Solved

SCSI-2 and different drives

Posted on 1998-04-17
2
169 Views
Last Modified: 2010-04-12
I have a 100% adaptec compatable SCSI-2 card and I was wondering if hard drives like Ultra Wide SCSI, SCSI-3, Wide SCSI and others would work on my SCSI-2 card
0
Comment
Question by:garybrown
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 2

Accepted Solution

by:
datn earned 70 total points
ID: 1134394
Yes it would work. However, you will need special cable adapters to interchange the connections for SCSI-1,2, and 3. Fast SCSI, Wide SCSI, Ultra-Wide SCSI, and Fast Ultra-Wide SCSI are all different variations on SCSI-3.
Also, you will lose the capabilities that SCSI-3 provides, if you connect to a SCSI-2 card. For example, if you connect a SCSI-3 hard drive to your SCSI-2 card, it will work, but only at the SCSI-2 speed of 10MB on an 8-bit bus, instead of the 20MB.
0
 
LVL 2

Expert Comment

by:ViperOne
ID: 1134395
if you're going to use ultrawide SCSI drives, get an adapter that supports it. you would be loosing way too much performance otherwise! Anyway, one of those adapters only costs a little bit more than a SCSI-2 version, and you can connect up to 15 devices!

Greetz,
Simon
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

this article is a guided solution for most of the common server issues in server hardware tasks we are facing in our routine job works. the topics in the following article covered are, 1) dell hardware raidlevel (Perc) 2) adding HDD 3) how t…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question