Setting Up Warthog’s Network

Warthog is equipped with an 802.11b/g/n compatible Wi-Fi module. On currently-shipping units, this is a Microhard PX2. Warthog does not come equipped with a bluetooth module by default, though an adapter can be connected to the onboard Advantech ARK-3520P PC.

First Connection

By default, Warthog’s wireless is in client mode, looking for the wireless network at the Clearpath factory. In order to set it up to connect to your own network, you’ll have to open up the chassis and connect a network cable to the PC’s STATIC port. The other end of this cable should be connected to your laptop, and you should give yourself an IP address in the 192.168.131.x space, such as 192.168.131.50. Then, make the connection to Warthog’s default static IP:

ssh administrator@192.168.131.1

The default password is clearpath. You should now be logged into Warthog as the administrator user.

Changing the Default Password

Note

All Clearpath robots ship from the factory with their login password set to clearpath. Upon receipt of your robot we recommend changing the password.

To change the password to log into your robot, run the

passwd

command. This will prompt you to enter the current password, followed by the new password twice. While typing the passwords in the passwd prompt there will be no visual feedback (e.g. “*” characters).

To further restrict access to your robot you can reconfigure the robot’s SSH service to disallow logging in with a password and require SSH certificates to log in. This tutorial covers how to configure SSH to disable password-based login.

Connecting to Wifi Access Point

Warthog’s standard wireless network manager is wicd. To connect to an access point in your lab, run:

wicd-curses

You should see a browsable list of networks which the robot has detected. Use arrow keys to select the one you would like to connect to, and then press the right arrow to configure it. You can enter your network’s password near the bottom of the page, and note that you must select the correct encryption scheme; most modern networks use WPA1/2 Passphrase, so if that’s you, make sure that option is selected. You also likely want to select the option to automatically reconnect to this network, so that Warthog will be there for you on your wireless automatically in the future.

When you’re finished, press F10 to save, and then C to connect.

Wicd will tell you in the footer what IP address it was given by your lab’s access point, so you can now log out, remove the network cable, and reconnect over wireless. When you’ve confirmed that all this is working as expected, close up Warthog’s chassis.

Remote ROS Connection

To use ROS desktop tools, you’ll need your computer to be able to connect to Warthog’s ROS master. This can be a tricky process, but we’ve tried to make it as simple as possible.

In order for the ROS tools on your computer to talk to Warthog, they need to know two things:

  • How to find the ROS master, which is set in the ROS_MASTER_URI environment variable, and

  • How processes on the other computer can find your computer, which is the ROS_IP environment variable.

The suggested pattern is to create a file in your home directory called remote-warthog.sh with the following contents:

export ROS_MASTER_URI=http://cpr-warthog-0001:11311  # Warthog's hostname
export ROS_IP=10.25.0.102                          # Your laptop's wireless IP address

If your network doesn’t already resolve Warthog’s hostname to its wireless IP address, you may need to add a corresponding line to your computer’s /etc/hosts file:

10.25.0.101 cpr-warthog-0001

Then, when you’re ready to communicate remotely with Warthog, you can source that script like so, thus defining those two key environment variables in the present context.

source remote-warthog.sh

Now, when you run commands like rostopic list, rostopic echo, rosnode list, and others, the output you see should reflect the activity on Warthog’s ROS master, rather than on your own machine. Once you’ve verified the basics (list, echo) from the prompt, try launching some of the standard visual ROS tools:

roslaunch warthog_viz view_robot.launch
rosrun rqt_robot_monitor rqt_robot_monitor
rosrun rqt_console rqt_console

If there are particular rqt widgets you find yourself using a lot, you may find it an advantage to dock them together and then export this configuration as the default RQT perspective. Then, to bring up your standard GUI, you can simply run:

rqt

Advanced: Hosting a Wifi Access Point

The default network manager, wicd, only supports joining existing networks. It does not support creating its own wireless AP. However, there is experimental support in Warthog for a modern network manager called connman, which does.

Warning

You are unlikely to damage your hardware by switching Warthog from wicd to connman, but it’s possible you could end up with a platform which will need to be reflashed back to the factory state in order to be usable. If you’re comfortable with this and have backed up your data, proceed.

Connman is available through the Ubuntu software repositories, and can be installed by running the following command:

sudo apt-get install connman

Note that there is a similarly-named conman package, which is a serial console manager, not a network manager. Be sure to include two N’s in connman.

Once connman is installed, edit the upstart job file in /etc/init/connman.conf. Suggested configuration:

description "Connection Manager"

start on started dbus
stop on stopping dbus

console log
respawn

exec connmand --nobacktrace -n -c /etc/connman/main.conf -I eth1 -I hci0

And edit connman’s general configuration in /etc/connman/main.conf. Suggested:

[General]
TetheringTechnologies = wifi
PersistentTetheringMode = true

Now, use the connmanctl command-line interface to set up an AP, which connman calls “tethering” mode:

$ connmanctl
connmanctl> enable wifi
connmanctl> tether wifi on Warthog clearpath

If you want to use connman to connect to another AP rather than host:

$ connmanctl
connmanctl> tether wifi off
connmanctl> agent on
connmanctl> scan wifi
connmanctl> services
connmanctl> connect wifi_12345_67890_managed_psk

Use as the argument to connect one of the services listed in the services output. You will be interrogated for the network’s password, which is then cached in /var/lib/connman/.