Test your surge

May 2016 IT infrastructure

Lightning strikes, which are categorised into distant, nearby or direct lightning strikes, may cause transient over voltages. Even if the point of strike is several kilometres away, the energy entering the buildings via the conductors might still destroy electrical and electronic consumer devices. Lightning current arresters provide protection by safely

conducting this high-electric energy to the ground via the equipotential bonding system of the building.

Transient over voltages are not only caused by lightning strikes. Switching operations in high, medium and low-voltage systems are a more frequent cause. They electromagnetically inject interferences into data lines such as those of measuring and controlling equipment. This means that failure may occur even if the conductors are not directly or galvanically connected. These interferences do not present a problem for surge protective devices, which reliably discharge these over-voltages.

As with all electrical and electronic devices, components of surge protective devices are also subject to ageing. In information technology systems, faulty surge protective devices normally interrupt information transmission and the availability of the system to be protected is immediately compromised. Therefore, it is vital to monitor the status of surge protective devices to ensure protection and availability of the systems and to reduce maintenance expenditure.

Future-oriented surge protection technologies in conjunction with adequate testing and monitoring strategies are an important factor for efficiency.

Event based maintenance

This maintenance strategy accepts failure of surge protective devices. The relevant measures are only taken after the device has failed. This is therefore called event-based maintenance or in some sectors, corrective maintenance. To prevent long system downtime, it is important that surge protective devices have the following three features.

• Fail-safe:

Fail: If a surge protective device is damaged by ageing or overload effects, it typically causes a short circuit and thus interruption of the signal transmission.

Safe: Although information transmission is interrupted and system availability is limited, the system is protected.

• Separable surge protective device consisting of protection module and base part:

A separable surge protective device consists of a pluggable module comprising all protection components, and a base part establishing the connection between the protection module and the data lines.

• Make-before-break switch contact in the base part:

If no protection module is plugged into the base part, the integrated switch contact connects the input side of the base part to the output side. Thus, data transmission is also possible without a plugged-in protection module.

Periodic inspection with LifeCheck

The surge protective devices are inspected at regular intervals to detect imminent faults, thus preventing system downtime. Surge protective devices already previously damaged are recognised and can be replaced.

Condition monitoring

The highest degree of protection and permanent availability of systems and installations is indispensable where a relatively high threat to the life or physical condition of persons and high economic risks are present (e.g. nuclear power plants, chemical plants, railway systems, air traffic control, highly modern production facilities).

The more complex and important companies are, the more protected and reliable should the technology be.

For more information contact DEHN Protection South Africa, +27 (0)11 704 1487, alexis.barwise@dehn-africa.com, www.dehn-africa.com


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Converged infrastructure: Beyond the hype
IT infrastructure Products
Technical teams no longer have to sit and try to work through a magnum opus of manuals for every layer of computing, networking, and storage, largely thanks to the growing popularity and increasing success of converged infrastructure.

Blurring the lines between data management and cybersecurity
Cyber Security IT infrastructure
In the past, data management and cybersecurity would fall under separate domains, but with more organisations making the shift to the cloud, data management and data protection have merged, essentially blurring the lines between the two.

Top skills young people need to get ahead in the tech industry in 2023
IT infrastructure
The rise of remote working, e-commerce, artificial intelligence and cloud computing means that software developers are, and will continue to be, at the coalface of the fourth industrial revolution.

Storage trends for 2023
IT infrastructure
As a leader in the enterprise storage market, Infinidat sees five storage trends unfolding in 2023. Looking ahead, 2023 is shaping up to be an exciting year in the storage market.

Remote cloud management support for access points
TRENDnet IT infrastructure Products
TRENDnet Hive is an advanced network cloud management solution, designed to save users time and cost by simplifying and centralizing the management and monitoring of a network(s) and networked devices.

How to avoid a wipeout
Arcserve Southern Africa IT infrastructure Security Services & Risk Management
Wiper malware aims to delete your data permanently and cause as much destruction as possible. Byron Horn-Botha, Business Unit Head at Arcserve Southern Africa offers readers three steps to protect the organisation from these malicious applications.

Hardening physical security against cyberattacks
Genetec Editor's Choice Cyber Security IT infrastructure
As the world becomes increasingly interconnected through the move to cloud computing and Internet of Things (IoT) devices, cybercrime has risen steadily, along with tools to combat it. Geopolitical tensions have the potential to rapidly unleash devastating cyberattacks worldwide.

Fast, reliable and secure cloud services
Technews Publishing Editor's Choice Cyber Security IT infrastructure
Security and speed are critical components of today’s cloud-based services infrastructure. Cloudflare offers a range of services supporting these goals beyond what most people think it does.

Software is South Africa’s most promising business opportunity
Integrated Solutions IT infrastructure
When we talk about software as a business opportunity, we are not just talking about software or IT as a standalone product; deploying computer and network-related solutions to augment traditional processes represents an evolutionary shift in how the world works.

Choosing the right battery backup solution
IT infrastructure
Rectron’s, Matthew Hall, says that when it comes to backup power solutions, there are a number of rechargeable batteries available. The difference lies in their capacity, life span, charging time and price.