pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

SCSI Internal Configuration

Before mounting the device, you’ll need to configure it via the jumper switch located on the rear of the drive.

CD-ReWriter

SCSI ID setting:

CDRW

The three leftmost jumpers are used to configure the drive’s SCSI ID number. This can be assigned a value of 0 through 7.

Usually, 7 is reserved for the SCSI host adapter card and 0 is reserved for a SCSI-based C: hard disk drive.

In this case the associated User Guide directs use of a number between 1 and 6, and advises that the factory setting is 3.

Each peripheral attached to a SCSI-2 host adapter card, as well as the card itself, must be assigned a unique SCSI ID number from 0 to 15 (0 to 7 for SCSI-1). A SCSI ID uniquely identifies each SCSI device on the SCSI bus and determines priority when two or more devices are trying to use the SCSI bus at the same time.

Each device on the chain, including the host, must be identified by a unique ID number. One SCSI device must not use the same ID number as another, but they may be numbered non-sequentially. Most SCSI host adapters feature external and internal connectors, with the option for the chain to extend in either or both directions. There’s no relationship between the IDs and the physical position on the bus, but both ends must be electrically terminated with resistors to prevent signal reflections and guarantee data integrity over long cable lengths. Termination comes in several varieties, from physical jumpers or plugs to software configurations.

Here are some general guidelines for SCSI IDs:

  • For internal SCSI peripherals, the SCSI ID usually is set by configuring a jumper on the peripheral.
  • For external SCSI peripherals, the SCSI ID usually is set with a switch on the back of the peripheral.
  • SCSI ID numbers don’t have to be sequential, as long as the SCSI host adapter card and each peripheral has a different number. For example, you can have an internal SCSI peripheral with ID 0, and an external SCSI peripheral with ID 6. Gaps in the sequence of numbers don’t matter.
  • SCSI ID 7 has the highest priority on the SCSI bus. The priority of the remaining IDs, in descending order, is 6 to 0, 15 to 8.
  • SCSI host adapter cards are normally preset to SCSI ID 7 and should not be changed. This gives it the highest priority on the SCSI bus.
  • Most internal SCSI hard disk drives come from the factory preset to SCSI ID 0.
  • If you have 8-bit SCSI peripherals, they must use SCSI IDs 0, 1, 2, 3, 4, 5, or 6. SCSI ID 0 is recommended for the first SCSI hard disk drive.

Parity setting:

CDRW

  • Parity ON (with a jumper)

    – Parity check will be performed.

  • Parity OFF (without a jumper)

    – Parity check will not be performed.

 

Terminator setting:

CDRW

The terminator setting indicates whether or not a device is the last in the chain:

  • Terminator ON (with a jumper)

    – Use this setting if the CD-ReWriter is the last device in the internal SCSI daisy-chain.

  • Terminator OFF (without a jumper)

    – Use this setting if there are other devices in the internal SCSI daisy chain after the CD-ReWriter.

 

Block Size setting:

CDRW

  • Block Size ON (with a jumper)

    – Block Size is set to 512Byte/sector. Typically used for UNIX workstations.

  • Block Size OFF (without a jumper)

    – The normal setting for Windows PCs.

  • SCSI Adapters
  • SCSI Internal Intro
  • SCSI Internal Configuration
  • SCSI Internal Mounting
  • SCSI Internal Connections
  • SCSI Internal Software
  • SCSI External
  • Installing a SCSI device – making the connections
  • SCSI External Config
  • SCSI External Software

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Google+ (Opens in new window)

Related

Filed Under: How to Install a SCSI Device

Latest Articles

Ensure your IT is Ready for 2016

Ensure your IT is Ready for 2016

With the holidays around the corner, 2016 will be here sooner than you know it. This makes it an excellent time to start thinking about next year’s IT budget, and how to best address your technology needs to keep your practice growing, compliant, and not stifled by outdated IT that distracts you … [Read More...]

The Evolution of Digital Video

Evolution The digitisation of TV can be traced back a quarter of a century to the first digital video effects box, which scaled and rotated live images. This was followed by many expensive digital video devices: stills stores, caption … [Read More...]

Get the Facts on Virtualization

Get the Facts on Virtualization

If you have any kind of involvement with IT in business then you have probably heard of the technology known as virtualization. It is changing the way that a business sets up their IT infrastructure. It is known for its ability to increase efficiency while lowering the costs of the IT budget. But, … [Read More...]


Essential Steps to Restore Lost Macbook Files

MacBooks are gaining tremendous popularity. They might soon overtake the total computers produced by the largest PC manufacturer. Apple reportedly … [Read More...]

Nuances of Bandwidth for Both Webmasters and Internet Users

Online bandwidth is the measurement of the amount of digital information that a medium is capable of processing and transferring. Mediums with higher … [Read More...]

Managing vCard Files for Effective Communication and Branding Optimization

Managing vCard Files for Effective Communication and Branding Optimization

vCard is a file format that is used for digital business cards. There are also vCard editors that allow you to create electronic business cards if you … [Read More...]

Eliminating Common WordPress Vulnerabilities to DDoS Attacks

Distributed Denial of Service (DDoS) attacks are serious threats that every website manager must be prepared for. Unfortunately, some of the most … [Read More...]

Securing Your Privacy Against Deep Packet Inspections

Network administrators, cybersecurity analysts and watchdogs use a variety of different tools to monitor Internet traffic. Deep packet inspection is … [Read More...]

Identifying and Protecting Against the Most Dangerous Keyloggers

Keyloggers are among the most frightening tools in the hands of a skilled hacker. They are malicious devices or malware applications that enable … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

RAID tutorial – maintaining the RAID array

Since the context of this tutorial is a new system build, the configuration of of the RAID array was performed via the RAID Controller's BIOS Setup … [Read More...]

How to Remove Windows Easy Warden

Easiest Removal Option: Remote Repair: Paying an expert to remove this threat is always the easiest option. It's also the most expensive. … [Read More...]

Syncables 360 Review

[starreviewmulti id=5 tpl=20] PROS: Syncables 360 is great for data transfer, whether it is from computer to computer, or phone to computer, it … [Read More...]

Return to top of page

Copyright © 2019 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors