?
Solved

Have you seen this valuable reference about IDE/ATA/DMA ?

Posted on 2001-06-10
2
Medium Priority
?
200 Views
Last Modified: 2010-04-27
    I found this terrific reference this evening.  It
answers many of my questions.  It seems to be a MUST READ
for anyone working with computer hardware configurations.

 http://www.pcguide.com/ref/hdd/if/ide/confCable-c.html

     And here is the basic 40-pin connector scheme.  The
Ultra DMA ribbon cable uses 80 wires, with every other
wire being a ground wire to bleed off stray signals that
might interfere with high speed transmission:

     Pin Signal                    Pin Signal

 1 Drive Reset                 2 Ground
 3 Data Line Bit 7             4 Data Line Bit 8
 5 Data Line Bit 6             6 Data Line Bit 9
 7 Data Line Bit 5             8 Data Line Bit 10
 9 Data Line Bit 4            10 Data Line Bit 11
11 Data Line Bit 3            12 Data Line Bit 12
13 Data Line Bit 2            14 Data Line Bit 13
15 Data Line Bit 1            16 Data Line Bit 14
17 Data Line Bit 0            18 Data Line Bit 15
19 Ground                     20 Keypin (unused)
21 DMA request                22 Ground
23 Write Data                 24 Ground
25 Read Data                  26 Ground
27 I/O channel ready          28 Cable Select/Spindle Sync
29 DMA acknowledge            30 Ground
31 Interrupt Request          32 Host 16 Bit I/O
33 Host Address Bit 1         34 Passed Diagnostics
35 Host Address Bit 0         36 Host Address Bus Bit 2
37 Host Chip Select 0         38 Host Chip Select 1
39 Drive Active/Drive 1 present
                              40 Ground



0
Comment
Question by:pleasenospam
2 Comments
 
LVL 12

Accepted Solution

by:
Otta earned 200 total points
ID: 6175888
> Have you seen this valuable reference ?

Yes.  Please award the "points" (all 'zero' of them) assigned to this question to me, since that seems to be the only question that you're asking.  

:-)  :-)  :-)

0
 
LVL 3

Author Comment

by:pleasenospam
ID: 6179869
Otta...

You have been a BIG help to me!

PleaseNoSpam
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…
Suggested Courses
Course of the Month14 days, 3 hours left to enroll

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question