pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

SCSI Explained – With Pictures

As with most specifications in the computer world, the original SCSI (pronounced scuzzy) specification was completed (in 1986) after work had already begun on a better version (SCSI-2). It was developed as a result of attempts by Shugart and NCR to develop a new interface for minicomputers. The basis of the interface was, and still is, the set of commands that control data transfer and communication among devices. The commands were the strength of SCSI, because they made the interface intelligent; but they were also its initial weakness, as there wasn’t enough of a standard for the command set to be truly useful to device manufacturers. Consequently, in the mid-1980s, the Common Command Set (CCS) extension was developed to standardise SCSI commands.

SCSI, like EIDE, is a bus which controls the flow of data (I/O) between the computer’s processor and its peripherals, the most common of which is the hard drive. Unlike EIDE, SCSI requires an interface to connect it to a PC’s PCI or ISA bus. This isn’t a controller: it’s correctly called a host dapter. The actual controllers are built into each SCSI device. They chain SCSI peripherals to the SCSI bus via the host adapter.

SCSI’s most obvious strength is the number of devices it can control. Whereas IDE interfaces are restricted to two disk drives, and today’s EIDE interfaces to four devices, which can include hard disks and CD-ROM drives, a SCSI controller can handle up to eight devices (including the host adapter card, which counts as a device). Furthermore, the device can vary from hard disks and CD-ROM drives, to CD-Rs, optical drives, printers, scanners, media changers, network cards and much more.

Each device on the chain, including the host, must be identified by a unique ID number. One SCSI device must not use the same ID number as another, but they may be numbered non-sequentially. Most SCSI host adapters feature external and internal connectors, with the option for the chain to extend in either or both directions. There’s no relationship between the IDs and the physical position on the bus, but both ends must be electrically terminated with resistors to prevent signal reflections and guarantee data integrity over long cable lengths. Termination comes in several varieties, from physical jumpers or plugs to software configurations.

SCSI

Vanilla SCSI supports up to eight devices, using ID numbers 0 to 7. The controlling host adapter traditionally occupies ID 7 and boots the operating system from the device with the lowest ID number. Most SCSI systems set the boot hard drive at ID 0, leaving IDs 1 to 6 free for other non-booting devices. When a SCSI system starts up, all the devices on the bus are listed along with their ID number.

The SCSI host adapter takes up a hardware interrupt request line (IRQ), but the devices attached to the card don’t, which significantly increases expandability. In fact, it’s possible to add a second SCSI card for seven additional devices. Better still, a twin-channel SCSI card takes up only one IRQ and handles up to 15 peripheral devices.

  • What Is The System Bus?
  • ISA Bus – Industry Standard Architecture
  • Local Bus Interfaces
  • PCI Bus Interfaces
  • What is AGP and AGP Pro?
  • Internal Interfaces Summary
  • PCI-X Interfaces
  • PCI Express Interfaces
  • IDE Interfaces
  • EIDE Interfaces
  • Hard Disks – What IS ATA and Ultra ATA?
  • Serial ATA (SATA) interface guide
  • SCSI Explained – With Pictures
  • SCSI Interface Evolution
  • Fibre Channel Interfaces
  • Hard Disks – What is Serial Storage Architecture?
  • I/O Interface Standards
  • How It Works: The Idea and Technology Behind USB
  • IEEE 1394 Interfaces
  • USB 2.0 Intefaces
  • FireWire 800 Interfaces

Filed Under: Interfaces

Latest Articles

6 Healing Healthcare Tech Trends Improving Patient Care in 2021

With cyber taking the name of the game in the pandemic era, healthcare professionals rely more heavily on informational and telehealth technology to treat patients. Thanks to information and telehealth technology, you can improve communication with patients and quality of care. Much healing is … [Read More...]

3 Ways Research is Driving Technology Advances in Security

Cyber security is a growing concern for everyone. It is not just consumers who are at risk, governments and businesses have been victims of cybercrime as well. In order to combat this threat, researchers have been busy trying to find the best ways to protect everyone’s personal information and … [Read More...]

How to Remove Antivirus Antispyware 2011

What is Antivirus Antispyware 2011? Antivirus Antispyware 2011 is a false security client.  This program is a scam and attempts to trick users into purchasing the client How did I get Infected with Antivirus Antispyware 2011? In most cases people get infected from being tricked into … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Color Laser Printers

Laser printers are usually monochrome devices, but as with most mono technologies, laser printing can be adapted to … [Read More...]

AI Companions in Tech: Redefining Personal and Professional Connections?

Image by StartupStockPhotos from Pixabay Today we are seeing AI move beyond the world of science fiction and into our real life on both a … [Read More...]

Phishing Attacks: Don’t take the bait!

Spotting a phishing email isn't as easy as one may think these days, and if you’ve ever clicked a link in one of those misleading emails, you’re not … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors