Drawbacks of specifying parameter assignments using defparam, Computer Engineering

Assignment Help:

The disadvantages of specifying parameter assignments using defparam are:

-  Parameter  is  essentially specified  by  the  scope  of  hierarchies  underneath  which  it exists. If a particular module gets ungrouped in its hierarchy, [sometimes necessary during synthesis], then scope to specify the parameter is lost and is unspecified.

-  For instance, if a module is instantiated in a simulation testbench and its internal parameters are  then  overridden  using  hierarchical  defparam  constructs  (For  instance,  defparam U1.U_fifo.width = 32;). Afterwards, when this module is synthesized, internal hierarchy within U1  may  no  longer  exist  in  gate-level  netlist,  relying upon  synthesis  strategy chosen. Hence post-synthesis simulation would fail on the hierarchical defparam override.

 


Related Discussions:- Drawbacks of specifying parameter assignments using defparam

Explain public key encryption, Public Key Encryption A cryptographic sy...

Public Key Encryption A cryptographic system that uses two-keys-a public  key known to everyone and a private or secret key known only to the recipient of the message. An si

Explain the handshaking signals, a. Explain the hardware mechanism for hand...

a. Explain the hardware mechanism for handling multiple interrupt requests. b. What are handshaking signals? Describe the handshake control of data transfer during input and out

Ms access database through menu driven selections, Would you like to easily...

Would you like to easily automate your MS Access database through menu driven selections? This can be accomplished by producing a form with customized buttons that point to macr

Datatype functions for message passing, Q. Datatype Functions for Message P...

Q. Datatype Functions for Message Passing? Datatype: It denotes type of data in message. This field is essential in the sense that MPI supports heterogeneous computing and diff

Authentication system differ from a firewall in functioning, How does an au...

How does an authentication system differ from a firewall in functioning?   Authentication vs. firewall User Authentication and Authorization A significant advanced fi

Define message passing, Q. Define Message Passing? The PVM communicatio...

Q. Define Message Passing? The PVM communication model offers asynchronous blocking receive and asynchronous blocking send and nonblocking receive functions. In our terminology

How is secure sockets layer relied on the certificates, How is Secure Socke...

How is Secure Sockets Layer relied on the certificates? The Secure Sockets Layer standard is not a single protocol, but quite a set of accepted data transfer routines which a

What is the purpose of dotnet, What is the purpose of DOTNET? Dot Net I...

What is the purpose of DOTNET? Dot Net Is a collection of products like C#, ASp.Net, Vb.Net, XML. The purpose of .Net is that we can simply upgrade and degrade our programs whi

Does gimp have scanner support, Yes. It's available on Windows and uses TWA...

Yes. It's available on Windows and uses TWAIN, and on GNU/Linux you constant have a choice among XSane and gnome-scan - both can be used as GIMP plug-ins.

Describe arp message format in brief, Describe ARP message format in brief....

Describe ARP message format in brief.                             0                                        8                                      16

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd