In electrical and electronic engineering, a daisy chain is a wiring scheme in which multiple devices are wired together in sequence or in a ring, similar to a
garland of daisy flowers. Daisy chains may be used for power, analog signals, digital data, or a combination thereof.
The term ''daisy chain'' may refer either to large scale devices connected in series, such as a series of
power strips plugged into each other to form a single long line of strips, or to the wiring patterns embedded inside of devices. Other examples of devices which can be used to form daisy chains are those based on
Universal Serial Bus
Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply (interfacing) between computers, peripherals and other computers. A broad ...
(USB),
FireWire,
Thunderbolt
A thunderbolt or lightning bolt is a symbolic representation of lightning when accompanied by a loud thunderclap. In Indo-European mythology, the thunderbolt was identified with the 'Sky Father'; this association is also found in later Hel ...
and
Ethernet
Ethernet () is a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN). It was commercially introduced in 1980 and first standardized in 198 ...
cables.
Signal transmission
For
analog signals, connections usually consist of a simple
electrical bus and, especially in the case of a
chain of many devices, may require the use of one or more
repeater
In telecommunications, a repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction. Some ...
s or
amplifier
An amplifier, electronic amplifier or (informally) amp is an electronic device that can increase the magnitude of a signal (a time-varying voltage or current). It may increase the power significantly, or its main effect may be to boost t ...
s within the chain to counteract
attenuation
In physics, attenuation (in some contexts, extinction) is the gradual loss of flux intensity through a medium. For instance, dark glasses attenuate sunlight, lead attenuates X-rays, and water and air attenuate both light and sound at variabl ...
(the natural loss of energy in such a system).
Digital signal
A digital signal is a signal that represents data as a sequence of discrete values; at any given time it can only take on, at most, one of a finite number of values. This contrasts with an analog signal, which represents continuous values; at ...
s between devices may also travel on a simple electrical bus, in which case a bus
terminator
Terminator may refer to:
Science and technology
Genetics
* Terminator (genetics), the end of a gene for transcription
* Terminator technology, proposed methods for restricting the use of genetically modified plants by causing second generation s ...
may be needed on the last device in the chain. However, unlike analog signals, because digital signals are
discrete
Discrete may refer to:
*Discrete particle or quantum in physics, for example in quantum theory
*Discrete device, an electronic component with just one circuit element, either passive or active, other than an integrated circuit
*Discrete group, a g ...
, they may also be electrically regenerated, but not modified, by any device in the
chain.
Types
Computer hardware
Some hardware can be attached to a computing system in a daisy chain configuration by connecting each component to another similar component, rather than directly to the computing system that uses the component. Only the last component in the chain directly connects to the computing system. For example, chaining multiple components that each have a
UART
A universal asynchronous receiver-transmitter (UART ) is a computer hardware device for asynchronous serial communication in which the data format and transmission speeds are configurable. It sends data bits one by one, from the least signific ...
port to each other. The components must also behave cooperatively. e.g., only one seizes the communications bus at a time.
*
SCSI
Small Computer System Interface (SCSI, ) is a set of standards for physically connecting and transferring data between computers and peripheral devices. The SCSI standards define commands, protocols, electrical, optical and logical interface ...
is an example of a digital system that is electrically a
bus
A bus (contracted from omnibus, with variants multibus, motorbus, autobus, etc.) is a road vehicle that carries significantly more passengers than an average car or van. It is most commonly used in public transport, but is also in use for cha ...
, in the case of external devices, is physically wired as a daisy chain. Since the network is electrically a bus, it must be terminated and this may be done either by plugging a terminator into the last device or selecting an option to make the device terminate internally.
*
MIDI
MIDI (; Musical Instrument Digital Interface) is a technical standard that describes a communications protocol, digital interface, and electrical connectors that connect a wide variety of electronic musical instruments, computers, and re ...
devices are usually designed to be wired in a daisy chain. It is normal for a device to have both a THRU port and an OUT port and often both can be used for chaining. The THRU port transmits the information through with minimal delay and no alteration, while the OUT port sends a completely regenerated signal and may add, remove, or change messages, at the cost of some delay in doing so. The difference can result in the signals arriving at different times; if the chain is long enough, it will be distorted so much that the system can become unreliable or non-functional.
* Some
Serial Peripheral Interface Bus
The Serial Peripheral Interface (SPI) is a synchronous serial communication interface specification used for short-distance communication, primarily in embedded systems. The interface was developed by Motorola in the mid-1980s and has become a ...
(SPI) IC products are designed with daisy chain capability.
* All
JTAG integrated circuits should support daisy chaining according to JTAG daisy chaining guidelines.
*
Thunderbolt (interface)
Thunderbolt is the brand name of a hardware interface for the connection of external peripherals to a computer. It has been developed by Intel, in collaboration with Apple. It was initially marketed under the name Light Peak, and first sold a ...
also supports daisy-chained devices such as
RAID
Raid, RAID or Raids may refer to:
Attack
* Raid (military), a sudden attack behind the enemy's lines without the intention of holding ground
* Corporate raid, a type of hostile takeover in business
* Panty raid, a prankish raid by male college ...
arrays and
computer monitors
A computer monitor is an output device that displays information in pictorial or textual form. A discrete monitor comprises a visual display, support electronics, power supply, housing, electrical connectors, and external user controls.
The ...
.
* The
Hexbus
The Texas Instruments Hex-Bus interface (sometimes used unhyphenated as Hex Bus and with varying capitalization) was designed in 1982 and intended for commercial release in late 1983. It connects the console to peripherals via a high-speed serial ...
is the 10-wire bus of
Texas Instruments
Texas Instruments Incorporated (TI) is an American technology company headquartered in Dallas, Texas, that designs and manufactures semiconductors and various integrated circuits, which it sells to electronics designers and manufacturers globall ...
, used in the
TI-99/4A
The TI-99/4 and TI-99/4A are home computers released by Texas Instruments in 1979 and 1981, respectively. Based on the Texas Instruments TMS9900 microprocessor originally used in minicomputers, the TI-99/4 was the first 16-bit home computer. ...
,
CC-40
The Compact Computer 40 or CC-40 is a portable computer developed by Texas Instruments. It started development in 1981, and was released in March 1983 for US$249. The CC-40 has a single-line 31 character LCD display, weighs 600 grams (22 ounce ...
and
TI-74
The Texas Instruments TI-74 Basicalc is a type of programmable calculator, which was released in 1985 to replace the Compact Computer 40.
The TI-74's architecture is descended from the never-released TI CC-40 Plus. TI utilized the CC-40 P ...
.
Network topology
Any particular daisy chain forms one of two network topologies:
* Linear topology: For example, A-B-C-D-E, A-B-C-D-E & C-M-N-O (branched at C) are daisy chain.
* Ring topology: there is a loop connection back from the last device to the first. For example, A-B-C-D-E-A (loop). This is often called a "daisy chain loop".
[
Joel Konicek, Karen Little.
"Security, ID systems, and locks: the book on electronic access control"
1997.
p. 170: daisy chain loop illustration]
System access
Users can daisy chain computing sessions together. Using services such as
Telnet
Telnet is an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet contr ...
or
SSH
The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution.
SSH applications are based on ...
, the user creates a session on a second computer via Telnet, and from the second session, Telnets to a third and so on. Another typical example is the "terminal session inside a terminal session" using
RDP. Reasons to create daisy chains include connecting to a system on a non-routed network via a gateway system, preserving sessions on the initial computer while working on a second computer, to save bandwidth or improve connectivity on an unstable network by first connecting to a better connected machine. A less wholesome purpose is camouflaging activity while engaged in
cybercrime
A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing the ...
.
References
{{Computer-bus
Electrical engineering
Installation software
Computer systems