ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 3 at 2012 year.

Order result by:
Public date | Title | Authors |

51. Role of stochastic testing in microprocessors functional verification [№3 за 2012 год]
Author: Хисамбеев И.Ш.
Visitors: 10234
With the growth of the performance requirements of modern IC, including microprocessors and Systems-on-Chip, their development complicates considerably. It has become a multistage process, and there are many sophisticated tasks to be done on each stage. One of the most labor-consuming tasks is design functional verification. Its goal is to approve a conformity between implementation of a design and it's specification functional requirements. While it does not yet have a general solution, considering modern IC designs complexity, several complementary approaches were developed to address it. One of them is stochastic testing. It was applied for researching of the MIPS64 architecture microprocessors in Science research Institute for system analysis of RAS. The method is based on the test program execution simulation. Test programs are generated automatically from the given template. Instructions, arguments and settings for the test are chosen randomly considering given biases and constraints. This paper is a review, aiming at specifying the role of stochastic testing with its application scope, advantages and disadvantages. In the introduction functional verification is considered in general, as a part of IC design workflow. Then, most well-known verification approaches are reviewed, their underlying ideas analyzed briefly. Particularly, simulation-based methods are considered. Finally, stochastic testing method is described in the given background. Conclusions concerning its advantages and disadvantages are illustrated with some results of its application in SRISA RAS.

52. Verification of a microprocessor and its RTL-model by means of ОС Linux user applications [№3 за 2012 год]
Author: Chibisov P.A.
Visitors: 11232
This article covers the methods of verification and testing of modern microprocessors. The special attention is given to a method of testing the RTL-models, FPGA-prototypes and test crystals of microprocessors by real user applications for the Linux operating system. The interrelation of these objects and degree of a discussed technique applicability to each of them in a context of the general verification plan are considered either. The article lists the merits and demerits of the method. As simulation speed of programs on RTL-model of a microprocessor is extremely slow, it is offered to use the cut-restore mechanism of a model state for splitting all instruction sequence of an operating system booting into a set of subsequences which are carried out in parallel on different computers. Existence of a large quantity of freely distributed programs with an open source code with the built-in automated self-test mechanisms makes it possible to mark out an applications launch for Linux OS in a separate approach for testing of universal microprocessors. The described method doesn't exclude, but serves as a supplement to a modern set of methods and means of testing and verification of microprocessors and their models. Many authoritative developers and manufacturers of microprocessors recognize the usefulness of the earlier booting of any operating system on the RTL-model under development. Success in this operation often makes the developers more confident that their work is done correctly, than tens of thousands of executed tests. The article provides the example of the representative test set which makes it possible to use the ready-made user software packages, as well as the examples of the test program sources. Besides, it considers the general algorithm of actions to find a bug in the microprocessor and gives examples of bugs revealed in the microprocessor with MIPS64 architecture.

53. Protected data transfer channel setting [№3 за 2012 год]
Authors: Шудрова К.Е., Почкаенко В.Ю.
Visitors: 23384
In The article presents result of study related to development of methodological and program and algorithmic foundation of setting protected data transfer channel. The article describes program implementation of the designed algorithm. The article contains client-server architecture solution based on the expressed problem, there are provided some variants of its use. The described algorithm includes important aspect of traffic prioritization, which helps to distribute the load effectively. Authors provide technique based on integration of additional information into the header of TCP package. The load is managed by identification technique with marks and cycle checking that implements them in the system. The authors named this algorithm as Privilege Mark. Authors considered two types of threats when they designed protected data transfer channel: unauthorized access to the network communicating units and unauthorized access during the transfer process through open communication channels. To prevent first type of threat and provide authentication, authors use confidential mark transfer method in the Privilege Mark algorithm. Steganography is used to protect data transfer channels from unauthorized access. Video stream is used here to be a container for hidden information, this provides high bandwidth of such solution. The article describes the software solution that implement such technique. The result can be used in practical arrangement of video conference with integrated protected data transfer mode and in theoretical studies related to the load distribution and operation modes and stegodata transfer.

54. Capability of Matlab package related to distant computation using numerical approach for the problem solution [№3 за 2012 год]
Author: Нгуен Зуи Тхаи
Visitors: 11092
The Web-application is designed on Matlab, Web Server (MWS) and distant computation of various math problems that expands capabilities of the previous numerical approach for laboratory-based practical. This laboratory-based practical represents implementation of numerical technique collection on Matlab provided for cal-culations of functions with given accuracy; non-linear equation solution; solution of simultaneous linear algebraic equations; interpolation of tabulated functions using polynom; approximation of a function; solution of differential equations; numerical integration and numerical optimization of functions. Large library of standard MWS functions used in the technology, can create applications, where Matlab uses World Wide Web to send data to Matlab and display results in a Web-browser. MWS depends on transfer data TCP/IP protocol and it links client and MATLAB. The application works at server and user interacts with it through Web-browser and the user does not need Matlab. Therefore, MWS is also an interact communication service of MatLab with the Web-server Apache. MWS has some advantages. When a network user works with Matlab package, there is no need to install resource-intensive software on local computers, because all computations are made by server. Preparation of the Web-application to work in the net is similar to design of local Matlab application and it includes additional step: design of the Web-interface, which means creation of Web-pages on HTML language. Implementation of the Web-application facilitates teaches’ work, it improves effectiveness of the software in case of distant education.

← Preview | 1 | 2 | 3 | 4 | 5 | 6