Solved

Technical Reference about fast-etherenet, CSMA\CD

Posted on 1998-10-05
6
248 Views
Last Modified: 2010-04-27
I'm a student of electronic engineering. I desperately need
information (or Links to one on the web...) about:
    1) Internal Structure of etherenet lan cards
    2) Information about programming drivers for the above.
    3) Using the CSMA\CD protocol and its specifications.

0
Comment
Question by:shim
6 Comments
 
LVL 8

Expert Comment

by:wayneb
ID: 1011158
You may want to look at the following addresses
http://www.ieee.org
http://standards.ieee.org/

You should find most of what you are looking for on these sites.
0
 
LVL 2

Expert Comment

by:estest
ID: 1011159
0
 

Author Comment

by:shim
ID: 1011160
Adjusted points to 200
0
Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

 

Author Comment

by:shim
ID: 1011161
Adjusted points to 225
0
 
LVL 3

Expert Comment

by:brosenb0
ID: 1011162
National Semiconductor manufacture ethernet physical layer controllers. For application notes regarding desiging LAN cards using their components and writing your own drivers, check out: -
http://www.national.com/search/search.cgi/apnotes?keywords=ethernet

Texas instruments manufacture ethernet MAC controllers, including single chip solutions which include a PCI interface and physical layer controller. Check out: -
http://www.ti.com/sc/docs/network/intranet/products/intrap.htm


0
 
LVL 5

Accepted Solution

by:
laeuchli earned 220 total points
ID: 1011163
try going to www.3com.com or check out the online libary at www.mcp.com
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
I designed this idea while studying technology in the classroom.  This is a semester long project.  Students are asked to take photographs on a specific topic which they find meaningful, it can be a place or situation such as travel or homelessness.…

943 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now