You are on page 1of 4

INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT IN Volume-8,Issue-3,(Sep-17)

TECHNOLOGY ISSN (O) :- 2349-3585

Verification of Bluetooth Low Energy


Controller In UVM Methodology
__________________________________________________________________________________________
K.Priyanka1,M.M. Dasu2
1,2
Department of Ece, Assistant Professor, Gandhiji Institute of Science and Technology, India

Abstract This paper presents a verification architecture of The specification defines the Bluetooth Host and the Bluetooth
the Bluetooth Low Energy Link Layer Controller. The tested Controller. The Bluetooth Host consists of software layers.
controller is a hardware implementation of the lower layers, The Host Controller Interface (HCI) is a set of services
de- scribed in the Bluetooth Low Energy Specification. The defined between Host and Controller and may be implemented
designed testbench uses a UVM methodology and over any communication protocol (e.g. USB, I2C). The
constrained random verification techniques to meet the Bluetooth Controller architecture is not fixed and may be
expected functional coverage metrics. different depending on requirements. In general, there is a
I.INTRODUCTION hardware part, such as physical (PHY) and link layers and a
The most demanding challenges for the testbench design are firmware part, running on CPU and controlling the hardware.
meeting the specification requirements and quality standards. The purpose of this work is to verify the digital hardware
There is no universal approach for successful verification of partofthedesignedcontroller-theBLELinkLayerController (later
any design, usually several solutions are used to achieve ex- referred as DUT). The design firmware code is reused in the
pected metrics. One of the most important goals is meeting the verification environment as a part of the Layering Agent. The
functional requirements. It means the verification environment BLE Link Layer Controller has two interfaces: CPU interface
must prove that the design follows the protocol-specific rules (e.g. APB or AXI) and physical layer interface connection to
defined in the standard. Moreover, it must be tested whether the analog PHY. The PHY functionality is limited to very
the requirements are met under any conditions, whether the basic operations, as the protocol coding itself is handled by the
design is resistant to transmission errors and unexpected BLE Link Layer Controller. The PHY functional model has
states, such as connection loss or access collisions.The been developed, which translates analog PHY interface into a
Universal Verification Methodology (UVM) is a framework physical channel model. The physical channel corresponds to
that provides a structural solution for complex verification the real radio environment. Therefore several PHYs can be
environments. The methodology allows to auto- mate the online at once, which allows to test complex network
implementation process and makes easier to add new scenarios. The CPU interface and the Bluetooth physical layer
features. It also simplifies the infrastructure planning e.g. interface (BLE interface) are controlled by UVM Agents. The
allows to easily collect and analyse the coverage data.There is Layering Agent implements the firmware over both interfaces.
a number of related work discussing verification The BLE Interface Agent and the Layering Agent coupled
environments. A UVM example is presented in for mixed- together can be called the BLE Controller Model, that must be
signal system (testbench is used to estimate the power con- capable of generating some random events, such as delays or
sumption). In this paper we present a verification environment transmission errors. Use of Layering Agents allows that test
designed for verification of the Bluetooth Low Energy Link scenarios can be implemented using HCI level of abstraction
Layer Controller. in both, CPU and physical interfaces.
II.BLUETOOTH LOW ENERGY VERIFICATION III.TESTBENCH ARCHITECTURE
SCOPE The verification environment was designed to verify a network
Bluetooth Low Energy (BLE) is a packet-based protocol [3]. that consists of up to two BLE Controllers (DUTs) and up to

20
All rights reserved by www.ijrdt.org
Paper Title:-Verification of Bluetooth Low Energy Controller In UVM Methodology

eighty BLE Controller Models. The test harness is shown in testbenchstructure. It consists of Virtual Sequencer, coverage
Figure 1. The harness connects components using physical components, Scoreboard, Agents and Layering Agents. It can
channel model of the real radio environment. Implementation be configured using parameters that allow to modify its
of this connection gives an opportunity to verify different structure for various test scenarios.
transaction scenarios using an arbitrary network structure. The • Test is the top level of the component hierarchy. It controls
harness is connected to the UVM environment by CPU the generation of the environment and initiates the test
Interface Agent(s) and BLE Interface Agent(s). A sequences.
generictestbench architecture for verification of BLE The BLE Interface Agent acts like a regular Bluetooth device.
Controller is shown in Figure 2. A designed architecture was Using UVM configuration mechanism, it may be set up as a
created in a way that number of agents connected to the transmitter, receiver or coverage collector without any
harness can be easily modified for each testcase. The main implementation changes. Bluetooth packet is an information
components of the designed UVM testbench are: • Agent unit which is used as an air interface packet in the link layer
encapsulates a sequencer (SQR), driver (DRV) and monitor for all Bluetooth devices. In BLE Interface Agent, Bluetooth
(MON). Sequencer creates streams of transactions and sends a packets are stored in the basic UVM data item - BLE
Sequence Items downstream to a driver. Sequence Item. This basic data item contains all essential
information about carrying BLE Packet including its structure
and additional data as a protocol delay or interface errors. The
BLE Interface Driver is responsible for initiating requests for
new transactions and driving them to the DUT (with delay
control). It includes all of the bitstream processing features

Fig. 1. Test harness like CRC generation and checking or data whitening. When

Driver pulls those transaction and maps the Sequence Items to BLE Interface Agent works in receiver mode, it is capable of

the signal level format required by the DUT interface. Monitor collecting data from the interface and packing it to the

observes signals on the interface and assembles sequence sequence data item.

items that it distributes to the rest of the verification


environment through one or more standard communication
ports.
• Layering Agent structure gives the opportunity of using
different protocol to drive the DUT. It simplifies upper layers
of the environment and allows to reuse protocol wrappers
(such as a firmware)
• Virtual Sequencer creates streams of transactions for the
target Sequencers. This component drives Agents and controls Fig. 2. TB architecture
the actual test scenario by processing Virtual Sequences. By using Questa simulation software, the Verification of BLE
• Coverage Collector collects interface events and registers the components such as transmit Agent and receive agent are done
functional coverage. and the log files for the test cases are generated with Coverage
• Scoreboard is used to verify whether the test scenario results report. Table shows the coverage of the whole environment
are correct. It may check the data integrity, the event order or for code and functional coverage. 92.5% overall coverage has
status propagation through the DUT. It also detects timeouts been obtained. It is not 100% as there is unreachable or
or deadlocks. unobservable code like testing logics, redundant code and
• Environment is an entity that assembles the functionality which is not under verification. The functional

21
ISSN:-2349-3585 |www.ijrdt.org
Paper Title:-Verification of Bluetooth Low Energy Controller In UVM Methodology

coverage has been attained by developing sufficient assertions


and creating Cover groups, cover points and bins. 100%
assertion coverage has been obtained

TABLE 2 Coverage Details For Transmit Packet Cover


Group
UVM establishes a methodology to improve design and
verification efficiency, verification data portability, and tool
Fig 3. Verification of BLE in UVM from master to slave
and VIP interoperability. More than a collection of best-in-
Table 1 and 2 shows the functional coverage and the code
class verification solutions, the Questa Verification Platform
coverage of transmitter and receiver modules respectively. Tx
from Mentor Graphics provides the means to transform
coverage is 77.58% and Rx coverage is 77.71%. The cover
verification.
group coverage is not 100% as all the registered address is not
CONCLUSION
required to be checked which results in 89.23% coverage. In
Bluetooth Low Energy (BLE) is rather new protocol, and in
the scoreboard, the actual output is compared with the
this study we deepened the understanding of both the
expected one. If the obtained output matches with the
theoretical capabilities of the protocol itself and the
expected result then we conclude that the verification is
capabilities of the currently available transceivers to
completed successfully. By using Questa simulation software,
implement the protocol. In the paper, we also compared BLE
the Verification of BLE components such as transmit Agent
with two other protocols-Simplicity, which is a proprietary
and receive agent are done and the log files for the test cases
protocol developed by Texas Instruments, and IEEE 802.15.4,
are generated with Coverage report. Table 1 shows the
which is the de-facto communication standard in the WSNs.
coverage of the whole environment for code and functional
The results reveal that BLE can potentially support the
coverage. 92.5% overall coverage has been obtained. Table 1
maximum LL data throughput of around 320kbit/s. This is
and 2 shows the functional coverage and the code coverage of
about 70% higher than the maximum throughput possible for
transmitter and receiver modules
IEEE 802.15.4 with 2450 DSSS PHY (i.e.,190kbit/s).
Nonetheless, the results of the measurements that were
executed using the real BLE transceivers revealed that the
current version of the used BLE stack has several limitations,
which prevented us from obtaining a throughput higher than
123kbit/s. This is about 20% lower than the throughput we
have obtained with the IEEE 802.15.4 transceivers and 40%
lower than the maximum throughput that was measured for
SimpliciTI transceivers. The maximum throughput that we
managed to obtain on BLE advertising channels was below 10
kbit/s. The absence of the mechanism for the BLE Controller
Table 1 Local Instance Coverage Details to inform the Host about the start/end of an advertising event

22
ISSN:-2349-3585 |www.ijrdt.org
Paper Title:-Verification of Bluetooth Low Energy Controller In UVM Methodology

complicates the implementation of the data transfer on BLE


advertising channels. The specifications of are verified
successfully using UVM methodology on QuestaSim
simulator. Functional coverage i.e. measure of implementation
of design is carried out and 92.5% of coverage is extracted.
The coverage can be improved by modifying the code
according to the need. The scoreboard successfully compares
the result of every transaction generated.
ACKNOWLEDGMENT
I express my sincere gratitude to Mr M.M. Dasu, Department
of ECE , GIST college, India and also thanks to for
continuous guidance and other Professors of Department of
VLSI Design and Embedded Systems, GIST, India for
extending their help & support in giving technical ideas about
the paper without which I would not come up with this paper.
REFERENCES
[1] Universal Verification Methodology (UVM) 1.1 Users
Guide, Accellera, 2011.
[2] F. Neumann, M. Sathyamurthy, L. Kotynia, E. Hennig, R.
Sommer, ‖UVM-based Verification of Smart-Sensor
Systems,‖ International Conference on Synthesis, Modeling,
Analysis and Simulation Methods and Applications to Circuit
Design (SMACD), 2012.
[3] Bluetooth Specification, version 4.0, 2010.
[4] J. Bergeron, F. Delguste, S. Knoeck, S. McMaster, A.
Pratt, A. Sharma ‖Beyond UVM: Creating Truly Reusable
Protocol Layering,‖ Synopsys, Inc., 2013.
[5] Y. Kim and L.-S. Kim,‖64-bit carry select adder with
reduced area,‖Electron.Lett. Vol. 37, no. 10, pp. 614-615, May
2001.
[6]J. M. Rabaey, Digital integrated circuits—A Design
perspective. Upper Saddle River, NJ: Prentice-Hall, 2001.
[7] T. Y. Ceiang and M. J. Hsiao, ―Carry-select adder using
single ripple carry adder, ‖ Electron.Lett., vol. 34, no. 22, pp.
2101–2103, 1998. 978-1.

23
ISSN:-2349-3585 |www.ijrdt.org

You might also like