Solved

Programming ethernet cards using a driver.

Posted on 1997-05-07
3
369 Views
Last Modified: 2013-12-23
I would like to know the kind of interface a programmer gets when he
wants to write any networking utility using only the driver which
comes with the ethernet card.  For example I use an ne2000 card and
have the ne2000.com driver. Once this driver is loaded,I guess I can
access the card using some interrupts provided by the driver. What are they, where can I find the specific documentation? I believe
this interface should be general for any card .
0
Comment
Question by:ngoel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 

Expert Comment

by:bubster
ID: 1544064
In Windows95, just go to the system menu and  under the network card, check the resources allocated, and  you just need to allocate any free interrupt that is available, if the card is a jumperless one, that is. If you are using it in DOS, you need a setup program to allocate interrupts to it. One such program is lanset.exe, which I can send you if you need it. But, there are plenty of them on the net, just do a search for lanset or netsetup and you will find them.

0
 

Author Comment

by:ngoel
ID: 1544065
I think my question was misunderstood. I was asking from a programmer's point of view. I want to be able to write netwroking
software which directly interfaces with the ethernet card. What I
was asking was that what kind of Programmer's interface does an
ethernet driver like ne2000.com provide ?
0
 
LVL 1

Accepted Solution

by:
nylja earned 100 total points
ID: 1544066
ne2000.com is not intended to be used as a standalone driver, its a driver for the ODI type of interfacing. To get any real use of ne2000.com you should execute lsl.com first, then you have ODI's API's at your disposal.

0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question