Recommended Articles

Recommended Articles – January 2015

High speed serial protocols transmit or receive data on a 2xN-wire bus that usually does not include the clock signal. Each device must recover the clock out of the incoming data traffic. Deepak Nagaria explains how clock recovery works: ArrowDevices: Beginners Guide To Clock Data Recovery There are RTL designs which make use of two […]

Claudia Iancu

A Coverage Closure Study: “on-the-fly” or “top-down” Generation?

Recently, I’ve verified how a DUT tolerates inter-packet delays. Basically, I’ve driven a fixed number of packets with the following constraints: Each inter-packet delay must not exceed a maximum inter-packet delay value The sum of all inter-packet delays must be equal with a specified window delay value At first glance, the most interesting cases appear […]

Recommended Articles

Recommended Articles – December 2014

I wish our readers a 2015 filled up with personal and professional accomplishments! Daniel Bayer from Cadence, brings the first article in a series that highlights constraint-modelling in Specman: Cadence: Connected Field Sets – What Are Those and Why Should I Care? Trent McClements from Invionics shows why combining macro definitions inside a package can […]

Cristian Slav

How to Inspect Ethernet Packet Streams with Wireshark

Many protocol stacks in SoCs are based on the IEEE 802.3 Ethernet protocol as the data link layer, while the upper layers can be standard or application specific. Therefore, verification engineers have to inspect and debug Ethernet packet streams generated or monitored by the verification environment. This article shows how to connect the Wireshark network […]

Recommended Articles

Recommended Articles – November 2014

Tudor recommends us to take advantage of the e-language features to define similar vr_ad registers instead of using copy/paste: VerificationGentleman: Experimental Cures for Flattened Register Definitions in vr_ad Then he shows us how to implement side effects of read/write operations using vr_ad’s indirect_access() method: VerificationGentleman: Using indirect_access(…) in vr_ad The same Gentleman tutors us on […]

Stefan Birman

A Birds-Eye View of DVCon Europe

I finally found some time to write about the first edition of DVCon-Europe, which took place on 14-15th of October, 2014, in Munich. The content What I liked most at DVCon Europe was conference’s focus on content that addressed interesting and often intriguing technical topics. Below you can find the summary for a few presentations […]