Solved

RJ45 connector

Posted on 2004-08-06
7
1,096 Views
Last Modified: 2010-08-05
I need the pinning of an RJ45 connector when it is used as an ethernet connector.

BobH
0
Comment
Question by:BOBH
7 Comments
 
LVL 2

Accepted Solution

by:
tomasg18 earned 125 total points
ID: 11737271
This question really belongs in the Networking TA. (http://www.experts-exchange.com/Networking/)

This topic area deals with Novell Netware and related products.  

But to help you out, you can find the requested information here:
http://www.jaysafe.co.uk/technical/rj45.asp

0
 

Author Comment

by:BOBH
ID: 11737794
Thanks tomasg18:

That answers everything except which pins are + data and which pins are - data. Also which pins are ground.

BpbH
0
 

Author Comment

by:BOBH
ID: 11737967
There is better info at the address below

http://www.cabletron.com/support/techtips/tk0231-9.html

BobH
0
Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

 
LVL 4

Expert Comment

by:ramumorla
ID: 11739011
Straight Through Cable
RJ-45 PIN RJ-45 PIN
1 Tx+ 1 Rc+
2 Tx- 2 Rc-
3 Rc+ 3 Tx+
6 Rc- 6 Tx-
0
 
LVL 4

Expert Comment

by:ramumorla
ID: 11739018
Crossover Cable
RJ-45 PIN RJ-45 PIN
1 Rx+ 3 Tx+  
2 Rc- 6 Tx-
3 Tx+ 1 Rc+
6 Tx- 2 Rc-
0
 
LVL 35

Expert Comment

by:ShineOn
ID: 11769283
'course those are only for up to 100-base-TX.  For 1000-base-T you need all 4 pairs...
0
 
LVL 34

Expert Comment

by:PsiCop
ID: 11837928
You need all 4 pairs for 100-Base-T4 and 100VG-Anylan as well.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
There’s a good reason for why it’s called a homepage – it closely resembles that of a physical house and the only real difference is that it’s online. Your website’s homepage is where people come to visit you. It’s the family room of your website wh…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question