Transcription of Lightning Protection for the Amateur Radio …
{{id}} {{{paragraph}}}
48 july 2002By Ron Block, KB2 UYTBy Ron Block, KB2 UYTBy Ron Block, KB2 UYTBy Ron Block, KB2 UYTBy Ron Block, KB2 UYTThe process described in Part 1 of identifying the equip-ment to be protected can be applied to any item or setof electronic equipment. With some adjustment, it canbe applied to tower-top electronics such as preamps or poweramplifiers, to a computer installation in another room, a TV ora stereo system. The principle is the same: identify all of theelectrically and proximally connected equipment, identify allof the I/O (input/output) lines, add protectors and ground. Thetheory is easy; it s the implementation that can be Each I/O LineLet s examine each of the I/O lines identified in the box-level schematic, dividing them into broad categories for dis-cussion.
50 July 2002 also be protected. The method of protection will change, how-ever, since the interface is electronic. Once the peak operating interface voltages are determined, it is relatively straightfor-
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}