You are on page 1of 24

Department:Information and Telecommunication Technology sector

TVET –Program Title: OS Telecom NW Installation & Maintenance:IV Year: 2

Course /Module Title: Install Telecommunications Network Equipment

Ac. Year: 2009 E.C

Nominal Duration: 90hrs Hours: Periods / Week: 4 Semester: I

Course / Module Code: EIS TIM3 05 0613 Program: (Reg/Ext)Regular

Name of the Trainer: __________________

Course / Module Description

This unit describes the performance outcomes, skills and knowledge required to

effectively install and test telecommunications network equipment. It includes processes

for checking plans, obtaining and proper handling of equipment and supplies

Leaning Outcomes (Objectives):

At the end of the module the trainees will be able to:

LO1 Plan for installation of telecommunications network Equipment

LO2 Install network hardware and cabling

LO3 Install Equipment accessories

LO4 Configure and test the system

LO5 Cleanup worksite and complete documentation


Module: Install Telecommunications Network Equipment
Plan for installation of telecommunications network Equipment
1.1 Relevant occupational health and safety (OHS) and environmental
requirements
Introduction:
Employers must protect employees:
 Assess the workplace
 Eliminate and reduce the hazards found using engineering and administrative controls
 Then use appropriate personal protective equipment
 Remember, Personal Protective Equipment is the last level of control.
 Hierarchy of Controls

What is personal protective equipment?


Personal protective equipment, commonly referred to as "PPE", is equipment worn to minimize
exposure to hazards that cause serious workplace injuries and illnesses. These injuries and
illnesses may result from contact with chemical, radiological, physical, electrical, mechanical, or
other workplace hazards. Personal protective equipment may include items such as gloves, safety
glasses and shoes, earplugs or muffs, hard hats, respirators, or coveralls, vests and full body
suits.

What it includes?

1|Page
 Head
 Eye
 Face
 Respiratory protection
 Hand
 Hearing
 Foot
 clothing

Safety Equipment: Safety Equipment Protects Your Employees and Customers


Some of our categories include:
 Flashing lights  Safety obstacles
 Gas and other hazard detection  Channel safeguards
Equipment  Warning signs and tapes
Safe Work Practices (SWP) - is a set of guidelines or "do's and don'ts" on how to perform a
specific task that may not always be done in the same way. Safe work practices are the
foundation of a safe work place. The development and implementation of safe work practices are
usually a local management responsibility.

Safe work practices help control hazards and manage risk associated with non-routine work. In
this context, a non-routine activity is any activity that is not fully described in an operating
procedure. Non-routine does not refer to the frequency at which the activity occurs; rather, it
refers to whether the activity is part of the normal sequence of converting raw materials to
finished products.
 Safe working practices, such as the safe use and handling of:
 Chemicals
 Materials
 Tools and Equipment
 Work platforms
 Environmental considerations:
 Clean-up protection
 Storm water protection
 Waste management.
Assessing existing and potential site hazards
A Hazard is a threat. A future source of danger. It has the potential to cause harm to
• People - death, injury, disease and stress
• Human activity – economic, educational etc.
• Property - property damage, economic loss of
• Environment - loss fauna and flora, pollution, loss of amenities.
examples of hazards are
 Earthquakes  Floods
 volcanic eruptions  Landslides
 cyclone

2|Page
1.2 Network Equipment

Overview of ADSL network


Asymmetric Digital Subscriber Line (ADSL) is a form of DSL, a data communications
technology that enables faster data transmission over copper telephone lines than a conventional
voice-band modem can provide. It does this by utilizing frequencies that are normally not used
by a voice telephone call, in particular, frequencies higher than normal human hearing. This
signal will not travel very far over normal telephone cables, so ADSL can only be used over
short distance, typically less than 5 km. Once the signal reaches Telephone Company’s local
office, the ADSL signal is stripped off and immediately routed onto a conversational internet
network, while any voice - frequency signal is switched into the conventional phone network.
This allows a single telephone connection to be used for both ADSL service and voice calls at
the same time.

How ADSL works


ADSL uses two separate frequency bands, referred to as the upstream and downstream bands.
The upstream band is used for communication from the end user to the telephone central office.
The downstream band is used for communicating from the central office to the end user. With
standard ADSL (annex A), the band from 25.875 kHz to 138 kHz is used for upstream
communication, while 138 kHz – 1104 kHz is used for downstream communication.

A Digital Subscriber Line Access Multiplexer (DSLAM) allows telephone lines to make faster
connections to the Internet. It is a network device, usually located at a telephone company central
office (CO), that connects multiple customer Digital Subscriber Line (DSL)s to a high-speed
Internet backbone line using multiplexing techniques. The DSLAM creates a network similar to
a LAN but not subject to Ethernet distance limits, thus providing an Internet connection for the
subscribers.

Role of the DSLAM


The DSLAM at the CO collects the digital signals from its many modem ports and combines
them into one signal, via multiplexing.

3|Page
Customer premises Equipment (CPE) Equipment:
A customer premises equipment device (CPE device) refers to a telecommunications hardware
device located on the telecommunication customer's premises.
This equipment might include
 cable
 satellite television set-top boxes,
 DSL
 other broadband Internet routers,
 VoIP base stations,
 Telephone handsets and other customized hardware.
CPE equipment can be owned by the customer or leased from the telecommunications
company. CPE also includes the interior wiring at the customer's location that is connected to a
communication service.
Cable/Pay TV:

Closed circuit TV (CCTV)


CCTV relies on strategic placement of cameras, and observation of the camera's input on
monitors somewhere. Because the cameras communicate with monitors and/or video recorders
across private coaxial cable runs or wireless communication links.

4|Page
Closed-circuit television (CCTV) involves the use of video cameras to produce images for
display on a limited number of screens connected directly to a non-broadcast transmission
system (e.g., a network of cables). Commercial cable TV is, technically, an example of CCTV,
but the term "closed-circuit TV" is generally reserved for systems serving a small number of
screens that are monitored for security purposes. CCTV is a ubiquitous feature of institutional
security systems. It is employed by prisons, banks, urban police forces, airports, military
organizations, utilities, large corporations, various other organizations, and wealthy individuals.
Some specific applications of CCTV are:

 Remote viewing of dangerous industrial processes, rocket liftoffs, and other operations.
 Perimeter security around power plants, military installations, warehouses, police
stations, and other defended facilities.

 Intrusion or theft monitoring of secure spaces, whether indoors (halls, lobbies, specific
doors and rooms, etc.) Or outdoors (parking lots, automatic teller machines, loading
docks, etc.).
 Monitoring of vehicular traffic for traffic-control purposes or detection of illegal activity
(speeding, smuggling, etc.).
 Identity-checking of persons desiring entry into a building.
 Computerized recognition of individual faces, with possible identification of "wanted"
persons.
 Overseeing locations that would be hazardous to a human, for example, highly
radioactive or toxic industrial environments.
 Building and grounds security.
 Obtaining a visual record of activities in situations where it is necessary to maintain
proper security or access controls (for example, in a diamond cutting or sorting
operation; in banks, night-clubs, or airports).

Free to air TV
Free-to-air (FTA) are television (TV) and radio services broadcast in clear (unencrypted) form,
allowing any person with the appropriate receiving equipment to receive the signal and view or
listen to the content without requiring a payment, other ongoing cost or one-off fee (e.g. Pay-
per-view). In the traditional sense, this is carried on terrestrial radio signals and received with an
antenna.

5|Page
FTA also refers to channels and broadcasters providing content for which no payment is
expected, even though they may be delivered to the viewer/listener by another carrier for which a
payment is required, e.g. cable, satellite or the Internet.
Free-to-air TV refers to television stations that are broadcast around the world with no
encryption to block reception. They are different from local air stations in that they broadcast
worldwide rather than just locally. Anyone can receive these TV stations without paying for the
service, provided they have the equipment to do so.
FTA vs. Standard Broadcast
Free-to-air stations use satellites to transmit their signals, much like most cable and satellite
stations do. This is where they differ from most free broadcast stations that only broadcast
through antennas. There are a few localized TV stations that transmit over satellites to make
them free-to-air stations.
FTA vs. Cable/Satellite
Free-to-air stations do not encrypt their signals when they transmit them, as opposed to most
cable/satellite stations. This is why anyone can receive the stations without subscribing to a
provider that decrypts the signal and/or provides the customer with the equipment to do so.
Equipment
To receive free-to-air TV, people still need special equipment, which is similar to the equipment
used for satellite TV packages. A satellite dish is required, along with an FTA receiver that can
receive MPEG-2 video; these are one-time expenses as opposed to the monthly subscription that
a cable/satellite package requires. A number of retailers sell these receivers and equipment, and
they often provide lists of the available FTA channels.
Money
Because free-to-air stations don't get money from subscription fees, they must generate revenue
elsewhere. This usually comes from corporate advertising, tax dollars and/or public donations,
much like standard commercial or public broadcast stations receive money.

What is Intercom?

An intercom (intercommunication device), talkback or door phone is a stand-alone voice


communications system for use within a building or small collection of buildings. Its a two-way

6|Page
communication electronic device that contains circuitry for the purpose of transmitting and
receiving audio and/or video transmissions.
Intercom allows a person speaking into a microphone to be heard on a speaker by people in a
different room or area.

Intercom solutions have long outgrown the image of the single-line, single-button door buzzer
panel. In a wide range of communication and building management settings, as the future
central hub technology that brings together everything from audio and video
communication to building security, access control, parking and facility maintenance.

Different types of intercom security systems:


Wireless Intercoms
In applications where wires cannot be run, a wireless system is used.

Wired Intercom Systems


A wired system can give you a little more privacy and eliminate possible interference from
neighboring systems.

Video Intercom
Typically includes a unit that has a camera, speaker, and a push button going to an entrance door,
and an internal monitor unit that can communicate with the entrance unit.

Apartment Intercoms
A visitor presses the correct button for the apartment they want to speak to, and the tenant can
speak back and then press a button to unlock the door.

Security intercom systems


Security intercom systems are used to provide voice communications between two or more
locations for security purposes. Security intercom systems are frequently used between a locked
building entrance door and a constantly attended location in the building.

A simple security intercom system consists of one “Master Station” and one “Sub-Station”. The
Master Station is typically located at the point inside the building where communications is to be
received. The Sub-Station is typically located at the point where the communication is to be
originated.

7|Page
Telephone is an instrument which reproduces sound at a distance through the help of
electricity. It is one of the easiest and common used devices of oral communication. It
facilitates quick exchange of information through personal talk.

There are two types of telephonic communication like

 External telephonic communication


 Internal telephonic communication.

In the former communication an employee of the organization talks with another outside the
organizational building. In the later communication an employee talks with another within the
organization. Because of this nature of telephonic communication, it has been told that it is
quickest and convenient means of external and internal communication.

There are three types of telephone connections like

 Direct exchange line


 Private branch exchange
 Intercom.

Office Equipment
Importance of office equipment
Efficiency in the office is just as important as efficiency in the factory. Office machines and
appliances are all such equipments which save time and labour in office work. Now-a-days
office machines and equipments in offices because of the following reasons:
Reduction in operating costs: - Office machines are labour saving devices. They save
manual effort and increase productivity and thus lead to overall reduction in operating
costs.
Higher efficiency: The speed of work is greatly increased. This results in higher
efficiency on account of saving in time. Written matter is generally neat and legible.
Greater accuracy: One of the objectives of using machines is accuracy of work
especially in accounting, computation and calculations. They minimize clerical errors.

8|Page
Reduction of monotony: The repetitive nature of office work is generally monotonous
and cause boredom. Human labour can be spared of these effects when machines are
used.
Effective control: office equipment enables management to exercise more effective
control over office activities. For example, data can be analyzed by computers promptly
to check the quickly of work done.
Better service: The use of machines results in improvement of office services and
activities. For example, the invoices, statements and other documents are prepared in
legible form and distributed and dispatched more promptly. This enhances the popularity
of the organization.

Disadvantages:
There are certain limitations associated with mechanization of office services. These limitations
are outlined below:
Heavy investment: Many office machines like computer require huge initial investment.
Generally it may not be possible to make the maximum use of a costly machine. An idle
machine is as wasteful as idle labour.
High maintenance cost: Machines require periodical repair, cleaning, oiling and
maintenance. This involves an additional cost for the organization. Apart from this,
running cost may also be very high e.g., computers need air-conditioning and special
attention. Breakdown of machine may cause considerable loss.
Cost of skilled operators: special skills are required for operating machines and it is
necessary to pay more for employee’s skilled and trained staff. Money has also to be
spent on the training of office staff.
Problem of changing existing system: Machines purchased for specialized jobs cannot
be adapted to new systems. Machines make the existing system less flexible.

9|Page
Employee’s resistance: Employees generally do not like installation of machines due to
fear of unemployment and losing their jobs.
COMPUTER
These days the computer is the most commonly used machine in big offices. A computer is a
machine that can perform a variety of operations such as: arithmetical calculations, comparison
of data, storage of information, analysis of data and preparation of diagrams and charts. The
main component of computer is the ‘memory’ unit. The input data and ‘programmers’ are fed
and remain available for reproduction.
Fax
The FAX service enables instant transmission of the facsimile of an entire document. It can send
handwritten and printed matter as well as pictures; charts and diagrams to different locations
within or outside the country.
Telephone System
Perhaps the primary means you will use for communicating with customers and vendors will be
the telephone.

Computer network:
Hubs
Hubs are simple network devices, and their simplicity is reflected in their low cost. Small hubs
with four or five ports (often referred to as workgroup hubs) cost less than $50; with the requisite
cables, they provide everything needed to create a small network. Hubs with more ports are
available for networks that require greater capacity Figure 1.1 shows an example of the type of
hub you might see on a corporate network.

10 | P a g e
FIGURE 1.1 a high-capacity, or high density, hub
Most hubs are referred to as either active or passive. Active regenerate a signal before
forwarding it to all the ports on the device and requires a power supply. Small workgroup hubs
normally use an external power adapter, but on larger units the power supply is built in. Passive
hubs, which today are seen only on older networks, do not need power and they don’t regenerate
the data signal.

Regeneration of the signal aside, the basic function of a hub is to take data from one of the
connected devices and forward it to all the other ports on the hub. This method of operation is
inefficient because, in most cases, the data is intended for only one of the connected devices.
You can see a representation of how a hub works in Figure 3.3.

Broadcasting: - the method of sending data to all systems regardless of the intended recipient is
referred to as broadcasting. On busy networks, broadcast communications can have a significant
impact on overall network performance.
Due to the inefficiencies of the hub system and the constantly increasing demand for more
bandwidth, hubs are slowly but surely being replaced with switches. As you will see in the next
section, switches offer distinct advantages over hubs.

Switches
Like hubs, switches are the
connectivity points of an
Ethernet network. Devices
connect to switches via twisted-pair

11 | P a g e
cabling, one cable for each device. The difference between hubs and switches is in how the
devices deal with the data they receive. Whereas a hub forwards the data it receives to all the
ports on the device, a switch forwards it to only the port that connects to the destination device. It
does this by learning the MAC address of the devices attached to it and then by matching the
destination MAC address in the data it receives. Figure 3.1 shows how a switch works.

By forwarding data to only the connection that should receive it, the switch can greatly improve
network performance. By creating a direct path between two devices and controlling their
communication, the switch can greatly reduce the traffic on the network and therefore the
number of collisions. As you might recall, collisions occur on Ethernet networks when two
devices attempt to transmit at exactly the same time. In addition, the lack of collisions enables
switches to communicate with devices in full-duplex mode. In a full-duplex configuration,
devices can send data to and receive data from the switch at the same time. Contrast this with
half-duplex communication, in which communication can occur in only one direction at a time.
Full-duplex transmissions speeds are double that of a standard half-duplex connection. So, a
10Mbps connection becomes 20Mbps, and a 100Mbps connection becomes 200Mbps. The net
result of these measures is that switches can offer significant performance improvements over
hub-based networks, particularly when network use is high. Irrespective of whether a connection
is at full or half duplex, the method of switching dictates how the switch deals with the data it
receives.

The following is a brief explanation of each method:

12 | P a g e
Cut-through: In a cut-through switching environment, the packet begins to be forwarded as
soon as it is received. This method is very fast, Switches but it creates the possibility of errors
being propagated through the network, because no error checking occurs.

Store-and-forward: Unlike cut-through, in a store-and-forward switching environment, the


entire packet is received and error-checked before being forwarded. The upside of this method is
that errors are not propagated through the network. The downside is that the error-checking
process takes a relatively long time, and store-and-forward switching is considerably slower as a
result.

Fragment Free: To take advantage of the error checking of store-and forward switching, but
still offer performance levels nearing that of cut through switching, Fragment Free switching can
be used. In a Fragment Free-switching environment, enough of the packet is read so that the
switch can determine whether the packet has been involved in a collision. As soon as the
collision status has been determined, the packet is forwarded.
Bridges
Bridges are used to divide larger networks into smaller sections. Bridges accomplish this by
sitting between two physical network segments and managing the flow of data between the two.
By looking at the MAC address of the devices connected to each segment, bridges can elect to
forward the data (if they believe that the destination address is on another interface) or block it
from crossing (if they can verify that it is on the interface from which it came). Figure 3.2 shows
how a bridge can be used to segregate a network.

13 | P a g e
A bridge functions by blocking or forwarding data, based on the destination MAC address
written into each frame of data. If the bridge believes the destination address is on a network
other than that from which the data was received, it can forward the data to the other networks to
which it is connected. If the address is not on the other side of the bridge, the data is blocked
from passing.

Routers
In a common configuration, routers are used to create larger networks by joining two network
segments. A small office, home office (SOHO) router is used to connect a user to the Internet. A
SOHO router typically serves 1 to 10 users on the system. A router can be a dedicated hardware
device or a computer system with more than one network interface and the appropriate routing
software. All modern network operating systems include the functionality to act as a router.

14 | P a g e
A router derives its name from the fact that it can route data it receives from one network to
another. When a router receives a packet of data, it reads the packet’s header to determine the
destination address. After the router has determined the address, it looks in its routing table to
determine whether it knows how to reach the destination; if it does, it forwards the packet to the
next hop on the route. The next hop might be the final destination, or it might be another router.
Figure 3.3 shows, in basic terms, how a router works.

What is Voice over IP?


Voice over IP is short for Voice over Internet Protocol, and is better known as VoIP.

Voice over IP refers to the transmission of voice traffic over internet-based networks
instead of the traditional PSTN (Public Switched Telephone Network) telephone networks.
The Internet Protocol (IP) was originally designed for data networking and following its
success, the protocol has been adapted to voice networking by packetizing the information
and transmitting it as IP data packets. VoIP is now available on many smartphones,
personal computers and on internet access devices such as tablets.

15 | P a g e
VoIP can facilitate tasks and deliver services that might be cumbersome or costly to
implement when using traditional PSTN:

 More than one phone call can be transmitted on the same broadband phone line.
This way, voice over IP can facilitate the addition of telephone lines to businesses
without the need for additional physical lines.
 Features that are usually charged extra by telecommunication companies, such as
call forwarding, caller ID or automatic redialing, are simple with voice over IP
technology.
 Unified Communications are secured with voice over IP technology, as it allows
integration with other services available on the internet such as video conversation,
messaging, etc.

PSTN Versus VoIP


PSTN VoIP
 All channels carried over one Internet
 Dedicated Lines connection
 Each line is 64kbps (in each direction)  Compression can result in 10kbps (in each
 Features such as call waiting, Caller ID and so direction)
on are usually available at an extra cost  Features such as call waiting, Caller ID and
 Can be upgraded or expanded with new so on are usually included free with service
equipment and line provisioning  Upgrades usually requires only bandwidth
 Long distance is usually per minute or and software upgrades
bundled minute subscription  Long distance is often included in regular
 Hardwired landline phones (those without an monthly price
adapter) usually remain active during power  Lose power, lose phone service without
outage power backup in place
 When placing a 911 call it can be traced to  911 emergency calls cannot always be
your location traced to a specific geographic location

These and many other advantages of VoIP are making businesses adopt VoIP Phone
Systems at a staggering pace.

Install Equipment accessories


Tools used during installation of Equipments

Antistatic device
An antistatic device is any device that reduces, dampens, or otherwise inhibits electrostatic
discharge; the buildup or discharge of static electricity, which can damage electrical components
such as computer hard drives, and even ignite flammable liquids and gases.

16 | P a g e
Many methods exist for neutralizing, varying in use and effectiveness depending on the
application. Antistatic agents are chemical compounds that can be added to an object, or the
packaging of an object, to help deter the buildup or discharge of static electricity. For the
neutralization of static charge in a larger area, such as a factory floor or workshop, antistatic
systems may utilize electron emission effects such as corona discharge or photoemission that
introduce ions into the area that combine with and neutralize any electrically charged object. In
many situations, sufficient ESD protection can be achieved with electrical grounding.

Cable tester
A cable tester is a device that is used to test the strength and connectivity of a particular type of
cable or other wired assemblies. There are a number of different types of cable testers, each able
to test a specific type of cable or wire (some may be able to test different types of cables or
wires).

Crimpers
A crimping tool is a device used to conjoin two pieces of metal by deforming one or both of
them in a way that causes them to hold each other. The result of the tool's work is called a crimp.
A good example of crimping is the process of affixing a connector to the end of a cable.

17 | P a g e
Tension wrenches
Tension wrenches are used to apply torque to the lock plug to keep pins from being pushed
back down by springs after they are correctly set at the shear line. They are typically shaped like
elongated L's.

Wire stripper
Wire stripper is a pair of opposing blades much like scissors or wire cutters. The addition of a
center notch makes it easier to cut the insulation without cutting the wire. This type of wire
stripper is used by rotating it around the insulation while applying pressure in order to make a cut
around the insulation. since the insulation is not bonded to the wire, it then pulls easily off the
end. This type of wire stripper can be used on wires of any size.

Trolley
A trolley is a small vehicle with wheels that can carry things. People can push trolleys. There is
different kind of trolleys. There are shopping trolleys which are used in supermarkets and other
large stores with self-service.

18 | P a g e
Test equipment for different electronics devices
Bit Error Rate (BER) testers
Bit error rate. In digital transmission, the number of bit errors is the number of received bits of
a data stream over a communication channel that has been altered due to noise, interference,
distortion or bit synchronization errors. The bit error rate (BER) is the number of bit errors per
unit time.

Multimeter
A multimeter or a multitester, also known as a VOM (Volt-Ohm-Milliammeter), is an
electronic measuring instrument that combines several measurement functions in one unit. A
typical multimeter can measure voltage, current, and resistance. Analog multimeters use a

19 | P a g e
microammeter with a moving pointer to display readings. Digital multimeters (DMM, DVOM)
have a numeric display, and may also show a graphical bar representing the measured value.
Digital multimeters are now far more common due to their cost and precision, but analog
multimeters are still preferable in some cases, for example when monitoring a rapidly varying
value.

Optical time-domain reflectometer


An optical time-domain reflectometer (OTDR) is an optoelectronic instrument used to
characterize an optical fiber. An OTDR is the optical equivalent of an electronic time domain
reflectometer. It injects a series of optical pulses into the fiber under test and extracts, from the
same end of the fiber, light that is scattered (Rayleigh backscatter) or reflected back from points
along the fiber. The scattered or reflected light that is gathered back is used to characterize the
optical fiber. This is equivalent to the way that an electronic time-domain meter measures
reflections caused by changes in the impedance of the cable under test. The strength of the return
pulses is measured and integrated as a function of time, and plotted as a function of fiber length.

RF sweep testers

20 | P a g e
Radio frequency sweep or "Frequency sweep" or "RF sweep" refer to scanning a radio
frequency band for detecting signals being transmitted there. This is implemented using a radio
receiver having a tunable receiving frequency. As the frequency of the receiver is changed to
scan (sweep) a desired frequency band, a display indicates the power of the signals received at
each frequency.

Signal Level Meters (SLM)


Signal Level Meter is an instrument used for the construction and maintenance of
analog TV / digital TV, and the measurement of TV signal level and power level. It
is widely applied in the routine maintenance of the CATV system.

Transmission measuring sets


Transmission impairment measuring set is a rugged, portable test set that provides the basic analog tests to isolate
faults and to qualify circuits for voice, data, and broadcast services. Measurements include level, frequency, circuit
noise, noise-with-tone, signal-to-noise ratio and noise-to-ground

21 | P a g e
Voltage Standing Wave Ratio (VSWR) meters.
The SWR meter or VSWR (voltage standing wave ratio) meter ,This meter can be used to
indicate the degree of mismatch between a transmission line and its load (usually a radio
antenna), or evaluate the effectiveness of impedance matching(In electronics, impedance
matching is the practice of designing the input impedance of an electrical load or the output
impedance of its corresponding signal source to maximize the power transfer or minimize signal
reflection from the load.) efforts.

Interconnecting cables
An interconnect is an electrical or optical connection or cable that connects two devices or
more. An interconnect joins electric conductors electrically and mechanically to other
conductors and to the terminals of electrical devices.

Communications cables

Category 5 or 6
Category 5 cable, commonly referred to as Cat 5, is a twisted pair cable for computer networks.
The cable standard provides performance of up to 100 Mbps and is suitable for most varieties of
Ethernet over twisted pair. Cat 5 is also used to carry other signals such as telephony and video.

Coaxial cable
It is a type of electrical cable that has an inner conductor surrounded by a tubular insulating
layer, surrounded by a tubular conducting shield. Many coaxial cables also have an insulating
outer sheath or jacket. The term coaxial comes from the inner conductor and the outer shield
sharing a geometric axis.

22 | P a g e
Fiber optic patch cord
A fiber optic patch cord is a fiber optic cable capped at either end with connectors that allow it to
be rapidly and conveniently connected to CATV, an optical switch or other telecommunication
equipment. Its thick layer of protection is used to connect the optical transmitter, receiver, and
the terminal box.

23 | P a g e

You might also like