Solved

Crimping RJ45 connectors on CAT5 network cable

Posted on 1999-01-24
5
1,977 Views
Last Modified: 2013-11-09
I am trying to wire a small home network using twisted pair Cat 5 cabling.  I have run the wire from various rooms in the house to a central location in the basement, where my hub will be located.  So far so good.

I purchased a crimping tool and RJ 45 connectors, however I am uncertain as to whether a certain color sequence order must be maintained as to the individual wires when they are stripped and inserted into the RJ45 connector prior to crimping them.  Surely a person can't simply willy nilly stick the end of the CAT 5 cable into the crimp connector, and blindly crimp the connector.  I have seen no instructions or guidelines on whether the colors on the individual wires are important to maintain consistency on all crimped connections.  Example, should I always crimp (from left to right) Orange Stripe, Solid ORANGE, Blue stripe, solid BLUE, GREEN stripe, solid Green, Brown stripe, solid BROWN?

Forgive me if this is a stupid question, but I sense it is important, and yet I've never seen any instructions dealing with this issue.

Thanks.
0
Comment
Question by:Monroe406
5 Comments
 
LVL 3

Accepted Solution

by:
idt earned 50 total points
ID: 1138059
Monroe,

what you are looking for is EISA Extended Industry Standard Architecture for Rj45 data connectors.  I couldn't find any specs on the web.. looked for a few minutes.  But, this is the configuration I have used for the last 9 years. I believe is EISA.

holding the rj45 with the plastic spring clip away from you;
with the contacts to your right;
that is, the cable exiting to the left;

from the top colors read;

primary(stripe)
----------------
white (green)
green(white)
white(orange)
white(blue)
blue(white)
orange(white)
white(brown)
brown(white)

while some prefer to reverse the blue(white) white(blue, what is very important, is that both ends are crimped exactly the same way.

-iDT
0
 
LVL 32

Expert Comment

by:jhance
ID: 1138060
Here is a reference on how to do it.  There are two commonly used standards for 10BaseT.  EIA-568A and EIA-568B.  Usually the hardware you but is marked for "A" or "B".  Don't mix them or your connections won't work. Some hardware is marked for "A" or "B" and offers both color schemes.  Be sure to follow one scheme or the other.

http://www.milestek.com/technical1.htm
0
 

Expert Comment

by:rkgea
ID: 1138061
Normally you you only have to look that you connect 1:1.
For some further informations you can look at:
http://isis.livingston.com/tech/technotes/... or at
http://yuma.tdyc.com/hwb/...
r.k.

0
 
LVL 3

Expert Comment

by:idt
ID: 1138062
Monroe,

On page http://www.milestek.com/TechReference2.htm#TIA/EIA (jhance), on the top right is T568A wiring method, which confirms by posted arrangement.

The orientation of the diagram, is plastic spring clip away from you, cable lock wedge towards you.

-iDT
0
 

Author Comment

by:Monroe406
ID: 1138063
I believe the wiring details you provided are for the older T568A standard.  Most newer networks are using the T568B standard, which is different:

See http://www.hubbell-premise.com/plugrefr.htm

Thanks also to everyone else who answered!
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Need a device to send message to phone when power is out 3 101
Multiple monitors 4 54
Locked BIOS on HP laptop 9 41
Windows Server to Cisco switch connectivity 10 67
In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question