Daisy chain (information technology)
Encyclopedia
Daisy chain is a term used variously in information technology
Information technology
Information technology is the acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of computing and telecommunications...

. Its meaning differs according to technology domain, although each preserves the traditional meaning of connecting like items to each other in a series or chain.

Computer software

A daisy chain software installation
Installation (computer programs)
Installation of a program is the act of putting the program onto a computer system so that it can be executed....

 can continue in piecemeal fashion. This is of particular use with downloaded software. If the connection to the download server is lost during the installation process, daisy chaining allows installation to restart from where it stopped. Google Pack
Google Pack
Google Pack was a collection of software tools offered by Google to download in a single archive. It was announced at the 2006 Consumer Electronics Show, on January 6. Google Pack is currently only available for Windows XP, Windows Vista, and Windows 7...

 provides this capability.

Computer hardware

Some hardware can be attached to a computing system in a daisy chain configuration by connecting each component to another similar component, rather than directly to the computing system that uses the component. Only the last component in the chain directly connects to the computing system. For example chaining multiple components that each have a UART port to each other. The components must also behave cooperatively. e.g., only one seizes the communications bus at a time. SCSI
SCSI
Small Computer System Interface is a set of standards for physically connecting and transferring data between computers and peripheral devices. The SCSI standards define commands, protocols, and electrical and optical interfaces. SCSI is most commonly used for hard disks and tape drives, but it...

 and Firewire devices can also be daisy chained.

System access

Users can daisy chain computing sessions together. Using services such as telnet
TELNET
Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection...

 or SSH
Secure Shell
Secure Shell is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server and a client...

, the user creates a session on a second computer via telnet, and from the second session, telnets to a third and so on. Another typical example is the "terminal session inside a terminal session" using RDP
Remote Desktop Protocol
Remote Desktop Protocol is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to another computer. The protocol is an extension of the ITU-T T.128 application sharing protocol. Clients exist for most versions of Microsoft Windows , Linux, Unix, Mac OS...

. Reasons to create daisy chains include connecting to a system on a non-routed network via a gateway system, preserving sessions on the initial computer while working on a second computer, to save bandwidth or improve connectivity on an unstable network by first connecting to a better connected machine. A less wholesome purpose is camouflaging activity while engaged in cybercrime
CyberCrime
CyberCrime was an innovative, weekly America television program on TechTV that focused on the dangers facing computer users. Filmed in San Francisco, California, the show was hosted by Alex Wellen and Jennifer London...

.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK