Daisy chain (electrical engineering)
   HOME

TheInfoList



OR:

In electrical and electronic engineering, a daisy chain is a wiring scheme in which multiple devices are wired together in sequence or in a ring, similar to a garland of daisy flowers. Daisy chains may be used for power, analog signals, digital data, or a combination thereof. The term ''daisy chain'' may refer either to large scale devices connected in series, such as a series of power strips plugged into each other to form a single long line of strips, or to the wiring patterns embedded inside of devices. Other examples of devices which can be used to form daisy chains are those based on
Universal Serial Bus Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply (interfacing) between computers, peripherals and other computers. A broad ...
(USB), FireWire,
Thunderbolt A thunderbolt or lightning bolt is a symbolic representation of lightning when accompanied by a loud thunderclap. In Indo-European mythology, the thunderbolt was identified with the 'Sky Father'; this association is also found in later Hel ...
and
Ethernet Ethernet () is a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN). It was commercially introduced in 1980 and first standardized in 1 ...
cables.


Signal transmission

For analog signals, connections usually consist of a simple electrical bus and, especially in the case of a chain of many devices, may require the use of one or more
repeater In telecommunications, a repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction. Som ...
s or
amplifier An amplifier, electronic amplifier or (informally) amp is an electronic device that can increase the magnitude of a signal (a time-varying voltage or current). It may increase the power significantly, or its main effect may be to boost t ...
s within the chain to counteract
attenuation In physics, attenuation (in some contexts, extinction) is the gradual loss of flux intensity through a medium. For instance, dark glasses attenuate sunlight, lead attenuates X-rays, and water and air attenuate both light and sound at variabl ...
(the natural loss of energy in such a system). Digital signals between devices may also travel on a simple electrical bus, in which case a bus
terminator Terminator may refer to: Science and technology Genetics * Terminator (genetics), the end of a gene for transcription * Terminator technology, proposed methods for restricting the use of genetically modified plants by causing second generation s ...
may be needed on the last device in the chain. However, unlike analog signals, because digital signals are
discrete Discrete may refer to: *Discrete particle or quantum in physics, for example in quantum theory *Discrete device, an electronic component with just one circuit element, either passive or active, other than an integrated circuit *Discrete group, a g ...
, they may also be electrically regenerated, but not modified, by any device in the chain.


Types


Computer hardware

Some hardware can be attached to a computing system in a daisy chain configuration by connecting each component to another similar component, rather than directly to the computing system that uses the component. Only the last component in the chain directly connects to the computing system. For example, chaining multiple components that each have a
UART A universal asynchronous receiver-transmitter (UART ) is a computer hardware device for asynchronous serial communication in which the data format and transmission speeds are configurable. It sends data bits one by one, from the least signific ...
port to each other. The components must also behave cooperatively. e.g., only one seizes the communications bus at a time. * SCSI is an example of a digital system that is electrically a
bus A bus (contracted from omnibus, with variants multibus, motorbus, autobus, etc.) is a road vehicle that carries significantly more passengers than an average car or van. It is most commonly used in public transport, but is also in use for cha ...
, in the case of external devices, is physically wired as a daisy chain. Since the network is electrically a bus, it must be terminated and this may be done either by plugging a terminator into the last device or selecting an option to make the device terminate internally. *
MIDI MIDI (; Musical Instrument Digital Interface) is a technical standard that describes a communications protocol, digital interface, and electrical connectors that connect a wide variety of electronic musical instruments, computers, and ...
devices are usually designed to be wired in a daisy chain. It is normal for a device to have both a THRU port and an OUT port and often both can be used for chaining. The THRU port transmits the information through with minimal delay and no alteration, while the OUT port sends a completely regenerated signal and may add, remove, or change messages, at the cost of some delay in doing so. The difference can result in the signals arriving at different times; if the chain is long enough, it will be distorted so much that the system can become unreliable or non-functional. * Some
Serial Peripheral Interface Bus The Serial Peripheral Interface (SPI) is a synchronous serial communication interface specification used for short-distance communication, primarily in embedded systems. The interface was developed by Motorola in the mid-1980s and has become a ...
(SPI) IC products are designed with daisy chain capability. * All JTAG integrated circuits should support daisy chaining according to JTAG daisy chaining guidelines. *
Thunderbolt (interface) Thunderbolt is the brand name of a hardware interface for the connection of external peripherals to a computer. It has been developed by Intel, in collaboration with Apple. It was initially marketed under the name Light Peak, and first sold a ...
also supports daisy-chained devices such as
RAID Raid, RAID or Raids may refer to: Attack * Raid (military), a sudden attack behind the enemy's lines without the intention of holding ground * Corporate raid, a type of hostile takeover in business * Panty raid, a prankish raid by male college ...
arrays and computer monitors. * The
Hexbus The Texas Instruments Hex-Bus interface (sometimes used unhyphenated as Hex Bus and with varying capitalization) was designed in 1982 and intended for commercial release in late 1983. It connects the console to peripherals via a high-speed serial ...
is the 10-wire bus of
Texas Instruments Texas Instruments Incorporated (TI) is an American technology company headquartered in Dallas, Texas, that designs and manufactures semiconductors and various integrated circuits, which it sells to electronics designers and manufacturers globa ...
, used in the
TI-99/4A The TI-99/4 and TI-99/4A are home computers released by Texas Instruments in 1979 and 1981, respectively. Based on the Texas Instruments TMS9900 microprocessor originally used in minicomputers, the TI-99/4 was the first 16-bit home computer. ...
, CC-40 and TI-74.


Network topology

Any particular daisy chain forms one of two network topologies: * Linear topology: For example, A-B-C-D-E, A-B-C-D-E & C-M-N-O (branched at C) are daisy chain. * Ring topology: there is a loop connection back from the last device to the first. For example, A-B-C-D-E-A (loop). This is often called a "daisy chain loop". Joel Konicek, Karen Little. "Security, ID systems, and locks: the book on electronic access control" 1997. p. 170: daisy chain loop illustration


System access

Users can daisy chain computing sessions together. Using services such as
Telnet Telnet is an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet contr ...
or
SSH The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution. SSH applications are based on ...
, the user creates a session on a second computer via Telnet, and from the second session, Telnets to a third and so on. Another typical example is the "terminal session inside a terminal session" using RDP. Reasons to create daisy chains include connecting to a system on a non-routed network via a gateway system, preserving sessions on the initial computer while working on a second computer, to save bandwidth or improve connectivity on an unstable network by first connecting to a better connected machine. A less wholesome purpose is camouflaging activity while engaged in
cybercrime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing th ...
.


References

{{Computer-bus Electrical engineering Installation software Computer systems