- 1. Introduction
- 2. Hardware and Software setup
- 3. Get Started
- 4. Design
- 5. Throughput Performance
- 6. Coming soon
- 7. Want to support?
This is a Next-Generation ESP-Hosted specifically designed for a sophisticated hosts that run Linux operating system. This flavour of the solution takes more standard approach while providing a network interface to the host. User space applications such as hostapd, wpa_supplicant, iw etc, can be used with this interface.
This solution offers following:
- 802.11 network interface which is a standard Wi-Fi interface on Linux host
- Configuration of Wi-Fi is supported through standard cfg80211 interface of Linux
- A standard HCI interface
This solution provides following WLAN and BT/BLE features to the host:
- WLAN Features:
- 802.11b/g/n
- WLAN Station
- Security Modes: Open, WPA, WPA2, WPA3
- BT/BLE
- Classic Bluetooth
- BLE 4.2
- BLE 5.0
ESP-Hosted-NG solution is supported on following ESP boards:
Supported Targets | ESP32 | ESP32-S2 | ESP32-S3 | ESP32-C2 | ESP32-C3 | ESP32-C6 |
---|
Looking for other chipset? Please do check Coming Soon section.
- ESP-Hosted-NG solution showcase examples for following Linux based hosts out of the box.
- Raspberry-Pi 3 Model B
- Raspberry-Pi 3 Model B+
- Raspberry-Pi 4 Model B
- This solution is aimed for Linux based hosts only. For microcontroller(MCU) based hosts (like STM32 etc), ESP-Hosted-FG flavour should be used.
- Although we try to help in porting, We expect users to get the transport interfaces like SDIO/SPI/UART configured on your Linux platform. Device tree configuration and device drivers could be some times tricky as every Linux platform has it different.
- It is relatively easy to port this solution to other Linux based platforms. Please refer Porting Guide for the common steps.
- SDIO Only
- Wi-Fi and Bluetooth, traffic for both runs over SDIO
- SDIO+UART
- Wi-Fi runs over SDIO and Bluetooth runs over UART
- SPI Only
- Wi-Fi and Bluetooth, traffic for both runs over SPI
- SPI+UART
- Wi-Fi runs over SPI and Bluetooth runs over UART
The below table explains which feature is supported on which transport interface for Linux based host.
ESP device | Transport Interface | Wi-Fi support | Bluetooth support |
---|---|---|---|
ESP32 | SDIO | ✓ | ✓ |
SPI | ✓ | ✓ | |
UART | ✕ | ✓ | |
SDIO(WiFi) + UART(BT) | ✓ | ✓ | |
SPI(WiFi) + UART(BT) | ✓ | ✓ | |
ESP32-S2 | |||
SPI | ✓ | ✕ | |
ESP32-S3 | SPI | ✓ | ✓ |
UART | ✕ | ✓ | |
SPI(WiFi) + UART(BT) | ✓ | ✓ | |
ESP32-C2 | SPI | ✓ | ✓ |
UART | ✕ | ✓ | |
SPI(WiFi) + UART(BT) | ✓ | ✓ | |
ESP32-C3 | SPI | ✓ | ✓ |
UART | ✕ | ✓ | |
SPI(WiFi) + UART(BT) | ✓ | ✓ | |
ESP32-C6 | SDIO | ✓ | ✓ |
SPI | ✓ | ✓ | |
UART | ✕ | ✓ | |
SDIO(WiFi) + UART(BT) | ✓ | ✓ | |
SPI(WiFi) + UART(BT) | ✓ | ✓ |
Apart from these features, following features are supported.
- Host sleep
- We have tested this feature with imx8mm-lpddr4-evk. Please refer host_sleep documentation.
This section describes how to set up and use ESP-Hosted-NG solution. Please check Hardware and Software Setup.
This section explains how to setup and use Wi-Fi and BT/BLE. This section assumes the network interface name as wlan0, if wlanX is already available in host, next available number will be assigned.
User space tool such as hostapd/wpa_supplicant/iw is used to setup Wi-Fi.
wlan0
interface can be used either as Station(sta)
or Access Point(AP)
.
wlan0 can't function as both an AP (Access Point) and a Station at the same time, and there are no current plans to add that capability
Following operations for station are supported as of now:
- Scanning
- Connect to AP
- Disconnect from AP
-
To scan nearby APs available, please use
$ sudo iw dev wlan0 scan
Open below fold to connect from three possible ways
Open
Please configure AP in open mode and note the SSID
wpa_supplicant
already running on host operating system can interfere in testing. Execute following commands to prevent this.$ sudo killall wpa_supplicant
- Create wpa supplicant config using template below
$ cat ~/open.conf network={ ssid="MY_OPEN_SSID" key_mgmt=NONE }
⚠️ Do not copy paste this config. Please replaceMY_OPEN_SSID
with AP's SSID
- Start the wpa supplicant for connection
$ sudo wpa_supplicant -D nl80211 -i wlan0 -c ~/open.conf
- Verify the connection status using following command and verify
ESSID:<ssid>
in output$ iwconfig wlan0 wlan0 IEEE 802.11 ESSID:"MY_OPEN_SSID" Mode:Managed Frequency:2.437 GHz Access Point: 00:0A:F5:14:33:5C Retry short limit:7 RTS thr:off Fragment thr:off Power Management:on
- Use dhclient command to get IP. Please note,
dhclient
command may not be available on all Linux. Use DHCP client command supported on your Linux.$ sudo dhclient -v wlan0 Internet Systems Consortium DHCP Client 4.4.1 Copyright 2004-2018 Internet Systems Consortium. All rights reserved. For info, please visit https://www.isc.org/software/dhcp/ Listening on LPF/wlan0/24:6f:28:80:2c:34 Sending on LPF/wlan0/24:6f:28:80:2c:34 Sending on Socket/fallback . DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 7 DHCPOFFER of 192.168.43.32 from 192.168.43.1 DHCPREQUEST for 192.168.43.32 on wlan0 to 255.255.255.255 port 67 DHCPACK of 192.168.43.32 from 192.168.43.1 bound to 192.168.43.32 -- renewal in 1482 seconds.
$ ping <ip address of AP>
WPA/WPA2
Configure and start the AP in WPA or WPA2 or WPA/WPA2 mode. WPA2 is preferred among these. Note the SSID & Password to connect.
wpa_supplicant
already running on host operating system can interfere in testing. Execute following commands to prevent this.$ sudo killall wpa_supplicant
- Generate wpa_supplicant config
$ wpa_passphrase <ssid> <password> > ~/wpa2.conf
- Example config for WPA2
$ wpa_passphrase "MY_WPA2_SSID" "Passphrase" > ~/wpa2.conf $ cat ~/wpa2.conf network={ ssid="MY_WPA2_SSID" #psk="Passphrase" psk=59e0d07fa4c7741797a4e394f38a5c321e3bed51d54ad5fcbd3f84bc7415d73d }
⚠️ Do not copy paste this config
- Start the wpa supplicant for connection
$ sudo wpa_supplicant -D nl80211 -i wlan0 -c ~/wpa2.conf
- Verify the connection status using following command and verify
ESSID:<ssid>
in output$ iwconfig wlan0 wlan0 IEEE 802.11 ESSID:"MY_OPEN_SSID" Mode:Managed Frequency:2.412 GHz Access Point: XX:XX:XX:XX:XX:XX Bit Rate=XXX Mb/s Tx-Power=XX dBm Retry short limit:X RTS thr:off Fragment thr:off Power Management:on Link Quality=70/70 Signal level=-20 dBm Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:25 Missed beacon:0
- Use dhclient command to get IP. Please note,
dhclient
command may not be available on all Linux. Use DHCP client command supported on your Linux.$ sudo dhclient -v wlan0 Internet Systems Consortium DHCP Client 4.4.1 Copyright 2004-2018 Internet Systems Consortium. All rights reserved. For info, please visit https://www.isc.org/software/dhcp/ Listening on LPF/wlan0/24:6f:28:80:2c:34 Sending on LPF/wlan0/24:6f:28:80:2c:34 Sending on Socket/fallback . DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 7 DHCPOFFER of 192.168.43.32 from 192.168.43.1 DHCPREQUEST for 192.168.43.32 on wlan0 to 255.255.255.255 port 67 DHCPACK of 192.168.43.32 from 192.168.43.1 bound to 192.168.43.32 -- renewal in 1482 seconds.
$ ping <ip address of AP>
WPA3
Configure and start the AP in WPA3 mode. Note the SSID & Password to connect.
wpa_supplicant
already running on host operating system can interfere in testing. Execute following commands to prevent this.$ sudo killall wpa_supplicant
- Generate wpa_supplicant config using below template
$ cat ~/wpa3.conf update_config=1 network={ ssid="MY_WPA3_SSID" sae_password="MY_WPA3_Passphrase" key_mgmt=SAE ieee80211w=2 }
Change
MY_WPA3_SSID
to AP's SSID andMY_WPA3_Passphrase
to Passphrase to connectStart the wpa supplicant for connection
$ sudo wpa_supplicant -D nl80211 -i wlan0 -c ~/wpa3.conf
- Verify the connection status using following command and verify
ESSID:<ssid>
in output$ iwconfig wlan0 wlan0 IEEE 802.11 ESSID:"MY_WPA3_SSID" Mode:Managed Frequency:2.412 GHz Access Point: C4:41:1E:BE:F0:B2 Retry short limit:7 RTS thr:off Fragment thr:off Power Management:on
- Use dhclient command to get IP. Please note,
dhclient
command may not be available on all Linux. Use DHCP client command supported on your Linux.$ sudo dhclient -v wlan0 Internet Systems Consortium DHCP Client 4.4.1 Copyright 2004-2018 Internet Systems Consortium. All rights reserved. For info, please visit https://www.isc.org/software/dhcp/ Listening on LPF/wlan0/24:6f:28:80:2c:34 Sending on LPF/wlan0/24:6f:28:80:2c:34 Sending on Socket/fallback . DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 7 DHCPOFFER of 192.168.43.32 from 192.168.43.1 DHCPREQUEST for 192.168.43.32 on wlan0 to 255.255.255.255 port 67 DHCPACK of 192.168.43.32 from 192.168.43.1 bound to 192.168.43.32 -- renewal in 1482 seconds.
$ ping <ip address of AP>
-
Execute following command to disconnect from AP
$ sudo iw dev wlan0 disconnect
-
Verify status using
$ iwconfig wlan0
hostapd (Host Access Point Daemon) is a user-space daemon that enables a Linux-based machine to act as a wireless access point. When combined with dnsmasq, a lightweight DHCP and DNS server, it provides a complete solution for managing Wi-Fi networks, including IP address assignment and name resolution.
make sure you have enabled
ap_support
with rpi_init.sh to user interface as Acess point. Read Hardware and Software Setup
Supported Operations
- Configuring the AP with hostapd
- Managing connections (connect/disconnect)
- Setting up DHCP and DNS with dnsmasq
- Create a Configuration File for hostapd
$ nano ~/hostapd.conf
- Here’s a sample configuration:
interface=wlan0
driver=nl80211
ssid=MY_SSID
hw_mode=g
channel=6
wmm_enabled=0
macaddr_acl=0
auth_algs=1
ignore_broadcast_ssid=0
wpa=2
wpa_key_mgmt=SAE
wpa_passphrase=MY_PASSPHRASE
rsn_pairwise=CCMP
ieee80211w=2
Change
MY_SSID
to AP's SSID andMY_PASSPHRASE
to Passphrase to connect Security can configured by keeping the values ofwpa_key_mgmt
toSAE/WPA-PSK
.
To start the access point, run:
$ sudo hostapd ~/hostapd.conf
To set up DHCP and DNS with dnsmasq, follow these steps:
- Installation
If dnsmasq is not already installed, you can install it using:
$ sudo apt-get install dnsmasq
- Configuration
Create a Configuration File for dnsmasq Edit or create the dnsmasq configuration file:
$ sudo nano /etc/dnsmasq.conf
Sample configuration:
interface=wlan0 # Use the wireless interface
dhcp-range=192.168.1.2,192.168.1.100,255.255.255.0,24h # DHCP range
domain-needed # Don't forward short names
bogus-priv # Never forward addresses in the non-routed address spaces
expand-hosts # Use the expanded hostname
Adjust the dhcp-range to fit your network needs.
Restart dnsmasq
After saving the configuration, restart the dnsmasq service:
$ sudo systemctl restart dnsmasq
With dnsmasq running, clients will automatically receive an IP address when they connect.
Test the connection to ensure it is working:
$ ping <ip address of station>
This documentation provides a comprehensive guide for setting up hostapd and dnsmasq to create a wireless access point with DHCP and DNS capabilities. Adjust configurations as necessary for your network environment.
- Refer Bluetooth/BLE Guide which explains how one can setup and use Bluetooth/BLE.
Following operations for station are supported as of now:
This section explains building blocks of the solution. Following is the detailed system architecture diagram:
Following are the key building blocks of the system:
-
ESP-Hosted-NG Driver
-
ESP-Hosted-NG Firmware
-
Third party components
This runs on host platform and it implements following.
- Transport driver
- Implements transport layer over SDIO/SPI interface.
Communication protocol is explained in further section.
- Implements transport layer over SDIO/SPI interface.
- Network Interface
- Registers Wi-Fi interface
wlan0
with Linux kernel.- This allows exchange of network data packets between Linux kernel and ESP firmware.
- Implements needed cfg80211_ops to support configuration through wpa_supplicant or iw utility
- Registers Wi-Fi interface
- HCI Interface
- Applicable only when SDIO/SPI interface is being used for Bluetooth/BLE support
- Registers HCI interface with the Bluetooth stack running on Linux host
- This facilitates exchange of HCI packets between Linux kernel and ESP firmware
This implements ESP application that runs on ESP boards. It consists of the following.
- ESP-Hosted-NG Application
This implements following:- SDIO/SPI transport layer
- Custom command/response implementation for configuration of Wi-Fi interface
- Data path between Wi-Fi driver of ESP and Host platform
- ESP-IDF Components
ESP firmware mainly uses following components from ESP-IDF. Please check ESP-IDF documentation for more details.- SDIO/SPI/UART slave driver
- Wi-Fi driver
- HCI controller driver
Third components such as following are essential for end to end working of this solution. Implementation or porting of these third party component is not in scope of this project.
- TCP/IP stack
- Bluetooth/BLE stack
- nl80211/cfg80211 kernel module
- User space applications
- Linux UART driver
This section explains transport layer protocol used for communication over SDIO/SPI bus. Please refer following to know more:
This section explains the header that encapsulates the data packets exchanged over SDIO and SPI interfaces.
- Host and peripheral makes use of 12 byte payload header which precedes every data packet.
- This payload header provides additional meta data about the packet. Based on this header, host/peripheral consumes the transmitted data packet.
- Payload format is as below
Field | Length | Description |
---|---|---|
Interface type | 4 bits | Possible values: STA(0), SoftAP(1), HCI (2), Priv interface(3). Rest all values are reserved |
Interface number | 4 bits | Unused |
Flags | 1 byte | Additional flags like MORE_FRAGMENT in fragmentation |
Packet type | 1 byte | Type of packet Data(0), Command_req(1), Command_resp(2), Event(3), EAPOL_frame(4) |
Reserved1 | 1 byte | Not in use |
Packet length | 2 bytes | Actual length of data packet |
Offset to packet | 2 bytes | Offset to the start of the data payload |
Checksum | 2 bytes | Unused as if now |
Reserved2 | 1 byte | Not in use |
Refer Porting Guide which explains how one can port the solution to other Linux host platforms.
Refer RAW throughput guide for verifying connection as well as throughput between host and ESP.
ESP device | Transport Interface | TCP Tx | TCP Rx | UDP Tx | UDP Rx |
---|---|---|---|---|---|
ESP32 | SDIO | 22.9 Mbps | 15.6 Mbps | 45.6 Mbps | 20.4 Mbps |
SPI | 7.47 Mbps | 7.30 Mbps | 7.39 Mbps | 7.32 Mbps | |
ESP32-C3 | SPI | 15.8 Mbps | 15.2 Mbps | 17.1 Mbps | 14.9 Mbps |
Tremendous work to be done ahead! Below is glimpse of upcoming release:
- Functionality
- esp32c5 support
That's right. Being open source, we really appreciate the pull requests. Already raised pull request? Please be patient. We will review and merge your commit into the master.