Ethernet switch FPGA verification method based on UVM verification method
A verification method and Ethernet technology, applied in the field of Ethernet switch FPGA verification, can solve problems such as low degree of automation operation, reduce workload, realize automatic execution, and improve development efficiency and quality.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0014] The Ethernet switch FPGA verification method based on the UVM verification method is realized by three parts: the main body of the UVM verification platform, the measured object of the four-port Ethernet switch, and the SystemC reference model of the Ethernet switch. The SystemC reference model of the object under test and the Ethernet switch sends Ethernet packets, and collects the packets returned from the object under test of the Ethernet switch and the SystemC reference model of the Ethernet switch, compares whether they are the same, and judges the status of the object under test. Whether the behavior is correct; the logical behavior of the SystemC reference model of the Ethernet switch is consistent with the test object of the Ethernet switch, but the details of timing are ignored; the logic of the test object of the Ethernet switch is downloaded to the FPGA after the simulation verification is completed. work in the environment.
[0015] The implementation method...
Embodiment 2
[0017] The Ethernet switch FPGA verification method based on the UVM verification method is realized by three parts: the main body of the UVM verification platform, the measured object of the four-port Ethernet switch, and the SystemC reference model of the Ethernet switch. The SystemC reference model of the object under test and the Ethernet switch sends Ethernet packets, and at the same time sends and receives IP packets and ARP packets of the third-layer protocol. The third-layer protocol packets are packaged in the second-layer protocol. High-level messages are also packaged layer by layer; in order to use the UVM verification method to realize the verification of this layered protocol, a conversion sequence is established in the verification environment (continuously read the sequence item from the sequencer of the ipv4 agent, and convert it to the Ethernet's sequence item and send it to the ethernet sequencer), the conversion sequence needs to keep running to convert the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com