77范文网 - 专业文章范例文档资料分享平台

单片机外文文献1(2)

来源:网络收集 时间:2019-01-07 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:或QQ: 处理(尽可能给您提供完整文档),感谢您的支持与谅解。点击这里给我发消息

When the UDP protocol modules receive packets, first locate the port fields of UDP packets, save the remote and purpose port of the UDP packets, then the compare the objective port of the packet with the port of local regulations, if not equal, discard it; if equal, call the cor-responding function. Finally, set the source port, objec-tive port, data length, checksum field in the header of UDP packet, add datum to be sent, make encapsulation and sending by IP layer. The processing flow of UDP protocol is shown in Figure 6.

4.5 The Implementation of TCP Protocol

Due to the limited resources of singlechip, and to handle TCP packet better, so while implementing the TCP pro-tocol module, we reduced the common TCP/IP protocol, and did not implement the sliding window protocol, flow control and congestion control mechanisms. Meanwhile, we set two TCP connection control block in the TCP protocol modules, and adopt the response mode with single window. When receiving TCP packets, first locate mark field of TCP packets, if the TCP packet is required to build a new connection, check whether still exist spare TCP connection control block in the system. If present, this spare control block will be used as the control block for this connection, and establish connections. Con-versely, if there is no spare TCP connection control block, and do nothing.

When the mark field of the TCP packets is another type, search whether exist TCP connection control block corresponding to the TCP packets. If present, judge ac-cording to the mark field of the value of SYN, FIN, ACK and so on, then choose corresponding function to process packets. If don't exist TCP connection control block cor-responding to the TCP packets, don't do anything. Construction and closing the connection of the TCP protocol are through the \\spe-cific wave\the specific approach. The proc-essing flow of TCP protocol is shown in Figure 7. 5. Testing

In order to test whether the TCP/IP protocol realized can achieve the desired objective, we carried on a series of tests.

The Ping command is the most frequently used in network. This command sends

百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说综合文库单片机外文文献1(2)在线全文阅读。

单片机外文文献1(2).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印 下载失败或者文档不完整,请联系客服人员解决!
本文链接:https://www.77cn.com.cn/wenku/zonghe/411581.html(转载请注明文章来源)
Copyright © 2008-2022 免费范文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ: 邮箱:tiandhx2@hotmail.com
苏ICP备16052595号-18
× 注册会员免费下载(下载后可以自由复制和排版)
注册会员下载
全站内容免费自由复制
注册会员下载
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: