News Articles

Articles posted here are for the use of our clients to get quick self help answers to questions and simple solutions to problems. News reports are not necessarily the opion of our company but for reference only. We don't provide any guarantee that solutions posted or referenced will work for your situation and that you should use them at your own risk. None of the information posted should be used for illegal practices.
Font size: +
2 minutes reading time (475 words)

Cat5e Data Cabling Recomendations

Frequently we are called to a new client because of network performance or stability issues. These cases manifest themselves over time by inexperienced data cabling installers, typically the business owner or one of the employees, who attempted to save some money by doing the work themselves.

The installation of data cabling, also referred to as structured cabling, is almost as much an art form as it is a time tested trade that can most effectively be perfected through the training by one with years of experience and formal training in the field.

Data cabling gone wrong

There is an official standard established by the Telecommunications Industry Association and reviewed by IEEE for end-to-end data cabling of a data or voice network. Data cabling standards change as the development of better cable and connectors are made available. For many companies, using the Category 5e standard is more than sufficient for ordinary business use. In situations where more demanding performance is required, an organization might decide to pay the addition cost and follow the Category 6 standard.

Here are some basic technical recommendations that should be followed for any data cabling installation.

  1. Cabling should not be subjected to a pulling tension of more than 25 pounds.
  2. When terminating Cat5e or better cables be sure the natural twist of each pair of is carried through as close to the point of termination. ANSI/TIA 568-C.2 requires no more than 0.5 inch untwisted pair length for Cat5e as it will affect performance at higher bit rates.
  3. Cables should be secured and placed in a manner which reduces excess line noise from electrical lines, prevents kinking, and tight cinching. Velcro is a preferred method of securing cables since it is less likely to be over cinched and provides a broader surface area to prevent kinking.
  4. Cable lengths from user equipment to communication hardware should not exceed 100m.
  5. Cabling trays are often recommended for long runs of horizontal structured cabling and can extend the life of the cable because of the consistent support from end to end.

Allowing an experienced data/telecom cable installer to perform your installation work will often provide better value for your cabling investment by ensuring the standards are met, cables are tested for accuracy and reliability, ensure better performance, and will often ensure the cabling last longer.

If you are in need of small cabling installation of 48 locations, please contact us. If you have larger cabling installation, please let us know and we will refer you to one of our cabling installation partners that would be glad to ensure your project is completed according to industry standards.

We hope that this information is helpful. Please let us know how this has helped you or if you have additional questions. As always Firestone Technical Resources, Inc. is here to help with your computer support issues - "Providing personal service for your impersonal technology."

0
Juno Web application hijacks browser proxy setting...
How to fix Microsoft Small Business Server Time Sy...

Related Posts

 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Are you in need of computer repair?

Start Here

Locations Serviced:

Firestone

Frederick

Dacono

Longmont

Fort Lupton

Erie

Mead

Berthod

Loveland

Windsor

Brighton

Denver

Boulder

Thornton

Westminster

Aurora

Arvada

Parker

Highland Ranch

Centenial

 

Have I been pwned?
Check if you have an account that has been compromised in a data breach.