pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Installing a SCSI device – making the connections

Squeeze either side of the connector to connect the supplied SCSI cable to the SCSI host adapter card’s external SCSI connector.

External

Connect the other end to the scanner’s 50-pin DB50 connector …

… and plug in the power adapter power cord

Scanner

The proliferation of SCSI standard versions over the years has led to a situation in which there exist many different types of SCSI cables and connectors. Whilst each new version of SCSI is backwards compatible, it can require a bewildering array of cables, connectors and adapters to connect together a bunch of SCSI peripherals that spans multiple variants of the standard:

Host or Host Adapter Connector
50-pin Centronics:

Most SCSI SLOW (5 MBps) computers and host adapters use the Centronics-type 50-pin connector. Also some 8-bit Fast computers and host adapters.

Centronics
DB25:

Apple/Mac and some older Sun 8-bit workstations.

Centronics
DB50:

Old Sun and DG Computers, Zip drives and many scanners.

Centronics
HD50:

Many 8-bit SCSI FAST (up to 10 MBps) computers and host adapters use this 50-pin High-Density connector.

Centronics
HD68:

All FAST/WIDE (16-bit) SCSI-3 computers and host adapters plus old DEC single-ended SCSI use this 68-pin High Density connector.

Centronics
SCA80:

New Single Connector Attachment 80-pin connector used for Ultra2Wide/LVD, Ultra160 and Ultra32O applications

Centronics

SCSI

It’s possible to connect a number of SCSI devices by creating a daisy-chain, that is, plugging one device into the next.

SCSI

The last device in the chain needs to terminated.

In this case, since it’s going to be the only external SCSI device, the SCSI terminator the scanner was supplied should be left in place.

To ensure reliable communication on the SCSI bus, the end of the chain of devices on the SCSI bus must be properly terminated with resistors to prevent signal reflections and guarantee data integrity over long cable lengths.

In fact, there may be one or two chains. One is the external chain from the external port on the SCSI adapter card, the other is the internal chain, connected from the card’s internal SCSI connector. Termination is accomplished by the peripheral at the end of each cable – or the end of the cable itself – having a terminator installed (or enabled). It is important for devices between the ends of each cable to have their terminators removed (or disabled).

Here are some general guidelines for termination:

  • Termination on internal SCSI peripherals usually is controlled by manually setting a jumper or a switch on the peripheral, or by physically removing or installing one or more resistor modules on the peripheral.
  • Termination on external SCSI peripherals usually is controlled by installing or removing a SCSI terminator. On some external peripherals, termination is controlled by setting a switch on the back of the drive.
  • By default, termination on SCSI host adapter card themselves is automatic.
  • Internal Ultra2 peripherals are set at the factory with termination disabled and cannot be changed. Proper termination for internal Ultra2 peripherals is provided by the built-in terminator at the end of the Ultra2 internal SCSI cable.
  • Most non Ultra2 SCSI peripherals come from the factory with termination enabled.
  • SCSI Adapters
  • SCSI Internal Intro
  • SCSI Internal Configuration
  • SCSI Internal Mounting
  • SCSI Internal Connections
  • SCSI Internal Software
  • SCSI External
  • Installing a SCSI device – making the connections
  • SCSI External Config
  • SCSI External Software

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: How to Install a SCSI Device Tagged With: connecting a SCSI device, connecting a SCSI printer, how to connect SCSI devices

Latest Articles

10 Tips To Keep Your Computer Safe From Hackers And Viruses

There`s a never-ending flow of sophisticated scams and they come in many different disguises, that even the most IT savvy people can get caught in the hacker`s net. From corrupt email links to people calling you claiming to be from your provider, wanting your credit card details or trying to make … [Read More...]

DVD Recordable Formats

There are five recordable versions of DVD: DVD-R for General DVD-R for Authoring DVD-RAM DVD-RW, and DVD+RW. All writable DVD formats include a set of specifications that define a media's physical traits and characteristics. This layer of functionality is … [Read More...]

Cleaning out Your Hard Drive Space and Freeing up Disk Space

Even the newest, fastest, most advanced computers can fall prey to slowdown and space shortage. After all, computers might have higher processing power and more disk space every year but software is also becoming more advanced along with it. For most of us a time will come when we're forced … [Read More...]

The Impact of Modern Technology on Relationships

Technology has changed dating in tremendous ways. It has gradually become more immersed in the modern quest for intimacy. In 1995, only 2% of … [Read More...]

Benefits of Instagram as a Powerful Marketing Tool for B2B Brands

The ever-growing popularity of the social networking app Instagram makes it a popular channel for businesses to launch their services, advertising, … [Read More...]

6 Simple Ways to Improve Security of Windows Computers

Millions of Windows PC users experience some form of cybercrime every year. According to one study, there were 2,953 reported cyberattacks between … [Read More...]

2021 PC Hardware Releases to Bolster Your Gaming

If you are a PC gamer, then chances are you are looking to upgrade your kit over the coming year. However, a lot of money can go into building the … [Read More...]

New Transfer Feature in Dropbox Enable Sharing files with Third Parties

Dropbox has been a popular P2P sharing platform for many years. They don't announce new features as often as other applications, since they have a … [Read More...]

Ransomware Operators Find Data Theft Profitable

How valuable is your data? That’s not a question that organizations or individuals have to ask themselves all that often. You might know the market … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

DRAM – Dynamic Random Access Memory

DRAM chips are large, rectangular arrays of memory cells with support logic that is used for reading and writing data in the arrays, and refresh … [Read More...]

BIOS updates – how to locate the latest BIOS update for your motherboard

The best place to start when trying to locate BIOS updates is your motherboard manufacturer's web site. One way to get to this is via a specialist … [Read More...]

CD-ROM Red Book

The Orange Book defines CD-Recordable discs with multisession capability. Part I defines CD-MO (Magneto Optical) … [Read More...]

[footer_backtotop]

Copyright © 2021 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors