ZyXEL Communications 782M Manual De Usuario
P782M G.SHDSL Bridge
Table 3-1 TCP/IP Ethernet Setup Menu Fields
FIELD
DESCRIPTION
EXAMPLE
TCP/IP Setup
IP Address Enter the (LAN) IP address of your Prestige in dotted decimal
notation
192.168.1.1
IP Subnet Mask Your Prestige will automatically calculate the subnet mask based on
the IP address that you assign. Unless you are implementing
subnetting, use the subnet mask computed by the Prestige.
subnetting, use the subnet mask computed by the Prestige.
255.255.255.0
When you have completed this menu, press [
ENTER
] at the prompt “Press ENTER to Confirm…” to save
your configuration, or press [
ESC
] at any time to cancel.
3.7 VPI
and
VCI
Be sure to use the correct Virtual Path Identifier (VPI) and Virtual Channel Identifier (VCI) numbers
supplied by your telephone company. The valid range for the VPI is 0 to 255 and for the VCI is 32 to
65535 (0 to 31 is reserved for local management of ATM traffic). Please see the Appendices for more
information.
supplied by your telephone company. The valid range for the VPI is 0 to 255 and for the VCI is 32 to
65535 (0 to 31 is reserved for local management of ATM traffic). Please see the Appendices for more
information.
3.8 Multiplexing
There are two conventions to identify what protocols the virtual circuit (VC) is carrying. Be sure to use the
multiplexing method required by your ISP.
multiplexing method required by your ISP.
3.8.1 VC—based Multiplexing
In this case, by prior mutual agreement, each protocol is assigned to a specific virtual circuit, for example,
VC1 carries IP, etc. VC-based multiplexing may be dominant in environments where dynamic creation of
large numbers of ATM VCs is fast and economical.
VC1 carries IP, etc. VC-based multiplexing may be dominant in environments where dynamic creation of
large numbers of ATM VCs is fast and economical.
3.8.2 LLC—based Multiplexing
In this case one VC carries multiple protocols with protocol identifying information being contained in each
packet header. Despite the extra bandwidth and processing overhead, this method may be advantageous if it
is not practical to have a separate VC for each carried protocol, for example, if charging heavily depends on
the number of simultaneous VCs.
packet header. Despite the extra bandwidth and processing overhead, this method may be advantageous if it
is not practical to have a separate VC for each carried protocol, for example, if charging heavily depends on
the number of simultaneous VCs.
3-4
Internet
Access