Solved

USB Cables

Posted on 2016-10-05
4
65 Views
Last Modified: 2016-10-10
I always thought they were 4-pin. +5V, GND, Data+ and Data- but I am seeing "5-pin". What is the 5th pin and when does it come in to play?

   I have also seen some described "with data transfer" almost as it it were something extra.......
0
Comment
Question by:LockDown32
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 16

Expert Comment

by:John Tsioumpris
ID: 41829749
I think you need to check this
The 5th pin is the ID and is used for identification
0
 
LVL 15

Author Comment

by:LockDown32
ID: 41829754
How about a little more detail? The normal USB 2.0 computer cables have the pinouts as I stated above. So the 5-pin is only applicable to the mini and micro? Are those cables 5-pin on the computer side? What is the ID used for?
0
 
LVL 16

Accepted Solution

by:
John Tsioumpris earned 250 total points
ID: 41829779
Here you are.
The 5th pin defines the kind of device so one is the host and the other is the peripheral.
0
 
LVL 92

Assisted Solution

by:nobus
nobus earned 250 total points
ID: 41831221
>>   I have also seen some described "with data transfer  <<  that probably relates to usb battery chargers ( they don't have/need data - only power)
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question