Fujitsu MHT2030AT Manual/User Guide - Page 187

PIO Data transferring commands from host to device, Number, Cylinder, and Device/Head registers.

Page 187 highlights

5.4 Command Protocol 5.4.2 PIO Data transferring commands from host to device The execution of the following commands involves Data transfer from the host to the drive. • WRITE SECTOR(S) (EXT) • WRITE LONG • WRITE BUFFER • WRITE VERIFY • SMART WRITE LOG SECTOR • SECURITY DISABLE PASSWORD • SECURITY ERASE UNIT • SECURITY SET PASSWORD • SECURITY UNCLOK The execution of these commands includes the transfer one or more sectors of data from the host to the device. In the WRITE LONG command, 516 bytes are transferred. Following shows the protocol outline. a) The host writes any required parameters to the Features, Sector Count, Sector Number, Cylinder, and Device/Head registers. b) The host writes a command code in the Command register. The drive sets the BSY bit of the Status register. c) When the device is ready to receive the data of the first sector, the device sets DRQ bit and clears BSY bit. d) The host writes one sector of data through the Data register. e) The device clears the DRQ bit and sets the BSY bit. f) When the drive completes transferring the data of the sector, the device clears BSY bit and asserts INTRQ signal. If transfer of another sector is requested, the drive sets the DRQ bit. g) After detecting the INTRQ signal assertion, the host reads the Status register. h) The device resets INTRQ (the interrupt signal). i) If transfer of another sector is requested, steps d) and after are repeated. Figure 5.5 shows an example of WRITE SECTOR(S) command protocol. C141-E192-02EN 5-113

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256

5.4
Command Protocol
C141-E192-02EN
5-113
5.4.2 PIO Data transferring commands from host to device
The execution of the following commands involves Data transfer from the host to
the drive.
WRITE SECTOR(S) (EXT)
WRITE LONG
WRITE BUFFER
WRITE VERIFY
SMART WRITE LOG SECTOR
SECURITY DISABLE PASSWORD
SECURITY ERASE UNIT
SECURITY SET PASSWORD
SECURITY UNCLOK
The execution of these commands includes the transfer one or more sectors of
data from the host to the device.
In the WRITE LONG command, 516 bytes are
transferred.
Following shows the protocol outline.
a)
The host writes any required parameters to the Features, Sector Count, Sector
Number, Cylinder, and Device/Head registers.
b)
The host writes a command code in the Command register. The drive sets the
BSY bit of the Status register.
c)
When the device is ready to receive the data of the first sector, the device sets
DRQ bit and clears BSY bit.
d)
The host writes one sector of data through the Data register.
e)
The device clears the DRQ bit and sets the BSY bit.
f)
When the drive completes transferring the data of the sector, the device clears
BSY bit and asserts INTRQ signal.
If transfer of another sector is requested,
the drive sets the DRQ bit.
g)
After detecting the INTRQ signal assertion, the host reads the Status register.
h)
The device resets INTRQ (the interrupt signal).
i)
If transfer of another sector is requested, steps d) and after are repeated.
Figure 5.5 shows an example of WRITE SECTOR(S) command protocol.