Monthly Archives: April, 2016

Knowing which “Cat” cable to use is critical to your network performance

April 28th, 2016 Posted by Technology 0 thoughts on “Knowing which “Cat” cable to use is critical to your network performance”

“Knowing which “Cat” cable to use is critical to your network performance.”

– Todd Hepler, Digitek Security


The following article written by: How-To Geek

Not all Ethernet cable is created equally. What’s the difference, and how do you know which you should use? Let’s look at the technical and physical differences in Ethernet cable categories to help us decide.

Ethernet cables are grouped into sequentially numbered categories (“cat”) based on different specifications; sometimes the category is updated with further clarification or testing standards (e.g. 5e, 6a). These categories are how we can easily know what type of cable we need for a specific application. Manufacturers are required to adhere to the standards, which makes our lives easier.

What are the differences between the categories and how can you know when to use unshielded, shielded, stranded, or solid cable? Keep reading for “cat”-like enlightenment.

Technical differences

The differences in cable specifications is not as easy to see as physical changes; so let’s look at what each category does and does not support. Below is a chart for reference when picking cable for your application based on the standards for that category.

As the category number gets higher, so does the speed and Mhz of the wire. This is not a coincidence, because each category brings more stringent testing for eliminating crosstalk (XT) and adding isolation between the wires.

This does not mean your experiences have been the same. Physically you can use Cat-5 cable for 1 Gb speeds, and I have personally used cable longer than 100 meters, but because the standard has not been tested for it, you’ll probably have mixed results. Just because you have Cat-6 cable, doesn’t mean you have  1 Gb network speeds either. Every connection in your network needs to support the 1 Gb speed and in some cases, the connection will need to be told in software to use the available speed.

Category 5 cable was revised, and mostly replaced with, Category 5 Enhanced (Cat-5e) cable which did not change anything physically in the cable, but instead applied more stringent testing standards for crosstalk.

Category 6 was revised with Augmented Category 6 (Cat-6a) which provided testing for 500 Mhz communication (compared to Cat-6’s 250 Mhz). The higher communication frequency eliminated alien crosstalk (AXT) which allows for longer range at 10 Gb/s.

Physical Differences

So how does a physical cable eliminate interference and allow for faster speeds? It does it through wire twisting and isolation. Cable twisting was invented by Alexander Graham Bell in 1881 for use on telephone wires that were run along side power lines. He discovered that by twisting the cable every 3-4 utility poles, it reduced the interference and increased the range. Twisted pair became the basis for all Ethernet cables to eliminate interference between internal wires (XT), and external wires (AXT).

There are two main physical differences between Cat-5 and Cat-6 cables, the number of twists per cm in the wire, and sheath thickness.

Cable twisting length is not standardized, but typically there are 1.5-2 twists per cm in Cat-5(e) and 2+ twists per cm in Cat-6. Within a single cable, each colored pair will also have different twist lengths based on prime numbers so that no two twists ever align. The amount of twists per pair is usually unique for each cable manufacturer. As you can see in the above picture, no two pairs have the same amount of twists per inch.

Many Cat-6 cables also include a nylon spline which helps eliminate crosstalk. Although the spline is not required in Cat-5 cable, some manufactures include it anyway. In Cat-6 cable, the spline is not required either as long as the cable tests according to the standard. In the picture above, the Cat-5e cable is the only one with a spline.

While the nylon spline helps reduce crosstalk in the wire, the thicker sheath protects against near end crosstalk (NEXT) and alien crosstalk (AXT) which both occur more often as the frequency (Mhz) increases. In this picture the Cat-5e cable has the thinnest sheath, but it also was the only one with the nylon spline.

Shielded (STP) vs. Unshielded (UTP)

Because all Ethernet cables are twisted, manufactures use shielding to further protect the cable from interference. Unshielded twisted pair can easily be used for cables between your computer and the wall, but you will want to use shielded cable for areas with high interference and running cables outdoors or inside walls.

There are different ways to shield an Ethernet cable, but typically it involves putting a shield around each pair of wire in the cable. This protects the pairs from crosstalk internally. Manufactures can further protect cables from alien crosstalk but screening UTP or STP cables. Technically the picture above shows a Screened STP cable (S/STP).

Solid vs. Stranded

Solid and stranded Ethernet cables refer to the actual copper conductor in the pairs. Solid cable uses a single piece of copper for the electrical conductor while stranded uses a series of copper cables twisted together. There are many different applications for each type of conductor, but there are two main applications for each type you should know about.

Stranded cable is more flexible and should be used at your desk or anywhere you may be moving the cable around often.

Solid cable is not as flexible but it is also more durable which makes it ideal for permanent installations as well as outdoor and in walls.

Learn More about Digitek Security.

Property Managers Talk Security

April 26th, 2016 Posted by Security & Surveillance 0 thoughts on “Property Managers Talk Security”

“Planning ahead will help avoid property security surprises down the road”

– Todd Hepler, Digitek Security


The following article written by: Michael Fickes, Buildings

At two recent focus groups, Ingersoll Rand Security Technologies probed the views of property managers on security. Issues explored included defining building security, balancing guards and technology, surprises to avoid, managing security costs, and return on investment (ROI). Comments made by participants read like a how-to manual for building security.

Defining Building Security
For John Scott, a focus group participant and director of client occupied and investor services with Cushman & Wakefield’s Miami offices, security is a mindset that “encompasses security technology, security people, tenants, and geography.”

Different locations require multiple strategies, Scott finds. “For instance, in a downtown Miami office building, I expect to see cameras, a guard desk, or both. If I don’t, I’ll have questions about security. Then again, you might see less security in buildings located in central and northern Florida.”

Scott’s mindset changes when the tenants change, too. National and multi-national tenants typically want a higher level of security than local and regional tenants, he observes.

Balancing Security
Security needs balance, says Richard King, a senior manager for Colliers International and another focus group participant. “Different clients expect different kinds of security,” he says. “One client may want you to manage visitors carefully to guard against theft or workplace violence, while another cautions against a system so strict that tenants and employees feel uncomfortable. You have to balance these desires.

“You also have to balance security people and security technology. While we all rely on technology, it is important to have enough security people to make judgments about and to act on the data produced by technology.”

Avoiding Surprises
Security surprises can be maddening.

Many focus group participants railed against the difficulties of integrating base building security technology — access control, for instance — with tenants’ technology. In fact, the groups rated this one of the top security challenges they face.

“Everyone says open systems make integration possible. But even open systems sometimes don’t share enough key data points to allow effective integration,” says Scott. “When you’re buying technology, you must ask very specific questions about integration.”

A security officer’s knowledge level about technology can surprise a property manager as well. “When we first installed pan-tilt-zoom mounts for our video cameras, half of our officers didn’t know how to use the controls,” says King. “We learned to ask our guard company to make sure their officers were trained before we installed new equipment.”

A number of focus group participants also reported that they look to vendors for security concepts but often come away disappointed. “Don’t just come to me for transactional sales,” says one participant. Another complained that vendors should carry out risk assessments before making presentations, but often don’t.

“I agree that vendors should be more consultative when selling products and services,” says Geoff Craighead, CPP, BSCP, vice president with Universal Protection Service, who agreed to comment on some of the opinions voiced in the focus group discussions. “But when it comes to security assessments and strategy, I think it is better to rely on a fee-based consultation from an objective independent consultant.”

The Cost of Security
Property managers agree that buildings must execute a security strategy adequate to the task of mitigating a building’s security risks.

Depending upon the prevailing market rents for particular classes of buildings in certain locations, a property manager may or may not be able to recover security costs through rents.

“We heard comments about this several times during our focus groups,” says April Dalton-Noblitt, director, commercial real estate vertical market with Ingersoll Rand Security Technologies. “The upshot was that you must have an appropriate level of security for the type of building, location, and client or you will not be able to lease the building. If you can’t cover the cost in the rent, you have to pay for it. 

Return on Investment
The cost of security and the difficulties connected to recovering security costs in rents has led property managers to seek ways of creating a security ROI.

“In the long run, security is part of a building’s amenities,” says King. “It increases the marketability of the property. New technology and top-notch guards give me a competitive advantage. That’s how I look at ROI.”

Technically, though, ROI means investing and earning a profit or return. For instance, today’s access control technology can integrate with environmental controls so that a building system can turn on heat or air conditioning in an office when someone cards in after hours or on weekends. The ROI comes from savings on utility bills.

“Security can sometimes offer opportunities to produce an ROI,” agrees Craighead. “But you have to be careful to take advantage of those opportunities without compromising security. Security has to come first, and sometimes a necessary security execution won’t produce ROI simply because it can’t.”

Learn More about Digitek Security.

Archives