The surge protection concept
selected must take account the system topology. one station fails, the entire net-
work fails. Typical applications include 10BaseT and
100BaseT, but also Gbit applications.1.
Server
Switch/Hub
Surge protection devices
Star topology
Ring topology
In ring topology, every workstation connected to
precisely one predecessor and one successor via a
ring-shaped network.
IT terminals
Surge protective devices
Bus topology
Star topology
In the star topology, every workstation supplied a
separate cable from central star point (HUB or
Switch).3.3.1 Topologies
In information technology, devices communicate with
one another electrically via cables that can ar-
ranged various configurations; these configurations
are called “topologies”.
Bus topology
In bus topology, all users are connected parallel. Token Ring
applications.
Typical applications are 10Base2, 10Base5 and ma-
chine controllers such Profibus and telecommunic-
ation systems such ISDN.g.
The most common topologies are presented below,
along with information where position the surge
protective devices each case.
At its end, the bus must have anechoic closure. Ring networks are used e.
Server
Surge protective devices
Ring topology
TBS
Blitzschutz-Leitfaden
2018
/
en
/
2020/01/10
14:42:40
14:42:40
(LLExport_02613)
/
2020/01/10
14:42:54
14:42:54
218
Chapter The internal lightning protection system