{"title":"Interoperability through Conformance; The iWARP validation process","authors":"Barry Reinhold","doi":"10.1109/CLUSTR.2005.347029","DOIUrl":null,"url":null,"abstract":"The ability of systems to interoperate while using the iWARP protocol suite is a well understood requirement for market acceptance of the technology. Since an improper implementation of the iWARP protocol opens the door to the possibility of silent data corruption, rigorous testing must be in place to ensure that devices properly implement the protocol. This level of verification is difficult to achieve using standard system and interoperability procedures. Verification technology was needed that would enable developers to identify failures in their implementations in the context of specific lower layer protocol conditions. The industry banded together during 2004 to enable the development of verification tools that would provide the detailed testing required by the iWARP community. This paper discusses these tools, the reasoning behind them, what has been achieved to date, and the work that still needs to be done","PeriodicalId":255312,"journal":{"name":"2005 IEEE International Conference on Cluster Computing","volume":"137 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 IEEE International Conference on Cluster Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CLUSTR.2005.347029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The ability of systems to interoperate while using the iWARP protocol suite is a well understood requirement for market acceptance of the technology. Since an improper implementation of the iWARP protocol opens the door to the possibility of silent data corruption, rigorous testing must be in place to ensure that devices properly implement the protocol. This level of verification is difficult to achieve using standard system and interoperability procedures. Verification technology was needed that would enable developers to identify failures in their implementations in the context of specific lower layer protocol conditions. The industry banded together during 2004 to enable the development of verification tools that would provide the detailed testing required by the iWARP community. This paper discusses these tools, the reasoning behind them, what has been achieved to date, and the work that still needs to be done