^"New device network topologies - Daisy-chain and daisy-chain with loop"
[1] (页面存档备份,存于互联网档案馆)
^IR3508Z data sheet: "The last phase IC is connected back to ... the control IC to complete the daisy chain loop."
[2] (页面存档备份,存于互联网档案馆)
^Joel Konicek, Karen Little.
"Security, ID systems, and locks: the book on electronic access control"
1997.
p. 170: daisy chain loop illustration.
[3] (页面存档备份,存于互联网档案馆)