Anonymous
Not logged in
Talk
Contributions
Create account
Log in
RS-485
Search
Editing
Daisy chain (electrical engineering)
(section)
From RS-485
Namespaces
Page
Discussion
More
More
Page actions
Read
Edit
Edit source
History
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Types == === Computer hardware === Some hardware can be attached to a computing system in a daisy chain configuration by connecting each component to another similar component, rather than directly to the computing system that uses the component. Only the last component in the chain directly connects to the computing system. For example, chaining multiple components that each have a [[Universal asynchronous receiver/transmitter|UART]] port to each other. The components must also behave cooperatively. e.g., only one seizes the communications bus at a time. * [[SCSI]] is an example of a digital system that is electrically a [[Computer bus|bus]], in the case of external devices, is physically wired as a daisy chain. Since the network is electrically a bus, it must be terminated and this may be done either by plugging a terminator into the last device or selecting an option to make the device terminate internally. * [[MIDI]] devices are usually designed to be wired in a daisy chain. It is normal for a device to have both a THRU port and an OUT port and often both can be used for chaining. The THRU port transmits the information through with minimal delay and no alteration, while the OUT port sends a completely regenerated signal and may add, remove, or change messages, at the cost of some delay in doing so. The difference can result in the signals arriving at different times; if the chain is long enough, it will be distorted so much that the system can become unreliable or non-functional. * Some [[Serial Peripheral Interface Bus]] (SPI) IC products are designed with daisy chain capability. * All [[JTAG]] integrated circuits should support daisy chaining according to JTAG daisy chaining guidelines.<ref>{{Cite web|url=http://www.jtagtest.com/downloads/viatap.pdf|title=ViaTAP user's manual, chapter Design guidelines for use with ViaTAP|url-status=dead|archive-url=https://web.archive.org/web/20170222084446/http://jtagtest.com/downloads/viatap.pdf|archive-date=2017-02-22|access-date=2009-01-08}}</ref> * [[Thunderbolt (interface)]] also supports daisy-chained devices such as [[RAID]] arrays and [[computer monitors]].<ref>{{Cite web|url=https://www.intel.com/content/www/us/en/products/docs/io/thunderbolt/thunderbolt-technology-developer.html|title=Thunderbolt™ for Developers|website=[[Intel]]|language=en|access-date=2020-04-02}}</ref> * [[DisplayPort]] 1.2 and higher features Multi-Stream Transport (MST) mode. In this mode, multiple screens can be connected either using a hub or as a daisy chain. * The [[Hexbus]] is the 10-wire bus of [[Texas Instruments]], used in the [[TI-99/4A]], [[CC-40]] and [[TI-74]]. === Network topology === {{main|Network topology#Daisy chain}} Any particular daisy chain forms one of two network topologies: * Linear topology: For example, A-B-C-D-E, A-B-C-D-E & C-M-N-O (branched at C) are daisy chain. * Ring topology: there is a loop connection back from the last device to the first. For example, A-B-C-D-E-A (loop). This is often called a "daisy chain loop".<ref>{{citation |title=IR3508Z data sheet |quote=The last phase IC is connected back to ... the control IC to complete the daisy chain loop |archive-url=https://web.archive.org/web/20160303230442/http://www.irf.com/product-info/datasheets/data/ir3508zmpbf.pdf |archive-date=2016-03-03 |url=http://www.irf.com/product-info/datasheets/data/ir3508zmpbf.pdf}}</ref><ref>{{cite book |author1=Joel Konicek |author2=Karen Little |title=Security, ID Systems and Locks: The Book on Electronic Access Control|date=1997 |page=170: daisy chain loop illustration |publisher=Butterworth-Heinemann |isbn=978-0-7506-9932-7 |url=https://books.google.com/books?id=9ffCiw9fUncC&dq=%22daisy+chain+loop%22&pg=PA170}}</ref> === System access === {{see also|Jump server}}{{Cite-section|date=October 2021}} Users can daisy chain computing sessions together. Using services such as [[Telnet]] or [[Secure Shell|SSH]], the user creates a session on a second computer via Telnet, and from the second session, Telnets to a third and so on. Another typical example is the "terminal session inside a terminal session" using [[Remote Desktop Protocol]]. Reasons to create daisy chains include connecting to a system on a non-routed network via a gateway system, preserving sessions on the initial computer while working on a second computer, to save bandwidth or improve connectivity on an unstable network by first connecting to a better connected machine. Another reason for creating a daisy chain is to camouflage activity while engaged in [[cybercrime]].
Summary:
Please note that all contributions to RS-485 may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
RS-485:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Navigation
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Wiki tools
Wiki tools
Special pages
Page tools
Page tools
User page tools
More
What links here
Related changes
Page information
Page logs