You are on page 1of 11

Tessent IJTAG Student Workbook

Student Workbook

 2016 Mentor Graphics Corporation


All rights reserved.

This document contains information that is trade secret and proprietary to Mentor Graphics Corporation or its licensors and
is subject to license terms. No part of this document may be photocopied, reproduced, translated, distributed, disclosed or
provided to third parties without the prior written consent of Mentor Graphics.
This document is for information and instruction purposes. Mentor Graphics reserves the right to make changes
in specifications and other information contained in this publication without prior notice, and the reader should, in
all cases, consult Mentor Graphics to determine whether any changes have been made.

The terms and conditions governing the sale and licensing of Mentor Graphics products are set forth in written
agreements between Mentor Graphics and its customers. No representation or other affirmation of fact
contained in this publication shall be deemed to be a warranty or give rise to any liability of Mentor Graphics
whatsoever.

MENTOR GRAPHICS MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE.

MENTOR GRAPHICS SHALL NOT BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR
CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS)
ARISING OUT OF OR RELATED TO THIS PUBLICATION OR THE INFORMATION CONTAINED IN IT, EVEN
IF MENTOR GRAPHICS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

U.S. GOVERNMENT LICENSE RIGHTS: The software and documentation were developed entirely at private
expense and are commercial computer software and commercial computer software documentation within the
meaning of the applicable acquisition regulations. Accordingly, pursuant to FAR 48 CFR 12.212 and DFARS
48 CFR 227.7202, use, duplication and disclosure by or for the U.S. Government or a U.S. Government
subcontractor is subject solely to the terms and conditions set forth in the license agreement provided with the
software, except for provisions which are contrary to applicable mandatory federal laws.

TRADEMARKS: The trademarks, logos and service marks ("Marks") used herein are the property of Mentor
Graphics Corporation or other parties. No one is permitted to use these Marks without the prior written consent
of Mentor Graphics or the owner of the Mark, as applicable. The use herein of a third- party Mark is not an
attempt to indicate Mentor Graphics as a source of a product, but is intended to indicate a product from, or
associated with, a particular third party. A current list of Mentor Graphics’ trademarks may be viewed at:
www.mentor.com/trademarks.

End-User License Agreement: You can print a copy of the End-User License Agreement from:
www.mentor.com/eula.

Mentor Graphics Corporation


8005 S.W. Boeckman Road, Wilsonville, Oregon 97070-7777
Telephone: 503.685.7000
Toll-Free Telephone: 800.592.2210
Website: www.mentor.com
SupportNet: supportnet.mentor.com/

Send Feedback on Documentation: supportnet.mentor.com/doc_feedback_form

Part Number: 073426


Table of Contents
Module 1: IEEE 1687 Introduction ..................................................................... 11
Objectives ........................................................................................................................................... 12

IEEE 1687 Motivation ....................................................................................................................... 13

IEEE 1687 Motivation (Cont.) ........................................................................................................... 14

IEEE 1687 Motivation (Cont.) ........................................................................................................... 15

IEEE 1687 Motivation (Cont.) ........................................................................................................... 16

IEEE 1687 Motivation (Cont.) ........................................................................................................... 17

IEEE 1687 Motivation (Cont.) ........................................................................................................... 18

IEEE 1687 Motivation (Cont.) ........................................................................................................... 19

IEEE 1687 Motivation (Cont.) ........................................................................................................... 20

IEEE 1687 .......................................................................................................................................... 21

IEEE 1687 (Cont.) .............................................................................................................................. 22

Who can Use Tessent IJTAG? ........................................................................................................... 23

IEEE 1687 Provides a Uniform Standard .......................................................................................... 24

IEEE 1687 Glossary .......................................................................................................................... 25

Tessent IJTAG Use Model of IEEE 1687 .......................................................................................... 26

Comparing IEEE 1687 versus IEEE 1149.1 and IEEE 1500 ............................................................. 27

How IJTAG Extends the use of JTAG ............................................................................................... 28

Key Differences Between JTAG and IJTAG ..................................................................................... 29

Getting Help With Tessent Tools ....................................................................................................... 30

Getting Help With Tessent Tools (Cont.) .......................................................................................... 31

Getting Help With Tessent Tools (Cont.) .......................................................................................... 32

Tessent Bookcase: Accessing Manuals .............................................................................................. 33

SupportNet ......................................................................................................................................... 34

Tessent IJTAG Student Workbook I


Table of Contents
Customer Support ............................................................................................................................... 35

Lab 1: Exploring the Help System ..................................................................................................... 36

Module 2: Tessent IJTAG Overview ................................................................... 37


Objectives ........................................................................................................................................... 38

Differences Between IEEE 1687 and Tessent IJTAG ....................................................................... 39

Summary: IEEE 1687 ......................................................................................................................... 40

Operation Example: Accessing Instruments ...................................................................................... 41

Setup to Enable Access to BLOCK1/TDR ........................................................................................ 42

Enable Access BLOCK1/TDR ........................................................................................................... 43

Load Data into BLOCK1/TDR — Enable Block2/TDR ................................................................... 44

Load Data into BLOCK2/TDR .......................................................................................................... 45

IEEE 1687 ICL Instrument Example: Test Data Register (TDR) ...................................................... 46

Building ICL Netlist ........................................................................................................................... 47

PDL Commands ................................................................................................................................. 48

PDL Retargeting ................................................................................................................................. 49

ICL Network Extraction ..................................................................................................................... 50

Tessent IJTAG Flow ( PDL Command Retargeting) ......................................................................... 51

Basic Retargeting Flow Versus ICL Extraction Flow ........................................................................ 52

Generic ICL Extraction Flow (in Retargeting Flow) ......................................................................... 53

ICL Query .......................................................................................................................................... 54

SUPPLEMENTAL: Introduction to Tessent Shell ............................................................................ 55

Introduction to Tessent Shell (Cont.) ................................................................................................. 56

Introduction to Tessent Shell (Cont.) ................................................................................................. 57

Introduction to Tessent Shell (Cont.) ................................................................................................. 58

Introduction to Tessent Shell: Introspection and Tcl Collections ...................................................... 59

Tessent IJTAG Student Workbook II


Table of Contents
Introduction to Tessent Shell: Introspection and Tcl Collections (Cont.) .......................................... 60

Introduction to Tessent Shell: Design Editing Command Set............................................................ 61

Introduction to Tessent Shell: Object Attributes ................................................................................ 62

Summary: Tessent Shell ..................................................................................................................... 63

Lab Exercise ....................................................................................................................................... 64

Module 3: Basic IJTAG Flow ............................................................................... 65


Objectives ........................................................................................................................................... 66

Building Block: ICL Module ............................................................................................................. 67

Building Block: ICL Module — Port Keywords ............................................................................... 68

Building Block: ICL Module: Test Data Register (TDR) ................................................................. 69

Building Block: ICL Module: Segment Insertion Bit (SIB) .............................................................. 70

Building Block: ICL Module — Segment Insertion Bit (SIB) (Cont.) .............................................. 71

IJTAG Building Block: ICL Netlist ................................................................................................... 72

IJTAG Building Block: ICL Netlist (Cont.) ....................................................................................... 73

IJTAG Building Block: ICL Netlist (Cont.) ....................................................................................... 74

ICL Versus Verilog Modeling............................................................................................................ 75

Creating ICL for a Module ................................................................................................................. 76

Basic PLL Model ............................................................................................................................... 77

Basic PLL Model (Cont.) ................................................................................................................... 78

Read in ICL and PDL Files ................................................................................................................ 79

PDL Commands: Creating PDL Comments ...................................................................................... 80

PDL Commands: Writing to an Object .............................................................................................. 81

PDL Commands: Reading From an Object ........................................................................................ 82

PDL Commands: Executing PDL Commands ................................................................................... 83

Executing PDL Commands: Order of Execution ............................................................................... 84

Tessent IJTAG Student Workbook III


Table of Contents
Order of Execution: iApply Group in Retargeted PDL Pattern ......................................................... 85

Order of Execution: Examples ........................................................................................................... 86

Order of Execution: Examples (Cont.) ............................................................................................... 87

Order of Execution: iMerge ............................................................................................................... 88

Creating a Pattern Set ......................................................................................................................... 89

Writing PDL Patterns and Test Bench Files ...................................................................................... 90

Review ................................................................................................................................................ 91

Lab 3: Understanding the Basic IJTAG Flow .................................................................................... 92

Module 4: ICL, PDL Retargeting and Reuse ..................................................... 93


Objectives ........................................................................................................................................... 94

Advanced ICL Constructs .................................................................................................................. 95

Parameter ............................................................................................................................................ 96

Alias ................................................................................................................................................... 97

Alias (Cont.) ....................................................................................................................................... 98

Enumeration Tables............................................................................................................................ 99

Enumeration Tables (Cont.) ............................................................................................................. 100

PLL.icl: More Complex Model ........................................................................................................ 101

PLL Data Sheet — Control Definitions ........................................................................................... 102

PLL.icl: More Complex Model ........................................................................................................ 103

PDL Command Retargeting Principle .............................................................................................. 104

PDL Command Retargeting Principle (Cont.) ................................................................................. 105

PDL Command Retargeting Principle (Cont.) ................................................................................. 106

PDL Command Retargeting Principle: Segment Insertion Bit (SIB) .............................................. 107

PDL Command Retargeting Principle: Segment Insertion Bit (SIB) (Cont.) .................................. 108

PDL Command Retargeting Principle Example .............................................................................. 109

Tessent IJTAG Student Workbook IV


Table of Contents
PDL Command Retargeting Principle: Calling a PDL Procedure ................................................... 110

PDL Command Retargeting Principle: Calling a PDL Procedure (Cont.) ....................................... 111

Calling a Procedure to Read From an Object ................................................................................... 112

Typical PDL Command Retargeting Flow ....................................................................................... 113

Example: Invoke and Setup.............................................................................................................. 114

Example: Invoke and Setup (Cont.) ................................................................................................. 115

Example: Create and Write Out Pattern Set ..................................................................................... 116

Example: Calling a PDL Procedure ................................................................................................. 117

Example: Retargeted PDL Output .................................................................................................... 118

Example: (Resulted) Retargeted PDL Patterns ................................................................................ 119

Another Example of PDL Command Retargeting ........................................................................... 120

Another Example of Creating and Writing Out a Pattern Set ......................................................... 121

Retargeted PDL Pattern 1 ................................................................................................................. 122

PDL Retargeting Command Summary ............................................................................................ 123

Tessent Shell Tool Commands Used With Tessent IJTAG ............................................................. 124

Additional Topics: Clocks ................................................................................................................ 125

Additional Components: Clocks (Cont.) .......................................................................................... 126

Additional Components: Default Clock ........................................................................................... 127

Additional Components: Modifying Default Clock ......................................................................... 128

Additional Components: Synchronous Clocks ................................................................................ 129

Additional Components: Clocks — Synchronous Clocks (Cont.) ................................................... 130

Additional Components: Clocks — Asynchronous Clocks ............................................................. 131

Additional Components: Clocks — Synchronous and Asynchronous ............................................. 132

Optional Commands of the PDL Retargeting Flow: IJTAG Query ................................................. 133

Optional Commands of the PDL Retargeting Flow: IJTAG Query (Cont.) .................................... 134

Tessent IJTAG Student Workbook V


Table of Contents
IJTAG Query — Examples .............................................................................................................. 135

IJTAG Query — Examples (Cont.).................................................................................................. 136

IJTAG Query — Examples (Cont.).................................................................................................. 137

IJTAG Query Commands................................................................................................................. 138

Lab 4: PDL Retargeting and Reuse .................................................................................................. 139

Module 5: Migrating Designs to Tessent IJTAG ............................................. 141


Objectives ......................................................................................................................................... 142

Advantages of Migrating to IJTAG (1687) ...................................................................................... 143

Migration Methodology ................................................................................................................... 144

Migration Methodology (Cont.) ....................................................................................................... 145

How IEEE 1687 Extends the Use of IEEE 1149.1 and IEEE 1500 ................................................. 146

Tessent IJTAG Use Model of IEEE 1687 ........................................................................................ 147

Tessent IJTAG Use Model of IEEE 1687 (Cont.) ........................................................................... 148

Migration Methodology: IEEE 1149.1 Example 1 .......................................................................... 149

Example: ICL for General TAP Controller ...................................................................................... 150

Example: ICL for General TAP Controller (Cont.) ......................................................................... 151

Migration Methodology: IEEE 1149.1 Example 2 .......................................................................... 152

Migration Methodology: IEEE 1149.1 Example (Cont.) ................................................................. 153

Example: ICL Netlist ....................................................................................................................... 154

Example: Retargeted PDL Patterns .................................................................................................. 155

Example: Retargeted PDL Patterns (Cont.) ..................................................................................... 156

Migration Methodology: Combined TAP and WTAP Scenario ...................................................... 157

Migration Methodology: Combined TAP and WTAP Scenario (Cont.) ......................................... 158

Migration Methodology: Combined TAP and WTAP Scenario (Cont.) ......................................... 159

Migration Methodology: Combined TAP and WTAP Scenario (Cont.) ......................................... 160

Tessent IJTAG Student Workbook VI


Table of Contents
Migration Methodology: Combined TAP and WTAP Scenario (Cont.) ......................................... 161

Lab 5: Migrating Designs to Tessent IJTAG ................................................................................... 162

Module 6: ICL Network Extraction .................................................................. 163


Objectives ......................................................................................................................................... 164

Revisiting PDL Retargeting ............................................................................................................. 165

Overview: ICL Network Extraction ................................................................................................. 166

Overview: ICL Network Extraction (Cont.) .................................................................................... 167

Overview: ICL Network Extraction (Cont.) .................................................................................... 168

Overview: ICL Network Extraction (Cont.) .................................................................................... 169

Overview: ICL Network Extraction (Cont.) .................................................................................... 170

Overview: ICL Network Extraction (Cont.) .................................................................................... 171

Overview: ICL Network Extraction (Cont.) .................................................................................... 172

Generic ICL Extraction Flow (in Retargeting Flow) ....................................................................... 173

ICL Network Extraction Step-By-Step ............................................................................................ 174

ICL Network Extraction Step-By-Step (Cont.) ................................................................................ 175

ICL Network Extraction Commands................................................................................................ 176

set_module_matching_options Example.......................................................................................... 177

More ICL Network Extraction Commands ...................................................................................... 178

More ICL Network Extraction Commands (Cont.) ......................................................................... 179

Top-Down Versus Bottom-Up Extraction ....................................................................................... 180

Example — Design View ................................................................................................................. 181

Top-Down Extraction Example........................................................................................................ 182

Top-Down Extraction Example: Results.......................................................................................... 183

Bottom-Up Extraction Example ....................................................................................................... 184

Bottom-Up Extraction Example — Extract Top-Level When Loading Block-Level Result ......... 185

Tessent IJTAG Student Workbook VII


Table of Contents
ICL Network Extraction Design Rule Check (DRC) and Debugging ............................................. 186

ICL Network Extraction DRC.......................................................................................................... 187

Using DFTVisualizer for Debugging ............................................................................................... 188

Special ICL Extraction Attributes .................................................................................................... 189

Special ICL Extraction Attributes (Cont.)........................................................................................ 190

Special ICL Extraction Attributes — Example ................................................................................ 191

ICL Network Extraction Commands................................................................................................ 192

ICL Sematic Rules ........................................................................................................................... 193

ICL Sematic Rules: Parser Rule Example........................................................................................ 194

ICL Sematic Rules: Module Rule Example ..................................................................................... 195

ICL Sematic Rules: ICL Primitive Model Rule Example ................................................................ 196

Lab 6: ICL Network Extraction........................................................................................................ 197

Module 7: Tessent IJTAG in the Tessent Flow ................................................ 199


Objectives ......................................................................................................................................... 200

Ijtag Network (Top Level Example) ................................................................................................ 201

Tessent MemoryBIST Flow ............................................................................................................. 202

Specify Requirements: Design Level ............................................................................................... 203

Specify Requirements: Memory BIST Options ............................................................................... 204

Tessent MemoryBIST Flow ............................................................................................................. 205

Create the DftSpecification .............................................................................................................. 206

DFTSpecification: report_config_data ............................................................................................. 207

DFTSpecification: display_specification ......................................................................................... 208

DFTSpecification: Insert Test Logic ................................................................................................ 209

blockA: Design ................................................................................................................................. 210

blockA: DFTSpecification ............................................................................................................... 211

Tessent IJTAG Student Workbook VIII


Table of Contents
blockA: Post DFTSpecification Processing Block Diagram............................................................ 212

Extract ICL ....................................................................................................................................... 213

Patterns Specification ....................................................................................................................... 214

Extract ICL and PatternsSpecification Review ................................................................................ 215

Lab 7 ................................................................................................................................................. 216

Tessent IJTAG Student Workbook IX

You might also like