pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Installing a SCSI device – making the connections

Squeeze either side of the connector to connect the supplied SCSI cable to the SCSI host adapter card’s external SCSI connector.

External

Connect the other end to the scanner’s 50-pin DB50 connector …

… and plug in the power adapter power cord

Scanner

The proliferation of SCSI standard versions over the years has led to a situation in which there exist many different types of SCSI cables and connectors. Whilst each new version of SCSI is backwards compatible, it can require a bewildering array of cables, connectors and adapters to connect together a bunch of SCSI peripherals that spans multiple variants of the standard:

Host or Host Adapter Connector
50-pin Centronics:

Most SCSI SLOW (5 MBps) computers and host adapters use the Centronics-type 50-pin connector. Also some 8-bit Fast computers and host adapters.

Centronics
DB25:

Apple/Mac and some older Sun 8-bit workstations.

Centronics
DB50:

Old Sun and DG Computers, Zip drives and many scanners.

Centronics
HD50:

Many 8-bit SCSI FAST (up to 10 MBps) computers and host adapters use this 50-pin High-Density connector.

Centronics
HD68:

All FAST/WIDE (16-bit) SCSI-3 computers and host adapters plus old DEC single-ended SCSI use this 68-pin High Density connector.

Centronics
SCA80:

New Single Connector Attachment 80-pin connector used for Ultra2Wide/LVD, Ultra160 and Ultra32O applications

Centronics

SCSI

It’s possible to connect a number of SCSI devices by creating a daisy-chain, that is, plugging one device into the next.

SCSI

The last device in the chain needs to terminated.

In this case, since it’s going to be the only external SCSI device, the SCSI terminator the scanner was supplied should be left in place.

To ensure reliable communication on the SCSI bus, the end of the chain of devices on the SCSI bus must be properly terminated with resistors to prevent signal reflections and guarantee data integrity over long cable lengths.

In fact, there may be one or two chains. One is the external chain from the external port on the SCSI adapter card, the other is the internal chain, connected from the card’s internal SCSI connector. Termination is accomplished by the peripheral at the end of each cable – or the end of the cable itself – having a terminator installed (or enabled). It is important for devices between the ends of each cable to have their terminators removed (or disabled).

Here are some general guidelines for termination:

  • Termination on internal SCSI peripherals usually is controlled by manually setting a jumper or a switch on the peripheral, or by physically removing or installing one or more resistor modules on the peripheral.
  • Termination on external SCSI peripherals usually is controlled by installing or removing a SCSI terminator. On some external peripherals, termination is controlled by setting a switch on the back of the drive.
  • By default, termination on SCSI host adapter card themselves is automatic.
  • Internal Ultra2 peripherals are set at the factory with termination disabled and cannot be changed. Proper termination for internal Ultra2 peripherals is provided by the built-in terminator at the end of the Ultra2 internal SCSI cable.
  • Most non Ultra2 SCSI peripherals come from the factory with termination enabled.
  • SCSI Adapters
  • SCSI Internal Intro
  • SCSI Internal Configuration
  • SCSI Internal Mounting
  • SCSI Internal Connections
  • SCSI Internal Software
  • SCSI External
  • Installing a SCSI device – making the connections
  • SCSI External Config
  • SCSI External Software

Filed Under: How to Install a SCSI Device Tagged With: connecting a SCSI device, connecting a SCSI printer, how to connect SCSI devices

Latest Articles

Hard Disk Perpendicular Recording

In perpendicular recording, the magnetisation of the bit is aligned vertically - or perpendicularly - in relation to the disk drive's platter. Since the bits do not directly oppose each other, the need for transition packing is significantly reduced. This allows bits to be more closely … [Read More...]

Why VoIP Is Better than Plain Old Telephone Systems

If you have been following the blog lately, you know we have been talking about VoIP a bit lately. We have talked about if you should cut your landline and convert to VoIP. But, today we will pitch our hat into the ring and extoll why we think that VoIP is really the way to go for business these … [Read More...]

12 Best Online Platforms for Self-Education

Self-education has become popular over the past few decades. Students now rely on alternatives to escape the financial burdens imposed by colleges. At the same time, self-education platforms help students gain skills in non-traditional professions. Currently, students worldwide rely on apps and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Identifying and Protecting Against the Most Dangerous Keyloggers

Keyloggers are among the most frightening tools in the hands of a skilled hacker. They are malicious devices or malware applications that enable … [Read More...]

Bluetooth technology

Named after a tenth-century Danish king, Bluetooth is a specification for a small form-factor, low-cost radio solution … [Read More...]

Digital Video Editing

Broadly speaking, there are two types of video editing. One involves editing directly from one tape to another and is called linear editing. The other … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors