Font Size: a A A

Carrier Ethernet Detection Technique And Its Verification Model

Posted on:2010-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:W R PanFull Text:PDF
GTID:2208360275483730Subject:Detection Technology and Automation
Abstract/Summary:PDF Full Text Request
Along with the development of network technology, the operation make up of high IP data transmission and multimedia is more and more important in telecom market, and decline of traditional voice operation is inevitable trend. Traditional metropolitan area network technology have defects on new data transmission operation, and due to the agility and simpleness of ethernet technology which is swift develop lately, ethernet technology shows prodigious energy in metropolitan area network. Telecom ethernet have become the one of most importance technology in next generation metropolitan area network technology. Ethernet OAM can provide ethernet with perfect QoS. Because Ethernet OAM work in network link layer and do not depend on network topology and idiographic operation, so Ethernet OAM is necessary for Ethernet to come into Telecom Corporation.ASIC verification is a process which can affirm the correctness of ASIC design. At the present time, the size of IC design have reached million gates even mult-imillion gates, ASIC verification take up 70 percent in IC design and verification engineer is twice as many as design engineer. ASIC verification is ineluctable and it expends many resource. ASIC verification can not bring benefits immediately, actually benefits is bringed by ASIC design. How to advance verification efficiency that become an important problem in IC design.First, this paper studys Ethernet OAM seriously include analysing requirement, background and protocol. Second, by search of Ethernet OAM technology, introducing a ASIC verification model for OAM module, which is the part of one Hisilicon corporation grouping transmission ASIC, the work include analyzing test points and designing test cases. The verification model is made by VMM methodology, and verification is made of BFM, DUV and RM etc. This paper also analyse another verification method by using C++, TCL, VerilogPLI. Finally, this paper combines two methods to bring forward expectations on ASIC verification.
Keywords/Search Tags:telecom ethernet, OAM, Faults Checking, ASIC Verification
PDF Full Text Request
Related items