Solved

How to implement and use a LWIP in PPC440

Posted on 2010-08-19
6
898 Views
Last Modified: 2012-05-10
Hello,

I would like to know how to implement a LWIP stack in a PPC on a virtex5 FX.
Actually i found a lot of doc on Internet but it's alway too complex for me. I would like to have an input/output to my vhdl design to communicate with a computer via this LWIP.
The easiest example i found was the "echo server", but from that i don't know how to link the receive and send data to my vhdl design.

If someone can give me a good tutorial or example (other than web server) it would be very nice.

Thank you

0
Comment
Question by:DBTechnique
  • 3
  • 3
6 Comments
 
LVL 12

Expert Comment

by:HappyCactus
Comment Utility
Lwip should be installed on the host operating system. Are you using NIOS? maybe in the documentation page there are some hint or instruction.
When the stack is implemented with the O.S., you can use it as a normal TCPIP stack (with sockets and other stuff)
0
 

Author Comment

by:DBTechnique
Comment Utility
Ok, maybe my explanation was not so good, so i explain again my problem.

I'm working on the Firmware side of a project (on Xilinx Virtex5 FX). What i have to do is to build a TCP/IP connection, like that we can exchange data from the computer (with a independent SW) and the hardware (using the FW on the FPGA).

What i'm using to do that is a PowerPC440 that is resource of the Virtex5. And i would like to implement a soft-Mac-Ethernet IP to do the job.
The library that is usually (of course there are other) is called lwIP. I found some exemple on the net that use this library to make an embedded sw, but there are too simple or too complex.

So i would like to know if some could explain me how to do that or give me some link on tutorial or example.

Thank you
0
 

Author Comment

by:DBTechnique
Comment Utility
nobody ??
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 12

Expert Comment

by:HappyCactus
Comment Utility
I never used lwip, but as far as I can see from the website, it can be used with or without an operating system.

Here: http://www.sics.se/~adam/lwip/os.html

If I understood correctly, your situation is to have the stack running without an operating system, on a "single threaded application". It's described on the first part of that page.
(sidenote: there is a possibly subtle bug in that code, the check for time elapsed for call to tcp_tmr() should be ">=" instead of "==", because missing one call will lockout all the future time elapsing...)

I would start from that "single loop" application and implement an "echo server", for example. Then if you application is not too complex, I would work starting from that echo server, implementing all required functionality.

if your application is complex, I would think about installing an operating system (such NIOS or linux?)

Hope that helps, sorry for I cannot be more precise.
0
 
LVL 12

Accepted Solution

by:
HappyCactus earned 500 total points
Comment Utility
Looking around I found that lwip seems to be an outdated project (latest "news" dates 2003). uIP[1] seems to be the evolution of that project, it was ported to many platform (see [2]). If you are not tied to a specific soft processor and architecture, I suggest you to see the ports page and see if you can change cpu/ ethernet controller and have the uIP already ported.

[1] http://www.sics.se/~adam/uip/index.php/Main_Page
[2] http://www.sics.se/~adam/uip/index.php/Ports
0
 

Author Comment

by:DBTechnique
Comment Utility
thank you
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
A safe way to clean winsxs folder from your windows server 2008 R2 editions
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now