Uiv L2
Uiv L2
Presented By
Dr. V. Vaithianathan
Associate Professor, ECE Dept
Lesson Plan
Sl. No. of
Lecture
No Hours
L1 Core-Level Validation 2
L4 Microprocessor Cores 1
Figure 4.4 Illustration of the use of a bus functional model and bus
monitors to verify core interface.
Protocol Verification
• This approach allows the simulation of interfaces and
transaction protocols on global buses as well as in
point-to-point interfaces when data from one core to
another is transferred directly and not through a
global bus.
• One limitation of this method is that it does not
ensure correct behavior for all possible data values
and for all sequences that each interface would
receive.
• Hence, random data should also be used as part of
the stimulus.
• Use of random data requires special consideration so
that core logic is not forced into an illegal state and
so that illegal data sequences do not occur at the
core’s inputs.
Protocol Verification
• Thus, either during the random data generation a
filter should be used or a checker should be built with
the interface that can suppress illegal data.
• The response checking is done manually because it is
difficult to characterize expected values even when
deterministic data are used for testing.
• Therefore, automatic checking is limited to only
generic results such as checking for illegal output
transactions and state machine loops.
Gate-Level Simulation