Solved

strange cable, coms to parallell?

Posted on 2006-10-21
7
271 Views
Last Modified: 2010-04-30
i have this strange cable connected to a
converter (coms serial 9 pin
to 25 pin parallel)

the cable is 40 metres long and carries dos commands via serial
coms port to a tool with a parallel input.

im not sure its a parallel cable is it possible this is
cat 5 wired up with 25 pin connectors??

any ideas?

0
Comment
Question by:usbcrazy1
  • 4
  • 2
7 Comments
 
LVL 70

Accepted Solution

by:
garycase earned 500 total points
ID: 17781799
It's a DB-25 to DB-9 RS-232 serial cable.   RS-232 ports originally used DB-25 connectors --> then PC serial ports started using DB-9's, and that's now much more common.

But I'm sure what you have is simply a serial cable the connects two serial devices ==> I suspect your "... tool with a parallel input" actually has a serial input :-)
0
 
LVL 70

Expert Comment

by:garycase
ID: 17781804
0
 
LVL 70

Expert Comment

by:garycase
ID: 17781813
... another reason I'm sure it's a serial cable:  40 metres is WAY too long for a parallel signal [the IEEE 1284 spec states a maximum cable length of 10 metres]   :-)    (but 40 metres is fine for an RS-232 connection)
0
The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

 
LVL 32

Expert Comment

by:_
ID: 17782682
I will second that.  
0
 

Author Comment

by:usbcrazy1
ID: 17783092
THANK|S GUYS
0
 
LVL 70

Expert Comment

by:garycase
ID: 17784434
You're welcome.
0
 
LVL 32

Expert Comment

by:_
ID: 17786283
: )
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Is it worth it to buy an Echo? In a word, yes! For me it was definitely worth it. I use mine on a daily basis. Prologue & Privacy At first, I was very skeptical about the Amazon Echo. In general, I don't like voice assistants. I don't li…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now