Title :
Interoperability through Conformance; The iWARP validation process
Author_Institution :
Lamprey Network, Durham, NH
Abstract :
The ability of systems to interoperate while using the iWARP protocol suite is a well understood requirement for market acceptance of the technology. Since an improper implementation of the iWARP protocol opens the door to the possibility of silent data corruption, rigorous testing must be in place to ensure that devices properly implement the protocol. This level of verification is difficult to achieve using standard system and interoperability procedures. Verification technology was needed that would enable developers to identify failures in their implementations in the context of specific lower layer protocol conditions. The industry banded together during 2004 to enable the development of verification tools that would provide the detailed testing required by the iWARP community. This paper discusses these tools, the reasoning behind them, what has been achieved to date, and the work that still needs to be done
Keywords :
open systems; protocols; iWARP protocol; iWARP validation process; interoperability; silent data corruption; specific lower layer protocol conditions; verification technology; Character generation; Communication system control; Connectors; Delay; History; Marketing and sales; Performance evaluation; Protocols; System testing; Tail;
Conference_Titel :
Cluster Computing, 2005. IEEE International
Conference_Location :
Burlington, MA
Print_ISBN :
0-7803-9486-0
Electronic_ISBN :
1552-5244
DOI :
10.1109/CLUSTR.2005.347029