B Layer Infrastructure

Size: px
Start display at page:

Download "B 2.12. Layer Infrastructure"

From this document you will learn the answers to the following questions:

  • What are the security safeguards for IT cabling?

  • What is chosen for the network?

  • What is one way to remove short circuiting?

Transcription

1 Layer Infrastructure B 2.12 B 2.12 IT cabling Description The IT cabling consists of all communication cables and passive components (terminal blocks, splice distributors, patch panels) for which the institution is responsible for operation. It is also the physical basis of the communication network in an institution. The IT cabling extends from the connection points of external networks (e.g. the ISDN connection of a telecommunications provider, DSL connection of an Internet provider) to the terminal points of the network subscribers. Active network components (routers, switches, etc.) are not dealt with in this section. The subject of WLAN is also excluded. Both subjects are treated in separate modules in the IT baseline protection catalogues. In this module, IT cabling refers to the physical basis of a manufacturer and application independent communication network, i.e. a Local Area Network (LAN). This section does not differentiate between IT cables for transporting data and cables for telecommunication services. The IT cabling, as part of the technical infrastructure of buildings and properties, is divided into primary, secondary, and tertiary areas according to the established approaches and procedures for structured cabling systems. The primary area is the area consisting of the cable routes connecting separate buildings. The primary area spans large distances at high data transmission rates between just a few connection points. For this reason, only institutions located on large properties with several buildings own their primary cabling. If there is only one building, then the main power distribution in the building is logically considered the primary area. The secondary area includes the cables between the main distribution in the building and the distributions on each floor or wing of the building. These cables are found in many large buildings. Tertiary cabling designates the cables connecting the terminal devices to a central distribution point (on the same floor, for example). These cables are present in all buildings. A commonly used combination of structured cabling systems is present when the terminal devices are connected directly to a central point in the server room or a room containing technical infrastructure (often called the "Network" or "Technology" room). In this case, the secondary cabling consists only of the connection cables between the switches. The tertiary cabling extends from the central distribution point in the building to the connection sockets in the rooms. Threat Scenarios The following typical threats to the IT baseline protection of the IT cabling are assumed to exist: Force majeure: - T 1.6 Cable fire Organisational shortcomings: - T 2.11 Insufficient route dimensioning - T 2.12 Insufficient documentation on cabling - T 2.32 Inadequate line bandwidth Human error: - T 3.4 Inadmissible connection of cables IT-Grundschutz Catalogues: 9. EL Version

2 Layer Infrastructure B T 3.5 Inadvertent damaging of cables Technical failure: - T 4.4 Impairment of lines due to environmental factors - T 4.5 Crosstalk - T 4.21 Transient currents on shielding Deliberate acts: - T 5.7 Line tapping - T 5.8 Manipulation of lines Recommended security safeguards To secure the IT assets examined, other modules must be implemented in addition to these modules according to the results of the IT baseline protection modelling. In particular, module B Routers and switches is highly pertinent to the IT cabling and must be applied in harmony with this module. If a wireless network is used with the IT equipment examined, then module B 4.6 Wireless LAN also applies. A series of safeguards must be implemented to ensure secure cabling starting in the planning phase, continuing through the implementation phase, and up to operation and contingency planning. The steps to be followed for secure IT cabling as well as the security safeguards to take in each step are listed in the following. It must be taken into account in this case that you have much less ability to influence the safeguarding of IT cabling when moving to an existing building than when constructing a new building. Planning and design The basis for high-performance, well-secured IT cabling is formed already in the planning phase. The starting point is a requirements analysis (refer to S Requirements analysis for IT cabling) in which the current needs are estimated and an overview of the upcoming developments, including a follow-up assessment of the consequences for the IT cabling, is performed in the institution. Based on the requirements plan, the network structure is specified (refer to S 5.2 Selection of an appropriate network topography) and adapted to the building (refer to S 1.21 Sufficient dimensioning of lines). The mechanical and electrical properties of the cables are determined by the types of the cables selected for use. During the planning phase, it should also be ensured that the lines and the control cabinets distributed throughout the building are suitably physically protected against misuse wherever possible. Implementation A major component of fire protection is the proper installation of cable channels, which can then be a significant source of risk when not shielded from fire. When installing the cables, detailed and correct documentation (refer to S 5.4 Documentation on, and marking of, cabling) must be produced since it is almost always very difficult, if not impossible, to determine how a cable is routed or what it connects after all cables have been installed. The IT cables must be installed properly for trouble-free operation (refer to S 1.68 Professional installation). Before operating for the first time, the IT cable installation must be approved (refer to S Technical approval of IT cabling) and the quality of the corresponding documentation must be checked (refer to S 5.4 Documentation on, and marking of, cabling). Operation To prevent the operation of unauthorised IT devices, only those connections and sockets actually in use should be activated. In addition, regular inspections should be performed to ensure that the number IT-Grundschutz Catalogues: 9. EL Version

3 Layer Infrastructure B 2.12 of connections and sockets activated matches the actual number required (refer to S 2.20 Monitoring of existing connections). Furthermore, it must be ensured that the documentation is kept up to date (refer to S Ongoing update and review of network documentation). Disposal When IT cabling components are not required any more, they must be removed (refer to S Removal of IT cabling). Contingency planning If high availability requirements are demanded, then the cables must be installed redundantly, possibly including the external connections, so that damage to a single location will not lead to the failure of all subscriber connections. To accomplish this, redundant cable connections should be installed, if necessary, between buildings (refer to S Redundancies for the primary cabling) and inside of each building (refer to S Redundancies for the secondary and tertiary cabling). In the following, the bundle of security safeguards for the "IT cabling" are presented: Planning and design - S 1.20 (A) Selection of cable types suited in terms of their Physical/mechanical properties - S 1.21 (A) Sufficient dimensioning of lines - S 1.22 (A) Physical protection of lines and distributors - S 1.65 (A) Renewal of IT cabling - S 1.66 (A) Compliance with standards for IT cabling - S (A) Requirements analysis for IT cabling - S (A) Specifications for documentation and labelling of IT cabling - S 5.2 (A) Selection of an appropriate network topography - S 5.3 (A) Selection of cable types appropriate in terms of communications technology Implementation - S 1.9 (A) Fire sealing of trays - S 1.67 (C) Dimensioning and use of cabinet systems - S 1.68 (A) Professional installation - S 1.69 (A) Cabling in server rooms - S 2.19 (B) Neutral documentation in distributors - S 5.4 (A) Documentation on, and marking of, cabling - S 5.5 (A) Damage-minimising routing of cables - S (C) Technical approval of IT cabling Operation - S 1.39 (C) Prevention of transient currents on shielding - S 2.20 (C) Monitoring of existing connections - S 5.1 (B) Removal, or short-circuitting and grounding, of unneeded lines - S (B) Ongoing update and review of network documentation Disposal - S (B) Removal of IT cabling Contingency planning - S (A) Redundancies for the primary cabling - S (A) Redundancies for the secondary and tertiary cabling IT-Grundschutz Catalogues: 9. EL Version

4 Threats Catalogue Force majeure T 1.6 T 1.6 Cable fire When a cable catches fire, either by spontaneous ignition or exposure to flames, there can be a variety of consequences: - When the wire insulation is destroyed, short circuits and arcing can occur, which then triggers the corresponding protection devices (circuit breaker or fuse) and disrupts the supply of power. - Individual wires or the entire cable can break and disconnect. Especially critical is when only the ground conductor (PE) is broken while the live wires (L and N) are still in operation. The protective safeguards will have no effect in this case. An immediate threat is when the PEN conductor fails in a TNC network. The housings of Protection Class 1 devices would suddenly be live in this case. This obviously results in a shock hazard. - Aggressive gases can form. Such gases can be corrosive and adversely affect the IT and communications equipment. They can also be toxic and lead to personal injury (e.g. poisoning). Corrosive gases can also attack structural components of the building in the concrete walls and floors, causing problems with the statics of the building when repairing the damage done by the burning cables. - Cables with non fire-resistant or self-extinguishing insulation material may help to spread the fire. Even fire sealing cannot prevent this completely and merely delays the spreading of the fire. - In tightly packed cable channels and trays, smouldering fires can ignite and remain undetected for a long time, causing the fire to spread long before the fire breaks out. The conductivity of a cable decreases as it gets warmer, which in turn increases the loop resistance. This can generate additional heat that then promotes the continuation of the critical processes. Burning cables often only cause a slight increase in the temperature while the fire is forming. This then creates a risk of generating significant amounts of "cold" smoke before the smoke detectors mounted on the ceiling are triggered. Example: - In an administrative building, the existing electrical cables were not replaced for cost reasons and were overloaded instead, in spite of knowing better. The necessary modifications were not made as the staff were expecting to relocate soon to a new administrative building. - The overloaded lines heated up, and because they were packed so tightly together, heat accumulated and then caused a smouldering fire. The fire was only discovered after the lines failed due to the intense heat. It took several days to restore the workstations affected by the fire to proper operating condition again. Short circuits "Aggressive" gases Spreading through cable ducts IT-Grundschutz Catalogues: 9. EL Version

5 Threats Catalogue Organisational shortcomings T 2.11 T 2.11 Insufficient route dimensioning When planning networks, server rooms or computer centres, the mistake is often made of basing the functionality, capacity, or technical security design on the current requirements only. This fails to take the following into account, though: - the capacities of the network and computers will have to be expanded as the volume of data increases or new services are added, - changes in technical standards may make architectural or technical security modifications necessary, - the network will need to be expanded as the operational requirements change, and - new requirements imposed on a network may make it necessary to lay different cables. Examples: - Networks can only be expanded to the extent permitted by the existing cables installed or by the amount of space available for additional cables. Especially in closed cable routes (conduits, screed-covered underfloor channels, etc.), it is often impossible to pull additional cables through without damaging the new or old cables, even there is still space available. The only alternative then is to pull the existing cables out of the route and re-install all cables, both old and new, at the same time. The resulting costs and disruptions of operation can be considerable. - In the early stages of planning a computer centre, the only criteria considered were aesthetic aspects. Infrastructural and security technical requirements were given less priority and were only specified after the basic construction work was complete. The completion of the building was delayed extensively because required routes were not available and the cable channels and trays were not in the right location or not large enough to handle the required number of cables. Changes during operations later on were very difficult to implement. - After ten years of operation, one company planned a completely new network structure and new IT cabling. Upon inquiry, it turned out that the replacement of the private branch exchange and the PBX cabling, which up to now had followed the same routing as the IT cabling, was planned for the following year. Without co-ordinating these two safeguards, routing work would have been duplicated, and the routes planned may not have had enough capacity. Impossible to swap individual cables Route not planned Poor coordination IT-Grundschutz Catalogues: 9. EL Version

6 Threats Catalogue Organisational shortcomings T 2.12 T 2.12 Insufficient documentation on cabling If the precise locations of any cables are not known due to inadequate documentation, these cables could be damaged when construction work is done inside or outside the building. It cannot be assumed that all cables and lines in the installation zones were installed according to DIN "Electrical installations in residential buildings - Part 3: Wiring and disposition of electrical equipment", or similar standards. In particular, when cable conduits are produced or cables are laid during the concrete construction phase, cables can change position while the concrete is being poured due to changes in the surrounding system. Uncoordinated cabling also often occurs in gypsum board stud constructions. When cables and lines are installed in floors or ceilings, geometric or direct cable routing can be selected. Random cable routes are also possible, so it may be impossible based on the location of the electrical equipment (lamps, switches, tanks, etc.) to determine where cables are routed in the floors and ceilings. Failure due to damaged cables can result in prolonged downtimes, or under some circumstances even in life-threatening hazards, e.g. due to electric shock. Insufficient documentation can also make it more difficult to test, maintain and repair lines. IT-Grundschutz Catalogues: 9. EL Version

7 Threats Catalogue Organisational shortcomings T 2.32 T 2.32 Inadequate line bandwidth A common mistake when planning networks is to base the bandwidth of the network design only on the current requirements. This overlooks the fact that the network are subject to ever-increasing bandwidth requirements, for example when new IT systems are integrated into the network or when the amount of data transmitted increases. When the bandwidth of the network is no longer sufficient, the transmission rate in the network, and eventually the availability in the network, is severely limited for all users. File access in remote IT systems is slowed down considerably, for example, when the network is heavily in use by other users at the same time. Example: Additional PC workstations were added to a building by converting several small offices at a time to open-plan office spaces. The terminal devices were connected to simple hubs and switches in each office and using exposed cables. With the introduction of new system and application software that constantly downloaded updates from the Internet or the organisation s management servers, normal operation was seriously disrupted because the volume of data in the updates exceeded the available line bandwidth. IT-Grundschutz Catalogues: 9. EL Version

8 Threats Catalogue Human failure T 3.4 T 3.4 Inadmissible connection of cables When unauthorised cable connections are made between IT systems or other technical components, there is a risk of security problems or disruptions to operation. For example, unauthorised access to networks, systems, information, or applications can be gained through such unauthorised cable connections. Information or copies of information could also be transmitted to the wrong recipients due to unauthorised cable connections. The normal connection can be disrupted. Unauthorised cable connections can have various causes and effects, for example: - Technical defects - Incorrect cabling of patch panels, terminal blocks, or splice distributors - Incorrect cabling of active network components - Unauthorised connection of external IT systems to a network connection in the LAN Inaccurate documentation and inadequate labelling of cables often results in unintentional connection errors and hampers the detection of deliberate, unauthorised connections. IT-Grundschutz Catalogues: 9. EL Version

9 Threats Catalogue Human failure T 3.5 T 3.5 Inadvertent damaging of cables The less protection afforded to cables when installed, the greater the risk of inadvertent damage. Such damage does not necessarily result in the immediate failure of connections. It is also possible that unauthorised connections could be established accidentally, for example when cable sheathing or insulation is not completely intact any more after being damaged. The following are typical examples of such damage to cables within buildings: - When cables are placed loosely on the floor and are exposed, employees can trip over the cables and disconnect the devices. - Conductors can break in a device connection cable when office furniture is rolled over the cable. - Concealed cables can be damaged by drilling or hammering nails in the wrong location. - Water can cause damage, for example when water permeates into the cable ducts in window sills or floors due to cleaning crews or an open window when it s raining. - Surface-mounted cables can become damaged when transporting heavy, bulky objects. - Cables can become damaged when they are unplugged from the socket by pulling on the cable instead of the plug. - Equipment can become overloaded when, for example, the total load placed on a power distributor by the connected devices exceeds the permissible limit. Outside of buildings, cables can become damaged by the following events, for example: - Cables can be damaged during excavation work, either by shovels when excavating manually or by an excavator. - Water can penetrate into underground cable ducts or buried cables. - Rodents can chew on cables and damage them. - Ducts and cables can be damaged by roots (tree roots are strong enough to crush cables). - The permissible traffic load limits can be exceeded (this can cause broken conduits or sheared cables). - Vehicles can drive over the plug connections of cables laid temporarily for tools and machines. Example: In a pedestrian zone, the cleaning person employed by a small shop had a habit of pouring waste water into the cable inspection manhole outside directly in front of the shop door. The water always evaporated with time, but it took a lot of time and effort to remove the dirt and soap residue deposited on the cables whenever there was work to be done on the cables. IT-Grundschutz Catalogues: 9. EL Version

10 Threats Catalogue Technical failure T 4.4 T 4.4 Impairment of lines due to environmental factors The transmission characteristics of cables transmitting electric signals can be adversely affected by electric and magnetic fields. Whether this will actually lead to a disruption in the transmission of the signal depends mainly on the following factors: - the frequency range, intensity, and duration of exposure to the fields, - the cable shielding, and - the safeguards implemented for data transmission (redundancy, error correction). Many causes of impairment can be identified in advance: - Strong magnetic fields are generated along high-voltage lines and in the vicinity of large engines (railroad, production plant, elevator). - Electromagnetic fields (radio, police/fire department, service radio, paging systems, wireless networks) can be generated in the vicinity of transmitter installations. - In some cases, the transmitting power of mobile telephones exceeds the electromagnetic susceptibility limits of IT systems. - Cables can influence each other through mutual induction. Environmental factors other than just electrical or magnetic fields can also have an effect on a cable: - high temperatures (in industrial production areas, for example), - aggressive gases, and - high mechanical stresses (e.g. on lines to portable devices or when temporarily laying cables on floors). IT-Grundschutz Catalogues: 9. EL Version

11 Threats Catalogue Technical failure T 4.5 T 4.5 Crosstalk Crosstalk is a special type of line impairment. Crosstalk is not usually generated in the environment, but by the currents and voltages of signals transmitted over adjacent lines. The intensity of this effect depends on the cable design (shielding, cable capacity, insulation quality) and on the electrical parameters of the data transmission signal (current, voltage, frequency). Not every line affected by crosstalk will necessarily have an effect on other lines. Checking one s own lines for coupled external signals does not provide any information on whether one s own signals cause crosstalk in other lines and thus allow your signals to be listened in on. The main difference from other types of line faults is that, apart from disruption of signal transmission on adjacent lines, readable information may be available on external lines due to crosstalk. IT-Grundschutz Catalogues: 9. EL Version

12 Threats Catalogue Technical failure T 4.21 T 4.21 Transient currents on shielding When IT devices supplied by electricity via a TN-C network are connected using double-shielded data cable, the result may be transient currents on the shielding (an explanatory diagram can be found in S 1.39 Prevention of transient currents on shielding). The reason for this is that in TN-C networks, the protective (PE) and neutral (N) conductors are routed together to the individual distribution points as a single PEN conductor. The separation into N and PE conductors only takes place first in the distribution. This installation is permissible according to VDE 0100, "Erection of power installations with rated voltages up to 1000 V"! If shielded data lines whose interface shields are connected to PE are used to connect devices and these devices are connected to different distribution points, then the result is two parallel PEN conductors; one between the distributors and one on the shielding between the interfaces. The transient current flowing over the shielding can lead to damage on the interfaces and to a risk of personal injury when working on the data lines. No transient currents flow over the shielding of data lines between devices connected to the same distribution in a TN-C network or between devices connected to different distributions in a TN-S network. In TN-CS networks, some sections are designed as TN-C networks, others as TN-S networks. When the double-shielded data lines are only routed inside sections of the same network type, then the operating conditions in the corresponding network applies. However, if IT devices in different sections are connected using double-shielded data lines, then transient currents can also flow in the TN-S section! IT-Grundschutz Catalogues: 9. EL Version

13 Threats Catalogue Deliberate acts T 5.7 T 5.7 Line tapping Due to the low risk of detection, line tapping is a potential threat to IT security which should not be overlooked. Basically, there is no such thing as a tapproof cable, and the only difference between the cable types is the amount of effort needed to tap the cables. Whether a line is actually being tapped can only be determined using sophisticated instruments. The decision to tap a line basically depends on whether the information that could be obtained is worth the technical and financial expenditure and the risk of detection. This question can only be answered by knowing what capabilities the attacker has and what his or her particular interests are. It is therefore impossible to know for sure what information, and therefore which lines, could be targets for tapping. It can be very easy to tap a line. With some types of LAN cabling, access to a LAN socket may be sufficient to eavesdrop on all the network traffic in the local network. The risk is greater when an attacker has access to passive or perhaps even active connection elements of an IT network. It is even easier to intercept network traffic on wireless networks (wireless LAN / radio LAN, IEEE ). Furthermore, the risk of being detected while listening in on a wireless network is virtually nil. The insecure transmission of authentication data using plaintext protocols like HTTP, ftp, or telnet is especially critical since it is easy in these cases to determine the position in the transmitted packet of the data entered by the user thanks to the simple structure of the protocols (see also T 2.87 Use of insecure protocols in public networks). It is therefore relatively easy to automatically analyse such connections. For example, in the first step, password sniffer programs could be used to collect passwords when they are transmitted to a system. This would then enable the attacker to gain access to this IT system and then carry out further attacks locally on the computer. Examples: - It is wrong to assume that messages sent by are the equivalent of letters in the classical sense. Since messages can be read anywhere along their journey through the Internet, it is much more realistic to compare them to postcards. - Some manufacturers supply sniffer programs along with their operating systems to debug networks, but these programs can also be used to intercept data. Capabilities and interests of the attacker Automatic analysis of connections for plain text protocols IT-Grundschutz Catalogues: 9. EL Version

14 Threats Catalogue Deliberate acts T 5.8 T 5.8 Manipulation of lines Lines may be manipulated for reasons other than intercepting data (see T 5.7 Line tapping): - Frustrated employees could manipulate lines so that unauthorised connections could be established inside and outside the organisation s own IT systems. The goal in these cases is often simply to disrupt IT operations. - Lines can be manipulated so that they can be used privately at the expense of the network operator. In addition to the costs incurred from using communication lines which are subject to fees, lines and resources would be blocked by private use as well. - The destruction of IT lines can result in significant financial damage to an organisation. The primary cabling on large pieces of property and the lines connecting the IT or telecommunication systems to the providers often require a high level of protection in terms of availability. Example: - During construction of an expansion on the grounds of a large company, attackers were able to open an inspection manhole in an area with poor access protection. A optical fibre bundle was cut using a tree pruner. Since several production buildings were disconnected from the IT network, there were operational disruptions and stoppages that caused millions in damage. Unauthorised connections Private use IT-Grundschutz Catalogues: 9. EL Version

15 Safeguard Catalogue Infrastructure S 1.9 S 1.9 Initiation responsibility: Fire sealing of trays Head of facility management, Fire Protection Officer Implementation responsibility: Facility management, Fire Protection Officer Electrical and IT cables are usually concentrated in installation trays. Trays are often found along escape and rescue routes, going through underground car parks, warehouses, workshops, or are used as transit trays to go through areas used for other purposes. In buildings with several fire zones, the routing of electrical and IT cables is subject to fire protection regulations. This applies especially to cables crossing through fire zones, walls, or ceilings, or traffic routes. Additional requirements for maintaining the functionality of electrical cables in case of fire must be met, especially when the trays are used for emergency lighting or fire alarm, burglar, or extinguishing systems. For this reason, the fire protection officer should be consulted whenever planning the trays. The trays must provide fire protection as well as protection against sabotage. Both can be achieved through proper sealing of the trays. When electrical cables are tightly packed in a separate cable channel with fire protection, large increases in temperature can arise. This can lead to an increase in the electrical resistance of the wiring with the accompanying additional heat. This problem can be alleviated either by reducing the number of cables or by providing sufficient ventilation. For this reason, the guidelines in DIN-VDE "Erection of low-voltage installations - Part 5: Selection and erection of electrical equipment - Chapter 52: Wiring systems" (the English version of IEC ) must be followed depending on how the cables are laid. This is the responsibility of the electrical planner. The commonly used ventilation methods and techniques, for example using ventilation bricks, have the disadvantage that they do not provide sufficient protection against acts of sabotage. This means that lines requiring high or very high levels of protection which are routed through unprotected areas such as underground car parks are barely protected against deliberate acts when these methods are used. Custom planning safeguards are required in this case. This can mean using sufficiently large channels, making ventilation of the channel in risky areas unnecessary, or using a special ventilation concept that is designed to meet the specific security requirements. Openings through walls and ceilings must be sealed to conform to the fire resistance class of the wall or ceiling after the lines have been laid. To make installing additional cables later on easier, suitable materials such as soft fire stops or fire protection cushions can be used as a temporary safeguard. The corresponding standards and guidelines, such as DIN 4102 "Fire behaviour of building materials and elements", must be followed. Cable trays expand when heated, e.g. due to a fire, and can destroy a soft fire stop or a fire protection cushion when the tray goes through a wall. For this reason, trays should not be routed through the fire protection element, but should end at least 10 cm before the wall on both sides. This also makes it Sealing openings IT-Grundschutz Catalogues: 9. EL Version

16 Safeguard Catalogue Infrastructure S 1.9 easier to fan out the lines and cables, which now must be routed individually and not as a bundle through the fire protection. Often a variety of cables, e.g. telephone, LAN, and building services cables, are conveyed in a single tray. If any changes need to be made to the cabling, it should be clarified already in the planning phase if any other cable systems are scheduled for replacement in the foreseeable future. Combining projects correspondingly minimises downtime and can save additional costs entailed by repeated fire sealing. If the route planned is not possible due to fire protection regulations, then an alternative route must be investigated. Furthermore, the fire seals should be inspected at regular intervals, for example annually, after the installation work is completed. Additional controls: - Was the fire protection officer consulted with regard to route planning? - Were the plans and design of the routes with electrical cables checked by an electrical planner? - Were possible alternative routes examined? - Will the fire seals be checked regularly after the installation work is completed? Coordination of tray usage IT-Grundschutz Catalogues: 9. EL Version

17 Safeguard Catalogue Infrastructure S 1.20 S 1.20 Initiation responsibility: Selection of cable types suited in terms of their Physical/mechanical properties Planner, Head of facility management, Head of IT, IT security management Implementation responsibility: Facility management, Head of IT When selecting cables, technical transmission requirements as well as the environment the cables will be routed through and operated in must be taken into account. To meet this wide variety of requirements, cable manufacturers offer different types of cable on the market or develop corresponding solutions. The following criteria must be taken into account in terms of the cable sheathing when routed inside or outside: - temperature - surrounding medium (water, waste water, acids, gas, light) - rodent protection, impact and shovel penetration resistance, falling rock impact resistance, water pressure resistance - maintenance of circuit integrity in areas exposed to fire hazards; and - special pulling forces arising through the use of overhead lines, for example. Furthermore, the tray systems planned for use such as cable platforms, cable ladders, cable channels, cable conduits, moulded bricks for cables, tray sections, and overhead line constructions must also be taken into account. The following cable design factors must be taken into account as well: - pulling forces arising from installing cable using machines, e.g. from cable draw winches or cable blower systems, or from manual installation - bending radius and lateral pressure stability according to the installation method and final resting state during operation - water-blocking protection for damp or wet areas - special pulling forces in the installed state that arise from large span lengths or securing distances when overhead lines are used or from extremely steep rises; and - strong electrical and inductive interference fields using shielded cables. The proper selection of electrical cables in accordance with the regulations and compliance with the relevant standards and regulations (DIN VDE 0100 " Erection of power installations with rated voltages up to 1000 V", DIN 4102 "Fire behaviour of building materials and elements") and the generally accepted state of the art form the foundation of contingency planning for the electrical installation. The individual requirements for the selection of cables may not be defined by the IT department alone, especially for operating environments in which environmental influences or special structural situations must be taken into account. In particular, employees in Facility management, who are familiar IT-Grundschutz Catalogues: 9. EL Version

18 Safeguard Catalogue Infrastructure S 1.20 with the operating procedures and other special conditions, must participate in the determination of the relevant influences on the planned cable route, and therefore in the determination of the special requirements placed on the cable design. Additional controls: - Have all regulations and requirements from the fire protection organisation and the organisation responsible for the operational safety of the electrical power system been followed in full? - When selecting the cables, was the person responsible for operating technology asked if there are any adverse environmental conditions known or anticipated? - Were possible alternative cable routes examined? IT-Grundschutz Catalogues: 9. EL Version

19 Safeguard Catalogue Infrastructure S 1.21 S 1.21 Initiation responsibility: Sufficient dimensioning of lines Implementation responsibility: Facility management Planner, Head of IT, Head of facility management Sufficiently large cable trays and channels (e.g. underfloor channels, window sill cable ducts, trays, outside cable conduits) must be planned. On one hand, there must be enough space available to accommodate an eventual expansion of the network. On the other hand, minimum distances between the cables may need to be maintained to prevent crosstalk (coupling of signals between cables). In particular, when power and IT cabling are routed together in a common channel, it must be ensured that the channels are separated by a centre rail. Interference with the IT cables can usually be avoided simply by routing the power and IT cables separately. If it is not possible to install trays and channels with enough reserve space, then it should at least be ensured that there is enough space in the trays and channels to accommodate expansions. If the sizes specified for the openings through walls and ceilings are sufficiently large, then noisy, dirty, and expensive work will be unnecessary later. When fire seals are used that can be installed after the cables are installed, then the openings can be equipped so that protection against smoke and fire is always ensured while enabling the trouble-free installation of additional cables at any time. It must be noted that in order to obtain effective sealing of wall openings in walls with a fire resistance class, the openings may only be filled up to 60%. If necessary, openings should be made for later expansions, and these openings should be sealed for the time being using soft fire stops or fire protection cushions. It is important that the sizes of the cable trays and channels are always specified depending on the type of cable selected (see S 1.20 Selection of cable types suited in terms of their Physical/mechanical properties and S 5.3 Selection of cable types appropriate in terms of communications technology). For example, space can be saved by using a few multiwire cables instead of many small cables. Crosstalk can be prevented through the use of shielded cables or fibre optic cables. This then ensures problem-free operation, even in cable channels with little space. Additional controls: - Was the possibility of saving space and preventing crosstalk by selecting other types of cables examined? IT-Grundschutz Catalogues: 9. EL Version

20 Safeguard Catalogue Infrastructure S 1.22 S 1.22 Initiation responsibility: Physical protection of lines and distributors Implementation responsibility: Facility management Planner, Head of facility management, Head of IT In rooms visited by the general public or in parts of buildings that cannot be easily monitored, it may be wise to protect lines and distributors. These items can be protected in various ways: - installing concealed wiring or concealed cable channels, - installing the lines in armoured pipes, - installing the lines in mechanically sturdy and lockable channels, - locking distributors, and - electrically monitoring distributors and channels. In any case, the number of locations in which the cable routed can be accessed must be kept to a minimum, and lengths of the cable connections to be protected against unauthorised access must be kept as short as possible. The protection of main routes and cables of the electrical power network and the IT cables must be adapted along the entire cable path to the corresponding threat scenarios. In areas such as underground car parks and in corridors used as transportation paths, appropriate protection against accidental mechanical damage and, if necessary, against acts of sabotage, must be provided using a stable casing around the channel or cable. If distributors are locked, then rules are needed to determine who has the right to access the distributors, how the keys are distributed, and the terms of access. These rules must specify, in addition to other things, what must be done before modifying cables or distributors and what must be done after such work is complete. It must be ensured that changes are coordinated and approved, and that the documentation reflects these changes. Additional controls: - Has the number of places where the cable is accessible been reduced to a minimum? - Were the lengths of routes requiring protection kept as short as possible? - Are access rights granted restrictively? Were personnel changes and possible substitutes taken into account? - Are access rights being regularly reviewed in terms of their justification and necessity? IT-Grundschutz Catalogues: 9. EL Version

21 Safeguard Catalogue Infrastructure S 1.39 S 1.39 Initiation responsibility: Prevention of transient currents on shielding Head of IT Implementation responsibility: Facility management The standards for IT infrastructures (DIN EN 50173, DIN EN "Cabling installation") describe the shielded and unshielded data cabling as well as the grounding and shielding requirements for these systems. When shielded data lines are used, the standards differentiate between areas used for technology (e.g. server rooms and computer centres) and areas used for general IT purposes. In areas used for technology, the standards specify that the shielding must be connected on both ends and that the system and components are tightly intermeshed. In areas generally used for IT infrastructure such as the cables on a floor in a building, the standards specify connecting only one end of the shielding. Connecting both ends of the shielding is optional. If network operations are disrupted due to transient currents, then the cause of their formation should be analyzed first. Since the frequencies used in IT transmission methods are constantly increasing, the systems become more sensitive to high-frequency interference. In addition, the systems themselves can also become emitters of high-frequency interference under some circumstances and disrupt neighbouring equipment and systems. If operational disruptions are detected, then the proper solution must be worked out depending on the local conditions. Since a lot of specialised knowledge is required to do this, it is generally recommended to contract a specialised company to evaluate and analyse the situation and work out a solution. There are various ways of preventing transient currents on, for example, the shielding of data lines: Transient currents can be avoided in the TN-C network by only using shielded data lines to link those IT devices connected to a common electrical distribution system. This must be checked and ensured each time the data network is expanded. Connecting data line shielding at one end only is often suggested as a safeguard for preventing transient currents in TN-C and TN-CS networks. This method is actually effective in terms of transient currents, but it should only be used when absolutely necessary and as a exception to the rule for the following reasons: - Shielded cables whose shielding is only connected at one end are much more strongly affected by radiated interference. At the same time, they radiate higher levels of interference than unshielded balanced lines. It must therefore be assumed that there will be more interference in the data transmission (e.g. in terms of availability or integrity) in cables where only one end of the shielding is connected than in all other cables. The higher level of emission of exploitable signals from lines connected in this manner represents a security risk in terms of the confidentiality of the information transmitted. - Even when all technical disadvantages of connecting only one end of the shielding are deemed acceptable, the problem of consistent implementation IT-Grundschutz Catalogues: 9. EL Version

22 Safeguard Catalogue Infrastructure S 1.39 remains. Thorough inspections of all work performed on the data network must be performed to ensure that the shields of those cables where the shield is only connected at one end are not inadvertently connected at both ends. It is very difficult and time-consuming to find these types of connections later on. In terms of safety, it is best to design the power distribution network in the entire building as a TN-S network. In this case, the PE and N conductors are routed separately after the potential equalisation bar (PEB). It is generally not necessary to take individual safeguards on IT devices in this case any more. However, note the information in section S 1.28 Local uninterruptable power supply (ups) about the formation of a new TN-S network for the connected devices. To ensure and maintain the effectiveness of the TN-S network design, it must be ensured that the only connection between the PE and N conductors in the entire network is on the PEB (ground). In actual practice, though, accidental creation of another connection between the PE and N conductors when a new device is connected or when working on the network cables cannot be ruled out. For this reason, changes to the data network should always be coordinated with facility management. Furthermore, a TN-S network should be checked at regular intervals for proper grounding. This can be done whenever performing the inspections of the power supply network required anyway and when problems are suspected (for example if intermittent disruptions in the data network occur over a longer period of time). Ideally, a TN-S network is equipped with a differential current monitor. The following diagrams show how transient currents can form on shielding as well as possible countermeasures: IT-Grundschutz Catalogues: 9. EL Version

23 Safeguard Catalogue Infrastructure S 1.39 Figure 1: Formation of transient currents on shielding and possible countermeasures for a TN-C network Figure 2: Formation of transient currents on shielding and possible countermeasures for a TN-S network Additional controls: - Which type of network is used in the building? - Are there rules specifying when to check if the power supply network is properly grounded? - Are the measured values monitored daily by an existing, permanent differential current monitor? IT-Grundschutz Catalogues: 9. EL Version

24 Safeguard Catalogue Infrastructure S 1.65 S 1.65 Initiation responsibility: Renewal of IT cabling Implementation responsibility: Facility management Planner, Head of facility management, Head of IT The rapid progress in information technology, and in particular the requirements placed by new IT applications, often results in considerations to modernise or completely replace existing IT cables in buildings containing older IT cabling. The time and expense needed to replace the existing IT cabling with completely new secondary and tertiary cabling should not be underestimated. Experience has shown that after an initial examination of the financial expense and organisational difficulties associated with a comprehensive modernisation project, the decision to use the existing IT cabling as long as possible is usually made. The IT cabling should only be completely renewed when it can be assumed with complete security that the business processes in the organisation will not be provided enough support using the existing IT cabling. Examples of clear indications that the existing IT cabling cannot be used any more are: - Installing cables to connected additional users results in constant disruption of network operations. - The existing network suffers from frequent network failures due to short circuits in a token ring or the formation of loops from loose contacts on IBM IVS Type-1 Ethernet cables, for example. - The existing cabling cannot meet the capacity demands any more because, for example, entire floors are connected using IBM IVS Type-1 cabling, which has a maximum transmission rate of 10 Mbit/sec. When the IT cabling is to be renewed, all planning steps required for an initial installation must be followed (see S Requirements analysis for IT cabling). The requirements analysis and the assessment of the growth in demand are performed at the beginning in this case as well. Note that when replacing older Type-1 cables, the cable routes must be examined to determine if they can be used as is with the new cables, especially in the tertiary area. Since Type-1 cables permit a maximum cable length of only 150 meters, it may be necessary to install an additional floor distributor at a suitable location to limit the connection length of category 5 or higher cables to a maximum of 100 meters. In this case, the connection length is calculated as the sum of the length of the tertiary cable plus the length of the patch cable. If an empty building is modernised, then only a technical services plan needs to be created for the migration. In buildings used as office space and not just as warehouses, a modernisation plan must also be created to migrate the existing IT cabling to an up-to-date cabling technology. The plan must specify how the new IT cables can be installed during business operations so that business operations are interrupted as little as possible. Additional controls: IT-Grundschutz Catalogues: 9. EL Version

25 Safeguard Catalogue Infrastructure S Is a written requirements analysis available to plan the modernisation? - Have the lengths of the cable routes of the existing cables been checked? IT-Grundschutz Catalogues: 9. EL Version

26 Safeguard Catalogue Infrastructure S 1.66 S 1.66 Initiation responsibility: Compliance with standards for IT cabling Head of IT Implementation responsibility: Head of IT A standard titled "Generic cabling systems" was published in 1995 that described for the first time the topology and classification of communication links with defined properties as well as a uniform interface for connecting terminal devices. These requirements apply not only to cabling used in office buildings, but can also be applied to other areas of application. Under the responsibility of the European Committee for Electrotechnical Standardization (CENELEC), the standards are monitored, coordinated with the international committees (ISO/IEC), and, if necessary, advanced and refined. The standards provide users with support in the building planning, cabling design, planning, implementation, and operation phases of communication cable systems. In addition to EN Generic cabling systems, General requirements and Part 2 Office premises, Part 3 Industrial premises, Part 4 Residential premises, and Part 5 Data centres, which were available as a draft at the time this document was written, there are other standards used in planning and installing IT cabling. When translated to the phase model of the IT Grundschutz Protection catalogues, the standards can be categorized as follows: Building planning - EN Application of equipotential bonding and earthing in buildings with information technology equipment 5.2: Common bonding network (CBN) within a building 6.3: AC distribution system and bonding of the protective conductor (TN-S) Cabling design - EN Generic cabling systems, General requirements and Office premises 4: Topology 5: Transmission route capacity 7: Cable requirements 8: Connection technology requirements 9: Cord requirements A.1: Limits for routes Planning - EN Cabling installation, Specification and quality assurance 4: Specification considerations 5: Quality assurance 7: Cabling administration - EN Cabling installation, Installation planning and practices inside buildings IT-Grundschutz Catalogues: 9. EL Version

Structured Cabling, Earthing & Equipotential Bonding

Structured Cabling, Earthing & Equipotential Bonding White Paper Information and Communication Technology Structured Cabling, Earthing & Equipotential Bonding English Rev. 1.0.1 / 2012-06-01 1 Abstract All Dallmeier network products (PoE cameras, recorders,

More information

ELECTRICAL SAFETY. The standard unit for measuring electrical current.

ELECTRICAL SAFETY. The standard unit for measuring electrical current. ELECTRICAL SAFETY Introduction The following sections provide general safety guidelines and procedures for electrical safety. This chapter covers the following topics: TOPIC PAGE General Electrical Safety

More information

Comparative study for cables and busbars

Comparative study for cables and busbars Comparative study for cables and busbars Preliminary considerations To compare the prices of two categories of product as different as traditional cables and busbars, it is necessary to make some preliminary

More information

Specifying an IT Cabling System

Specifying an IT Cabling System Specifying an IT Cabling System This guide will help you produce a specification for an IT cabling system that meets your organisation s needs and gives you value for money. You will be able to give your

More information

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL 9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent

More information

Nexus Technology Review -- Exhibit A

Nexus Technology Review -- Exhibit A Nexus Technology Review -- Exhibit A Background A. Types of DSL Lines DSL comes in many flavors: ADSL, ADSL2, ADSL2+, VDSL and VDSL2. Each DSL variant respectively operates up a higher frequency level.

More information

Unified requirements for systems with voltages above 1 kv up to 15 kv

Unified requirements for systems with voltages above 1 kv up to 15 kv (1991) (Rev.1 May 2001) (Rev.2 July 2003) (Rev.3 Feb 2015) Unified requirements for systems with voltages above 1 kv up to 15 kv 1. General 1.1 Field of application The following requirements apply to

More information

Fire Protection Notice No. 9 ELECTRICAL SAFETY

Fire Protection Notice No. 9 ELECTRICAL SAFETY Fire Protection Notice No. 9 ELECTRICAL SAFETY Because electricity is one of the most controllable forms of energy it can also be one of the safest. But, as industry and commerce draw ever more heavily

More information

TIG INVERTER INSTRUCTION MANUAL

TIG INVERTER INSTRUCTION MANUAL TIG INVERTER INSTRUCTION MANUAL Contents Warning General Description Block Diagram Main Parameters Circuit Diagram Installation and Operation Caution Maintenance Spare Parts List Troubleshooting 3 4 4

More information

Understanding Emergency Power Off (EPO)

Understanding Emergency Power Off (EPO) Understanding Emergency Power Off (EPO) White Paper #22 Executive Summary Emergency Power Off (EPO) is the capability to power down a piece of electronic equipment or an entire installation from a single

More information

CTI TECHNICAL BULLETIN Number 9: A publication of the Cable Tray Institute

CTI TECHNICAL BULLETIN Number 9: A publication of the Cable Tray Institute CTI TECHNICAL BULLETIN Number 9: A publication of the Cable Tray Institute Cable Tray Wiring Systems Have Many Cost Advantages Cost is usually a major consideration in the selection of a wiring system.

More information

Trial Exams C. Standards and Regulations. Examination No: GH-08-C- 1 hour and 5 minutes plus 10 minutes reading time

Trial Exams C. Standards and Regulations. Examination No: GH-08-C- 1 hour and 5 minutes plus 10 minutes reading time Trial Exams C Standards and Regulations Examination No: GH-08-C- This test is intended to gauge your knowledge of essential information contained within AS/CA S009:2013. To qualify for an allpication to

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

Installation and safety instructions for AC/DC built-in devices

Installation and safety instructions for AC/DC built-in devices The device type and date of manufacture (week/year) can be found on the device rating plate. In the event of any queries about the device, please quote all the details given on the rating plate. For further

More information

What are the basic electrical safety issues and remedies in solar photovoltaic installations?

What are the basic electrical safety issues and remedies in solar photovoltaic installations? What are the basic electrical safety issues and remedies in solar photovoltaic installations? Presented by: Behzad Eghtesady City of Los Angeles Department of Building and Safety Topics Covered Photovoltaic

More information

ELECTRICAL CONTRACTORS THE UNIVERSITY OF TENNESSEE KNOXVILLE, TENNESSEE SECTION 16050 PAGE 1

ELECTRICAL CONTRACTORS THE UNIVERSITY OF TENNESSEE KNOXVILLE, TENNESSEE SECTION 16050 PAGE 1 KNOXVILLE, TENNESSEE SECTION 16050 PAGE 1 PART 1 - GENERAL 1.01 RELATED DOCUMENTS: SECTION 16050 A. Drawings and general provisions of Contract, including General and Supplementary Conditions and Division-1

More information

1. Franklin Rod Performance 2. LEC/DAS Performance

1. Franklin Rod Performance 2. LEC/DAS Performance THREE ESSENTIALS OF LIGHTNING PROTECTION: BONDING, GROUNDING AND SURGE PROTECTION by Richard Kithil, President and Orlando Alzamora, Vice-President National Lightning Safety Institute (NLSI) 1.0 Summary.

More information

Union County Public Schools. Facilities Department. Electrical. Safe Work Practices

Union County Public Schools. Facilities Department. Electrical. Safe Work Practices 1 Union County Public Schools Facilities Department Electrical Safe Work Practices 2 Purpose In accordance with OSHA Standards 1910.331-335, safety-related work practices shall be used by Union County

More information

IMPORTANT INSTRUCTIONS & OPERATING MANUAL. Houston 50 Inch Electric Wall Mounted Fireplace Black / White

IMPORTANT INSTRUCTIONS & OPERATING MANUAL. Houston 50 Inch Electric Wall Mounted Fireplace Black / White IMPORTANT INSTRUCTIONS & OPERATING MANUAL Houston 50 Inch Electric Wall Mounted Fireplace Black / White Model Number:MFE5050BK Model Number:MFE5050WH Read these instructions carefully before attempting

More information

MISCELLANEOUS ELECTRICAL JOBS REQUIRING PERMITS

MISCELLANEOUS ELECTRICAL JOBS REQUIRING PERMITS MISCELLANEOUS ELECTRICAL JOBS REQUIRING PERMITS 01. SAFETY INSPECTION of service equipment at FPL Power Source 02. Construction GFI power outlets (Temp Pole for Construction) 03. 90 day temporary power

More information

Complete Solar Photovoltaics Steven Magee. Health and Safety

Complete Solar Photovoltaics Steven Magee. Health and Safety Health and Safety Health and safety around solar photovoltaic systems is very important. In the DC circuit you will find up to 600 volts in residential and commercial systems. In utility systems you may

More information

Electrical for Detached Garages: Updated Feb 19, 2016 for 2015 CE Code in force Jan. 1, 2016. Underground branch circuit feeding a detached garage:

Electrical for Detached Garages: Updated Feb 19, 2016 for 2015 CE Code in force Jan. 1, 2016. Underground branch circuit feeding a detached garage: Electrical for Detached Garages: Updated Feb 19, 2016 for 2015 CE Code in force Jan. 1, 2016 * Garage construction requires permits (electrical, building) * Permits must be applied for at the time. * Dial

More information

The electrical energy produced at the gen

The electrical energy produced at the gen 300 300 Principles of Power System CHAPTER CHAPTER 12 Distribution Systems General 12.1 Distribution System 12.2 Classification of Distribution Systems 12.3 A.C. Distribution 12.4 D.C. Distribution 12.5

More information

Getting started with

Getting started with PART NO. CMA113 MADE IN CHINA 1. Measuring CAT II 2. Max. voltage 250V ~ 3. Max. current 71 Amp Getting started with Electricity consumption monitoring single phase for homes and some smaller light commercial

More information

Presenters Brett Weiss, Gabe Martinez, Brian Kroeger.

Presenters Brett Weiss, Gabe Martinez, Brian Kroeger. 1 Presenters Brett Weiss, Gabe Martinez, Brian Kroeger. Topics to be covered: Cable identification Purpose of the various cable types Installation techniques Building Infrastructure Overview of networking

More information

DATA CENTRES UNDERSTANDING THE ISSUES TECHNICAL ARTICLE

DATA CENTRES UNDERSTANDING THE ISSUES TECHNICAL ARTICLE DATA CENTRES UNDERSTANDING THE ISSUES TECHNICAL ARTICLE Molex Premise Networks EXECUTIVE SUMMARY The term data centre usually conjures up an image of a high-tech IT environment, about the size of a football

More information

Session 14 Cable Support Systems

Session 14 Cable Support Systems Session 14 Cable Support Systems Cable Support Systems in the IEC World A new IEC Standard, IEC61537 2001 has been developed If full details of the cabling layout are available then the likely cable load

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

Bypass transfer switch mechanisms

Bypass transfer switch mechanisms Power topic #6013 Technical information from Cummins Power Generation transfer switch mechanisms > White paper By Gary Olson, Director, Power Systems Development This paper describes the configuration

More information

12 SOLAR PHOTOVOLTAIC POWER SUPPLY SYSTEMS by John Ware. PV modules are current-limiting

12 SOLAR PHOTOVOLTAIC POWER SUPPLY SYSTEMS by John Ware. PV modules are current-limiting 12 SOLAR PHOTOVOLTAIC POWER by John Ware IT IS PLANNED for BS 7671:2008 to include a new Section 712 providing additional requirements for safety applicable to solar photovoltaic (pv) power supply systems.

More information

TAMARAC FIRE RESCUE INSTRUCTIONS FOR FIRE ALARM PRE-SUBMITTAL CHECKLIST

TAMARAC FIRE RESCUE INSTRUCTIONS FOR FIRE ALARM PRE-SUBMITTAL CHECKLIST TAMARAC FIRE RESCUE INSTRUCTIONS FOR FIRE ALARM PRE-SUBMITTAL CHECKLIST In order to provide a comprehensive plan review in a timely manner, and to insure the design and installation of fire alarm systems

More information

Installation Instructions for Alarm Module Kit A043F059

Installation Instructions for Alarm Module Kit A043F059 Instruction Sheet 07-2013 Installation Instructions for Alarm Module Kit A043F059 1 Introduction The information contained within is based on information available at the time of going to print. In line

More information

Fundamentals of Power

Fundamentals of Power Fundamentals of Power Fundamentals of Power 2008 American Power Conversion Corporation. All rights reserved. All trademarks provided are the property of their respective owners. Learning Objectives At

More information

TYPICAL FIRE SAFETY INSPECTION VIOLATIONS

TYPICAL FIRE SAFETY INSPECTION VIOLATIONS TYPICAL FIRE SAFETY INSPECTION VIOLATIONS The following is a list of typical violations often found by inspectors and a generic solution. You can use this list to improve the safety of your facility, to

More information

Networks. The two main network types are: Peer networks

Networks. The two main network types are: Peer networks Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among

More information

A guide to connecting to fibre optic networks for homeowners, architects, builders and developers.

A guide to connecting to fibre optic networks for homeowners, architects, builders and developers. A guide to connecting to fibre optic networks for homeowners, architects, builders and developers. Chorus is New Zealand s largest telecommunications utility company. We maintain and build the local access

More information

800 Communications Circuits

800 Communications Circuits ARTICLE 800 Communications Circuits INTRODUCTION TO ARTICLE 800 COMMUNICATIONS CIRCUITS This article has its roots in telephone technology. Consequently, it addresses telephone and related systems that

More information

Fire Safety Log Book

Fire Safety Log Book Fire Safety Log Book Company... Address........ Responsible Person. Competent Person. Date Started For Additional Information: Safety Management (UK) Ltd Holme Suite, Clawthorpe Hall Business Centre, Burton

More information

Electrical Safety Tips. Help us keep you safe

Electrical Safety Tips. Help us keep you safe Electrical Safety Tips Help us keep you safe To help you stay safe when using electricity, ActewAGL has compiled these electrical safety tips. For natural gas safety tips please see ActewAGL s natural

More information

Electrical safety and you

Electrical safety and you Electrical safety and you A brief guide Introduction Electricity can kill or severely injure people and cause damage to property. Every year many accidents at work involving electric shock or burns are

More information

CONTINUOUS MONITORING AND AVOIDANCE OF RESIDUAL CURRENTS IN DATA CENTRES WITH RCM White paper Revision 2

CONTINUOUS MONITORING AND AVOIDANCE OF RESIDUAL CURRENTS IN DATA CENTRES WITH RCM White paper Revision 2 IT Power Solutions CONTINUOUS MONITORING AND AVOIDANCE OF RESIDUAL CURRENTS IN DATA CENTRES WITH RCM White paper Revision 2 Thomas B. Jones 1 Introduction Operators and managers consider outages, operational

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

Distributed Temperature Monitoring of Energy Transmission and Distribution Systems

Distributed Temperature Monitoring of Energy Transmission and Distribution Systems 1 m 40000m0 range 61850 IEC spatial resolution Distributed Temperature Monitoring of Energy Transmission and Distribution Systems Ensuring a Reliable Supply of Electrical Power for Today s World www.en-sure.pro

More information

Risk Engineering Guideline

Risk Engineering Guideline https://riskengineering-services.hdi-gerling.com HDI-Gerling Risk Engineering Services Risk Engineering Guideline Fire protection in electrical equipment rooms Statistically 30 percent of all fires are

More information

FIRE DETECTION AND ALARM SYSTEMS

FIRE DETECTION AND ALARM SYSTEMS HMO Information Sheet No 1 FIRE DETECTION AND ALARM SYSTEMS 1. Introduction When a property is in multiple occupation, the risk of fire breaking out is greater than in an ordinary single family home. Some

More information

B&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network

B&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network Determinism is the assurance that control/communication will occur in a set period of time. Ethernet was nondeterministic at first, and not widely used for industrial purposes. Ethernet switches designed

More information

Heading FACT SHEET. Overview. www.safeworkaustralia.gov.au

Heading FACT SHEET. Overview. www.safeworkaustralia.gov.au ELECTRICAL RISKS AT THE WORKPLACE Heading FACT SHEET Overview This fact sheet provides general guidance for persons conducting a business or undertaking (PCBUs) and workers on managing electrical risks

More information

Chapter 4 Connecting to the Internet through an ISP

Chapter 4 Connecting to the Internet through an ISP Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No

More information

3.1.1 Full Type Tests & Routine Tests according to Clause 8 2 & 8 3. 4.0 Instructions For Installation, Operation & Maintenance

3.1.1 Full Type Tests & Routine Tests according to Clause 8 2 & 8 3. 4.0 Instructions For Installation, Operation & Maintenance SPECIFICATION FOR LOW VOLTAGE SWITCHBOARD SEN I N D E X Description 10 STANDARD TECHNICAL REQUIREMENTS 11 Standards 12 General Operating Conditions 13 General Description Of Switchboard 131 Structure 132

More information

St Peter s College ELECTRICAL SAFETY. B. University Safety Office Policy Statement S4/10, Working safely with Electricity.

St Peter s College ELECTRICAL SAFETY. B. University Safety Office Policy Statement S4/10, Working safely with Electricity. St Peter s College ELECTRICAL SAFETY References: A. Peninsula Business Services Guidance Note 4-1, Electrical Safety. B. University Safety Office Policy Statement S4/10, Working safely with Electricity.

More information

October Safety Subject

October Safety Subject October Safety Subject Electrical Hazards All electrical equipment should be kept in good repair. Replace defective equipment or have it repaired by a qualified person. Watch for wiring on appliances that

More information

Network Time Accessories LED CLOCK. (for NTP Synchronization)

Network Time Accessories LED CLOCK. (for NTP Synchronization) Network Time Accessories LED CLOCK (for NTP Synchronization) 1 Table of Contents 1. Specification... 3 2. Introduction... 3 3. User safety... 3 4. Assembly notes... 4 5. LAN (Ethernet)... 5 6. Relay control...

More information

Common Electrical Hazards in the Workplace Including Arc Flash. Presented by Ken Cohen, PhD, PE & CIH (Ret.)

Common Electrical Hazards in the Workplace Including Arc Flash. Presented by Ken Cohen, PhD, PE & CIH (Ret.) Common Electrical Hazards in the Workplace Including Arc Flash Presented by Ken Cohen, PhD, PE & CIH (Ret.) 1 What s New In February 1972, OSHA incorporated the 1971 edition of the National Fire Protection

More information

3053 Electrical Safety Training Program Course Outline

3053 Electrical Safety Training Program Course Outline 3053 Electrical Safety Training Program Course Outline The following outline summarizes the major points of information presented in the program. The outline can be used to review the program before conducting

More information

Electrical Wiring Methods, Components and Equipment for General Use. Approved for Public Release; Further Dissemination Unlimited

Electrical Wiring Methods, Components and Equipment for General Use. Approved for Public Release; Further Dissemination Unlimited Electrical Wiring Methods, Components and Equipment for General Use Approved for Public Release; Further Dissemination Unlimited At the completion of this unit you shall be able to: 1. Utilize section

More information

2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn

2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn 2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn Contents Contents 1 Introduction 1.1 Version History 1.2 Objective 1.3 Target group 1.4 Application

More information

Security & Surveillance Cabling Systems

Security & Surveillance Cabling Systems Security & Surveillance Cabling Systems Security and Surveillance Cabling Systems The video security industry is growing and ever-changing, offering a wealth of opportunity for today s security professionals.

More information

Electrical Resistance Resistance (R)

Electrical Resistance Resistance (R) Electrical Resistance Resistance (R) Any device in a circuit which converts electrical energy into some other form impedes the current. The device which converts electrical energy to heat energy is termed

More information

Interfacing electrification and system reliability. Earthing of AC and DC railways 4,10,13

Interfacing electrification and system reliability. Earthing of AC and DC railways 4,10,13 Interfacing electrification and system reliability Roger White Professional Head of Electrification and Plant Rail Abstract Integration is the term given to ensuring that the different elements of an electrified

More information

Service Level Agreement (SLA)

Service Level Agreement (SLA) Hertford College, Oxford Service Level Agreement (SLA) For Maintenance, Risk Management, and Domestic Accommodation Services At Hertford College, its residential annexes and non- residential properties

More information

Network Management and Troubleshooting a Guide for Administrators and Users

Network Management and Troubleshooting a Guide for Administrators and Users Network Management and Troubleshooting a Guide for Administrators and Users Slide 1 Presentation Contents Network Planning and Management Network Environmental Considerations Network Troubleshooting Slide

More information

Engineers Edge, LLC PDH & Professional Training

Engineers Edge, LLC PDH & Professional Training 510 N. Crosslane Rd. Monroe, Georgia 30656 (770) 266-6915 fax (678) 643-1758 Engineers Edge, LLC PDH & Professional Training Copyright, All Rights Reserved Engineers Edge, LLC An Introduction to Communication

More information

Introduction to Data Centre Design

Introduction to Data Centre Design Introduction to Data Centre Design Barry Elliott BSc RCDD MBA CEng Earthing, grounding and bonding November 09 Earthing what s the point Safety from electrical hazards Reliable signal reference within

More information

Guide to the electrical parameter classifications of IEC 60950 and IEC 62368 safety standards

Guide to the electrical parameter classifications of IEC 60950 and IEC 62368 safety standards Guide to the electrical parameter classifications of IEC 60950 and IEC 62368 safety standards Abstract This Guide is an informative listing of selected terms and definitions found in IEC Glossary entry

More information

BS5839 Part 1:2002 Overview

BS5839 Part 1:2002 Overview BS5839 Part 1:2002 Overview 1 Contents Introduction So why is the current standard being revised? The brief for the new standard Changes to structure of current Standard Enhanced certification of Fire

More information

WHAT IS INFRARED (IR) THERMOGRAPHY

WHAT IS INFRARED (IR) THERMOGRAPHY WHAT IS INFRARED (IR) THERMOGRAPHY IR Thermography is the technique of producing pictures called from the invisible thermal radiation that objects emit. This is a non-contact means of identifying electrical

More information

IP PHONE SYSTEM. CooVox Series-U60 For Small and Medium Business. Quick Installation Guide. www.zycoo.com

IP PHONE SYSTEM. CooVox Series-U60 For Small and Medium Business. Quick Installation Guide. www.zycoo.com SYS WAN LAN IP PHONE SYSTEM Series-U60 For Small and Medium Business Quick Installation Guide www.zycoo.com Table of Contents 1 Package Contents 2 Hardware Installation 2.1 Safety Precautions 2.2 Installation

More information

Network Structure or Topology

Network Structure or Topology Volume 1, Issue 2, July 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Network Structure or Topology Kartik

More information

WHITE PAPER Fire & safety performance standards

WHITE PAPER Fire & safety performance standards WHITE PAPER Fire & safety performance standards Terminologies describing Fire Performance Terminologies describing Fire Performance often present a challenge to understand as how they apply to a cable

More information

Electrical Grounding. Appendix C

Electrical Grounding. Appendix C Appendix C Electrical Grounding Low-Voltage Equipment Grounding The most frequently cited Office of Safety and Health Administration (OSHA) electrical violation is improper occupational grounding of equipment

More information

JAWAHARLAL NEHRU UNIVERSITY

JAWAHARLAL NEHRU UNIVERSITY School of Biotechnology JAWAHARLAL NEHRU UNIVERSITY New Delhi 110 067 Tender No. JNU/SBT/DBT-BUILDER/Data Centre/2015-16 Sealed Quotation for the establishment of a Data Centre for High-End Computational

More information

SECTION 611 ACCEPTANCE PROCEDURES FOR TRAFFIC CONTROL SIGNALS AND DEVICES

SECTION 611 ACCEPTANCE PROCEDURES FOR TRAFFIC CONTROL SIGNALS AND DEVICES SECTION 611 ACCEPTANCE PROCEDURES FOR TRAFFIC CONTROL SIGNALS AND DEVICES 611-1 Description. This Section sets forth Contract acceptance procedures for installations of traffic control signals and devices

More information

Neutral Wire Facts and Mythology. White Paper #21

Neutral Wire Facts and Mythology. White Paper #21 Neutral Wire Facts and Mythology White Paper #21 Executive Summary This Technical Note discusses many common misunderstandings about the function of the neutral wire and its relation to power problems.

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

SERVICE MANUAL 12VDC WALL THERMOSTAT AIR CONDITIONING SYSTEMS ROOFTOP UNITS ONLY

SERVICE MANUAL 12VDC WALL THERMOSTAT AIR CONDITIONING SYSTEMS ROOFTOP UNITS ONLY SERVICE MANUAL 12VDC WALL THERMOSTAT AIR CONDITIONING SYSTEMS ROOFTOP UNITS ONLY! WARNING - SHOCK HAZARD! TO PREVENT THE POSSIBILITY OF SEVERE PERSONAL INJURY, DEATH, OR EQUIPMENT DAMAGE DUE TO ELECTRICAL

More information

GUIDELINES FOR UTILITY INSTALLATIONS Part 1 - Wire Lines and Communications Cables

GUIDELINES FOR UTILITY INSTALLATIONS Part 1 - Wire Lines and Communications Cables Engineering Department SEPTEMBER, 2007 GUIDELINES FOR UTILITY INSTALLATIONS Part 1 - Wire Lines and Communications Cables General Requirements This section applies to all public and private utilities,

More information

DTW Works Master Specification Version 2006

DTW Works Master Specification Version 2006 Issued 2006/08/01 Section 13852 Multiplex Fire Alarm System Page 1 of 10 PART 1 GENERAL 1.1 RELATED WORK.1 Section 01330 Submittal Procedures..2 Section 01780 Closeout Procedures..3 Section 01810 Commissioning..4

More information

Portable Air Conditioner

Portable Air Conditioner Portable Air Conditioner Owner's Manual Model:3 in 1 12,000 Btu/h Series 3 Please read this owner s manual carefully before operation and retain it for future reference. CONTENTS 1. SUMMARY...1 2. PORTABLE

More information

FACILITY FIRE PREVENTION AND EMERGENCY PREPAREDNESS INSPECTION CHECKLIST

FACILITY FIRE PREVENTION AND EMERGENCY PREPAREDNESS INSPECTION CHECKLIST FACILITY FIRE PREVENTION AND EMERGENCY PREPAREDNESS INSPECTION CHECKLIST Date of Inspection: Conducted by: Location: Reviewed by: Date of Review: Comments or additional corrective action taken as a result

More information

Notes. Material 1. Appropriate Flammable Liquids

Notes. Material 1. Appropriate Flammable Liquids 29 CFR 1910.106 Flammable Materials Flammable Liquids Preparation 1. Read Applicable Background information and related Company Policy Chapter. 2. Make Copies of this Lesson Plan for Personnel 3. Make

More information

White Paper: Electrical Ground Rules

White Paper: Electrical Ground Rules Acromag, Incorporated 30765 S Wixom Rd, Wixom, MI 48393 USA Tel: 248-295-0880 Fax: 248-624-9234 www.acromag.com White Paper: Electrical Ground Rules Best Practices for Grounding Your Electrical Equipment

More information

Rousseau 10. User Guide

Rousseau 10. User Guide Rousseau 10 User Guide Base station overview ➀ LED signals White, permanent light: - Base station ready, you can register a handset Slow flashing white light: - Paging call in progress - Active call (you

More information

Cat7/Class F New Installation Concept New infrastructure. Handbook

Cat7/Class F New Installation Concept New infrastructure. Handbook Cat7/Class F New Installation Concept New infrastructure Handbook contents 1 Introduction 3 2 What is the Cat7/Class F installation concept 3 3 Distribution centre 3 3.1 Patch Modules 3 4 How to handle

More information

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems Content Introduction Preventing unauthorized access by perimeter surveillance Monitoring unauthorized access by indoor surveillance

More information

PC Tab Security System INSTRUCTION MANUAL

PC Tab Security System INSTRUCTION MANUAL PC Tab Security System INSTRUCTION MANUAL This manual is intended as a Quick Start manual covering the basic functions that have been enabled on the alarm panel. The alarm panel is capable of extensive

More information

CUSTOMER REQUIREMENTS AT POWER SUBSTATIONS

CUSTOMER REQUIREMENTS AT POWER SUBSTATIONS CUSTOMER REQUIREMENTS AT POWER SUBSTATIONS Customer Handout Date Aug 2, 2010 Version 1.0 File Name Customer Requirements At Power Substations Document Id Outside Plant Engineering 1 Table Of Contents 1.0

More information

INTRUSION ALARM SYSTEM

INTRUSION ALARM SYSTEM INTRUSION ALARM SYSTEM Case studies reveal most burglars are deterred by the mere presence of an alarm system. Burglars attack unprotected premises considerably more often than ones protected by alarm

More information

Instruction manual. Electrobloc EBL 100-2

Instruction manual. Electrobloc EBL 100-2 Instruction manual 0 Manual Electrobloc EBL 100-2 Electrobloc EBL 100-2 Type no. 911.503 Table of contents 1 Introduction..........................................2 2 Safety information.....................................2

More information

For business. Wiring your business for broadband. What happens when copper is required?

For business. Wiring your business for broadband. What happens when copper is required? For business Wiring your business for broadband Your cabling requirements are dependent on the size and complexity of your business. Smaller businesses should follow the wiring recommendations for residential

More information

Crawford Inspection Services C.C.B. # 76914 www.crawfordinspections.com

Crawford Inspection Services C.C.B. # 76914 www.crawfordinspections.com Crawford Inspection Services C.C.B. # 76914 www.crawfordinspections.com Portland Area PO Box 665 West Linn, OR 97068 Ph: (503) 650-6957 Salem Area 5434 River Rd. N; #192 Keizer, OR 97303 Ph: (503) 362-5809

More information

in the United States Home fires are a major problem Older Homes Pose an Even Greater Threat Put it into perspective: Electrocutions can be Prevented

in the United States Home fires are a major problem Older Homes Pose an Even Greater Threat Put it into perspective: Electrocutions can be Prevented Home fires are a major problem in the United States Each year, home electrical problems alone account for an estimated 53,600 fires. These fires cause more than 500 deaths, injure 1,400 people, and account

More information

Protecting Your School from Fire and Weather Related Losses

Protecting Your School from Fire and Weather Related Losses Protecting Your School from Fire and Weather Related Losses Allianz Ireland s Leading School Insurer Protecting Schools since 1902 Our Policyi The most complete and appropriate insurance arrangement for

More information

Electrical Safety Plugs What are the different types of plugs? Extension Cords What are some potential hazards involving extension cords?

Electrical Safety Plugs What are the different types of plugs? Extension Cords What are some potential hazards involving extension cords? Electrical Safety Electricity can be a friend, but it can also hurt if you do not treat it with respect. Everyday someone loses his or her home or business due to an electrical fire. These tragedies are

More information

WHY CABLE TRAY? BECAUSE A CABLE TRAY WIRING SYSTEM PROVIDES SAFE AND DEPENDABLE WAYS TO SAVE NOW AND LATER

WHY CABLE TRAY? BECAUSE A CABLE TRAY WIRING SYSTEM PROVIDES SAFE AND DEPENDABLE WAYS TO SAVE NOW AND LATER Large numbers of electrical engineers have limited detail knowledge concerning wiring systems. There is the tendency by engineers to avoid becoming involved in the details of wiring systems, leaving the

More information

FIRE-FIGHTING DESIGN BRIEF REPORT

FIRE-FIGHTING DESIGN BRIEF REPORT P a g e 1 SECTION 04 (Doc.No.A/DBR 001) FIRE-FIGHTING DESIGN BRIEF REPORT P a g e 2 1.0 SCOPE 2.0 STANDARDS AND CODES 3.0 TYPES OF SYSTEM PROPOSED 4.0 FIRE HYDRANT SYSTEM 5.0 AUTOMATIC SPRINKLER SYSTEM

More information

FIXED CHARGE: This is a cost that goes towards making the service available, including

FIXED CHARGE: This is a cost that goes towards making the service available, including ELECTRICITY BILL COMPONENTS FIXED CHARGE: This is a cost that goes towards making the service available, including installation and maintenance of poles, power lines and equipment, and 24-hour customer

More information

The Application of Circuit Breakers to Reduce Downtime in Datacentres

The Application of Circuit Breakers to Reduce Downtime in Datacentres The Application of Circuit Breakers to Reduce Downtime in Datacentres Tim Campbell BEng MIET. Marketing Manager, Terasaki Electric (Europe) Ltd. Abstract Circuit breakers fulfil several functions in the

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Electric Service Guide for Commercial Construction

Electric Service Guide for Commercial Construction Electric Service Guide for Commercial Construction Contents Contacting KCP&L... 2 Voltages... 2 Temporary Service... 2 Customer-Provided Temporary Service... 2 KCP&L-Provided Temporary Service.... 2 Current

More information