Ring networks are used e.1 Topologies
In information technology, devices communicate with
one another electrically via cables that can ar-
ranged various configurations; these configurations
are called “topologies”.g.
The most common topologies are presented below,
along with information where position the surge
protective devices each case.
Server
Switch/Hub
Surge protection devices
Star topology
Ring topology
In ring topology, every workstation connected to
precisely one predecessor and one successor via a
ring-shaped network.3.
At its end, the bus must have anechoic closure.3. The surge protection concept
selected must take account the system topology.
IT terminals
Surge protective devices
Bus topology
Star topology
In the star topology, every workstation supplied a
separate cable from central star point (HUB or
Switch).
Typical applications are 10Base2, 10Base5 and ma-
chine controllers such Profibus and telecommunic-
ation systems such ISDN.
Bus topology
In bus topology, all users are connected parallel. Token Ring
applications.
Server
Surge protective devices
Ring topology
TBS
Blitzschutz-Leitfaden
2018
/
en
/
2020/01/10
14:42:40
14:42:40
(LLExport_02613)
/
2020/01/10
14:42:54
14:42:54
218
Chapter The internal lightning protection system
.1. Typical applications include 10BaseT and
100BaseT, but also Gbit applications. one station fails, the entire net-
work fails