Browse Definitions :
Definition

40 Gigabit Ethernet (40GbE)

Contributor(s): Stan Gibilisco

40 Gigabit Ethernet (40GbE) is a standard that enables the transfer of Ethernet frames at speeds of up to 40 gigabits per second (Gbps). The 40GbE standard is intended for local server connectivity; a more robust standard, 100 Gigabit Ethernet (100GbE), is intended for Internet backbones.

In 2007, the IEEE Higher Speed Study Group started work toward 40GbE and 100GbE standards with the goal of increasing available bandwidth while maintaining maximum compatibility with existing interfaces and network management principles. Another goal was to provide for increased working distances to satisfy the requirements of the intended applications. The standard was approved in 2010.

Previous versions of Ethernet could use standard Category 6 (Cat 6) copper wiring and RJ45 connectors, which have been around for decades and are readily deployed. 40 GbE runs on Quad Small Form Factor Pluggable (QSFFP) cabling, a high-density fiber connector with 12 strands of fiber.

According to the task force, 40GbE and 100GbE fulfill the following requirements and objectives:

  • Preserve existing 802.3 frame format, minimum size, and maximum size.
  • Support high-bandwidth applications such as video on demand (VoD) and high-performance computing (HPC).
  • Support high-speed switching, routing, and application functions in data centers.
  • Exhibit a bit error rate (BER) of 10-12 or better (a maximum of one error bit per 1,000,000,000,000 bits transmitted).
  • Provide support for optical transport network (OTN).
  • Provide specifications for operation over single-mode optical fiber, laser optimized multimode optical fiber, copper cables, and backplanes.

 

This was last updated in September 2013

Continue Reading About 40 Gigabit Ethernet (40GbE)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close