Solved

SCSI and SPARC20

Posted on 1997-05-02
5
225 Views
Last Modified: 2013-12-16
I would appreciate any help locating a supplier for the
following items:

1.] external SCSI and Fast SCSI-2 cables
2.] external SCSI TO Fast SCSI-2 cables
3.] SCSI to Fast SCSI-2 convertsion adapter
4.] Splitter cable for SPARC20 serial port
    (to get Ports A and B)
5.] Which port is for modem and which for serial display?

Thanks in advance for your expert advice!
0
Comment
Question by:denmark
  • 2
  • 2
5 Comments
 
LVL 2

Expert Comment

by:pxh
ID: 1812115
Hey, are toiu unca scrootch?

0
 
LVL 2

Expert Comment

by:pxh
ID: 1812116
Hey, are you unca scrootch?
0
 

Author Comment

by:denmark
ID: 1812117
Adjusted points to 15
0
 
LVL 1

Accepted Solution

by:
hrumayor earned 10 total points
ID: 1812118
About the cables any local distributor shuld be able to find you the cables you need, they also sell kits so you could form the cables but they are to many cables, better find them.

About the serial cables i haven seen anny comercaial for sun there must be and your local distributor shuld be able to get one, but you can make one very easely, port A is like a normal serial conector of a db-25, a simple configuration of a is connecting pin 2 to 3 and 3 to 2 and 7 to 7 if you are going to connect it to another computer and 2-2, 3-3, 7-7 if you are going to connect it to a modem, you only have to wory about port B, you cand find information to detail in the answerbook of sun, if you dont have sun's answerbook ask for it, in ther area of modems and serial devices it explains wich are the signals.

about which is a serial and which is a modem port both are what you want, you only have to configure which is which, you can do it by hand with ther SAF (service accses facility) but better use
admintool in the port configuration area. i it should be in /usr/bin/admintool

good luck with your cables.
0
 

Author Comment

by:denmark
ID: 1812119
Thanks!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In tuning file systems on the Solaris Operating System, changing some parameters of a file system usually destroys the data on it. For instance, changing the cache segment block size in the volume of a T3 requires that you delete the existing volu…
Installing FreeBSD… FreeBSD is a darling of an operating system. The stability and usability make it a clear choice for servers and desktops (for the cunning). Savvy?  The Ports collection makes available every popular FOSS application and packag…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now