State about the directed-test methodology, Computer Engineering

Assignment Help:

Directed-Test Methodology

Building a directed verification environment with a comprehensive set of directed tests is very time-consuming and difficult. As directed tests only cover conditions which have been anticipated by verification team, they do a poor job of covering corner cases. This can result in costly re-spins or, worse still, missed market windows. conventionally  verification  IP  works  in  a  directed-test  environment  by  acting  on  specific  testbench.

Commands  like read,  write  or  burst  to  generate  transactions  for  whichever  protocol  is  being tested. This directed traffic is used to verify that an interface acts as expected in response to valid transactions  and  error  conditions.  Drawback  is  that,  in  this  directed  methodology,  task  of writing  the  command  code  and  checking  responses  across  the  full  breadth  of  a  protocol  is  an overwhelming  task.  Verification  team  frequently  runs  out  of  time  before  a  mandated  tape-out date, resulting in poorly tested interfaces. Though, the bigger issue is that directed tests only test for predicted behaviour and it is essentially the unforeseen which trips up design teams and leads to extremely costly bugs found in silicon.

 


Related Discussions:- State about the directed-test methodology

What is tri-state logic, What is Tri-state logic ? Ans. Tri-state Logi...

What is Tri-state logic ? Ans. Tri-state Logic: In common logic circuits, there are two states of the output, as LOW and HIGH. If the output is not in the LOW state, this

Determine the advantages of sixth generation computers, Determine the advan...

Determine the advantages of sixth generation computers One of the major dramatic changes in sixth generation will be the explosive growth of wide area networking. Network bandw

Mating - canonical genetic algorithm, Mating: Therefore once our GA ag...

Mating: Therefore once our GA agent has chosen the individuals lucky sufficient as actually there  fit enough to produce offspring then we next determine how they are going to

What are pages, What are pages? All programs and date are composed of f...

What are pages? All programs and date are composed of fixed length units known as pages. Each page consists of blocks of words that occupy contiguous locations in main memory

What is the purpose of zero (z) flag and carry (c) flag, What is the purpos...

What is the purpose of zero (z) flag and carry (c) flag? Carry flag holds the carry after addition or the borrow after subtraction. Carry flag also indicates error conditions,

Advantages of edi (electronic data interchange), Advantages of EDI 1.  ...

Advantages of EDI 1.  EDI replaces paper transactions with electronic transactions therefore it saves times and speeds up transactions. 2.  It gives a legal record of busine

Learning algorithm for multi-layered networks, Learning algorithm for multi...

Learning algorithm for multi-layered networks: Furthermore details we see that  if S is too high, the contribution from w i * x i is reduced. It means that t(E) - o(E) is mu

Exponential search, Exponential Search Another alternative to variable ...

Exponential Search Another alternative to variable size decrease-and-conquer search is known as exponential search. This algorithm begins searching at the beginning of the list

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd