0% found this document useful (0 votes)
389 views35 pages

Ict 10 Module 2

The document discusses tools used for Microsoft system configuration, including: 1. Microsoft System Configuration utility which allows editing startup programs, services, and boot settings. 2. Register Edit which allows editing the Windows registry containing configuration settings. 3. Other built-in tools like DirectX and Control Panel for additional system configuration.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
389 views35 pages

Ict 10 Module 2

The document discusses tools used for Microsoft system configuration, including: 1. Microsoft System Configuration utility which allows editing startup programs, services, and boot settings. 2. Register Edit which allows editing the Windows registry containing configuration settings. 3. Other built-in tools like DirectX and Control Panel for additional system configuration.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Prepare Materials and Tools Used for Configuration

A key to a well-tuned, trouble-free system is proper configuration. In order to accomplish


this, you must start by understanding its configuration. It can be difficult to figure out all the devices
in your system and the resources they are using.
To assist in this, several software tools have been created. These are typically
called diagnostic utilities or programs. Some of them are built-in to your operating system
and others are available either for free download or commercial purchase.
Some of the built-in tools used in Microsoft system configuration involves Microsoft
System Configuration, Register Edit, Direct X and Control Panel Applets.

1. Microsoft System Configuration: This boot configuration utility allows you to set the
programs that will run at startup and to edit configuration files. It also offers simplified
control over Windows Services.
System Configuration Utility consists of five functional tabs such as General,
Boot, Services, StartUp and Tools. The succeeding table describes the use and
functionality of each tab:

Table 1. General Tab of System Config Utility

Tab Function and Description


The general tab is the default tab in the System configuration
and shows how the computer will start, by default Normal startup
should be selected.

List of choices for startup configuration:


 Normal Startup. Starts Windows in the usual manner. Use
this mode to start Windows after you are done using the
General other two modes to troubleshoot the problem.
 Diagnostic Startup. Starts Windows with basic services and
drivers only. This mode can help rule out basic Windows files
as the problem.
 Selective Settings. Starts Windows with basic services and
drivers and the other services and startup programs that you
select.

1|Page
Figure 4. General Tab

Table 2. Boot Tab of System Config Utility

Tab Function and Description


This tab allows you to make the same adjustments you can
make in the Windows boot.ini file without having to edit the file. It
shows configuration options for the operating system and advanced
debugging settings, including the following:

 Safe boot (Minimal): Boots the Windows graphics user


interface in safe mode running only critical system services.
Networking is disabled.
 Safe Boot (Alternate Shell): Boots the Windows Command
Prompt in safe mode running only critical system services.
Networking and the graphical user interface are disabled.
Boot
 Safe Boot (Active Directory Repair): Boots the Windows
graphical user interface in safe mode running critical system
services and Active Directory.
 Safe boot (Network): Boots the Windows graphical user
interface in safe mode running only critical system services.
Networking is enabled.
 No GUI boot. Does not display Windows splash screen when
booting.
 Boot Log. Stores all information from the boot process in the
file %SystemRoot% Ntbtlog.txt.
 Base Video. Boots to the Windows graphical user interface
in minimal VGA mode. This loads standard VGA drivers
instead of display drivers specific to the video hardware on
the computer.
 OS boot information. Shows driver names as drivers are
being loaded during the boot process.

2|Page
 Make all boot settings permanent. Does not track changes
made in System Configuration. Options can be changed later
using System Configuration, but must be changed manually.
When this option is selected, you cannot roll back your
changes by selecting Normal startup on the General tab.

Figure 5. Boot Tab

Table 3. Services Tab of System Config Utility

Tab Function and Description


The Services tab allows you to enable or disable any of the
Microsoft Windows services or other program services running on
the computer. It lists all the services that start when the computer
Services
boots, along with their status (Running or Stopped). By checking
the "Hide all Microsoft services" box at the bottom of the window,
you can see all non-Windows services such as driver services and
program services that are often the cause of startup problems.
Unchecking a box will disable the service from starting.

Warning:
Disabling services that normally run at boot time might
cause some programs to malfunction or result in system instability.
Do not disable services in this list unless you know they are not
essential to your computer’s operation. Selecting Disable all will not
disable some secure Microsoft services required for the operating
system to start.

3|Page
Figure 6. Services Tab

Table 4. Start Up Tab of System Config Utility

Tab Function and Description


The Startup tab is one of the most frequent reasons most
Windows users enter the System Configuration utility. In the Startup
tab, you will be able to see the list of applications that run when the
computer boots, along with the name of their publisher, the path to
the executable file, and the location of the registry key or shortcut
Startup that causes the application to run. These startup programs are
often one of the biggest causes for a computer to startup and run
slow. You can clear the check box for a startup item to disable it on
your next boot. If you have chosen Selective startup on the General
Tab, you must either choose Normal startup on the General tab or
select the startup item’s check box to start it again at boot time. If
you suspect an application has been compromised, examine the
Command column to review the path to the executable file.

Windows 8 Microsoft has removed this Startup feature in the


System Configuration utility and moved it into the Windows 8 Task
Manager. Uncheck any program that you want to disable from
starting up each time.

Note:
Disabling applications that normally run at boot time might result in
related applications starting more slowly or not running as
expected.

4|Page
Figure 7. Startup Tab

Table 5. Tools Tab of System Config Utility

Tab Function and Description


This Provides a convenient list of diagnostic tools and other
Tools advanced tools that you can run.

Figure 8. Tools Tab

2. Register edit: This application allows you to edit the registry.


The Windows Registry, usually referred to as "the registry," is a collection of
databases of configuration settings in Microsoft Windows operating systems.

5|Page
In Windows 2000 and Windows XP, the Registry is stored in several Hives, located
in the following path: \windows\system32\config and \Documents and Settings\ {username}
folders.

Structure of the Registry

1. The Registry has a hierarchical structure, like the directories on your hard disk. Each
branch (denoted by a folder icon in the Registry Editor, see below) is called a key. Each
key can contain other keys, as well as Values. Each value contains the actual
information stored in the Registry. There are three types of values: String, Binary, and
DWORD - the use of these depends upon the context.
2. There are six main branches (five in Windows 2000 and Windows XP), each
containing a specific portion of the information stored in the Registry. They are as
follows:
o HKEY_CLASSES_ROOT - this branch contains all of your file types as well
as OLE information for all your OLE-aware applications.
o HKEY_CURRENT_USER - this branch points to the part of HKEY_USERS
appropriate for the current user.
o HKEY_LOCAL_MACHINE - this branch contains information about all of the
hardware and software installed in your computer. Since you can specify
multiple hardware configurations, the current hardware configuration is
specified in HKEY_CURRENT_CONFIG.
o HKEY_USERS - this branch contains certain preferences (such as colors and
control panel settings) for each of the users of the computer. In Windows
95/98/Me, the default branch here contains the currently-logged in user. In
Windows 2000/XP, the default branch here contains a template to be used for
newly-added users.
o HKEY_CURRENT_CONFIG - this branch points to the part of
HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
o HKEY_DYN_DATA (Windows 95/98/Me only) - this branch points to the part
of HKEY_LOCAL_MACHINE, for use with Windows' Plug-&-Play subsystem.

3. Direct X Diagnostic: The Microsoft DirectX Diagnostic Tool provides you with


information about the DirectX API components and drivers on your system. It
enables you to test sound and graphics output and Microsoft DirectPlay service
providers. You can use the diagnostic tool to gather information about your system to
use for diagnostic purposes.
If you are experiencing problems when running
Microsoft DirectX applications, the DirectX Diagnostic Tool can help you find the
source of the trouble such as incorrect versions of DirectX components, lack of
hardware acceleration, devices that are not connected and unsigned drivers.

6|Page
Figure 9. DX Diagnostic Tool

4. Control Panel applets


The names of various applets in the Control Panel differ slightly depending on
the version of Windows installed. In Windows XP, the icons are grouped into
categories:
 Appearance and Themes: Applets that control the look of windows:
 Display
 Taskbar and Start menu
 Folder options
 Network and Internet Connections: Applets that configure all the connection
types:
 Internet options
 Network connections
 Add or Remove Programs: An applet to add or remove programs and windows
components safely
 Sounds, Speech, and Audio Devices: Applets that control all the settings for
sound:
 Sounds and audio devices
 Speech
 Portable media devices
 Performance and Maintenance: Applets to find information about your computer
or perform maintenance:
 Administrative tools
 Power options
 Scheduled tasks
 System
 Printers and Other Hardware: Applets to configure devices connected to your
computer:
 Game controllers
 Keyboard
 Mouse

7|Page
 Phone and modem options
 Printers and faxes
 Scanners and cameras
 User Accounts: Applets to configure options for users and their e-mail:
 E-mail
 User accounts
 Date, Time, Language, and Regional Options: Applets to change settings
based on your location and language:
 Date and time
 Regional and language options
 Accessibility Options: A wizard used to configure windows for vision, hearing,
and mobility needs
 Security Center: Applet used to configure security settings for:
 Internet options
 Automatic updates
 Windows firewall

8|Page
Procedures in Using Computer System Configuration Tools

As a future computer technician you must be diligent and eager to know the different
procedures in using the tools for computer system configuration. This will help and guide
you to carry out a particular job in a proper manner. Once you already identify them, you
must also acquire the necessary and appropriate skills to apply them in actual situations.

This part of the module present some of the required procedures in computer system
configuration. Take note that you need to exert extra effort in finding out some procedures
which are not in this module. This is your chance to explore and learn through your own
experience.

The subsequent sections below present the various procedures in using Computer
System Configuration Tools:

1. Accessing and using Microsoft System Configuration


 Click on Start Button
 In the Search Box, type Run
 In the Run window, type msconfig, and press Enter.

Figure 10. General Tab of Microsoft system configuration

2. Accessing and using Regedit:


 Click on Start Button
 In the search box, or Run window, type the following:
regedit and then press Enter.

9|Page
Figure11. Registry Editor Window

Using the Registry Editor


The Registry Editor (regedit.exe) is included in Windows to enable you to view and
edit the contents of the Registry. When you open the Registry Editor, you will see a window
divided into two panes. The left side shows a tree with folders (see Structure of the Registry
above), and the right side shows the contents (values) of the currently selected folder (key).
 To expand a certain branch, click on the little plus sign [+] on the left of any folder, or
just double-click on the folder.
 To display the contents of a key (folder), just click the desired key, and look at the
values listed on the right side.
 You can add a new key or value by selecting New from the Edit menu.
 You can rename any value and almost any key with the same method used to
rename files; right-click on an object and click rename, or click on it twice (slowly), or
just press F2 on the keyboard.
 Lastly, you can delete a key or value by clicking on it, and pressing Delete on the
keyboard, or by right-clicking on it, and choosing Delete.

Caution: Using regedt32.exe or regedit.exe incorrectly might cause


configuration problems that may require you to reinstall the operating
system.

3. Accessing and Using Direct X Diagnostic

10 | P a g e
You can test Microsoft DirectDraw and Direct3D on each monitor attached to your
system. You can also test DirectSound on each wave output device, and DirectMusic on
each music port.

To run the DirectX Diagnostic Tool (DX Diagnostic Tools Window of Windows XP
differs from Windows 7 but it does the same function):
 Click on Start Button, type Run on the search box.
 On the Run window, Type in dxdiag and click Ok or press Enter, as shown in
Figure 9, Run Dialog Box.

Figure12. Run Dialog Box

 Next you will see a new window with various tabs.

Figure13. System Tab of DX Diagnostic Tool

 The System tab shows information about your computer and displays the version of
DirectX installed on your computer.

11 | P a g e
 The DirectX Files tab shows the file name and the version number for each DirectX
file installed on your computer. It also shows the file names and the version numbers
of other files that are used by games that are running under DirectX.
 The Display tab lists your current display settings, and allows you to disable
DirectDraw, Direct3D, and AGP Texture Acceleration. You can also test DirectDraw
and Direct3D from the Display tab which will indicate that the DirectX Graphics
runtime files are installed and operating correctly. It will also display your device's
available memory and can tell you if your video driver has passed Microsoft's
Windows Hardware Quality Labs testing standard. The DirectX Diagnostic Tool,
however, cannot report memory that is in use at the time that it starts and you may
see less memory reported than your video card actually has.

Figure14. Display Tab of DX Diagnostic Tool

 The Sound tab displays your current audio settings and allows you to test
DirectSound. It will tell you if the audio driver are signed, meaning that it has passed
Microsoft's Windows Hardware Quality Labs testing standard. The Hardware Sound
Acceleration Level slider is used to correct audio glitches that might be caused by
some audio drivers. You can adjust the slider settings and see if it provides better
results in your application. Be sure not to lower it too much or you may disable some
audio features of your system. If the tool detects a problem with your sound settings,
a warning message is displayed in the Notes box.

 The Music tab displays your current MIDI settings, and allows you to test the
DirectMusic component of DirectX. Click on the Test DirectMusic button to perform
the test. If the DirectX Diagnostic Tool detects a problem with DirectMusic, a warning
message is displayed in the Notes box.

12 | P a g e
Figure15. Sound Tab of DX Diagnostic Tool

 The Input tab lists the input devices connected to your computer such as USB and PS2
devices. It also displays the input drivers installed on your computer. If the DirectX
Diagnostic Tool detects a problem with an input device or an input device driver, a
warning message is displayed in the Notes box.

Figure16. Input Tab of DX Diagnostic Tool

13 | P a g e
 The Network tab lists the registered DirectPlay Service Providers. These are the
connection methods that DirectPlay will operate across. A registry problem here can
normally be resolved by reinstalling DirectX. A registry error here can normally be
resolved by removing and reinstalling that application. If the DirectX Diagnostic Tool
detects a problem with a DirectPlay Service Provider or Application, a warning message
is displayed in the Notes box.

 The More Help tab allows you to further troubleshoot problems that the other tabs could
not resolve. Features include the DirectX troubleshooter, sound troubleshooter,
system information tool and the override tool which will override DirectDraw’s refresh
rate. 

Windows Registry Backup and Recovery

Directions: In this activity you will back up a computer registry. You will also perform a
recovery of a computer registry. The registry is also called System State data. You will be
given 1 hour to accomplish this activity.

Recommended Equipment:
A computer system running Windows XP is required for this exercise.

Procedures:
Step 1
 Log on to the computer as yourself.
 Click Start > Run.
 Type ntbackup and then click OK. The “Backup or Restore Wizard” window
appears.

Figure 17. Backup or Restore Wizard

Step 2
 Click Advanced Mode.
 The Backup Utility window appears.

14 | P a g e
Figure 18. Backup Utility Window

Step 3
 Click Backup Wizard.
 The “Welcome to the Backup Wizard” window appears.

Figure 19. Backup Restore Wizard Window

Step 4
 Click Next.
 Click the Only back up the System State data radio button.

15 | P a g e
Figure 20. Choose “Only backup system state data”

Step 5
 Click Next.
 The “Backup Type, Destination, and Name” window appears.

Figure 21. Backup Type Destination, and Name” Window

Step 6
 Click Browse.
 If you are asked to insert a disk into the floppy disk drive, click Cancel.
 The “Save As” dialog box appears.

16 | P a g e
Figure 22. Save As Dialog Box

Step 7
 Click the My Documents icon on the left side of the “Save As” dialog box.
 Click Save.
 The “Backup Type, Destination, and Name” window re-appears.

Step 8
 Click Next.
 The “Completing the Backup Wizard” appears.

Figure 23. Completing the Backup Wizard Window


Step 9
 Click Advanced.
 The “Type of Backup” window appears.

17 | P a g e
Figure 24. Type of Backup Window
 The default backup type is “Normal”. If available, make sure that “Backup
Migrated Remote Storage Data” is not checked.

Step 10
 Click Next.
 The “How to Backup” window appears.

Figure 25. How to Backup Window


Step 11
 Click the Verify Data After Backup check box, and then click Next.
 The “Backup Options” window appears.

18 | P a g e
Figure 26. Backup Options Window

Step 12
 Click Replace the existing backups, and then click Next.
 The “When to Back Up” window appears.

Figure 27. When to Backup Window


Step 13
 At the “When To Back Up” window, click Now and then click Next.
 The “Completing the Backup Wizard” window appears.

19 | P a g e
Figure 28. Completing the Backup Window

Step 14
 Click Finish.
 The “Backup Progress” window appears.

20 | P a g e
Figure 29. Backup Progress Window

 The “Backup Progress” window indicates that the backup is complete.

Step 15
 Click Report.
 The Notepad application window appears containing the report.

Figure30. Notepad Application Window

 Close Notepad.
 In the Backup Progress dialog box, click Close.
 Close the Backup Utility.

Step 16
 Click Start >Run.
 Type regedit in the “open” field. The Registry Editor window appears.

21 | P a g e
Figure 31. RegEdit Window
Step 17
 Expand the HKEY_CURRENT_USER Registry Key.
 Expand the Control Panel Registry Key.
 Expand the PowerCfg Registry Key.
 Right-Click the Screen Saver. Stars Registry Key.
 Click Delete.
 Click File > Exit in the Registry Editor window.
 Browse to the “My Documents” folder and locate the “backup.bkf” file.
 Double-click the backup file to bring up the Backup Utility Wizard.
 Click Next.

Step 18
 Click the Restore files and settings radio button and then click Next.
 The “What to Restore” window appears.

Figure 32. What to Restore Window


Step 19
 Expand the file.
 Expand the backup.bkf file.
 Click the System State check box.

22 | P a g e
Figure 33. Click System State Check box

Step 20
 Click Next.
 The “Completing the Backup or Restore Wizard” window appears.

Figure 34. Completing the Backup or Restore Wizard Window


Step 21
 Click Advanced.
 The “Where to Restore” window appears.

23 | P a g e
Figure 35. Where to Restore Window
Step 22
 The default restoration location is “Original location”.
 Click Next.
 The “Restoring System State will always overwrite current System State unless
restoring to an alternate location.” Warning window appears.
 Click OK.

Figure 36. “Restoring System State will always overwrite current System State
unless restoring to an alternate location” Warning Window

Step 23
 Click the Replace existing files if they are older than the backup files radio
button.

24 | P a g e
Figure 37. How to Restore Window

Step 24
 Click Next.
 The “Advanced Restore Options” window appears

Figure 38. Advanced Restore Options Window

 Be sure that all three check boxes are selected, and then click Next.
 Click Finish.
 The system recovery begins by copying the files back to the computer.
 When prompted to restart the computer, click Yes. The computer will restart.

25 | P a g e
Step 25
 Click start > Run.
 Type regedit in the “Open” field.
 Click OK.
 You should see the “Screen Saver Stars” Registry key in the Registry Editor
application window.
 Click File > Exit.
Finish

After dealing with the preparations for configuration, you can


now proceed with the next section of this module which is
Configuring Computer System and Network.
This lesson is designed to give you the proper procedures
used in configuring computer systems and networks. At the end of
this lesson you should be able to:
 Inspect networking devices and connectors;
 Create a cross-over and straight-through Ethernet
cables;
 Assign and configure IP address to clients and
servers;
 Create a peer-to-peer network;
 Enable network security; and
 Configure file and printer sharing.

Lesson 2. Configure Computer System and Network

System Configuration is the way a system is set up, it is the collection of components
that make up the system. Configuration can refer to either hardware or software, or the
combination of both. For instance, a typical configuration for a PC consists of 32MB
(megabytes) main memory, a floppy drive, a hard disk, a modem, a CD-ROM drive, a
VGA monitor, and the Windows Operating System.
Many software products require that the computer has a certain minimum
configuration. For example, the software might require a graphics display monitor and
a video adapter, a particular microprocessor, and a minimum amount of main memory
capacity.
When you install a new device or program, you sometimes need to configure it,
which means that you need to set various switches and jumpers (for hardware) and to
define values of parameters (for software). For example, the device or program may need

26 | P a g e
to know what type of video adapter you have and what type of printer is connected to the
computer. Thanks to technological advancements, such as plug-and-play, much of this
configuration is now performed automatically.

Safety Precautions Related to Networks

Installing network cables, whether copper or fiber-optic, can be dangerous. Often,


cables must be pulled through ceilings and walls where there are obstacles or toxic
materials. You should wear clothing such as long pants, a long-sleeved shirt, sturdy shoes
that cover your feet, and gloves to protect you from those toxic materials. Most importantly,
wear safety glasses. If possible, ask building management, or someone responsible for the
building, if there are any dangerous materials or obstacles that you need to be aware of
before entering the ceiling area.

Safety precautions when using a ladder:


 Read the labels on the ladder, and follow any safety instructions written on it.
 Never stand on the top rung of the ladder. You could easily lose your balance and
fall.
 Make sure that people in the area know you will be working there.
 Cordon off the area with caution tape or safety cones.
 When you are using a ladder that leans up against a wall, follow the instructions
written on the ladder, and have someone hold the ladder to help keep it steady.

Safety rules when working with cables:


The tools required to install copper and fiber-optic cable may cause danger through
improper use. When working with cables, strictly follow these safety rules:
 Make sure that the tools you are using are in good working condition.
 Watch what you are doing, and take your time. Make sure that you do not cut
yourself or place anyone in danger.
 Always wear safety glasses when cutting, stripping, or splicing cables of any kind.
Tiny fragments can injure your eyes.
 Wear gloves whenever possible, and dispose any waste properly.

Use common sense when installing cables and fixing network problems. Call for
assistance for tasks that you cannot do on your own.

Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain hazards:
 Dangerous chemicals
 Tools with sharp edges
 Light which you cannot see that can burn your eyes

27 | P a g e
 Glass shards produced by cutting fiber-optic cable that can cause bodily harm
Specific types of tools and chemicals are used when working with fiber-optic cable.
These materials must be handled with care.

Chemicals
The solvents and glues used with fiber optics are dangerous. You should handle
them with extreme care. Read the instructions on the label, and follow them carefully. Also,
read the material safety data sheet (MSDS) that accompanies the chemicals to know how
to treat someone in case of emergency.

Tools
When working with any tool, safety should always be your first priority. Any
compromise in safety could result in serious injury or even death. The tools used for
working with fiber optics have sharp cutting surfaces that are used to scribe glass. Other
tools pinch cables with high pressure to fasten connectors to them. These tools can
produce shards of glass that can splinter and fly into the air. You must avoid getting them
on your skin and in your mouth or eyes.

Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can produce
tiny fragments of glass or plastic that can penetrate your eyes or skin and cause severe
irritation. The fibers can be extremely difficult to see on your skin because they are clear
and small. When you work with fiber-optic cabling, the working surface should be a dark
mat so that you can see the tiny glass or plastic fragments. The mat should also be
resistant to chemical spills.
You should keep the work area clean and neat. Never pick up fiber-optic fragments
with your fingers. Use tape to pick up small fragments, and dispose them off properly. Use
a disposable container, such as a plastic bottle with a screw-on lid, to store fiber fragments.
Close the lid tightly before disposing the container.

Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic strands. The
light is a color that humans cannot see. It can damage your eyes before you can feel it.
When you use a magnifier to inspect fiber-optic cable and connectors, the light emitted from
the fiber could be directed into your eyes. When working with fiber, be sure to disconnect
the light source. Use special detectors to help you tell if a fiber is energized.

28 | P a g e
Networking Devices, Media and Connector

To make data transmission more extensible and efficient than a simple peer-to-peer
network, network designers use specialized network devices such as hubs, switches,
routers, and wireless access points to send data between devices. You have already
discussed in your Grade 9 CHS class the different devices used in networking and which
provides you the knowledge on the common networking cables that are essential in putting
up a network.

Common Network Cables

Until recently, cables were the only medium used to connect devices on networks. A
wide variety of networking cables are available. Coaxial and twisted-pair cables use copper
to transmit data. Fiber-optic cables use glass or plastic to transmit data. These cables differ
in bandwidth, size, and cost. You need to know what type of cable to use based on the job
requirements. You also need to be able to troubleshoot and repair problems along the way.

Twisted Pair
Twisted pair is a type of copper cabling that is used for telephone communications
and most Ethernet networks. A pair of wires forms a circuit that transmits data. The pair is
twisted to provide protection against crosstalk, the noise generated by adjacent pairs of
wires in the cable. Pairs of copper wires are encased in color-coded plastic insulation and
are twisted together. An outer jacket protects the bundles of twisted pairs.

Source: www.lanshack.com
Figure 39. UTP and STP Cable

When electricity flows through a copper wire, a magnetic field is created around the
wire. A circuit has two wires, and in a circuit, the two wires have oppositely-charged
magnetic fields. When the two wires of the circuit are next to each other, the magnetic fields
cancel each other out. This is called the cancellation effect. Without the cancellation effect,

29 | P a g e
your network communications become slow because of the interference caused by the
magnetic fields.

The two basic types of twisted-pair cables are as follows:


 Unshielded twisted pair (UTP) is the cable that has two or four pairs of wires. This
type of cable relies solely on the cancellation effect produced by the twisted-wire
pairs that limits signal degradation caused by electromagnetic interface (EMI) and
radio frequency interference (RFI). UTP is the most commonly used cabling in
networks. UTP cables have a range of 328 feet (100 m).
 With shielded twisted pair (STP), each pair of wire is wrapped in metallic foil to
better shield the wires from noise. Four pairs of wires are then wrapped in an overall
metallic braid or foil. STP reduces electrical noise from within the cable. It also
reduces EMI and RFI from outside the cable. Although STP prevents interference
better than UTP, STP is more expensive because of the extra shielding. It is also
more difficult to install because of the thickness. In addition, the metallic shielding
must be grounded at both ends. If it is improperly grounded, the shield acts like an
antenna, picking up unwanted signals.

Category Rating
UTP comes in several categories that are based on two factors:
 The number of wires in the cable
 The number of twists in those wires
1. Category 3 is the wiring used for telephone systems and Ethernet LAN at 10
Mega byte per second (Mbps).
2. Category 3 has four pairs of wires.
3. Category 5 and Category 5e have four pairs of wires with a transmission rate of
100 Mbps.
4. Category 5 and Category 5e is the most common network cables used.
5. Category 5e has more twists per foot than Category 5 wiring.
These extra twists further prevent interference from outside sources and from the
other wires within the cable.
Some Category 6 cables use a plastic divider to separate the pairs of wires, which
prevents interference. The pairs also have more twists than Category 5e cable.

Coaxial Cable
Coaxial cable is a copper-cored cable surrounded by a heavy shielding. Coaxial
cable is used to connect the computers to the rest of the network.

30 | P a g e
Source: www.phoneam.com
Figure 40. Coaxial Cable
Coaxial cable uses “British Naval Connectors (BNC)” or “Bayonet Neill-Concelman”
connectors, at the ends of the cables to make the connection. Several types of coaxial
cable exist:
 Thicknet (10BASE5) is a coaxial cable used in networks operating at 10 Mbps, with
a maximum length of 500 meters.
 Thinnet (10BASE2) is a coaxial cable used in networks operating at 10 Mbps, with a
maximum length of 185 meters.
 RG-59 is most commonly used for cable television in the U.S.
 RG-6 is higher-quality cable than RG-59, with more bandwidth and less susceptibility
to interference.

Fiber-Optic Cable
An optical fiber is a glass or plastic conductor that transmits information using light.
Fiber optic cable has one or more optical fibers enclosed in a sheath or jacket. Because it
is made of glass, fiber-optic cable is not affected by EMI or RFI. All signals are converted to
light pulses to enter the cable and are converted back into electrical signals when they
leave it. This means that fiber-optic cable can deliver signals that are clearer, and can go
farther, without compromising the clarity of signals.

Source: www.picstopin.com
Figure 41. Fiber Optic Cable

Fiber-optic cable can reach distances of several miles or kilometers before the signal
needs to be regenerated. Fiber-optic cable usually is more expensive to use than copper
cable, and the connectors are more costly and harder to assemble. Common connectors for

31 | P a g e
fiber-optic networks are SC, ST, and LC. These three types of fiber-optic connectors are
half-duplex, which allows data to flow in only one direction. Therefore, two cables are
needed.

These are the two types of glass fiber-optic cable:


 Multimode is the cable that has a thicker core than single-mode cable. It is easier to
make, can use simpler light sources such as Light Emitting Diodes (LEDs), and
works well over distances of a few kilometers or less.
 Single-mode is the cable that has a very thin core. It is harder to make, uses lasers
as a light source, and can transmit signals dozens of kilometers with ease.

Creating Ethernet Cable


Ethernet cabling has been the standard in networking installation for years. It is the
fastest way of connecting PC to a peer or to your router or a central switch.  This section of
the module will bring you back to the procedures in creating an Ethernet cable specifically
straight-through and cross-over. Try to recall the procedures as you go on with the lesson.

Fabricating an Ethernet Cross-over and Straight-through Cable


In an Ethernet networking environment – like in a home or an office with multiple
PCs that are wired – the computers need to be connected to a central router to allow data
transfer. The router takes all the bits being sent out by the computers and relays them onto
the other devices on the network.
The straight-through Ethernet cable is used in local area network to connect a PC to
a network hub and router. This is the standard cable used for almost all purposes.
A cross-over cable, on the other hand, can be used to connect two network
devices directly, without the need for a router in the middle. It simply reverses some of the
pins so that the output on one computer is being sent to the input of another.
Bear in mind that safety precautions must always be applied and observed during
the fabrication of the said cables. Also, materials and tools to be used must always be
complete and functional to save time, money and effort.
The following items are the materials and tools used for making Ethernet cables:
 Ethernet Cable Category 5e or Cat5e- standard wire for cabling;
 RJ45 crimpable connectors for Cat5e;
 RJ45 Crimping tool;
 Wire cutter, stripper or pliers; and
 Ethernet cable tester.
Cable Fabrication Procedures

32 | P a g e
Cross-Over Straight-Through

Figure 42. Cross-Over and Straight-Through Color Coding

The picture below will serve as your guide in making the two important Ethernet
cables.
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping tool
has a razor blade that will do the trick with practice.

Figure 43. Step 1


2. Unwind and pair the similar colors.

Figure 44. Step 2


3. Pinch the wires between your fingers and straighten them out as shown. The color
order is important to do this correctly.

33 | P a g e
Figure 45. Step 3
4. Use wire cutter to make a straight cut across the wires 1/2 inch from the cut sleeve
to the end of the wires.
5. Push the wires into the connector. Each wire fits into a slot in the RJ45 connector.
Note the position of the blue plastic shielding. Also note how the wires go all the way
to the end.

Figure 46. Step 5

6. Take view from the top. Make sure the wires are all the way in. There should be no
short wires.

Figure
7. Crimping the Cable – carefully 47. Step
place 6
the connector into the Ethernet Crimper and
cinch down on the handles tightly. The copper splicing tabs on the connector will
pierce into each of the eight wires. There is also a locking tab that holds the blue
plastic sleeve in place for a tight compression fit. When you remove the cable from
the crimper, that end is ready to use.

34 | P a g e
Figure 48. Step 7
8. For a standard "Straight-Through" cable, repeat all steps and wire color order on the
other end of cable. For a cross-over cable - the other end will have a different color
order as shown by the crossover picture on page 84.

9. Make sure to test the cables before installing them. An inexpensive Ethernet cable
tester does this quite well.

Figure 49. Step 9

35 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy