SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Ms. Anusha Ranga , Mr. L. Hari Venkatesh , Mr.Venkanna / International Journal of
       Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                        Vol. 2, Issue4, July-August 2012, pp.1102-1106

     Design And Implementation Of AMBA-AXI Protocol Using
                   VHDL For Soc Integration
       Ms. Anusha Ranga*, Mr. L. Hari Venkatesh**, Mr.Venkanna***
     * (M.Tech II year (VLSI System Design), ECE Department, St. Mary’s Institute of Tech. Hyderabad)
                    ** (Field Application Engineer, Nu Horizons Electronics Asia pvt ltd)


             *** (Professor and HOD, ECE Department, St. Mary’s Institute of Tech., Hyderabad)



Abstract
         System-on-a-Chip (SoC) design has                Avalon [1]. On the other hand, the designers just
become more and more complexly. Because                   integrate their owned IPs with third party IPs into the
difference functions components or IPs                    SoC to significantly reduce design cycles. However,
(Intellectual Property) will be integrated within a       the main issue is that how to efficiently make sure the
chip. The challenge of integration is “how to verify      IP functionality, that works correctly after integrating
on-chip communication properties”. Although               to the corresponding bus architecture.
traditional simulation-based on-chip bus protocol
checking bus signals to obey bus transaction                        There are many verification works based on
behavior or not, however, they are still lack of a        formal verification techniques [2]-[6]. Device under
chip-level dynamic verification to assist hardware        test (DUT) is modeled as finite-state transition and its
debugging. We proposed a rule based                       properties are written by using computation tree logic
synthesizable AMBA AXI protocol checker. The              (CTL) [7], and then using the verification tools is to
AXI protocol checker contains 44 rules to check           verify DUT’s behaviors [8]. Although formal
on-chip communication properties accuracy. In             verification can verify DUT’s behaviors thoroughly,
the verification strategy, we use the Model sim to        but here are still unpredictable bug in the chip level,
verify AXI protocol checker.                              which we want to verify them.

Keywords: AMBA AXI, Verilog, VLSI, FPGA                             The benefits of using rule-based design
                                                          include improving observability, reducing debug
I. INTRODUCTION                                           time, improving integration through correct usage
          In recent years, the improvement of the         checking, and improving communication through
semiconductor process technology and the market           documentation. In the final purpose, increasing
requirement increasing. More difference functions         design quality while reducing the time-to-market and
IPs are integrated within a chip. Maybe each IPs had      verification costs. We anticipate that the AMBA AXI
completed design and verification. But the integration    protocol checking technique will be more and more
of all IPs could not work together. The more common       important in the future. Hence, we propose a
problem is violation bus protocol or transaction error.   synthesizable AMBA AXI protocol checker with an
The bus-based architecture has become the major           efficient verification mechanism based on rule
integrated methodology for implementing a SoC. The        checking methodology. There are 44 rules to check
on-chip communication specification provides a            the AMBA AXI protocol that provide AXI master,
standard interface that facilitates IPs integration and   slave, and default slave protocol issues.
easily communicates with each IPs in a SoC. To
speed up SoC integration and promote IP reuse,            II.AMBA AXI architecture
several bus-based communication architecture                       AMBA AXI [3] supports data transfers up to
standards have emerged over the past several years.       256 beats and unaligned data transfers using byte
Since the early 1990s, several on chip bus-based          strobes. In AMBA AXI4 system 16 masters and 16
communication architecture standards have been            slaves are interfaced. Each master and slave has their
proposed to handle the communication needs of             own 4 bit ID tags. AMBA AXI system consists of
emerging SoC design. Some of the popular standards        master, slave and bus.
include ARM Microcontroller Bus Architecture
(AMBA) versions 2.0 and 3.0, IBM Core Connect,                    The system consists of five channels namely
STMicroelectronics STBus, Sonics SMARRT                   write address channel, write data channel, read data
Interconnect, Open Cores Wishbone, and Altera             channel, read address channel, and write response


                                                                                                 1102 | P a g e
Ms. Anusha Ranga , Mr. L. Hari Venkatesh , Mr.Venkanna / International Journal of
       Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                        Vol. 2, Issue4, July-August 2012, pp.1102-1106

channel. The AXI4 protocol supports the following
mechanisms:                                              When the slave has accepted all the data items, it
      Unaligned data transfers and up-dated write       drives a write response signal BRESP[1:0] back to
         response requirements.                          the master to indicate that the write transaction is
      Variable-length bursts, from 1 to 16 data         complete. This signal indicates the status of the write
         transfers per burst.                            transaction. The allowable responses are OKAY,
      A burst with a transfer size of 8, 16, 32, 64,    EXOKAY, SLVERR, and DECERR.
         128, 256, 512 or 1024 bits wide is              Table 1: Signal descriptions of AMBA AXI4
         supported.                                      protocol.
      Updated AWCACHE and ARCACHE
         signaling details
         Each transaction is burst-based which has
address and control information on the address
channel that describes the nature of the data to be
transferred. The data is transferred between master
and slave using a write data channel to the slave or a
read data channel to the master. Table 1[3] gives the
information of signals used in the complete design of
the protocol.

         The write operation process starts when the
master sends an address and control information on
the write address channel as shown in fig 1. The
master then sends each item of write data over the
write data channel. The master keeps the VALID
signal low until the write data is available. The
master sends the last data item, the WLAST signal
goes HIGH.




Fig 1: Write address and data burst.




                                                         After the read address appears on the address bus, the
                                                         data transfer occurs on the read data channel as
Fig 2: Read address and data burst.                      shown in fig. 2. The slave keeps the VALID signal

                                                                                               1103 | P a g e
Ms. Anusha Ranga , Mr. L. Hari Venkatesh , Mr.Venkanna / International Journal of
       Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                        Vol. 2, Issue4, July-August 2012, pp.1102-1106

LOW until the read data is available. For the final
data transfer of the burst, the slave asserts the
RLAST signal to show that the last data item is being
transferred. The RRESP[1:0] signal indicates the
status of the read transfer. The allowable responses
are OKAY, EXOKAY, SLVERR, and DECERR.                    Fig 3: The Block Diagram of AXI Generic Master

         The protocol supports 16 outstanding            Controller
transactions, so each read and write transactions have             The master is connected to the interconnect
ARID[3:0] and AWID [3:0] tags respectively. Once         using a slave interface and the slave is connected to
the read and write operation gets completed the          the interconnect using a master interface as shown in
module produces a RID[3:0] and BID[3:0] tags. If         fig 4. The AXI4 master gets connected to the AXI4
both the ID tags match, it indicates that the module     slave interface port of the interconnect and the AXI
has responded to right operation of ID tags. ID tags     slave gets connected to the AXI4 Master Interface
are needed for any operation because for each            port of the interconnect. The parallel capability of
transaction concatenated input values are passed to      this interconnects enables master M1 to access one
module                                                   slave at the same as master M0 is accessing the other.

III. RELATED WORK
         In a SoC, it houses many components and
electronic modules; to interconnect these, a bus is
necessary. There are many buses introduced in the
due course some of them being AMBA [2] developed
by ARM, CORE CONNECT [4] developed by IBM,
WISHBONE [5] developed by Silicore Corporation,
etc. Different buses have their own properties the
designer selects the bus best suited for his
application. The AMBA bus was introduced by ARM
Ltd in 1996 which is a registered trademark of ARM
Ltd. Later advanced system bus (ASB) and advanced
peripheral bus (APB) were released in 1995, AHB in
1999, and AXI in 2003[6]. AMBA bus finds
application in wide area. AMBA AXI bus is used to
reduce the precharge time using dynamic SDRAM
access scheduler (DSAS) [7]. Here the memory
controller is capable of predicting future operations    Fig 4: AMBA AXI slave Read/Write block Diagram
thus throughput is improved. Efficient Bus Interface
(EBI) [8] is designed for mobile systems to reduce       IV. SIMULATION
the required memory to be transferred to the IP,                  Simulation is being carried out on
through AMBA3 AXI. The advantages of introducing         ModelSim Quartus II which is trademark of Menter
Network-on-chip (NoC) within SoC such as quality         Graphics, using Verilog as programming language.
of signal, dynamic routing, and communication links      The test case is run for multiple operations and the
was discussed in [8]. To verify on-chip                  waveforms are visible in discovery visualization
communication properties rule based synthesizable        environment
AMBA AXI protocol checker is used. The block
diagram of the AXI Generic Mater Controller has the
                                                         IV.i. Simulation inputs
following blocks and is shown in the fig 3 :
                                                                  To perform multiple write and read
                                                         operations, the concatenated input format and their
         1) Master
                                                         values passed to invoke a function is shown in the fig
         2) AMBA AXI4 Interconnect
                                                         6 and 7 respectively. Here the normal type of the
         3) Slave
                                                         burst is passed to module. Internal_lock value is 0,
                                                         internal_burst value is 1 and internal_prot value is 1,
                                                         for both read and write operations, which indicate
                                                         that the burst is of normal type. For write operation
                                                         address locations passed to module are 40, 12, 35, 42
                                                         and 102; for read operations 45, 12, 67 and 98.

                                                         IV.ii. Simulation outputs

                                                                                               1104 | P a g e
Ms. Anusha Ranga , Mr. L. Hari Venkatesh , Mr.Venkanna / International Journal of
       Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                        Vol. 2, Issue4, July-August 2012, pp.1102-1106

         The simulation output signals generated are
as follows:
      From input side the validating signals
         AWVALID/ARVALID                signals     are
         generated by interconnect which gives the
         information about valid address and ID tags.
      For write operations BRESP[1:0] response
         signal generated from slave indicates the
         status of the write transaction. The allowable
         responses are OKAY, EXOKAY, SLERR,
         and DECERR.
      For read operations RLAST signal is raised
         by slave for every transaction which
         indicates the completion of operation
                                                          Fig 6: Simulation result of slave for single write data
V. RESULTS                                                operation
        Simulation is carried out in Modelsim tool
and Verilog is used as programming language.

V.i. Simulation result for write operation
         The AResetn signal is active low. Master
drives the address, and the slave accepts it one cycle
later. The write address values passed to module are
40, 12, 35, 42 and 102 as shown in fig 5 and the
simulated result for single write data operation is
shown in fig 6. Input AWID[3:0] value is 11 for 40
address location, which is same as the BID[3:0]
signal for 40 address location which is identification
tag of the write response. The BID[3:0] value is
matching with the AWID[3:0] value of the write
transaction which indicates the slave is responding
correctly. BRESP[1:0] signal that is write response       Fig 7: Simulation result of slave for multiple write
signal from slave is 0 which indicates OKAY.              data operation
Simulation result of slave for multiple write data
operation is shown in fig 7.                              V.ii. Simulation result for read operation
                                                                    The read address values passed to module
                                                          are 45, 12, 67, 98 as shown in fig 8 and the simulated
                                                          result for single read data operation is shown in fig 9.




Fig 5: Simulation result of slave for write address
operation
                                                          Fig 8: Simulation result of slave for read address
                                                          operation

                                                          Input ARID[3:0] value is 3 for 12 address location,
                                                          which is same as the RID[3:0] signal for 12 address
                                                          location which is identification tag of the write

                                                                                                 1105 | P a g e
Ms. Anusha Ranga , Mr. L. Hari Venkatesh , Mr.Venkanna / International Journal of
         Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                          Vol. 2, Issue4, July-August 2012, pp.1102-1106

response. The RID[3:0] and ARID[3:0] values are            [4]   IBM, Core connect bus architecture. IBM
matching, which indicates slave has responded                    Microelectronics.[Online].Available:
properly.                                                        http://www.ibm.com/chips/products/corecon
                                                                 nect
                                                           [5]   Silicore Corporation, Wishbone system-on-
                                                                 chip (soc) interconnection architecture for
                                                                 portable ip cores,
                                                           [6]   ARM, AMBA AXI protocol specifications,
                                                                 Available at, http://www.arm.com, 2003
                                                           [7]   Jun Zheng, Kang Sun , Xuezeng Pan, and
                                                                 Lingdi Ping “Design of a Dynamic Memory
                                                                 Access Scheduler”, IEEE transl, Vol 7, pp.
                                                                 20-23, 2007
                                                           [8]   Na Ra Yang, Gilsang Yoon, Jeonghwan
                                                                 Lee, Intae Hwang, Cheol Hong Kim, Sung
                                                                 Woo Chung and Jong Myon Kim,
                                                                 “Improving         the     System-on-a-Chip
                                                                 Performance for Mobile Systems by Using
                                                                 Efficient Bus Interface”, IEEE transl,
Fig 9: Simulation result of slave for single read data           International          Conference        on
operation                                                        Communications and Mobile Computing,
                                                                 Vol 4, pp. 606-608, March 2009
VI. CONCLUSION AND FUTURE SCOPE
VI.i. Future scope                                       AUTHORS
         The AMBA AXI4 has limitations with
respect to the burst data and beats of information to
be transferred. The burst must not cross the 4k
boundary. Bursts longer than 16 beats are only
supported for the INCR burst type. Both WRAP and
FIXED burst types remain constrained to a maximum
burst length of 16 beats. These are the drawbacks of                  Ms. Anusha Ranga Pursuing M.Tech in
AMBA AXI system which need to be overcome.               VLSI systems from St. Mary’s institute of technology
                                                         and science, her area of interest is VLSI design and
VI.ii. Conclusion                                        Embedded systems.
         AMBA AXI4 is a plug and play IP protocol
released by ARM, defines both bus specification and
a technology independent methodology for
designing, implementing and testing customized
high-integration embedded interfaces. The data to be
read or written to the slave is assumed to be given by                   Mr.L.Hari Venkatesh, M.Tech in
the master and is read or written to a particular        Microelectronics & VLSI Design from NIT Calicut
address location of slave through decoder. In this       and Working as Field Application Engineer in Nu
work, slave was modeled in Verilog with operating        Horizons Electronics pvt ltd, Hyderabad and his area
frequency of 100MHz and simulation results were          of interest is Digital electronics and VlSI design.
shown in Modelsim tool. To perform single read
operation it consumed 160ns and for single write
operation 565ns.

REFERENCES
  [1]      Shaila S Math, Manjula R B, “Survey of
          system on chip buses based on industry                      Mr. Venkanna Professor and Head of
          standards”, Conference on Evolutionary         the department in St. Mary’s institute of technology
          Trends in Information Technology(CETIT),       and management. His area of interest is VLSI
          Bekgaum,Karnataka, India, pp. 52, May          systems and communication theory.
          2011
  [2]     ARM, AMBA Specifications ev2.0).
          [Online]. Available at http://www.arm.com,
  [3]     ARM, AMBA AXI Protocol Specification
          (Rev 2.0).

                                                                                             1106 | P a g e

Más contenido relacionado

La actualidad más candente

Paper id 24201428
Paper id 24201428Paper id 24201428
Paper id 24201428IJRAT
 
Chapter 7 exam
Chapter 7 examChapter 7 exam
Chapter 7 examreiryuzaki
 
1 introduction
1 introduction1 introduction
1 introductionJesusizdo
 
[Advantech] ADAM-3600 training kit and Taglink
[Advantech]  ADAM-3600 training kit and Taglink[Advantech]  ADAM-3600 training kit and Taglink
[Advantech] ADAM-3600 training kit and TaglinkMing-Hung Hseih
 
Can the e-Mobility Charging Infrastructure be a Blueprint for other IoT Proje...
Can the e-Mobility Charging Infrastructure be a Blueprint for other IoT Proje...Can the e-Mobility Charging Infrastructure be a Blueprint for other IoT Proje...
Can the e-Mobility Charging Infrastructure be a Blueprint for other IoT Proje...Achim Friedland
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013RoHit VashIsht
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerRubal Sagwal
 
Computer Ports
Computer PortsComputer Ports
Computer PortsNetwax Lab
 
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsMultiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsIJERA Editor
 
Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Arunabh Deka
 
CV-RENJINIK-27062016
CV-RENJINIK-27062016CV-RENJINIK-27062016
CV-RENJINIK-27062016Renjini K
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...CSCJournals
 
Introduction to VIP with PCI Express Technology
Introduction to VIP with PCI Express TechnologyIntroduction to VIP with PCI Express Technology
Introduction to VIP with PCI Express Technologyijsrd.com
 

La actualidad más candente (20)

Paper id 24201428
Paper id 24201428Paper id 24201428
Paper id 24201428
 
Chapter 7 exam
Chapter 7 examChapter 7 exam
Chapter 7 exam
 
1 introduction
1 introduction1 introduction
1 introduction
 
A STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGS
A STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGSA STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGS
A STUDY OF AN ENTRENCHED SYSTEM USING INTERNET OF THINGS
 
[Advantech] ADAM-3600 training kit and Taglink
[Advantech]  ADAM-3600 training kit and Taglink[Advantech]  ADAM-3600 training kit and Taglink
[Advantech] ADAM-3600 training kit and Taglink
 
Can the e-Mobility Charging Infrastructure be a Blueprint for other IoT Proje...
Can the e-Mobility Charging Infrastructure be a Blueprint for other IoT Proje...Can the e-Mobility Charging Infrastructure be a Blueprint for other IoT Proje...
Can the e-Mobility Charging Infrastructure be a Blueprint for other IoT Proje...
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Network Models
Network ModelsNetwork Models
Network Models
 
Computer Ports
Computer PortsComputer Ports
Computer Ports
 
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsMultiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
 
Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)
 
CV-RENJINIK-27062016
CV-RENJINIK-27062016CV-RENJINIK-27062016
CV-RENJINIK-27062016
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
 
Wi Fi documantation
Wi Fi documantationWi Fi documantation
Wi Fi documantation
 
802.1x
802.1x802.1x
802.1x
 
Final report
Final reportFinal report
Final report
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
Modbus over RS485
Modbus over RS485Modbus over RS485
Modbus over RS485
 
Introduction to VIP with PCI Express Technology
Introduction to VIP with PCI Express TechnologyIntroduction to VIP with PCI Express Technology
Introduction to VIP with PCI Express Technology
 

Destacado

#jobday Cómo encontrar empleo en la era de Internet - Estrategia Social Medi...
#jobday Cómo encontrar empleo en la era de Internet - Estrategia Social Medi...#jobday Cómo encontrar empleo en la era de Internet - Estrategia Social Medi...
#jobday Cómo encontrar empleo en la era de Internet - Estrategia Social Medi...Soluciona Facil
 
Inmaculada Garbajosa Barroso Y Tamara Garbajosa Barroso
Inmaculada Garbajosa Barroso Y Tamara Garbajosa BarrosoInmaculada Garbajosa Barroso Y Tamara Garbajosa Barroso
Inmaculada Garbajosa Barroso Y Tamara Garbajosa BarrosoInmaculadayTamara
 
Teoria de la imatge. tema 7
Teoria de la imatge. tema 7Teoria de la imatge. tema 7
Teoria de la imatge. tema 7Actor
 
Ponencia @HootSuiteES Santander Weekend #SantanderSW 2015
Ponencia @HootSuiteES Santander Weekend #SantanderSW 2015Ponencia @HootSuiteES Santander Weekend #SantanderSW 2015
Ponencia @HootSuiteES Santander Weekend #SantanderSW 2015Soluciona Facil
 
Humberto Costa - Água de Reuso
Humberto Costa - Água de ReusoHumberto Costa - Água de Reuso
Humberto Costa - Água de ReusoPaulo Veras
 
Power Point EsquizofrèNia
Power Point EsquizofrèNiaPower Point EsquizofrèNia
Power Point EsquizofrèNiaAndreaHV
 

Destacado (20)

Hz2414081415
Hz2414081415Hz2414081415
Hz2414081415
 
Fj24994999
Fj24994999Fj24994999
Fj24994999
 
Fm2410101013
Fm2410101013Fm2410101013
Fm2410101013
 
Ft2410451049
Ft2410451049Ft2410451049
Ft2410451049
 
Fv2410561067
Fv2410561067Fv2410561067
Fv2410561067
 
Jl2516751681
Jl2516751681Jl2516751681
Jl2516751681
 
Gg2411291135
Gg2411291135Gg2411291135
Gg2411291135
 
Jp2516981701
Jp2516981701Jp2516981701
Jp2516981701
 
Fa24954957
Fa24954957Fa24954957
Fa24954957
 
Aw26312325
Aw26312325Aw26312325
Aw26312325
 
#jobday Cómo encontrar empleo en la era de Internet - Estrategia Social Medi...
#jobday Cómo encontrar empleo en la era de Internet - Estrategia Social Medi...#jobday Cómo encontrar empleo en la era de Internet - Estrategia Social Medi...
#jobday Cómo encontrar empleo en la era de Internet - Estrategia Social Medi...
 
CurriculumVitae (2)
CurriculumVitae (2)CurriculumVitae (2)
CurriculumVitae (2)
 
Gd2511171123
Gd2511171123Gd2511171123
Gd2511171123
 
Inmaculada Garbajosa Barroso Y Tamara Garbajosa Barroso
Inmaculada Garbajosa Barroso Y Tamara Garbajosa BarrosoInmaculada Garbajosa Barroso Y Tamara Garbajosa Barroso
Inmaculada Garbajosa Barroso Y Tamara Garbajosa Barroso
 
Teoria de la imatge. tema 7
Teoria de la imatge. tema 7Teoria de la imatge. tema 7
Teoria de la imatge. tema 7
 
Ponencia @HootSuiteES Santander Weekend #SantanderSW 2015
Ponencia @HootSuiteES Santander Weekend #SantanderSW 2015Ponencia @HootSuiteES Santander Weekend #SantanderSW 2015
Ponencia @HootSuiteES Santander Weekend #SantanderSW 2015
 
Humberto Costa - Água de Reuso
Humberto Costa - Água de ReusoHumberto Costa - Água de Reuso
Humberto Costa - Água de Reuso
 
matiz
matizmatiz
matiz
 
Power Point EsquizofrèNia
Power Point EsquizofrèNiaPower Point EsquizofrèNia
Power Point EsquizofrèNia
 
Photovoltaics
PhotovoltaicsPhotovoltaics
Photovoltaics
 

Similar a Gc2411021106

Verification of amba axi bus protocol implementing incr and wrap burst using ...
Verification of amba axi bus protocol implementing incr and wrap burst using ...Verification of amba axi bus protocol implementing incr and wrap burst using ...
Verification of amba axi bus protocol implementing incr and wrap burst using ...eSAT Journals
 
Transaction based AMBA AXI bus interconnect in Verilog
Transaction based AMBA AXI bus interconnect in VerilogTransaction based AMBA AXI bus interconnect in Verilog
Transaction based AMBA AXI bus interconnect in VerilogIRJET Journal
 
Iaetsd asynchronous data transactions on so c using fifo
Iaetsd asynchronous data transactions on so c using fifoIaetsd asynchronous data transactions on so c using fifo
Iaetsd asynchronous data transactions on so c using fifoIaetsd Iaetsd
 
VERIFICATION OF DRIVER LOGIC USING AMBAAXI UVM
VERIFICATION OF DRIVER LOGIC USING AMBAAXI UVMVERIFICATION OF DRIVER LOGIC USING AMBAAXI UVM
VERIFICATION OF DRIVER LOGIC USING AMBAAXI UVMVLSICS Design
 
VERIFICATION OF DRIVER LOGIC USING AMBAAXI UVM
VERIFICATION OF DRIVER LOGIC USING AMBAAXI UVMVERIFICATION OF DRIVER LOGIC USING AMBAAXI UVM
VERIFICATION OF DRIVER LOGIC USING AMBAAXI UVMVLSICS Design
 
Design and verification environment for amba axi protocol for soc integration
Design and verification environment for amba axi protocol for soc integrationDesign and verification environment for amba axi protocol for soc integration
Design and verification environment for amba axi protocol for soc integrationeSAT Publishing House
 
Design and Analysis of Xilinx Verified AMBA Bridge for SoC Systems
Design and Analysis of Xilinx Verified AMBA Bridge for SoC SystemsDesign and Analysis of Xilinx Verified AMBA Bridge for SoC Systems
Design and Analysis of Xilinx Verified AMBA Bridge for SoC Systemsidescitation
 
COVERAGE DRIVEN VERIFICATION OF I2C PROTOCOL USING SYSTEM VERILOG
COVERAGE DRIVEN VERIFICATION OF I2C PROTOCOL USING SYSTEM VERILOGCOVERAGE DRIVEN VERIFICATION OF I2C PROTOCOL USING SYSTEM VERILOG
COVERAGE DRIVEN VERIFICATION OF I2C PROTOCOL USING SYSTEM VERILOGIAEME Publication
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfGandhibabu8
 
Design &Implementation of I2C Master Controller Interfaced With RAM Using VHDL
Design &Implementation of I2C Master Controller Interfaced With RAM Using VHDLDesign &Implementation of I2C Master Controller Interfaced With RAM Using VHDL
Design &Implementation of I2C Master Controller Interfaced With RAM Using VHDLIJERA Editor
 
A Review On AMBA AHB Lite Protocol And Verification Using UVM Methodology
A Review On AMBA AHB Lite Protocol And Verification Using UVM MethodologyA Review On AMBA AHB Lite Protocol And Verification Using UVM Methodology
A Review On AMBA AHB Lite Protocol And Verification Using UVM MethodologyTodd Turner
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...IJMER
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPVLSICS Design
 
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfA NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfSaiReddy794166
 
DESIGN AND IMPLEMENTATION OF I2C AND UART BLOCK IMPLEMENTATION FOR RISC-V SOC
DESIGN AND IMPLEMENTATION OF I2C AND UART BLOCK IMPLEMENTATION FOR RISC-V SOCDESIGN AND IMPLEMENTATION OF I2C AND UART BLOCK IMPLEMENTATION FOR RISC-V SOC
DESIGN AND IMPLEMENTATION OF I2C AND UART BLOCK IMPLEMENTATION FOR RISC-V SOCIRJET Journal
 

Similar a Gc2411021106 (20)

Verification of amba axi bus protocol implementing incr and wrap burst using ...
Verification of amba axi bus protocol implementing incr and wrap burst using ...Verification of amba axi bus protocol implementing incr and wrap burst using ...
Verification of amba axi bus protocol implementing incr and wrap burst using ...
 
Transaction based AMBA AXI bus interconnect in Verilog
Transaction based AMBA AXI bus interconnect in VerilogTransaction based AMBA AXI bus interconnect in Verilog
Transaction based AMBA AXI bus interconnect in Verilog
 
Iaetsd asynchronous data transactions on so c using fifo
Iaetsd asynchronous data transactions on so c using fifoIaetsd asynchronous data transactions on so c using fifo
Iaetsd asynchronous data transactions on so c using fifo
 
VERIFICATION OF DRIVER LOGIC USING AMBAAXI UVM
VERIFICATION OF DRIVER LOGIC USING AMBAAXI UVMVERIFICATION OF DRIVER LOGIC USING AMBAAXI UVM
VERIFICATION OF DRIVER LOGIC USING AMBAAXI UVM
 
VERIFICATION OF DRIVER LOGIC USING AMBAAXI UVM
VERIFICATION OF DRIVER LOGIC USING AMBAAXI UVMVERIFICATION OF DRIVER LOGIC USING AMBAAXI UVM
VERIFICATION OF DRIVER LOGIC USING AMBAAXI UVM
 
Design and verification environment for amba axi protocol for soc integration
Design and verification environment for amba axi protocol for soc integrationDesign and verification environment for amba axi protocol for soc integration
Design and verification environment for amba axi protocol for soc integration
 
Ek31903907
Ek31903907Ek31903907
Ek31903907
 
Design and Analysis of Xilinx Verified AMBA Bridge for SoC Systems
Design and Analysis of Xilinx Verified AMBA Bridge for SoC SystemsDesign and Analysis of Xilinx Verified AMBA Bridge for SoC Systems
Design and Analysis of Xilinx Verified AMBA Bridge for SoC Systems
 
COVERAGE DRIVEN VERIFICATION OF I2C PROTOCOL USING SYSTEM VERILOG
COVERAGE DRIVEN VERIFICATION OF I2C PROTOCOL USING SYSTEM VERILOGCOVERAGE DRIVEN VERIFICATION OF I2C PROTOCOL USING SYSTEM VERILOG
COVERAGE DRIVEN VERIFICATION OF I2C PROTOCOL USING SYSTEM VERILOG
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
 
Design &Implementation of I2C Master Controller Interfaced With RAM Using VHDL
Design &Implementation of I2C Master Controller Interfaced With RAM Using VHDLDesign &Implementation of I2C Master Controller Interfaced With RAM Using VHDL
Design &Implementation of I2C Master Controller Interfaced With RAM Using VHDL
 
A Review On AMBA AHB Lite Protocol And Verification Using UVM Methodology
A Review On AMBA AHB Lite Protocol And Verification Using UVM MethodologyA Review On AMBA AHB Lite Protocol And Verification Using UVM Methodology
A Review On AMBA AHB Lite Protocol And Verification Using UVM Methodology
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
 
40120130406005
4012013040600540120130406005
40120130406005
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
 
Ey3110051010
Ey3110051010Ey3110051010
Ey3110051010
 
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfA NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
 
Ag34200206
Ag34200206Ag34200206
Ag34200206
 
DESIGN AND IMPLEMENTATION OF I2C AND UART BLOCK IMPLEMENTATION FOR RISC-V SOC
DESIGN AND IMPLEMENTATION OF I2C AND UART BLOCK IMPLEMENTATION FOR RISC-V SOCDESIGN AND IMPLEMENTATION OF I2C AND UART BLOCK IMPLEMENTATION FOR RISC-V SOC
DESIGN AND IMPLEMENTATION OF I2C AND UART BLOCK IMPLEMENTATION FOR RISC-V SOC
 
Can Protocol For Automobiles
Can Protocol For AutomobilesCan Protocol For Automobiles
Can Protocol For Automobiles
 

Gc2411021106

  • 1. Ms. Anusha Ranga , Mr. L. Hari Venkatesh , Mr.Venkanna / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1102-1106 Design And Implementation Of AMBA-AXI Protocol Using VHDL For Soc Integration Ms. Anusha Ranga*, Mr. L. Hari Venkatesh**, Mr.Venkanna*** * (M.Tech II year (VLSI System Design), ECE Department, St. Mary’s Institute of Tech. Hyderabad) ** (Field Application Engineer, Nu Horizons Electronics Asia pvt ltd) *** (Professor and HOD, ECE Department, St. Mary’s Institute of Tech., Hyderabad) Abstract System-on-a-Chip (SoC) design has Avalon [1]. On the other hand, the designers just become more and more complexly. Because integrate their owned IPs with third party IPs into the difference functions components or IPs SoC to significantly reduce design cycles. However, (Intellectual Property) will be integrated within a the main issue is that how to efficiently make sure the chip. The challenge of integration is “how to verify IP functionality, that works correctly after integrating on-chip communication properties”. Although to the corresponding bus architecture. traditional simulation-based on-chip bus protocol checking bus signals to obey bus transaction There are many verification works based on behavior or not, however, they are still lack of a formal verification techniques [2]-[6]. Device under chip-level dynamic verification to assist hardware test (DUT) is modeled as finite-state transition and its debugging. We proposed a rule based properties are written by using computation tree logic synthesizable AMBA AXI protocol checker. The (CTL) [7], and then using the verification tools is to AXI protocol checker contains 44 rules to check verify DUT’s behaviors [8]. Although formal on-chip communication properties accuracy. In verification can verify DUT’s behaviors thoroughly, the verification strategy, we use the Model sim to but here are still unpredictable bug in the chip level, verify AXI protocol checker. which we want to verify them. Keywords: AMBA AXI, Verilog, VLSI, FPGA The benefits of using rule-based design include improving observability, reducing debug I. INTRODUCTION time, improving integration through correct usage In recent years, the improvement of the checking, and improving communication through semiconductor process technology and the market documentation. In the final purpose, increasing requirement increasing. More difference functions design quality while reducing the time-to-market and IPs are integrated within a chip. Maybe each IPs had verification costs. We anticipate that the AMBA AXI completed design and verification. But the integration protocol checking technique will be more and more of all IPs could not work together. The more common important in the future. Hence, we propose a problem is violation bus protocol or transaction error. synthesizable AMBA AXI protocol checker with an The bus-based architecture has become the major efficient verification mechanism based on rule integrated methodology for implementing a SoC. The checking methodology. There are 44 rules to check on-chip communication specification provides a the AMBA AXI protocol that provide AXI master, standard interface that facilitates IPs integration and slave, and default slave protocol issues. easily communicates with each IPs in a SoC. To speed up SoC integration and promote IP reuse, II.AMBA AXI architecture several bus-based communication architecture AMBA AXI [3] supports data transfers up to standards have emerged over the past several years. 256 beats and unaligned data transfers using byte Since the early 1990s, several on chip bus-based strobes. In AMBA AXI4 system 16 masters and 16 communication architecture standards have been slaves are interfaced. Each master and slave has their proposed to handle the communication needs of own 4 bit ID tags. AMBA AXI system consists of emerging SoC design. Some of the popular standards master, slave and bus. include ARM Microcontroller Bus Architecture (AMBA) versions 2.0 and 3.0, IBM Core Connect, The system consists of five channels namely STMicroelectronics STBus, Sonics SMARRT write address channel, write data channel, read data Interconnect, Open Cores Wishbone, and Altera channel, read address channel, and write response 1102 | P a g e
  • 2. Ms. Anusha Ranga , Mr. L. Hari Venkatesh , Mr.Venkanna / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1102-1106 channel. The AXI4 protocol supports the following mechanisms: When the slave has accepted all the data items, it  Unaligned data transfers and up-dated write drives a write response signal BRESP[1:0] back to response requirements. the master to indicate that the write transaction is  Variable-length bursts, from 1 to 16 data complete. This signal indicates the status of the write transfers per burst. transaction. The allowable responses are OKAY,  A burst with a transfer size of 8, 16, 32, 64, EXOKAY, SLVERR, and DECERR. 128, 256, 512 or 1024 bits wide is Table 1: Signal descriptions of AMBA AXI4 supported. protocol.  Updated AWCACHE and ARCACHE signaling details Each transaction is burst-based which has address and control information on the address channel that describes the nature of the data to be transferred. The data is transferred between master and slave using a write data channel to the slave or a read data channel to the master. Table 1[3] gives the information of signals used in the complete design of the protocol. The write operation process starts when the master sends an address and control information on the write address channel as shown in fig 1. The master then sends each item of write data over the write data channel. The master keeps the VALID signal low until the write data is available. The master sends the last data item, the WLAST signal goes HIGH. Fig 1: Write address and data burst. After the read address appears on the address bus, the data transfer occurs on the read data channel as Fig 2: Read address and data burst. shown in fig. 2. The slave keeps the VALID signal 1103 | P a g e
  • 3. Ms. Anusha Ranga , Mr. L. Hari Venkatesh , Mr.Venkanna / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1102-1106 LOW until the read data is available. For the final data transfer of the burst, the slave asserts the RLAST signal to show that the last data item is being transferred. The RRESP[1:0] signal indicates the status of the read transfer. The allowable responses are OKAY, EXOKAY, SLVERR, and DECERR. Fig 3: The Block Diagram of AXI Generic Master The protocol supports 16 outstanding Controller transactions, so each read and write transactions have The master is connected to the interconnect ARID[3:0] and AWID [3:0] tags respectively. Once using a slave interface and the slave is connected to the read and write operation gets completed the the interconnect using a master interface as shown in module produces a RID[3:0] and BID[3:0] tags. If fig 4. The AXI4 master gets connected to the AXI4 both the ID tags match, it indicates that the module slave interface port of the interconnect and the AXI has responded to right operation of ID tags. ID tags slave gets connected to the AXI4 Master Interface are needed for any operation because for each port of the interconnect. The parallel capability of transaction concatenated input values are passed to this interconnects enables master M1 to access one module slave at the same as master M0 is accessing the other. III. RELATED WORK In a SoC, it houses many components and electronic modules; to interconnect these, a bus is necessary. There are many buses introduced in the due course some of them being AMBA [2] developed by ARM, CORE CONNECT [4] developed by IBM, WISHBONE [5] developed by Silicore Corporation, etc. Different buses have their own properties the designer selects the bus best suited for his application. The AMBA bus was introduced by ARM Ltd in 1996 which is a registered trademark of ARM Ltd. Later advanced system bus (ASB) and advanced peripheral bus (APB) were released in 1995, AHB in 1999, and AXI in 2003[6]. AMBA bus finds application in wide area. AMBA AXI bus is used to reduce the precharge time using dynamic SDRAM access scheduler (DSAS) [7]. Here the memory controller is capable of predicting future operations Fig 4: AMBA AXI slave Read/Write block Diagram thus throughput is improved. Efficient Bus Interface (EBI) [8] is designed for mobile systems to reduce IV. SIMULATION the required memory to be transferred to the IP, Simulation is being carried out on through AMBA3 AXI. The advantages of introducing ModelSim Quartus II which is trademark of Menter Network-on-chip (NoC) within SoC such as quality Graphics, using Verilog as programming language. of signal, dynamic routing, and communication links The test case is run for multiple operations and the was discussed in [8]. To verify on-chip waveforms are visible in discovery visualization communication properties rule based synthesizable environment AMBA AXI protocol checker is used. The block diagram of the AXI Generic Mater Controller has the IV.i. Simulation inputs following blocks and is shown in the fig 3 : To perform multiple write and read operations, the concatenated input format and their 1) Master values passed to invoke a function is shown in the fig 2) AMBA AXI4 Interconnect 6 and 7 respectively. Here the normal type of the 3) Slave burst is passed to module. Internal_lock value is 0, internal_burst value is 1 and internal_prot value is 1, for both read and write operations, which indicate that the burst is of normal type. For write operation address locations passed to module are 40, 12, 35, 42 and 102; for read operations 45, 12, 67 and 98. IV.ii. Simulation outputs 1104 | P a g e
  • 4. Ms. Anusha Ranga , Mr. L. Hari Venkatesh , Mr.Venkanna / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1102-1106 The simulation output signals generated are as follows:  From input side the validating signals AWVALID/ARVALID signals are generated by interconnect which gives the information about valid address and ID tags.  For write operations BRESP[1:0] response signal generated from slave indicates the status of the write transaction. The allowable responses are OKAY, EXOKAY, SLERR, and DECERR.  For read operations RLAST signal is raised by slave for every transaction which indicates the completion of operation Fig 6: Simulation result of slave for single write data V. RESULTS operation Simulation is carried out in Modelsim tool and Verilog is used as programming language. V.i. Simulation result for write operation The AResetn signal is active low. Master drives the address, and the slave accepts it one cycle later. The write address values passed to module are 40, 12, 35, 42 and 102 as shown in fig 5 and the simulated result for single write data operation is shown in fig 6. Input AWID[3:0] value is 11 for 40 address location, which is same as the BID[3:0] signal for 40 address location which is identification tag of the write response. The BID[3:0] value is matching with the AWID[3:0] value of the write transaction which indicates the slave is responding correctly. BRESP[1:0] signal that is write response Fig 7: Simulation result of slave for multiple write signal from slave is 0 which indicates OKAY. data operation Simulation result of slave for multiple write data operation is shown in fig 7. V.ii. Simulation result for read operation The read address values passed to module are 45, 12, 67, 98 as shown in fig 8 and the simulated result for single read data operation is shown in fig 9. Fig 5: Simulation result of slave for write address operation Fig 8: Simulation result of slave for read address operation Input ARID[3:0] value is 3 for 12 address location, which is same as the RID[3:0] signal for 12 address location which is identification tag of the write 1105 | P a g e
  • 5. Ms. Anusha Ranga , Mr. L. Hari Venkatesh , Mr.Venkanna / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1102-1106 response. The RID[3:0] and ARID[3:0] values are [4] IBM, Core connect bus architecture. IBM matching, which indicates slave has responded Microelectronics.[Online].Available: properly. http://www.ibm.com/chips/products/corecon nect [5] Silicore Corporation, Wishbone system-on- chip (soc) interconnection architecture for portable ip cores, [6] ARM, AMBA AXI protocol specifications, Available at, http://www.arm.com, 2003 [7] Jun Zheng, Kang Sun , Xuezeng Pan, and Lingdi Ping “Design of a Dynamic Memory Access Scheduler”, IEEE transl, Vol 7, pp. 20-23, 2007 [8] Na Ra Yang, Gilsang Yoon, Jeonghwan Lee, Intae Hwang, Cheol Hong Kim, Sung Woo Chung and Jong Myon Kim, “Improving the System-on-a-Chip Performance for Mobile Systems by Using Efficient Bus Interface”, IEEE transl, Fig 9: Simulation result of slave for single read data International Conference on operation Communications and Mobile Computing, Vol 4, pp. 606-608, March 2009 VI. CONCLUSION AND FUTURE SCOPE VI.i. Future scope AUTHORS The AMBA AXI4 has limitations with respect to the burst data and beats of information to be transferred. The burst must not cross the 4k boundary. Bursts longer than 16 beats are only supported for the INCR burst type. Both WRAP and FIXED burst types remain constrained to a maximum burst length of 16 beats. These are the drawbacks of Ms. Anusha Ranga Pursuing M.Tech in AMBA AXI system which need to be overcome. VLSI systems from St. Mary’s institute of technology and science, her area of interest is VLSI design and VI.ii. Conclusion Embedded systems. AMBA AXI4 is a plug and play IP protocol released by ARM, defines both bus specification and a technology independent methodology for designing, implementing and testing customized high-integration embedded interfaces. The data to be read or written to the slave is assumed to be given by Mr.L.Hari Venkatesh, M.Tech in the master and is read or written to a particular Microelectronics & VLSI Design from NIT Calicut address location of slave through decoder. In this and Working as Field Application Engineer in Nu work, slave was modeled in Verilog with operating Horizons Electronics pvt ltd, Hyderabad and his area frequency of 100MHz and simulation results were of interest is Digital electronics and VlSI design. shown in Modelsim tool. To perform single read operation it consumed 160ns and for single write operation 565ns. REFERENCES [1] Shaila S Math, Manjula R B, “Survey of system on chip buses based on industry Mr. Venkanna Professor and Head of standards”, Conference on Evolutionary the department in St. Mary’s institute of technology Trends in Information Technology(CETIT), and management. His area of interest is VLSI Bekgaum,Karnataka, India, pp. 52, May systems and communication theory. 2011 [2] ARM, AMBA Specifications ev2.0). [Online]. Available at http://www.arm.com, [3] ARM, AMBA AXI Protocol Specification (Rev 2.0). 1106 | P a g e