Browse Definitions :
Definition

40 Gigabit Ethernet (40GbE)

40 Gigabit Ethernet (40GbE) is a standard that enables the transfer of Ethernet frames at speeds of up to 40 gigabits per second (Gbps). The 40GbE standard is intended for local server connectivity; a more robust standard, 100 Gigabit Ethernet (100GbE), is intended for Internet backbones.

In 2007, the IEEE Higher Speed Study Group started work toward 40GbE and 100GbE standards with the goal of increasing available bandwidth while maintaining maximum compatibility with existing interfaces and network management principles. Another goal was to provide for increased working distances to satisfy the requirements of the intended applications. The standard was approved in 2010.

Previous versions of Ethernet could use standard Category 6 (Cat 6) copper wiring and RJ45 connectors, which have been around for decades and are readily deployed. 40 GbE runs on Quad Small Form Factor Pluggable (QSFFP) cabling, a high-density fiber connector with 12 strands of fiber.

According to the task force, 40GbE and 100GbE fulfill the following requirements and objectives:

  • Preserve existing 802.3 frame format, minimum size, and maximum size.
  • Support high-bandwidth applications such as video on demand (VoD) and high-performance computing (HPC).
  • Support high-speed switching, routing, and application functions in data centers.
  • Exhibit a bit error rate (BER) of 10-12 or better (a maximum of one error bit per 1,000,000,000,000 bits transmitted).
  • Provide support for optical transport network (OTN).
  • Provide specifications for operation over single-mode optical fiber, laser optimized multimode optical fiber, copper cables, and backplanes.

 

This was last updated in September 2013

Continue Reading About 40 Gigabit Ethernet (40GbE)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close