JTAG over the internet!. The problem Until now device testing was physically (geographically) limited as the DUT (device under test) and the TAP controller.

Slides:



Advertisements
Similar presentations
Introduction to DFT Alexander Gnusin.
Advertisements

Transmission media Term 2, 2011 Week 2.
Virtual LANs.
Abhay.K.Parekh and Robert G.Gallager Laboratory for Information and Decision Systems Massachusetts Institute of Technology IEEE INFOCOM 1992.
LOGSYS Development Environment of Embedded Systems Tamás Raikovich Béla Fehér Péter Laczkó Budapest University of Technology and Economics Department of.
SPI Serial Peripheral Interface. SPI Serial Peripheral Interface is communication between two devices, one bit at a time sequential one bit at time over.
Comparison of different MIMO-OFDM signal detectors for LTE
Max-Min D-Cluster Formation in Wireless Ad Hoc Networks - Alan Amis, Ravi Prakash, Thai Vuong, Dung Huynh Presenter: Nirav Shah.
1 Asynchronous Bit-stream Compression (ABC) IEEE 2006 ABC Asynchronous Bit-stream Compression Arkadiy Morgenshtein, Avinoam Kolodny, Ran Ginosar Technion.
Chapter 5 Multiplexing : Sharing a Medium
Lecture 28 IEEE JTAG Boundary Scan Standard
IP –Based SAN extensions and Performance Thao Pham CS 622 Fall 07.
BEEKeeper Remote Management and Debugging of Large FPGA Clusters Terry Filiba Navtej Sadhal.
First Generation (1G) Alison Griffiths C203 Ext:3292
By Abdullah M. Dalloul… Abdullah M. Dalloul… Salman Y. Mansour Salman Y. Mansour Supervisor. Supervisor. Dr.
Real-Time Systems Design JTAG – testing and programming.
CDMA X RTT Overview. Global 3G Evolution.
TAP (Test Access Port) JTAG course June 2006 Avraham Pinto.
1 Chapter 5 Multiplexing : Sharing a Medium Data Communications and Computer Networks: A Business User’s Approach.
DAKNET Presented By: rreema.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
Damian Gordon.  When we hook up computers together using data communication facilities, we call this a computer network.
Satellite Communication
Local Positioning Mike Overy Chair Local Positioning WG Local Positioning v5.ppt #1 Mike Overy.
Network Topologies.
1 EE 587 SoC Design & Test Partha Pande School of EECS Washington State University
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
Submission doc.: IEEE 11-11/1455r0 Nov 2011 Fei Tong,Les Smith, CSRSlide ah network outdoor deployment issues Date: 2011-Nov-03 Authors:
Switching Techniques Student: Blidaru Catalina Elena.
Inter TEL62 communication M. Raggi, M. Piccini, F. Gonnella 16 th October 2013 TDAQ Working Group Meeting.
Oppenheimer Technologies Rick King Jonathan Creekmore.
Communications & Networks
Chapter 7 Transmission Media. Transmission medium (layer zero) A transmission media defined as anything that carry information between a source to a destination.
3.1 Figure 3.16 Two digital signals: one with two signal levels and the other with four signal levels.
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the  Bus  Ring  Star.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
INTRODUCTION Bluetooth technology is code name for Personal Area Network (PAN) technology that makes it extremely easy to connect a mobile, computing device.
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
NETWORKING FUNDAMENTALS. Bandwidth Bandwidth is defined as the amount of information that can flow through a network connection in a given period of time.Bandwidth.
Jump Starting ITS Deployment in Los Angeles County using Wireless Communications Lessons Learned.
2008/4/101 A DAPTIVE P OWER A LLOCATION AND C ALL A DMISSION C ONTROL IN M ULTISERVICE W IMAX A CCESS N ETWORKS IEEE Wireless Communications February 2007.
1 Chapter 5 Multiplexing : Sharing a Medium Data Communications and Computer Networks: A Business User’s Approach.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Extending LANs Fiber modems Repeaters Bridges Switches.
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
CS 8501 Networks-on-Chip (NoCs) Lukasz Szafaryn 15 FEB 10.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
William Stallings Data and Computer Communications
April 20, 2001VLSI Test: Bushnell-Agrawal/Lecture 281 Lecture 28 IEEE JTAG Boundary Scan Standard n Motivation n Bed-of-nails tester n System view.
Performance Evaluation of Mobile Hotspots in Densely Deployed WLAN Environments Presented by Li Wen Fang Personal Indoor and Mobile Radio Communications.
Stretchable Architectures for Next Generation Cellular Networks Presented By Shashidhar Lakkavalli, Ansuya Negi and Dr. Suresh Singh Portland State University.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Wireless Multiple Access Multiple Simultaneous Connections By Dr. Larry Hash.
WAN Transmission Media
Data Communications & Computer Networks, Second Edition1 Chapter 5 Multiplexing: Sharing a Medium.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
TELECOMMUNICATION. Communication over a long distance.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
NETWORKS THEORY AND PRACTICAL DISCUSSION JOHN KOVACEVICH INFORMATION SERVICES DEPARTMENT TEXAS A&M GALVESTON CAMPUS
1 Timing of the calorimeter monitoring signals 1.Introduction 2.LED trigger signal timing * propagation delay of the broadcast calibration command * calibration.
Access Link Capacity Monitoring with TFRC Probe Ling-Jyh Chen, Tony Sun, Dan Xu, M. Y. Sanadidi, Mario Gerla Computer Science Department, University of.
SYSTEM-LEVEL TEST TECHNIQUES INTRODUCTION In the 1970s, the in-circuit testing (ICT) method appeared. In the 1970s, the in-circuit testing (ICT) method.
Performance Evaluation of Scheduling in IEEE based Wireless Mesh Networks Bo Han, Weijia Jia,and Lidong Lin Computer Communications, 2007 Mei-zhen.
“An Eye View On the Future Generation Of Phones”
Different Types Of Connecting To Internet
2200 Mission College Blvd., Santa Clara, CA 95054, USA
Submission Title: [Harmonizing-TG3a-PHY-Proposals-for-CSM]
EEE 264-2:Capacity Increase Techniques and Calculations
Presentation transcript:

JTAG over the internet!

The problem Until now device testing was physically (geographically) limited as the DUT (device under test) and the TAP controller had to be located in close proximity.

(continue) This may be problematic when devices are Inaccessible due to various reasons such as geographical distance (different states / outer space) or After having been deployed (logistical and financial considerations)

The solution Harnessing the internet and various forms of communication to allow long distance testing!

The implementation Simulation of direct connectivity – both controller and DUT believe they are directly connected and communicate with IEEE specifications

Data Transceiving TMS-TDI Information is sent from Uplink to Downlink. TCK is generated by the Downlink, asynchronously to original. TDO information is sent from Downlink to Uplink.

Delay Compensation Boundary scan relies on synchronous communication. This is a potential problem as propagation delays become significant over large distances  data from last link in BS chain won’t arrive to controller on time!

Example If for example, the target TCK frequency is 10MHz, which equates to a TCK clock period of 100 ns. This effectively, only leaves a period of 50 ns for TDO data to travel from the last DUT in the chain to the test controller. (1/2 cycle)

(Example continued) Assuming the propagation delay of the cable is 5ns/m, a maximum cable length of 10 metres can only be used!

The solution: Virtual cells! “Virtual Cells” are added to the end of Boundary- Scan Chain  Additional time is gained for compensating transmission delays

Session management Since the number of virtual cells is a function of the communication line congestion (and thus delay) which varies with time, the number of virtual cells should change with time as well!

(continue) A connection oriented (TCP like) session is established between uplink and downlink and channel loop-back tests are performed to calculate the optimum number of virtual cells, using EMWA : (Where X(k) is the estimation at time k and 0 < alpha < 1)

Embedded implementation Both uplink and downlink units can be embedded onto the chip allowing for smaller packaging (which is of high importance for small proportioned devices)

Performance Using a 1 Gigabit Ethernet connection makes it possible to execute boundary-scan tests on the target design at acceptable TCK frequencies of up to 40MHz over an unlimited distance.

Possible uses Factory with multiple production lines - Often a manufacturing facility will have multiple production lines; this will centralize testing and may dramatically reduce costs

Some more uses Testing performed on devices orbiting the earth – where the only means of communication is unwired Cellular phones testing / firmware updates Configurations and contingency operations remotely

Benefits (conclusion) Late test access and SW/FW updates possible Real time diagnostics made possible from one, remote place Enable access to otherwise inaccessible devices Scalable