Efficient testbench implementation for verification proposed by Synopsys staffer
K.C. Krishnadas, EE Times:
(12/21/2007 7:57 AM EST)
BENGALURU, India -- Identifying hidden bugs in the verification phase of configurable host controller IP, such as the host controller supporting multiple protocols (SD/MMC/CEATA) is challenging as some bugs are deeply embedded and can be detected only with a sequence of transactions like error transaction followed by normal transaction.
Verification engineers develop discrete error tests to cover error scenarios and these are run separately but this does not always detect sequence dependent bugs as the testbench may not be capable of generating a mix of normal and error transactions, or as the testbench driver may not be capable of injecting the errors and automatically recover to the normal state to support the stream of random transactions that include normal and error transactions.
Pusuluri Giri Kumar from Synopsys (India) has devised a solution whose focus lies with the design and implementation of the transaction generation model and the testbench driver, with the testbench based on reusable verification methodology guidelines and said he was able to detect hidden bugs when verifying host controller IP for mobile storage applications.
"Emerging mobile storage technologies enable high capacity storage devices (compliant to protocols like SD, MMC and CEATA to be integrated into the devices like digital cameras, MP3 players. The physical interface for these memory devices remains the same but the communication protocol varies; hence the host controllers should be configurable to be interfaced with mobile storage devices.
(12/21/2007 7:57 AM EST)
BENGALURU, India -- Identifying hidden bugs in the verification phase of configurable host controller IP, such as the host controller supporting multiple protocols (SD/MMC/CEATA) is challenging as some bugs are deeply embedded and can be detected only with a sequence of transactions like error transaction followed by normal transaction.
Verification engineers develop discrete error tests to cover error scenarios and these are run separately but this does not always detect sequence dependent bugs as the testbench may not be capable of generating a mix of normal and error transactions, or as the testbench driver may not be capable of injecting the errors and automatically recover to the normal state to support the stream of random transactions that include normal and error transactions.
Pusuluri Giri Kumar from Synopsys (India) has devised a solution whose focus lies with the design and implementation of the transaction generation model and the testbench driver, with the testbench based on reusable verification methodology guidelines and said he was able to detect hidden bugs when verifying host controller IP for mobile storage applications.
"Emerging mobile storage technologies enable high capacity storage devices (compliant to protocols like SD, MMC and CEATA to be integrated into the devices like digital cameras, MP3 players. The physical interface for these memory devices remains the same but the communication protocol varies; hence the host controllers should be configurable to be interfaced with mobile storage devices.
To read the full article, click here
Related Semiconductor IP
- JESD204E Controller IP
- eUSB2V2.0 Controller + PHY IP
- I/O Library with LVDS in SkyWater 90nm
- 50G PON LDPC Encoder/Decoder
- UALink Controller
Related Articles
- High Bandwidth Memory (HBM) Model & Verification IP Implementation - Beginner's guide
- SoCs: Supporting Socketization -> Developing a configurable testbench
- DSP/ASIC approach offers processing benefits for 802.11b implementation
- High-speed fabrics deliver optimal IP implementation
Latest Articles
- Crypto-RV: High-Efficiency FPGA-Based RISC-V Cryptographic Co-Processor for IoT Security
- In-Pipeline Integration of Digital In-Memory-Computing into RISC-V Vector Architecture to Accelerate Deep Learning
- QMC: Efficient SLM Edge Inference via Outlier-Aware Quantization and Emergent Memories Co-Design
- ChipBench: A Next-Step Benchmark for Evaluating LLM Performance in AI-Aided Chip Design
- COVERT: Trojan Detection in COTS Hardware via Statistical Activation of Microarchitectural Events