To 40 Gigabits and beyond

Anderson, Stephen G.
February 2008
Laser Focus World;Feb2008, Vol. 44 Issue 2, p9
The article reports developments surrounding the data transmission systems in the U.S. One recent advancement is transmission of single-channel data streams at 40 Gigabit per second. Also seeing serious commercial deployment is fiber to the home/node/business. Meanwhile, work continues in the development of "all-optical" networks with more integrated, faster, and lower-cost components that can handle the ever increasing data rates.


Related Articles

  • Dispersion-tolerant technologies battle for attention. Hardy, Stephen // Lightwave;Jun2006, Vol. 23 Issue 6, p1 

    The article focuses on the potential of dispersion-tolerant transmission to become popular in the field of telecommunication. The said system is useful in the transition of telecommunication companies to 10 Gbits per second network. It is also significant in the implementation of reconfigurable...

  • M2M communication a future growth area.  // Finweek;12/21/2006, p54 

    The article reports on the establishment of a communication system Machine Logistics designed to vie for the machine-to-machine communications in South Africa. It provides hardware and technology that is capable of real-time data transmission between machines and cellular phone networks. The...

  • Interception Controls of Data Communications Systems. Chao, Joseph C. // Journal of Information Systems;Spring90, Vol. 4 Issue 2, p69 

    Data communications systems normally use combinations of transmission links for sending messages. Tapping risks of transmission links are discussed. Although fiber optics provides the highest level of interception protection among all links, tapping methods and countermeasures are available....

  • Student Loans: Improvements in the Direct Loan Consolidation Process: HEHS-99-19R.  // GAO Reports;11/10/1998, p1 

    Pursuant to a congressional request, GAO provided information on the William D. Ford Federal Direct Loan Program's (FDLP) and the Federal Family Education Loan Program's (FFELP) loan consolidation process, focusing on: (1) whether FFELP lenders believe that Electronic Data Systems' (EDS)...

  • Synchronous Network.  // Network Dictionary;2007, p472 

    An encyclopedia entry for "Synchronous Network" is presented. It refers to a telecommunication network in which clocks are controlled to run at identical rates at the same mean rate with a fixed relative phase displacement within a stipulated range. In practice, the clock may be mesochronous.

  • Synchronous Mode.  // Network Dictionary;2007, p472 

    An encyclopedia entry for "Synchronous Mode" is presented. It refers to a type of transmission in which the transmission and reception of all data are synchronized by a common clock and done in blocks rather than in individual characters. It has higher data throughput than asynchronous mode, but...

  • Synchronous Payload Envelope.  // Network Dictionary;2007, p472 

    An encyclopedia entry for "Synchronous Payload Envelope" or "SPE" is presented. It refers to a payload carrying portion of the Synchronous Transport Signal in SONET. SPE facilitates the transportation of tributary signal across a synchronous network. Oftentimes, this signal is assembled at the...

  • With M2M, A Little Bit Goes A Long Way. Smith, Brad // Wireless Week;10/1/2004, Vol. 10 Issue 20, p38 

    Assesses the emerging market for machine-to-machine (M2M) communications as of October 2004. Use of M2M communications for vehicle and asset tracking or monitoring utilities; Benefits from using M2M communications; List of M2M module providers.

  • Symmetric Adiabatic Logic Circuits against Differential Power Analysis. Byong-Deok Choi; Kyung Eun Kim; Ki-Seok Chung; Dong Kyue Kim // ETRI Journal;2010, Vol. 32 Issue 1, p166 

    We investigate the possibility of using adiabatic logic as a countermeasure against differential power analysis (DPA) style attacks to make use of its energy efficiency. Like other dual-rail logics, adiabatic logic exhibits a current dependence on input data, which makes the system vulnerable to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics