Lines Matching full:an

34 directly to an intranet or even the global Internet. Embedded devices
96 communication between the application and the networking stack. An
98 option in any segment" and an example of the second kind is "There
156 for an architecture specific implementation of the two functions
172 having an architecture specific implementation of the uip_add32()
240 support from an underlying multitasking operating system. Since the
257 The "raw" uIP API uses an event driven interface where the application is
258 invoked in response to certain events. An application running on top
277 the data has to be buffered in memory while waiting for an
285 uIP requires that the application takes an active part in performing
297 the application does not necessarily increase because it takes an
303 that uIP calls whenever an event occurs. Each event has a corresponding
319 which service the connection should provide. For instance, an
320 application might decide to act as an HTTP server if the value of
363 application takes an active part in performing the
378 necessarily increase because it takes an active part in doing
384 uip_close() during an application call. This will cause the connection
413 uIP, and therefore the poll event is the only way to send data on an
439 The function uip_ipaddr() may be used to pack an IP address into the
502 the remote end has sent it data, it responds with an "ok". If the
504 and has to be retransmitted, it also sends an "ok". Note that this
506 for an application to deal with all types of events such as
531 the network. But once the remote host has sent an acknowledgment
533 and knows that any lost data must be an "ok" message. Thus the
542 remote host, it responds by sending an "ok" back.
549 message was an "ok" message and sends such a message.
631 an HTTP request for a file and downloads it to a slow device such a
663 When the connection has been established, an HTTP request is sent to
748 showed here. The program is divided into an uIP event handler function
801 The following very simple application serves as an example of how the
805 develop an application state machine, this message is sent in two
945 holds the packet to be reassembled. An incoming fragment is copied
947 of which fragments have been received. Because the first byte of an IP
948 fragment is aligned on an 8-byte boundary, the bit map requires a
1013 for an acknowledgment for each segment.
1036 each connection that has unacknowledged data in the network. When an
1039 Jacobson's standard TCP RTT estimation function to calculate an
1052 application takes an active part in performing the
1064 the application does not necessarily increase because it takes an
1094 TCP's urgent data mechanism provides an application-to-application
1095 notification mechanism, which can be used by an application to mark
1102 because it requires an asynchronous notification mechanism in an
1103 otherwise synchronous API. As uIP already use an asynchronous event
1119 numerous active connections, packet demultiplexing is also an
1125 data between the TCP/IP stack and the application program. With an
1132 copying, the TCP processing done for an incoming packet involves only
1134 application. Thus an estimate of the CPU overhead of our TCP/IP
1145 time-frame, an acknowledgment is sent. The time-frame can be as high
1151 time, it will wait as much as 500 ms before an acknowledgment is