?
Solved

Networking through ceiling

Posted on 2003-02-20
3
Medium Priority
?
274 Views
Last Modified: 2010-03-19
I'd like to run Cat5e cable from my router (located downstairs) to a computer upstairs.  This means I'd like to run the wire up to the drop ceiling in the basement and up to the next level of the house.  I found a good deal on 100ft cable for $11.  http://store.yahoo.com/deepsurplus/10cat5eenmol2.html.  Would this cable work allright for my pupose?  I know that Cat5 Plenum cable is considered better for running through ceilings and walls, but I'd like to use this Cat5e cable since it is such a good deal.  Would it do the job?
0
Comment
Question by:ballinbuck
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 41

Expert Comment

by:stevenlewis
ID: 7991105
sure, they suggest plenum for the fumes in case of fire, not for connectivity issues
0
 

Expert Comment

by:cdsmark
ID: 7991149
thats strange that 100ft of cat5e cable could go for 11 bucks! If its true cat5e cable(you can check the markings on the cable)then your fine! Just keep it away from electical lines and any florecent lights!
0
 
LVL 2

Accepted Solution

by:
ellesd earned 80 total points
ID: 7991392
You only get what you pay for.  I have seen many great deals on cable, but when you run your hand along it, it is not very consistent; which usually indicates low quality.  If you're just connecting two PC's (Internet sharing perhaps), don't worry too much.  As for electrical lines and lights, if you must cross them, make sure you do it as close to 90 degrees as possible; interference only affects parallel running cables.  Be carefule when pulling the cable so it does not kink; have someone help you especially when you can't see the cable downstairs.
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
This program is used to assist in finding and resolving common problems with wireless connections.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month12 days, 6 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question