Lines Matching full:is
19 …is intended to make it possible to communicate using the TCP/IP protocol suite even on small 8-bit…
29 …P/IP protocol suite has become a global standard for communication. TCP/IP is the underlying proto…
31 …is designed to have only the absolute minimal set of features needed for a full TCP/IP stack. It c…
32 …is possible to remove certain TCP/IP mechanisms that are very rarely used in such situations. Many…
34 …resses, to application level protocols such as SMTP that is used to transfer e-mail. The uIP is mo…
35 …is sent in its own IP packet. The IP packets are sent out on the network by the network device dri…
36 …IP stack is specified in a number of RFC documents published by the Internet Engineering Task Forc…
37 … example of the first kind is "A TCP MUST be able to receive a TCP option in any segment" and an e…
47 uIP requires a few functions to be implemented specifically for the architecture on which uIP is in…
49 …is checksum is made over all bytes in every packet being sent and received it is important that th…
52 …otocol processing. Since 32-bit arithmetic is not natively available on many of the platforms for …
53 While uIP implements a generic 32-bit addition, there is support for having an architecture specifi…
55 In the architectures for which uIP is intended, RAM is the most scarce resource. With only a few ki…
56 …is large enough to contain one packet of maximum size. When a packet arrives from the network, the…
57 …is used for incoming packets is also used for the TCP/IP headers of outgoing data. If the applicat…
58 …imultaneous clients, will require more RAM than a simple Telnet server. It is possible to run the …
60 …is the BSD socket API which is used in most Unix systems and has heavily influenced the Microsoft …
61 …out the overhead of full multi-threading, and a "raw" event-based API that is nore low-level than …
66 …is invoked in response to certain events. An application running on top of uIP is implemented as a…
67 …is different from other TCP/IP stacks in that it requires help from the application when doing ret…
68 …is required. The application checks the retransmission flag and produces the same data that was pr…
70 …is used to distinguish between different events. The functions are implemented as C macros that wi…
72 …is called by uIP, the global variable <a class="el" href="a00088.html">uip_conn</a> is set to poin…
74 …is non-zero, the remote host of the connection has sent new data. The uip_appdata pointer point to…
76 …vertised by the receiver. The amount of buffer space is dictated by the memory configuration. It i…
78 The application can send only one chunk of data at a time on a connection and it is not possible to…
80 …is invoked, the retransmission timer for each connection is decremented. If the timer reaches zero…
81 …is not different from how the data originally was sent. Therefor, the application can be written i…
84 …"el" href="a00147.html#gef6c4140c632b6a406779342cf3b6eb6">uip_closed()</a> is true. The applicatio…
88 …is idle, uIP polls the application every time the periodic timer fires. The application uses the t…
89 …is to let the application periodically know that a connection is idle, which allows the applicatio…
91 …is opened for listening with the <a class="el" href="a00147.html#gdd1ab3704ecd4900eec61a6897d32dc8…
94 …nnection to the specified IP address and port the next time the connection is polled by uIP. The <…
96 …ae7240">uip_connect()</a> function returns NULL and the current connection is aborted by <a class=…
115 …his application is shown below. The application is initialized with the function called example1_i…
126 …"ok". Note that this example actually shows a complete uIP application. It is not required for an …
128 …is slightly more advanced than the previous one, and shows how the application state field in the …
129 …is similar to the first application in that it listens to a port for incoming connections and resp…
130 …is implemented. The reason for the increase in complexity is that if data should be lost in the ne…
132 …me!" message and sets it's state to WELCOME-SENT. When the welcome message is acknowledged, the ap…
133 …is requested to retransmit the last message, it looks at in which state the application is. If the…
134 The implementation of this application is seen below. This configuration settings for the applicati…
179 If the system should run multiple applications, one technique to differentiate between them is to u…
225 …is sent to the server. Since this is the only data that is sent, the application knows that if it …
226 …t sends this data to the device by using the function device_enqueue(). It is important to note th…
227 …is full, the application stops the data from the remote host by calling the uIP function <a class=…
270 …is left to send. When a remote host connects to the application, the local port number is used to …
271 …ion is driven by incoming acknowledgments. When data has been acknowledged, new data can be sent. …
273 …is useful to be able to utilize the uIP API in a structured way. The following example provides a …
274 The uIP event handler function is shown below.<p>
303 …If so, the appropriate error function is called. Also, if the connection has been closed, the clos…
304 …is true. The connected() function is called and is supposed to do whatever needs to be done when t…
305 …". To illustrate how to develop an application state machine, this message is sent in two parts, f…
364 …is waiting for data to arrive from the network, "STATE_HELLO", in which the application is sending…
366 …TATE_WAITING" and the "textlen" variable to be zero, indicating that there is no message to be sen…
367 …vent handler function. The newdata() function will check if the connection is in the "STATE_WAITIN…
368 …is called whenever data that previously was sent has been acknowleged by the receiving host. This …
369 …is to be sent. It is called by the event handler function when new data has been received, when da…
370 It is important to note that the senddata() function never should affect the application state; thi…
372 …layers are strictly defined. While the layered approach is a good way to design protocols, it is n…
375 When incoming packets are processed by uIP, the IP layer is the first protocol that examines the pa…
377 …is implemented using a separate buffer that holds the packet to be reassembled. An incoming fragme…
380 …is used heavily in many UDP based protocols such as the Microsoft Windows file-sharing SMB protoco…
382 …P protocol is used for reporting soft error conditions and for querying host parameters. Its main …
383 …is very simple as itis restricted to only implement ICMP echo messages. Replies to echo messages a…
384 …y the ICMP echo message is implemented, there is no support for Path MTU discovery or ICMP redirec…
386 …is driven by incoming packets and timer events. Incoming packets are parsed by TCP and if the pack…
388 …is identified by the 16-bit port number and incoming connection requests are checked against the l…
391 The sliding window algorithm uses a lot of 32-bit operations and because 32-bit arithmetic is fairl…
392 It is important to note that even though most TCP implementations use the sliding window algorithm,…
395 …is implemented using TCP's periodic timer. Each time the periodic timer fires, it increments a cou…
397 …iodic TCP timer. Every time the periodic timer is invoked, the retransmission timer for each conne…
398 …is required. The application checks the retransmission flag and produces the same data that was pr…
400 The purpose of TCP's flow control mechanisms is to allow communication between hosts with wildly va…
401 … buffer. And application cannot send more data than the amount of bytes it is allowed to send by t…
406 …k parts of the data stream as being more urgent than the normal stream. It is up to the receiving …
409 …is dominated by the checksum calculation loop, the operation of copying packet data and context sw…
410 …tem. Therefore there is no need to copy data between the TCP/IP stack and the application program.…
411 In such limited systems, the TCP/IP processing overhead is dominated by the copying of packet data …
413 …If no segment is received within a specific time-frame, an acknowledgment is sent. The time-frame …
414 …ait as much as 500 ms before an acknowledgment is sent. This means that the maximum possible throu…
415 …be $p = s / (t + t_d)$ where $s$ is the segment size and $t_d$ is the delayed acknowledgment timeo…
417 The maximum throughput when uIP acts as a receiver is not affected by the delayed acknowledgment th…