Solved

How to implement and use a LWIP in PPC440

Posted on 2010-08-19
6
901 Views
Last Modified: 2012-05-10
Hello,

I would like to know how to implement a LWIP stack in a PPC on a virtex5 FX.
Actually i found a lot of doc on Internet but it's alway too complex for me. I would like to have an input/output to my vhdl design to communicate with a computer via this LWIP.
The easiest example i found was the "echo server", but from that i don't know how to link the receive and send data to my vhdl design.

If someone can give me a good tutorial or example (other than web server) it would be very nice.

Thank you

0
Comment
Question by:DBTechnique
  • 3
  • 3
6 Comments
 
LVL 12

Expert Comment

by:HappyCactus
ID: 33482634
Lwip should be installed on the host operating system. Are you using NIOS? maybe in the documentation page there are some hint or instruction.
When the stack is implemented with the O.S., you can use it as a normal TCPIP stack (with sockets and other stuff)
0
 

Author Comment

by:DBTechnique
ID: 33482881
Ok, maybe my explanation was not so good, so i explain again my problem.

I'm working on the Firmware side of a project (on Xilinx Virtex5 FX). What i have to do is to build a TCP/IP connection, like that we can exchange data from the computer (with a independent SW) and the hardware (using the FW on the FPGA).

What i'm using to do that is a PowerPC440 that is resource of the Virtex5. And i would like to implement a soft-Mac-Ethernet IP to do the job.
The library that is usually (of course there are other) is called lwIP. I found some exemple on the net that use this library to make an embedded sw, but there are too simple or too complex.

So i would like to know if some could explain me how to do that or give me some link on tutorial or example.

Thank you
0
 

Author Comment

by:DBTechnique
ID: 33527182
nobody ??
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 12

Expert Comment

by:HappyCactus
ID: 33529281
I never used lwip, but as far as I can see from the website, it can be used with or without an operating system.

Here: http://www.sics.se/~adam/lwip/os.html 

If I understood correctly, your situation is to have the stack running without an operating system, on a "single threaded application". It's described on the first part of that page.
(sidenote: there is a possibly subtle bug in that code, the check for time elapsed for call to tcp_tmr() should be ">=" instead of "==", because missing one call will lockout all the future time elapsing...)

I would start from that "single loop" application and implement an "echo server", for example. Then if you application is not too complex, I would work starting from that echo server, implementing all required functionality.

if your application is complex, I would think about installing an operating system (such NIOS or linux?)

Hope that helps, sorry for I cannot be more precise.
0
 
LVL 12

Accepted Solution

by:
HappyCactus earned 500 total points
ID: 33529307
Looking around I found that lwip seems to be an outdated project (latest "news" dates 2003). uIP[1] seems to be the evolution of that project, it was ported to many platform (see [2]). If you are not tied to a specific soft processor and architecture, I suggest you to see the ports page and see if you can change cpu/ ethernet controller and have the uIP already ported.

[1] http://www.sics.se/~adam/uip/index.php/Main_Page
[2] http://www.sics.se/~adam/uip/index.php/Ports
0
 

Author Comment

by:DBTechnique
ID: 33634187
thank you
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I'm trying, I really am. But I've seen so many wrong approaches involving date(time) boundaries I despair about my inability to explain it. I've seen quite a few recently that define a non-leap year as 364 days, or 366 days and the list goes on. …
When converting a physical machine to a virtual machine using VMware vCenter Converter Standalone or vCenter Converter Enterprise, if an adapter type is not selected during the initial customization the resulting virtual machine may contain an IDE d…
A short film showing how OnPage and Connectwise integration works.
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now