Open side-bar Menu
 The Breker Trekker
Tom Anderson, VP of Marketing
Tom Anderson, VP of Marketing
Tom Anderson is vice president of Marketing for Breker Verification Systems. He previously served as Product Management Group Director for Advanced Verification Solutions at Cadence, Technical Marketing Director in the Verification Group at Synopsys and Vice President of Applications Engineering at … More »

Two Peas in a Pod: Scenario Models and System Coverage

 
September 10th, 2013 by Tom Anderson, VP of Marketing

In our last technical blog post, we surveyed some of the existing forms of coverage, including their virtues and limitations, and their applicability to SoC designs. We also introduced a new type of metric, system coverage, based on application scenarios that reflect how an end user would actually run applications on the SoC. We closed by claiming that “Breker’s graph-based scenario models are ideal for establishing, measuring, and refining system coverage.” This is the next in a series of posts to explain why and how.

Another earlier post described the Breker approach of “beginning with the end in mind” using graph-based scenario models. In the graphs used by TrekSoC, outcomes appear on the left and inputs appear on the right, reflecting the way that the test case generator works from the desired result toward the setup conditions needed for a particular application scenario.

Each walk through the graph generates a different application scenario, randomly choosing different paths at decision points and randomizing other aspects of the test (data, addresses, etc.) as specified in the scenario model. These application scenarios may be scheduled serially on a single-threaded, single-processor SoC or intermingled on a multi-threaded or multi-processor architecture. The resulting test case is compiled and run on the embedded processors in simulation.

Continuing with the digital camera SoC example mentioned in both of the previous posts, it is easy to generate a scenario model that shows all the possible user-level applications that the camera supports.  Note that scenario models are hierarchical and so each rectangle can be expanded into a sub-graph for the corresponding IP block. There may be many randomization points and decision points within the sub-graphs, for example the image quality or file size selected when the photo processor converts a raw image to JPEG.

However, at the top level of this SoC, there are only four different types of application scenarios, or paths through the graph:

  1. An image is captured from the camera and saved in raw form on the SD card
  2. A previously saved raw image is read from the SD card and shown on the camera display
  3. An image is captured from the camera, JPEG-encoded by the photo processor, and saved on the SD card
  4. A previously saved JPEG image is read from the SC card, decoded by the photo processor, and shown on the camera display

This example shows why scenario models and system coverage work so well together. The four realistic application scenarios appropriate for this digital camera fall out directly from the different paths through the model. One way to think about this approach is that the scenario model serves as the system specification and that system coverage can automatically be extracted from this model.

This example does not imply that only four system test cases are needed to verify a digital camera at the system level. TrekSoC provides many options for test case generation to ensure that the design is stressed well. Although it is neither desirable nor practical to repeat standalone IP verification at the system level, it may be important to ensure coverage on some of the decision points within the IP blocks.

There are many more details on how users interact with scenario models, control test case generation, and analyze coverage results. Future blog posts will continue to “peel the onion” on the very important topic of system coverage. As always, any questions or comments are most welcome.

Tom A.

The truth is out there … sometimes it’s in a blog.

Tags: , , , , , , ,


Warning: Undefined variable $user_ID in /www/www10/htdocs/blogs/wp-content/themes/ibs_default/comments.php on line 83

You must be logged in to post a comment.




© 2024 Internet Business Systems, Inc.
670 Aberdeen Way, Milpitas, CA 95035
+1 (408) 882-6554 — Contact Us, or visit our other sites:
TechJobsCafe - Technical Jobs and Resumes EDACafe - Electronic Design Automation GISCafe - Geographical Information Services  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy PolicyAdvertise