SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
Design Verification: The Past,
       Present and Future

       Sean Smith, Juniper Networks, RTP,
       NC




1 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Agenda

   Introduction to Sean & Juniper
   A little background on DV Past
   An overview of where DV is today?
   Where is DV Going?
   Summary and Q&A


2 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Who is Juniper at a Glance?
                Snapshot:
                     Founded: 1996
                    NASDAQ: JNPR
                      Headquarters:
                     Sunnyvale, CA
SECTION Employees: 7,000
         TITLE
WITH IMAGEemployees in
                             offices in 47
                              countries.

                          Customer Profile:
                          We serve the top
                          100 global service
                            providers more
                               than 30,000
                         enterprises, as well
                            as hundreds of
                               government
3 |   Copyright © 2009 Juniperagencies and
                              Networks, Inc. | www.juniper.net
DV: The Past

    DV has been a tremendously evolutionary field
        –   As recent as 15 years ago
        –   There was little research on DV
        –   There were no published texts on DV (until 2000)
        –   A large void compared to logic design.
        –   Considered by many to be the n00b job
    Common DV Techniques
        –   Visual inspection
        –   Diff the golden log files
        –   Directed self checking tests
        –   Code coverage was in its infancy
        –   C++ was a common choice in the high end

4 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
DV: The Present

  Wow! DV has Evolved!
      –   Lots of research on DV including DV centric conference
      –   Dozens of published texts
      –   Still a void compared to logic design but narrowing
      –   Not necessarily a newbie job but there is a delta in
          compensation & respect
  Common DV Techniques
      –   Self checking constrained random
      –   Objective metrics for measuring completeness
      –   Static verification has become almost mainstream
      –   SystemVerilog provided the unification


5 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
DV: The Future

  How are we going to deal with capacity?
      – Current simulation techniques are running out steam?
      – Emulation?
      – Formal?
  How can we be smarter about reaching our
   verification goals?
  Are the traditional problems where we should be
   focusing our energy?




6 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Dynamic Simulation Challenges

  Closing Coverage…

                               out_0           4 x 4 Switch              in_0

                               out_1                                     in_1
                                                   Routing Table
                                                  mac_addr dst_port
                               out_2               0x0100     0          in_2
                                                   0x0200     1
                                                   0x0300     2

                               out_3
                                                   0x0400     3
                                                                         in_3



                                Packet Format
                                                                    data        crc
                                    dst          src       len
                                                                 0x0102030   0x9bdbc90
                                   0x100        0x500       2
                                                                     4           0




7 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Closing coverage continued…

  Constrained random tests are generally not
   coverage aware so they generate a lot of duplicate
   transactions….
  New Approaches are emerging to try and automate
   coverage specification and closure!
      – Graph and Genetic based algorithms for stimulus and
        coverage generation.
      – Algorithms to mutate stimulus code
      – Context aware simulators
      – Formal Verification




8 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Formal Targeted ROI and Applications
Formal Application                     Examples                    Resource    Risk     TTM       ROI
      Area                                                          Impact    Impact   Impact
Architectural          Communications       Cache coherency
verification           and bus                                                 High   High     High
                       architecture
RTL design and         Designer             X-propagation
                                                                     High
debug                  sandbox               detection                                 High     High
                       Register             Connectivity check
                       verification
Proofs of critical     Packet integrity     Error correction
functionality/         Multi-processor      Protocol
                                                                     High     High    High    High
Verification           coherence             certification
                       Flow control         Token leakage
                                             Regression test
Verification of low-   Power                Power shutoff
                                                                               High
power modes            architecture          isolation cells                                    Medium
                       Clock gating
Post-silicon debug     Root cause bugs      Validate fixes         High              High
                                                                                                Varies




9 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
DV: The Future

   But are there bigger looming challenges?
   We need to step back and consider the big picture.
       – The goal of verification is deliver a quality product to
         market in a timely fashion.
       – There is an increasing software component of silicon
         and systems we build.
       – There is also the redundancy of pre versus post silicon
         verification.
   The future of DV is much broader than the current
    focus!



10 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Reuse Starts with Specification

   IP blocks need consistent specification format
       – Ensure quick and easy integration into SOC level
         reference manual, users guides, and programmers
         guides
       – Modular & consistent document structure, formatting,
         look and feel are key
       – Need to minimize hand editing when going from block to
         SOC
   Standards like IP-Xact and SystemRDL from the
    SPIRIT Consortium are driving the future.




11 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
SPIRIT and SystemRDL
        SystemRDL is a language for specifying register
         architectures and implimentations.
        SPIRIT Consortium has accepted the donation of
         SystemRDL on May 21, 2007
        On May 18th 2009, The SystemRDL 1.0 standard
         was released.


                               http://www.spiritconsortium.org/




12 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Traditional CSR Flow
                Requirement Change                                Requirement change due to area,
                  From Marketing                                 Timing, or Physical Design Concern




                                              Architect Writes Specification

       B                                                                                              B
       u                                                                                              u
       g                                                                                              g
                            Verification Eng             Design Eng         Software Eng
       F                      Codes HVL                  Codes HDL            Codes C                 F
       o                                                                                              o
       u                                                                                              u
       n                                                                                              n
       d                  DV Verifies Design                                                          d
                                                                           Software Eng
                                                                          Writes Firmware
                                                                          Or Device Driver

                                DONE??
                             Hope All Match!


13 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Challenges with Traditional CSR Flow

   Resource intensive
       – Multiple engineers creating same/similar content
       – Very tedious and time consuming work
   Difficult to manage changes in architecture
   Doesn’t enable common look and feel
   Manual nature of process lends to low quality
       – Specification != HDL != HVL
       – Manual test cases creation for DV
       – Doc updates postponed due to pain factor

     Low Reuse + Tedious Work = Low Quality/Productivity

14 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Register Compiler Architecture
                SystemRDL™




                                          Register Compiler




           RTL                        C Code                   HVL Code          Unformatted
      for Synthesis                for Firmware             for Verification    Documentation


                                                                                    Word            Style
                                                                                  Processor         Sheet




      Hardware                       Software                    Functional                   Generated
      Design                         Development                 Verification                 Documentation


15 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
www.spiritconsortium.org

   Simple high level syntax defines registers
       // This register is a inline register definition.
       // It defines a simple ID register. A flip-flop is implemented
       //
       reg chip_id_r {
          name = "This chip part number and revision #";
          desc = "This register contains the part # and revision # for
                   XYZ ASIC";
          field {
            hw    = rw; // This combination of attr creates a flip flop
            sw    = r;
            desc = "This field represents the chips part number";
          } part_num[28] = 28'h12_34_56_7;
       };



16 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Defining reusable components in SystemRDL

         field intr_field_f {
            desc = “Some Status Field";
            level intr; // Level Sensitive Interrupt
         };

         field count_field_f {   // Anonymous Generic Counter.
              hw   = w; sw = rw; rclr; counter;
              desc = "Number of certain packet type seen";
         };


          Here we define a couple of field types that we will use
          on the next slide. This can be used to create
          templates to ensure common architecture and reuse.

17 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
www.systemrdl.org
        reg vc_pkt_count_r {
           count_field_f vc_count[29:0]=0x0;
           field { desc="VC is Active"; } active;
           intr_field_f cntr_overflow=0;
           cntr_overflow->next = vc_count->overflow;
        };

        addrmap some_register_map {
          chip_id_r chip_id @0x0110;

          external vc_pkt_count_r vc_pkt_count[256]
                   @0x200 +=0x10; // External Interface
        }; // End some_register_map


18 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Automate ESL/TLM Creation
          Auto Generated
          c/c++ Headers,
          Classes, & HAL


                                                    SystemC TLM Model of DUT



          DUT Test Bench
                or
            Firmware                                                Behavioral Model
                                          Automatically Generated
                or                                                        Of
                                           System TLM of CSRs
           Device Driver                                            DUT Functionality
                Or
          Complete RTOS




19 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Closing Thoughts…..

     Verification has come a long way and has a
      promising future.
     Speed and Capacity are becoming real bottlenecks
      for traditional approaches.
     More focus needs to be placed on co-verification
      and verification portability.
     SystemRDL and IP-Xact are pragmatic languages
      that provide benefits to many aspects of ASIC/SOC
      creation.



20 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
Juniper advantage

   The POWER of




             Architecture                      Operating System   Open Network
                          •••




21 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net

Weitere ähnliche Inhalte

Was ist angesagt?

An Automation Support for Creating Configurable Process Models
An Automation Support for Creating Configurable Process ModelsAn Automation Support for Creating Configurable Process Models
An Automation Support for Creating Configurable Process ModelsWassim Derguech
 
OW2 Petals Dragon SOA Linuxtag09
OW2 Petals Dragon SOA Linuxtag09OW2 Petals Dragon SOA Linuxtag09
OW2 Petals Dragon SOA Linuxtag09Catherine Nuel
 
The Open Splice.Org Community
The Open Splice.Org CommunityThe Open Splice.Org Community
The Open Splice.Org CommunityAngelo Corsaro
 
Tweeting with OpenSplice DDS
Tweeting with OpenSplice DDSTweeting with OpenSplice DDS
Tweeting with OpenSplice DDSAngelo Corsaro
 
Pistoia presentation bio it-worldexpo 21april2010
Pistoia presentation   bio it-worldexpo 21april2010Pistoia presentation   bio it-worldexpo 21april2010
Pistoia presentation bio it-worldexpo 21april2010Nick Lynch
 
MSc rjfg V1
MSc rjfg V1MSc rjfg V1
MSc rjfg V1rodofg
 
NETWORKS OF CENTRES OF EXCELLENCE LETTER OF INTENT
NETWORKS OF CENTRES OF EXCELLENCE LETTER OF INTENTNETWORKS OF CENTRES OF EXCELLENCE LETTER OF INTENT
NETWORKS OF CENTRES OF EXCELLENCE LETTER OF INTENTcrysatal16
 
Presentation: Webinar S2 Extensions Demystified
Presentation: Webinar S2 Extensions DemystifiedPresentation: Webinar S2 Extensions Demystified
Presentation: Webinar S2 Extensions DemystifiedNewtec
 
OpenStack Summit Portland April 2013 talk - Quantum and EC2
OpenStack Summit Portland April 2013 talk - Quantum and EC2OpenStack Summit Portland April 2013 talk - Quantum and EC2
OpenStack Summit Portland April 2013 talk - Quantum and EC2Naveen Joy
 
Kuldeep presentation ppt
Kuldeep presentation pptKuldeep presentation ppt
Kuldeep presentation pptkuldeep khichar
 
ApacheCon Europe 2012 - Real Time Big Data in practice with Cassandra
ApacheCon Europe 2012 - Real Time Big Data in practice with CassandraApacheCon Europe 2012 - Real Time Big Data in practice with Cassandra
ApacheCon Europe 2012 - Real Time Big Data in practice with CassandraMichaël Figuière
 
KCOM Group Corporate Brochure
KCOM Group Corporate BrochureKCOM Group Corporate Brochure
KCOM Group Corporate BrochureKCOMRecruitment
 
NoSQL Matters 2012 - Real Time Big Data in practice with Cassandra
NoSQL Matters 2012 - Real Time Big Data in practice with CassandraNoSQL Matters 2012 - Real Time Big Data in practice with Cassandra
NoSQL Matters 2012 - Real Time Big Data in practice with CassandraMichaël Figuière
 
2005 Datang Mobile & TD-SCDMA
2005 Datang Mobile & TD-SCDMA 2005 Datang Mobile & TD-SCDMA
2005 Datang Mobile & TD-SCDMA tdd.pek
 
Nagios Conference 2012 - John Murphy - Rational Configuration Design
Nagios Conference 2012 - John Murphy - Rational Configuration DesignNagios Conference 2012 - John Murphy - Rational Configuration Design
Nagios Conference 2012 - John Murphy - Rational Configuration DesignNagios
 
Jeremy Haycock from Damco; ‘Globalize the Supply Chain: Establish a truly glo...
Jeremy Haycock from Damco; ‘Globalize the Supply Chain: Establish a truly glo...Jeremy Haycock from Damco; ‘Globalize the Supply Chain: Establish a truly glo...
Jeremy Haycock from Damco; ‘Globalize the Supply Chain: Establish a truly glo...eyefortransport
 
MMS Profile for Web Services
MMS Profile for Web ServicesMMS Profile for Web Services
MMS Profile for Web ServicesAbhijeet Ranadive
 

Was ist angesagt? (20)

An Automation Support for Creating Configurable Process Models
An Automation Support for Creating Configurable Process ModelsAn Automation Support for Creating Configurable Process Models
An Automation Support for Creating Configurable Process Models
 
OW2 Petals Dragon SOA Linuxtag09
OW2 Petals Dragon SOA Linuxtag09OW2 Petals Dragon SOA Linuxtag09
OW2 Petals Dragon SOA Linuxtag09
 
The Open Splice.Org Community
The Open Splice.Org CommunityThe Open Splice.Org Community
The Open Splice.Org Community
 
Tweeting with OpenSplice DDS
Tweeting with OpenSplice DDSTweeting with OpenSplice DDS
Tweeting with OpenSplice DDS
 
Data Host
Data HostData Host
Data Host
 
Pistoia presentation bio it-worldexpo 21april2010
Pistoia presentation   bio it-worldexpo 21april2010Pistoia presentation   bio it-worldexpo 21april2010
Pistoia presentation bio it-worldexpo 21april2010
 
MSc rjfg V1
MSc rjfg V1MSc rjfg V1
MSc rjfg V1
 
Populace+
Populace+Populace+
Populace+
 
NETWORKS OF CENTRES OF EXCELLENCE LETTER OF INTENT
NETWORKS OF CENTRES OF EXCELLENCE LETTER OF INTENTNETWORKS OF CENTRES OF EXCELLENCE LETTER OF INTENT
NETWORKS OF CENTRES OF EXCELLENCE LETTER OF INTENT
 
Presentation: Webinar S2 Extensions Demystified
Presentation: Webinar S2 Extensions DemystifiedPresentation: Webinar S2 Extensions Demystified
Presentation: Webinar S2 Extensions Demystified
 
OpenStack Summit Portland April 2013 talk - Quantum and EC2
OpenStack Summit Portland April 2013 talk - Quantum and EC2OpenStack Summit Portland April 2013 talk - Quantum and EC2
OpenStack Summit Portland April 2013 talk - Quantum and EC2
 
Kuldeep presentation ppt
Kuldeep presentation pptKuldeep presentation ppt
Kuldeep presentation ppt
 
ApacheCon Europe 2012 - Real Time Big Data in practice with Cassandra
ApacheCon Europe 2012 - Real Time Big Data in practice with CassandraApacheCon Europe 2012 - Real Time Big Data in practice with Cassandra
ApacheCon Europe 2012 - Real Time Big Data in practice with Cassandra
 
KCOM Group Corporate Brochure
KCOM Group Corporate BrochureKCOM Group Corporate Brochure
KCOM Group Corporate Brochure
 
NoSQL Matters 2012 - Real Time Big Data in practice with Cassandra
NoSQL Matters 2012 - Real Time Big Data in practice with CassandraNoSQL Matters 2012 - Real Time Big Data in practice with Cassandra
NoSQL Matters 2012 - Real Time Big Data in practice with Cassandra
 
2005 Datang Mobile & TD-SCDMA
2005 Datang Mobile & TD-SCDMA 2005 Datang Mobile & TD-SCDMA
2005 Datang Mobile & TD-SCDMA
 
Nagios Conference 2012 - John Murphy - Rational Configuration Design
Nagios Conference 2012 - John Murphy - Rational Configuration DesignNagios Conference 2012 - John Murphy - Rational Configuration Design
Nagios Conference 2012 - John Murphy - Rational Configuration Design
 
Jeremy Haycock from Damco; ‘Globalize the Supply Chain: Establish a truly glo...
Jeremy Haycock from Damco; ‘Globalize the Supply Chain: Establish a truly glo...Jeremy Haycock from Damco; ‘Globalize the Supply Chain: Establish a truly glo...
Jeremy Haycock from Damco; ‘Globalize the Supply Chain: Establish a truly glo...
 
OpenSplice DDS v6
OpenSplice DDS v6OpenSplice DDS v6
OpenSplice DDS v6
 
MMS Profile for Web Services
MMS Profile for Web ServicesMMS Profile for Web Services
MMS Profile for Web Services
 

Andere mochten auch

A Practical Look at SystemVerilog Coverage
A Practical Look at SystemVerilog CoverageA Practical Look at SystemVerilog Coverage
A Practical Look at SystemVerilog CoverageDVClub
 
Cell Verification Lead
Cell Verification LeadCell Verification Lead
Cell Verification LeadDVClub
 
The Validation Attitude
The Validation AttitudeThe Validation Attitude
The Validation AttitudeDVClub
 
Cost Evaluation for Adopting Formal Property Checking
Cost Evaluation for Adopting Formal Property CheckingCost Evaluation for Adopting Formal Property Checking
Cost Evaluation for Adopting Formal Property CheckingDVClub
 
Progetto mattoni il patient file, un impegno per tutti i professionisti ec...
Progetto mattoni  il patient file, un impegno per tutti i professionisti   ec...Progetto mattoni  il patient file, un impegno per tutti i professionisti   ec...
Progetto mattoni il patient file, un impegno per tutti i professionisti ec...Carlo Brachelente
 
第2回別府路地裏バル参加店説明会用
第2回別府路地裏バル参加店説明会用第2回別府路地裏バル参加店説明会用
第2回別府路地裏バル参加店説明会用Kuniaki Kadowaki
 
Emulation on Your Desktop
Emulation on Your Desktop Emulation on Your Desktop
Emulation on Your Desktop DVClub
 
Zelena knjiznica. Sjemenarski suverenitet
Zelena knjiznica. Sjemenarski suverenitetZelena knjiznica. Sjemenarski suverenitet
Zelena knjiznica. Sjemenarski suverenitetivankraljevic
 

Andere mochten auch (13)

A Practical Look at SystemVerilog Coverage
A Practical Look at SystemVerilog CoverageA Practical Look at SystemVerilog Coverage
A Practical Look at SystemVerilog Coverage
 
Cell Verification Lead
Cell Verification LeadCell Verification Lead
Cell Verification Lead
 
AM37x EVM
AM37x EVM AM37x EVM
AM37x EVM
 
Resume yaser english
Resume yaser englishResume yaser english
Resume yaser english
 
The Validation Attitude
The Validation AttitudeThe Validation Attitude
The Validation Attitude
 
Cost Evaluation for Adopting Formal Property Checking
Cost Evaluation for Adopting Formal Property CheckingCost Evaluation for Adopting Formal Property Checking
Cost Evaluation for Adopting Formal Property Checking
 
Progetto mattoni il patient file, un impegno per tutti i professionisti ec...
Progetto mattoni  il patient file, un impegno per tutti i professionisti   ec...Progetto mattoni  il patient file, un impegno per tutti i professionisti   ec...
Progetto mattoni il patient file, un impegno per tutti i professionisti ec...
 
Certificate_2
Certificate_2Certificate_2
Certificate_2
 
第2回別府路地裏バル参加店説明会用
第2回別府路地裏バル参加店説明会用第2回別府路地裏バル参加店説明会用
第2回別府路地裏バル参加店説明会用
 
Rat race
Rat raceRat race
Rat race
 
Emulation on Your Desktop
Emulation on Your Desktop Emulation on Your Desktop
Emulation on Your Desktop
 
Zelena knjiznica. Sjemenarski suverenitet
Zelena knjiznica. Sjemenarski suverenitetZelena knjiznica. Sjemenarski suverenitet
Zelena knjiznica. Sjemenarski suverenitet
 
Tim Dreisbach
Tim DreisbachTim Dreisbach
Tim Dreisbach
 

Ähnlich wie Design Verification: The Past, Present and Futurere

Big Picture Resume Philip Langton2010
Big Picture Resume Philip Langton2010Big Picture Resume Philip Langton2010
Big Picture Resume Philip Langton2010philip_langton
 
Introducing LCS to Digital Design Verification
Introducing LCS to Digital Design VerificationIntroducing LCS to Digital Design Verification
Introducing LCS to Digital Design VerificationDaniele Loiacono
 
“Trends in Neural Network Topologies for Vision at the Edge,” a Presentation ...
“Trends in Neural Network Topologies for Vision at the Edge,” a Presentation ...“Trends in Neural Network Topologies for Vision at the Edge,” a Presentation ...
“Trends in Neural Network Topologies for Vision at the Edge,” a Presentation ...Edge AI and Vision Alliance
 
QoS for Media Networks
QoS for Media NetworksQoS for Media Networks
QoS for Media NetworksAmine Choukir
 
Service Testing & Virtualization in an Enterprise Environments
Service Testing & Virtualization in an Enterprise EnvironmentsService Testing & Virtualization in an Enterprise Environments
Service Testing & Virtualization in an Enterprise EnvironmentsDevOps for Enterprise Systems
 
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential_e
 
2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservicedevopsdaysaustin
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosBrent Salisbury
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
Lessons from Large-Scale Cloud Software at Databricks
Lessons from Large-Scale Cloud Software at DatabricksLessons from Large-Scale Cloud Software at Databricks
Lessons from Large-Scale Cloud Software at DatabricksMatei Zaharia
 
Big datadc skyfall_preso_v2
Big datadc skyfall_preso_v2Big datadc skyfall_preso_v2
Big datadc skyfall_preso_v2abramsm
 
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptxTrack 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptxAmazon Web Services
 
Istio Service Mesh
Istio Service MeshIstio Service Mesh
Istio Service MeshLew Tucker
 
Efficient_traffic_handling_using_provider_briding_802.1ad
Efficient_traffic_handling_using_provider_briding_802.1adEfficient_traffic_handling_using_provider_briding_802.1ad
Efficient_traffic_handling_using_provider_briding_802.1adVivek Gnanavelu
 
Solace Systems The Evolution of Messaging The Rise of the Appliance
Solace Systems The Evolution of Messaging The Rise of the ApplianceSolace Systems The Evolution of Messaging The Rise of the Appliance
Solace Systems The Evolution of Messaging The Rise of the ApplianceIosif Itkin
 
Extent 2013 Obninsk High Performance Messaging
Extent 2013 Obninsk High Performance MessagingExtent 2013 Obninsk High Performance Messaging
Extent 2013 Obninsk High Performance Messagingextentconf Tsoy
 

Ähnlich wie Design Verification: The Past, Present and Futurere (20)

Big Picture Resume Philip Langton2010
Big Picture Resume Philip Langton2010Big Picture Resume Philip Langton2010
Big Picture Resume Philip Langton2010
 
Introducing LCS to Digital Design Verification
Introducing LCS to Digital Design VerificationIntroducing LCS to Digital Design Verification
Introducing LCS to Digital Design Verification
 
“Trends in Neural Network Topologies for Vision at the Edge,” a Presentation ...
“Trends in Neural Network Topologies for Vision at the Edge,” a Presentation ...“Trends in Neural Network Topologies for Vision at the Edge,” a Presentation ...
“Trends in Neural Network Topologies for Vision at the Edge,” a Presentation ...
 
QoS for Media Networks
QoS for Media NetworksQoS for Media Networks
QoS for Media Networks
 
Service Testing & Virtualization in an Enterprise Environments
Service Testing & Virtualization in an Enterprise EnvironmentsService Testing & Virtualization in an Enterprise Environments
Service Testing & Virtualization in an Enterprise Environments
 
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
 
2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow Demos
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
Lessons from Large-Scale Cloud Software at Databricks
Lessons from Large-Scale Cloud Software at DatabricksLessons from Large-Scale Cloud Software at Databricks
Lessons from Large-Scale Cloud Software at Databricks
 
Big datadc skyfall_preso_v2
Big datadc skyfall_preso_v2Big datadc skyfall_preso_v2
Big datadc skyfall_preso_v2
 
Lafauci dv club oct 2006
Lafauci dv club oct 2006Lafauci dv club oct 2006
Lafauci dv club oct 2006
 
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptxTrack 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
Track 2 Session 4_全民直播時代的多CDN監控與觀看體驗最佳化.pptx
 
Ankit Vakil (1)
Ankit Vakil (1)Ankit Vakil (1)
Ankit Vakil (1)
 
Istio Service Mesh
Istio Service MeshIstio Service Mesh
Istio Service Mesh
 
The changing face of video conferencing
The changing face of video conferencingThe changing face of video conferencing
The changing face of video conferencing
 
Efficient_traffic_handling_using_provider_briding_802.1ad
Efficient_traffic_handling_using_provider_briding_802.1adEfficient_traffic_handling_using_provider_briding_802.1ad
Efficient_traffic_handling_using_provider_briding_802.1ad
 
Solace Systems The Evolution of Messaging The Rise of the Appliance
Solace Systems The Evolution of Messaging The Rise of the ApplianceSolace Systems The Evolution of Messaging The Rise of the Appliance
Solace Systems The Evolution of Messaging The Rise of the Appliance
 
Extent 2013 Obninsk High Performance Messaging
Extent 2013 Obninsk High Performance MessagingExtent 2013 Obninsk High Performance Messaging
Extent 2013 Obninsk High Performance Messaging
 
10 fn s16
10 fn s1610 fn s16
10 fn s16
 

Mehr von DVClub

IP Reuse Impact on Design Verification Management Across the Enterprise
IP Reuse Impact on Design Verification Management Across the EnterpriseIP Reuse Impact on Design Verification Management Across the Enterprise
IP Reuse Impact on Design Verification Management Across the EnterpriseDVClub
 
Cisco Base Environment Overview
Cisco Base Environment OverviewCisco Base Environment Overview
Cisco Base Environment OverviewDVClub
 
Intel Xeon Pre-Silicon Validation: Introduction and Challenges
Intel Xeon Pre-Silicon Validation: Introduction and ChallengesIntel Xeon Pre-Silicon Validation: Introduction and Challenges
Intel Xeon Pre-Silicon Validation: Introduction and ChallengesDVClub
 
Verification of Graphics ASICs (Part II)
Verification of Graphics ASICs (Part II)Verification of Graphics ASICs (Part II)
Verification of Graphics ASICs (Part II)DVClub
 
Verification of Graphics ASICs (Part I)
Verification of Graphics ASICs (Part I)Verification of Graphics ASICs (Part I)
Verification of Graphics ASICs (Part I)DVClub
 
Stop Writing Assertions! Efficient Verification Methodology
Stop Writing Assertions! Efficient Verification MethodologyStop Writing Assertions! Efficient Verification Methodology
Stop Writing Assertions! Efficient Verification MethodologyDVClub
 
Validating Next Generation CPUs
Validating Next Generation CPUsValidating Next Generation CPUs
Validating Next Generation CPUsDVClub
 
Verification Automation Using IPXACT
Verification Automation Using IPXACTVerification Automation Using IPXACT
Verification Automation Using IPXACTDVClub
 
Validation and Design in a Small Team Environment
Validation and Design in a Small Team EnvironmentValidation and Design in a Small Team Environment
Validation and Design in a Small Team EnvironmentDVClub
 
Trends in Mixed Signal Validation
Trends in Mixed Signal ValidationTrends in Mixed Signal Validation
Trends in Mixed Signal ValidationDVClub
 
Verification In A Global Design Community
Verification In A Global Design CommunityVerification In A Global Design Community
Verification In A Global Design CommunityDVClub
 
Design Verification Using SystemC
Design Verification Using SystemCDesign Verification Using SystemC
Design Verification Using SystemCDVClub
 
Verification Strategy for PCI-Express
Verification Strategy for PCI-ExpressVerification Strategy for PCI-Express
Verification Strategy for PCI-ExpressDVClub
 
SystemVerilog Assertions (SVA) in the Design/Verification Process
SystemVerilog Assertions (SVA) in the Design/Verification ProcessSystemVerilog Assertions (SVA) in the Design/Verification Process
SystemVerilog Assertions (SVA) in the Design/Verification ProcessDVClub
 
Efficiency Through Methodology
Efficiency Through MethodologyEfficiency Through Methodology
Efficiency Through MethodologyDVClub
 
Pre-Si Verification for Post-Si Validation
Pre-Si Verification for Post-Si ValidationPre-Si Verification for Post-Si Validation
Pre-Si Verification for Post-Si ValidationDVClub
 
OpenSPARC T1 Processor
OpenSPARC T1 ProcessorOpenSPARC T1 Processor
OpenSPARC T1 ProcessorDVClub
 
Intel Atom Processor Pre-Silicon Verification Experience
Intel Atom Processor Pre-Silicon Verification ExperienceIntel Atom Processor Pre-Silicon Verification Experience
Intel Atom Processor Pre-Silicon Verification ExperienceDVClub
 
Using Assertions in AMS Verification
Using Assertions in AMS VerificationUsing Assertions in AMS Verification
Using Assertions in AMS VerificationDVClub
 
Low-Power Design and Verification
Low-Power Design and VerificationLow-Power Design and Verification
Low-Power Design and VerificationDVClub
 

Mehr von DVClub (20)

IP Reuse Impact on Design Verification Management Across the Enterprise
IP Reuse Impact on Design Verification Management Across the EnterpriseIP Reuse Impact on Design Verification Management Across the Enterprise
IP Reuse Impact on Design Verification Management Across the Enterprise
 
Cisco Base Environment Overview
Cisco Base Environment OverviewCisco Base Environment Overview
Cisco Base Environment Overview
 
Intel Xeon Pre-Silicon Validation: Introduction and Challenges
Intel Xeon Pre-Silicon Validation: Introduction and ChallengesIntel Xeon Pre-Silicon Validation: Introduction and Challenges
Intel Xeon Pre-Silicon Validation: Introduction and Challenges
 
Verification of Graphics ASICs (Part II)
Verification of Graphics ASICs (Part II)Verification of Graphics ASICs (Part II)
Verification of Graphics ASICs (Part II)
 
Verification of Graphics ASICs (Part I)
Verification of Graphics ASICs (Part I)Verification of Graphics ASICs (Part I)
Verification of Graphics ASICs (Part I)
 
Stop Writing Assertions! Efficient Verification Methodology
Stop Writing Assertions! Efficient Verification MethodologyStop Writing Assertions! Efficient Verification Methodology
Stop Writing Assertions! Efficient Verification Methodology
 
Validating Next Generation CPUs
Validating Next Generation CPUsValidating Next Generation CPUs
Validating Next Generation CPUs
 
Verification Automation Using IPXACT
Verification Automation Using IPXACTVerification Automation Using IPXACT
Verification Automation Using IPXACT
 
Validation and Design in a Small Team Environment
Validation and Design in a Small Team EnvironmentValidation and Design in a Small Team Environment
Validation and Design in a Small Team Environment
 
Trends in Mixed Signal Validation
Trends in Mixed Signal ValidationTrends in Mixed Signal Validation
Trends in Mixed Signal Validation
 
Verification In A Global Design Community
Verification In A Global Design CommunityVerification In A Global Design Community
Verification In A Global Design Community
 
Design Verification Using SystemC
Design Verification Using SystemCDesign Verification Using SystemC
Design Verification Using SystemC
 
Verification Strategy for PCI-Express
Verification Strategy for PCI-ExpressVerification Strategy for PCI-Express
Verification Strategy for PCI-Express
 
SystemVerilog Assertions (SVA) in the Design/Verification Process
SystemVerilog Assertions (SVA) in the Design/Verification ProcessSystemVerilog Assertions (SVA) in the Design/Verification Process
SystemVerilog Assertions (SVA) in the Design/Verification Process
 
Efficiency Through Methodology
Efficiency Through MethodologyEfficiency Through Methodology
Efficiency Through Methodology
 
Pre-Si Verification for Post-Si Validation
Pre-Si Verification for Post-Si ValidationPre-Si Verification for Post-Si Validation
Pre-Si Verification for Post-Si Validation
 
OpenSPARC T1 Processor
OpenSPARC T1 ProcessorOpenSPARC T1 Processor
OpenSPARC T1 Processor
 
Intel Atom Processor Pre-Silicon Verification Experience
Intel Atom Processor Pre-Silicon Verification ExperienceIntel Atom Processor Pre-Silicon Verification Experience
Intel Atom Processor Pre-Silicon Verification Experience
 
Using Assertions in AMS Verification
Using Assertions in AMS VerificationUsing Assertions in AMS Verification
Using Assertions in AMS Verification
 
Low-Power Design and Verification
Low-Power Design and VerificationLow-Power Design and Verification
Low-Power Design and Verification
 

Kürzlich hochgeladen

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 

Kürzlich hochgeladen (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 

Design Verification: The Past, Present and Futurere

  • 1. Design Verification: The Past, Present and Future Sean Smith, Juniper Networks, RTP, NC 1 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 2. Agenda Introduction to Sean & Juniper A little background on DV Past An overview of where DV is today? Where is DV Going? Summary and Q&A 2 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 3. Who is Juniper at a Glance? Snapshot: Founded: 1996 NASDAQ: JNPR Headquarters: Sunnyvale, CA SECTION Employees: 7,000 TITLE WITH IMAGEemployees in offices in 47 countries. Customer Profile: We serve the top 100 global service providers more than 30,000 enterprises, as well as hundreds of government 3 | Copyright © 2009 Juniperagencies and Networks, Inc. | www.juniper.net
  • 4. DV: The Past  DV has been a tremendously evolutionary field – As recent as 15 years ago – There was little research on DV – There were no published texts on DV (until 2000) – A large void compared to logic design. – Considered by many to be the n00b job  Common DV Techniques – Visual inspection – Diff the golden log files – Directed self checking tests – Code coverage was in its infancy – C++ was a common choice in the high end 4 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 5. DV: The Present  Wow! DV has Evolved! – Lots of research on DV including DV centric conference – Dozens of published texts – Still a void compared to logic design but narrowing – Not necessarily a newbie job but there is a delta in compensation & respect  Common DV Techniques – Self checking constrained random – Objective metrics for measuring completeness – Static verification has become almost mainstream – SystemVerilog provided the unification 5 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 6. DV: The Future  How are we going to deal with capacity? – Current simulation techniques are running out steam? – Emulation? – Formal?  How can we be smarter about reaching our verification goals?  Are the traditional problems where we should be focusing our energy? 6 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 7. Dynamic Simulation Challenges  Closing Coverage… out_0 4 x 4 Switch in_0 out_1 in_1 Routing Table mac_addr dst_port out_2 0x0100 0 in_2 0x0200 1 0x0300 2 out_3 0x0400 3 in_3 Packet Format data crc dst src len 0x0102030 0x9bdbc90 0x100 0x500 2 4 0 7 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 8. Closing coverage continued…  Constrained random tests are generally not coverage aware so they generate a lot of duplicate transactions….  New Approaches are emerging to try and automate coverage specification and closure! – Graph and Genetic based algorithms for stimulus and coverage generation. – Algorithms to mutate stimulus code – Context aware simulators – Formal Verification 8 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 9. Formal Targeted ROI and Applications Formal Application Examples Resource Risk TTM ROI Area Impact Impact Impact Architectural Communications Cache coherency verification and bus  High High High architecture RTL design and Designer X-propagation  High debug sandbox detection High High Register Connectivity check verification Proofs of critical Packet integrity Error correction functionality/ Multi-processor Protocol  High  High  High  High Verification coherence certification Flow control Token leakage Regression test Verification of low- Power Power shutoff  High power modes architecture isolation cells Medium Clock gating Post-silicon debug Root cause bugs Validate fixes  High  High Varies 9 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 10. DV: The Future  But are there bigger looming challenges?  We need to step back and consider the big picture. – The goal of verification is deliver a quality product to market in a timely fashion. – There is an increasing software component of silicon and systems we build. – There is also the redundancy of pre versus post silicon verification.  The future of DV is much broader than the current focus! 10 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 11. Reuse Starts with Specification  IP blocks need consistent specification format – Ensure quick and easy integration into SOC level reference manual, users guides, and programmers guides – Modular & consistent document structure, formatting, look and feel are key – Need to minimize hand editing when going from block to SOC  Standards like IP-Xact and SystemRDL from the SPIRIT Consortium are driving the future. 11 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 12. SPIRIT and SystemRDL  SystemRDL is a language for specifying register architectures and implimentations.  SPIRIT Consortium has accepted the donation of SystemRDL on May 21, 2007  On May 18th 2009, The SystemRDL 1.0 standard was released. http://www.spiritconsortium.org/ 12 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 13. Traditional CSR Flow Requirement Change Requirement change due to area, From Marketing Timing, or Physical Design Concern Architect Writes Specification B B u u g g Verification Eng Design Eng Software Eng F Codes HVL Codes HDL Codes C F o o u u n n d DV Verifies Design d Software Eng Writes Firmware Or Device Driver DONE?? Hope All Match! 13 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 14. Challenges with Traditional CSR Flow  Resource intensive – Multiple engineers creating same/similar content – Very tedious and time consuming work  Difficult to manage changes in architecture  Doesn’t enable common look and feel  Manual nature of process lends to low quality – Specification != HDL != HVL – Manual test cases creation for DV – Doc updates postponed due to pain factor Low Reuse + Tedious Work = Low Quality/Productivity 14 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 15. Register Compiler Architecture SystemRDL™ Register Compiler RTL C Code HVL Code Unformatted for Synthesis for Firmware for Verification Documentation Word Style Processor Sheet Hardware Software Functional Generated Design Development Verification Documentation 15 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 16. www.spiritconsortium.org  Simple high level syntax defines registers // This register is a inline register definition. // It defines a simple ID register. A flip-flop is implemented // reg chip_id_r { name = "This chip part number and revision #"; desc = "This register contains the part # and revision # for XYZ ASIC"; field { hw = rw; // This combination of attr creates a flip flop sw = r; desc = "This field represents the chips part number"; } part_num[28] = 28'h12_34_56_7; }; 16 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 17. Defining reusable components in SystemRDL field intr_field_f { desc = “Some Status Field"; level intr; // Level Sensitive Interrupt }; field count_field_f { // Anonymous Generic Counter. hw = w; sw = rw; rclr; counter; desc = "Number of certain packet type seen"; }; Here we define a couple of field types that we will use on the next slide. This can be used to create templates to ensure common architecture and reuse. 17 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 18. www.systemrdl.org reg vc_pkt_count_r { count_field_f vc_count[29:0]=0x0; field { desc="VC is Active"; } active; intr_field_f cntr_overflow=0; cntr_overflow->next = vc_count->overflow; }; addrmap some_register_map { chip_id_r chip_id @0x0110; external vc_pkt_count_r vc_pkt_count[256] @0x200 +=0x10; // External Interface }; // End some_register_map 18 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 19. Automate ESL/TLM Creation Auto Generated c/c++ Headers, Classes, & HAL SystemC TLM Model of DUT DUT Test Bench or Firmware Behavioral Model Automatically Generated or Of System TLM of CSRs Device Driver DUT Functionality Or Complete RTOS 19 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 20. Closing Thoughts…..  Verification has come a long way and has a promising future.  Speed and Capacity are becoming real bottlenecks for traditional approaches.  More focus needs to be placed on co-verification and verification portability.  SystemRDL and IP-Xact are pragmatic languages that provide benefits to many aspects of ASIC/SOC creation. 20 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 21. Juniper advantage The POWER of Architecture Operating System Open Network ••• 21 | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net