Drawbacks of specifying parameter assignments using defparam, Computer Engineering

Assignment Help:

The disadvantages of specifying parameter assignments using defparam are:

-  Parameter  is  essentially specified  by  the  scope  of  hierarchies  underneath  which  it exists. If a particular module gets ungrouped in its hierarchy, [sometimes necessary during synthesis], then scope to specify the parameter is lost and is unspecified.

-  For instance, if a module is instantiated in a simulation testbench and its internal parameters are  then  overridden  using  hierarchical  defparam  constructs  (For  instance,  defparam U1.U_fifo.width = 32;). Afterwards, when this module is synthesized, internal hierarchy within U1  may  no  longer  exist  in  gate-level  netlist,  relying upon  synthesis  strategy chosen. Hence post-synthesis simulation would fail on the hierarchical defparam override.

 


Related Discussions:- Drawbacks of specifying parameter assignments using defparam

What is multiplicity, What is multiplicity? Multiplicity is applied to ...

What is multiplicity? Multiplicity is applied to attributes for data base application. Multiplicity for an attribute specifies the number of possible value for every instantiat

Explain file transfer protocol, Explain File Transfer Protocol . FTP is ...

Explain File Transfer Protocol . FTP is utilized to exchange files among computer accounts, to transfer files among an account and a desktop computer (upload) or to access softw

Illustrates several names of popular internet browsers, Illustrates several...

Illustrates several names of popular internet browsers? Popular Internet Browsers are: Internet Explorer, Netscape Navigator and Mosaic, Google chrome and Mozilla and Opera.

Control-centered virtual manufacturing, Control-Centered Virtual Manufactur...

Control-Centered Virtual Manufacturing This is the addition of simulations to control actual processes and models, permitting for seamless simulation for optimization throughou

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a

Evaluate - 48 - 23 by using the 2's complement method, Perform the - 48 - 2...

Perform the - 48 - 23 operations using the 2's complement method. Ans. - 48 - 23 = - 48 + (-23)     -48     =  1 1 0 1 0 0 0 0     -23     =  1 1 1 0 1 0 0 1       = -71

What is meant by common control, What is meant by common control? In se...

What is meant by common control? In several switching systems, the control subsystem may be an integral part of the switching network itself. This system is termed as direct co

Explain dead code elimination, Explain briefly Dead code Elimination of the...

Explain briefly Dead code Elimination of the commonly used code optimization techniques Dead code Elimination: Code which is unreachable or which does not influence the pr

Determine the term queries-DBMS, Determine the term Queries-DBMS Querie...

Determine the term Queries-DBMS Queries most commonly allow information to be retrieved from tables. As the information is often spread across numerous tables, queries allow it

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd