Automatic Constraint Generation for Boundary Scan Interconnect Tests

Size: px
Start display at page:

Download "Automatic Constraint Generation for Boundary Scan Interconnect Tests"

Transcription

1 Automatic Constraint Generation for Boundary Scan Interconnect Tests Kendrick Baker Rick Borton Raytheon Company McKinney, TX ABSTRACT This paper discusses an algorithm to automate the generation of constraints files by leveraging a simple extension to the device characteristic model. This extension consists of additional pin-level restriction data that defines the test constraints. While additional constraints based on the unique features of the design may still be required, the component-based constraints can be quickly determined and the corresponding file quickly generated by this process. All required design information is gathered from files already used in the interconnect test generation process. Since the pin-level restrictions apply to each instance of that component in the design, they will be declared in the component's characteristic model. The pin restriction information in the component characteristic models is the only information that will not be present in a typical test generation process. No other modifications to any files are required, which greatly reduces the effort required in generating the constraints. 1. INTRODUCTION Many steps in the process of generating boundary scan interconnect tests are automated. The test vectors are generated by (commercial) software. Figure 1 shows some of the major components involved in the test vector generation process. The BSDL (Boundary Scan Description Language) files describe the boundary scan architecture for the boundary scan devices. The device characteristic models (one for each type of device in the design) give basic information about the device pins, as well as certain transparency and power information. The netlist defines which devices correspond to which characteristic models, as well as how the pins of those devices are connected. The test vectors are generated using this information. In addition, the software takes into account any constraint information provided. Constraints hold a signal (in this case one with a boundary scan device pin) at a constant value throughout the test. They are used either to put the board into a safe state for the test or to improve the test coverage by reducing any interference from non-boundary scan devices present during the test. Figure 1 - Current Vector Generation Flow Device Models BSDL Netlist Constraints File Automatic Interconnect Test Generation Test Vectors This constraint information pertains only to signals accessible from boundary scan devices. It consists of signals that need to be driven to certain values, to remain undriven (by boundary scan devices), or to expect a particular value. It also lists pins that, although they are output pins, are safe to drive (because the state the board is being put into during the test disables them). Sometimes these constraints are referred to as logical constraints. While much of the process is automated, typical test generation flows require the manual development of the constraints file. However, most, if not all, of the constraints for a test can be determined based on the type of components being used rather than design-specific boardlevel information. These component-based constraints will apply to all instances of the component in the design. The automatic constraint generation (ACG) algorithm proposed in this paper is designed to take advantage of the component-based constraints to automatically create a logical constraints file (quickly and effectively). The dotted 1

2 Figure 2 - Proposed Vector Generation Flow Device Models Automatic Constraint Generation Constraints File Constraints File automatically generated Device Models modified to contain additional pin restriction information BSDL Netlist Automatic Interconnect Test Generation Test Vectors lines in figure 2 show how the new process uses the same input files (although the characteristic models contain additional information) to create the constraints file automatically. In addition, the algorithm modifies the netlist to include power net information, which would normally be inserted manually. 2. ACG ALGORITHM INPUTS Characteristic Models Characteristic models contain information about the device pins, power pins, and transparencies. Each pin on the device is listed as an input, an output, or both, although pins on connectors will not be listed as either. In addition, the power pins of the device (if it has any) are listed. If the device has transparencies, such as non-inverting buffers or resistors, the model will contain data on which pins are transparently connected. See Appendix I for examples of characteristics models. The algorithm begins by analyzing each component characteristic model for pin restriction, power, and transparency information. Any such data found in the model is recorded for later use with instances of the device that are located in the netlist. Output pins for the device are also recorded. Power and transparency information is already part of the models. Pin restriction data is the only data that may need to be added for this algorithm. The power architecture of the design will be analyzed based on power pin declarations of the component characteristic models. Therefore it is important to have at least one pin in each power net declared as a power pin in the component characteristic models. Otherwise, the algorithm may misunderstand the power architecture. Transparency information is also expected in the characteristic models. This is information regarding net equivalencies (nets that are connected and can be considered one net for test purposes). For instance, a series resistor will create a net equivalence between the two nets it touches. Likewise, buffers create a unidirectional equivalence between the drive and receive nets. This equivalence may be conditional if it requires the activation of one or more enable signals. Transceivers and switches are some other examples of transparent devices (that are also usually conditional). Pin restriction data is added to the model to determine what constraints should be implemented in the constraints file. They also contain information about why the constraint should exist, which helps determine priorities when conflicts arise. There are four types of pin restrictions considered in this algorithm. Since the pin restriction data is not part of the characteristic model language, the syntax will need to be determined when the algorithm is implemented. Boundary Scan Pin Restrictions Disabled Pins Pin Restrictions Constant Input Pin Restrictions Constant Output Pin Restrictions The first type of pin restriction data consists of constraints to enable boundary scan to work properly on the device during the test. Some devices use compliance enable pins or otherwise do not allow required instructions (such as EXTEST) to be used in certain conditions. This pin restriction indicates that the input pin(s) needs to be constrained to a certain value in order for the device to use boundary scan properly during the test. Even if no compliance enable pin is present, boundary scan devices should contain the pin restriction so that the ACG algorithm knows that 2

3 this is a boundary scan device. In this case, the pin restriction would exist, but not list any compliance enable pins. Figure 3 shows a boundary scan device with a compliance enable pin that needs to have a constraint met. This is the only pin restriction a boundary scan device will have, as any others can be handled by the test vector generation software. Likewise, only boundary scan devices have this restriction. The third type of pin restriction is to declare that an input pin will need to receive a certain value throughout the test. For example, a reset input may need to be kept inactive during the test so that the device remains in a particular state. Figure 5 shows an example of a watchdog timer that should have its input reset pin held constant throughout the test. Figure 6 - Constant Output Pin Restriction Figure 3 - Boundary Scan Pin Restriction Compliance Enable Pin(s) (PROGRAM) Boundary Scan Device (FPGA) Non- Boundary Scan Device (Timer) Output Pin (TIMEOUT) Figure 4 - Disabled Pins Pin Restriction Output Enable Pin(s) (CHIP SELECT) The second type of pin restriction exists to disable outputs. For instance, often a part will not drive its outputs if the chip select pin is deasserted. Figure 4 shows an example of a memory device with an output enable pin that prevents the memory from driving the data bus. This constraint requires information on which input pin(s) to hold at what value, as well as which output pins are then safe to be driven externally (from boundary scan devices). Figure 5 - Constant Input Pin Restriction Input Pin (RESET) The devices used and the nets present in the design are obtained from the netlist. As the netlist is read to determine what devices are present, any boundary scan device located will be associ- Non- Boundary Scan Device (Memory) Non- Boundary Scan Device (Timer) Disabled Pins (DATA) The final type of pin restriction is to declare that an output pin will always drive a certain value during the test. For instance, a reset output may be active through the test. By noting it in the constraints, the test vectors can at least check that the correct value is being driven from the device. Figure 6 again shows a timer whose reset output will remain inactive throughout the test. BSDL A mapping of boundary scan pins is needed, so that the ACG algorithm knows which nets have boundary scan inputs or outputs. This can be gleaned from the individual BSDL files, from a design file containing cell data for the boundary scan chain (position file), or even from a device characteristic model. While the pin information could be gathered from the device characteristic model, this would not let the algorithm know anything about the cell positions for those pins. Since the algorithm presented does not generate any vectors, no data on cell positions is required. However, future enhancements may generate vectors (such as initialization vectors), and therefore it would be prudent to have the necessary structures in place to support that. Netlist 3

4 ated with its pin map. When the pins are later read in, this pin map will be used to determine which pins are inputs and which are outputs. Once the devices have all been located, the nets are examined. As each net is being read in from the netlist, each pin in the net is examined for pin restrictions, power pins, or possible transparencies (all from the characteristic model data for that device). If any such information is found, the net is included for later analysis. If not, the net is ignored, even if it has a boundary scan input or output. The net is ignored because there is no pin restriction to meet and no transparency to another net that might have one. 3. ACG ALGORITHM After each net has been reviewed, all nets that were included for analysis have any transparencies resolved. If the net has a transparent device pin (if the net is equivalent to another net), the algorithm determines all possible driver and receiver equivalent nets. For instance, a buffer can only drive on one pin and only read on the other. However, if a net has a resistor, it marks each net as being able to both read from and drive the other net as long as one of the nets is not a power net. Nets that enable a conditional transparency will also be noted. Once the transparencies are determined, the nets are sorted by pin restriction type into separate lists. If a net contains multiple pin restrictions, it may be sorted into multiple lists. There is an additional list for all nets with power pins and nets without any pin restrictions. The latter are only included for analysis because they contain potential transparencies. After the nets have been sorted, they are then analyzed. Each list of nets is analyzed separately in the following order: Power Analysis Power nets and nets with no pin restrictions Driven Pin Analysis Constant Output Pin Restrictions Requested Drive Net Analysis Boundary Scan Pin Restrictions Disabled Pins Pin Restrictions Constant Input Pin Restrictions Power Analysis The first set of nets to be analyzed are the power (and transparent) nets. If a net is a power net, then any "downstream net" (with exceptions) is marked as a power net. A "downstream net" is any net that is connected to the current net by one or more transparencies and can be driven by the current net. All nets with power pins, as defined in the device characteristic models, will be considered power nets regardless of the characteristics of the net. However, certain downstream nets will not be considered power nets. Any downstream net that is connected to the power net by a resistive transparency (resistor) is considered a pull-up or pull-down, and will not automatically be marked as a power net. Only if the downstream pull-up or pull-down net has only one resistive transparency and no outputs will the downstream net be marked as a power net. Vcc Power_1 Net Figure 7 - Power Net Analysis Example Pull-up (inherits Power_1) Device 1 Device 2 Inherits Power_0, enables buffer Active buffer forces net to inherit Power 1 Voltage Dividing Net Power_0 Net Pull-down (doesn't inherit Power_0 due to Device 1's output) 4

5 Any downstream pull-up or pull-down net with more than two resistors is not considered a power net (nor capable of being one). This is because of the possibility of a voltage divider circuit, where the net is not driven to a logic-1 or a logic-0. The logic level of that net cannot be guaranteed to match that of the power net. Likewise, any downstream pull-up or pulldown net with an output will not be a power net. Since there are outputs present, the power net will not always drive the downstream net. It will only be considered a power net in the absence of a driven value from the output pins on the net. A net that is driven by a power net through a transparency other than a resistor, such as a buffer, is considered a power net regardless of the number of resistors present. This is because the buffer will be able to drive the net to the given power level. If a net is marked as both a POWER_0 and POWER_1 net, a conflict exists. If there is a conflict of power, the algorithm assumes that the net is a POWER_0 net. This conflict is noted in the log, however, as this violation is indicative of a design flaw or inaccurate input information. Note that the voltage dividing net in figure 7 will not be in this category. Since it contains more than one resistor, it will not inherit power from any other nets (POWER_0 or POWER_1). The marking of downstream nets is a recursive process. For each marked net immediately downstream of the current net (meaning the two are directly connected by one transparent device), the process reiterates. Figure 7 shows a sample circuit and how the algorithm would handle the different situations. Each net that is marked as a power net must also be analyzed for enabling other equivalencies. If the net has been marked as an enable net, the algorithm must determine if the transparency has been forced on (or off). For instance, if a buffer's output enable were connected to the proper power net, it would need to be marked as active (creating a transparency between the drive and receive nets). Since the enable pin is connected to a power net, it is assumed that nothing else can disable this gate, so it is locked from being modified in the future. In the case of multiple enable pins for a conditional transparency, all pins must have the correct value before the transparency will be activated. Driven Net Analysis Some nets are constrained because there is a pin on that net that will always be driving a certain value throughout the test. Once all power nets have been marked, nets with these constraints are examined. If the net is also a power net, and if the power net is a different value than that driven by the constrained pin on the net, a violation occurs. This is another problem that should not occur in a good design, but may occur if the design is flawed or if the input information was inaccurate. A violation will also occur if the net is constrained to drive conflicting values by different pin restrictions. Figure 8 - Driven Net Analysis Example Constraint unmet (no boundary scan inputs to detect driven value) Both output pins drive logic-1 Device 1 Device 2 Non-Boundary Scan Device Device 3 (BS) Boundary Scan Device Constraint met (boundary scan input can detect driven value) 5

6 If there is a constraint on the net that has not been violated by power nets, it is then evaluated in the same manner as power nets. Downstream nets are marked as also needing to meet the constraint and are checked for boundary scan inputs. If no boundary scan inputs can be found (in the constrained net or any downstream nets), then the constraint is considered "unmet", and will be commented out in the constraints file. However, this does not mean that the value will not still be driven during the test. It only means that it cannot be detected by a boundary scan device during the interconnect test. If boundary scan inputs are found, the constraint is marked as met, and will be added to the constraints file. Figure 8 is a sample circuit to demonstrate how these types of pin restrictions are handled. This list of nets is similar to the power net list in that there is nothing the test can do to prevent these nets from having driven values. For this reason, these two classes of nets are analyzed before the others, since both may be considered as unchangeable. Therefore, if an enable net is driven by this type of constraint, it will also be marked as forced active or inactive. It will then modify conditional equivalencies as required, using the same procedure that the power nets used. Requested Drive Net Analysis The remaining constraints all require some value to be driven from somewhere else on the net (either by power nets or by boundary scan outputs). Since there are different reasons these pin restrictions may have been specified, they are checked in order of importance. These constraints are grouped into three different lists (in the earlier sorting process), each corresponding to the reason for the constraint. The most important of the three constraint types is the one to get the boundary scan devices working correctly. Therefore, this is the first list of the three to be analyzed. The next most important type of constraint is the one that disables non-boundary scan outputs because it can improve coverage with a good return (one pin held constant may enable many pins to be driven). For this reason, the disabled pins pin restriction list is the second list to be analyzed. If there are any other reasons why a device needs its input pin driven to a certain value for the duration of the test, it is considered less important than the other two reasons. Therefore, the constant input pin restrictions list is the third (and final) list to be analyzed. Although the three lists are analyzed one at a time, the process for each list is the same. Figure 9 demonstrates how the pin restrictions are analyzed. Each constraint in the list is checked to see if it is already driving some value. This could be done by a power net or by a previously evaluated (and met) constraint. If there is a value being driven already, it will either meet or violate the constraint. The constraint will be met if the value driven is the same as that desired by the pin restriction, and violated if it is different. At this point, if the net has met or violated all constraints, the next net in the list will be evaluated. Figure 9 - Requested Drive Net Analysis Example Net inherits requested drive constraint from Man_Rst Constraint met by boundary scan output Boundary Scan Device Device 1 (BS) Device 2 Man_Rst Non-Boundary Scan Devices Constraint met by power DATA CE CS Device 3 DATA Outputs disabled by met constraint (can be driven by Device 1) Constraint met (boundary scan output can drive the requested value) 6

7 If the constraint has not yet been met or violated, then the net is checked for non-boundary scan digital outputs. If any exist, they may be driving at the same time we try to drive any boundary scan outputs to meet the constraint. Therefore, unless those non-boundary scan outputs are known to be off (disabled from a pin restriction) the algorithm will consider the net constraint violated. If the non-boundary scan digital output pin can be disabled by a constraint, the control net for that output pin is immediately checked to see if it can meet the disabled pin constraint (by following the requested drive analysis procedure being outlined). If the disabled pin constraint is met, then analysis of the current constraint will continue. Otherwise, it will be marked as violated and the next constraint in the list will be analyzed. If the constraint for the net has still not been met or violated, it can only be met if there is a boundary scan output pin that can drive the net. Since upstream nets are also capable of driving the net, a boundary scan output on the net itself or an upstream net will meet the constraint. The algorithm tries to drive from the net furthest upstream, if possible. Therefore, in a manner analogous to the previously discussed lists, upstream nets are marked as needing to meet the constraint. These upstream nets are recursively checked for meeting or violating the constraint with previously analyzed constraints. Beginning with the furthest upstream net, if the constraint has not yet been met or violated, it is checked for the presence of boundary scan output pins. If these outputs are not found, the constraint (for this upstream net only) is marked as unmet. Otherwise, a check is made to see if the net (the current upstream net and all of its downstream nets) is an enable net that might activate any conditional transparencies. If meeting the constraint would activate any conditional transparencies, some additional analysis is required. If activating the transparency will violate any previously met constraints, the transparency may not be enabled. Instead the constraint is marked as violated (on the net with the pin restriction and all upstream nets), and the net is not allowed to activate the transparency. If activating the transparency will not violate any previously met constraints or if no transparencies would be enabled by meeting the constraint, all conditions for meeting the constraint have been met. Boundary scan outputs have been found to drive the net, so the constraint is marked as met for this upstream net, the net with the pin restriction, and all nets in between. If the constraint is not met by the furthest upstream net, other upstream nets and eventually the originally constrained net itself will be recursively checked for boundary scan output pins. If no boundary scan outputs are found on any of these nets, then the constraint cannot be met (with the possible exception of activating conditional equivalencies), and is marked as "unmet". A comment will be made in the constraints file to signify that the constraint was requested by the pin restriction but cannot be met. Otherwise, the constraint will be added to the constraints file. If the constraint is met and is a pin restriction that disables output pins, then the output nets are marked as disabled. If more than one enable pin must be constrained in order to disable the outputs, then all enable pins must have their constraints met for the outputs to be marked as disabled. It is also possible that there are multiple enable pins available but only one is required to be constrained in order to disable the outputs. An example of this is a memory that can have the data lines disabled by either the chip select pin or the output enable pin. If this is the case, then once one of those constraints is met the others will be removed from the disabled pins pin restriction list. This will prevent the test from being over-constrained (constraining nets unnecessarily). 4. ACG ALGORITHM OUTPUTS Constraints File Generation The output of the algorithm is the constraints file. In addition, there can be a log. For test generation flows that require the power nets to be declared in the netlist, these nets can also be added by the algorithm. Only the originally declared power nets will be claimed in the netlist. Nets that inherited power (such as pulled-up nets) will not be listed. Since each constraint existed in one or more lists, each of the four constraint lists is now examined to determine what has and what has not been met. The power and transparency list is not considered at this point, since those were only used to help determine which constraints could be met. Each constraint in each list is checked to see if it has been met, violated, or is "unmet". Any net that could meet a constraint is marked in the constraints file as either expecting 7

8 Figure 10 - Current Limitations Example Devices 2, 3, and 4 all have disable constraints on their input pins. Device 1 (BS) CS CS Device 2 Device 3 Only one of these two devices can have their constraint met since they require opposite values on the constrained net. Which constraint should be met? CS Device 4 This constraint can only be met if the buffer is enabled. The algorithm does not currently enable the buffer since the enable line has no other constraints or power. or driving a certain value. It is possible that the net's constraint could meet multiple pin restrictions, but it only needs to be printed once. In this case, there should still be a separate comment for each pin restriction met. Likewise, any constraint that could not be met should be listed, but commented out. In addition, the file should contain a comment as to why the constraint was not met, such as being violated or being a constraint that cannot be met by power nets or boundary scan devices. Finally, any of the disabled outputs are printed. 5. LIMITATIONS / ENHANCEMENTS Currently, the algorithm does not attempt to enable any transparencies, except those enabled by a power net or as a side effect of a constraint being met. It would be useful to expand the algorithm to determine when to activate conditional equivalencies from a boundary scan device, as alluded to previously in the analysis algorithm. There are some cases in which constraints are not considered met, but could be if a transparency was enabled. Figure 10 shows an example of this situation. This enhancement would allow the tool to make decisions about which buffers to enable or disable in order to meet the most (or else the most important) constraints. However, even if the constraints are not marked as met, the constraint is present in the constraints file as a comment. It is easy to uncomment the constraint, allowing for a reasonable workaround until the enhancement is made. To implement this enhancement, the algorithm would be modified at the point after checking all upstream nets for meeting or violating a drive constraint. If the constraint is unmet after all checks have been made, any conditionally equivalent upstream nets can then be checked to see if they can meet the constraint without violating other constraints. For this enhancement to be more effective, a second enhancement would be useful. The algorithm would have to know how to decide which gates to enable and disable to achieve the best results. What "best results" means is the term that would have to be defined. A more complex priority system would need to be developed for determining which constraints are most important to meet. Currently, the priority is simply determined by which class (or list) the constraint is in, and within a class there is no priority. Another decision-making benefit for this expanded priority system would be to determine which constraint to meet in the presence of conflicting constraints. For instance, perhaps driving a net high will enable disable outputs on one device but enable them on another, as in figure 10. If both were constrained to be disabled, one or more constraints will be violated (or at least unmet) regardless of which device's outputs are disabled. The new prioritization scheme would need to be able to determine which is the most useful constraint to meet. 6. RESULTS This algorithm has significant advantages over manual constraint generation. The primary goal of the tool was to reduce test development time. There are several factors to consider in determining whether this goal has been met. Some steps required by this process are not required in manual constraints file generation. This additional effort includes modifying the characteristics model to include the pin restriction data. Since this generally consists of one or two additional lines of data in the model (see 8

9 Appendix I for examples), this does not require much effort. The time required is on the order of minutes per pin restriction. This small effort can be reduced even more by using a repository of characteristic models that include the pin restriction data. In a practical sense, there will be a learning curve for using the tool, also. This is the time it will take the user to learn the syntax for the pin restrictions and how to interpret the log data (particularly for error messages). This will take around one to four hours, depending on how formal the training is and how familiar the user is with constraints. As mentioned in the previous section, there may be special cases where the tool does not consider the constraint met, although it could safely do so. In these cases, the test developer may also need to comment or uncomment certain lines in the constraints file. This additional time is spent to verify the constraints and then uncomment or comment some lines. However, verifying the constraints is important (and relatively quick), so it should be done even in manual generation. Commenting and uncommenting some lines does not require much time. The additional time spent is more than offset by the time saved from automating the process. Except to verify the constraints generated by the tool, there is no time required for the test developer to study the schematic and netlist to determine what constraints should exist. Constraints that are not met have an explanation as to why they were commented out, allowing quick verification of the generated file. Conflicts in desired constraints are found automatically, rather than by manual analysis of the design. Net names automatically match the netlist and do not have to be translated from the schematic's net names or traced through several equivalent nets to find the correct name for the portion of the net touching the boundary scan device. Typing is not required for the generation of the file, so typos and incorrect net or lead names will not be a problem (assuming the lead names were entered correctly into the models). Several variables affect the amount of time reduction in generating the constraints file. As discussed earlier, certain designs may require some manual corrections (consisting of commenting and uncommenting). The more corrections that are required, the longer it will take to make a completed file. The more pin restrictions that need to be made, the more time it will take to enter them into the models. Within Raytheon, the test developers who have used this tool have reduced the constraints file generation time by 65-80%. Inexperienced users saved more actual hours, since they take longer to generate the file manually. Board designs with many constraints tend to yield greater savings, as well, since the additional work required is much less than the work that no longer needs to be done by the test developer. 7. CONCLUSION We have proposed an automated process for generating constraints files. This process has significant advantages over manual constraint generation. The primary goal of the algorithm was to reduce test development time. An implementation of this algorithm has been demonstrated to achieve this reduced test development time on actual designs within Raytheon. Automating the process of generating constraints files is made possible by taking advantage of component-based constraints, which allows software to analyze the design for constraints rather than the test developer. These pin restrictions can be easily defined in files already used in the vector generation process. The technique has proved beneficial and has allowed greater automation of our boundary scan interconnect test development process. 8. REFERENCES [1] IEEE Std , "IEEE Standard Test Access Port and Boundary-Scan Architecture" [2] B. Eklow, R. Sedmak, D. Singletary, and T. Vo, "Unsafe Board States During PC-Based Boundary-Scan Testing", Proceedings of International Test Conference 2001, pp [3] G. Robinson and J. DeShayes, "Interconnect Testing of Boards with Partial Scan", Proceedings of International Test Conference 1990, pp APPENDIX I - Sample CHR models This appendix contains four characteristic models. They are in the Victory format, but the format is not required for the algorithm to work as long as the information is present in the characteristic models. The samples demonstrate how little extra effort is involved in adding the pin restriction information to the models. The added lines use syntax consistent with our implementation of the algorithm. 9

10 The first model is for a fictitious sample device called SAMPLE_DEV. This device has an output enable pin. When the output enable pin (pin 1) is low, the outputs are disabled. We want to disable these pins so that the vector generation software will drive those signals using boundary scan device output pins. %NAME SAMPLE_DEV %CHAR char SAMPLE_DEV, leads=11, type=digital; lead 1=1, 2=2, 3=3, 4=4, 5=5, 6=6, 7=7, 8=8, 9=9, 10=10, 11=11; port input_leads = 1,3,4; port output_leads = 2,5,6,7,8,9,10,11; output output_leads input input_leads; power_0 3; power_1 4;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! The following lines are not valid in the CHR! model language. They are commands used by! our implementation of the ACG algorithm! These lines will be stripped from the model! before it is used by the test vector generation! software.! These are the only two lines added to the model! to make it work with the algorithm. DISABLE: 1 = 0 2,5,6,7,8,9,10,11!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! %COMP SAMPLE_DEV The next model is of a boundary scan device. The IEEE instructions on this device will only work correctly when its compliance enable pin (pin 2) is high. We want to set this pin high so that our interconnect test will use this boundary scan device. %NAME SAMPLE_DEV2 %CHAR char SAMPLE_DEV2, leads=12, type=digital; lead 1=1, 2=2, 3=3, 4=4, 5=5, 6=6, 7=7, 8=8, 9=9, 10=10, 11=11, 12=12; port input_leads = 2,3,4,12; port output_leads = 1,5,6,7,8,9,10,11; output output_leads input input_leads; power_0 3; power_1 4;! software.! This is the only line added to the model! to make it work with the algorithm. BS_MODE: 2 = 1!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! %COMP SAMPLE_DEV2 The following model is of a sample buffer. This buffer has an enable pin (pin 2), which activates the buffer when low. This example has no extra lines added for use with the algorithm, and is only shown as an example of how transparency information would be presented in the model. %NAME SAMPLE_BUF %CHAR char SAMPLE_BUF, leads=5, type=digital, VICTORY_TRANSPARENT; lead 1=1, 2=2, 3=3,4=4,5=5; port input_leads = 2,3,4,5; port output_leads = 1; bool off1= H 2;!off when pin 2 high bool on1 = L 2;!active when pin 2 low power_0 3; power_1 4;!tristate when 'off1', send when 'on1' STATESET state1:t=off1, S=on1 TRISTATE 1;! pin 1 is a 3-state output ENABLE 2;! pin 2 enables a transparency output 1 (SET=state1) input 2,5; %COMP SAMPLE_BUF The following model is a resistor. It is included to show how resistive transparencies would look %NAME RES %CHAR char RES, leads=2, type=analog; lead 1=1, 2=2; output 1 input 2; output 2 input 1;!POS and NEG not used by software or ACG algorithm r RESISTIVE POS=1 NEG=2; %COMP SAMPLE_BUF!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! The following lines are not valid in the CHR! model language. They are commands used by! our implementation of the ACG algorithm! These lines will be stripped from the model! before it is used by the test vector generation 10

Boundary Scan Implementation

Boundary Scan Implementation OpenCORES s Boundary Scan Implementation Abstract This document describes Boundary Scan Implementation (software and hardware solution. It is fully IEEE 1149.1 compliant. Date : August 6, 2000 Version:

More information

BOUNDARY-SCAN DFT & LAYOUT PRINCIPLES at BOARD LEVEL

BOUNDARY-SCAN DFT & LAYOUT PRINCIPLES at BOARD LEVEL BOUNDARY-SCAN DFT & LAYOUT PRINCIPLES at BOARD LEVEL Ian Saunders Ians@jtag.co.uk JTAG TECHNOLOGIES B.V. UK Sales & Support Centre Tel: 01234 831212 Fax: 01234 831616 Design For Test - Component Selection

More information

High Quality, Low Cost Test

High Quality, Low Cost Test Datasheet High Quality, Low Cost Test Overview is a comprehensive synthesis-based test solution for compression and advanced design-for-test that addresses the cost challenges of testing complex designs.

More information

A PRACTICAL GUIDE TO COMBINING ICT & BOUNDARY SCAN TESTING

A PRACTICAL GUIDE TO COMBINING ICT & BOUNDARY SCAN TESTING A PRACTICAL GUIDE TO COMBINING ICT & BOUNDARY SCAN TESTING Alan Albee GenRad, Inc. Abstract This paper focuses on the practical aspects of combining boundary scan testing with traditional In-Circuit Test.

More information

FishTail: The Formal Generation, Verification and Management of Golden Timing Constraints

FishTail: The Formal Generation, Verification and Management of Golden Timing Constraints FishTail: The Formal Generation, Verification and Management of Golden Timing Constraints Chip design is not getting any easier. With increased gate counts, higher clock speeds, smaller chip sizes and

More information

INTERFACING THE ISCC TO THE AND 8086

INTERFACING THE ISCC TO THE AND 8086 APPLICATION NOTE INTERFACING THE ISCC TO THE 68 AND 886 INTRODUCTION The ISCC uses its flexible bus to interface with a variety of microprocessors and microcontrollers; included are the 68 and 886. The

More information

The Boundary - Scan Handbook

The Boundary - Scan Handbook The Boundary - Scan Handbook By Kenneth P. Parker Agilent Technologies * KLUWER ACADEMIC PUBLISHERS Boston / Dordrecht / London TABLE OF CONTENTS List of Figures xiii List of Tables xvi List of Design-for-Test

More information

Design a system that accept data from each independent processor and arbitrate which one is granted access to memory at any one time.

Design a system that accept data from each independent processor and arbitrate which one is granted access to memory at any one time. BUS ARBITER: It is desired that more than one independent processor in system further requirement is that they require access to same set of system resources for ex memory size is 64 KB and require a single

More information

Eliminating Routing Congestion Issues with Logic Synthesis

Eliminating Routing Congestion Issues with Logic Synthesis Eliminating Routing Congestion Issues with Logic Synthesis By Mike Clarke, Diego Hammerschlag, Matt Rardon, and Ankush Sood Routing congestion, which results when too many routes need to go through an

More information

FPGA. Logic Block. Plessey FPGA: basic building block here is 2-input NAND gate which is connected to each other to implement desired function.

FPGA. Logic Block. Plessey FPGA: basic building block here is 2-input NAND gate which is connected to each other to implement desired function. FPGA Logic block of an FPGA can be configured in such a way that it can provide functionality as simple as that of transistor or as complex as that of a microprocessor. It can used to implement different

More information

Using Boundary Scan on the TMS320VC5420

Using Boundary Scan on the TMS320VC5420 Application Report SPRA597 - November 1999 Using Boundary Scan on the TMS320VC5420 Clay Turner C5000 Applications Team ABSTRACT The Texas Instruments (TI ) TMS320VC5420 DSP implements limited boundary

More information

ericssonz LBI-38616B MAINTENANCE MANUAL FOR MTD TM SERIES AND DATA RADIO LOGIC BOARD 19D902151G3 DESCRIPTION CIRCUIT ANALYSIS TABLE OF CONTENTS

ericssonz LBI-38616B MAINTENANCE MANUAL FOR MTD TM SERIES AND DATA RADIO LOGIC BOARD 19D902151G3 DESCRIPTION CIRCUIT ANALYSIS TABLE OF CONTENTS MAINTENANCE MANUAL FOR MTD TM SERIES AND DATA RADIO LOGIC BOARD 19D902151G3 TABLE OF CONTENTS Page DESCRIPTION............................................. Front Cover CIRCUIT ANALYSIS..........................................

More information

PCI-SIG ENGINEERING CHANGE NOTICE

PCI-SIG ENGINEERING CHANGE NOTICE TITLE: PCI-SIG ENGINEERING CHANGE NOTICE Optimized Buffer Flush/Fill DATE: Updated 30 April 2009, original request: 8 February 2008 AFFECTED DOCUMENTS: SPONSORS: Part I PCI Express Base Specification,

More information

ALTERA FPGAs Architecture & Design

ALTERA FPGAs Architecture & Design ALTERA FPGAs Architecture & Design Course Description This course provides all theoretical and practical know-how to design programmable devices of ALTERA with QUARTUS-II design software. The course combines

More information

The Challenges of Doing a PCI Design in FPGAs

The Challenges of Doing a PCI Design in FPGAs The Challenges of Doing a PCI Design in FPGAs Nupur Shah What are the challenges of doing PCI in FPGAs? This paper covers the issues Xilinx has discovered in doing PCI in FPGAs, how they have been surmounted

More information

Interconnect Testing of Boards with Partial Boundary Scan

Interconnect Testing of Boards with Partial Boundary Scan Interconnect Testing of Boards with Partial Boundary Scan Gordon D. Robinson & John G. Deshayes GenRad, Inc, 3 Baker Ave. Concord, MA 1742 ABSTRACT Test generation and diagnosis of shorts and opens for

More information

Winford Engineering ETH32 Protocol Reference

Winford Engineering ETH32 Protocol Reference Winford Engineering ETH32 Protocol Reference Table of Contents 1 1 Overview 1 Connection 1 General Structure 2 Communications Summary 2 Port Numbers 4 No-reply Commands 4 Set Port Value 4 Set Port Direction

More information

8. JTAG Boundary-Scan Testing in MAX V Devices

8. JTAG Boundary-Scan Testing in MAX V Devices December 2 MV58-. 8. JTAG Boundary-Scan Testing in MAX V Devices MV58-. This chapter describes the IEEE Std.49. (JTAG) boundary-scan testing for Altera MAX V devices. The IEEE Std. 49. BST circuitry available

More information

BV4218. I2C-LCD & Keypad. Product specification. December 2008 V0.a. ByVac 2006 ByVac Page 1 of 9

BV4218. I2C-LCD & Keypad. Product specification. December 2008 V0.a. ByVac 2006 ByVac Page 1 of 9 Product specification December 2008 V0.a ByVac 2006 ByVac Page 1 of 9 Contents 1. Introduction...3 2. Features...3 3. Electrical Specification...3 4. I2C set...4 5. The LCD Set...5 5.1. 1...5 5.2. 2...5

More information

TABLE OF CONTENTS 1.0 PURPOSE INTRODUCTION ESD CHECKS THROUGHOUT IC DESIGN FLOW... 2

TABLE OF CONTENTS 1.0 PURPOSE INTRODUCTION ESD CHECKS THROUGHOUT IC DESIGN FLOW... 2 TABLE OF CONTENTS 1.0 PURPOSE... 1 2.0 INTRODUCTION... 1 3.0 ESD CHECKS THROUGHOUT IC DESIGN FLOW... 2 3.1 PRODUCT DEFINITION PHASE... 3 3.2 CHIP ARCHITECTURE PHASE... 4 3.3 MODULE AND FULL IC DESIGN PHASE...

More information

SECTION 11 JTAG PORT

SECTION 11 JTAG PORT nc. SECTION JTAG PORT MOTOROLA DSP5662 User s Manual - nc.. INTRODUCTION....................................-3.2 JTAG PINS........................................-5.3 TAP CONTROLLER.................................-6.4

More information

8. Best Practices for Incremental Compilation Partitions and Floorplan Assignments

8. Best Practices for Incremental Compilation Partitions and Floorplan Assignments 8. Best Practices for Incremental Compilation Partitions and Floorplan Assignments QII51017-9.0.0 Introduction The Quartus II incremental compilation feature allows you to partition a design, compile partitions

More information

AMD actual programming and testing on a system board. We will take a simple design example and go through the various stages of this design process.

AMD actual programming and testing on a system board. We will take a simple design example and go through the various stages of this design process. actual programming and testing on a system board. We will take a simple design example and go through the various stages of this design process. Conceptualize A Design Problem Select Device Implement Design

More information

Motors I Automation I Energy I Transmission & Distribution I Coatings. SymbiNet CFW-11. User s Manual

Motors I Automation I Energy I Transmission & Distribution I Coatings. SymbiNet CFW-11. User s Manual Motors I Automation I Energy I Transmission & Distribution I Coatings SymbiNet CFW-11 User s Manual SymbiNet User s Manual Series: CFW-11 Language: English Document Number: 10002033446 / 00 Publication

More information

USB Compliance Checklist Hubs (Excluding Root Hubs) USB Device Product Information

USB Compliance Checklist Hubs (Excluding Root Hubs) USB Device Product Information USB Compliance Checklist For the 2.0 USB Specification Checklist Version 1.07 USB Device Product Information field Date Vendor Name Vendor Street Address Vendor City, State, Postal Code Vendor Country

More information

Boundary Scan. Sungho Kang. Yonsei University

Boundary Scan. Sungho Kang. Yonsei University Boundary Scan Sungho Kang Yonsei University Outiline Introduction TAP Controller Instruction Register Test Data Registers Instructions Hardware Test Innovations PCB Test Conclusion 2 Boundary Scan Improve

More information

ONYX-MM-XT PC/104 Format Counter/Timer & Digital I/O Module

ONYX-MM-XT PC/104 Format Counter/Timer & Digital I/O Module ONYX-MM-XT PC/104 Format Counter/Timer & Digital I/O Module User Manual V1.4 Copyright 2009 Diamond Systems Corporation 1255 Terra Bella Avenue Mountain View, CA 94043 USA Tel (650) 810-2500 Fax (650)

More information

myproject - P PAR Detail

myproject - P PAR Detail myproject - P1149.1 PAR Detail Submitter Email: cjclark@intellitech.com Type of Project: Revision to IEEE Standard PAR Request Date: 24-May-2008 PAR Approval Date: 26-Sep-2008 PAR Expiration Date: 31-Dec-2012

More information

Implementing Bus LVDS Interface in Cyclone III, Stratix III, and Stratix IV Devices

Implementing Bus LVDS Interface in Cyclone III, Stratix III, and Stratix IV Devices Implementing Bus LVDS Interface in Cyclone III, Stratix III, and Stratix IV Devices November 2008, ver. 1.1 Introduction LVDS is becoming the most popular differential I/O standard for high-speed transmission

More information

Introduction to VHDL #1

Introduction to VHDL #1 ECE 3220 Digital Design with VHDL Introduction to VHDL #1 Lecture 3 Introduction to VHDL The two Hardware Description Languages that are most often used in industry are: n VHDL n Verilog you will learn

More information

Expanding IEEE Std Boundary-Scan Architecture Beyond Manufacturing Test of Printed Circuit Board Assembly

Expanding IEEE Std Boundary-Scan Architecture Beyond Manufacturing Test of Printed Circuit Board Assembly Expanding IEEE Std 1149.1 Boundary-Scan Architecture Beyond Manufacturing Test of Printed Circuit Board Assembly Jun Balangue Keysight Technologies Singapore Jun_balangue@keysight.com Abstract This paper

More information

IDEA! Avnet SpeedWay Design Workshop

IDEA! Avnet SpeedWay Design Workshop The essence of FPGA technology IDEA! 2 ISE Tool Flow Overview Design Entry Synthesis Constraints Synthesis Simulation Implementation Constraints Floor-Planning Translate Map Place & Route Timing Analysis

More information

Keysight Technologies Expanding IEEE Std Boundary-Scan Architecture Beyond Manufacturing Test of PCBA

Keysight Technologies Expanding IEEE Std Boundary-Scan Architecture Beyond Manufacturing Test of PCBA Keysight Technologies Expanding IEEE Std 1149.1 Boundary-Scan Architecture Beyond Manufacturing Test of PCBA Article Reprint This paper was first published in the 2017 IPC APEX Technical Conference, CA,

More information

Leveraging Boundary Scan resources for comprehensive cluster testing

Leveraging Boundary Scan resources for comprehensive cluster testing Leveraging Boundary Scan resources for comprehensive cluster testing Heiko Ehrenberg and Norbert Muench GOEPEL Electronics LLC 9600 Great Hills Trail, 150W, Austin, Texas 78759 USA Abstract Board level

More information

Lab 28. Bus Arbitration

Lab 28. Bus Arbitration Lab 28 Designed by: Gandhi Puvvada Bus Arbitration Objective: Our objective in this lab is to familiarize you with bus arbitration and exchange of the control of bus between processors so as to communicate

More information

ispxp Technology Power-up and Hot Socketing

ispxp Technology Power-up and Hot Socketing December 2002 Introduction Technical Note TN1041 The ispxp (expanded in-system Programmable) device families from Lattice offer the non-volatility of E 2 cells together with the infinite reconfigurability

More information

DESIGN STRATEGIES & TOOLS UTILIZED

DESIGN STRATEGIES & TOOLS UTILIZED CHAPTER 7 DESIGN STRATEGIES & TOOLS UTILIZED 7-1. Field Programmable Gate Array The internal architecture of an FPGA consist of several uncommitted logic blocks in which the design is to be encoded. The

More information

80C186 AND 80C188 EMBEDDED MICROPROCESSORS SPECIFICATION UPDATE

80C186 AND 80C188 EMBEDDED MICROPROCESSORS SPECIFICATION UPDATE 80C186 AND 80C188 EMBEDDED MICROPROCESSORS SPECIFICATION UPDATE Release Date: July, 1996 Order Number 272894-001 The 80C186 and 80C188 Embedded Microprocessors may contain design defects or errors known

More information

Errata and Clarifications to the PCI-X Addendum, Revision 1.0a. Update 3/12/01 Rev P

Errata and Clarifications to the PCI-X Addendum, Revision 1.0a. Update 3/12/01 Rev P Errata and Clarifications to the PCI-X Addendum, Revision 1.0a Update 3/12/01 Rev P REVISION REVISION HISTORY DATE P E1a-E6a, C1a-C12a 3/12/01 2 Table of Contents Table of Contents...3 Errata to PCI-X

More information

Understanding the basic building blocks of a microcontroller device in general. Knows the terminologies like embedded and external memory devices,

Understanding the basic building blocks of a microcontroller device in general. Knows the terminologies like embedded and external memory devices, Understanding the basic building blocks of a microcontroller device in general. Knows the terminologies like embedded and external memory devices, CISC and RISC processors etc. Knows the architecture and

More information

CS232 VHDL Lecture. Types

CS232 VHDL Lecture. Types CS232 VHDL Lecture VHSIC Hardware Description Language [VHDL] is a language used to define and describe the behavior of digital circuits. Unlike most other programming languages, VHDL is explicitly parallel.

More information

Lab 4: Digital Electronics BMEn 2151 Introductory Medical Device Prototyping Prof. Steven S. Saliterman

Lab 4: Digital Electronics BMEn 2151 Introductory Medical Device Prototyping Prof. Steven S. Saliterman Lab 4: Digital Electronics BMEn 2151 Introductory Medical Device Prototyping Prof. Steven S. Saliterman Exercise 4-1: Familiarization with Lab Box Contents & Reference Books 4-1-1 CMOS Cookbook (In the

More information

WI-076 Issue 1 Page 1 of 7

WI-076 Issue 1 Page 1 of 7 Design for Test (DFT) Guidelines WI-076 Issue 1 Page 1 of 7 Contents Scope... 3 Introduction... 3 Board Layout Constraints... 4 Circuit Design Constraints... 5 ICT Generation Requirements... 7 WI-076 Issue

More information

Cluster-based approach eases clock tree synthesis

Cluster-based approach eases clock tree synthesis Page 1 of 5 EE Times: Design News Cluster-based approach eases clock tree synthesis Udhaya Kumar (11/14/2005 9:00 AM EST) URL: http://www.eetimes.com/showarticle.jhtml?articleid=173601961 Clock network

More information

A Linear-Time Heuristic for Improving Network Partitions

A Linear-Time Heuristic for Improving Network Partitions A Linear-Time Heuristic for Improving Network Partitions ECE 556 Project Report Josh Brauer Introduction The Fiduccia-Matteyses min-cut heuristic provides an efficient solution to the problem of separating

More information

10/24/2016. Let s Name Some Groups of Bits. ECE 120: Introduction to Computing. We Just Need a Few More. You Want to Use What as Names?!

10/24/2016. Let s Name Some Groups of Bits. ECE 120: Introduction to Computing. We Just Need a Few More. You Want to Use What as Names?! University of Illinois at Urbana-Champaign Dept. of Electrical and Computer Engineering ECE 120: Introduction to Computing Memory Let s Name Some Groups of Bits I need your help. The computer we re going

More information

Architecture Specification

Architecture Specification PCI-to-PCI Bridge Architecture Specification, Revision 1.2 June 9, 2003 PCI-to-PCI Bridge Architecture Specification Revision 1.1 December 18, 1998 Revision History REVISION ISSUE DATE COMMENTS 1.0 04/05/94

More information

Renesas 78K/78K0R/RL78 Family In-Circuit Emulation

Renesas 78K/78K0R/RL78 Family In-Circuit Emulation _ Technical Notes V9.12.225 Renesas 78K/78K0R/RL78 Family In-Circuit Emulation This document is intended to be used together with the CPU reference manual provided by the silicon vendor. This document

More information

DP8420V 21V 22V-33 DP84T22-25 microcmos Programmable 256k 1M 4M Dynamic RAM Controller Drivers

DP8420V 21V 22V-33 DP84T22-25 microcmos Programmable 256k 1M 4M Dynamic RAM Controller Drivers DP8420V 21V 22V-33 DP84T22-25 microcmos Programmable 256k 1M 4M Dynamic RAM Controller Drivers General Description The DP8420V 21V 22V-33 DP84T22-25 dynamic RAM controllers provide a low cost single chip

More information

MC68331 DEVICE INFORMATION (Issue 6-17 August, 1995) Rev. A and B Silicon E95B, E93N and F43E Mask Set

MC68331 DEVICE INFORMATION (Issue 6-17 August, 1995) Rev. A and B Silicon E95B, E93N and F43E Mask Set MC68331 DEVICE INFORMATION (Issue 6-17 August, 1995) Rev. A and B Silicon E95B, E93N and F43E Mask Set The following information and errata pertain to Revision A and B samples of the 68331 microcontroller.

More information

ASIMON 3 G2 AS-i Safety Monitor Configuration software for Microsoft -Windows

ASIMON 3 G2 AS-i Safety Monitor Configuration software for Microsoft -Windows ASIMON 3 G2 AS-i Safety Monitor Configuration software for Microsoft -Windows Version: 4.3 / Edition: 04/2013 All rights reserved, in particular the rights of reproduction and translation. Copying or reproduction

More information

4X4 Driver Shield Manual

4X4 Driver Shield Manual 3/31/2012 4X4 Driver Shield Manual High current, high side switching for Arduino Logos Electromechanical 4X4 Driver Shield Manual High current, high side switching for Arduino Introduction The Logos Electromechanical

More information

Summer 2003 Lecture 21 07/15/03

Summer 2003 Lecture 21 07/15/03 Summer 2003 Lecture 21 07/15/03 Simple I/O Devices Simple i/o hardware generally refers to simple input or output ports. These devices generally accept external logic signals as input and allow the CPU

More information

INTEGRATED CIRCUITS APPLICATION NOTE. AN252 Live Insertion Aspects of Philips Logic Families. Author: Mike Magdaluyo July Philips Semiconductors

INTEGRATED CIRCUITS APPLICATION NOTE. AN252 Live Insertion Aspects of Philips Logic Families. Author: Mike Magdaluyo July Philips Semiconductors INTEGRATED CIRCUITS APPLICATION NOTE Live Insertion Aspects of Philips Logic Families Author: Mike Magdaluyo July 1999 Philips Semiconductors Author: Mike Magdaluyo, Philips Semiconductors, Sunnyvale INTRODUCTION

More information

Verilog Design Entry, Synthesis, and Behavioral Simulation

Verilog Design Entry, Synthesis, and Behavioral Simulation ------------------------------------------------------------- PURPOSE - This lab will present a brief overview of a typical design flow and then will start to walk you through some typical tasks and familiarize

More information

XC1701L (3.3V), XC1701 (5.0V) and XC17512L (3.3V) Serial Configuration PROMs. Features. Description

XC1701L (3.3V), XC1701 (5.0V) and XC17512L (3.3V) Serial Configuration PROMs. Features. Description 0 XC1701L (3.3V), XC1701 (5.0V) and XC17512L (3.3V) Serial Configuration PROMs December 10, 1997 (Version 1.1) 0 5* Product Specification Features On-chip address counter, incremented by each rising edge

More information

Verilog for High Performance

Verilog for High Performance Verilog for High Performance Course Description This course provides all necessary theoretical and practical know-how to write synthesizable HDL code through Verilog standard language. The course goes

More information

Custom Design Formal Equivalence Checking Based on Symbolic Simulation. Overview. Verification Scope. Create Verilog model. Behavioral Verilog

Custom Design Formal Equivalence Checking Based on Symbolic Simulation. Overview. Verification Scope. Create Verilog model. Behavioral Verilog DATASHEET Custom Design Formal Equivalence Checking Based on Symbolic Simulation High-quality equivalence checking for full-custom designs Overview is an equivalence checker for full custom designs. It

More information

Chip & Board Testability Assessment Checklist

Chip & Board Testability Assessment Checklist Chip & Board Testability Assessment Checklist Prepared by Ben Bennetts, DFT Consultant for ASSET InterTech, Inc. 1 July 2005 Abstract: BA Board Testability Assessment 2002, Bennetts Associates checklist

More information

IEEE JTAG Boundary Scan Standard

IEEE JTAG Boundary Scan Standard IEEE 1149.1 JTAG Boundary Scan Standard Bed-of-nails tester Motivation System view of boundary scan hardware Elementary scan cell Test Access Port (TAP) controller Boundary scan instructions Example *Joint

More information

ECE 270 Lab Verification / Evaluation Form. Experiment 1

ECE 270 Lab Verification / Evaluation Form. Experiment 1 ECE 70 Lab Verification / Evaluation Form Experiment Evaluation: IMPORTANT! You must complete this experiment during your scheduled lab period. All work for this experiment must be demonstrated to and

More information

New and Emerging JTAG Standards: Changing the Paradigm of Board Test (A tutorial)

New and Emerging JTAG Standards: Changing the Paradigm of Board Test (A tutorial) New and Emerging JTAG Standards: Changing the Paradigm of Board Test (A tutorial) Artur Jutman November 23 th, 2010 Drammen, NORWAY Presentation Outline Introduction Overview of the standards IEEE 1149.7

More information

Betrouwbare Elektronica ontwerpen en Produceren

Betrouwbare Elektronica ontwerpen en Produceren Betrouwbare Elektronica ontwerpen en Produceren Verbeter betrouwbaarheid, time to market en winstgevendheid met boundary scan JTAG Technologies B.V. Rik Doorneweert rik@jtag.com Boundary scan Testing HW

More information

Week - 04 Lecture - 01 Merge Sort. (Refer Slide Time: 00:02)

Week - 04 Lecture - 01 Merge Sort. (Refer Slide Time: 00:02) Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 04 Lecture - 01 Merge Sort (Refer

More information

PIC-I/O Multifunction I/O Controller

PIC-I/O Multifunction I/O Controller J R KERR AUTOMATION ENGINEERING PIC-I/O Multifunction I/O Controller The PIC-I/O multifunction I/O controller is compatible with the PIC-SERVO and PIC-STEP motor control modules and provides the following

More information

SRAM-based FPGA designed for Space use

SRAM-based FPGA designed for Space use ATF280F Rad-Hard Reprogrammable FPGA DATASHEET Features SRAM-based FPGA designed for Space use 280K equivalent ASIC gates 14,400 cells ( two 3-input LUT or one 4-input LUT, one DFF) Unlimited reprogrammability

More information

Logic Chip Tester User Manual SW Version /8/2012. Chapter 1 Introduction/Background

Logic Chip Tester User Manual SW Version /8/2012. Chapter 1 Introduction/Background Logic Chip Tester User Manual SW Version 1.00 4/8/2012 Chapter 1 Introduction/Background In the 1970 s and 80 s, many digital devices were designed using a number of 14, 16, 20, or perhaps 24- pin logic

More information

Fault Grading FPGA Interconnect Test Configurations

Fault Grading FPGA Interconnect Test Configurations * Fault Grading FPGA Interconnect Test Configurations Mehdi Baradaran Tahoori Subhasish Mitra* Shahin Toutounchi Edward J. McCluskey Center for Reliable Computing Stanford University http://crc.stanford.edu

More information

Analog Devices Welcomes Hittite Microwave Corporation NO CONTENT ON THE ATTACHED DOCUMENT HAS CHANGED

Analog Devices Welcomes Hittite Microwave Corporation NO CONTENT ON THE ATTACHED DOCUMENT HAS CHANGED Analog Devices Welcomes Hittite Microwave Corporation NO CONTENT ON THE ATTACHED DOCUMENT HAS CHANGED www.analog.com www.hittite.com THIS PAGE INTENTIONALLY LEFT BLANK PLL & PLLVCO Serial Programming Interface

More information

BMS: Installation Manual v2.x - Documentation

BMS: Installation Manual v2.x - Documentation Page 1 of 7 BMS: Installation Manual v2.x From Documentation This section describes how external peripheral devices are connected and additional functions of the BMS are used. I you have not done so already,

More information

The following content has been imported from Legacy Help systems and is in the process of being checked for accuracy.

The following content has been imported from Legacy Help systems and is in the process of being checked for accuracy. JTAG Viewer Old Content - visit altium.com/documentation Modified by Admin on Nov 6, 2013 The following content has been imported from Legacy Help systems and is in the process of being checked for accuracy.

More information

NIOS CPU Based Embedded Computer System on Programmable Chip

NIOS CPU Based Embedded Computer System on Programmable Chip 1 Objectives NIOS CPU Based Embedded Computer System on Programmable Chip EE8205: Embedded Computer Systems This lab has been constructed to introduce the development of dedicated embedded system based

More information

Pretty Good Protocol - Design Specification

Pretty Good Protocol - Design Specification Document # Date effective October 23, 2006 Author(s) Ryan Herbst Supersedes Draft Revision 0.02 January 12, 2007 Document Title Pretty Good Protocol - Design Specification CHANGE HISTORY LOG Revision Effective

More information

EE 231 Fall Lab 1: Introduction to Verilog HDL and Altera IDE

EE 231 Fall Lab 1: Introduction to Verilog HDL and Altera IDE Lab 1: Introduction to Verilog HDL and Altera IDE Introduction In this lab you will design simple circuits by programming the Field-Programmable Gate Array (FPGA). At the end of the lab you should be able

More information

Subject: Scheduling Region Questions and Problems of new SystemVerilog commands

Subject: Scheduling Region Questions and Problems of new SystemVerilog commands Subject: Scheduling Region Questions and Problems of new SystemVerilog commands I have read and re-read sections 14-17 of the SystemVerilog 3.1 Standard multiple times and am still confused about exactly

More information

Lab 16: Data Busses, Tri-State Outputs and Memory

Lab 16: Data Busses, Tri-State Outputs and Memory Lab 16: Data Busses, Tri-State Outputs and Memory UC Davis Physics 116B Rev. 0.9, Feb. 2006 1 Introduction 1.1 Data busses Data busses are ubiquitous in systems which must communicate digital data. Examples

More information

7 8 9 C. PRELAB REQUIREMENTS You must adhere to the Lab Rules and Policies document for every lab.

7 8 9 C. PRELAB REQUIREMENTS You must adhere to the Lab Rules and Policies document for every lab. Page 1/ Revision 1 OBJECTIVES To understand how a keypad functions as a raster scan input device and to learn how to interface a keypad to a microprocessor. Further explore and understand the implementation

More information

ALTERA FPGA Design Using Verilog

ALTERA FPGA Design Using Verilog ALTERA FPGA Design Using Verilog Course Description This course provides all necessary theoretical and practical know-how to design ALTERA FPGA/CPLD using Verilog standard language. The course intention

More information

Source-Synchronous Testing Using Paired Strobes

Source-Synchronous Testing Using Paired Strobes Teradyne Users Group Source-Synchronous Testing Using Paired Strobes Keith Remlinger Test Spectrum, Inc. 105 W. Riverside Dr, Suite 200, Austin TX 78704 keith.remlinger@testspectrum.com Travis Volek Freescale

More information

The 80C186XL 80C188XL Integrated Refresh Control Unit

The 80C186XL 80C188XL Integrated Refresh Control Unit APPLICATION BRIEF The 80C186XL 80C188XL Integrated Refresh Control Unit GARRY MION ECO SENIOR APPLICATIONS ENGINEER November 1994 Order Number 270520-003 Information in this document is provided in connection

More information

Physics 536 Spring Illustrating the FPGA design process using Quartus II design software and the Cyclone II FPGA Starter Board.

Physics 536 Spring Illustrating the FPGA design process using Quartus II design software and the Cyclone II FPGA Starter Board. Physics 536 Spring 2009 Illustrating the FPGA design process using Quartus II design software and the Cyclone II FPGA Starter Board. Digital logic: Equivalent to a large number of discrete logic elements

More information

The Embedded computing platform. Four-cycle handshake. Bus protocol. Typical bus signals. Four-cycle example. CPU bus.

The Embedded computing platform. Four-cycle handshake. Bus protocol. Typical bus signals. Four-cycle example. CPU bus. The Embedded computing platform CPU bus. Memory. I/O devices. CPU bus Connects CPU to: memory; devices. Protocol controls communication between entities. Bus protocol Determines who gets to use the bus

More information

BOUNDARY-SCAN: AN INTRODUCTION. by James Stanbridge, Sales Manager of JTAG Technologies

BOUNDARY-SCAN: AN INTRODUCTION. by James Stanbridge, Sales Manager of JTAG Technologies BOUNDARY-SCAN: AN INTRODUCTION by James Stanbridge, Sales Manager of JTAG Technologies Once considered to be something of a black art, and solely an aid to manufacturing, boundary-scan is coming of age

More information

PCI-X Addendum to the PCI Compliance Checklist. Revision 1.0a

PCI-X Addendum to the PCI Compliance Checklist. Revision 1.0a PCI-X Addendum to the PCI Compliance Checklist Revision 1.0a August 29, 2000 PCI-X Addendum to the PCI Compliance Checklist REVISION REVISION HISTORY DATE 1.0 Initial Release 3/1/00 1.0a Updates for PCI-X

More information

EECS 140 Laboratory Exercise 4 3-to-11 Counter Implementation

EECS 140 Laboratory Exercise 4 3-to-11 Counter Implementation EECS 140 Laboratory Exercise 4 3-to-11 Counter Implementation 1. Objectives A. To apply knowledge of combinatorial design. B. Gain expertise in designing and building a simple combinatorial circuit This

More information

PI7C8140A 2-Port PCI-to-PCI Bridge REVISION 1.01

PI7C8140A 2-Port PCI-to-PCI Bridge REVISION 1.01 2-Port PCI-to-PCI Bridge REVISION 1.01 3545 North First Street, San Jose, CA 95134 Telephone: 1-877-PERICOM, (1-877-737-4266) Fax: 408-435-1100 Internet: http://www.pericom.com LIFE SUPPORT POLICY Pericom

More information

Reduce Verification Complexity In Low/Multi-Power Designs. Matthew Hogan, Mentor Graphics

Reduce Verification Complexity In Low/Multi-Power Designs. Matthew Hogan, Mentor Graphics Reduce Verification Complexity In Low/Multi-Power Designs. Matthew Hogan, Mentor Graphics BACKGROUND The increasing demand for highly reliable products covers many industries, all process nodes, and almost

More information

SCANSTA111 Enhanced SCAN bridge Multidrop Addressable IEEE (JTAG) Port

SCANSTA111 Enhanced SCAN bridge Multidrop Addressable IEEE (JTAG) Port Enhanced SCAN bridge Multidrop Addressable IEEE 1149.1 (JTAG) Port General Description The SCANSTA111 extends the IEEE Std. 1149.1 test bus into a multidrop test bus environment. The advantage of a multidrop

More information

Lecture 6: memory structure 8086 Outline: 1.introduction 2.memory reserve 3.bus operation

Lecture 6: memory structure 8086 Outline: 1.introduction 2.memory reserve 3.bus operation Lecture 6: memory structure 8086 Outline: 1.introduction 2.memory reserve 3.bus operation 1 1.INRTODUCTION The 8086 memory is a sequence of up to 1 million 8-bit bytes, a considerable increase over the

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer

More information

Programmable Logic Devices II

Programmable Logic Devices II São José February 2015 Prof. Hoeller, Prof. Moecke (http://www.sj.ifsc.edu.br) 1 / 28 Lecture 01: Complexity Management and the Design of Complex Digital Systems Prof. Arliones Hoeller arliones.hoeller@ifsc.edu.br

More information

5504 Thermocouple Analog Input Module

5504 Thermocouple Analog Input Module 550 Thermocouple Analog Input Installation, Operation and Maintenance Setup Manual 5/9/0 Safety Information The information provided in this documentation contains general descriptions and/or technical

More information

1 Design Process HOME CONTENTS INDEX. For further assistance, or call your local support center

1 Design Process HOME CONTENTS INDEX. For further assistance,  or call your local support center 1 Design Process VHDL Compiler, a member of the Synopsys HDL Compiler family, translates and optimizes a VHDL description to an internal gate-level equivalent. This representation is then compiled with

More information

Connecting Spansion SPI Serial Flash to Configure Altera FPGAs

Connecting Spansion SPI Serial Flash to Configure Altera FPGAs Connecting SPI Serial Flash to Configure Altera s Application By Frank Cirimele 1. Introduction Altera s are programmable logic devices used for basic logic functions, chip-to-chip connectivity, signal

More information

Constraint Verification

Constraint Verification Constraint Verification Constraint verification refers to the verification of the contents of an SDC file to flag situations where the specified constraints are either incorrect, or incomplete, both of

More information

DP8420A,DP8421A,DP8422A

DP8420A,DP8421A,DP8422A DP8420A,DP8421A,DP8422A DP8420A DP8421A DP8422A microcmos Programmable 256k/1M/4M Dynamic RAM Controller/Drivers Literature Number: SNOSBX7A DP8420A 21A 22A microcmos Programmable 256k 1M 4M Dynamic RAM

More information

Memory and Programmable Logic

Memory and Programmable Logic Memory and Programmable Logic Memory units allow us to store and/or retrieve information Essentially look-up tables Good for storing data, not for function implementation Programmable logic device (PLD),

More information

PI7C8152A & PI7C8152B 2-Port PCI-to-PCI Bridge REVISION 1.11

PI7C8152A & PI7C8152B 2-Port PCI-to-PCI Bridge REVISION 1.11 2-Port PCI-to-PCI Bridge REVISION 1.11 2380 Bering Drive, San Jose, CA 95131 Telephone: 1-877-PERICOM, (1-877-737-4266) Fax: 408-435-1100 Email: solutions@pericom.com Internet: http://www.pericom.com LIFE

More information

EE434 ASIC & Digital Systems Testing

EE434 ASIC & Digital Systems Testing EE434 ASIC & Digital Systems Testing Spring 2015 Dae Hyun Kim daehyun@eecs.wsu.edu 1 Introduction VLSI realization process Verification and test Ideal and real tests Costs of testing Roles of testing A

More information

Single Channel HDLC Core V1.3. LogiCORE Facts. Features. General Description. Applications

Single Channel HDLC Core V1.3. LogiCORE Facts. Features. General Description. Applications Sept 8, 2000 Product Specification R Powered by Xilinx Inc. 2100 Logic Drive San Jose, CA 95124 Phone: +1 408-559-7778 Fax: +1 408-559-7114 E-mail: logicore@xilinx.com URL: www.xilinx.com/ipcenter Support:

More information