Solved

opencores.com Ethernet core on Altera  - how to connect to male PCI interface?

Posted on 2008-10-18
1
833 Views
Last Modified: 2013-11-13
Hello,

I have some ideas for skipping TCP in a high level application, but first things first - right now I just want to take the "Ethernet MAC 10/100 Mbps" core (http://www.opencores.com/projects.cgi/web/ethmac) and connect it to a regular PC.

I have the following Altera FPGA:
http://www.altera.com/products/devkits/altera/kit-cyc3-starter.html

It's my understanding that a PHY chip is needed that ultimately interfaces with a female RJ-45 connector.

I'm guessing that the "wishbone" interface from the Ethernet core will ultimately be wired to a male PCI interface? Conceptually how does this work? I tried to read the wikipedia entry on wishbone and it sounds like greek to me (my background is VHDL and then higher level languages). I also read somewhere that the Altera's Avalon bus can be used?

At first I thought this was going to be easy.. I though I could just wire 32 of the FPGA's output pins to the 32 PCI pins.. wishful thinking :)
0
Comment
Question by:Juzzam2
1 Comment
 
LVL 6

Accepted Solution

by:
Mc7400 earned 500 total points
ID: 22783887
Hello,

To simplify the life of communications between the components industry has created a bus called WISHBONE bus, just think of it as PCI bus while it is used only between chips CPUs, and SoC. the following link has a brief description.

http://en.wikipedia.org/wiki/Wishbone_(computer_bus)

Now the Ethernet opencore has two interfaces, one interface to connect to PHY and the other to WISHBONE bus to connect it to the RISC and to external memory, as the documentation claims.

Finlay, if your intention to connect the Ethernet to PCI, then opencore has another project to bridge between WISHBONE and PCI; So you can connect the two cores inside the FPGA and go! But not sure if it will work, anyhow in common sense it should work and reach your goals with regards.

HTH
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Go is an acronym of golang, is a programming language developed Google in 2007. Go is a new language that is mostly in the C family, with significant input from Pascal/Modula/Oberon family. Hence Go arisen as low-level language with fast compilation…
Whether you’re a college noob or a soon-to-be pro, these tips are sure to help you in your journey to becoming a programming ninja and stand out from the crowd.
This video teaches viewers about errors in exception handling.
The goal of the tutorial is to teach the user how to use functions in C++. The video will cover how to define functions, how to call functions and how to create functions prototypes. Microsoft Visual C++ 2010 Express will be used as a text editor an…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now