Icect 2016 SP 04
Icect 2016 SP 04
Icect 2016 SP 04
International Journal of Science and Applied Information Technology (IJSAIT), Vol.5 , No.1, Pages : 14-19 (2016)
Special Issue of ICECT 2016 - Held on February 01, 2016 in Hyderabad Marriot Hotel & Convention Centre, Hyderabad
http://warse.org/IJSAIT/static/pdf/Issue/icect2016sp04.pdf
Abstract: This proposed research paper is a (open verification methodology) is one such efficient
Multiprocessor system on chip is emerging as a new methodology and best thing about it is, it is free. This
trend for System on chip design but the wire and power ovm is built on system Verilog and used effectively to
design constraints are forcing adoption of new design achieve maintainability, reusability, speed of
methodologies. Researchers pursued a scalable solution verification etc. This project is aimed at building a
to this problem i.e. Network on Chip (NOC). Network reusable test bench for verifying 8 Port Router Protocol
on chip architecture better supports the integration of Bridge by using system Verilog and OV.
SOC consists of on chip packet switched network. Thus
the idea is borrowed from large scale multiprocessors The use of OVM and system Verilog to verify a
and wide area network domain and envisions on chip design and to develop a reusable test bench is explained
routers based network. Cores access the network by in step by step as defined by verification principles and
means of proper interfaces and have their packets methodology. The test bench contains different
forwarded to destination through multichip routing components and each component is again composed of
path. In order to implement a competitive NOC subcomponents, these components and subcomponents
architecture, the router should be efficiently design as it can be reused for the future projects as long as the
is the central component of NOC architecture. Design interface is same.
and Verify the functionality of the “Design and The report is organized as two major portions; first
Verification Four Port Router for Network on Chip” IP part is brief introduction and history of the functional
core using the latest verification methodologies, verification which tells about different technologies,
Hardware Verification Languages and EDA tools and strategies and methodologies used today for
qualify the IP for Synthesis an implementation. verification. Literature survey will contain an organized
The Four Router Design is done by using of the three collection of data from different sources and significant
blocks .the blocks are 8-Bit Register, Router controller changes that took place in the verification and design.
and output block. the router controller is design by using Ovm methodology basics illustrate some of the
FSM design and the output block consists of three fifo’s methodology concepts necessary for understanding of
combined together the fifo’s are store packet of data and the project which assumes a prior knowledge of the
when u want to data that time the data read from the system Verilog language.
FIFO’s. In this router design has three outputs that is 8- Second part is verification plan specifying the
Bit size and one 8_bit data port it using to drive the data verification requirements and approaches to attack the
into router we are using the global clock and reset signals, problem, architecture of the test bench gives complete
and the err signal and suspended data signals are output’s description about the components and sub components
of the router .the FSM controller gives the err and used to achieve the verification goals and also explains
suspended_data_in signals about improvements made in the design of the usb-i2c
Keywords: Network-on-Chip, Simulation Router, bridge, test plan identifies all the test case required to
FIFO, FSM, Register blocks meet the goals and finally results of the project.
1.1 Router
1. INTRODUCTION
The challenge of the verifying a large design is System on chip is a complex interconnection of various
growing exponentially. There is a need to define new functional elements. It creates communication
methods that makes functional verification easy. bottleneck in the gigabit communication due to its bus
Several strategies in the recent years have been based architecture. Thus there was need of system that
proposed to achieve good functional verification with explicit modularity and parallelism, network on chip
less effort. Recent advancement towards this goal is possess many such attractive properties and solve the
methodologies. The methodology defines a skeleton problem of communication bottleneck. It basically
over which one can add flesh and skin to their works on the idea of interconnection of cores using on
requirements to achieve functional verification. OVM chip network.
14
ISSN 2278-3083
International Journal of Science and Applied Information Technology (IJSAIT), Vol.5 , No.1, Pages : 14-19 (2016)
Special Issue of ICECT 2016 - Held on February 01, 2016 in Hyderabad Marriot Hotel & Convention Centre, Hyderabad
http://warse.org/IJSAIT/static/pdf/Issue/icect2016sp04.pdf
The communication on network on chip is There are many other useful features, but these
carried out by means of router, so for implementing allow you to create test benches at a higher level of
better NOC, the router should be efficiently design. abstraction than you are able to achieve with an HDL or
This router supports four parallel connections at the a programming language such as C.
same time. It uses store and forward type of flow
control and Fsm Controller deterministic routing which 2.2 Svm Verification Component (Svc)
improves the performance of router. The switching
mechanism used here is packet switching which is
generally used on network on chip. The following subsections describe the components of
A router is a device that forwards data packets across an SVC:
computer networks. Routers perform the data "traffic
Data Item (Transaction)
direction" functions on the Internet. A router is a
microprocessor-controlled device that is connected to Driver (BFM)
two or more data lines from different networks. When a Sequencer
data packet comes in on one of the lines. the router Monitor(Receiver)
reads the address information in the packet to determine Generator
its ultimate destination. Then, using information in its Environment
routing table, it directs the packet to the next network The environment is the top-level component of the
on its journey SVC. It contains one or more agents, as well as other
components such as a bus monitor. The env contains
2. FOUR PORT ROUTER configuration properties that enable you to customize
the topology and behaviour and make it reusable. For
The router is a” Four Port Network Router” has a one example, active agents can be changed into passive
input port from which the packet enters. It has three agents when the verification environment is reused in
output ports where the packet is driven out. Packet system verification. Figure 1-2 on page 15 illustrates
contains 3 parts. They are Header, data and frame check the structure of a reusable verification environment.
sequence. Packet width is 8 bits and the length of the Notice that an OVC may contain an environment-level
packet can be between 1 bytes to 64 bytes. Packet monitor. This bus-level monitor performs checking and
header contains three fields DAand length.Destination coverage for activities that are not necessarily related to
address (DA) of the packet is of 8 bits. The switch a single agent. An agent’s monitors can leverage data
drives the packet to respective ports based on this and events collected by the global monitor.
destination address of the packets. Each output port has
8-bit unique port address. If the destination address of The environment class (ovm_env) is architected to
the packet matches the port address, then switch drives provide a flexible, reusable, and extendable verification
the packet to the output port, Length of the data is of 8 component. The main function of the environment class
bits and from 0 to 63. Length is measured in terms of is to model behaviour by generating constrained-
bytes. Data should be in terms of bytes and can take random traffic, monitoring DUT responses, checking
anything. Frame check sequence contains the security the validity of the protocol activity, and collecting
check of the packet. It is calculated over the header and coverage
data.
15
ISSN 2278-3083
International Journal of Science and Applied Information Technology (IJSAIT), Vol.5 , No.1, Pages : 14-19 (2016)
Special Issue of ICECT 2016 - Held on February 01, 2016 in Hyderabad Marriot Hotel & Convention Centre, Hyderabad
http://warse.org/IJSAIT/static/pdf/Issue/icect2016sp04.pdf
Developing Reusable System Verilog Verification The tests are not reusable because they
Components (SVCs) This section describes the basic rely on a specific environment structure.
concepts and components that make up a typical
verification environment. It also shows how to combine
these components using a proven hierarchical
architecture to create reusable OVCs. The sections
follow the same order you should follow when
developing an OVC:
I. Modeling Data Items for Generation Data
items
II. Creating the Driver
III. Creating the Monitor
IV. Instantiating Components
V. Creating the Environment
Ovm Configuration Mechanism
An SVC is created on a per-protocol basis for
general purpose protocol related use. It may support Figure 1.1 Complete block diagram of verification
various features or operation modes that are not
required in a particular project. OVM provides a Environment
standard configuration mechanism which allows you to
define the SVC’s configuration to suit the current Router Design Principles
project’s requirements. The SVC can get the
configuration during run time or during the build Router is a packet based protocol. Router drives the
process. Doing this during the build allows you to incoming packet which comes from the input port to
16
ISSN 2278-3083
International Journal of Science and Applied Information Technology (IJSAIT), Vol.5 , No.1, Pages : 14-19 (2016)
Special Issue of ICECT 2016 - Held on February 01, 2016 in Hyderabad Marriot Hotel & Convention Centre, Hyderabad
http://warse.org/IJSAIT/static/pdf/Issue/icect2016sp04.pdf
output ports based on the address contained in the ROUTER INPUT PROTOCOL
packet.The router has a one input port from which the
packet enters. It has three output ports where the packet The characteristics of the DUV input protocol are as
is driven out. The router has an active low synchronous follows:
input reset which resets the router.
17
ISSN 2278-3083
International Journal of Science and Applied Information Technology (IJSAIT), Vol.5 , No.1, Pages : 14-19 (2016)
Special Issue of ICECT 2016 - Held on February 01, 2016 in Hyderabad Marriot Hotel & Convention Centre, Hyderabad
http://warse.org/IJSAIT/static/pdf/Issue/icect2016sp04.pdf
The Router blocks are The below figures shows the simulation results
Register of test cases applied to the DUT. Figure 4.3 shows the
Router controller(FSM) response of the device for the control test case at the
FIFO Output Block usb interface. Figure 4.2 shows the master transmitter
sending random data to the external slave device.
SYNTHESIS REPORT
18
ISSN 2278-3083
International Journal of Science and Applied Information Technology (IJSAIT), Vol.5 , No.1, Pages : 14-19 (2016)
Special Issue of ICECT 2016 - Held on February 01, 2016 in Hyderabad Marriot Hotel & Convention Centre, Hyderabad
http://warse.org/IJSAIT/static/pdf/Issue/icect2016sp04.pdf
19