one station fails, the entire net-
work fails.
Server
Surge protective devices
Ring topology
TBS
Blitzschutz-Leitfaden
2018
/
en
/
2020/01/10
14:42:40
14:42:40
(LLExport_02613)
/
2020/01/10
14:42:54
14:42:54
218
Chapter The internal lightning protection system
.1 Topologies
In information technology, devices communicate with
one another electrically via cables that can ar-
ranged various configurations; these configurations
are called “topologies”.3. Typical applications include 10BaseT and
100BaseT, but also Gbit applications.
Server
Switch/Hub
Surge protection devices
Star topology
Ring topology
In ring topology, every workstation connected to
precisely one predecessor and one successor via a
ring-shaped network.
Bus topology
In bus topology, all users are connected parallel.
At its end, the bus must have anechoic closure.3.1.g.
IT terminals
Surge protective devices
Bus topology
Star topology
In the star topology, every workstation supplied a
separate cable from central star point (HUB or
Switch). Ring networks are used e.
The most common topologies are presented below,
along with information where position the surge
protective devices each case.
Typical applications are 10Base2, 10Base5 and ma-
chine controllers such Profibus and telecommunic-
ation systems such ISDN. The surge protection concept
selected must take account the system topology. Token Ring
applications