Technical data and terminology

HOME > Technical data and terminology > Technical data : Lightning protection > How lightning enters

How lightning enters

The increasing use of networks that has accompanied the spread of information technology in recent years is thought to have been responsible to some extent for the increase in lightning damage, in that equipment that had previously been immune to lightning damage is now prone to attack since networks provide many entrances and exits for lightning current. At the same time, the IT equipment that supports the advanced information technology society uses many compact and densely mounted semiconductor devices and have become more vulnerable to lightning and other forms of irregular voltage. The lightning that affects this electronic equipment enters through power supply lines, network and communication lines, grounding and space (electromagnetic waves).
How lightning enters

Lightning protection


Lightning rod (air termination section) angle of protection

The relationship between impulse and DC spark-over voltage

Withstand voltage of communications equipment

Basic concepts of lightning protection countermeasures

Installation locations of protective devices

Comparison of lightning-proof transformers and power supply protective devices

Equipment withstand voltage damage

Methods of wiring protective devices


●How lightning enters

The effect of lightning

Lightning protection related standards

Lightning damage and the human body

Arrester follow current

Operating principles of protective devices (when compared to water…)

Methods of protecting telecommunications equipment

Electropotential (voltage)