VIP Central

Archive for May 2015

 

Configuring Memory VIPs

Here, Synopsys Applications Consultant, Vaish Ramachandran, describes how best we can use Synopsys’ VIP Configuration Creator for configuring memory VIPs http://bit.ly/1JcvSII You can find more information on Synopsys Memory VIP at http://bit.ly/1Rl2liD

Continue Reading...

Posted in DDR, Debug, eMMC, HBM, LPDDR, Methodology, ONFi | Comments Off on Configuring Memory VIPs

 

Memory VIP Challenges

Behavioral Memory Models have been used for verification purposes for several years now. In the early days, modeling technology didn’t add much value to the usage model as designs were simple. With increasing design complexity, and demand for more functionality driving SoC complexity and cost, memory verification models need to morph into a state that […]

Continue Reading...

Posted in DDR, eMMC, HBM, LPDDR, Memory, ONFi | Comments Off on Memory VIP Challenges

 

HDCP 2.2: Locality Check, SKE and Authentication with Repeaters

In The HDCP 2.2 Authentication Process – an Introduction, we discussed why we need HDCP, and the basic steps of the HDCP Authentication Process. We noted that an advanced version of RSA is the underlying cryptography standard used during the Authentication and Key Exchange (AKE). AKE is the first step in the authentication protocol. Here we will continue exploring the […]

Continue Reading...

Posted in HDCP, HDMI, Methodology | Comments Off on HDCP 2.2: Locality Check, SKE and Authentication with Repeaters

 

MIPI Soundwire: Digital Audio Streams and Channels

In MIPI Soundwire: Digital Audio Simplified, we mentioned that digital audio formats including Pulse Code Modulation (PCM) and Pulse Density Modulation (PDM) are target applications for MIPI Soundwire. Here we will discuss Digital Audio Streams and Channels. For more information on MIPI Soundwire, you can download our whitepaper. The figure below illustrates how Digital Audio is transferred between […]

Continue Reading...

Posted in Audio, Interface Subsystems, Methodology, MIPI, Mobile SoC, Soundwire | Comments Off on MIPI Soundwire: Digital Audio Streams and Channels

 

HDCP 2.2: Authentication and Key Exchange (AKE)

In The HDCP 2.2 Authentication Process – an Introduction, we discussed why we need HDCP, and the basic steps of the HDCP Authentication Process. We noted that an advanced version of RSA is the underlying cryptography standard used during the Authentication and key exchange. In HDCP 2.2 Authentication: RSA Cryptography, we discussed the basics of RSA Cryptography. […]

Continue Reading...

Posted in HDCP, HDMI, Methodology | Comments Off on HDCP 2.2: Authentication and Key Exchange (AKE)

 

AMBA System Monitor, Scoreboarding and Beyond

In my previous blog post, How do you Verify the AMBA System Level Environment? we discussed how to enable SOC verification engineers to create highly configurable AMBA fabric. The system environment should provide place-holders for hooking the DUT with any of the quintessential AMBA VIP components such as AXI3/4/ACE, AHB or APB. With the use of the […]

Continue Reading...

Posted in AMBA, Methodology, SystemVerilog, UVM | Comments Off on AMBA System Monitor, Scoreboarding and Beyond

 

MIPI Soundwire: Pulse Density Modulation (PDM)

In MIPI Soundwire: Digital Audio Simplified, we mentioned that digital audio formats including Pulse Code Modulation (PCM) and Pulse Density Modulation (PDM) are target applications for MIPI Soundwire. In the last blog post on Soundwire, we discussed Pulse Code Modulation. For more information on MIPI Soundwire, you can download our whitepaper. In this blog post, we will discuss […]

Continue Reading...

Posted in Audio, Interface Subsystems, Methodology, MIPI, Mobile SoC, Soundwire | Comments Off on MIPI Soundwire: Pulse Density Modulation (PDM)

 

HDCP 2.2 Authentication: RSA Cryptography

In the blog post, The HDCP 2.2 Authentication Process – an Introduction, we discussed why we need HDCP, and the basic steps of the HDCP Authentication Process. We noted that an advanced version of RSA is the underlying cryptography standard used during the Authentication and key exchange. Here, we will discuss the basics of RSA cryptography. You can learn […]

Continue Reading...

Posted in HDCP, HDMI, Methodology | Comments Off on HDCP 2.2 Authentication: RSA Cryptography