Solved

loading scsi tape in dos

Posted on 1998-11-11
3
325 Views
Last Modified: 2010-04-27
How do I load a scsi tape device in dos
0
Comment
Question by:jaimem
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 15

Expert Comment

by:jrhelgeson
ID: 1128880
What kind of scsi card do you have?
0
 
LVL 6

Expert Comment

by:joopv
ID: 1128881
Like frhelgeson said, please mention your card brand and also the DOS program you want to use for accessing the tape streamer.

In DOS usually you load the ASPI driver for the scsi card and nothing more.  The backup application knows how to talk ASPI and finds the tape streamer itself.

For example, if you have a NCR810 scsi controller (very popular) you load in CONFIG.SYS :
devicehigh=c:\ncr\aspi8xx.sys
for a cdrom device that is connected to this controller you lthen load:
devicehigh=c:\ncr\symcd.sys /d:BTCD00
and for a HP scanner :
DEVICE=C:\DESKSCAN\SJIIX.SYS
but for a tape streamer you load nothing at all.  DOS Central Point backup for example, knows about ASPI, recognises the aspi8xx driver and communicates directly through aspi with the streamer.

0
 
LVL 6

Accepted Solution

by:
joopv earned 50 total points
ID: 1128882
Did this answer your question ?

0

Featured Post

Ready to trade in that old firewall?

Whether you need to trade-up to a shiny new Firebox or just ready to upgrade from whatever appliance you're using now, WatchGuard has the right appliance for you! Find your perfect Firebox today with appliance sizing tool!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article we have discussed the manual scenarios to recover data from Windows 10 through some backup and recovery tools which are offered by it.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question