Loading...
Design and Implementation of Random Verification Methods for Microcontroller SPI, UART and CRC Peripherals in ASIC Design
Saati, Mohammad | 2025
0
Viewed
- Type of Document: M.Sc. Thesis
- Language: Farsi
- Document No: 58270 (05)
- University: Sharif University of Technology
- Department: Electrical Engineering
- Advisor(s): Medi, Ali
- Abstract:
- In today's world, electronic equipment is widely used across all industries, both large and small. Electronic circuits can be assembled alongside each other to serve specific purposes. With rapid advancements in the electronics industry and the growing demand for higher performance in smaller areas, integrated circuits (ICs) were developed. Over time, technological progress made it possible to integrate an increasing number of transistors within a fixed area, leading to the development of Application-Specific Integrated Circuits (ASICs). ASIC chips can accommodate a substantial number of transistors and, consequently, a large number of logic gates. This capability facilitated the creation of microcontrollers and microprocessors capable of performing complex and intensive computations. Given the rising need for fast-response control systems across various industries and applications, ASIC-based microcontrollers have become increasingly popular. ASIC design is typically divided into two main stages: Front-End and Back-End design. The Front-End stage involves designing circuits using hardware description languages (HDLs). In addition to design, this stage requires verifying the correctness of the described hardware functionality—a process known as verification. The Back-End stage focuses on layout design and addresses critical factors such as power consumption, maximum operating frequency, heat dissipation, and more. It involves arranging the components and modules described in the Front-End phase using HDL to achieve optimal performance. This thesis presents an example of verification for a cache memory module in the Front-End design phase. It also explains the concept of verification using the shadow model. Furthermore, it outlines a complete placement workflow for a microcontroller, addressing key considerations such as path delays, power consumption, and related factors. Finally, the designed microcontroller, implemented using 180nm CMOS technology, is evaluated, and the measured results are compared with simulation outcomes
- Keywords:
- Microcontroller ; Application Specific Integrated Circuit (ASIC) ; Verification ; Shadow Model
-
محتواي کتاب
- view
- 1- فصل اول: مروری بر ارزیابی
- 2- فصل دوم: ارزیابی در Front End
- 3- فصل سوم: بررسی مدلهای سایه مربوط به Cache
- 4- فصل چهارم: بخش Back End و جانمایی
- 4-1 معرفی Back End در طراحی ASIC
- 4-2 جانمایی میکروکنترلر Cortex M0
- 4-2-1 انتخاب سلولهای استاندارد
- 4-2-2 ایجاد فایل MMMC
- 4-2-3 وارد کردن طراحی به محیط Innovus
- 4-2-4 طراحی نقشه تراشه109F
- 4-2-5 اضافه نمودن Power Ring و Power Stripe
- 4-2-6 اضافه نمودن Rail های سلولهای استاندارد Core
- 4-2-7 قراردهی سلولهای استاندارد
- 4-2-8 بهینه سازی پیش از تولید درخت کلاک
- 4-2-9 تولید درخت کلاک
- 4-2-10 سیم کشی نهایی
- 4-2-11 اصلاح چگالی سطحی فلزها
- 4-2-12 بررسی گزارشهای نهایی
- 4-3 تحلیل توان میکروکنترلر
- 5- فصل پنجم: اندازه گیری و مقایسه با شبیهسازی
- 6- پیوست الف: کدهای مدل سایه qspi_flash_driver_xip
