[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Have you seen this valuable reference about IDE/ATA/DMA ?

Posted on 2001-06-10
2
Medium Priority
?
199 Views
Last Modified: 2010-04-27
    I found this terrific reference this evening.  It
answers many of my questions.  It seems to be a MUST READ
for anyone working with computer hardware configurations.

 http://www.pcguide.com/ref/hdd/if/ide/confCable-c.html

     And here is the basic 40-pin connector scheme.  The
Ultra DMA ribbon cable uses 80 wires, with every other
wire being a ground wire to bleed off stray signals that
might interfere with high speed transmission:

     Pin Signal                    Pin Signal

 1 Drive Reset                 2 Ground
 3 Data Line Bit 7             4 Data Line Bit 8
 5 Data Line Bit 6             6 Data Line Bit 9
 7 Data Line Bit 5             8 Data Line Bit 10
 9 Data Line Bit 4            10 Data Line Bit 11
11 Data Line Bit 3            12 Data Line Bit 12
13 Data Line Bit 2            14 Data Line Bit 13
15 Data Line Bit 1            16 Data Line Bit 14
17 Data Line Bit 0            18 Data Line Bit 15
19 Ground                     20 Keypin (unused)
21 DMA request                22 Ground
23 Write Data                 24 Ground
25 Read Data                  26 Ground
27 I/O channel ready          28 Cable Select/Spindle Sync
29 DMA acknowledge            30 Ground
31 Interrupt Request          32 Host 16 Bit I/O
33 Host Address Bit 1         34 Passed Diagnostics
35 Host Address Bit 0         36 Host Address Bus Bit 2
37 Host Chip Select 0         38 Host Chip Select 1
39 Drive Active/Drive 1 present
                              40 Ground



0
Comment
Question by:pleasenospam
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 12

Accepted Solution

by:
Otta earned 200 total points
ID: 6175888
> Have you seen this valuable reference ?

Yes.  Please award the "points" (all 'zero' of them) assigned to this question to me, since that seems to be the only question that you're asking.  

:-)  :-)  :-)

0
 
LVL 3

Author Comment

by:pleasenospam
ID: 6179869
Otta...

You have been a BIG help to me!

PleaseNoSpam
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Stuck in voice control mode on your Amazon Firestick?  Here is how to turn it off!!!
If you're a modern-day technology professional, you may be wondering if certifications are really necessary. They are. Here's why.
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question