Automatic Constraint Generation for Boundary Scan Interconnect Tests
|
|
- Vivien Wheeler
- 6 years ago
- Views:
Transcription
1 Automatic Constraint Generation for Boundary Scan Interconnect Tests Kendrick Baker Rick Borton Raytheon Company McKinney, TX ABSTRACT This paper discusses an algorithm to automate the generation of constraints files by leveraging a simple extension to the device characteristic model. This extension consists of additional pin-level restriction data that defines the test constraints. While additional constraints based on the unique features of the design may still be required, the component-based constraints can be quickly determined and the corresponding file quickly generated by this process. All required design information is gathered from files already used in the interconnect test generation process. Since the pin-level restrictions apply to each instance of that component in the design, they will be declared in the component's characteristic model. The pin restriction information in the component characteristic models is the only information that will not be present in a typical test generation process. No other modifications to any files are required, which greatly reduces the effort required in generating the constraints. 1. INTRODUCTION Many steps in the process of generating boundary scan interconnect tests are automated. The test vectors are generated by (commercial) software. Figure 1 shows some of the major components involved in the test vector generation process. The BSDL (Boundary Scan Description Language) files describe the boundary scan architecture for the boundary scan devices. The device characteristic models (one for each type of device in the design) give basic information about the device pins, as well as certain transparency and power information. The netlist defines which devices correspond to which characteristic models, as well as how the pins of those devices are connected. The test vectors are generated using this information. In addition, the software takes into account any constraint information provided. Constraints hold a signal (in this case one with a boundary scan device pin) at a constant value throughout the test. They are used either to put the board into a safe state for the test or to improve the test coverage by reducing any interference from non-boundary scan devices present during the test. Figure 1 - Current Vector Generation Flow Device Models BSDL Netlist Constraints File Automatic Interconnect Test Generation Test Vectors This constraint information pertains only to signals accessible from boundary scan devices. It consists of signals that need to be driven to certain values, to remain undriven (by boundary scan devices), or to expect a particular value. It also lists pins that, although they are output pins, are safe to drive (because the state the board is being put into during the test disables them). Sometimes these constraints are referred to as logical constraints. While much of the process is automated, typical test generation flows require the manual development of the constraints file. However, most, if not all, of the constraints for a test can be determined based on the type of components being used rather than design-specific boardlevel information. These component-based constraints will apply to all instances of the component in the design. The automatic constraint generation (ACG) algorithm proposed in this paper is designed to take advantage of the component-based constraints to automatically create a logical constraints file (quickly and effectively). The dotted 1
2 Figure 2 - Proposed Vector Generation Flow Device Models Automatic Constraint Generation Constraints File Constraints File automatically generated Device Models modified to contain additional pin restriction information BSDL Netlist Automatic Interconnect Test Generation Test Vectors lines in figure 2 show how the new process uses the same input files (although the characteristic models contain additional information) to create the constraints file automatically. In addition, the algorithm modifies the netlist to include power net information, which would normally be inserted manually. 2. ACG ALGORITHM INPUTS Characteristic Models Characteristic models contain information about the device pins, power pins, and transparencies. Each pin on the device is listed as an input, an output, or both, although pins on connectors will not be listed as either. In addition, the power pins of the device (if it has any) are listed. If the device has transparencies, such as non-inverting buffers or resistors, the model will contain data on which pins are transparently connected. See Appendix I for examples of characteristics models. The algorithm begins by analyzing each component characteristic model for pin restriction, power, and transparency information. Any such data found in the model is recorded for later use with instances of the device that are located in the netlist. Output pins for the device are also recorded. Power and transparency information is already part of the models. Pin restriction data is the only data that may need to be added for this algorithm. The power architecture of the design will be analyzed based on power pin declarations of the component characteristic models. Therefore it is important to have at least one pin in each power net declared as a power pin in the component characteristic models. Otherwise, the algorithm may misunderstand the power architecture. Transparency information is also expected in the characteristic models. This is information regarding net equivalencies (nets that are connected and can be considered one net for test purposes). For instance, a series resistor will create a net equivalence between the two nets it touches. Likewise, buffers create a unidirectional equivalence between the drive and receive nets. This equivalence may be conditional if it requires the activation of one or more enable signals. Transceivers and switches are some other examples of transparent devices (that are also usually conditional). Pin restriction data is added to the model to determine what constraints should be implemented in the constraints file. They also contain information about why the constraint should exist, which helps determine priorities when conflicts arise. There are four types of pin restrictions considered in this algorithm. Since the pin restriction data is not part of the characteristic model language, the syntax will need to be determined when the algorithm is implemented. Boundary Scan Pin Restrictions Disabled Pins Pin Restrictions Constant Input Pin Restrictions Constant Output Pin Restrictions The first type of pin restriction data consists of constraints to enable boundary scan to work properly on the device during the test. Some devices use compliance enable pins or otherwise do not allow required instructions (such as EXTEST) to be used in certain conditions. This pin restriction indicates that the input pin(s) needs to be constrained to a certain value in order for the device to use boundary scan properly during the test. Even if no compliance enable pin is present, boundary scan devices should contain the pin restriction so that the ACG algorithm knows that 2
3 this is a boundary scan device. In this case, the pin restriction would exist, but not list any compliance enable pins. Figure 3 shows a boundary scan device with a compliance enable pin that needs to have a constraint met. This is the only pin restriction a boundary scan device will have, as any others can be handled by the test vector generation software. Likewise, only boundary scan devices have this restriction. The third type of pin restriction is to declare that an input pin will need to receive a certain value throughout the test. For example, a reset input may need to be kept inactive during the test so that the device remains in a particular state. Figure 5 shows an example of a watchdog timer that should have its input reset pin held constant throughout the test. Figure 6 - Constant Output Pin Restriction Figure 3 - Boundary Scan Pin Restriction Compliance Enable Pin(s) (PROGRAM) Boundary Scan Device (FPGA) Non- Boundary Scan Device (Timer) Output Pin (TIMEOUT) Figure 4 - Disabled Pins Pin Restriction Output Enable Pin(s) (CHIP SELECT) The second type of pin restriction exists to disable outputs. For instance, often a part will not drive its outputs if the chip select pin is deasserted. Figure 4 shows an example of a memory device with an output enable pin that prevents the memory from driving the data bus. This constraint requires information on which input pin(s) to hold at what value, as well as which output pins are then safe to be driven externally (from boundary scan devices). Figure 5 - Constant Input Pin Restriction Input Pin (RESET) The devices used and the nets present in the design are obtained from the netlist. As the netlist is read to determine what devices are present, any boundary scan device located will be associ- Non- Boundary Scan Device (Memory) Non- Boundary Scan Device (Timer) Disabled Pins (DATA) The final type of pin restriction is to declare that an output pin will always drive a certain value during the test. For instance, a reset output may be active through the test. By noting it in the constraints, the test vectors can at least check that the correct value is being driven from the device. Figure 6 again shows a timer whose reset output will remain inactive throughout the test. BSDL A mapping of boundary scan pins is needed, so that the ACG algorithm knows which nets have boundary scan inputs or outputs. This can be gleaned from the individual BSDL files, from a design file containing cell data for the boundary scan chain (position file), or even from a device characteristic model. While the pin information could be gathered from the device characteristic model, this would not let the algorithm know anything about the cell positions for those pins. Since the algorithm presented does not generate any vectors, no data on cell positions is required. However, future enhancements may generate vectors (such as initialization vectors), and therefore it would be prudent to have the necessary structures in place to support that. Netlist 3
4 ated with its pin map. When the pins are later read in, this pin map will be used to determine which pins are inputs and which are outputs. Once the devices have all been located, the nets are examined. As each net is being read in from the netlist, each pin in the net is examined for pin restrictions, power pins, or possible transparencies (all from the characteristic model data for that device). If any such information is found, the net is included for later analysis. If not, the net is ignored, even if it has a boundary scan input or output. The net is ignored because there is no pin restriction to meet and no transparency to another net that might have one. 3. ACG ALGORITHM After each net has been reviewed, all nets that were included for analysis have any transparencies resolved. If the net has a transparent device pin (if the net is equivalent to another net), the algorithm determines all possible driver and receiver equivalent nets. For instance, a buffer can only drive on one pin and only read on the other. However, if a net has a resistor, it marks each net as being able to both read from and drive the other net as long as one of the nets is not a power net. Nets that enable a conditional transparency will also be noted. Once the transparencies are determined, the nets are sorted by pin restriction type into separate lists. If a net contains multiple pin restrictions, it may be sorted into multiple lists. There is an additional list for all nets with power pins and nets without any pin restrictions. The latter are only included for analysis because they contain potential transparencies. After the nets have been sorted, they are then analyzed. Each list of nets is analyzed separately in the following order: Power Analysis Power nets and nets with no pin restrictions Driven Pin Analysis Constant Output Pin Restrictions Requested Drive Net Analysis Boundary Scan Pin Restrictions Disabled Pins Pin Restrictions Constant Input Pin Restrictions Power Analysis The first set of nets to be analyzed are the power (and transparent) nets. If a net is a power net, then any "downstream net" (with exceptions) is marked as a power net. A "downstream net" is any net that is connected to the current net by one or more transparencies and can be driven by the current net. All nets with power pins, as defined in the device characteristic models, will be considered power nets regardless of the characteristics of the net. However, certain downstream nets will not be considered power nets. Any downstream net that is connected to the power net by a resistive transparency (resistor) is considered a pull-up or pull-down, and will not automatically be marked as a power net. Only if the downstream pull-up or pull-down net has only one resistive transparency and no outputs will the downstream net be marked as a power net. Vcc Power_1 Net Figure 7 - Power Net Analysis Example Pull-up (inherits Power_1) Device 1 Device 2 Inherits Power_0, enables buffer Active buffer forces net to inherit Power 1 Voltage Dividing Net Power_0 Net Pull-down (doesn't inherit Power_0 due to Device 1's output) 4
5 Any downstream pull-up or pull-down net with more than two resistors is not considered a power net (nor capable of being one). This is because of the possibility of a voltage divider circuit, where the net is not driven to a logic-1 or a logic-0. The logic level of that net cannot be guaranteed to match that of the power net. Likewise, any downstream pull-up or pulldown net with an output will not be a power net. Since there are outputs present, the power net will not always drive the downstream net. It will only be considered a power net in the absence of a driven value from the output pins on the net. A net that is driven by a power net through a transparency other than a resistor, such as a buffer, is considered a power net regardless of the number of resistors present. This is because the buffer will be able to drive the net to the given power level. If a net is marked as both a POWER_0 and POWER_1 net, a conflict exists. If there is a conflict of power, the algorithm assumes that the net is a POWER_0 net. This conflict is noted in the log, however, as this violation is indicative of a design flaw or inaccurate input information. Note that the voltage dividing net in figure 7 will not be in this category. Since it contains more than one resistor, it will not inherit power from any other nets (POWER_0 or POWER_1). The marking of downstream nets is a recursive process. For each marked net immediately downstream of the current net (meaning the two are directly connected by one transparent device), the process reiterates. Figure 7 shows a sample circuit and how the algorithm would handle the different situations. Each net that is marked as a power net must also be analyzed for enabling other equivalencies. If the net has been marked as an enable net, the algorithm must determine if the transparency has been forced on (or off). For instance, if a buffer's output enable were connected to the proper power net, it would need to be marked as active (creating a transparency between the drive and receive nets). Since the enable pin is connected to a power net, it is assumed that nothing else can disable this gate, so it is locked from being modified in the future. In the case of multiple enable pins for a conditional transparency, all pins must have the correct value before the transparency will be activated. Driven Net Analysis Some nets are constrained because there is a pin on that net that will always be driving a certain value throughout the test. Once all power nets have been marked, nets with these constraints are examined. If the net is also a power net, and if the power net is a different value than that driven by the constrained pin on the net, a violation occurs. This is another problem that should not occur in a good design, but may occur if the design is flawed or if the input information was inaccurate. A violation will also occur if the net is constrained to drive conflicting values by different pin restrictions. Figure 8 - Driven Net Analysis Example Constraint unmet (no boundary scan inputs to detect driven value) Both output pins drive logic-1 Device 1 Device 2 Non-Boundary Scan Device Device 3 (BS) Boundary Scan Device Constraint met (boundary scan input can detect driven value) 5
6 If there is a constraint on the net that has not been violated by power nets, it is then evaluated in the same manner as power nets. Downstream nets are marked as also needing to meet the constraint and are checked for boundary scan inputs. If no boundary scan inputs can be found (in the constrained net or any downstream nets), then the constraint is considered "unmet", and will be commented out in the constraints file. However, this does not mean that the value will not still be driven during the test. It only means that it cannot be detected by a boundary scan device during the interconnect test. If boundary scan inputs are found, the constraint is marked as met, and will be added to the constraints file. Figure 8 is a sample circuit to demonstrate how these types of pin restrictions are handled. This list of nets is similar to the power net list in that there is nothing the test can do to prevent these nets from having driven values. For this reason, these two classes of nets are analyzed before the others, since both may be considered as unchangeable. Therefore, if an enable net is driven by this type of constraint, it will also be marked as forced active or inactive. It will then modify conditional equivalencies as required, using the same procedure that the power nets used. Requested Drive Net Analysis The remaining constraints all require some value to be driven from somewhere else on the net (either by power nets or by boundary scan outputs). Since there are different reasons these pin restrictions may have been specified, they are checked in order of importance. These constraints are grouped into three different lists (in the earlier sorting process), each corresponding to the reason for the constraint. The most important of the three constraint types is the one to get the boundary scan devices working correctly. Therefore, this is the first list of the three to be analyzed. The next most important type of constraint is the one that disables non-boundary scan outputs because it can improve coverage with a good return (one pin held constant may enable many pins to be driven). For this reason, the disabled pins pin restriction list is the second list to be analyzed. If there are any other reasons why a device needs its input pin driven to a certain value for the duration of the test, it is considered less important than the other two reasons. Therefore, the constant input pin restrictions list is the third (and final) list to be analyzed. Although the three lists are analyzed one at a time, the process for each list is the same. Figure 9 demonstrates how the pin restrictions are analyzed. Each constraint in the list is checked to see if it is already driving some value. This could be done by a power net or by a previously evaluated (and met) constraint. If there is a value being driven already, it will either meet or violate the constraint. The constraint will be met if the value driven is the same as that desired by the pin restriction, and violated if it is different. At this point, if the net has met or violated all constraints, the next net in the list will be evaluated. Figure 9 - Requested Drive Net Analysis Example Net inherits requested drive constraint from Man_Rst Constraint met by boundary scan output Boundary Scan Device Device 1 (BS) Device 2 Man_Rst Non-Boundary Scan Devices Constraint met by power DATA CE CS Device 3 DATA Outputs disabled by met constraint (can be driven by Device 1) Constraint met (boundary scan output can drive the requested value) 6
7 If the constraint has not yet been met or violated, then the net is checked for non-boundary scan digital outputs. If any exist, they may be driving at the same time we try to drive any boundary scan outputs to meet the constraint. Therefore, unless those non-boundary scan outputs are known to be off (disabled from a pin restriction) the algorithm will consider the net constraint violated. If the non-boundary scan digital output pin can be disabled by a constraint, the control net for that output pin is immediately checked to see if it can meet the disabled pin constraint (by following the requested drive analysis procedure being outlined). If the disabled pin constraint is met, then analysis of the current constraint will continue. Otherwise, it will be marked as violated and the next constraint in the list will be analyzed. If the constraint for the net has still not been met or violated, it can only be met if there is a boundary scan output pin that can drive the net. Since upstream nets are also capable of driving the net, a boundary scan output on the net itself or an upstream net will meet the constraint. The algorithm tries to drive from the net furthest upstream, if possible. Therefore, in a manner analogous to the previously discussed lists, upstream nets are marked as needing to meet the constraint. These upstream nets are recursively checked for meeting or violating the constraint with previously analyzed constraints. Beginning with the furthest upstream net, if the constraint has not yet been met or violated, it is checked for the presence of boundary scan output pins. If these outputs are not found, the constraint (for this upstream net only) is marked as unmet. Otherwise, a check is made to see if the net (the current upstream net and all of its downstream nets) is an enable net that might activate any conditional transparencies. If meeting the constraint would activate any conditional transparencies, some additional analysis is required. If activating the transparency will violate any previously met constraints, the transparency may not be enabled. Instead the constraint is marked as violated (on the net with the pin restriction and all upstream nets), and the net is not allowed to activate the transparency. If activating the transparency will not violate any previously met constraints or if no transparencies would be enabled by meeting the constraint, all conditions for meeting the constraint have been met. Boundary scan outputs have been found to drive the net, so the constraint is marked as met for this upstream net, the net with the pin restriction, and all nets in between. If the constraint is not met by the furthest upstream net, other upstream nets and eventually the originally constrained net itself will be recursively checked for boundary scan output pins. If no boundary scan outputs are found on any of these nets, then the constraint cannot be met (with the possible exception of activating conditional equivalencies), and is marked as "unmet". A comment will be made in the constraints file to signify that the constraint was requested by the pin restriction but cannot be met. Otherwise, the constraint will be added to the constraints file. If the constraint is met and is a pin restriction that disables output pins, then the output nets are marked as disabled. If more than one enable pin must be constrained in order to disable the outputs, then all enable pins must have their constraints met for the outputs to be marked as disabled. It is also possible that there are multiple enable pins available but only one is required to be constrained in order to disable the outputs. An example of this is a memory that can have the data lines disabled by either the chip select pin or the output enable pin. If this is the case, then once one of those constraints is met the others will be removed from the disabled pins pin restriction list. This will prevent the test from being over-constrained (constraining nets unnecessarily). 4. ACG ALGORITHM OUTPUTS Constraints File Generation The output of the algorithm is the constraints file. In addition, there can be a log. For test generation flows that require the power nets to be declared in the netlist, these nets can also be added by the algorithm. Only the originally declared power nets will be claimed in the netlist. Nets that inherited power (such as pulled-up nets) will not be listed. Since each constraint existed in one or more lists, each of the four constraint lists is now examined to determine what has and what has not been met. The power and transparency list is not considered at this point, since those were only used to help determine which constraints could be met. Each constraint in each list is checked to see if it has been met, violated, or is "unmet". Any net that could meet a constraint is marked in the constraints file as either expecting 7
8 Figure 10 - Current Limitations Example Devices 2, 3, and 4 all have disable constraints on their input pins. Device 1 (BS) CS CS Device 2 Device 3 Only one of these two devices can have their constraint met since they require opposite values on the constrained net. Which constraint should be met? CS Device 4 This constraint can only be met if the buffer is enabled. The algorithm does not currently enable the buffer since the enable line has no other constraints or power. or driving a certain value. It is possible that the net's constraint could meet multiple pin restrictions, but it only needs to be printed once. In this case, there should still be a separate comment for each pin restriction met. Likewise, any constraint that could not be met should be listed, but commented out. In addition, the file should contain a comment as to why the constraint was not met, such as being violated or being a constraint that cannot be met by power nets or boundary scan devices. Finally, any of the disabled outputs are printed. 5. LIMITATIONS / ENHANCEMENTS Currently, the algorithm does not attempt to enable any transparencies, except those enabled by a power net or as a side effect of a constraint being met. It would be useful to expand the algorithm to determine when to activate conditional equivalencies from a boundary scan device, as alluded to previously in the analysis algorithm. There are some cases in which constraints are not considered met, but could be if a transparency was enabled. Figure 10 shows an example of this situation. This enhancement would allow the tool to make decisions about which buffers to enable or disable in order to meet the most (or else the most important) constraints. However, even if the constraints are not marked as met, the constraint is present in the constraints file as a comment. It is easy to uncomment the constraint, allowing for a reasonable workaround until the enhancement is made. To implement this enhancement, the algorithm would be modified at the point after checking all upstream nets for meeting or violating a drive constraint. If the constraint is unmet after all checks have been made, any conditionally equivalent upstream nets can then be checked to see if they can meet the constraint without violating other constraints. For this enhancement to be more effective, a second enhancement would be useful. The algorithm would have to know how to decide which gates to enable and disable to achieve the best results. What "best results" means is the term that would have to be defined. A more complex priority system would need to be developed for determining which constraints are most important to meet. Currently, the priority is simply determined by which class (or list) the constraint is in, and within a class there is no priority. Another decision-making benefit for this expanded priority system would be to determine which constraint to meet in the presence of conflicting constraints. For instance, perhaps driving a net high will enable disable outputs on one device but enable them on another, as in figure 10. If both were constrained to be disabled, one or more constraints will be violated (or at least unmet) regardless of which device's outputs are disabled. The new prioritization scheme would need to be able to determine which is the most useful constraint to meet. 6. RESULTS This algorithm has significant advantages over manual constraint generation. The primary goal of the tool was to reduce test development time. There are several factors to consider in determining whether this goal has been met. Some steps required by this process are not required in manual constraints file generation. This additional effort includes modifying the characteristics model to include the pin restriction data. Since this generally consists of one or two additional lines of data in the model (see 8
9 Appendix I for examples), this does not require much effort. The time required is on the order of minutes per pin restriction. This small effort can be reduced even more by using a repository of characteristic models that include the pin restriction data. In a practical sense, there will be a learning curve for using the tool, also. This is the time it will take the user to learn the syntax for the pin restrictions and how to interpret the log data (particularly for error messages). This will take around one to four hours, depending on how formal the training is and how familiar the user is with constraints. As mentioned in the previous section, there may be special cases where the tool does not consider the constraint met, although it could safely do so. In these cases, the test developer may also need to comment or uncomment certain lines in the constraints file. This additional time is spent to verify the constraints and then uncomment or comment some lines. However, verifying the constraints is important (and relatively quick), so it should be done even in manual generation. Commenting and uncommenting some lines does not require much time. The additional time spent is more than offset by the time saved from automating the process. Except to verify the constraints generated by the tool, there is no time required for the test developer to study the schematic and netlist to determine what constraints should exist. Constraints that are not met have an explanation as to why they were commented out, allowing quick verification of the generated file. Conflicts in desired constraints are found automatically, rather than by manual analysis of the design. Net names automatically match the netlist and do not have to be translated from the schematic's net names or traced through several equivalent nets to find the correct name for the portion of the net touching the boundary scan device. Typing is not required for the generation of the file, so typos and incorrect net or lead names will not be a problem (assuming the lead names were entered correctly into the models). Several variables affect the amount of time reduction in generating the constraints file. As discussed earlier, certain designs may require some manual corrections (consisting of commenting and uncommenting). The more corrections that are required, the longer it will take to make a completed file. The more pin restrictions that need to be made, the more time it will take to enter them into the models. Within Raytheon, the test developers who have used this tool have reduced the constraints file generation time by 65-80%. Inexperienced users saved more actual hours, since they take longer to generate the file manually. Board designs with many constraints tend to yield greater savings, as well, since the additional work required is much less than the work that no longer needs to be done by the test developer. 7. CONCLUSION We have proposed an automated process for generating constraints files. This process has significant advantages over manual constraint generation. The primary goal of the algorithm was to reduce test development time. An implementation of this algorithm has been demonstrated to achieve this reduced test development time on actual designs within Raytheon. Automating the process of generating constraints files is made possible by taking advantage of component-based constraints, which allows software to analyze the design for constraints rather than the test developer. These pin restrictions can be easily defined in files already used in the vector generation process. The technique has proved beneficial and has allowed greater automation of our boundary scan interconnect test development process. 8. REFERENCES [1] IEEE Std , "IEEE Standard Test Access Port and Boundary-Scan Architecture" [2] B. Eklow, R. Sedmak, D. Singletary, and T. Vo, "Unsafe Board States During PC-Based Boundary-Scan Testing", Proceedings of International Test Conference 2001, pp [3] G. Robinson and J. DeShayes, "Interconnect Testing of Boards with Partial Scan", Proceedings of International Test Conference 1990, pp APPENDIX I - Sample CHR models This appendix contains four characteristic models. They are in the Victory format, but the format is not required for the algorithm to work as long as the information is present in the characteristic models. The samples demonstrate how little extra effort is involved in adding the pin restriction information to the models. The added lines use syntax consistent with our implementation of the algorithm. 9
10 The first model is for a fictitious sample device called SAMPLE_DEV. This device has an output enable pin. When the output enable pin (pin 1) is low, the outputs are disabled. We want to disable these pins so that the vector generation software will drive those signals using boundary scan device output pins. %NAME SAMPLE_DEV %CHAR char SAMPLE_DEV, leads=11, type=digital; lead 1=1, 2=2, 3=3, 4=4, 5=5, 6=6, 7=7, 8=8, 9=9, 10=10, 11=11; port input_leads = 1,3,4; port output_leads = 2,5,6,7,8,9,10,11; output output_leads input input_leads; power_0 3; power_1 4;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! The following lines are not valid in the CHR! model language. They are commands used by! our implementation of the ACG algorithm! These lines will be stripped from the model! before it is used by the test vector generation! software.! These are the only two lines added to the model! to make it work with the algorithm. DISABLE: 1 = 0 2,5,6,7,8,9,10,11!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! %COMP SAMPLE_DEV The next model is of a boundary scan device. The IEEE instructions on this device will only work correctly when its compliance enable pin (pin 2) is high. We want to set this pin high so that our interconnect test will use this boundary scan device. %NAME SAMPLE_DEV2 %CHAR char SAMPLE_DEV2, leads=12, type=digital; lead 1=1, 2=2, 3=3, 4=4, 5=5, 6=6, 7=7, 8=8, 9=9, 10=10, 11=11, 12=12; port input_leads = 2,3,4,12; port output_leads = 1,5,6,7,8,9,10,11; output output_leads input input_leads; power_0 3; power_1 4;! software.! This is the only line added to the model! to make it work with the algorithm. BS_MODE: 2 = 1!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! %COMP SAMPLE_DEV2 The following model is of a sample buffer. This buffer has an enable pin (pin 2), which activates the buffer when low. This example has no extra lines added for use with the algorithm, and is only shown as an example of how transparency information would be presented in the model. %NAME SAMPLE_BUF %CHAR char SAMPLE_BUF, leads=5, type=digital, VICTORY_TRANSPARENT; lead 1=1, 2=2, 3=3,4=4,5=5; port input_leads = 2,3,4,5; port output_leads = 1; bool off1= H 2;!off when pin 2 high bool on1 = L 2;!active when pin 2 low power_0 3; power_1 4;!tristate when 'off1', send when 'on1' STATESET state1:t=off1, S=on1 TRISTATE 1;! pin 1 is a 3-state output ENABLE 2;! pin 2 enables a transparency output 1 (SET=state1) input 2,5; %COMP SAMPLE_BUF The following model is a resistor. It is included to show how resistive transparencies would look %NAME RES %CHAR char RES, leads=2, type=analog; lead 1=1, 2=2; output 1 input 2; output 2 input 1;!POS and NEG not used by software or ACG algorithm r RESISTIVE POS=1 NEG=2; %COMP SAMPLE_BUF!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! The following lines are not valid in the CHR! model language. They are commands used by! our implementation of the ACG algorithm! These lines will be stripped from the model! before it is used by the test vector generation 10
Boundary Scan Implementation
OpenCORES s Boundary Scan Implementation Abstract This document describes Boundary Scan Implementation (software and hardware solution. It is fully IEEE 1149.1 compliant. Date : August 6, 2000 Version:
More informationBOUNDARY-SCAN DFT & LAYOUT PRINCIPLES at BOARD LEVEL
BOUNDARY-SCAN DFT & LAYOUT PRINCIPLES at BOARD LEVEL Ian Saunders Ians@jtag.co.uk JTAG TECHNOLOGIES B.V. UK Sales & Support Centre Tel: 01234 831212 Fax: 01234 831616 Design For Test - Component Selection
More informationHigh Quality, Low Cost Test
Datasheet High Quality, Low Cost Test Overview is a comprehensive synthesis-based test solution for compression and advanced design-for-test that addresses the cost challenges of testing complex designs.
More informationA PRACTICAL GUIDE TO COMBINING ICT & BOUNDARY SCAN TESTING
A PRACTICAL GUIDE TO COMBINING ICT & BOUNDARY SCAN TESTING Alan Albee GenRad, Inc. Abstract This paper focuses on the practical aspects of combining boundary scan testing with traditional In-Circuit Test.
More informationFishTail: The Formal Generation, Verification and Management of Golden Timing Constraints
FishTail: The Formal Generation, Verification and Management of Golden Timing Constraints Chip design is not getting any easier. With increased gate counts, higher clock speeds, smaller chip sizes and
More informationINTERFACING THE ISCC TO THE AND 8086
APPLICATION NOTE INTERFACING THE ISCC TO THE 68 AND 886 INTRODUCTION The ISCC uses its flexible bus to interface with a variety of microprocessors and microcontrollers; included are the 68 and 886. The
More informationThe Boundary - Scan Handbook
The Boundary - Scan Handbook By Kenneth P. Parker Agilent Technologies * KLUWER ACADEMIC PUBLISHERS Boston / Dordrecht / London TABLE OF CONTENTS List of Figures xiii List of Tables xvi List of Design-for-Test
More informationDesign a system that accept data from each independent processor and arbitrate which one is granted access to memory at any one time.
BUS ARBITER: It is desired that more than one independent processor in system further requirement is that they require access to same set of system resources for ex memory size is 64 KB and require a single
More informationEliminating Routing Congestion Issues with Logic Synthesis
Eliminating Routing Congestion Issues with Logic Synthesis By Mike Clarke, Diego Hammerschlag, Matt Rardon, and Ankush Sood Routing congestion, which results when too many routes need to go through an
More informationFPGA. Logic Block. Plessey FPGA: basic building block here is 2-input NAND gate which is connected to each other to implement desired function.
FPGA Logic block of an FPGA can be configured in such a way that it can provide functionality as simple as that of transistor or as complex as that of a microprocessor. It can used to implement different
More informationUsing Boundary Scan on the TMS320VC5420
Application Report SPRA597 - November 1999 Using Boundary Scan on the TMS320VC5420 Clay Turner C5000 Applications Team ABSTRACT The Texas Instruments (TI ) TMS320VC5420 DSP implements limited boundary
More informationericssonz LBI-38616B MAINTENANCE MANUAL FOR MTD TM SERIES AND DATA RADIO LOGIC BOARD 19D902151G3 DESCRIPTION CIRCUIT ANALYSIS TABLE OF CONTENTS
MAINTENANCE MANUAL FOR MTD TM SERIES AND DATA RADIO LOGIC BOARD 19D902151G3 TABLE OF CONTENTS Page DESCRIPTION............................................. Front Cover CIRCUIT ANALYSIS..........................................
More informationPCI-SIG ENGINEERING CHANGE NOTICE
TITLE: PCI-SIG ENGINEERING CHANGE NOTICE Optimized Buffer Flush/Fill DATE: Updated 30 April 2009, original request: 8 February 2008 AFFECTED DOCUMENTS: SPONSORS: Part I PCI Express Base Specification,
More informationALTERA FPGAs Architecture & Design
ALTERA FPGAs Architecture & Design Course Description This course provides all theoretical and practical know-how to design programmable devices of ALTERA with QUARTUS-II design software. The course combines
More informationThe Challenges of Doing a PCI Design in FPGAs
The Challenges of Doing a PCI Design in FPGAs Nupur Shah What are the challenges of doing PCI in FPGAs? This paper covers the issues Xilinx has discovered in doing PCI in FPGAs, how they have been surmounted
More informationInterconnect Testing of Boards with Partial Boundary Scan
Interconnect Testing of Boards with Partial Boundary Scan Gordon D. Robinson & John G. Deshayes GenRad, Inc, 3 Baker Ave. Concord, MA 1742 ABSTRACT Test generation and diagnosis of shorts and opens for
More informationWinford Engineering ETH32 Protocol Reference
Winford Engineering ETH32 Protocol Reference Table of Contents 1 1 Overview 1 Connection 1 General Structure 2 Communications Summary 2 Port Numbers 4 No-reply Commands 4 Set Port Value 4 Set Port Direction
More information8. JTAG Boundary-Scan Testing in MAX V Devices
December 2 MV58-. 8. JTAG Boundary-Scan Testing in MAX V Devices MV58-. This chapter describes the IEEE Std.49. (JTAG) boundary-scan testing for Altera MAX V devices. The IEEE Std. 49. BST circuitry available
More informationBV4218. I2C-LCD & Keypad. Product specification. December 2008 V0.a. ByVac 2006 ByVac Page 1 of 9
Product specification December 2008 V0.a ByVac 2006 ByVac Page 1 of 9 Contents 1. Introduction...3 2. Features...3 3. Electrical Specification...3 4. I2C set...4 5. The LCD Set...5 5.1. 1...5 5.2. 2...5
More informationTABLE OF CONTENTS 1.0 PURPOSE INTRODUCTION ESD CHECKS THROUGHOUT IC DESIGN FLOW... 2
TABLE OF CONTENTS 1.0 PURPOSE... 1 2.0 INTRODUCTION... 1 3.0 ESD CHECKS THROUGHOUT IC DESIGN FLOW... 2 3.1 PRODUCT DEFINITION PHASE... 3 3.2 CHIP ARCHITECTURE PHASE... 4 3.3 MODULE AND FULL IC DESIGN PHASE...
More informationSECTION 11 JTAG PORT
nc. SECTION JTAG PORT MOTOROLA DSP5662 User s Manual - nc.. INTRODUCTION....................................-3.2 JTAG PINS........................................-5.3 TAP CONTROLLER.................................-6.4
More information8. Best Practices for Incremental Compilation Partitions and Floorplan Assignments
8. Best Practices for Incremental Compilation Partitions and Floorplan Assignments QII51017-9.0.0 Introduction The Quartus II incremental compilation feature allows you to partition a design, compile partitions
More informationAMD actual programming and testing on a system board. We will take a simple design example and go through the various stages of this design process.
actual programming and testing on a system board. We will take a simple design example and go through the various stages of this design process. Conceptualize A Design Problem Select Device Implement Design
More informationMotors I Automation I Energy I Transmission & Distribution I Coatings. SymbiNet CFW-11. User s Manual
Motors I Automation I Energy I Transmission & Distribution I Coatings SymbiNet CFW-11 User s Manual SymbiNet User s Manual Series: CFW-11 Language: English Document Number: 10002033446 / 00 Publication
More informationUSB Compliance Checklist Hubs (Excluding Root Hubs) USB Device Product Information
USB Compliance Checklist For the 2.0 USB Specification Checklist Version 1.07 USB Device Product Information field Date Vendor Name Vendor Street Address Vendor City, State, Postal Code Vendor Country
More informationBoundary Scan. Sungho Kang. Yonsei University
Boundary Scan Sungho Kang Yonsei University Outiline Introduction TAP Controller Instruction Register Test Data Registers Instructions Hardware Test Innovations PCB Test Conclusion 2 Boundary Scan Improve
More informationONYX-MM-XT PC/104 Format Counter/Timer & Digital I/O Module
ONYX-MM-XT PC/104 Format Counter/Timer & Digital I/O Module User Manual V1.4 Copyright 2009 Diamond Systems Corporation 1255 Terra Bella Avenue Mountain View, CA 94043 USA Tel (650) 810-2500 Fax (650)
More informationmyproject - P PAR Detail
myproject - P1149.1 PAR Detail Submitter Email: cjclark@intellitech.com Type of Project: Revision to IEEE Standard PAR Request Date: 24-May-2008 PAR Approval Date: 26-Sep-2008 PAR Expiration Date: 31-Dec-2012
More informationImplementing Bus LVDS Interface in Cyclone III, Stratix III, and Stratix IV Devices
Implementing Bus LVDS Interface in Cyclone III, Stratix III, and Stratix IV Devices November 2008, ver. 1.1 Introduction LVDS is becoming the most popular differential I/O standard for high-speed transmission
More informationIntroduction to VHDL #1
ECE 3220 Digital Design with VHDL Introduction to VHDL #1 Lecture 3 Introduction to VHDL The two Hardware Description Languages that are most often used in industry are: n VHDL n Verilog you will learn
More informationExpanding IEEE Std Boundary-Scan Architecture Beyond Manufacturing Test of Printed Circuit Board Assembly
Expanding IEEE Std 1149.1 Boundary-Scan Architecture Beyond Manufacturing Test of Printed Circuit Board Assembly Jun Balangue Keysight Technologies Singapore Jun_balangue@keysight.com Abstract This paper
More informationIDEA! Avnet SpeedWay Design Workshop
The essence of FPGA technology IDEA! 2 ISE Tool Flow Overview Design Entry Synthesis Constraints Synthesis Simulation Implementation Constraints Floor-Planning Translate Map Place & Route Timing Analysis
More informationKeysight Technologies Expanding IEEE Std Boundary-Scan Architecture Beyond Manufacturing Test of PCBA
Keysight Technologies Expanding IEEE Std 1149.1 Boundary-Scan Architecture Beyond Manufacturing Test of PCBA Article Reprint This paper was first published in the 2017 IPC APEX Technical Conference, CA,
More informationLeveraging Boundary Scan resources for comprehensive cluster testing
Leveraging Boundary Scan resources for comprehensive cluster testing Heiko Ehrenberg and Norbert Muench GOEPEL Electronics LLC 9600 Great Hills Trail, 150W, Austin, Texas 78759 USA Abstract Board level
More informationLab 28. Bus Arbitration
Lab 28 Designed by: Gandhi Puvvada Bus Arbitration Objective: Our objective in this lab is to familiarize you with bus arbitration and exchange of the control of bus between processors so as to communicate
More informationispxp Technology Power-up and Hot Socketing
December 2002 Introduction Technical Note TN1041 The ispxp (expanded in-system Programmable) device families from Lattice offer the non-volatility of E 2 cells together with the infinite reconfigurability
More informationDESIGN STRATEGIES & TOOLS UTILIZED
CHAPTER 7 DESIGN STRATEGIES & TOOLS UTILIZED 7-1. Field Programmable Gate Array The internal architecture of an FPGA consist of several uncommitted logic blocks in which the design is to be encoded. The
More information80C186 AND 80C188 EMBEDDED MICROPROCESSORS SPECIFICATION UPDATE
80C186 AND 80C188 EMBEDDED MICROPROCESSORS SPECIFICATION UPDATE Release Date: July, 1996 Order Number 272894-001 The 80C186 and 80C188 Embedded Microprocessors may contain design defects or errors known
More informationErrata and Clarifications to the PCI-X Addendum, Revision 1.0a. Update 3/12/01 Rev P
Errata and Clarifications to the PCI-X Addendum, Revision 1.0a Update 3/12/01 Rev P REVISION REVISION HISTORY DATE P E1a-E6a, C1a-C12a 3/12/01 2 Table of Contents Table of Contents...3 Errata to PCI-X
More informationUnderstanding the basic building blocks of a microcontroller device in general. Knows the terminologies like embedded and external memory devices,
Understanding the basic building blocks of a microcontroller device in general. Knows the terminologies like embedded and external memory devices, CISC and RISC processors etc. Knows the architecture and
More informationCS232 VHDL Lecture. Types
CS232 VHDL Lecture VHSIC Hardware Description Language [VHDL] is a language used to define and describe the behavior of digital circuits. Unlike most other programming languages, VHDL is explicitly parallel.
More informationLab 4: Digital Electronics BMEn 2151 Introductory Medical Device Prototyping Prof. Steven S. Saliterman
Lab 4: Digital Electronics BMEn 2151 Introductory Medical Device Prototyping Prof. Steven S. Saliterman Exercise 4-1: Familiarization with Lab Box Contents & Reference Books 4-1-1 CMOS Cookbook (In the
More informationWI-076 Issue 1 Page 1 of 7
Design for Test (DFT) Guidelines WI-076 Issue 1 Page 1 of 7 Contents Scope... 3 Introduction... 3 Board Layout Constraints... 4 Circuit Design Constraints... 5 ICT Generation Requirements... 7 WI-076 Issue
More informationCluster-based approach eases clock tree synthesis
Page 1 of 5 EE Times: Design News Cluster-based approach eases clock tree synthesis Udhaya Kumar (11/14/2005 9:00 AM EST) URL: http://www.eetimes.com/showarticle.jhtml?articleid=173601961 Clock network
More informationA Linear-Time Heuristic for Improving Network Partitions
A Linear-Time Heuristic for Improving Network Partitions ECE 556 Project Report Josh Brauer Introduction The Fiduccia-Matteyses min-cut heuristic provides an efficient solution to the problem of separating
More information10/24/2016. Let s Name Some Groups of Bits. ECE 120: Introduction to Computing. We Just Need a Few More. You Want to Use What as Names?!
University of Illinois at Urbana-Champaign Dept. of Electrical and Computer Engineering ECE 120: Introduction to Computing Memory Let s Name Some Groups of Bits I need your help. The computer we re going
More informationArchitecture Specification
PCI-to-PCI Bridge Architecture Specification, Revision 1.2 June 9, 2003 PCI-to-PCI Bridge Architecture Specification Revision 1.1 December 18, 1998 Revision History REVISION ISSUE DATE COMMENTS 1.0 04/05/94
More informationRenesas 78K/78K0R/RL78 Family In-Circuit Emulation
_ Technical Notes V9.12.225 Renesas 78K/78K0R/RL78 Family In-Circuit Emulation This document is intended to be used together with the CPU reference manual provided by the silicon vendor. This document
More informationDP8420V 21V 22V-33 DP84T22-25 microcmos Programmable 256k 1M 4M Dynamic RAM Controller Drivers
DP8420V 21V 22V-33 DP84T22-25 microcmos Programmable 256k 1M 4M Dynamic RAM Controller Drivers General Description The DP8420V 21V 22V-33 DP84T22-25 dynamic RAM controllers provide a low cost single chip
More informationMC68331 DEVICE INFORMATION (Issue 6-17 August, 1995) Rev. A and B Silicon E95B, E93N and F43E Mask Set
MC68331 DEVICE INFORMATION (Issue 6-17 August, 1995) Rev. A and B Silicon E95B, E93N and F43E Mask Set The following information and errata pertain to Revision A and B samples of the 68331 microcontroller.
More informationASIMON 3 G2 AS-i Safety Monitor Configuration software for Microsoft -Windows
ASIMON 3 G2 AS-i Safety Monitor Configuration software for Microsoft -Windows Version: 4.3 / Edition: 04/2013 All rights reserved, in particular the rights of reproduction and translation. Copying or reproduction
More information4X4 Driver Shield Manual
3/31/2012 4X4 Driver Shield Manual High current, high side switching for Arduino Logos Electromechanical 4X4 Driver Shield Manual High current, high side switching for Arduino Introduction The Logos Electromechanical
More informationSummer 2003 Lecture 21 07/15/03
Summer 2003 Lecture 21 07/15/03 Simple I/O Devices Simple i/o hardware generally refers to simple input or output ports. These devices generally accept external logic signals as input and allow the CPU
More informationINTEGRATED CIRCUITS APPLICATION NOTE. AN252 Live Insertion Aspects of Philips Logic Families. Author: Mike Magdaluyo July Philips Semiconductors
INTEGRATED CIRCUITS APPLICATION NOTE Live Insertion Aspects of Philips Logic Families Author: Mike Magdaluyo July 1999 Philips Semiconductors Author: Mike Magdaluyo, Philips Semiconductors, Sunnyvale INTRODUCTION
More informationVerilog Design Entry, Synthesis, and Behavioral Simulation
------------------------------------------------------------- PURPOSE - This lab will present a brief overview of a typical design flow and then will start to walk you through some typical tasks and familiarize
More informationXC1701L (3.3V), XC1701 (5.0V) and XC17512L (3.3V) Serial Configuration PROMs. Features. Description
0 XC1701L (3.3V), XC1701 (5.0V) and XC17512L (3.3V) Serial Configuration PROMs December 10, 1997 (Version 1.1) 0 5* Product Specification Features On-chip address counter, incremented by each rising edge
More informationVerilog for High Performance
Verilog for High Performance Course Description This course provides all necessary theoretical and practical know-how to write synthesizable HDL code through Verilog standard language. The course goes
More informationCustom Design Formal Equivalence Checking Based on Symbolic Simulation. Overview. Verification Scope. Create Verilog model. Behavioral Verilog
DATASHEET Custom Design Formal Equivalence Checking Based on Symbolic Simulation High-quality equivalence checking for full-custom designs Overview is an equivalence checker for full custom designs. It
More informationChip & Board Testability Assessment Checklist
Chip & Board Testability Assessment Checklist Prepared by Ben Bennetts, DFT Consultant for ASSET InterTech, Inc. 1 July 2005 Abstract: BA Board Testability Assessment 2002, Bennetts Associates checklist
More informationIEEE JTAG Boundary Scan Standard
IEEE 1149.1 JTAG Boundary Scan Standard Bed-of-nails tester Motivation System view of boundary scan hardware Elementary scan cell Test Access Port (TAP) controller Boundary scan instructions Example *Joint
More informationECE 270 Lab Verification / Evaluation Form. Experiment 1
ECE 70 Lab Verification / Evaluation Form Experiment Evaluation: IMPORTANT! You must complete this experiment during your scheduled lab period. All work for this experiment must be demonstrated to and
More informationNew and Emerging JTAG Standards: Changing the Paradigm of Board Test (A tutorial)
New and Emerging JTAG Standards: Changing the Paradigm of Board Test (A tutorial) Artur Jutman November 23 th, 2010 Drammen, NORWAY Presentation Outline Introduction Overview of the standards IEEE 1149.7
More informationBetrouwbare Elektronica ontwerpen en Produceren
Betrouwbare Elektronica ontwerpen en Produceren Verbeter betrouwbaarheid, time to market en winstgevendheid met boundary scan JTAG Technologies B.V. Rik Doorneweert rik@jtag.com Boundary scan Testing HW
More informationWeek - 04 Lecture - 01 Merge Sort. (Refer Slide Time: 00:02)
Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 04 Lecture - 01 Merge Sort (Refer
More informationPIC-I/O Multifunction I/O Controller
J R KERR AUTOMATION ENGINEERING PIC-I/O Multifunction I/O Controller The PIC-I/O multifunction I/O controller is compatible with the PIC-SERVO and PIC-STEP motor control modules and provides the following
More informationSRAM-based FPGA designed for Space use
ATF280F Rad-Hard Reprogrammable FPGA DATASHEET Features SRAM-based FPGA designed for Space use 280K equivalent ASIC gates 14,400 cells ( two 3-input LUT or one 4-input LUT, one DFF) Unlimited reprogrammability
More informationLogic Chip Tester User Manual SW Version /8/2012. Chapter 1 Introduction/Background
Logic Chip Tester User Manual SW Version 1.00 4/8/2012 Chapter 1 Introduction/Background In the 1970 s and 80 s, many digital devices were designed using a number of 14, 16, 20, or perhaps 24- pin logic
More informationFault Grading FPGA Interconnect Test Configurations
* Fault Grading FPGA Interconnect Test Configurations Mehdi Baradaran Tahoori Subhasish Mitra* Shahin Toutounchi Edward J. McCluskey Center for Reliable Computing Stanford University http://crc.stanford.edu
More informationAnalog Devices Welcomes Hittite Microwave Corporation NO CONTENT ON THE ATTACHED DOCUMENT HAS CHANGED
Analog Devices Welcomes Hittite Microwave Corporation NO CONTENT ON THE ATTACHED DOCUMENT HAS CHANGED www.analog.com www.hittite.com THIS PAGE INTENTIONALLY LEFT BLANK PLL & PLLVCO Serial Programming Interface
More informationBMS: Installation Manual v2.x - Documentation
Page 1 of 7 BMS: Installation Manual v2.x From Documentation This section describes how external peripheral devices are connected and additional functions of the BMS are used. I you have not done so already,
More informationThe following content has been imported from Legacy Help systems and is in the process of being checked for accuracy.
JTAG Viewer Old Content - visit altium.com/documentation Modified by Admin on Nov 6, 2013 The following content has been imported from Legacy Help systems and is in the process of being checked for accuracy.
More informationNIOS CPU Based Embedded Computer System on Programmable Chip
1 Objectives NIOS CPU Based Embedded Computer System on Programmable Chip EE8205: Embedded Computer Systems This lab has been constructed to introduce the development of dedicated embedded system based
More informationPretty Good Protocol - Design Specification
Document # Date effective October 23, 2006 Author(s) Ryan Herbst Supersedes Draft Revision 0.02 January 12, 2007 Document Title Pretty Good Protocol - Design Specification CHANGE HISTORY LOG Revision Effective
More informationEE 231 Fall Lab 1: Introduction to Verilog HDL and Altera IDE
Lab 1: Introduction to Verilog HDL and Altera IDE Introduction In this lab you will design simple circuits by programming the Field-Programmable Gate Array (FPGA). At the end of the lab you should be able
More informationSubject: Scheduling Region Questions and Problems of new SystemVerilog commands
Subject: Scheduling Region Questions and Problems of new SystemVerilog commands I have read and re-read sections 14-17 of the SystemVerilog 3.1 Standard multiple times and am still confused about exactly
More informationLab 16: Data Busses, Tri-State Outputs and Memory
Lab 16: Data Busses, Tri-State Outputs and Memory UC Davis Physics 116B Rev. 0.9, Feb. 2006 1 Introduction 1.1 Data busses Data busses are ubiquitous in systems which must communicate digital data. Examples
More information7 8 9 C. PRELAB REQUIREMENTS You must adhere to the Lab Rules and Policies document for every lab.
Page 1/ Revision 1 OBJECTIVES To understand how a keypad functions as a raster scan input device and to learn how to interface a keypad to a microprocessor. Further explore and understand the implementation
More informationALTERA FPGA Design Using Verilog
ALTERA FPGA Design Using Verilog Course Description This course provides all necessary theoretical and practical know-how to design ALTERA FPGA/CPLD using Verilog standard language. The course intention
More informationSource-Synchronous Testing Using Paired Strobes
Teradyne Users Group Source-Synchronous Testing Using Paired Strobes Keith Remlinger Test Spectrum, Inc. 105 W. Riverside Dr, Suite 200, Austin TX 78704 keith.remlinger@testspectrum.com Travis Volek Freescale
More informationThe 80C186XL 80C188XL Integrated Refresh Control Unit
APPLICATION BRIEF The 80C186XL 80C188XL Integrated Refresh Control Unit GARRY MION ECO SENIOR APPLICATIONS ENGINEER November 1994 Order Number 270520-003 Information in this document is provided in connection
More informationPhysics 536 Spring Illustrating the FPGA design process using Quartus II design software and the Cyclone II FPGA Starter Board.
Physics 536 Spring 2009 Illustrating the FPGA design process using Quartus II design software and the Cyclone II FPGA Starter Board. Digital logic: Equivalent to a large number of discrete logic elements
More informationThe Embedded computing platform. Four-cycle handshake. Bus protocol. Typical bus signals. Four-cycle example. CPU bus.
The Embedded computing platform CPU bus. Memory. I/O devices. CPU bus Connects CPU to: memory; devices. Protocol controls communication between entities. Bus protocol Determines who gets to use the bus
More informationBOUNDARY-SCAN: AN INTRODUCTION. by James Stanbridge, Sales Manager of JTAG Technologies
BOUNDARY-SCAN: AN INTRODUCTION by James Stanbridge, Sales Manager of JTAG Technologies Once considered to be something of a black art, and solely an aid to manufacturing, boundary-scan is coming of age
More informationPCI-X Addendum to the PCI Compliance Checklist. Revision 1.0a
PCI-X Addendum to the PCI Compliance Checklist Revision 1.0a August 29, 2000 PCI-X Addendum to the PCI Compliance Checklist REVISION REVISION HISTORY DATE 1.0 Initial Release 3/1/00 1.0a Updates for PCI-X
More informationEECS 140 Laboratory Exercise 4 3-to-11 Counter Implementation
EECS 140 Laboratory Exercise 4 3-to-11 Counter Implementation 1. Objectives A. To apply knowledge of combinatorial design. B. Gain expertise in designing and building a simple combinatorial circuit This
More informationPI7C8140A 2-Port PCI-to-PCI Bridge REVISION 1.01
2-Port PCI-to-PCI Bridge REVISION 1.01 3545 North First Street, San Jose, CA 95134 Telephone: 1-877-PERICOM, (1-877-737-4266) Fax: 408-435-1100 Internet: http://www.pericom.com LIFE SUPPORT POLICY Pericom
More informationReduce Verification Complexity In Low/Multi-Power Designs. Matthew Hogan, Mentor Graphics
Reduce Verification Complexity In Low/Multi-Power Designs. Matthew Hogan, Mentor Graphics BACKGROUND The increasing demand for highly reliable products covers many industries, all process nodes, and almost
More informationSCANSTA111 Enhanced SCAN bridge Multidrop Addressable IEEE (JTAG) Port
Enhanced SCAN bridge Multidrop Addressable IEEE 1149.1 (JTAG) Port General Description The SCANSTA111 extends the IEEE Std. 1149.1 test bus into a multidrop test bus environment. The advantage of a multidrop
More informationLecture 6: memory structure 8086 Outline: 1.introduction 2.memory reserve 3.bus operation
Lecture 6: memory structure 8086 Outline: 1.introduction 2.memory reserve 3.bus operation 1 1.INRTODUCTION The 8086 memory is a sequence of up to 1 million 8-bit bytes, a considerable increase over the
More informationIncompatibility Dimensions and Integration of Atomic Commit Protocols
The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer
More informationProgrammable Logic Devices II
São José February 2015 Prof. Hoeller, Prof. Moecke (http://www.sj.ifsc.edu.br) 1 / 28 Lecture 01: Complexity Management and the Design of Complex Digital Systems Prof. Arliones Hoeller arliones.hoeller@ifsc.edu.br
More information5504 Thermocouple Analog Input Module
550 Thermocouple Analog Input Installation, Operation and Maintenance Setup Manual 5/9/0 Safety Information The information provided in this documentation contains general descriptions and/or technical
More information1 Design Process HOME CONTENTS INDEX. For further assistance, or call your local support center
1 Design Process VHDL Compiler, a member of the Synopsys HDL Compiler family, translates and optimizes a VHDL description to an internal gate-level equivalent. This representation is then compiled with
More informationConnecting Spansion SPI Serial Flash to Configure Altera FPGAs
Connecting SPI Serial Flash to Configure Altera s Application By Frank Cirimele 1. Introduction Altera s are programmable logic devices used for basic logic functions, chip-to-chip connectivity, signal
More informationConstraint Verification
Constraint Verification Constraint verification refers to the verification of the contents of an SDC file to flag situations where the specified constraints are either incorrect, or incomplete, both of
More informationDP8420A,DP8421A,DP8422A
DP8420A,DP8421A,DP8422A DP8420A DP8421A DP8422A microcmos Programmable 256k/1M/4M Dynamic RAM Controller/Drivers Literature Number: SNOSBX7A DP8420A 21A 22A microcmos Programmable 256k 1M 4M Dynamic RAM
More informationMemory and Programmable Logic
Memory and Programmable Logic Memory units allow us to store and/or retrieve information Essentially look-up tables Good for storing data, not for function implementation Programmable logic device (PLD),
More informationPI7C8152A & PI7C8152B 2-Port PCI-to-PCI Bridge REVISION 1.11
2-Port PCI-to-PCI Bridge REVISION 1.11 2380 Bering Drive, San Jose, CA 95131 Telephone: 1-877-PERICOM, (1-877-737-4266) Fax: 408-435-1100 Email: solutions@pericom.com Internet: http://www.pericom.com LIFE
More informationEE434 ASIC & Digital Systems Testing
EE434 ASIC & Digital Systems Testing Spring 2015 Dae Hyun Kim daehyun@eecs.wsu.edu 1 Introduction VLSI realization process Verification and test Ideal and real tests Costs of testing Roles of testing A
More informationSingle Channel HDLC Core V1.3. LogiCORE Facts. Features. General Description. Applications
Sept 8, 2000 Product Specification R Powered by Xilinx Inc. 2100 Logic Drive San Jose, CA 95124 Phone: +1 408-559-7778 Fax: +1 408-559-7114 E-mail: logicore@xilinx.com URL: www.xilinx.com/ipcenter Support:
More information