Home  

Random  

Nearby  



Log in  



Settings  



Donate  



About Wikipedia  

Disclaimers  



Wikipedia





Daisy chain (electrical engineering)





Article  

Talk  



Language  

Watch  

Edit  





In electrical and electronic engineering, a daisy chain is a wiring scheme in which multiple devices are wired together in sequence or in a ring,[1] similar to a garland of daisy flowers. Daisy chains may be used for power, analog signals, digital data, or a combination thereof.

A graphic representation of a daisy chain
Adaisy garland, a chain of daisy flowers
A series of devices connected in a daisy chain layout

The term daisy chain may refer either to large scale devices connected in series, such as a series of power strips plugged into each other to form a single long line of strips, or to the wiring patterns embedded inside of devices. Other examples of devices which can be used to form daisy chains are those based on Universal Serial Bus (USB), FireWire, Thunderbolt and Ethernet cables.

Signal transmission

edit

For analog signals, connections usually consist of a simple electrical bus and, especially in the case of a chain of many devices, may require the use of one or more repeatersoramplifiers within the chain to counteract attenuation (the natural loss of energy in such a system). Digital signals between devices may also travel on a simple electrical bus, in which case a bus terminator may be needed on the last device in the chain. However, unlike analog signals, because digital signals are discrete, they may also be electrically regenerated, but not modified, by any device in the chain.

Types

edit

Computer hardware

edit

Some hardware can be attached to a computing system in a daisy chain configuration by connecting each component to another similar component, rather than directly to the computing system that uses the component. Only the last component in the chain directly connects to the computing system. For example, chaining multiple components that each have a UART port to each other. The components must also behave cooperatively. e.g., only one seizes the communications bus at a time.

Network topology

edit

Any particular daisy chain forms one of two network topologies:

System access

edit

Users can daisy chain computing sessions together. Using services such as TelnetorSSH, the user creates a session on a second computer via Telnet, and from the second session, Telnets to a third and so on. Another typical example is the "terminal session inside a terminal session" using Remote Desktop Protocol. Reasons to create daisy chains include connecting to a system on a non-routed network via a gateway system, preserving sessions on the initial computer while working on a second computer, to save bandwidth or improve connectivity on an unstable network by first connecting to a better connected machine. Another reason for creating a daisy chain is to camouflage activity while engaged in cybercrime.

References

edit
  • ^ "ViaTAP user's manual, chapter Design guidelines for use with ViaTAP" (PDF). Archived from the original (PDF) on 2017-02-22. Retrieved 2009-01-08.
  • ^ "Thunderbolt™ for Developers". Intel. Retrieved 2020-04-02.
  • ^ IR3508Z data sheet (PDF), archived from the original (PDF) on 2016-03-03, The last phase IC is connected back to ... the control IC to complete the daisy chain loop
  • ^ Joel Konicek; Karen Little (1997). Security, ID Systems and Locks: The Book on Electronic Access Control. p. 170: daisy chain loop illustration.

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=Daisy_chain_(electrical_engineering)&oldid=1214811323"
     



    Last edited on 21 March 2024, at 09:40  





    Languages

     


    العربية
    Azərbaycanca
    Dansk
    Deutsch
    Español

    Italiano
    Nederlands

    Simple English
    Српски / srpski
    Türkçe

     

    Wikipedia


    This page was last edited on 21 March 2024, at 09:40 (UTC).

    Content is available under CC BY-SA 4.0 unless otherwise noted.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Terms of Use

    Desktop