Browse Definitions :
Definition

40 Gigabit Ethernet (40GbE)

40 Gigabit Ethernet (40GbE) is a standard that enables the transfer of Ethernet frames at speeds of up to 40 gigabits per second (Gbps). The 40GbE standard is intended for local server connectivity; a more robust standard, 100 Gigabit Ethernet (100GbE), is intended for Internet backbones.

In 2007, the IEEE Higher Speed Study Group started work toward 40GbE and 100GbE standards with the goal of increasing available bandwidth while maintaining maximum compatibility with existing interfaces and network management principles. Another goal was to provide for increased working distances to satisfy the requirements of the intended applications. The standard was approved in 2010.

Previous versions of Ethernet could use standard Category 6 (Cat 6) copper wiring and RJ45 connectors, which have been around for decades and are readily deployed. 40 GbE runs on Quad Small Form Factor Pluggable (QSFFP) cabling, a high-density fiber connector with 12 strands of fiber.

According to the task force, 40GbE and 100GbE fulfill the following requirements and objectives:

  • Preserve existing 802.3 frame format, minimum size, and maximum size.
  • Support high-bandwidth applications such as video on demand (VoD) and high-performance computing (HPC).
  • Support high-speed switching, routing, and application functions in data centers.
  • Exhibit a bit error rate (BER) of 10-12 or better (a maximum of one error bit per 1,000,000,000,000 bits transmitted).
  • Provide support for optical transport network (OTN).
  • Provide specifications for operation over single-mode optical fiber, laser optimized multimode optical fiber, copper cables, and backplanes.

 

This was last updated in September 2013

Continue Reading About 40 Gigabit Ethernet (40GbE)

SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • password cracking

    Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close