Wiemann | Standardized Functional Verification | E-Book | www.sack.de
E-Book

E-Book, Englisch, 276 Seiten

Wiemann Standardized Functional Verification


1. Auflage 2007
ISBN: 978-0-387-71733-3
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 276 Seiten

ISBN: 978-0-387-71733-3
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



The Integrated Circuit (IC) industry has gone without a standardized verification approach for decades. This book defines a uniform, standardizable methodology for verifying the logical behavior of an integrated circuit, whether an I/O controller, a microprocessor, or a complete digital system. This book will help Engineers and managers responsible for IC development to bring a single, standards-based methodology to their R & D efforts, cutting costs and improving results.

Wiemann Standardized Functional Verification jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Preface;5
1.1;What this book is about;7
1.2;What this book is not about;8
1.3;Who should read this book;9
1.4;Scope and Organization of this book;10
2;Acknowledgements;11
3;Table of Contents;12
4;Chapter 1 – A Brief Overview of Functional Verification;17
4.1;1.1 Costs and Risk;17
4.2;1.2 Verification and Time to Market;18
4.3;1.3 Verification and Development Costs;18
4.4;1.4 But any L essons L earned?;19
4.5;1.5 Functional Verification in a Nutshell;20
4.6;1.6 Principles of Constrained Random Verification;21
4.7;1.7 Standardized Functional Verification;22
4.8;1.8 Summary;23
5;Chapter 2 – Analytical Foundation;25
5.1;2.1 A Note on Terminology;25
5.2;2.2 DUTs, DUVs, and Targets;25
5.3;2.3 Linear Algebra for Digital System Verification;26
5.4;2.4 Standard Variables;28
5.5;2.5 Ranges of Variables;29
5.6;2.6 Rules and Guidelines;30
5.7;2.7 Variables of Connectivity;32
5.8;2.8 Variables of Activation;37
5.9;2.9 Variables of Condition;40
5.10;2.10 Morphs;43
5.11;2.11 Variables of Stimulus and Response;45
5.12;2.12 Error Imposition;49
5.13;2.13 Generating Excitement;51
5.14;2.14 Special Cases;51
5.15;2.15 Summary;53
5.16;References;54
6;Chapter 3 – Exploring Functional Space;55
6.1;3.1 Functional Closure;55
6.2;3.2 Counting Function Points;56
6.3;3.3 Condensation in the Functional Space;63
6.4;3.4 Connecting the Dots;66
6.5;3.5 Analyzing an 8-entry Queue;69
6.6;3.6 Reset in the VTG;75
6.7;3.7 Modeling Faulty Behavior;79
6.8;3.8 Back to those Special Cases;80
6.9;3.9 A L ittle Graph Theory;81
6.10;3.10 Reaching Functional Closure;84
6.11;3.11 Summary;86
7;Chapter 4 – Planning and Execution;87
7.1;4.1 Managing Verification Projects;87
7.2;4.2 The Goal;88
7.3;4.3 Executing the Plan to Obtain Results;89
7.4;4.4 Soft Prototype and Hard Prototype;94
7.5;4.5 The Verification Plan;95
7.6;4.6 Instances, Morphs, and Targets (§ 1);97
7.7;4.7 Clock Domain Crossings (§ 1);97
7.8;4.8 Verifying Changes to an Existing Device (§ 1);99
7.9;4.9 Interpretation of the Specification (§ 1);99
7.10;4.10 Instrumenting the Prototype (§ 2);103
7.11;4.11 Standard Results (§ 3);107
7.12;4.12 Setting Goals for Coverage and Risk (§ 4);110
7.13;4.13 Architecture for Verification Software (§ 5);111
7.14;4.14 Change Management (§ 6);126
7.15;4.15 Organizing the Teams (§ 7);127
7.16;4.16 Tracking Progress (§ 8);131
7.17;4.17 Related Documents (§ 9);134
7.18;4.18 Scope, Schedule and Resources (§ 10);134
7.19;4.19 Summary;135
7.20;References;136
8;Chapter 5 – Normalizing Data;137
8.1;5.1 Estimating Project Resources;137
8.2;5.2 Power and Convergence;138
8.3;5.3 Factors to Consider in using Convergence;140
8.4;5.4 Complexity of a Target;142
8.5;5.5 Scaling Regression using Convergence;145
8.6;5.6 Normalizing Cycle Counts with Complexity;149
8.7;5.7 Using Normalized Cycles in Risk Assessment;150
8.8;5.8 Bug Count as a Function of Complexity;151
8.9;5.9 Comparing Size and Complexity;152
8.10;5.10 Summary;152
8.11;References;152
9;Chapter 6 – Analyzing Results;153
9.1;6.1 Functional Coverage;153
9.2;6.2 Standard Results for Analysis;154
9.3;6.3 Statistically Sampling the Function Space;154
9.4;6.4 Measures of Coverage;155
9.5;6.5 Code Coverage;156
9.6;6.6 State Reachability in State Machines;158
9.7;6.7 Arc Transversability in State Machines;159
9.8;6.8 Fault Coverage;159
9.9;6.9 VTG Coverage;160
9.10;6.10 Strong Measures and Weak Measures;160
9.11;6.11 Standard Measures of Function Space Coverage;161
9.12;6.12 Specific Measures and General Measures;162
9.13;6.13 Specific Measures for Quadrant I;164
9.14;6.14 General Measures for Quadrants II, III, and IV;165
9.15;6.15 Multiple Clock Domains;165
9.16;6.16 Views of Coverage;166
9.17;6.17 Standard Views of Functional Coverage;171
9.18;6.18 Summary;172
9.19;References;172
10;Chapter 7 – Assessing Risk;173
10.1;7.1 Making Decisions;173
10.2;7.2 Some Background on Risk Assessment;175
10.3;7.3 Successful Functional Verification;176
10.4;7.4 Knowledge and Risk;180
10.5;7.5 Coverage and Risk;182
10.6;7.6 Data-driven Risk Assessment;183
10.7;7.7 VTG Arc Coverage;184
10.8;7.8 Using Q to Estimate Risk of a Bug;185
10.9;7.9 Bug Count as a Function of Z;190
10.10;7.10 Evaluating Commercial IP;190
10.11;7.11 Evaluating IP for a Single Application;192
10.12;7.12 Nearest Neighbor Analysis;192
10.13;7.13 Summary;195
10.14;References;197
11;Appendix – Functional Space of a Queue;198
11.1;A.1 Basic 8-entry Queue;198
11.2;A.2 Adding an Indirect Condition;201
11.3;A.3 Programmable High- and Low-water Marks;205
11.4;A.4 Size of the Functional Space for this Queue;205
11.5;A.5 Condensation in the Functional Space;206
11.6;A.6 No O ther Variables?;208
11.7;A.7 VTGs for 8-entry Queue with Programmable HWM & LWM;208
12;Index;281



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.