Solved

Have you seen this valuable reference about IDE/ATA/DMA ?

Posted on 2001-06-10
2
184 Views
Last Modified: 2010-04-27
    I found this terrific reference this evening.  It
answers many of my questions.  It seems to be a MUST READ
for anyone working with computer hardware configurations.

 http://www.pcguide.com/ref/hdd/if/ide/confCable-c.html

     And here is the basic 40-pin connector scheme.  The
Ultra DMA ribbon cable uses 80 wires, with every other
wire being a ground wire to bleed off stray signals that
might interfere with high speed transmission:

     Pin Signal                    Pin Signal

 1 Drive Reset                 2 Ground
 3 Data Line Bit 7             4 Data Line Bit 8
 5 Data Line Bit 6             6 Data Line Bit 9
 7 Data Line Bit 5             8 Data Line Bit 10
 9 Data Line Bit 4            10 Data Line Bit 11
11 Data Line Bit 3            12 Data Line Bit 12
13 Data Line Bit 2            14 Data Line Bit 13
15 Data Line Bit 1            16 Data Line Bit 14
17 Data Line Bit 0            18 Data Line Bit 15
19 Ground                     20 Keypin (unused)
21 DMA request                22 Ground
23 Write Data                 24 Ground
25 Read Data                  26 Ground
27 I/O channel ready          28 Cable Select/Spindle Sync
29 DMA acknowledge            30 Ground
31 Interrupt Request          32 Host 16 Bit I/O
33 Host Address Bit 1         34 Passed Diagnostics
35 Host Address Bit 0         36 Host Address Bus Bit 2
37 Host Chip Select 0         38 Host Chip Select 1
39 Drive Active/Drive 1 present
                              40 Ground



0
Comment
Question by:pleasenospam
2 Comments
 
LVL 12

Accepted Solution

by:
Otta earned 50 total points
ID: 6175888
> Have you seen this valuable reference ?

Yes.  Please award the "points" (all 'zero' of them) assigned to this question to me, since that seems to be the only question that you're asking.  

:-)  :-)  :-)

0
 
LVL 3

Author Comment

by:pleasenospam
ID: 6179869
Otta...

You have been a BIG help to me!

PleaseNoSpam
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I recently purchased an HP EliteBook 2540p notebook/laptop. It has two video ports on it – VGA and DisplayPort. HP offers an optional docking station for the 2540p that also has both a VGA port and a DisplayPort. There are numerous online reports do…
this article is a guided solution for most of the common server issues in server hardware tasks we are facing in our routine job works. the topics in the following article covered are, 1) dell hardware raidlevel (Perc) 2) adding HDD 3) how t…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now