Improve company productivity with a Business Account.Sign Up

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 885
  • Last Modified:

LPT port

It may not be the right place to ask this question, BUT here it is :

I'm in NEED of informations about how does the LPT work, send and recive data

any suggestions or addresses I have to go for ?

Thanks  
anas
0
anas_madani
Asked:
anas_madani
1 Solution
 
hddp666Commented:
Try yahoo, hotbot and other search engines using LPT, parallel port, pinout, etc. There are a lot of articles and papers on ports, including how to write programs to control them.
0
 
tracycCommented:
I hope your in a reading mood......

The LPT port (parallel port or centronics port), sends many bits of data along eight wires at a time as apposed to the serial port
which sends only one bit of data at a time along one wire.

Comming out of the computer through the 25-Pin parallel connection it works like this:

a) A signal on line 13 (the select line) from the printer or whatever tells the computer it is online and ready

b) Data is sent (at around five volts for a 1 and nearly 0 volts for a 0) on lines 2 through 9.

c) Then line one sends a strobe signal to the device to let that device know it should read the data that was just sent.  (This happens very fast!)

d) Line 11 tells the PC if the device is currently to busy to read the data.

e) Line 10 tells the PC that the device has read the data from lines 2 through 9 and is ready for more.

f) Line 12 tells the PC if the printer is out of paper.

g) Line 15 tells the PC that some error condition exests, but doesn't say what.

h) Line 16 is user to cause the printer to reset itself.

i) Line 14 tells the printer to do advance the paper one line for a carriage return when low-voltage is present or just advance one line for line advance code when high voltage is present.

j) Line 17 is only used on some printers that can use it to receive a code from the PC to turn on or off.

Thats pretty much it.    
0
 
MatthewLCommented:
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now