Analyse esp_wifi

This commit is contained in:
Florian Hoss 2022-07-20 15:39:15 +02:00
parent e2cb500f97
commit d8a578c4b5
4 changed files with 38 additions and 0 deletions

View file

@ -29,3 +29,11 @@
year = {2022},
url = {https://docs.arduino.cc/learn/built-in-libraries/eeprom}
}
@online{espressif-wifi,
author = {Espressif},
title = {Wi-Fi Driver},
urldate = {2022-07-20},
year = {2022},
url = {https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-guides/wifi.html#wi-fi-driver}
}

View file

@ -55,4 +55,34 @@ After analyzing existing solutions following firewall parameters were implemente
A port can be a maximum of 65565, therefore cannot be of type \verb|uint16_t| but \verb|uint32_t|. Target as well as protocol are enums for the available options. To block a range of ports, there is a \verb|port_from| and \verb|port_to|. The firewall will store all the rules as linked list to dynamically add and remove rules.
\subsection{WiFi Events}
To intercept network packages there is a need to somehow get notified when a new package arrived that needs to be analyzed. Based on the firewall rules, it can pass, gets dropped or rejected.
Available ESP32 WiFi Events can be seen in figure \ref*{fig:WiFi Events}. None of those events support reading incoming packages.
\begin{figure}[H]
\begin{center}
\includegraphics[height=0.9\textheight]{wifi-events}
\caption{WiFi Events}
\label{fig:WiFi Events}
\end{center}
\end{figure}
\cite[cf.][]{espressif-wifi}
\subsection{WiFi Buffer Usage}
Looking at the usage of the DMA buffer (Figure \ref{fig:WiFi Buffer}) of the driver we can see where we have to check for received packages.
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.8\textwidth]{wifi-buffer}
\caption{WiFi Buffer}
\label{fig:WiFi Buffer}
\end{center}
\end{figure}
\cite[cf.][]{espressif-wifi}
\subsection{Benchmark}

Binary file not shown.

After

Width:  |  Height:  |  Size: 20 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 178 KiB