![Siemens NK8000 MP4.40 Series Application & Planning Download Page 84](http://html.mh-extra.com/html/siemens/nk8000-mp4-40-series/nk8000-mp4-40-series_application-and-planning_374611084.webp)
NK8000 network planning
84
Building Technologies
049_DMS_DMS8000_Application_Specification_Planning_MP4.81_A6V10063710_a_en.doc
CPS Fire Safety
09.2016
Also, you will need to determine the following regarding the client’s network:
·
Maintenance times for the network (shutdown of the network)
·
Network utilisation (Load > 30 – 40 % is bad on shared network)
·
Collision rate (< 5% is good)
·
Stability of the network (> 99.9% is good)
·
Availability of the network (Downtime)
·
Access time to the network (timeouts/access time < 1 sec. is good)
·
Responsibility for the data transfer over the network
·
Building sites (dredgers destroy cables, etc.)
·
Redundancy of the network
·
UPS (uninterruptible power supply) for the network components?
5.4.1
Information you need to give to your customer
To integrate FS NK8000 and management station products into a customer’s network,
ensure that your customer is aware of the following information:
·
DHCP is not supported from any device;
·
NK823x support 10BaseT and 100BaseT, half-duplex and full-duplex mode;
·
Only Ethernet RJ 45 copper cable Cat. 5, 5E, or 6 is supported;
·
If the network is down, it is not possible to receive any information via the network;
·
The responsible person for the network is the customer, and not Siemens
FS/FIS/SES. The customer should sign a contract that Siemens FS/SES disclaims
any liability for the customer’s existing network.
Your customer will also need to know the following:
·
The IP-address for each NK82xx and each DMS PC (tell where the devices are in-
stalled);
·
Redundancy network devices or paths available.
5.4.2
Security and application port numbers
Most companies use a Firewall or a Proxy server to protect the company network from
outside. Also within a company’s network, rules exist, and not everything is allowed.
For example, maybe only e-mail and File transfer applications are allowed, and Re-
mote access (Telnet) is prohibited.
Each of these applications has a Port number. This Port number identifies the type of
application. For example the Port number for the e-mail application (SMTP) is 25.
Generally, the network administrator allows only a few Port numbers, and the rest are
prohibited.
Summary of Contents for NK8000 MP4.40 Series
Page 95: ......