EasyManua.ls Logo

Broadcom BCM5722 - Page 7

Broadcom BCM5722
593 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Programmer’s Guide BCM5722
10/15/07
Broadcom Corporation
Document 5722-PG101-R Page vii
Section 7: Transmit Data Flow..........................................................................................74
Introduction ................................................................................................................................................ 74
Send Rings ................................................................................................................................................. 74
Ring Control Block ................................................................................................................................ 75
Host-Based Send Ring ......................................................................................................................... 76
Checksum Offload ..................................................................................................................................... 77
Scatter/Gather ............................................................................................................................................ 78
VLAN Tag Insertion.................................................................................................................................... 79
TX Data Flow Diagram ............................................................................................................................... 79
Section 8: Device Control .................................................................................................82
Initialization ................................................................................................................................................ 82
Description............................................................................................................................................ 82
Initialization Procedure.......................................................................................................................... 82
Shutdown.................................................................................................................................................... 91
Reset ........................................................................................................................................................... 92
Firmware Download................................................................................................................................... 92
Firmware Binary Image......................................................................................................................... 92
Reset RISC Processor.......................................................................................................................... 94
Halt RISC Procedure ............................................................................................................................ 94
Start RISC Procedure ........................................................................................................................... 94
Firmware Download Procedure ............................................................................................................ 95
Example Code Snippet (from ASF Firmware)................................................................................ 96
MAC Address Setup/Configuration.......................................................................................................... 96
Packet Filtering .......................................................................................................................................... 97
Multicast Hash Table Setup/Configuration............................................................................................ 97
Ethernet CRC Calculation..................................................................................................................... 97
Generating CRC ................................................................................................................................... 97
Checking CRC ...................................................................................................................................... 98
Initializing the MAC Hash Registers...................................................................................................... 98
Promiscuous Mode Setup/Configuration .............................................................................................. 99
Broadcast Setup/Configuration........................................................................................................... 100
Memory Maps and Pool Configuration................................................................................................... 101

Table of Contents