SURGE ARRESTER LY-C40/2P UC:275V

Ref Price:
Loading Port:
China Main Port
Payment Terms:
TT OR LC
Min Order Qty:
-
Supply Capability:
-

OKorder Service Pledge

Quality Product

Order On-line Tracking

Timely Delivery

OKorder Service Pledge

Credit Rating

Credit Services

Credit Purchasing

Share to:

Product Description:

SURGE ARRESTER,SURGE PROTECTIVE DEVICE LY1-C40  2P,In:20kA,Imax:40kA,Uc:275V


Specifications

three phase 40kA thunder protector
1.Discharge current:20-40kA
2.Poles:2P
3.IEC61643-1 standard,CE certificated

three phase 40kA thunder protector

Installation:

In household distribution box,computuer equipment,information equipment,electronic equipment and in the socket box in front of control equipment or near the control equipment


Advantages:


1. Module can be replaced no need power off


2. Max. current of endure the lightning stroke 10kA.(8/20)


3. Response time less than 25ns


4. Red and green color show working condition


Specifications:


ModelLY1-C40
Rated operating voltage Un(V)230V
Maximum continuous operating voltage Uc(V)275V
Voltage protection level up(KV)≤1.2
Nominal discharge current In(8/20μs)KA20kA
Maximum discharge current Imax(8/20μs)KA40kA
Response times(ns)<25
Test standardGB18802.1   IEC61643-1
Operating environment°C-40°C~85°C
Relative humudity(25°C)≤95%
InstallationStandard rail 35mm
Material of outer coveringFiber glass reinforced plastic



Send a message to us:

Remaining: 4000 characters

- Self introduction

- Required specifications

- Inquire about price/MOQ

Q:Why security system is better than the Chiwei AI Tai?
Or an electronic system or network that is assembled or integrated into subsystems by these systems.
Q:Who knows security monitoring common faults and solutions?
Can first separate the monitoring system, 1 first check the front-end equipment, with engineering treasure to connect the camera, there is no ripple, not in the use of monitoring power supply project, treasure access surveillance video. If there is no front end, no problem. After processing the back end, insert the rear video line directly into the engineering treasure video, if not, that is the problem on the hard disk video recorder, if you have one. That's the transmission part. The transmission section can see whether the video lines have power jamming devices, powerful electric power, signal communication towers and so on. Some words can be wire principle interference source or install galvanized tube, reduce electromagnetic interference, or use video anti-interference device and so on.
Q:Enterprise security monitoring workflow
Enterprise rules and regulations should be based on specific circumstances, and generally have administrative, sales, technical department, engineering department, the specific rules and regulations of each branch.
Q:What are the security monitoring devices? Where can I get a reasonable price?
1. intrusion detector:Active infrared intrusion detector and passive infrared intrusion detector, microwave intrusion detector, microwave and passive infrared intrusion detector, ultrasonic intrusion detector, vibration intrusion detectors, magnetic switch intrusion detectors, ultrasonic and passive infrared intrusion detector.2. burglar alarm controller:Including wired, wireless anti-theft alarm control, transmission, display, storage and other equipment.
Q:What are the main components of the global security system?
The control layer is the core of the whole security monitoring system, and it is the most clear embodiment of the system's scientific and technological level. Usually we have two control modes analog control and digital control. The simulation control method in the early stage, the console is composed of controller or analog control matrix, which is suitable for small local security monitoring system, this control method has lower cost, the failure rate is large but for some security monitoring system, it becomes too complicated operation and no price advantage, then we it should be the choice of digital control. Digital control is the industrial computer as the control core of the monitoring system, it will complex analog control operation into a simple mouse click operation, the huge analog controller stack shrunk into a computer, control cable will be complex and huge number into a serial line. It can change remote monitoring into reality and provide possibility for Internet remote monitoring. But digital control is not so perfect, the price of the control host is very expensive, the waste of modules, the system may collapse, the crisis is still lagging behind and so on.3. treatment layerThe processing layer may be referred to as the audio and video processing layer, which will have the audio video signals sent by the transport layer to be allocated, enlarged, segmented, and so on, and organically connect the presentation layer to the control layer. Audio and Video Splitter, audio and video amplifier, video splitter, audio and video switcher and so on, all belong to this layer.
Q:How is the security monitoring cost charged?
If the building construction units, security monitoring equipment is used for the construction of residential or commercial housing sales, security monitoring equipment costs should be included in the cost of the project. ,Borrowing: engineering costCredit: bank deposits / cash in hand / payable
Q:What is the future of the securities industry?
Foresight network data monitoring center shows that in 2012 China's security market is the lowest 310 billion yuan, while the highest will reach 323 billion 500 million yuan. By 2015, China's security market size is the lowest, 471 billion 500 million yuan, the highest will reach 559 billion yuan.Prospective network security industry research team believes that promoting the use of multiple factors civilian needs and market demand in the safe city construction, industry, security industry will usher in a period of rapid development, the continued expansion of the security market will bring rapid development opportunity.I hope my answer can help you.
Q:Do you have any security monitoring system with you?
Security monitoring system uses optical fiber, coaxial cable or microwave to transmit video signals in its closed loop, and from the camera to the image display and recording to form an independent and complete system. It can reflect the monitored object in real time, image and reality. It can replace the manual for long time monitoring in bad environment, and record it by video recorder. At the same time, the alarm system equipment for illegal invasion alarm.
Q:I just started, is to do security monitoring project, I do not know how to start living running project,
I just graduated a year, enter the security also soon, oneself also engage in learning in the inside front side, also recruited a number of sales every street, but no effect, then I run slowly better.
Q:Security industry sales channels?Security market in unlimited expansion, security products become hot
Security market in unlimited expansion, security products become hot, security salesman in sales on a variety of ways and under the control of it! For security products sales, mainly take a few ways: first, QQ chat, QQ group which sends information. For individuals, QQ is the second most important communication tool after mobile phones

1. Manufacturer Overview

Location
Year Established
Annual Output Value
Main Markets
Company Certifications

2. Manufacturer Certificates

a) Certification Name  
Range  
Reference  
Validity Period  

3. Manufacturer Capability

a)Trade Capacity  
Nearest Port
Export Percentage
No.of Employees in Trade Department
Language Spoken:
b)Factory Information  
Factory Size:
No. of Production Lines
Contract Manufacturing
Product Price Range