On the Model Checking of the Rcmp-800 Input Fifo
نویسنده
چکیده
In this paper we display several practical approaches adopted for the formal verification of an industrial case study using model checking. The device under investigation is the Routing Control, Monitoring and Policing 800 Mbps (RCMP-800), a product from PMC-Sierra, Inc. RCMP-800 is an integrated circuit that implements ATM (Asynchronous Transfer Mode) layer functions including fault and performance monitoring, header translation and cell rate policing. In particular, we present our experience on model checking of the input FIFO of RCMP-800 using the VIS tool. We successfully established the environments and verified a number of relevant properties in the input process module of RCMP-800, which led to the discovery of a few errors.
منابع مشابه
Model Checking of the RCMP-800 Input FIFO
In this paper we display several practical approaches adopted for the formal verification of an industrial case study using model checking. The device under investigation is the Routing Control, Monitoring and Policing 800 Mbps (RCMP-800), a product from PMC-Sierra, Inc. RCMP-800 is an integrated circuit that implements ATM (Asynchronous Transfer Mode) layer functions including fault and perfor...
متن کاملModel Checking of the Fairisle ATM Switch
In this paper we present our experience on model checking of an Asynchronous Transfer Mode (ATM) switch using the Verification Interacting with Synthesis (VIS) tool. The switch we considered is in use for real applications in the Cambridge Fairisle network. It is composed of four input/output port controllers and a switch fabric, and contains around 1MB memory, 2KB FIFO buffer and 800 registers...
متن کاملReachability checking in complex and concurrent software systems using intelligent search methods
Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملNusselt Number Estimation along a Wavy Wall in an Inclined Lid-driven Cavity using Adaptive Neuro-Fuzzy Inference System (ANFIS)
In this study, an adaptive neuro-fuzzy inference system (ANFIS) was developed to determine the Nusselt number (Nu) along a wavy wall in a lid-driven cavity under mixed convection regime. Firstly, the main data set of input/output vectors for training, checking and testing of the ANFIS was prepared based on the numerical results of the lattice Boltzmann method (LBM). Then, the ANFIS was develope...
متن کامل