Solved

Why Ring topology & not Star in optical ethernet MAN?

Posted on 2001-06-11
2
1,552 Views
Last Modified: 2008-03-10
I am looking for support for why optical ring topology for MAN is better than star topology.  Or viceversa. It seems some people associate ethernet with Star, but carriers use rings? I can't find any information why? And does anybody know who is adopting MAN rings?

I'm especially hoping to find articles and statistics that support/explain these sorts of things. The only papers I find are on Mesh verses Ring topology, no mention of star anywhere? But perhaps I've been looking and looking in all the wrong places? Please help.

Cheers.
0
Comment
Question by:Pedmeister
2 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 50 total points
ID: 6179369
What you are most likely refering to is SONET rings, most widely used by telco carriers. The other is FDDI rings, or TokenRing which is very different. The advantage of the ring is that it is usually a dual-ring in that if one path is cut, there is an alternate path. With a traditional star topology, there is only one path.

Sonet:
http://www.iec.org/tutorials/sonet/
http://www.nwfusion.com/edge/news/2000/1211edge.html

FDDI:
http://www.nswc.navy.mil/ITT/x3t12/FDDIFAQ.html
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/fddi.htm

Star vs Ring:
http://www.cisco.com/univercd/cc/td/doc/product/ismg/policy/ver23f/topodef/nwgdline.htm

Token Ring:
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/tokenrng.htm



0
 
LVL 1

Expert Comment

by:nhuanvn
ID: 6236470
Irmoore is abs. correct. I just want to add more that
the ring can help you through two kinds of protection,
1 on a bi-directional ring and 1 in uni-directional ring.
Bellcore (Telcordia) is a good source of BLSR standard,
but I am not sure if they provide the document freely or
not.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
VIRL IP adress 3 58
DHCP for a guest wireless network 1 47
EIGRP STUB 19 43
Cisco 3560 switches not seeing VTP V3 12 15
If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
When you try to share a printer , you may receive one of the following error messages. Error message when you use the Add Printer Wizard to share a printer: Windows could not share your printer. Operation could not be completed (Error 0x000006…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now