L13 CSS STRUCTURED CABLING SYSTEM
At the end of this module the learners will be able to . . .
○ Describe the role of different LAN cable in computer network according to its type.
○ Explain and enumerate the different types of LAN cable and its use.
○ List the standardization organization in computer networking and structured cabling system.
○ List the evolution and characteristic of computer cabling standardization.
CSS L12 STRUCTURE OF COMPUTER NETWORK
At the end of this learning module the students will be able to . . .
○ Discuss the client and servers functions in computer networking.
○ Understand the concept of Network Protocol
○ Enumerate and classify computer networking topologies.
Program/Course : Computer System Servicing NC II
Unit of Competency : Set-up Computer Networks
Module : Install Network Cables
Learning Outcome 01: Installing Network Cables
for full compilation just visit my website.
http://computersystemsolution.com/
CSS L12 STRUCTURE OF COMPUTER NETWORK
At the end of this learning module the students will be able to . . .
○ Discuss the client and servers functions in computer networking.
○ Understand the concept of Network Protocol
○ Enumerate and classify computer networking topologies.
Program/Course : Computer System Servicing NC II
Unit of Competency : Set-up Computer Networks
Module : Install Network Cables
Learning Outcome 01: Installing Network Cables
for full compilation just visit my website.
http://computersystemsolution.com/
After this module the learners will be able to . . .
○ Enumerate and discuss the tools and equipment use in computer networking.
○ Discuss the color scheme of T568A and T568B standardization of network cabling system.
At the end of this learning module the student are able to:
○ Crimp Ethernet wire and RJ-45 to establish computer network connection.
○ Understand the differences straight through and crossover type of network cabling.
○ Learn the T568A and T568B pin out of twisted pair wiring.
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGMarvin Bronoso
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
After this lesson module the student will be able to . . .
○ Understand the function of computer network.
○ Discuss how the computer network works.
○ Enumerate and explain the different devices use in computer networking.
○ Differentiate the types of computer network
CSS LO7 - PREPARING THE INSTALLER
LEARNING OUTCOME:
AT THE END OF THIS LESSON THE LEARNERS WILL BE ABLE TO . . .
1. Prepare their usb bootable drive installer according to the manufacturer procedure.
2. Prepare their usb drive containing drivers and application software.
3. Learn and experience to install Window 7 operating system.
4. Discover and prepare the basic applications needed to be installed.
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMMarvin Bronoso
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
LEARNING OUTCOME:
AT THE END OF THIS LESSON THE LEARNERS WILL BE ABLE TO . . .
1.Understand the function of Operating System
2. Learn the Minimum requirement for Windows 7 operating system.
3. Learn the procedure in creating and preparing the OS.
3. Learn and experience to install Window 7 operating system.
4. Discover and prepare the basic applications needed to be installed.
This note is about Cables & Connectors of computer networks. It contains detailed information on different types of cables- Coaxial Cable, Twisted Pair Cable, and Fiber Optic Cable.
After this module the learners will be able to . . .
○ Enumerate and discuss the tools and equipment use in computer networking.
○ Discuss the color scheme of T568A and T568B standardization of network cabling system.
At the end of this learning module the student are able to:
○ Crimp Ethernet wire and RJ-45 to establish computer network connection.
○ Understand the differences straight through and crossover type of network cabling.
○ Learn the T568A and T568B pin out of twisted pair wiring.
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGMarvin Bronoso
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
After this lesson module the student will be able to . . .
○ Understand the function of computer network.
○ Discuss how the computer network works.
○ Enumerate and explain the different devices use in computer networking.
○ Differentiate the types of computer network
CSS LO7 - PREPARING THE INSTALLER
LEARNING OUTCOME:
AT THE END OF THIS LESSON THE LEARNERS WILL BE ABLE TO . . .
1. Prepare their usb bootable drive installer according to the manufacturer procedure.
2. Prepare their usb drive containing drivers and application software.
3. Learn and experience to install Window 7 operating system.
4. Discover and prepare the basic applications needed to be installed.
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMMarvin Bronoso
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
LEARNING OUTCOME:
AT THE END OF THIS LESSON THE LEARNERS WILL BE ABLE TO . . .
1.Understand the function of Operating System
2. Learn the Minimum requirement for Windows 7 operating system.
3. Learn the procedure in creating and preparing the OS.
3. Learn and experience to install Window 7 operating system.
4. Discover and prepare the basic applications needed to be installed.
This note is about Cables & Connectors of computer networks. It contains detailed information on different types of cables- Coaxial Cable, Twisted Pair Cable, and Fiber Optic Cable.
Instrumentation Cable In India are a couple of conductor cables that carry low strength electric indicators used for tracking or controlling electric strength structures and their related approaches.
This is a notes about Cables & Connectors of computer networks. It contain details about the information of different types of cables- twisted pair cable, coaxial cable, fiber optical cable, crossover cable , straight through cable, STP/UTP cables & about their connectors.
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKINGMarvin Bronoso
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
After this learning module the learners will be able to . . .
○ Apply the DOS commands in computer networking
○ Check network connectivity using PING command.
○ Checking the default gateway and IP address
CSS L15 - CRIMPING ETHERNET CABLE AND RJ45Marvin Bronoso
CSS L15 - CRIMPING ETHERNET CABLE AND RJ45
At the end of this learning module the student are able to:
○Crimp Ethernet wire and RJ-45 to establish computer network connection.
○Understand the differences straight through and crossover type of network cabling.
○Learn the T568A and T568B pin out of twisted pair wiring.
CSS L16 - IP ADDRESSING
Learning Competencies
After this learning module the students will be able to . . .
◦○Learn and discuss network addressing, switching and routing.
◦○Identify and understand the IP Addressing format
◦○Understand the explain the Network address translation and IPv6
At the end of this learning module the student will be able to:
○ Identify the flash tools for viewing.
○ adjust document properties
○ Work with text inside the flash animation software.
CSS L11 - INTRODUCTION TO COMPUTER NETWORKSMarvin Bronoso
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
After this lesson module the student will be able to . . .
○ Understand the function of computer network.
○ Discuss how the computer network works.
○ Enumerate and explain the different devices use in computer networking.
○ Differentiate the types of computer network
MEDIA AND INFORMATION LITERACY (MIL)
LESSON 11 : VISUAL GRAPHICS DESIGN
Learning Objective:
Evaluate existing Web sites and online resources based on the principles of layout, graphic, and visual message design.
Use image manipulation techniques on existing images to change or enhance their current state to communicate a message for a specific purpose.
Create an original or derivative ICT content to effectively communicate a visual message in an online environment related to specific professional tracks.
Manipulate text, graphics, and images to create ICT content intended for an online environment.
MEDIA AND INFORMATION LITERACY (MIL)
LESSON 7 : SHOTS & ANGLES
Learning Objective:
The objective for this lesson is for all students to see and understand basic camera shots and angles along with various common framing heights.
■synthesizes the overall implication of media and information to an individual (personal, professional, educational, and others) and the society as a whole (economic, social, political, educational, and others)
MEDIA AND INFORMATION LITERACY (MIL)
LESSON 5 : DIFFERENT TYPES OF MEDIA
After this lesson the learner will be able to . . . .
•classifies contents of different media types
•defines media convergence through current examples
•discusses to class on how a particular individual/ or society is portrayed in public using different type of media
MEDIA AND INFORMATION LITERACY (MIL)
LESSON 4: INFORMATION ACCESS
• defines information needs, locates, accesses, assesses, organizes, and communicates information
• Identify the skills needed to be an information literate
• demonstrates ethical use of information
PHYSICAL EDUCATION 12 - Nature of Dance (Improved)Marvin Bronoso
PHYSICAL EDUCATION 12 - Nature of Dance
Learning Content
○ Dance as an art
○ Why do people dance?
○ Significant feature of dance
○ Feature of dance
○ Kinds of Dance
○ Elements of Dance
PHYSICAL EDUCATION 11 - Diet and NutritionMarvin Bronoso
PHYSICAL EDUCATION 11 - Diet and Nutrition
LESSON 4
A Well Balance Diet
TOPICS:
○ Components of a well balanced diet
○ Energy Balance
○ Vitamins and Minerals
○ Fiber and Water Function
PHYSICAL EDUCATION 11 - Identifying the Risk Factors in LifeMarvin Bronoso
PHYSICAL EDUCATION 11 - Identifying the Risk Factors in Life
Learning Outcome
○ Understand the different risks of teenagers
○ Inform the negative effects of teenagers bad habits.
PHYSICAL EDUCATION 12 - Nature of Dance
LESSON 1
At the end of this lesson the student will be able to . . .
○ Learn the reason why do people dance.
○ Discuss the nature of different dances
PHYSICAL EDUCATION 11 - PHYSICAL ACTIVITY
LESSON1
At the end of this lesson student will be able to . . .
○ Distinguishes aerobic from muscle-and bone-strengthening activities
○ Explains how to optimize the energy systems for safe and improved performance
PHYSICAL EDUCATION 12 - Recreational Activities
At the end of this lesson the learners will be able to Discusses the nature of different recreational activities.
PHYSICAL EDUCATION 11 - Health and Risk in our LIfestyleMarvin Bronoso
PHYSICAL EDUCATION 11 - Health and Risk in our Lifestyle
The student be able to relates health behaviors (eating habits, sleep and stress management) to health risks factors and physical activity assessment performance.
LESSON 5 - FLASH ANIMATION
Light and shade in your drawing require a slightly different approach. This time, we are not looking for edges, but areas of light and dark and in between tones. Accomplish this artistic side learning by learning how to use pencil shading.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
CSS L13 STRUCTURED CABLING SYSTEM
1. Computer System Servicing NCII
L13 STRUCTURED CABLING SYSTEM
Marvin B. Broñoso
CSS Teacher/Trainer
mbronoso@gmail.com
0918 697 5164
2. Learning Competencies
At the end of this module the learners will be able to . . .
○ Describe the role of different LAN cable in computer network
according to its type.
○ Explain and enumeratethe different types of LAN cable and its use.
○ List the standardization organization in computer networking and
structured cabling system.
○ List the evolution and characteristic of computer cabling
standardization.
3. TERMINOLOGIES
• TC – Thin Copper
• AL – Aluminum
• ANSI – American National Standard Institute
• TIA – Telecommunication Industry Association
• EIA – Electronic Industry Association
• ISO – International Organization for Standardization
• Network Topology – Infrastructure of computer network
• Ethernet Cable – Cable use to connect your computer to the network.
4. TERMINOLOGIES
• ACR – Attenuation to Cross-Talk Ration
• BER – Bit Error Rate
• FEXT – Far End Cross-Talk
• NEXT – Near End Cross-Talk
• STP – Shielded Twisted Pair
• UTP – Unshielded Twisted Pair
5. WHAT IS NETWORK CABLING
Cable is the medium through which information usually moves
from one network device to another. There are several types of
cable which are commonly used with LANs. In some cases, a
network will utilize only one type of cable, other networks will
use a variety of cable types. The type of cable chosen for a
network is related to the network's topology, protocol, and
size. Understanding the characteristics of different types of
cable and how they relate to other aspects of a network is
necessary for the development of a successful network.
7. (1) COAXIAL CABLE
Coaxial cable is commonly used by cable operators, telephone companies, and internet
providers around the world to convey data, video, and voice communications to customers.
It has also been used extensively within homes.
Coaxial cable is a type of cable that has an inner conductor surrounded by an insulating
layer, surrounded by a conductive shielding. Many also have an insulating outer jacket The
diagram below illustrates the construction of a typical cable. Electrical signal flows through
1. Center Conductor
2. Center Conductor bond
3. Dielectric
4. First Outer Conductor
5. Second Outer Conductor
6. Third Outer Conductor
7. Fourth Outer Conductor
8. Corrosion Resistant Protectant
9. Jacket
10. Integral Messenger
8. (1) COAXIAL CABLE
The most common type of connector used with coaxial cables is the Bayone-Neill-
Concelman (BNC) connector.
To help avoid problems with your network, always use the BNC connectors that crimp,
rather screw, onto the cable.
9. (2) TWISTED PAIR
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded
twisted pair (UTP) is the most popular and is generally the best option for school
networks
10. (2) TWISTED PAIR
The quality of UTP may vary from telephone-grade wire to extremely high-speed
cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with
a different number of twists per inch to help eliminate interference from
adjacent pairs and other electrical devices. The tighter the twisting, the higher
the supported transmission rate and the greater the cost per foot. The EIA/TIA
(Electronic Industry Association/Telecommunication Industry Association) has
established standards of UTP and rated eight categories of wire as shown in the
next slide.
13. (2) TWISTED PAIR
CATEGORY CABLE SHIELDING
The acronyms used to describe the cable shielding have changed over the last several years in
order to avoid confusion of the different types of shielding found on Category cables today.
The mechanical construction of the Category cables shielding is identified by specific
abbreviations. These abbreviations or acronyms were established by the ISO/IEC 11801
standard and adopted by TIA/EIA.
The standard abbreviations are as follows:
TP = Twisted Pair
U = Unshielded
F = Foil Shield
S= Braided Shield
Example:F/UTP F: Describes the overall shielding type U: Describes the shielding of the pairs TP:
Describes the Twisted Pairs The code before the slash describes the overall shielding. The
second letter after the slash describes the shielding of the individual pairs.
15. (3) FIBER OPTIC CABLE
Fiber optic cabling consists of a center
glass core surrounded by several layers
of protective materials.
It transmits light rather than electronic
signals eliminating the problem of
electrical interference. This makes it
ideal for certain environments that
contain a large amount of electrical
interference. It has also made it the
standard for connecting networks
between buildings, due to its immunity
to the effects of moisture and lighting.
16. (3) FIBER OPTIC CABLE
The number of mobile internet users
and the proliferation of connected
devices have led to the exponential
growth in global internet traffic. These
traffic will make more network providers
to upgrade their networks and introduce
more optical assemblies like fiber optic
cables, fiber optic connector, fiber optic
transceiver, etc.
17. (3) FIBER OPTIC CABLE
Fiber optic connector types are as various as the applications for which they were
developed. Different connector types have different characteristics, different advantages
and disadvantages, and different performance parameters. But all connectors have the
same three basic components: ferrule, connector body, cable, coupling device.
18. (3) FIBER OPTIC CABLE
Ferrule: the ferrule acts as a fiber alignment mechanism and holds the glass fiber. It has a
hollowed-out center that forms a tight grip on the fiber. Ferrules are typically made of
metal, ceramic or quality plastic.
Connector Body: also known as the connector housing, the body holds the ferrule and
attaches to the jacket and strengthens members of the fiber cable itself. It is usually
constructed of metal or plastic and includes one or more assembled pieces which hold the
fiber in place.
Coupling Device: coupling device is a part of the connector body that keeps the connector in
place when attached to another device like as bulkhead coupler and optical transceiver.
21. STANDARD ORGANIZATION
EIA/TIA (USA)
Electrical/Telecommunication
Industries Association
ANSI
American National Standard Institute
ISO/IEC
International Organization for
Standardization / International
Electrotechnical Commission
CENELC
European Committee for
electrotechnical Standardization
IEEE
Institute of Electrical and Electronic
Engineer
22. STANDARD HISTORY
ANSI/EIA/TIA 568 published in 1991
The 1st Commercial Building Telecommunications Wiring Standard
The original document, together with TSB-36 & TSB-40 specified the
basic transmission requirements of Category 3, 4 & 5
ANSI/EIA/TIA 568A published in 1995
Recognized Cables for Horizontal Cabling:
4 pair 100 UTP cables (including S/UTP)
2 pair 150 STP cables (IBM TYPE-1A)
2 fiber 62.5/125µ and 50/125µ fiber-optic cable
24. STANDARD HISTORY
ANSI/TIA/EIA-568-B-2 Series (COPPER)
B-2.1 Category 6 specifications
B-2.2 Balanced Twisted-Pair Cabling Components
B-2.3 IL & RL Pass/Fail Determination
B-2.4 Solderless Connection Reliability Requirements for Copper Connecting
Hardware
B-2.5 Corrections to TIA/EIA-568-B.2
B-2.6 Cat 6 Related Component Test Procedures
B-2.7 Reliability Specification Requirements for Copper Connecting Hardware
B-2.8 Additional Component Req. for DTE Power
B-2.9 Additional Cat 6 Balance Requirements & Measurement Procedures
B-2.10 Augmented Cat 6 Cabling (10G))
B-2.11 increased UTP and ScTP Cable Diameter
25. STANDARD HISTORY
ANSI/TIA/EIA-568-B-3 Series (FIBER)
B-3.1 Laser Optimized (OM-3) MM – 10 Gigabit
TSB 140 – Additional Guidelines for Field-Testing Length, Loss and Polarity of
Optical Fiber Cabling Systems
26. STANDARD HISTORY
CELENC EN 50173-1
EN 50173-1 General Requirements
EN 50173-2 Office (Commercial) Premises
EN 50173-3 Industrial Premises
EN 50173-4 Residential Premises
EN 50173-5 Data Centers
27. TESTING PARAMETERS
Commercial Building Telecommunications
Cabling Standard
Link - The transmission between any two interfaces of generic cabling
without equipment & work area cables (where an optional
transition connection is allowed)
Maximum Link length is 90 Mtrs
Channel - The end-to-end transmission path connectingany two pieces of
application specific equipment with equipment & work area cables
Maximum Channel length is 100 Mtrs