g10 4th Quarter Module
g10 4th Quarter Module
LEARNING MODULE
T.L.E. 10 – COMPUTER SYSTEM SERVICING NC2
The Notre Dame of Katiko, Inc.
Name ____________________________________________________
Section ____________________________________________________
Subject TeacherARTHUR C. ARCIAGA__________________________________
Class Adviser ____________________________________________________
QUARTER 4
SETTING-UP COMPUTER NETWORKS (SUCN)
LO1 - Install network cables
(TLE_IACSS9-12SUCN-IVa-j-33)
The unit of competency “Set-up Computer Networks Systems” contains knowledge, skills
and attitudes required for a Computer System Servicing NC II course.
You are required to go through a series of learning activities in order to complete each of the
learning outcomes of the module. In each learning outcome there are Information Sheets, Job
Sheets, Operation Sheets, and Activity Sheets. Follow these activities on your own and answer
the Self-Check at the end of each learning activity.
If you have questions, don’t hesitate to ask your teacher for assistance.
If you can demonstrate to your teacher that you are competent in a particular skill or skills,
talk to him/her about having them formally recognized so you don’t have to do the same training
again. If you have a qualification or Certificate of Competency from previous trainings show it to
your teacher. If the skills you acquired are still current and relevant to this module, they may
become part of the evidence you can present for RPL. If you are not sure about the currency of your
skills, discuss it with your teacher.
2|Page
After completing this module ask your teacher to assess your competency. Result of your
assessment will be recorded in your competency profile. All the learning activities are designed for
you to complete at your own pace.
Inside this module you will find the activities for you to complete followed by relevant
information sheets for each learning outcome. Each learning outcome may have more than one
learning activity.
List of Competencies
No. Unit of Competency Module Title Code
MODULE DESCRIPTOR:
This unit covers the outcomes required in setting-up computers networks for LANs and small-office
home-office (SOHO) systems. It consists of competencies to install network cables, set network
configuration, set router/Wi-Fi/ wireless access point/repeater configuration as well as to inspect
and test the configured computer networks.
Contents:
1. OH&S policies and procedures
2. Tools, equipment and testing devices
3. Computer hardware
4. Operating system
5. Established installation procedures
6. Peripherals/devices
7. Application software
8. Stress test
Assessment Criteria
2.1 Network connectivity of each terminal is checked in accordance with network design.
2.2 Any fault or problem in the network system is diagnosed and remedied in line with the standard
operating procedures.
2.3 Network interface card (NIC) settings are configured in accordance with network design.
2.4 Communication checking between terminals are carried out in accordance with OS network
configuration guides
2.5 Unplanned events or conditions are responded to in accordance with established procedures
CONDITIONS
The students/trainees must be provided with the following:
Page |3
• PC or workstations
• Instructional Manuals such as: Occupational Health and Safety policies and
procedure manual, device manual and hardware diagrams and charts.
• Tools, equipment’s and test instruments such as: protective eyewear, digital
multi-meter, crimping tools, pliers, screw drivers.
• Supplies and materials such as: appropriate operating system ,driver software,
software applications and programs.
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
4. Oral Questioning
INTRODUCTION
Welcome to the next level of your modular training in Computer System Servicing (CSS)
under the Information and Communications Technology (ICT) Course. In this module, you will have
a great deal of understanding of NETWORK SETTING CONFIGURATION.
At the end of this module you will be able to apply the knowledge and skills on planning and
preparing for configuration, configure computer systems and networks and inspecting configured
computer systems and networks. Those skills are essential for you to pass the National Certification
II in Computer System Servicing.
In this module, topics will be introduced progressively for easy understanding. After carefully
answering the pre assessment exercises, reading all the lessons, answering all the guide questions,
skillfully performing all the activities, showing evidences of learning and finally answering the
summative test you will gain a considerable knowledge and skills in configuring computer systems
and networks essential to be successful in computer system servicing as one of the career option in
ICT.
Reminder! Just follow the instructions given in this module. Now let us start exploring new
things in this module.
INFORMATION SHEET NO. 2.2-1
Safety Procedures
It is essential to maintain safe working conditions to prevent accidents and injury to any
person or damage to any object in a work area. New staff and visitors must be informed of the
appropriate safety procedures. Any transgression of the procedures must be reported.
As an aspiring computer technician, you should be aware of all possible dangers in the
workplace. It is a must to follow proper procedures for handling computer equipment. Failure to
follow the prescribed safety procedures could result in fines, criminal convictions, and damage to
equipment, claims for damage from the owner of the property and data, injury, or death.
A safe work space is clean, organized, and well-lit. The disposal or recycling of hazardous
computer components must be done properly. Make sure to follow regulations that govern how to
dispose specific items. When an organization violates these regulations, there can be legal
consequences.
To keep you safe, this module provides the general and fire safety guidelines that protects the
technician and the equipment.
Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to
eyesight. As a best practice, make sure that a fire extinguisher and first aid kit are available in case
of fire or injury. Here are some general safety guidelines:
• Remove your watch or any other jewelry and secure loose clothing.
• Turn off the power and unplug equipment before opening the case and performing
service.
• Cover any sharp edges inside the computer case with tape.
• Never open a power supply or a monitor.
• Do not touch areas in printers that are hot or those which use high voltage.
• Know where the fire extinguisher is located and learn how to use it.
• Know where the first aid kit is located.
• Keep food and drinks out of your workspace.
• Keep your workspace clean and free of clutter.
• Lift heavy objects with sturdy leg support to avoid back injury.
General Directions: Identify whether each statement is true or false. Gather picture evidences that
make it true or false. On the third column, show the effects of not following the safety precautions
through a picture presentation.
Example:
Turn off the power and unplug equipment before opening the case and performing service
This tab allows you to make the same adjustments you can
make in the Windows boot.ini file without having to edit the
file. It shows configuration options for the operating system
and advanced debugging settings, including the following:
• Safe boot (Minimal): Boots the Windows
graphics user interface in safe mode running only
critical system services. Networking is disabled.
• Safe Boot (Alternate Shell): Boots the Windows
Command Prompt in safe mode running only critical
system services. Networking and the graphical user
interface are disabled.
Boot • Safe Boot (Active Directory Repair): Boots the
Windows graphical user interface in safe mode
running critical system services and Active Directory.
• Safe boot (Network): Boots the Windows
graphical user interface in safe mode running only
critical system services. Networking is enabled.
• No GUI boot. Does not display Windows splash
screen when booting.
Warning:
Disabling services that normally run at boot time
might cause some programs to malfunction or result in
system instability. Do not disable services in this list unless
you know they are not essential to your computer’s
operation. Selecting Disable all will not disable some secure
Microsoft services required for the operating system to start.
Page |7
Note:
Disabling applications that normally run at boot time might result in
related applications starting more slowly or not running as expected.
1. The Registry has a hierarchical structure, like the directories on your hard disk. Each branch
(denoted by a folder icon in the Registry Editor, see below) is called a key. Each key can contain
other keys, as well as Values. Each value contains the actual information stored in the Registry.
There are three types of values: String, Binary, and DWORD - the use of these depends upon the
context.
2. There are six main branches (five in Windows 2000 and Windows XP), each containing a
specific portion of the information stored in the Registry. They are as follows:
o HKEY_CLASSES_ROOT - this branch contains all of your file types as well as OLE
information for all your OLE-aware applications.
o HKEY_CURRENT_USER - this branch points to the part of HKEY_USERS appropriate
for the current user.
o HKEY_LOCAL_MACHINE - this branch contains information about all of the hardware
and software installed in your computer. Since you can specify multiple hardware
configurations, the current hardware configuration is specified in
HKEY_CURRENT_CONFIG.
o HKEY_USERS - this branch contains certain preferences (such as colors and control
panel settings) for each of the users of the computer. In Windows 95/98/Me, the default
branch here contains the currently-logged in user. In Windows 2000/XP, the default
branch here contains a template to be used for newlyadded users.
o HKEY_CURRENT_CONFIG - this branch points to the part of HKEY_LOCAL_MACHINE
appropriate for the current hardware configuration.
HKEY_DYN_DATA (Windows 95/98/Me only) - this branch points to the part of
HKEY_LOCAL_MACHINE, for use with Windows' Plug-&-Play subsystem.
3. Direct X Diagnostic: The Microsoft DirectX Diagnostic Tool provides you with information
about the DirectX API components and drivers on your system. It enables you to test sound and
graphics output and Microsoft DirectPlay service providers. You can use the diagnostic tool to
gather information about your system to use for diagnostic purposes.
If you are experiencing problems when running
Microsoft DirectX applications, the DirectX Diagnostic Tool can help you find the source of the
trouble such as incorrect versions of DirectX components, lack of hardware acceleration, devices
that are not connected and unsigned drivers.
Folder options
• Network and Internet Connections: Applets that configure all the connection types:
Internet options
Network connections
• Add or Remove Programs: An applet to add or remove programs and windows
components safely
• Sounds, Speech, and Audio Devices: Applets that control all the settings for sound:
Sounds and audio devices
Speech
Portable media devices
• Performance and Maintenance: Applets to find information about your computer or
perform maintenance:
Administrative tools
Power options
Scheduled tasks
System
Printers and Other Hardware: Applets to configure devices connected to your computer:
Game controllers
Keyboard
Mouse
Phone and modem options
Printers and faxes
Scanners and cameras
User Accounts: Applets to configure options for users and their email:
E-mail
User accounts
Date, Time, Language, and Regional Options: Applets to change settings based on your
location and language:
Date and time
Regional and language options
• Accessibility Options: A wizard used to configure windows for vision, hearing, and
mobility needs
• Security Center: Applet used to configure security settings for:
Internet options
Automatic updates
Windows firewall
REFLECT
Research and Explore
Directions: Conduct a research that identifies other available tools used for computer system and
network configuration. Use some other resources like the World Wide Web and interview a
practitioner (preferably an IT specialist or a computer technician) to find out the different tools they
use for configuration. Write your research on the space provided .Your research will be rated
according to the following criteria
Format/Layout Followed poorly the Some format and Most format and All the requirements
(15%) requirements related layout related layout related related to format
• Presentation of the to format and layout. requirements requirements were and layout were
text were met. met. strictly followed.
• Structuring of text
• Requirements of
length, font and style
followed
Content/Information The research was not The research was The research was The research was
(50%) objective and poorly objective and for objective and for objective and
• All elements of the addresses the issues some part the most part addresses with an
topics are addressed referred in the addresses an in- addresses an in- indepth analysis all
• The information is proposed topic. depth analysis depth analysis of the issues referred
technically sound The provided The provided most issues in the proposed
Information based on information was not information referred in the topic.
careful research necessary or not was, for some proposed topic. The provided
Coherence of information sufficient to discuss part, The provided information was
these issues. necessary and information was, for necessary and
sufficient to the most part, sufficient to discuss
discuss these necessary and these issues.
issues. sufficient to discuss
these issues.
P a g e | 11
Quality of Writing (25%) The essay was not The essay was The essay was well The essay was well
• Clarity and well written, and well written for the most written from
cohesiveness of contains many written for some part, without start to finish,
sentences and spelling errors, and/or part, without spelling, grammar without spelling,
paragraphs No grammar spelling, grammar or use of English grammar or use of
errors in spelling, errors and/or use of or use of English errors. English errors.
grammar and use of English errors. errors. The essay is for the The essay was well
English It lacks clarity and/or The essay is for most part well organized, clear and
• Organization and does not present some part well organized, clear presents ideas in a
coherence of ideas ideas in a coherent organized, clear and presents ideas coherent way.
way. and presents in a coherent way.
ideas in a
coherent way.
References (10%) References were not Some of the Most of the All of the references
Soundness of appropriately used references were references were were appropriately
references and cited. appropriately appropriately used used and cited.
used and cited. and cited.
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
12 | P a g e
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
TRANSFER
Oral Presentation
Directions: After the thorough research and exploration, you have to present your work
individually in an oral presentation. Use video recording and send it to my messenger account. Your
performance will be rated based on the rubrics provided in this section.
(75-
CRITERIA (70- (85-89) (90-100)
79) (80-84)
74)
1. Gave an interesting introduction
2. Presented clear explanation of topic
3. Presented information in a logical manner
4. Used complete sentence
5. Offered a concluding statement
6. Spoke clearly, correctly, distinctly, and
confidently
7. Maintained eye contact
8. Maintained good and proper posture
9. Utilized audio-visual materials
10. Answered questions sufficiently and received
comments openly
Total
Grand Total
P a g e | 13
As a future computer technician you must be diligent and eager to know the different
procedures in using the tools for computer system configuration. This will help and guide you to
carry out a particular job in a proper manner. Once you already identify them, you must also
acquire the necessary and appropriate skills to apply them in actual situations.
This part of the module present some of the required procedures in computer system
configuration. Take note that you need to exert extra effort in finding out some procedures which
are not in this module. This is your chance to explore and learn through your own experience.
The subsequent sections below present the various procedures in using Computer System
Configuration Tools:
To display the contents of a key (folder), just click the desired key, and look at the
values listed on the right side.
You can add a new key or value by selecting New from the Edit menu.
You can rename any value and almost any key with the same method used to rename
files; right-click on an object and click rename, or click on it twice (slowly), or just press F2
on the keyboard.
Lastly, you can delete a key or value by clicking on it, and pressing Delete on the
keyboard, or by right-clicking on it, and choosing Delete.
Caution: Using regedt32.exe or regedit.exe incorrectly might cause configuration problems that
may require you to reinstall the operating system.
To run the DirectX Diagnostic Tool (DX Diagnostic Tools Window of Windows XP differs from
Windows 7 but it does the same function):
• Click on Start Button, type Run on the search box.
• On the Run window, Type in dxdiag and click Ok or press Enter, as shown in Figure
9, Run Dialog Box.
The Music tab displays your current MIDI settings, and allows you to test the DirectMusic
component of DirectX. Click on the Test DirectMusic button to perform the test. If the DirectX
Diagnostic Tool detects a problem with DirectMusic, a warning message is displayed in the
Notes box.
After dealing with the preparation for configuration, you can now proceed with the next
section of this module which is Set Network Configuration.
This lesson is designed to give you the proper procedures used in configuring network
system. At the end of this lesson you should be able to:
Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain hazards:
• Dangerous chemicals
• Tools with sharp edges
• Light which you cannot see that can burn your eyes
• Glass shards produced by cutting fiber-optic cable that can cause bodily harm
P a g e | 17
Specific types of tools and chemicals are used when working with fiber-optic cable. These materials
must be handled with care.
Chemicals
The solvents and glues used with fiber optics are dangerous. You should handle them with extreme
care. Read the instructions on the label, and follow them carefully. Also, read the material safety
data sheet (MSDS) that accompanies the chemicals to know how to treat someone in case of
emergency.
Tools
When working with any tool, safety should always be your first priority. Any compromise in safety
could result in serious injury or even death. The tools used for working with fiber optics have sharp
cutting surfaces that are used to scribe glass. Other tools pinch cables with high pressure to fasten
connectors to them. These tools can produce shards of glass that can splinter and fly into the air.
You must avoid getting them on your skin and in your mouth or eyes.
Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can produce tiny fragments of
glass or plastic that can penetrate your eyes or skin and cause severe irritation. The fibers can be
extremely difficult to see on your skin because they are clear and small. When you work with fiber-
optic cabling, the working surface should be a dark mat so that you can see the tiny glass or plastic
fragments. The mat should also be resistant to chemical spills.
You should keep the work area clean and neat. Never pick up fiberoptic fragments with your
fingers. Use tape to pick up small fragments, and dispose them off properly. Use a disposable
container, such as a plastic bottle with a screw-on lid, to store fiber fragments. Close the lid tightly
before disposing the container.
Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic strands. The light is a color
that humans cannot see. It can damage your eyes before you can feel it. When you use a magnifier
to inspect fiber-optic cable and connectors, the light emitted from the fiber could be directed into
your eyes. When working with fiber, be sure to disconnect the light source. Use special detectors to
help you tell if a fiber is energized.
18 | P a g e
Twisted Pair
Twisted pair is a type of copper cabling that is used for telephone communications and
most Ethernet networks. A pair of wires forms a circuit that transmits data. The pair is twisted to
provide protection against crosstalk, the noise generated by adjacent pairs of wires in the cable.
Pairs of copper wires are encased in color-coded plastic insulation and are twisted together. An
outer jacket protects the bundles of twisted pairs.
Source: www.lanshack.chack.c
om
Figure 39. UTP and STP Cable
When electricity flows through a copper wire, a magnetic field is created around the wire. A
circuit has two wires, and in a circuit, the two wires have oppositely-charged magnetic fields. When
the two wires of the circuit are next to each other, the magnetic fields cancel each other out. This is
called the cancellation effect. Without the cancellation effect, your network communications become
slow because of the interference caused by the magnetic fields.
Category Rating
UTP comes in several categories that are based on two factors:
• The number of wires in the cable
• The number of twists in those wires
P a g e | 19
1. Category 3 is the wiring used for telephone systems and Ethernet LAN at 10 Mega byte
per second (Mbps).
2. Category 3 has four pairs of wires.
3. Category 5 and Category 5e have four pairs of wires with a transmission rate of 100
Mbps.
4. Category 5 and Category 5e is the most common network cables used.
5. Category 5e has more twists per foot than Category 5 wiring.
These extra twists further prevent interference from outside sources and from the
other wires within the cable.
Some Category 6 cables use a plastic divider to separate the pairs of wires, which
prevents interference. The pairs also have more twists than Category 5e cable.
Coaxial Cable
Coaxial cable is a copper-cored cable surrounded by a heavy shielding. Coaxial cable is
used to connect the computers to the rest of the network.
Fiber-Optic Cable
An optical fiber is a glass or plastic conductor that transmits information using light. Fiber optic
cable has one or more optical fibers enclosed in a sheath or jacket. Because it is made of glass,
fiber-optic cable is not affected by EMI or RFI. All signals are converted to light pulses to enter the
cable and are converted back into electrical signals when they leave it. This means that fiber-optic
cable can deliver signals that are clearer, and can go farther, without compromising the clarity of
signals.
• Single-mode is the cable that has a very thin core. It is harder to make, uses lasers as
a light source, and can transmit signals dozens of kilometers with ease.
Bear in mind that safety precautions must always be applied and observed during the
fabrication of the said cables. Also, materials and tools to be used must always be complete and
functional to save time, money and effort.
The following items are the materials and tools used for making Ethernet cables:
Ethernet Cable Category 5e or Cat5e- standard wire for cabling;
RJ45 crimpable connectors for Cat5e;
RJ45 Crimping tool;
Wire cutter, stripper or pliers; and Ethernet cable tester.
Cross-Over Straight-Through
The picture below will serve as your guide in making the two important Ethernet cables.
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping tool has a
razor blade that will do the trick with practice.
4. Use wire cutter to make a straight cut across the wires 1/2 inch from the cut sleeve to the
end of the wires.
5. Push the wires into the connector. Each wire fits into a slot in the RJ45 connector. Note the
position of the blue plastic shielding. Also note how the wires go all the way to the end.
8. For a standard "Straight-Through" cable, repeat all steps and wire color order on the other
end of cable. For a cross-over cable - the other end will have a different color order as shown by
the crossover picture on page 84.
9. Make sure to test the cables before installing them. An inexpensive Ethernet cable tester does
this quite well.
Directions: Complete the criss-cross puzzle and familiarize yourself of the cables being described.
Write your answer on the space provided.
CABLES
Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable
P a g e | 23
REFLECT/UNDERSTAND
Now that you are equipped with the knowledge on the different cables used in networking,
you also need to know that fiber technologies and connectors have changed through the years. In
these videos, you will learn about the different fiber connectors, copper connectors and their
characteristics. To watch the video presentations just type in the following URL:
1) http://www.professormesser.com/n10-005/copper-connectors/
2) https://www.youtube.com/watch?v=TpoUUDYyikI
3) https://www.youtube.com/watch?v=EH9zlCZe1qA
1. What are the different types of fiber connectors? Cite their advantages and
disadvantages.
___________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
______________________________________________________________________________________
2. List down the different types of connectors.
___________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
______________________________________________________________________________________
3. What are the characteristics of UTP, STP and coaxial cable?
___________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
______________________________________________________________________________________
24 | P a g e
TRANSFER
Create your own Ethernet Cable
Directions: Prepare the following tools and materials in fabricating your own cross-over and
straight-through cables.
Materials:
6 meters Ethernet Cable Category 5e or Cat5e-standard wire for cabling;
RJ45 crimpable connectors for Cat5e; Tools:
RJ45 Crimping tool;
Wire cutter, stripper or pliers; and
Ethernet cable Tester / LAN Tester
Follow the procedures cited in this module and apply the safety precautions to avoid injury or any unwanted
incident. You will be given 30 minutes to complete the task. You will be rated using the performance rubrics found on
the next page.
Procedures:
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping tool has a razor blade that will do
the trick with practice.
2. Unwind and pair the similar colors.
3. Pinch the wires between your fingers and straighten them out as shown on page 90. The color order is
important to do this correctly.
4. Use scissors to make a straight cut across the wires 1/2 inch from the cut sleeve to the end of the wires.
5. Push the wires into the connector. Note the position of the blue plastic shielding. Also note how the wires go all
the way to the end.
6. Take view from the top. Make sure the wires are all the way in. There should be no short wires.
7. In crimping the cable – carefully place the connector into the Ethernet Crimper and cinch down on the handles
tightly. The copper splicing tabs on the connector will pierce into each of the eight wires. There is also a locking
tab that holds the blue plastic sleeve in place for a tight compression fit. When you remove the cable from the
crimper, that end is ready to use.
8. For a standard straight-through cable, repeat all steps and wire color order on the other end of cable. For a
cross-over cable, the other end will have a different color order as shown in the cross-over picture on
Information sheet 2.2-2.
9. Make sure to test the cables before installing them. An inexpensive Ethernet cable tester does this quite well.
Adherence to the
Procedures (30%) -Followed the procedures systematically
Workmanship (15%) -Organized materials and tools while
accomplishing the task and has time management
Quality of Product (40%)
-Produced a fully functional Ethernet Cable