Ground Rules

The Integrated Systems Bonding Project

Proxy Node

Index ]

The proxy node is a special ISBP built for computers and their peripherals.  It has a unique form factor, and is based on CHOP and PEP.  Like a bodyguard or double, the proxy node electrically "masquerades" as the primary node to draw any flashover, leaving the primary node protected.  

The proxy node is a virus-proof, hardware "firewall" that protects the primary node from destructive stresses of electrical and electromagnetic energy.  It is inserted between a node (primary node) and its network.  A proxy node is hardware that exists at the ISO/OSI Network Model layer one, physical layer.  

The proxy node is functionally transparent to the primary node as well as to its network.  It passes along all data transmissions between the primary node and its network.  

Electrical energy flashing across and through different outerlinks of a primary node, as well as through the primary node itself, is destructive and commonly causes failures within a primary node.  To counteract this, the proxy node uses PEP in direct support to the primary node.  The intent is to have voltage flashovers safely occur at the proxy node instead of at the primary node and thereby prevent a failure.  

While CHOP brings all of a primary node's outerlinks together at the proxy node, the proxy node uses PEP to simultaneously balance all voltages present on outerlinks before arrival at the primary node.  Any abnormal voltage buildup on one conductive path directed toward the primary node is intercepted, diverted, and otherwise weakened and balanced across all conductive paths at the proxy node.  Thus, a single voltage is presented across all outerlinks at the primary node.  

This means that every single outerlink on the primary node is integrated on a one-for-one basis at the proxy node with a corresponding connection on the proxy node toward other nodes, devices and interfaces.  Proxy node-to-proxy node connections prevail in networks, while primary nodes remain safely isolated and protected behind their dedicated proxy nodes.  

The proxy node may be a small, self-contained, metallic box unit, or even be as large as a room or building.  It must be scaled to the needs of its primary node.  The common surge suppression device is a start towards this end but is not designed to provide all of the services of CHOP, PEP, and the proxy node.  

Multiple primary nodes must be addressed singularly as to their particular outerlinks before expanding the functions of a single proxy node to serve several primaries.  It is difficult to support multiple primary nodes with one proxy node because all of their outerlinks must be individually connected through it.  A proxy node must serve a primary node individually and directly (in parallel fashion).  "Daisy chaining" primary nodes in a serial fashion before interface with the proxy node will be counterproductive.  

Summary

The proxy node is an ISBP.   It is specifically designed to protect a single primary node such as a computer, peripheral device, or network.   As a consequence, the proxy node has a unique form factor based on CHOP and PEP.   In order to be most effective, a proxy node is scaled or sized to accommodate all the outerlinks of its primary node.  

Much like an outdoor ISBP is inserted between the ESE and GES, a proxy node is placed between the primary node and its network.   Proxy node-to-proxy node connections prevail in networks.  

A proxy node extends the grounding cone of protection, as do all ISBPs.   It is usually kept indoors on the load side of the ESE.  

Index ]

  


Official Time for the United States ]