Solved

Compaq proliant DL380 SCSI connection

Posted on 2006-11-12
5
631 Views
Last Modified: 2012-05-05
can someone please explain to me the Compaq proliant DL380 SCSI connection.
 I can see 2 SCSI connectors on the motherboard Port1 and Port 2.
cable from Port 2 is going to the SCSI adapter(that has 3 SCSI disks connected to it) + 1 SCSI connector where the cable from port 2 is connected to.

I don't uderstand the cable that runs from port 1 where is connected to.

please explain.

thanks
0
Comment
Question by:jskfan
  • 3
  • 2
5 Comments
 
LVL 55

Expert Comment

by:andyalder
ID: 17925941
Which generation of DL380? they're at G5 now. Part number will help identify it. It's probably cabled to the back of the server for external devices.
0
 

Author Comment

by:jskfan
ID: 17926996
there is a small tape drive and the connector is going from SCSI port 1 to the tape drive connector.

Do tape drive use SCSI ports?
0
 
LVL 55

Expert Comment

by:andyalder
ID: 17927020
Indeed they do use SCSI ports, so that's where the cable goes, under the motherboard to the back where your tape drive is plugged in.
0
 
LVL 55

Accepted Solution

by:
andyalder earned 500 total points
ID: 17929316
Let me try to explain again.
There are two SCSI RAID ports on the 5i controller, both are presented to the front of the motherboard since the disk backplane can be split with 2 drives on one channel and four on the other. Port two also goes to the SCSI connector at the back that has your tape drive plugged in.

You cannot connect to the internal port two when it is in use externally as is the case if you have an external tape drive. There is a connector connectinth the two halves of the SCSI bus together on the backplane in your current scenario since all disks are on channel 1 of the controller.
0
 

Author Comment

by:jskfan
ID: 17929547
I opened the computer case, and was curious to learn about how terminating SCSI is, but I guess it doesn't have termination.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question