Page 91 / 331 Scroll up to view Page 86 - 90
Chapter 6 Broadband
VMG1312-B Series User’s Guide
91
ATM Traffic Classes
These are the basic ATM traffic classes defined by the ATM Forum Traffic Management 4.0
Specification.
Constant Bit Rate (CBR)
Constant Bit Rate (CBR) provides fixed bandwidth that is always available even if no data is being
sent. CBR traffic is generally time-sensitive (doesn't tolerate delay). CBR is used for connections
that continuously require a specific amount of bandwidth. A PCR is specified and if traffic exceeds
this rate, cells may be dropped. Examples of connections that need CBR would be high-resolution
video and voice.
Variable Bit Rate (VBR)
The Variable Bit Rate (VBR) ATM traffic class is used with bursty connections. Connections that use
the Variable Bit Rate (VBR) traffic class can be grouped into real time (VBR-RT) or non-real time
(VBR-nRT) connections.
The VBR-RT (real-time Variable Bit Rate) type is used with bursty connections that require closely
controlled delay and delay variation. It also provides a fixed amount of bandwidth (a PCR is
specified) but is only available when data is being sent. An example of an VBR-RT connection would
be video conferencing. Video conferencing requires real-time data transfers and the bandwidth
requirement varies in proportion to the video image's changing dynamics.
The VBR-nRT (non real-time Variable Bit Rate) type is used with bursty connections that do not
require closely controlled delay and delay variation. It is commonly used for "bursty" traffic typical
on LANs. PCR and MBS define the burst levels, SCR defines the minimum level. An example of an
VBR-nRT connection would be non-time sensitive data file transfers.
Unspecified Bit Rate (UBR)
The Unspecified Bit Rate (UBR) ATM traffic class is for bursty data transfers. However, UBR doesn't
guarantee any bandwidth and only delivers traffic when the network has spare bandwidth. An
example application is background file transfer.
IP Address Assignment
A static IP is a fixed IP that your ISP gives you. A dynamic IP is not fixed; the ISP assigns you a
different one each time. The Single User Account feature can be enabled or disabled if you have
either a dynamic or static IP. However the encapsulation method assigned influences your choices
for IP address and default gateway.
Introduction to VLANs
A Virtual Local Area Network (VLAN) allows a physical network to be partitioned into multiple logical
networks. Devices on a logical network belong to one group. A device can belong to more than one
group. With VLAN, a device cannot directly talk to or hear from devices that are not in the same
group(s); the traffic must first go through a router.
In Multi-Tenant Unit (MTU) applications, VLAN is vital in providing isolation and security among the
subscribers. When properly configured, VLAN prevents one subscriber from accessing the network
resources of another on the same LAN, thus a user will not see the printers and hard disks of
another user in the same building.
Page 92 / 331
Chapter 6 Broadband
VMG1312-B Series User’s Guide
92
VLAN also increases network performance by limiting broadcasts to a smaller and more
manageable logical broadcast domain. In traditional switched environments, all broadcast packets
go to each and every individual port. With VLAN, all broadcasts are confined to a specific broadcast
domain.
Introduction to IEEE 802.1Q Tagged VLAN
A tagged VLAN uses an explicit tag (VLAN ID) in the MAC header to identify the VLAN membership
of a frame across bridges - they are not confined to the switch on which they were created. The
VLANs can be created statically by hand or dynamically through GVRP. The VLAN ID associates a
frame with a specific VLAN and provides the information that switches need to process the frame
across the network. A tagged frame is four bytes longer than an untagged frame and contains two
bytes of TPID (Tag Protocol Identifier), residing within the type/length field of the Ethernet frame)
and two bytes of TCI (Tag Control Information), starts after the source address field of the Ethernet
frame).
The CFI (Canonical Format Indicator) is a single-bit flag, always set to zero for Ethernet switches. If
a frame received at an Ethernet port has a CFI set to 1, then that frame should not be forwarded as
it is to an untagged port. The remaining twelve bits define the VLAN ID, giving a possible maximum
number of 4,096 VLANs. Note that user priority and VLAN ID are independent of each other. A
frame with VID (VLAN Identifier) of null (0) is called a priority frame, meaning that only the priority
level is significant and the default VID of the ingress port is given as the VID of the frame. Of the
4096 possible VIDs, a VID of 0 is used to identify priority frames and value 4095 (FFF) is reserved,
so the maximum possible VLAN configurations are 4,094.
Multicast
IP packets are transmitted in either one of two ways - Unicast (1 sender - 1 recipient) or Broadcast
(1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the
network - not everybody and not just 1.
Internet Group Multicast Protocol (IGMP) is a network-layer protocol used to establish membership
in a Multicast group - it is not used to carry user data. IGMP version 2 (RFC 2236) is an
improvement over version 1 (RFC 1112) but IGMP version 1 is still in wide use. If you would like to
read more detailed information about interoperability between IGMP version 2 and version 1, please
see sections 4 and 5 of RFC 2236. The class D IP address is used to identify host groups and can be
in the range 224.0.0.0 to 239.255.255.255. The address 224.0.0.0 is not assigned to any group
and is used by IP multicast computers. The address 224.0.0.1 is used for query messages and is
assigned to the permanent group of all IP hosts (including gateways). All hosts must join the
224.0.0.1 group in order to participate in IGMP. The address 224.0.0.2 is assigned to the multicast
routers group.
At start up, the Device queries all directly connected networks to gather group membership. After
that, the Device periodically updates this information.
DNS Server Address Assignment
Use Domain Name System (DNS) to map a domain name to its corresponding IP address and vice
versa, for instance, the IP address of www.zyxel.com is 204.217.0.2. The DNS server is extremely
TPID
2 Bytes
User Priority
3 Bits
CFI
1 Bit
VLAN ID
12 Bits
Page 93 / 331
Chapter 6 Broadband
VMG1312-B Series User’s Guide
93
important because without it, you must know the IP address of a computer before you can access
it.
The Device can get the DNS server addresses in the following ways.
1
The ISP tells you the DNS server addresses, usually in the form of an information sheet, when you
sign up. If your ISP gives you DNS server addresses, manually enter them in the DNS server fields.
2
If your ISP dynamically assigns the DNS server IP addresses (along with the Device’s WAN IP
address), set the DNS server fields to get the DNS server address from the ISP.
IPv6 Addressing
The 128-bit IPv6 address is written as eight 16-bit hexadecimal blocks separated by colons (:). This
is an example IPv6 address
2001:0db8:1a2b:0015:0000:0000:1a2f:0000
.
IPv6 addresses can be abbreviated in two ways:
Leading zeros in a block can be omitted. So
2001:0db8:1a2b:0015:0000:0000:1a2f:0000
can
be written as
2001:db8:1a2b:15:0:0:1a2f:0
.
Any number of consecutive blocks of zeros can be replaced by a double colon. A double colon can
only appear once in an IPv6 address. So
2001:0db8:0000:0000:1a2f:0000:0000:0015
can be
written as
2001:0db8::1a2f:0000:0000:0015
,
2001:0db8:0000:0000:1a2f::0015
,
2001:db8::1a2f:0:0:15
or
2001:db8:0:0:1a2f::15
.
IPv6 Prefix and Prefix Length
Similar to an IPv4 subnet mask, IPv6 uses an address prefix to represent the network address. An
IPv6 prefix length specifies how many most significant bits (start from the left) in the address
compose the network address. The prefix length is written as “/x” where x is a number. For
example,
2001:db8:1a2b:15::1a2f:0/32
means that the first 32 bits (
2001:db8
) is the subnet prefix.
Page 94 / 331
VMG1312-B Series User’s Guide
94
C
HAPTER
7
Wireless
7.1
Overview
This chapter describes the Device’s
Network Setting > Wireless
screens. Use these screens to
set up your Device’s wireless connection.
7.1.1
What You Can Do in this Chapter
This section describes the Device’s
Wireless
screens. Use these screens to set up your Device’s
wireless connection.
Use the
General
screen to enable the Wireless LAN, enter the SSID and select the wireless
security mode (
Section 7.2 on page 95
).
Use the
Guest / More AP
screen to set up multiple wireless networks on your Device (
Section
7.3 on page 99
).
Use the
MAC Authentication
screen to allow or deny wireless clients based on their MAC
addresses from connecting to the Device (
Section 7.4 on page 102
).
Use the
WPS
screen to enable or disable WPS, view or generate a security PIN (Personal
Identification Number) (
Section 7.5 on page 103
).
Use the
WMM
screen
to enable Wi-Fi MultiMedia (WMM) to ensure quality of service in wireless
networks for multimedia applications (
Section 7.6 on page 105
).
Use the
WDS
screen to set up a Wireless Distribution System, in which the Device acts as a
bridge with other ZyXEL access points (
Section 7.7 on page 106
).
Use the
Others
screen to configure wireless advanced features, such as the RTS/CTS Threshold
(
Section 7.8 on page 108
).
Use the
Channel Status
screen to scan wireless LAN channel noises and view the results
(
Section 7.9 on page 110
).
7.1.2
What You Need to Know
Wireless Basics
“Wireless” is essentially radio communication. In the same way that walkie-talkie radios send and
receive information over the airwowaves, wireless networking devices exchange information with
one another. A wireless networking device is just like a radio that lets your computer exchange
information with radios attached to other computers. Like walkie-talkies, most wireless networking
devices operate at radio frequency bands that are open to the public and do not require a license to
use. However, wireless networking is different from that of most traditional radio communications in
that there a number of wireless networking standards available with different methods of data
encryption.
Page 95 / 331
Chapter 7 Wireless
VMG1312-B Series User’s Guide
95
Finding Out More
See
Section 7.10 on page 111
for advanced technical information on wireless networks.
7.2
The General Screen
Use this screen to enable the Wireless LAN, enter the SSID and select the wireless security mode.
Note: If you are configuring the Device from a computer connected to the wireless LAN
and you change the Device’s SSID, channel or security settings, you will lose your
wireless connection when you press
Apply
to confirm. You must then change the
wireless settings of your computer to match the Device’s new settings.
Click
Network
Setting
>
Wireless
to open the
General
screen.
Figure 31
Network Setting > Wireless > General

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top