Lines Matching full:is

19is intended to make it possible to communicate using the TCP/IP protocol suite even on small 8-bit…
29 …P/IP protocol suite has become a global standard for communication. TCP/IP is the underlying proto…
31is designed to have only the absolute minimal set of features needed for a full TCP/IP stack. It c…
32is possible to remove certain TCP/IP mechanisms that are very rarely used in such situations. Many…
34 …resses, to application level protocols such as SMTP that is used to transfer e-mail. The uIP is mo…
35is sent in its own IP packet. The IP packets are sent out on the network by the network device dri…
36 …IP stack is specified in a number of RFC documents published by the Internet Engineering Task Forc…
37 … example of the first kind is "A TCP MUST be able to receive a TCP option in any segment" and an e…
47 uIP requires a few functions to be implemented specifically for the architecture on which uIP is in…
49 …is checksum is made over all bytes in every packet being sent and received it is important that th…
52 …otocol processing. Since 32-bit arithmetic is not natively available on many of the platforms for …
53 While uIP implements a generic 32-bit addition, there is support for having an architecture specifi…
55 In the architectures for which uIP is intended, RAM is the most scarce resource. With only a few ki…
56is large enough to contain one packet of maximum size. When a packet arrives from the network, the…
57is used for incoming packets is also used for the TCP/IP headers of outgoing data. If the applicat…
58 …imultaneous clients, will require more RAM than a simple Telnet server. It is possible to run the …
60is the BSD socket API which is used in most Unix systems and has heavily influenced the Microsoft …
61 …out the overhead of full multi-threading, and a "raw" event-based API that is nore low-level than …
66is invoked in response to certain events. An application running on top of uIP is implemented as a…
67is different from other TCP/IP stacks in that it requires help from the application when doing ret…
68is required. The application checks the retransmission flag and produces the same data that was pr…
70is used to distinguish between different events. The functions are implemented as C macros that wi…
72is called by uIP, the global variable <a class="el" href="a00088.html">uip_conn</a> is set to poin…
74is non-zero, the remote host of the connection has sent new data. The uip_appdata pointer point to…
76 …vertised by the receiver. The amount of buffer space is dictated by the memory configuration. It i…
78 The application can send only one chunk of data at a time on a connection and it is not possible to…
80is invoked, the retransmission timer for each connection is decremented. If the timer reaches zero…
81is not different from how the data originally was sent. Therefor, the application can be written i…
84 …"el" href="a00147.html#gef6c4140c632b6a406779342cf3b6eb6">uip_closed()</a> is true. The applicatio…
88is idle, uIP polls the application every time the periodic timer fires. The application uses the t…
89is to let the application periodically know that a connection is idle, which allows the applicatio…
91is opened for listening with the <a class="el" href="a00147.html#gdd1ab3704ecd4900eec61a6897d32dc8…
94 …nnection to the specified IP address and port the next time the connection is polled by uIP. The <…
96 …ae7240">uip_connect()</a> function returns NULL and the current connection is aborted by <a class=…
115 …his application is shown below. The application is initialized with the function called example1_i…
126 …"ok". Note that this example actually shows a complete uIP application. It is not required for an …
128is slightly more advanced than the previous one, and shows how the application state field in the …
129is similar to the first application in that it listens to a port for incoming connections and resp…
130is implemented. The reason for the increase in complexity is that if data should be lost in the ne…
132 …me!" message and sets it's state to WELCOME-SENT. When the welcome message is acknowledged, the ap…
133is requested to retransmit the last message, it looks at in which state the application is. If the…
134 The implementation of this application is seen below. This configuration settings for the applicati…
179 If the system should run multiple applications, one technique to differentiate between them is to u…
225is sent to the server. Since this is the only data that is sent, the application knows that if it …
226 …t sends this data to the device by using the function device_enqueue(). It is important to note th…
227is full, the application stops the data from the remote host by calling the uIP function <a class=…
270is left to send. When a remote host connects to the application, the local port number is used to …
271 …ion is driven by incoming acknowledgments. When data has been acknowledged, new data can be sent. …
273is useful to be able to utilize the uIP API in a structured way. The following example provides a …
274 The uIP event handler function is shown below.<p>
303 …If so, the appropriate error function is called. Also, if the connection has been closed, the clos…
304is true. The connected() function is called and is supposed to do whatever needs to be done when t…
305 …". To illustrate how to develop an application state machine, this message is sent in two parts, f…
364is waiting for data to arrive from the network, "STATE_HELLO", in which the application is sending…
366 …TATE_WAITING" and the "textlen" variable to be zero, indicating that there is no message to be sen…
367 …vent handler function. The newdata() function will check if the connection is in the "STATE_WAITIN…
368is called whenever data that previously was sent has been acknowleged by the receiving host. This …
369is to be sent. It is called by the event handler function when new data has been received, when da…
370 It is important to note that the senddata() function never should affect the application state; thi…
372 …layers are strictly defined. While the layered approach is a good way to design protocols, it is n…
375 When incoming packets are processed by uIP, the IP layer is the first protocol that examines the pa…
377is implemented using a separate buffer that holds the packet to be reassembled. An incoming fragme…
380is used heavily in many UDP based protocols such as the Microsoft Windows file-sharing SMB protoco…
382 …P protocol is used for reporting soft error conditions and for querying host parameters. Its main …
383is very simple as itis restricted to only implement ICMP echo messages. Replies to echo messages a…
384 …y the ICMP echo message is implemented, there is no support for Path MTU discovery or ICMP redirec…
386is driven by incoming packets and timer events. Incoming packets are parsed by TCP and if the pack…
388is identified by the 16-bit port number and incoming connection requests are checked against the l…
391 The sliding window algorithm uses a lot of 32-bit operations and because 32-bit arithmetic is fairl…
392 It is important to note that even though most TCP implementations use the sliding window algorithm,…
395is implemented using TCP's periodic timer. Each time the periodic timer fires, it increments a cou…
397 …iodic TCP timer. Every time the periodic timer is invoked, the retransmission timer for each conne…
398is required. The application checks the retransmission flag and produces the same data that was pr…
400 The purpose of TCP's flow control mechanisms is to allow communication between hosts with wildly va…
401 … buffer. And application cannot send more data than the amount of bytes it is allowed to send by t…
406 …k parts of the data stream as being more urgent than the normal stream. It is up to the receiving …
409is dominated by the checksum calculation loop, the operation of copying packet data and context sw…
410 …tem. Therefore there is no need to copy data between the TCP/IP stack and the application program.…
411 In such limited systems, the TCP/IP processing overhead is dominated by the copying of packet data …
413 …If no segment is received within a specific time-frame, an acknowledgment is sent. The time-frame …
414 …ait as much as 500 ms before an acknowledgment is sent. This means that the maximum possible throu…
415 …be $p = s / (t + t_d)$ where $s$ is the segment size and $t_d$ is the delayed acknowledgment timeo…
417 The maximum throughput when uIP acts as a receiver is not affected by the delayed acknowledgment th…