to mitik_experiment-%post, with %post being replaced at mitik-sens level 
+- Timeout after which to stop the experiment in seconds. Defaults to 3600 (1h)
+- The interfaces on which to run the experiment, separated by commas (e.g. `wifi5,wifi6`). Defaults to `wifi5`. Order matters.
+- The channels on which to start the interface, separated by commas. (e.g. `6,11`). Defaults to `1`. Order matters.
+- The subtype filter to choose which requests to capture. Defaults to `458`
+- The interval in seconds for channel hopping. Defaults to 0 (disabled)
+- The hashing function. Defaults to SHA256, can be MD5 and None
+- The fields to anonymize. All MACs and ssids is 15; not ssid is 14; nothing is 0. Defaults to 15
+- The frequency at which location should be polled. Defaults to 900s (15m)
+
+Then it translates the csv interfaces and channels into lists, and finds out the prefix to use for the gps file. It is {{ _pcap_name | replace('%post', '') }}-location-YYYYMMDD-ddmmss.gps
+it checks if the length of interfaces and channels is the same.
+If they are, we set up a crontab to run the sniffer when planned, and a crontab for saving the location of the device.
+
+**`stop_sens_sniffer.yml`**
+This playbook interrupts any running `sniffer.py`, and cancels planned related crontabs.
+
+## Retrieving experiment data from nodes
+`data_transfer.yml` finds all .pcap and .gps files from our target folder for each nonde
+- and copies them inside ../results/ssX/sY/filename
+[TODO]: transfer to meta-server
+[TODO]: delete og files when success
+
+## Testing devices and statuses
+Tests are made in order to test current device config against whta is expected.
+
+All tests throwing an error will prevent further playbooks from running (if any).  
+The interruption will be done at the end of the playbook, so all checking tasks will be executed whatever happens. 
+
+Here are the available test playbooks and their behaviour:
+- `test_all.yml`: Run all test playbooks.  
+    If you want to run a subset of them, open `test_all.yml` and comment out the playbooks you don't want to run by putting a `#` before the `- import_playbook:`.
+
+You could also just run playbooks one by one, manually, with the following playbooks:
+- `test_time.yml`: Get and print the time difference between all hosts, taking whichever as a reference.  
+    If any of them has >1s difference, throw an error
+- `test_hostname.yml`: Check that hostnames on the remote sniffers are valid (i.e. looking like `ss?-s?`)  
+    If any does not match, throw an error
+- `test_config_files.yml`: Check local and remote config files existence and checksums (sha256)  
+    Throw an error for the files that have issues
+- `test_interfaces_status.yml`: Print interfaces names, driver and mode.  
+    Then check that all interfaces are named wifiX (warn if not), Check that all sniffers have the same number of external adapters (throw if not) and check that they are in monitor mode (`unknown` mode) (throw if not)
+- `test_packages.yml`:  Check that required packages are installed across all nodes  
+    Throw if not
+- `test_systemctl_services.yml`: Check that systemd services are in an expected state  
+    Throw if not
+- `test_GPIO_GPS_PPS_status.yml`: Check that we get output from the GPS, and the PPS.  
+    Throw if not.
+
+
+
+
+
+# Some more info
+Test playbooks will not check :
+- That the hosts file is up-to-date (contains our sniffers)
+- That the gps is plugged into the pins, because checking that makes gathering info from the GPS impossible and requires a reboot
+- That the network drivers repo and the mitik-sens repos are downloaded and up-to-date
\ No newline at end of file
diff --git a/Figures/.gitkeep b/figures/.gitkeep
similarity index 100%
rename from Figures/.gitkeep
rename to figures/.gitkeep
diff --git a/Figures/ansible.png b/figures/ansible.png
similarity index 100%
rename from Figures/ansible.png
rename to figures/ansible.png
diff --git a/Figures/ansible_implementation.png b/figures/ansible_implementation.png
similarity index 100%
rename from Figures/ansible_implementation.png
rename to figures/ansible_implementation.png
diff --git a/Figures/architecture.png b/figures/architecture.png
similarity index 100%
rename from Figures/architecture.png
rename to figures/architecture.png
diff --git a/Figures/gps_conn.png b/figures/gps_conn.png
similarity index 100%
rename from Figures/gps_conn.png
rename to figures/gps_conn.png
diff --git a/Figures/gps_module.png b/figures/gps_module.png
similarity index 100%
rename from Figures/gps_module.png
rename to figures/gps_module.png
diff --git a/Figures/mitik_topology.png b/figures/mitik_topology.png
similarity index 100%
rename from Figures/mitik_topology.png
rename to figures/mitik_topology.png
diff --git a/Figures/module_1.png b/figures/module_1.png
similarity index 100%
rename from Figures/module_1.png
rename to figures/module_1.png
diff --git a/Figures/module_1_implementation.png b/figures/module_1_implementation.png
similarity index 100%
rename from Figures/module_1_implementation.png
rename to figures/module_1_implementation.png
diff --git a/Figures/module_2.png b/figures/module_2.png
similarity index 100%
rename from Figures/module_2.png
rename to figures/module_2.png
diff --git a/Figures/module_3.png b/figures/module_3.png
similarity index 100%
rename from Figures/module_3.png
rename to figures/module_3.png
diff --git a/Figures/randomized_MAC.png b/figures/randomized_MAC.png
similarity index 100%
rename from Figures/randomized_MAC.png
rename to figures/randomized_MAC.png
diff --git a/files/72-wlan-geo-dependent.rules b/files/72-wlan-geo-dependent.rules
new file mode 100644
index 0000000000000000000000000000000000000000..303053440a8ee4e0ccdc98ed3b6b97f3121686b8
--- /dev/null
+++ b/files/72-wlan-geo-dependent.rules
@@ -0,0 +1,12 @@
+# wifi0
+ACTION=="add", SUBSYSTEM=="net", SUBSYSTEMS=="sdio", ATTRS{device}=="0x4345", ATTRS{vendor}=="0x02d0", NAME="wifi0"
+
+# +---------------+
+# | wifi5 | wifi7 |
+# +-------+-------+
+# | wifi6 | wifi8 |
+# +---------------+ (RPI physical USB ports distribution)
+ACTION=="add", SUBSYSTEM=="net", SUBSYSTEMS=="usb",  KERNELS=="3-1", NAME="wifi5", RUN+="/usr/bin/sudo /usr/sbin/ifconfig wifi5 up", RUN+="/usr/bin/sudo /usr/sbin/ifconfig wifi5 down", RUN+="/usr/bin/sudo /usr/sbin/iwconfig wifi5 mode monitor", RUN+="/usr/bin/sudo /usr/sbin/ifconfig wifi5 up"
+ACTION=="add", SUBSYSTEM=="net", SUBSYSTEMS=="usb",  KERNELS=="1-1", NAME="wifi6", RUN+="/usr/bin/sudo /usr/sbin/ifconfig wifi6 up", RUN+="/usr/bin/sudo /usr/sbin/ifconfig wifi6 down", RUN+="/usr/bin/sudo /usr/sbin/iwconfig wifi6 mode monitor", RUN+="/usr/bin/sudo /usr/sbin/ifconfig wifi6 up"
+ACTION=="add", SUBSYSTEM=="net", SUBSYSTEMS=="usb",  KERNELS=="1-2", NAME="wifi7", RUN+="/usr/bin/sudo /usr/sbin/ifconfig wifi7 up", RUN+="/usr/bin/sudo /usr/sbin/ifconfig wifi7 down", RUN+="/usr/bin/sudo /usr/sbin/iwconfig wifi7 mode monitor", RUN+="/usr/bin/sudo /usr/sbin/ifconfig wifi7 up"
+ACTION=="add", SUBSYSTEM=="net", SUBSYSTEMS=="usb",  KERNELS=="3-2", NAME="wifi8", RUN+="/usr/bin/sudo /usr/sbin/ifconfig wifi8 up", RUN+="/usr/bin/sudo /usr/sbin/ifconfig wifi8 down", RUN+="/usr/bin/sudo /usr/sbin/iwconfig wifi8 mode monitor", RUN+="/usr/bin/sudo /usr/sbin/ifconfig wifi8 up"
diff --git a/files/99-unmanaged-devices.conf b/files/99-unmanaged-devices.conf
new file mode 100644
index 0000000000000000000000000000000000000000..e42e11e5cd77c29f515d631e187b906e7e6af7ee
--- /dev/null
+++ b/files/99-unmanaged-devices.conf
@@ -0,0 +1,3 @@
+[keyfile]
+unmanaged-devices=interface-name:wifi5;interface-name:wifi6;interface-name:wifi7;interface-name:wifi8
+
diff --git a/files/chrony.conf b/files/chrony.conf
new file mode 100644
index 0000000000000000000000000000000000000000..64f64178663eb20894f67812657aae82c3c1499a
--- /dev/null
+++ b/files/chrony.conf
@@ -0,0 +1,33 @@
+# Welcome to the chrony configuration file. See chrony.conf(5) for more
+# information about usuable directives.
+pool 2.debian.pool.ntp.org iburst
+
+#Config file GPS time synchronization
+refclock SHM 0 delay 0.325 refid NMEA
+refclock PPS /dev/pps0 refid PPS
+
+
+# This directive specify the location of the file containing ID/key pairs for
+# NTP authentication.
+keyfile /etc/chrony/chrony.keys
+
+# This directive specify the file into which chronyd will store the rate
+# information.
+driftfile /var/lib/chrony/chrony.drift
+
+# Uncomment the following line to turn logging on.
+#log tracking measurements statistics
+
+# Log files location.
+logdir /var/log/chrony
+
+# Stop bad estimates upsetting machine clock.
+maxupdateskew 100.0
+
+# This directive enables kernel synchronisation (every 11 minutes) of the
+# real-time clock. Note that it can   ^`^yt be used along with the 'rtcfile' directive.
+rtcsync
+
+# Step the system clock instead of slewing it if the adjustment is larger than
+# one second, but only in the first three clock updates.
+makestep 1 3
diff --git a/files/gpsd b/files/gpsd
new file mode 100644
index 0000000000000000000000000000000000000000..1d160fc2e5ffbb9bd66d9fe13812a8c836075a51
--- /dev/null
+++ b/files/gpsd
@@ -0,0 +1,16 @@
+# Default settings for the gpsd init script and the hotplug wrapper.
+
+# Start the gpsd daemon automatically at boot time
+START_DAEMON="true"
+
+# Use USB hotplugging to add new USB devices automatically to the daemon
+USBAUTO="true"
+
+# Devices gpsd should collect to at boot time.
+# They need to be read/writeable, either by user gpsd or the group dialout.
+DEVICES="/dev/ttyAMA0 /dev/pps0"
+
+# Other options you want to pass to gpsd
+GPSD_OPTIONS="-n"
+
+GPSD_SOCKET="/var/run/gpsd.sock"
diff --git a/files/gpsd.socket b/files/gpsd.socket
new file mode 100644
index 0000000000000000000000000000000000000000..3ce5473fe61a1795d7a1cf082ea3a23f11054fe8
--- /dev/null
+++ b/files/gpsd.socket
@@ -0,0 +1,16 @@
+[Unit]
+Description=GPS (Global Positioning System) Daemon Sockets
+
+[Socket]
+ListenStream=/run/gpsd.sock
+ListenStream=[::1]:2947
+ListenStream=127.0.0.1:2947
+# To allow gpsd remote access, start gpsd with the -G option and
+# uncomment the next two lines:
+# ListenStream=[::]:2947
+# ListenStream=0.0.0.0:2947
+SocketMode=0600
+#BindIPv6Only=yes
+
+[Install]
+WantedBy=sockets.target
diff --git a/files/positionGetter.sh b/files/positionGetter.sh
new file mode 100755
index 0000000000000000000000000000000000000000..41e93f2160a6bda7527f0d1b853500567c8de898
--- /dev/null
+++ b/files/positionGetter.sh
@@ -0,0 +1,47 @@
+#!/bin/bash
+
+# script.sh 900 30 "~/mitik-sens/" "experiment-identifier"
+# run with arg 1 the sleep TO, and $2 the waiting time before doing things
+if [ $2 ]; then
+sleep $2
+fi
+
+# files in /temp will get deleted on reboot
+gpsLocations=$(mktemp /tmp/locations-XXXXXX.gps)
+
+# gpsPresenceTest=$(mktemp  /tmp/test-XXXXXX.gps)
+# timeout 1s sudo gpiomon 4 15 > $gpsPresenceTest
+# if [ $(cat $gpsPresenceTest | wc -l) -eq 0 ]; then
+# echo "no gps found !"
+# exit 1
+# fi
+# this test prevents any further connection
+
+while [ $(pgrep -f "sniffer.py" >/dev/null; echo $?) == 0 ]; do
+    # Location °N, °E is expected
+    latlon=$(gpspipe -w -n 10 |grep -om1  "[-]\?[[:digit:]]\{1,3\}\.[[:digit:]]\{9\}.*[[:digit:]]\{1,3\}\.[[:digit:]]\{9\}" | sed 's/"lon"://g')
+    alt=$(gpspipe -w -n 6 |grep -om1  "[-]\?alt\":[[:digit:]]\{1,5\}\.[[:digit:]]\{1,5\}" | sed 's/alt\"://g')
+    # 48.714318200,2.206028200
+    # │ Latitude:         48.71441340 N           │
+    # │ Longitude:         2.20591520 E           │
+    # │ Alt (HAE, MSL):    206.490,    160.283 m
+
+    echo $latlon","$alt >> $gpsLocations
+    if [ $1 ]; then
+    sleep $1
+    else
+    sleep 900 #15m
+    fi
+
+done
+
+awk -F',' '
+{
+    lat += $1;
+    lon += $2;
+    alt += $3;
+}
+END {
+    printf "%.10f %.10f %.10f\n", lat/NR, lon/NR, alt/NR;
+}' $gpsLocations > "$(echo $3"/"$4"$(date +%Y%m%d_%H%M%S)-location.gps.log")"
+# will write eg as ~/mitik-sens/
diff --git a/files/setInterfacesToMonitorMode.sh b/files/setInterfacesToMonitorMode.sh
new file mode 100755
index 0000000000000000000000000000000000000000..792ea16eca00bc4fd20a69f85d0949a11122410c
--- /dev/null
+++ b/files/setInterfacesToMonitorMode.sh
@@ -0,0 +1,34 @@
+#!/bin/sh
+
+# this script id deprecated (but still functionnal). Udev rules should already make them in monitor mode
+if [ -n "$(ip link show wifi5 2>/dev/null)" ]; then
+  sudo ifconfig wifi5 up
+  sudo ifconfig wifi5 down
+  sudo iwconfig wifi5 mode monitor
+  sudo ifconfig wifi5 up
+  echo "Set wifi5 to monitor mode"
+fi
+
+if [ -n "$(ip link show wifi6 2>/dev/null)" ]; then
+  sudo ifconfig wifi6 up
+  sudo ifconfig wifi6 down
+  sudo iwconfig wifi6 mode monitor
+  sudo ifconfig wifi6 up
+  echo "Set wifi6 to monitor mode"
+fi
+
+if [ -n "$(ip link show wifi7 2>/dev/null)" ]; then
+  sudo ifconfig wifi7 up
+  sudo ifconfig wifi7 down
+  sudo iwconfig wifi7 mode monitor
+  sudo ifconfig wifi7 up
+  echo "Set wifi7 to monitor mode"
+fi
+
+if [ -n "$(ip link show wifi8 2>/dev/null)" ]; then
+  sudo ifconfig wifi8 up
+  sudo ifconfig wifi8 down
+  sudo iwconfig wifi8 mode monitor
+  sudo ifconfig wifi8 up
+  echo "Set wifi8 to monitor mode"
+fi
diff --git a/playbooks/data_transfer.yml b/playbooks/data_transfer.yml
new file mode 100644
index 0000000000000000000000000000000000000000..15175ef1b3af14f3a9f23b08ba9e4fae939c731f
--- /dev/null
+++ b/playbooks/data_transfer.yml
@@ -0,0 +1,35 @@
+# This script copies resulting capture files to ../results/group (ss?)/sniffer (s?)/ folder
+- name: Copy *.gps and *.pcap 
+  hosts: sniffers
+
+  tasks:
+
+    - name: Find files to copy
+      ansible.builtin.find: 
+        paths: "~/mitik-sens/" # top folder to search from/in
+        recurse: false # yes|no recursive file search ?
+        patterns: "mitik_exp*.pcap, *.gps" # what your target files look like
+      register: files_to_copy
+
+    - name: Get local time
+      ansible.builtin.command: date +"%Y-%m-%d-%H-%M"
+      register: _localFname
+      delegate_to: localhost
+      run_once: true
+      changed_when: false
+
+    - name: Set destination path based on hostname pattern
+      ansible.builtin.set_fact:
+        _dest: |
+          {% if inventory_hostname is match('^ss[0-9]+-s[0-9]+$') %}
+            ../results/{{ _localFname.stdout }}/{{ inventory_hostname.split('-')[0] }}/{{ inventory_hostname.split('-')[1] }}/
+          {% else %}
+            ../results/{{ _localFname.stdout }}/nogroup/{{ inventory_hostname }}/
+          {% endif %}
+
+    - name: Copy files
+      ansible.builtin.fetch:
+        src: "{{ item.path }}"
+        dest: "{{ _dest | trim }}"
+        flat: true
+      with_items: "{{ files_to_copy.files }}"
diff --git a/playbooks/device_setup.yml b/playbooks/device_setup.yml
new file mode 100644
index 0000000000000000000000000000000000000000..afeb21892d31097f7659c34bd56d9b56362452fc
--- /dev/null
+++ b/playbooks/device_setup.yml
@@ -0,0 +1,28 @@
+# Device configuration. Runs all microtasks.
+# Can be ran multiple times on one device
+
+
+- name: Set up the sniffers
+  hosts: sniffers
+  become: true
+  become_user: root
+  tasks:
+
+
+
+
+- import_playbook: ./microtask_network_drivers_update.yml
+- import_playbook: ./microtask_networking_naming_scheme_udev_setup.yml
+- import_playbook: ./microtask_networkmanager_un_manager_setup.yml
+
+
+- import_playbook: ./microtask_hostname_update.yml
+- import_playbook: ./microtask_hosts_update.yml
+
+- import_playbook: ./microtask_getty_autologin_setup.yml
+
+- import_playbook: ./microtask_mitik_sens_update.yml
+
+- import_playbook: ./microstask_GPS_setup.yml
+
+- import_playbook: ./microtask_reboot.yml
diff --git a/playbooks/microstask_GPS_setup.yml b/playbooks/microstask_GPS_setup.yml
new file mode 100644
index 0000000000000000000000000000000000000000..9e8fff3b73fc493bfaa07c817a5af8da8f2a7e73
--- /dev/null
+++ b/playbooks/microstask_GPS_setup.yml
@@ -0,0 +1,84 @@
+- name: Set up GPS config
+  hosts: sniffers
+  become: true
+  become_user: root
+  tasks:
+
+  - name: Timezone config
+    ansible.builtin.command: sudo timedatectl set-timezone Europe/Paris
+    changed_when: false
+
+  - name: Raspi-config serial_hw
+    ansible.builtin.command:  sudo raspi-config nonint do_serial_hw 0
+    changed_when: false
+
+  - name: Install required packages
+    tags: sniffer-setup  config nodes
+    ansible.builtin.apt:
+      update_cache: true
+      pkg:
+        - gpsd #
+        - gpsd-clients
+        - pps-tools
+        - chrony
+    
+
+  - name: Systemctl enable gpsd
+    ansible.builtin.shell: |
+      sudo systemctl enable gpsd.socket
+      sudo systemctl enable gpsd
+      sudo systemctl restart gpsd
+      sudo systemctl enable chrony
+      sudo systemctl restart chrony
+
+  - name: Copy a new config gpsd device functionality
+    ansible.builtin.blockinfile:
+      dest: /boot/firmware/config.txt
+      block: |
+        [all]
+        dtoverlay=disable-bt
+        dtoverlay=pps-gpio,gpiopin=18
+
+      # https://www.raspberrypi.com/documentation/computers/configuration.html#part3.5
+      # it is possible to set cnoditional parameters depending on device: https://www.raspberrypi.com/documentation/computers/config_txt.html#model-filters
+
+
+  # - name: Copy a new pps GPIO device in modules
+  #   blockinfile: |
+  #    dest=/etc/modules
+  #    content="pps-gpio"
+  # dtoverlay loads the module already
+
+  - name: gpsd port pointer
+    ansible.builtin.command: sudo gpsd /dev/ttyS0 -F /var/run/gpsd.sock
+  
+  - name: Copy a new config gpsd device functionality
+    ansible.builtin.copy:
+      src: ../files/gpsd
+      dest: /etc/default/gpsd
+
+  - name: Reconfigure gpsd
+    ansible.builtin.command: sudo dpkg-reconfigure gpsd
+
+  - name: Remove IPv6 bind
+    ansible.builtin.copy:
+      src: ../files/gpsd.socket
+      dest: /lib/systemd/system/gpsd.socket
+
+  # - name: ntp uninstall
+  #   command: sudo apt remove ntp -y
+#   Network Time Protocol daemon/utilities (transitional package)
+# This is a dummy transitional package to transition to NTPsec.
+# It can be safely removed.
+
+  - name: chrony config file GPS time synchronization
+    ansible.builtin.copy:
+      src: ../files/chrony.conf
+      dest: /etc/chrony/chrony.conf
+
+  - name: transfer location finder
+    ansible.builtin.copy:
+      src: ../files/positionGetter.sh
+      dest: "/home/{{ ansible_ssh_user }}/positionGetter.sh"
+      mode: 0755
+    become: false
diff --git a/playbooks/microtask_getty_autologin_setup.yml b/playbooks/microtask_getty_autologin_setup.yml
new file mode 100644
index 0000000000000000000000000000000000000000..34e1a11c6dd5292d1c70714b75dc4afc9967e57a
--- /dev/null
+++ b/playbooks/microtask_getty_autologin_setup.yml
@@ -0,0 +1,14 @@
+- name: Setup autologin with getty
+  hosts: sniffers
+  become: true
+  become_user: root
+  tasks:
+    - name: Configure Getty Console Autologin
+      ansible.builtin.blockinfile:
+        path: /etc/systemd/system/getty@tty1.service.d/autologin.conf
+        block: |
+            [Service]
+            ExecStart=
+            ExecStart=-/sbin/agetty -o '-p -f -- \\u' --noclear --autologin {{ ansible_ssh_user }} %I $TERM
+        create: true
+        mode: 644
diff --git a/playbooks/microtask_hostname_update.yml b/playbooks/microtask_hostname_update.yml
new file mode 100644
index 0000000000000000000000000000000000000000..72aab8852a992024ce3b7095275a7ec758f78517
--- /dev/null
+++ b/playbooks/microtask_hostname_update.yml
@@ -0,0 +1,13 @@
+# This playbook sets the hostname of targets to group-device name (ss1-s1)
+- name: Set hostname  of targets to group-device name (ss1-s1)
+  hosts: sniffers
+  tasks:
+  vars: 
+    - name: skip is good; check that hostnames look valid
+      debug:
+        msg: "The hostname {{ inventory_hostname }} looks invalid."
+      when: inventory_hostname is not match('^ss[0-9]-s[0-9]$')
+
+    - name: set system hostname
+      shell: sudo hostnamectl set-hostname {{ inventory_hostname }}
+
diff --git a/playbooks/microtask_hosts_update.yml b/playbooks/microtask_hosts_update.yml
new file mode 100644
index 0000000000000000000000000000000000000000..6e7653d1087b812905517cac2eb0d97e0c5debb3
--- /dev/null
+++ b/playbooks/microtask_hosts_update.yml
@@ -0,0 +1,24 @@
+# This update the hosts file of all nodes with local addresses of all nodes
+# 192.168.1.184 ss2-s1
+# 192.168.1.231 ss2-s2
+# 192.168.1.239 ss2-s3
+# 192.168.1.248 ss2-s4
+# 192.168.1.246 ss2-s5
+# 192.168.1.244 ss2-s6
+# It works when this line does not exist before; it also updates existing lines if necessary
+- name: host file update - Local DNS setup across all nodes and master
+  gather_facts: true
+  tags: etchosts device-update
+  become: true
+  become_user: root
+  hosts: sniffers, localhost
+  tasks:
+
+    - name: Add IP address of all hosts to all hosts
+      lineinfile:
+            dest: "/etc/hosts"
+            regexp: '.*{{ item }}$'
+            line: "{{ hostvars[item].ansible_host }} {{ item }}"
+            state: present
+      when: hostvars[item].ansible_host is defined
+      with_items: "{{ groups.sniffers }}"
diff --git a/playbooks/microtask_mitik_sens_update.yml b/playbooks/microtask_mitik_sens_update.yml
new file mode 100644
index 0000000000000000000000000000000000000000..e28d3db7f2b0cd69af3f59783e07bbd3a77b8857
--- /dev/null
+++ b/playbooks/microtask_mitik_sens_update.yml
@@ -0,0 +1,15 @@
+# Device configuration. Can be ran multiple times on one device
+
+
+- name: Clone and/or update sens repository
+  hosts: sniffers
+  become: false
+  tasks:
+    - name: Install git if necessary
+      ansible.builtin.shell: type git || sudo apt update && apt install git -y
+
+    - ansible.builtin.git:
+        repo: https://gitlab.inria.fr/mitik/anonymous-measurement/mitik-sens
+        dest: ./mitik-sens
+        update: true
+        clone: true
diff --git a/playbooks/microtask_network_drivers_update.yml b/playbooks/microtask_network_drivers_update.yml
new file mode 100644
index 0000000000000000000000000000000000000000..ef26c7baa40a9612828b60b4e643d0cdf7dc798b
--- /dev/null
+++ b/playbooks/microtask_network_drivers_update.yml
@@ -0,0 +1,36 @@
+# Update drivers
+
+- name: Update the drivers for external adapters
+  hosts: sniffers
+  becomre: false
+  tasks:
+    - name: Install required packages
+      tags: sniffer-setup  config nodes
+      apt:
+        pkg:
+          # required
+          - git # to clone rtl8188 repo
+          - bc # required to compile the rtl8188 driver
+        update_cache: true
+      become: true
+      become_user: root
+
+    - name: Clone or update rtl8188eus repository if necessary
+      ansible.builtin.git:
+        repo: https://github.com/gglluukk/rtl8188eus/
+        dest: ./rtl8188eus
+        update: true
+        clone: true
+
+
+
+    - name: Build and install rtl8188eus module
+      tags: device-setup config nodes
+      ansible.builtin.shell: |
+        cd rtl8188eus
+        make && sudo make install
+        echo 'blacklist rtl8xxxu' | sudo tee -a '/etc/modprobe.d/realtek.conf'
+        sudo rmmod rtl8xxxu
+        sudo modprobe 8188eu
+
+
diff --git a/playbooks/microtask_networking_naming_scheme_udev_setup.yml b/playbooks/microtask_networking_naming_scheme_udev_setup.yml
new file mode 100644
index 0000000000000000000000000000000000000000..9f401edf8acd0723c6409242422ec14d4c948ca3
--- /dev/null
+++ b/playbooks/microtask_networking_naming_scheme_udev_setup.yml
@@ -0,0 +1,34 @@
+# Copies network interfaces naming scheme (based on physical usb location)
+- name: Set up network interface naming scheme and copy current network connection
+  become: true
+  hosts: sniffers
+  become_user: root
+  tags: falsedes device-setup udev naming-scheme
+  tasks:
+
+    - name: Switch off predictable naming mechanism
+      command: ls -nfs /dev/null /etc/systemd/network/99-default.link
+
+    - name: Copy UDEV rules to set interface names based on physical USB positions
+      copy:
+        src: "../files/72-wlan-geo-dependent.rules"
+        dest: /etc/udev/rules.d/72-wlan-geo-dependent.rules
+
+
+    - name: Query current interface names
+      shell: "ip a | grep wlan"
+      ignore_errors: true
+      register: any_wlans
+    - name: Query active connections
+      shell: "nmcli -t -f name,uuid con show --active | grep -v lo"
+      register: active_nmcon
+      when: any_wlans.rc == 0
+
+    - name: Clone current network to wifi0 interface
+      shell: |
+        nmcli connection clone {{active_nmcon.stdout_lines[0].split(':')[1]}} {{active_nmcon.stdout_lines[0].split(':')[0]}}_wifi0
+        nmcli con modify {{active_nmcon.stdout_lines[0].split(':')[0]}}_wifi0 connection.interface-name wifi0
+      # pw=$(nmcli d w show-password | grep Password|sed 's/Password: //g')
+      # ssid=$(nmcli d w show-password | grep SSID|sed 's/SSID: //g')
+      # nmcli con add type wifi con-name cloned-$(ssid) ifname wifi0 ssid $(ssid) pass
+      when: any_wlans.rc == 0
diff --git a/playbooks/microtask_networkmanager_un_manager_setup.yml b/playbooks/microtask_networkmanager_un_manager_setup.yml
new file mode 100644
index 0000000000000000000000000000000000000000..f2ef64e82c2922aacfb315ad644ec833e152c8db
--- /dev/null
+++ b/playbooks/microtask_networkmanager_un_manager_setup.yml
@@ -0,0 +1,12 @@
+# Device configuration. Can be ran multiple times on one device
+
+
+- name: Setup NetworkManager to ignore wifi5..8
+  hosts: sniffers
+  become: true
+  become_user: root
+  tasks:
+
+    - ansible.builtin.copy:
+        src: "../files/99-unmanaged-devices.conf"
+        dest: /etc/NetworkManager/conf.d/99-unmanaged-devices.conf
diff --git a/playbooks/microtask_reboot.yml b/playbooks/microtask_reboot.yml
new file mode 100644
index 0000000000000000000000000000000000000000..a6b77e354146fbc48e91b8572b798f9f07e92591
--- /dev/null
+++ b/playbooks/microtask_reboot.yml
@@ -0,0 +1,17 @@
+- name: Trigger reboot
+  hosts: sniffers
+  become: true
+  become_user: root
+  vars_prompt:
+    - name: user_reboot
+      prompt: If this is your first configuration ever, it is advised to reboot. Reboot ? (y/n)
+      default: "n"
+      private: false
+
+
+  tasks:
+    - name: Perform reboot
+      ansible.builtin.reboot:
+          post_reboot_delay: 30
+      when: user_reboot == 'y'
+
diff --git a/playbooks/ssh_setup.yml b/playbooks/ssh_setup.yml
new file mode 100644
index 0000000000000000000000000000000000000000..3d731e63b88ca81d148c7592a63c87b4ee0e228b
--- /dev/null
+++ b/playbooks/ssh_setup.yml
@@ -0,0 +1,60 @@
+# This script generates a private key, then pushes it to all nodes
+- name: Set up login-less controls
+  hosts: sniffers
+  vars_prompt:
+    - name: ansible_ssh_pass
+      prompt: Enter the nodes' SSH password
+      private: true
+  vars:
+    ansible_host_key_checking: false
+
+  tasks:
+
+    - name: Install sshpass and keychain to master device
+      tags: ssh-setup ssh-keygen config keychain sshpass master
+      package:
+        name:
+          - sshpass # for the first login into nodes, using password auth
+          - keychain # to load the private key when opening a terminal
+        state: present
+      delegate_to: 127.0.0.1
+      run_once: true
+      become: true
+      # when: false
+
+
+    - name: SSH KeyGen command on master device
+      tags: ssh-setup ssh-keygen config master
+      ansible.builtin.shell:
+        cmd: ssh-keygen -q -b 2048 -t rsa -N "" -C "master sniffer ssh access" -f ~/.ssh/id_sniffer
+        creates: "~/.ssh/id_sniffer"
+      delegate_to: 127.0.0.1
+      run_once: True
+      register: ssh_keygen_result
+
+
+    - name: keygen failure status check
+      tags: ssh-setup config keychain master
+      ansible.builtin.debug:
+        msg: |
+            ~/.ssh/id_sniffer already existed before, so your bashrc might already have been written to before.
+            If you're unsure about this, check that the end of your ~/.bashrc contains `keychain --eval --quiet id_sniffer`.
+            Next task will be skipped.
+      delegate_to: 127.0.0.1
+      run_once: True
+      when: ssh_keygen_result.stdout.find('skipped') == 0 | default(false)
+
+    - name: Copy the master's public key and add to nodes' authorized_keys
+      tags: ssh-setup config ssh-copy nodes
+      ansible.posix.authorized_key:
+        user: "{{ansible_ssh_user}}"
+        key: "{{ lookup('file','~/.ssh/id_sniffer.pub')}}"
+
+    - name: Set up keychain inside .bashrc
+      tags: ssh-setup config keychain master
+      ansible.builtin.shell:
+        cmd: echo "eval \$(keychain --eval --quiet id_sniffer)" >> ~/.bashrc; eval \$(keychain --eval --quiet id_sniffer)
+      delegate_to: 127.0.0.1
+      run_once: True
+      when: ssh_keygen_result.stdout.find('skipped') == -1 | default(true)
+
diff --git a/playbooks/start_sens_sniffer.yml b/playbooks/start_sens_sniffer.yml
new file mode 100644
index 0000000000000000000000000000000000000000..4355a411f1e56e5f7cb414278f6e7b2907e0b727
--- /dev/null
+++ b/playbooks/start_sens_sniffer.yml
@@ -0,0 +1,107 @@
+- name: Start the sniffer. # Supports multiple sniffers and starting channels
+  hosts: sniffers
+  # become: true
+  # become_user: root
+
+  vars_prompt:
+
+    - name: _workdir
+      prompt: Enter the folder where the script is and results will be
+      default: "/home/tribe/mitik-sens/"
+      private: false
+    # This will always be the mitik-sens folder
+
+    # - name: _location
+    #   prompt: Enter the location of the experiments
+    #   private: false
+    # I don't know what this parameter is (was) for
+
+    - name: _hour
+      prompt: Enter an hour to start the experiment
+      default: "{{ lookup('pipe', 'date -d \"+10 minutes\" +%H') }}"
+      private: false
+
+    - name: _minute
+      prompt: Enter minutes to start the experiment
+      default: "{{ lookup('pipe', 'date -d \"+10 minutes\" +%M') }}"
+      private: false
+
+    - name: _pcap_name
+      prompt: "Name of the PCAP file. ?post will get replaced by a bunch of context info (date and params) and .pcap"
+      default: "mitik_experiment-?post"
+      private: false
+
+    - name: _timeout
+      prompt: Please specify the runtime duration in sec
+      default: 3600
+      private: false
+
+    - name: _interfaces_csv
+      prompt: Please specify the interface(s) separated by commas (e.g. wifi0,wifi7). For default just press enter
+      default: 'wifi5'
+      private: false
+
+    - name: _channels_csv
+      prompt: Please specify the starting channels (integer between 1-11 separated by commas, default=system). For default just press enter
+      default: 1
+      private: false
+
+    - name: _filter
+      prompt: Please frames subtype filter. Enter for default.
+      default: '458'
+      private: false
+
+    - name: _channel_hopping
+      prompt: Interval of channel hopping in seconds. Enter for 0 (no hopping) (by default)
+      default: 0
+      private: false
+
+
+    - name: _hash_function
+      prompt: Please specify the hash function (None, MD5, SHA256). For default just press enter
+      default: 'SHA256'
+      private: false
+
+    - name: _hash_pattern
+      prompt: Please specify the bitmask for hashing of MAC1, MAC2, MAC3 and SSID (integer between 0-15, default=15). For default just press enter
+      default: 15
+      private: false
+
+
+    - name: _gps_poll_timeout
+      prompt: time in seconds between each location polling
+      default: 900
+      private: false
+  tasks:
+
+    - name: Double-check input variables
+      ansible.builtin.assert:
+        that: "{{_interfaces | length}} ==  {{_channels | length}}"
+      delegate_to: 127.0.0.1
+      run_once: true
+      any_errors_fatal: true
+
+    - ansible.builtin.set_fact:
+        _interfaces: "{{ _interfaces_csv.split(',')}}"
+        _channels: "{{ _channels_csv.split(',') }}"
+        _location_prefix: "{{ _pcap_name | replace('?post', '') }}"
+      delegate_to: 127.0.0.1
+      run_once: true
+
+
+    - name: Setup future start of sens-sniffer
+      ansible.builtin.cron:
+        name: "ansible_sens_sniffer {{ _hour }} {{ _minute }} {{ item }}"
+        minute: "{{ _minute }}"
+        hour: "{{ _hour }}"
+        job: "cd {{_workdir}}; sudo python ./sniffer.py -t {{_timeout}} -i {{item}} -c {{_channels[my_idx]}} -j {{_channel_hopping}} -sf {{_filter}} -p {{_hash_pattern}} -e {{_hash_function}} -w '{{_pcap_name}}'"
+      loop: "{{ _interfaces }}"
+      loop_control:
+        index_var: my_idx
+
+    - name: Setup future start of location querier
+      ansible.builtin.cron:
+        name: "ansible_sens_gps {{ _hour }} {{ _minute }}"
+        minute: "{{ _minute }}"
+        hour: "{{ _hour }}"
+        job: "/home/{{ansible_ssh_user}}/positionGetter.sh {{_gps_poll_timeout}} 10 '{{_workdir}}' '{{_location_prefix}}'"
diff --git a/playbooks/stop_sens_sniffer.yml b/playbooks/stop_sens_sniffer.yml
new file mode 100644
index 0000000000000000000000000000000000000000..b7495414687abb4880d9bc85d7c19095688450be
--- /dev/null
+++ b/playbooks/stop_sens_sniffer.yml
@@ -0,0 +1,18 @@
+- name: Stop and abort future sniffing activity
+  hosts: sniffers
+  tasks:
+    - name: List active snifing crontabs
+      ansible.builtin.shell: "crontab -l | grep ansible_sens_ | sed 's/#Ansible: //g'"
+      register: crontabs
+
+
+    - name: Disable all crontabs
+      ansible.builtin.cron:
+        name: "{{item}}"
+        state: absent
+      with_items: "{{crontabs.stdout_lines}}"
+
+
+    - name: Interrupt currently running sniffers
+      ansible.builtin.shell: pgrep -f "sniffer.py" | xargs kill
+      become: true
\ No newline at end of file
diff --git a/playbooks/test_GPIO_GPS_PPS_status.yml b/playbooks/test_GPIO_GPS_PPS_status.yml
new file mode 100644
index 0000000000000000000000000000000000000000..4de3ab63e1e6c38b9923f04b0bea55ea2ed6e0ec
--- /dev/null
+++ b/playbooks/test_GPIO_GPS_PPS_status.yml
@@ -0,0 +1,125 @@
+- name: Check for output from gps/pps
+  hosts: sniffers
+  gather_facts: false
+  become: true
+  become_user: root
+  any_errors_fatal: true
+
+
+  tasks:
+
+    # GPIO status
+    - name: GPIO status test
+      ansible.builtin.shell: pinctrl get 18 |  awk -F" " '{print $9}'
+      register: result
+      changed_when: false
+
+
+    - name: Test if GPS module disabled
+      ansible.builtin.set_fact:
+        falg_failed_gpio_off: "GPS module is disabled"
+      when: result.stdout != 'input'
+
+
+    # when something is connected, running this prevents gpsd from using that data which forces a reboot
+    - name: Try to get data from the GPIO pins (disabled)
+      shell: |
+        gpioPresenceTest=$(mktemp  /tmp/test-XXXXXX.gpio)
+        if [ $(type gpsmon >/dev/null; echo $?) != 0 ]; then
+        echo 3
+        fi
+        timeout 1.2 bash -c 'while true; do sudo gpioget 4 15; done' >> $gpioPresenceTest
+        if [ $(cat $gpioPresenceTest | sort | uniq | wc -l) != 2 ]; then
+        echo 2
+        fi
+        echo 0
+      register: _gpiotest
+      failed_when: false
+      when: false
+      no_log: true
+      # sudo gpiomon 4 15 is too brutal and prevents further communication.
+      # gpioget 4 15 is the same. idk what to do
+
+
+    - name: Interpret gpio reception failure (disabled)
+      ansible.builtin.fail:
+        msg: >-
+          {% if _gpiotest.rc == 2 %}
+          no output from GPIO was found. did you plug in the gps correctly ?
+          {% elif _gpiotest.rc == 3 %}
+          the command gpsmon does not exist. Is gpsd properly installed?
+          {% else %}
+          Unexpected return code: {{ _gpiotest.rc }}. Check stderr: {{ _gpiotest }}
+          {% endif %}
+      when: false and _gpiotest.rc != 0
+      ignore_errors: true
+
+
+
+
+    - name: Check pps reception
+      shell: |
+          ppsPresenceTest=$(mktemp  /tmp/test-XXXXXX.pps)
+          if [ $(type ppstest >/dev/null; echo $?) != 0 ]; then
+          exit 3
+          fi
+          timeout 2.2s sudo ppstest /dev/pps0 > $ppsPresenceTest
+          if [ $(cat $ppsPresenceTest | wc -l) -lt 4 ]; then
+          exit 2
+          fi
+          exit 0
+      register: _ppscheck
+      ignore_errors: true
+      no_log: true
+      failed_when: false
+
+    - name: Interpret pps reception failure
+      ansible.builtin.fail:
+        msg: >-
+          {% if _ppscheck.rc == 2 %}
+          no output from PPS was found
+          {% elif _ppscheck.rc == 3 %}
+          the command ppstest does not exist. Is pps properly installed?
+          {% else %}
+          Unexpected return code: {{ _ppscheck.rc }}, check stderr:  {{ _ppscheck }}
+          {% endif %}
+      when: _ppscheck.rc != 0
+      ignore_errors: true
+
+
+    - name: Check gps position reception
+      ansible.builtin.shell: |
+        if [ $(type gpspipe >/dev/null; echo $?) != 0 ]; then
+        exit 3
+        fi
+        if [ $(timeout 1.2s gpspipe --nmea -n 10 >/dev/null ; echo $?) != 0 ]; then
+        exit 2
+        fi
+        exit 0
+      register: _gpscheck
+      failed_when: false
+      no_log: true
+      ignore_errors: true
+
+    - name: Interpret gps reception failure
+      ansible.builtin.fail:
+        msg: >-
+          {% if _gpscheck.rc == 2 %}
+          no position from GPS was found. Either wait a minute, or reboot the device
+          {% elif _gpscheck.rc == 3 %}
+          the command gpspipe does not exist. Is gpsd properly installed?
+          {% else %}
+          Unexpected return code: {{ _gpscheck.rc }}, check stderr:  {{ _gpscheck }}
+          {% endif %}
+      when: _gpscheck.rc != 0
+      ignore_errors: true
+
+    - name: Stop if fails encountered
+      ansible.builtin.fail:
+        msg: GPIO components and gps seem badly configured; see previous errors for this device !
+      when: _gpiotest.rc | default(0) != 0 or _gpscheck.rc != 0 or _ppscheck.rc != 0
+
+
+    - name: All good !
+      ansible.builtin.debug:
+        msg: "GPS and PPS seem fine !"
diff --git a/playbooks/test_all.yml b/playbooks/test_all.yml
new file mode 100644
index 0000000000000000000000000000000000000000..ce556213890334d54260c78da83caa083f95a9c9
--- /dev/null
+++ b/playbooks/test_all.yml
@@ -0,0 +1,13 @@
+- name: Run all tests
+  hosts: sniffers
+  tasks: 
+    - ansible.builtin.debug:
+        msg: "global test ! Any failure will stop the tests"
+
+- import_playbook: test_time.yml
+- import_playbook: test_hostname.yml
+- import_playbook: test_packages.yml
+- import_playbook: test_interfaces_status.yml
+- import_playbook: test_systemctl_services.yml
+- import_playbook: test_config_files.yml
+- import_playbook: test_GPIO_GPS_PPS_status.yml
diff --git a/playbooks/test_config_files.yml b/playbooks/test_config_files.yml
new file mode 100644
index 0000000000000000000000000000000000000000..ba346bcae90141f31db1811f86453e881a62dcad
--- /dev/null
+++ b/playbooks/test_config_files.yml
@@ -0,0 +1,56 @@
+- name: Check that local and remote config files are the same
+  hosts: sniffers
+  gather_facts: true
+  vars:
+    _errors: []
+    file_combinations:
+      - local_file: "../files/99-unmanaged-devices.conf"
+        remote_file: "/etc/NetworkManager/conf.d/99-unmanaged-devices.conf"
+      - local_file: "../files/72-wlan-geo-dependent.rules"
+        remote_file: "/etc/udev/rules.d/72-wlan-geo-dependent.rules"
+      - local_file: "../files/gpsd"
+        remote_file: "/etc/default/gpsd"
+      - local_file: "../files/gpsd.socket"
+        remote_file: "/lib/systemd/system/gpsd.socket"
+      - local_file: "../files/chrony.conf"
+        remote_file: "/etc/chrony/chrony.conf"
+      - local_file: "../files/positionGetter.sh"
+        remote_file: "/home/{{ansible_ssh_user}}/positionGetter.sh"
+  tasks:
+    - name: Get SHA256 checksum for each remote file
+      ansible.builtin.stat:
+        path: "{{ item.remote_file }}"
+        checksum_algorithm: sha256
+      register: remote_file_checksums
+      loop: "{{ file_combinations }}"
+
+    - name: Get SHA256 checksum for each local file
+      ansible.builtin.stat:
+        follow: true
+        path: "{{ item.local_file | realpath }}"
+        checksum_algorithm: sha256
+      loop: "{{ file_combinations }}"
+      register: local_file_checksums
+      delegate_to: localhost
+
+
+    - name: Compare local and remote files and store differences
+      ansible.builtin.set_fact:
+        _errors: "{{ _errors + [item[0].item.remote_file + (' does not exist, ' if not item[1].stat.exists else ' and ') + item[0].item.local_file + (' does not exist' if not item[0].stat.exists else ' are different') + ' !'] }}"
+      when: item[0].stat.exists is false or item[1].stat.exists is false or item[0].stat.checksum != item[1].stat.checksum
+      loop: "{{ local_file_checksums.results | zip(remote_file_checksums.results) | list }}"
+      loop_control:
+        label: "{{ item[0].item }}"
+      delegate_to: localhost
+
+    - name: Print errors if any and interrupt the playbook
+      ansible.builtin.debug:
+        msg: "{{ _errors }}"
+      when: _errors | length > 0
+      failed_when: true
+      any_errors_fatal: true
+
+
+    - name: All good !
+      ansible.builtin.debug:
+        msg: "Config files seem fine !"
diff --git a/playbooks/test_hostname.yml b/playbooks/test_hostname.yml
new file mode 100644
index 0000000000000000000000000000000000000000..da82a1d1781ea1b656a5b9b255f8c5d0aaccd280
--- /dev/null
+++ b/playbooks/test_hostname.yml
@@ -0,0 +1,13 @@
+- name: Check hostnames on remote nodes
+  hosts: sniffers
+  tasks:
+    - name: Hostname check
+      ansible.builtin.fail:
+        msg: "The hostname {{ ansible_hostname }} looks invalid."
+      when: ansible_hostname is not match('^ss[0-9]-s[0-9]$')
+      any_errors_fatal: true
+
+
+    - name: All good !
+      ansible.builtin.debug:
+        msg: "Hostnames seem fine !"
diff --git a/playbooks/test_interfaces_status.yml b/playbooks/test_interfaces_status.yml
new file mode 100644
index 0000000000000000000000000000000000000000..f11fc88569b900e1bd6aa0594e441edc26dff50f
--- /dev/null
+++ b/playbooks/test_interfaces_status.yml
@@ -0,0 +1,72 @@
+- name: Test interfaces' statuses
+  hosts: all
+  gather_facts: true
+  become: true
+  become_user: root
+
+
+  vars:
+    active_interfaces: "{{ ansible_interfaces | select('match', '^(wifi)[0-9]+') }}"
+
+    interfaces_list_raw: >-
+      {{
+        hostvars[inventory_hostname]
+        | dict2items
+        | selectattr('value.device', 'defined')
+        | selectattr('value.device', 'in', active_interfaces)
+        | map(attribute='value')
+      }}
+
+    # removed macaddress
+    interface_query: >-
+      [].[device, module, type]
+
+    interfaces_unformated_list: >-
+      {{ interfaces_list_raw | json_query(interface_query)  }}
+
+  tasks:
+    # Interfaces status
+    - name: Interfaces connected
+      ansible.builtin.debug:
+        msg: "{{ interfaces_unformated_list | map('join', ', ') }}"
+    - name: Warn about wlan devices (should be wifi)
+      ansible.builtin.debug:
+        msg: "Warning!! device has interfaces named wlanX; this is unusual"
+      when: interfaces_unformated_list | flatten | select('search', '^wlan.+') | length != 0
+
+    # Set the length of the first host's interface list
+    - name: Set length of the first host's interface list
+      ansible.builtin.set_fact:
+        first_host_interface_length: "{{ interfaces_unformated_list | length }}"
+      when: inventory_hostname == groups['all'][0]
+
+    # Propagate the length to all hosts
+    - name: Propagate first host's interface length to all hosts
+      ansible.builtin.set_fact:
+        first_host_interface_length: "{{ hostvars[groups['all'][0]].first_host_interface_length }}"
+      when: inventory_hostname != groups['all'][0]
+
+    # Check if the lists are of the same length
+    - name: Set failed flag if the number of interfaces is not the same across nodes
+      ansible.builtin.fail:
+        msg: "The number of interfaces is not the same across hosts."
+      when: interfaces_unformated_list | length != first_host_interface_length | int
+      ignore_errors: true
+
+    # Check if any interface that is not wifi0 has a type other than unknown
+    - name: Set failed flag if non-wifi0 interfaces have a type other than unknown (this means no monitor mode)
+      ansible.builtin.fail:
+        msg: "wifiX interfaces found in non-monitor mode !!"
+      when: interfaces_unformated_list | selectattr(2, 'ne', 'unknown') | selectattr(0, 'ne', 'wifi0') | list | length > 0
+      ignore_errors: true
+
+    - name: Failure ? stop the playbook
+      ansible.builtin.fail:
+        msg: interfaces tests failed. check the two previous tasks !
+      when: interfaces_unformated_list | selectattr(2, 'ne', 'unknown') | selectattr(0, 'ne', 'wifi0') | list | length > 0 or interfaces_unformated_list | length != first_host_interface_length | int
+      any_errors_fatal: true
+
+
+    - name: All good !
+      ansible.builtin.debug:
+        msg: "Interfaces seem fine !"
diff --git a/playbooks/test_packages.yml b/playbooks/test_packages.yml
new file mode 100644
index 0000000000000000000000000000000000000000..2320b7b36716aa5ee9b4f07f30d91c09bc80aeb9
--- /dev/null
+++ b/playbooks/test_packages.yml
@@ -0,0 +1,30 @@
+---
+- name: Check if packages are installed
+  hosts: sniffers
+  gather_facts: true
+  vars:
+    _packages:
+      # gps
+      - gpsd 
+      - gpsd-clients
+      - pps-tools
+      - chrony
+      # for the custom rtl8188 drivers
+      - git 
+      - bc 
+  tasks:
+    - name: Gather package facts
+      ansible.builtin.package_facts:
+        manager: auto
+      register: package_facts
+
+    - name: Display packages that are not installed
+      ansible.builtin.debug:
+        msg: "{{ item }} is not installed on {{ ansible_hostname }}"
+      with_items: "{{ _packages }}"
+      when: item not in package_facts.ansible_facts.packages
+      any_errors_fatal: true
+
+    - name: All good !
+      ansible.builtin.debug:
+        msg: "Packages seem fine !"
diff --git a/playbooks/test_systemctl_services.yml b/playbooks/test_systemctl_services.yml
new file mode 100644
index 0000000000000000000000000000000000000000..45c5354fbcd511331b0d6aea6e74365bad6ce043
--- /dev/null
+++ b/playbooks/test_systemctl_services.yml
@@ -0,0 +1,52 @@
+- name: Check for presence of required packages in nodes
+  hosts: sniffers
+  gather_facts: true
+  any_errors_fatal: true
+  vars:
+    services_list: |
+      gpsd
+      chrony
+      networking
+      NetworkManager
+      awoo
+    expected_statuses:
+      [
+        "gpsd, loaded active running enabled",
+        "chrony, loaded active running enabled",
+        "networking, loaded active exited enabled",
+        "NetworkManager, loaded active running enabled",
+        "awoo, not-found inactive dead does-not-exist"
+      ]
+
+  tasks:
+    - name: Systemd existence checks
+      ansible.builtin.systemd:
+        name: "{{ item }}"
+      loop: "{{ services_list.splitlines() }}"
+      register: _test
+
+
+    - name: Initialize service status list
+      ansible.builtin.set_fact:
+        service_statuses: []
+        newline: "\n"
+
+
+    - name: Service status
+      ansible.builtin.set_fact:
+        service_statuses: "{{ service_statuses + [item.name + ', ' + item.status.LoadState + ' ' + item.status.ActiveState + ' ' + item.status.SubState + ' ' + item.status.UnitFileState | default('does-not-exist')] }}"
+      loop: "{{ _test.results }}"
+      no_log: true
+
+    - name: Print current statuses
+      ansible.builtin.debug:
+        msg: "{{ service_statuses }}"
+
+    - name: Failure check
+      ansible.builtin.fail:
+        msg: "{{ ansible_hostname }} failed systemd checks"
+      when: falset service_statuses is subset(expected_statuses)
+
+    - name: All good !
+      ansible.builtin.debug:
+        msg: "Systemctl and systemd services seem fine !"
diff --git a/playbooks/test_time.yml b/playbooks/test_time.yml
new file mode 100644
index 0000000000000000000000000000000000000000..2d44f72ab4029cdd8095c3da008a589aa6a721a8
--- /dev/null
+++ b/playbooks/test_time.yml
@@ -0,0 +1,35 @@
+---
+- name: Compare time since epoch between remote devices and the first node reached
+  hosts: sniffers
+  gather_facts: false
+  vars:
+    first_node_time: 0
+
+  tasks:
+
+
+    - name: Get time since epoch on all nodes
+      ansible.builtin.command: date +%s%N
+      register: result_time
+      changed_when: false
+
+    - name: Set first node time
+      ansible.builtin.set_fact:
+        first_node_time: "{{ hostvars[groups['sniffers'][0]]['result_time'].stdout }}"
+      changed_when: false
+
+    - name: Compare time since epoch with the first node
+      debug:
+        msg: "{{ inventory_hostname }} is {{ 'behind' if result_time.stdout < first_node_time else 'ahead' if result_time.stdout > first_node_time else 'equal' }} the first node by {{ (result_time.stdout | int - first_node_time | int) / 1000000 }} milliseconds"
+      when: true
+
+
+    - name: Interrupt if dime diff is greater than one second
+      ansible.builtin.fail:
+        msg: "Cheack previous task ! Time seems off."
+      when: ((result_time.stdout | int - first_node_time | int) / 1000000) > 1000
+      any_errors_fatal: true
+
+    - name: All good !
+      ansible.builtin.debug:
+        msg: "Time seems fine !"
diff --git a/utils/Utils.py b/utils/Utils.py
deleted file mode 100644
index 3f6a1671c7d2b1908e46c2d8336563ee1b1e62b0..0000000000000000000000000000000000000000
--- a/utils/Utils.py
+++ /dev/null
@@ -1,31 +0,0 @@
-import subprocess
-
-captureFilter = 'type mgt and (subtype probe-req or subtype probe-resp or subtype beacon)'
-#
-# 
-#
-#
-def ConfigureInterface(interface : str):
-    # Setting desired interface to monitor mode
-    p = subprocess.Popen(['/sbin/ifconfig',interface,'down'],stdout=subprocess.PIPE, stderr=subprocess.PIPE, close_fds=True)
-    p.wait()
-    if p.poll():
-        stdout, stderr = p.communicate()
-        raise Exception(f"ERROR: Failed to set '{interface}' down: {stderr}")
-
-    p = subprocess.Popen(['/sbin/iwconfig',interface,'mode','monitor'],stdout=subprocess.PIPE, stderr=subprocess.PIPE, close_fds=True)
-    p.wait()
-    if p.poll():
-        stdout, stderr = p.communicate()
-        raise Exception(f"ERROR: Failed to change '{interface}' to Monitor mode: {stderr}")
-
-    p = subprocess.Popen(['/sbin/ifconfig',interface,'up'],stdout=subprocess.PIPE, stderr=subprocess.PIPE, close_fds=True)
-    p.wait()
-    if p.poll():
-        stdout, stderr = p.communicate()
-        raise Exception(f"ERROR: Failed to set '{interface}' up: {stderr}") 
-
-def ChangeChannel(interface:str, channel:int):
-    p = subprocess.run(['/sbin/iwconfig',interface,'channel',f"{channel}"],capture_output=True)
-    if p.returncode:
-        raise Exception(f"Failed to set Channel: '{p.stderr}'")
\ No newline at end of file
diff --git a/utils/sniffer_GPS.py b/utils/sniffer_GPS.py
deleted file mode 100644
index fe4045f51e0c0a8cb7590e84e3c99cf019529c44..0000000000000000000000000000000000000000
--- a/utils/sniffer_GPS.py
+++ /dev/null
@@ -1,237 +0,0 @@
-#!/usr/bin/env python3
-#
-# sniffer.py
-#
-# Description:
-#   Passive wi-fi sniffer using scapy library. Usage requires interface in Monitor mode and root permissions.
-#   To see options type './sniffer -h' or './sniffer.py --help'
-
-import sys
-import logging
-from datetime import datetime
-import argparse
-import hashlib
-from pathlib import Path
-import Utils
-import platform
-
-# Libraries GPS
-#import serial
-import time
-import string
-#import pynmea2
-
-from gps import *
-import inspect
-
-# Libraries Scapy
-import scapy.all as scapy
-
-dev_name = platform.node()
-# GPS variables
-GPS_lat = ['NO_GPS']
-GPS_lon = ['NO_GPS']
-gpsd=gps(mode=WATCH_ENABLE|WATCH_NEWSTYLE)
-
-# GPS function
-def GPS_coords():
-    while True:
-        report=gpsd.next()
-        if report['class']=='TPV':
-            lat=str(getattr(report,'lat',0.0))
-            lon=str(getattr(report,'lon',0.0))
-            return lat,lon
-
-# Encryption functions
-# Functions that define possible encryption operations with the source address
-def MD5Hash(data):
-    return hashlib.md5(data).hexdigest()[:12] if not data is None else None
-
-def SHA256Hash(data):
-    return hashlib.sha256(data).hexdigest()[:12] if not data is None else None
-
-# Function handler for each captured packet
-
-def PacketHandler(packet):
-    global hashPattern, HashFunction, logger, pcapWriter#, stopCapture
-    global fieldControlMAC1, fieldControlMAC2, fieldControlMAC3, fieldControlSSID
-
-    srcMac = packet.addr2
-    srcSSID = packet[3].info
-    # Writes the hash result received in python to a format that directly relates to the MAC address ouput
-    # Output MAC address is weird when set as bytes, must convert to string format prior to assignment
-    # The same does not happen to the SSID
-    if HashFunction:
-        if (hashPattern & fieldControlMAC1) and packet.addr1 and packet.addr1 != "ff:ff:ff:ff:ff:ff":
-            packet.addr1 = str(HashFunction(packet.addr1.encode('utf-8')))
-            packet.addr1 = packet.addr1[0:] + ":" +packet.addr1[2:4] + ":" +packet.addr1[4:6] + ":" +packet.addr1[6:8] + ":" +packet.addr1[8:10] + ":" +packet.addr1[10:]
-
-        if (hashPattern & fieldControlMAC2) and packet.addr2 and packet.addr2 != "ff:ff:ff:ff:ff:ff":
-            packet.addr2 = str(HashFunction(packet.addr2.encode('utf-8')))
-            packet.addr2 = packet.addr2[0:] + ":" +packet.addr2[2:4] + ":" +packet.addr2[4:6] + ":" +packet.addr2[6:8] + ":" +packet.addr2[8:10] + ":" +packet.addr2[10:]
-
-        if (hashPattern & fieldControlMAC3) and  packet.addr3 and packet.addr3 != "ff:ff:ff:ff:ff:ff":
-            packet.addr3 = str(HashFunction(packet.addr3.encode('utf-8')))
-            packet.addr3 = packet.addr3[0:] + ":" +packet.addr3[2:4] + ":" +packet.addr3[4:6] + ":" +packet.addr3[6:8] + ":" +packet.addr3[8:10] + ":" +packet.addr3[10:]
-
-        # Hashes SSID
-        if (hashPattern & fieldControlSSID):
-            packet[3].info = HashFunction(packet[3].info) # Gets to the SSID Value
-            packet[3].len = len(packet[3].info)
-
-    pcapWriter.write(packet)
-
-# Global variables
-
-#stopCapture = False # Variable that stores the signal state
-logger = None # Stores the logger object
-availableHashFunctions = ['None','MD5','SHA256']
-hashFunctions = [None,MD5Hash,SHA256Hash]
-hashPattern = 15
-time_out = None # Variable to define stop sniffing after a given time
-
-# Field control for hashing
-fieldControlMAC1 = 8
-fieldControlMAC2 = 4
-fieldControlMAC3 = 2
-fieldControlSSID = 1
-#
-GPS_parsed = GPS_coords()
-GPS_lat=GPS_parsed[0]
-GPS_lon=GPS_parsed[1]
-
-def int_range(mini,maxi):
-    """Return function handle of an argument type function for
-       ArgumentParser checking an integer range: mini <= arg <= maxi
-         mini - minimum acceptable argument
-         maxi - maximum acceptable argument"""
-
-    # Define the function with default arguments
-    def int_range_checker(arg):
-        """New Type function for argparse - a float within predefined range."""
-
-        try:
-            f = int(arg)
-        except ValueError:
-            raise argparse.ArgumentTypeError("must be a floating point number")
-        if f < mini or f > maxi:
-            raise argparse.ArgumentTypeError("must be in range [" + str(mini) + ", " + str(maxi)+"]")
-        return f
-
-    return int_range_checker
-
-if __name__ == "__main__":
-
-    # Argument parser
-    parser = argparse.ArgumentParser(description="Passive wi-fi sniffer for the MAC Anonymization project. More info at README.md")
-
-    # Options for sniffer
-    parser.add_argument("-L","--location",type=str,default=None,help="Defines the location of experiments.")
-    parser.add_argument("-i","--interface",type=str,default='wlan1',help="Chooses interface to listen to. Wireless interface must be on Monitor mode.")
-    parser.add_argument("-f","--filter",type=str,default='type mgt and (subtype probe-req or subtype probe-resp or subtype beacon)',help="Chooses filter to apply to packet capture. This is a string that follows the tcpdump conventions.")
-    parser.add_argument("-F","--folder",type=str,default=None,help="Folder to save traces in the remote nodes")
-    parser.add_argument('-v','--verbose',action='count',default=0,help='Increase verbosity level.')
-    parser.add_argument('-e','--hash-function',choices=availableHashFunctions,default='MD5',help="Chooses the desired function for hashing the MAC addresses (or no hash at all)")
-    parser.add_argument('-c','--channel',default=None,type=int,help="Set specific channel for capture (Default behaviour is not to change the current one)")
-    parser.add_argument("-o","--offline",default=None,type=Path,help="Reads from a pcap file instead of actually sniffing")
-    parser.add_argument('-m',"--memory",action="store_true",help="Writes pcap file into /dev/shm when capturing and moves from there to the default location when exiting. See README for more info")
-    parser.add_argument("-l","--logs",action="store_true",help="Saves the debug logs on a file")
-    parser.add_argument('-p','--hash-pattern',type=int_range(0,15),default=15,help="Integer defining bitmask that enables the hashing of MAC1, MAC2, MAC3 and SSID respectively. It's a binary value in the format 0b<MAC1><MAC2><MAC3><SSID> where each can be 1 or 0. Can be written as its respective integer as well.")
-    parser.add_argument('-t','--timeout',default=None,type=int,help="Time for capture packets on the interface specificied")
-    logger = logging.getLogger('sniffer')
-
-    # Setting logs
-    # log instance
-    logger = logging.getLogger(name="ReplayFileCreator")
-    logger.setLevel(logging.DEBUG)
-
-    # Parses arguments
-    args = parser.parse_args(sys.argv[1:])
-
-    # Saves debug log to file
-    if args.logs:
-        fileHandler = logging.FileHandler(f".sniffer.log")
-        fileHandler.setFormatter(logging.Formatter("%(asctime)s - %(funcName)s (%(lineno)s)  - [%(levelname)s]: %(message)s"))
-        fileHandler.setLevel(logging.DEBUG)
-        logger.addHandler(fileHandler)
-
-    # Prints with desired level
-    logHandler = logging.StreamHandler()
-    if args.verbose == 0:
-        logHandler.setLevel(logging.ERROR)
-    elif args.verbose == 1:
-        logHandler.setLevel(logging.WARNING)
-    elif args.verbose == 2:
-        logHandler.setLevel(logging.INFO)
-    else:
-        logHandler.setLevel(logging.DEBUG)
-
-    logHandler.setFormatter(logging.Formatter("%(asctime)s - [%(levelname)s]: %(message)s"))
-    logger.addHandler(logHandler)
-
-    # Arguments
-    verboseLevel = args.verbose
-    outputFile = f"{args.folder}/{dev_name}_{args.location}_tmsp{time.strftime('%Y%m%d-%H%M%S')}_lat{GPS_lat}_lon{GPS_lon}_ch{args.channel}.pcap"
-    sniffingFilter = args.filter # Defines a BPF filter to use with, defaults to only capture Probe requests, responses and beacons
-    listeningInterface = args.interface
-    HashFunction = hashFunctions[availableHashFunctions.index(args.hash_function)]
-    hashPattern = args.hash_pattern
-    time_out = args.timeout
-    #Sets verbosity level
-    if verboseLevel == 0:
-        logger.setLevel(logging.ERROR)
-    if verboseLevel == 1:
-        logger.setLevel(logging.WARNING)
-    if verboseLevel == 2:
-        logger.setLevel(logging.INFO)
-    if verboseLevel >= 3:
-        logger.setLevel(logging.DEBUG)
-
-    logger.info(f"Current working interfaces: {(cwIfaces := scapy.get_working_ifaces())}")
-    # Checks if interface name is valid
-    if not listeningInterface in cwIfaces:
-        logger.critical(f"No interface named '{listeningInterface}' was found ")
-        exit(1)
-
-    # Configures interface to be on monitor mode (no need if on offline mode)
-    if not args.offline:
-        try:
-            Utils.ConfigureInterface(listeningInterface)
-            if args.channel:
-                Utils.ChangeChannel(listeningInterface,args.channel)
-        except Exception as err:
-            logger.critical(f"Error when changing interface to monitor mode. ({err})")
-            exit(1)
-
-    # Creates an PcapWriter object
-    # If --memory was selected, saves file into /dev/shm/ before saving it to CWD
-    if args.memory:
-        tempFileLocation = "/dev/shm/" + outputFile + ".tmp"
-        pcapWriter = scapy.PcapWriter(open(tempFileLocation,'wb'), append=True, sync=True)
-    else:
-        pcapWriter = scapy.PcapWriter(open(outputFile,'wb'), append=True, sync=True)
-
-    # Starts sniffing process
-    logger.info(f"Started sniffing @ {listeningInterface} {datetime.now()} ")
-
-    # If to read from file, reads with no filters, closes and exits the process
-    if args.offline:
-        sniffed = scapy.sniff(offline=args.offline.open(mode="rb"),prn=PacketHandler)
-        pcapWriter.close()
-        logger.info("Read from file")
-        exit(0)
-
-    # If no offline option is given, proceeds to capture as normal
-    sniffed = scapy.sniff(filter=sniffingFilter,store=True,prn=PacketHandler,iface=listeningInterface,timeout=time_out)
-    logger.info(f"Written {len(sniffed)} captured packets")
-
-    # Closes file
-    pcapWriter.close()
-
-    # Copies content from shm to device
-    if args.memory:
-        with open(tempFileLocation,'rb') as filRead:
-            with open(outputFile,'wb') as filWrite:
-                filWrite.write(filRead.read())
-
-    logger.info("Success on exiting sniffer.")
\ No newline at end of file