Lines Matching full:be

19 …The code size is on the order of a few kilobytes and RAM usage can be configured to be as low as a…
20 uIP can be found at the uIP web page: <a href="http://www.sics.se/~adam/uip/">http://www.sics.se/~a…
29 …r even the global Internet. Embedded devices with full TCP/IP support will be first-class network …
30 …ired far too much resources both in terms of code size and memory usage to be useful in small 8 or…
32 …unning distributed peer-to-peer services and protocols. uIP is designed to be RFC compliant in ord…
34 …er protocols will be referred to as "the application". Lower layer protocols are often implemented…
35 …e packet will have to reassemble any fragmented IP packets before they can be passed to higher lay…
37be divided into two categories; those that deal with the host to host communication and those that…
38 …re are only very few applications that make use of those features they can be removed without loss…
40 The uIP stack can be run either as a task in a multitasking system, or as the main program in a sin…
44be invoked by the main control loop. The input handler function will never block, but will return …
47 …res a few functions to be implemented specifically for the architecture on which uIP is intended t…
49 …um is efficient. Most often, this means that the checksum calculation must be fine-tuned for the p…
50 …a87">uip_tcpchksum()</a>. The checksum calculations in those functions can be written in highly op…
52 …he platforms for which uIP is intended, uIP leaves the 32-bit additions to be implemented by the a…
55 …e for the TCP/IP stack to use, mechanisms used in traditional TCP/IP cannot be directly applied.<p>
56be overwritten by the next incoming packet, the application will either have to act immediately on…
58be run. The memory configuration determines both the amount of traffic the system should be able t…
60 …ement, context switching and allocation of stack space for the tasks might be too high in the inte…
66be retransmitted. The application is also periodically polled for new data. The application progra…
67be successfully delivered to the remote end of the connection. If the data needs to be retransmitt…
68be able to regenerate sent data and lets the application take part in retransmissions. uIP does no…
70 The application must be implemented as a C function, <a class="el" href="a00153.html#g41aa744caa469…
72 … can be used, e.g., to distinguish between different services, or to check to which IP address the…
74 …ab41d77c3177">uip_datalen()</a>. The data is not buffered by uIP, but will be overwritten after th…
76 …f47b57ab9f">uip_mss()</a> function to see how much data that actually will be sent by the stack.<p>
77be sent and the length of the data. If the application needs RAM space for producing the actual da…
78 …han once per application invocation; only the data from the last call will be sent.<h4><a class="a…
80be made. As uIP does not keep track of packet contents after they have been sent by the device dri…
81be written in such a way that the same code is used both for sending data and retransmitting data.…
83 …_close()</a> during an application call. This will cause the connection to be cleanly closed. In o…
94 New connections can be opened from within uIP by the function <a class="el" href="a00147.html#g8096…
95 … href="a00148.html#g87f0b54ade0d159fba495089128a4932">uip_ipaddr()</a> may be used to pack an IP a…
96 … If there are not enough TCP connection slots to allow a new connection to be opened, the <a class…
115 …For this application, the configuration variable UIP_APPCALL should be defined to be example1_app(…
126 …cation function was called because data was lost in the network and has to be retransmitted, it al…
130 …lemented. The reason for the increase in complexity is that if data should be lost in the network,…
131 …plication can be sure that the welcome has been received and knows that any lost data must be an "…
179 … of the connection. The example below shows how the two examples above can be combined into one ap…
225 …ws that if it needs to retransmit any data, it is that request that should be retransmitted. It is…
226 …ies the data into its own buffers. The data in the uip_appdata buffer will be overwritten by the n…
227 …0a8bb9d6d0f1f56852ccfccbbad6c5d8">uip_stop()</a>. The application can then be sure that it will no…
229 … to send. If the files are properly formatted, this simple application can be used as a web server…
270be sent and the size of the data that is left to send. When a remote host connects to the applicat…
271 …by incoming acknowledgments. When data has been acknowledged, new data can be sent. If there is no…
273be able to utilize the uIP API in a structured way. The following example provides a structured de…
304be done when the connection is established, such as intializing the application state for the con…
364 …age and the "textlen" length of the text message. The "state" variable can be either "STATE_WAITIN…
366be called when a connection has been established, and in this case sets the "state" variable to be
367be called by the event handler function. The newdata() function will check if the connection is in…
368 …switches state to "STATE_WORLD" and sets up a 7 byte "world!\n" message to be sent. If the applica…
369be sent. It is called by the event handler function when new data has been received, when data has…
370 …ata() function never should affect the application state; this should only be done in the acked() …
377 IP fragment reassembly is implemented using a separate buffer that holds the packet to be reassembl…
378be reassembled, and therefore does not support simultaneous reassembly of more than one packet. Si…
386 …oming packets are parsed by TCP and if the packet contains data that is to be delivered to the app…
388 …stening connections. This list of listening connections is dynamic and can be altered by the appli…
391 …packets will have to be supported by a complex application layer. Instead, uIP allows only a singl…
397 … for each connection is decremented. If the timer reaches zero, a retransmission should be made.<p>
398be retransmitted, it calls the application with a flag set indicating that a retransmission is req…
403 …in the network. The algorithms used for congestion control are designed to be simple to implement …
404 …ght TCP segment per connection, the amount of simultaneous segments cannot be further limited, thu…
406 …m provides an application-to-application notification mechanism, which can be used by an applicati…
409be copied between the kernel space and the address space of the user processes and a context switc…
411 …on. Thus an estimate of the CPU overhead of our TCP/IP implementations can be obtained by calculat…
413 …ithin a specific time-frame, an acknowledgment is sent. The time-frame can be as high as 500 ms bu…
415be $p = s / (t + t_d)$ where $s$ is the segment size and $t_d$ is the delayed acknowledgment timeo…
416be noted, however, that since small systems running uIP are not very likely to have large amounts …