Essay PreviewMore ↓
There are many classes of IP addresses ranging from A all the way to E. Most large scale companies and offices use a Class A IP address schema while smaller locations use Class C. The MKS office in San Jose uses a Class B IP schema. Class B is used for medium-sized networks. A good example is a large college campus. IP addresses with a first octet from 128 to 191 are part of this class. Class B addresses also include the second octet as part of the Net identifier. The other two octets are used to identify each host. This means that there are 16,384 (214) Class B networks each with 65,534 (216 -2) possible hosts for a total of 1,073,741,824 (230) unique IP addresses.
The main location, which is a much larger office, uses a Class A IP address schema. This class is for very large networks. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host. This means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses.
The networks are split into two groups. There is a Production network and a Development network. Each of these networks resides on their own separate sub network. The reason for splitting the networks into two is to prevent network overload and slowdowns that would otherwise affect other departments within MKS such as Customer Service or Accounting. The production network involves non-development tasks such as the customer service database, email, the order entry and accounting systems. The development network involves all areas relating to product development. This network covers the server that stores base code, the development system, development tools, software libraries and software builds.
The networks are controlled through use of a router. This router is the only device that sees every message sent by any computer on either of the company's two networks. The router ensures that information doesn't go where it is not needed. This is crucial for keeping large volumes of data from clogging the connections of other departments at MKS.
How to Cite this Page
"Network Configuration at MKS Instruments." 123HelpMe.com. 05 Apr 2020
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables administrators to allow automatic configuration on their network (Odom, 2012). DHCP was developed in 1993 and has since become a staple on enterprise networks. DHCP will allow Elliott’s Solutions Inc.’s administrators to more easily deploy hosts onto the network. DHCPv6 has been developed specifically for IPv6. DHCPv6 has can configure clients using stateless address autoconfiguraiton. Utilizing this protocol for Elliott’s Solutions Inc.’s network will help eliminate the probability of human error.... [tags: administrators, computer securities]
1039 words (3 pages)
- 3.1 System Hardware Configuration The modern traffic intersection is a blend of various controllers, sensors and networking devices. In the ITS, which plays an important role in the safety and traffic management, the traffic signal controllers are a core component. This project uses the Econolite Advanced System Controller Series 3 (ASC/3-2100) model, which is currently installed in many intersections. It provides NTCIP compliance and most advanced and innovative traffic technologies. The proposed hardware architecture of the ETSS is shown in Figure 3.1.... [tags: Traffic light, Traffic, Green, Network switch]
1091 words (3.1 pages)
- 1.1 Preamble Network topology can be defined in many ways since there are many different types of network that depending on the certain amount of user, ability, and purpose. For example, in Multimedia University (MMU) all networks inside our campus are connected through Local Area Network (LAN) to access MMLS for example. While when connected to outside through internet, we call it Wide Area Network (WAN). We are connected to the world via various network topologies, such as Point-to-point, Bus, Star, Ring, Mesh, Tree, Hybrid, and last but not least Daisy chain.... [tags: topology, configuration, test]
1410 words (4 pages)
- How To Play a Brass Instrument Press your lips together, blow air through your lips, and listen to the beautiful sound escaping your face. Maybe the sound wasn 't so aesthetically pleasing this first try, but this is something brass players have mastered. The funny thing you just did with your lips is called buzzing, and brass players are able to do this effortlessly. You might be wondering why would someone want to do that all the time. Brass instruments have been around since the 15th century and are still being used to this day; so if you love music or want to learn a new skill, brass might be right for you.... [tags: Brass instrument, Horn, Mouthpiece, Euphonium]
1014 words (2.9 pages)
- 3.3.2 Network Analysis Social network analysis focuses on ties among, for example, people, groups of people, organisations, and countries. These ties combine to form networks, as social network analysts assume that interpersonal ties matter, as do ties among organisations or countries, because they transmit behaviour, attitudes, information, or goods. Social network analysis offers methodology to analyse social relations, it tells how to conceptualise social networks and how to analyse the, where the main gaol of social network analysis is detecting and interpreting patterns of social ties among actors (Nooy et al., 2005).... [tags: Sociology, Social network, Mathematical sociology]
775 words (2.2 pages)
- There are six components in the provided diagram above, including Internet, Router-Firewall, Server, Printer and Client (Department 1-3). The type of this network is local area network (LAN), in which the network is based on the client server model. The description of the role in each component and connection will be elaborated as following below. - Internet: According to Beal (N.d.), the Internet is a tremendous network, which connects billions of computer all over the World. It allows each computer communicates with other computers globally as long as they are connected to the Internet.... [tags: Computer network, Ethernet, Local area network]
1432 words (4.1 pages)
- Introduction “It is certainly safe to say that computers have become as integral to modern life as fast food, cell phones, and sport utility vehicles”. (Joe, 2004) We are living in the information-exchanged age. It has been dramatically changed since last decades. How could this happen. The answer will be network. A network can be anything from a simple collection of computers at one location which have been tied together using a particular connectivity medium (such as network cabling) to a giant global network, e.g.... [tags: Technology, Computers]
1047 words (3 pages)
- Mesh, Bus, Ring and Star topologies The term Topology refers to the physical or logical shape or layout of a network. Communication between different nodes within a network is determined by its topology. Mesh, Bus, Ring and Star are four of the most common network topologies, each with advantages and disadvantages in relation to each other. Mesh Topology The Mesh topology is true to its name in that there are multiple redundant interconnections between network nodes. A mesh network can employ one of two connection arrangements, full mesh or partial mesh.... [tags: Network Topology]
1391 words (4 pages)
- Network Design Table of Contents Introduction 3 Mesh 3 Bus 4 Ring 4 Star 5 Ethernet 6 Token Ring 6 Fiber Distributed Data Interface (FDDI) 7 Wireless 7 Reference List 8 Introduction This paper is an overview of some aspects of network architecture. Network architecture is defined as the communication products and services that ensure the various components can work together. I will discuss the different physical LAN topologies and how they work. Lastly, I will discuss several of the LAN Standards such as Ethernet and Token Ring.... [tags: Network Technology]
1267 words (3.6 pages)
- Network Security Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems. Purpose and Scope To cover all areas I have listed the network security measures that are associated with each level of the Open Systems Interconnect (OSI).... [tags: Security Network Technology]
980 words (2.8 pages)
When the developer sends a huge file to another developer, the router looks at the recipient's address and keeps the traffic on the development network. When the developer, on the other hand, sends a message to customer service asking about an issue, then the router sees the recipient's address and forwards the message between the two networks. The router uses a configuration table. A configuration table is a collection of information such as those connections that lead to particular groups of addresses, priorities for connections to be used and the rules for handling both routine and special cases of traffic.
A wireless network is provided from a Linksys Router in the Tool Web Lab. A wireless network allows computers to share printers, files or an internet connection without any wires between them. Wireless networking hardware uses radio frequencies to transmit information between the individual computers; each computer requires a wireless network adapter. This router allows for a small set of connections so that those in the lab can still be able to get email, and browse the MKS network with their mobile laptops that support wireless connections.
The issues with the wireless system have been the connection strength is not always strong; transferring of large files leads to bandwidth issues and many times the network simply gives out.
The two types of IP addresses used on the MKS network are static and dynamic. Each engineer is allowed up to 5 static IP addresses for their local development stations, tools and e-diagnostic boxes. A static IP address is basically a permanent reserved set of numbers for a specific device such as a printer or server. The local laptops and PCs are on dynamic IP addressing also known as DHCP short for Dynamic Host Configuration Protocol, a protocol for assigning dynamic IP addresses to devices on a network. Using the DHCP server simplifies the network administration since the software keeps track of IP addresses rather than requiring our administrator to manage the task. This means even additional development devices can be added to the network without the hassle of manually assigning it a unique IP address. Most importantly this can prevent IP conflicts that would otherwise affect other devices or users.
Internet connectivity is allowed at MKS but through the use of the Cisco PIX 501 Firewall. It is a purpose-built security appliance that provides rich security services including stateful inspection firewalling, virtual private networking (VPN) and intrusion protection. A firewall is simply a program or hardware device that filters the information coming through the Internet connection into the corporate network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through. The firewall is setup for Stateful inspection, Proxy service, and various rules for the Web Servers, Telnet Servers and FTP Servers. This firewall server protects the MKS network from viruses, email bombs, application backdoors, SMTP session hijacking, spam and many other programs that would be otherwise unhealthy for the network itself.
MKS does have a FTP server used mainly by the development team. FTP is short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP works in the same way as HTTP (Hyper Text Transfer Protocol) for transferring Web pages from a server to a user's browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable data transfer. This server is mostly used to download or upload files for other engineers without using email or sharing.
MKS does not have an intranet or extranet. This is the first company I have worked for that does not have such an implementation. This came as a bit of a surprise given the fact that the company employees a total of over 2500 employees. My previous company, Novellus Systems, did have an intranet in place.
MKS uses the Lotus Notes email and database application called a bulletin board to post information that normally would be found on a company intranet. This bulletin board covers a wide variety of areas. Some of these are Holiday Schedule, Vacation Policies, Stock Policies, Health Benefits, Tuition Reimbursement and various Department contact Information. The Lotus Notes email does allow the ability to check and send email over the internet using something called I-Notes. The logon and password is the same as if the user were at their desk logging onto the email system. This allows the user full remote ability to configure, read and send the email from the notes system via internet connection from home.
In closing we examined the networking configuration used at MKS Instruments. The areas covered involved the infrastructure of the network, how it is implemented and how it is used. In addition it covered in detail the use of DHCP Networks, Wireless Networks, IP Classes, FTP servers, Routers, Firewall and a small scale network diagram.