Shielded Twisted Pair (STP)

Last updated: October 13, 2014

What Does Shielded Twisted Pair (STP) Mean?

Shielded twisted pair (STP) cable was originally designed by IBM for token ring networks that include two individual wires covered with a foil shielding, which prevents electromagnetic interference, thereby transporting data faster.

STP is similar to unshielded twisted pair (UTP); however, it contains an extra foil wrapping or copper braid jacket to help shield the cable signals from interference. STP cables are costlier when compared to UTP, but has the advantage of being capable of supporting higher transmission rates across longer distances.


Techopedia Explains Shielded Twisted Pair (STP)

The additional covering in STP cable stops electromagnetic interference from leaking out of or into the cable.

STP cables are often used in Ethernet networks, particularly fast-data-rate Ethernets. The effectiveness of the additional covering varies according to the substance used for the shielding, such as:

  • Frequency
  • Thickness
  • Type of electromagnetic noise field
  • Distance from the shield to the noise source
  • Shield discontinuity
  • Grounding practices

Some STP cablings make use of a thick copper braided shield which makes the cable thicker, heavier, and in turn much more difficult for installation as compared to the UTP cables.

The other usual STP cables, often called foil twisted-pair cables or screened twisted-pair cables, make use of just a thinner outer foil shield. These cables are thin and more affordable versus the braided STP cable; but they are very difficult to install. Except in cases where the maximum pulling tension and minimum bend radius are strictly observed, these thinner cables may be torn during the installation process.

Furthermore, STP cables have some other drawbacks. STP cables function by drawing external interference to the shield, then getting rid of it into a grounded cable. If the ground cable is not properly grounded, STP's noise-canceling functionality can be seriously compromised.


Share this Term

  • Facebook
  • LinkedIn
  • Twitter

Related Reading


NetworkingNetworking Hardware

Trending Articles

Go back to top