Open side-bar Menu
 The Breker Trekker
Tom Anderson, VP of Marketing
Tom Anderson, VP of Marketing
Tom Anderson is vice president of Marketing for Breker Verification Systems. He previously served as Product Management Group Director for Advanced Verification Solutions at Cadence, Technical Marketing Director in the Verification Group at Synopsys and Vice President of Applications Engineering at … More »

Would You Rather Push on a Rope or Pull It?

July 8th, 2014 by Tom Anderson, VP of Marketing

Last week we talked once again about our familiar mantra to “begin with the end in mind” when performing SoC verification. We described the enormous value that graph-based scenario models provide by enabling automatic test case generation from desired results. TrekSoC can walk the graph backwards, from result to inputs, and generate the C code necessary to exercise true user-level test cases across multiple threads and multiple heterogenous processors.

It’s clear even to the biggest fans of the Universal Verification Methodology (UVM) that this standard breaks down at the full-chip level for an SoC containing one or more embedded processors. The UVM, for all its good points, does not encompass code executing on processors and does not provide any guidance on how to link such code with the testbench that connects the chip’s inputs and outputs. The value of scenario models for SoCs is clear. But what about large chips without embedded processors? Does Breker have a role to play there as well?

In fact, we do. The short answer is that we can operate perfectly well in a testbench-only environment. We’ve discussed before how TrekSoC enables vertical reuse, with the same graphs usable from individual IP blocks through subsystems through full SoC simulation. In particular, we can operate in the common UVM testbench environment in which the processor models are replaced with bus UVM verification components (VCs). In this case, we do not generate C code, but rather transactions that connect all the chip’s I/O ports.

So it is clear that we can run in a purely transactional mode for blocks or SoCs with the processors removed. As you might expect, our graph-based scenario models and automatic test case generation also work very well with large chips that most people do not call SoCs because they do not contain embedded processors. The networking industry develops many large switches and routers that do not have a central CPU controlling the I/O blocks. For such chips, verification remains a purely transactional challenge.

The question then is whether the UVM suffices for these chips and, if not,  what role Breker can play. In the last six months or so, we have started hearing from more and more non-SoC teams that they are having difficulty full verifying their large chips with the UVM alone. They are finding it hard to stimulate targeted deep behavior purely by applying constrained-random stimulus on the inputs. We use the term “pushing on a rope” for this dilemma because it’s hard to steer stimulus from the inputs alone.

Solving this problem is one of the main reasons that Breker decided to focus on the use of graphs for functional verification. Because graphs begin with the end in mind and trace from outcome to inputs, the test case generation process is like pulling on a rope rather than pushing on one. The bottom line is that graph-based scenario models are more effective than UVM constrained-random stimulus at hitting certain deep corner cases. Before TrekSoC, this was the precise focus of our original product Trek.

Note that we not proposing to replace the UVM. We leverage the UVM verification components (VCs)  in the testbench and connect directly to them to generate transactions and check results. We believe that our test case generation is most useful as a supplement to traditional UVM testbenches. We can fill in the deep behaviors and coverage holes that are hard to reach while providing our unique system-level scenario coverage as a complement to traditional functional and code coverage metrics.

We have just published a new white paper that shows an example of a sequentially deep networking chip, discusses the challenges of using the UVM alone to verify it, and describes how graph-based scenario models can help. To request a copy of “Why Graph-Based Verification? Don’t Push on a Rope!” please visit our case study and white paper page and check the appropriate box. We’ll send it right away and we welcome your comments. Thanks for your interest!

Tom A.

The truth is out there … sometimes it’s in a blog.

Tags: , , , , , , , , , , , , , , ,

You must be logged in to post a comment.

Internet Business Systems © 2019 Internet Business Systems, Inc.
25 North 14th Steet, Suite 710, San Jose, CA 95112
+1 (408) 882-6554 — Contact Us, or visit our other sites:
TechJobsCafe - Technical Jobs and Resumes EDACafe - Electronic Design Automation GISCafe - Geographical Information Services  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy PolicyAdvertise