Is Buying IPs From Vendors A Foregone Conclusion? Think Again...
There has been a huge trend lately for fabless companies to move from making their own IPs and VIPs to buying them from vendors. This has obvious (and popularly stated) advantages. You can potentially fasten your chip’s time-to-market by buying standard components off-the-shelf and assembling them with other components built inhouse. But this is far from a foregone conclusion...
There are four IP development models possible:
1. Buy IP and VIP, then integrate them inhouse
2. Develop IP, buy VIP
3. Buy IP, develop VIP
4. Develop own IP and VIP
Since 70% of the effort is in the verification, developing your own verification IP does not provide any time or cost advantages. This leads us to eliminate model 3 and 4 from this discussion.The big assumption here is that a Verification IP is available, is of high quality and complete - not just a BFM for which you will need to scramble together the test bench yourself. (Where can you find such a solution? Here is a good place to start).
Given some real trade-offs between models 1 and 2, let us list out their advantages and disadvantages.
Related Semiconductor IP
- UCIe D2D Adapter & PHY Integrated IP
- Low Dropout (LDO) Regulator
- 16-Bit xSPI PSRAM PHY
- MIPI CSI-2 CSE2 Security Module
- ASIL B Compliant MIPI CSI-2 CSE2 Security Module
Related Blogs
- Interface IP in 2022: 22% YoY growth still data-centric driven
- Functional, Fast, and Ultra-Low Power: A Live Look at Weebit's Second IP Module
- AI-Based Sequence Detection for IP and SoC Verification & Validation
- Empowering AI-Enabled Systems with MIPI C/D-PHY Combo IP: The Complete Audio-Visual Subsystem and AI
Latest Blogs
- Ensuring reliability in Advanced IC design
- A Closer Look at proteanTecs Health and Performance Management Solutions Portfolio
- Enabling Memory Choice for Modern AI Systems: Tenstorrent and Rambus Deliver Flexible, Power-Efficient Solutions
- Verification Sanity in Chiplets & Edge AI: Avoid the “Second Design” Trap
- Embedded Security explained: Cryptographic Hash Functions