Preview

X Masking Techniques and Test Data Compaction of Logic Bist

Powerful Essays
Open Document
Open Document
19343 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
X Masking Techniques and Test Data Compaction of Logic Bist
B.E. PROJECT ON X-MASKING TECHNIQUES AND TEST DATA COMPACTION FOR LOGIC BUILT-IN SELF TEST
A DISSERTATION SUBMITTED TOWARDS THE PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF A DEGREE IN BACHELOR OF ENGINEERING IN ELECTRONICS AND COMMUNICATION Submitted By
HIMANSHU DOVAL VARUN KAPOOR (2K7/EC/643) (2K7/EC/713)

UNDER THE GUIDANCE OF
DR. ASOK BHATTACHARYYA

DEPARTMENT OF ELECTRONICS AND COMMUNICATION DELHI COLLEGE OF ENGINEERING 2011

ABSTRACT

Testing is done for checking the integrated circuits for manufacturing faults introduced during semiconductor processing. Testing typically consists of applying a set of test stimuli to the inputs of the circuit under test (CUT) while analyzing the output responses. An Automated test Equipment (ATE) is used to generate the test stimuli and analyze the output.

Logic built-in self-test (LBIST) is a design for testability (DFT) technique in which a portion of a circuit on a chip, board, or system is used to test the digital logic circuit itself. A typical logic BIST system contains a test pattern generator (TPG) which automatically generates test patterns for application to the inputs of the circuit under test; an output response analyzer (ORA) which automatically compacts the output responses of the CUT into a signature. This signature is compared with a golden signature to decide whether the chip contains manufacturing faults. The most significant advantage of LBIST is that it does not require the expensive ATE and it makes on-field testing possible.

To make Logic BIST solution practically applicable there are a few problems which one has to deal with. These are associated with the hardware as well as with the software. Hardware (Multiple Input Shift Register) needs to be protected from the flow of don’t cares and software issues deal with the Test data Compaction which is necessary so as to reduce the on chip tester memory. ii

CERTIFICATION

This is to certify that the project entitled “LOGIC

You May Also Find These Documents Helpful

  • Good Essays

    1310 unit 4

    • 440 Words
    • 2 Pages

    Continuity tester: A toll used to determine whether an electrical circuit can be made between to points.…

    • 440 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Service Request Sr Rm 004

    • 1582 Words
    • 7 Pages

    This phase requires the coordination and cooperation of many people. The system analyst cannot conduct all the work alone. The first step involves coding. Coding is process of converting writing computer language that tells the system the commands to perform when certain commands are given. As the coding process being, the process of testing is also taking place as well. When coding is written, it must pass validation or the computer will not understand the language and the expect program will not perform to standard. Many strategies are available for testing validation; the size of the system dictates which is best. Throughout the system development life cycle, software testing was taking place after certain events to ensure the preliminary creation was on track. During analysis the overall test plan was developed. In the design phase, the unit test, integration test plan, and a system test plan was developed. Inspections are formal group activities that perform manually to find obvious errors such as syntax and…

    • 1582 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    The advantages of automated testing is that the tests are reliable to the point that same test is ran…

    • 442 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    o Provide a set of test values that test the abnormal operation of this program segment.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ece241 Project

    • 583 Words
    • 3 Pages

    Recommended Design Techniques for ECE241 Project Franjo Plavec Department of Electrical and Computer Engineering University of Toronto DISCLAIMER: The information contained in this document does NOT contain official grading policy. The information provided here is based on my personal experience with ECE241 course projects in the previous years. Its purpose is to warn you of some common mistakes and answer some common questions student in earlier years had. As grading policies and project requirements change from year to year, please consult course web site or your instructor for official policies. THIS DOCUMENT MAY CONTAIN SOME MISTAKES. I will do my best to point those mistakes to you if I discover any, but I cannot make any guarantees. All information in this document is MY PERSONAL PREFERRED WAY OF DOING VARIOUS TASKS RELATED TO HARDWARE DESIGN. It is by no means the only possible way to perform these tasks. Also, this document does not cover, nor does it attempt to cover all aspects of various problems discussed. Therefore, you should not make any implications on aspects of the problems not mentioned in this document. In other words, if the document states X, and you try to do Y, which is “very similar to X”, do not assume that statements this document makes for X necessarily hold for Y. CHECK YOUR ASSUMPTIONS against your textbook, course notes, your instructor’s and/or TA’s advice, compilation and simulation results from Quartus, and finally, common sense. Verilog and Quartus Issues When using Verilog for the first time in a real project, users are often tempted to use fancy features of the language to make their lives easier. Unfortunately, if one succumbs to those temptations, they usually make their lives harder. The main reason for that is that Verilog, the way it is used in ECE241 labs and the way Quartus II interprets it, is not a programming language. Verilog is a hardware description language, meaning that various blocks of code directly map into…

    • 583 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    ECET230 Lab1 Procedures

    • 2138 Words
    • 8 Pages

    The next step is to SIMULATE the logic design. This is a verification step used to analyze the functionality of a design. Simulation allows us the chance of verifying a design without actually building the circuit. The…

    • 2138 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Both Sides Battle (The Advantages of the North/South) The Advantages of The Union (North) and the Confederacy (South) in the Civil War include Advancements in Politics,Economics,Demographics and Social Stature. Before the Civil War, The Whig Party after Van Buren,William Harrison,Zachary Taylor and Millard Fillmore had Crumpled and in the Ashes Had Spawned More Parties to oppose US Governmental Ideas Like The Unionist Party,Free Soil Party and The Copperheads. The North had Mostly controlled the government (The South had a few presidents,but were Futile in the run up to the Civil War)The Northerners Advantages in the Government were that they had a Increasing amount of Industrialization and a great Capitalist Ideal, Which lead to more northern…

    • 184 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The Jaguar project, which was a project undertaken by Teradyne Corporation, the World’s largest supplier of equipment for testing semiconductors. The aim of the project was to develop a highly flexible tester platform that could be easily adjusted to the needs of different device segments. It was a critical project that will determine the ability and success of Teradyne to compete in the market, especially that the market need was drastically shifting towards flexible tester platforms rather than different specific test systems for each type of semiconductor device.…

    • 739 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Teradyne Jaguar Project

    • 2237 Words
    • 7 Pages

    Semiconductors cover a very broad range of devices which can be classified by 2 main categories: memory, and system on chip. Each type of device performs a different task in an electronic system, with its own set of complex manipulations that it performs on the electrical signals that come as inputs. As semiconductors grew over the years to become smaller and more powerful, minor flaws in the production process could prevent an entire device from functioning correctly. This resulted in a high demand for testing equipment that could determine if a component was functional or not. This simple idea is quite a…

    • 2237 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Currently only digital finite-state machines are automatically synthesized. In this case, the desired behavior is described at the register-transfer level (RTL) using a well-defined subset of an HDL. Synthesis then converts the RTL description to an optimized gate-level description. Implementations of the gates are available from a library of standard cells. Automated synthesis of analog or…

    • 1971 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Bluetooth Door Lock

    • 2263 Words
    • 10 Pages

    It has been known for some time now that mechanical locks are becoming outdated. Mechanical locks are notoriously easy to lock pick, the quantity of keys limits their use, and they are not convenient to use. The goal of Team Open Sesame is to create a door that is safer and more convenient to use than the conventional mechanical door. Team Open Sesame’s design gives people limited access to a door through their android smartphone’s Bluetooth in the form of a digital key code. The use of a digital key provides more safety than the traditional locking mechanism, as it takes more experience to hack into a password encrypted system than to pick a lock. This design also provides the security of always being locked, until given a quick command to unlock. The goal of almost any piece of technology is to improve on what has been done before. Team Open Sesame’s door is easier to use, is more secure, and has infinite keys.…

    • 2263 Words
    • 10 Pages
    Good Essays
  • Good Essays

    References: [1] The HOL Light theorem prover. http://www.cl.cam.ac.uk/ jrh13/hol-light/. [2] Isabelle. http://www.cl.cam.ac.uk/research/hvg/Isabelle/. [3] KeY project: Integrated deductive software design. http://www.key-project.org/. [4] Mondex case study with alloy. http://www.eleves.ens.fr/home/ramanana/work/mondex. [5] PVS specification and verification system. http://pvs.csl.sri.com/. [6] The satisfiability modulo theories library (smt-lib). http://goedel.cs.uiowa.edu/smtib. [7] Yices: An SMT solver. http://yices.csl.sri.com/. [8] A. Armando, J. Mantovani, and L. Platania. Bounded model checking of software using SMT solvers instead of SAT solvers. STTT, 11(1):69–83, 2009. [9] D. Barsotti, L. Nieto, and A. Tiu. Verification of clock synchronization algorithms experiment on combination of deductive tools. ENTCS, 145:63–78, 2006. [10] M. Botincan, M. Parkinson, and W. Schulte. Separation logic verification of c programs with an SMT solver. ENTCS, 254:5–23, 2009. [11] G. Dennis, F. Chang, and D. Jackson. Modular verification of code with SAT. In ISSTA, pages 109–120, 2006. [12] B. Dutertre and L. de Moura. The yices SMT solver. Available at yices.csl.sri.com/tool-paper.pdf, 2006. [13] L. Erk¨k and J. Matthews. Using yices as an o automated solver in Isabelle/HOL. In AFM, 2008. [14] S. Ghilardi and S. Ranise. Model checking modulo theory at work: the intergration of yices in MCMT. In AFM, 2009. [15] D. Jackson. Software Abstractions: Logic, Language, and Analysis. The MIT Press, 2006. [16] D. Jackson. Software Abstractions: Logic, Language, and Analysis. Pages 5-23, The MIT Press, 2006. [17] E. Kang and D. Jackson. Formal modeling and analysis of a flash filesystem in alloy. In ABZ, 2008. [18] S. Khurshid. Generating Structurally Complex Tests from Declarative Constraints. PhD thesis, MIT, 2003. [19] R. Leino and R. Monahan. Reasoning about comprehensions with first-order SMT solvers. In SAC, pages 615–622, 2009. [20] S. Narain, G. Levin, V. Kaul, and S. Malik. Declarative infrastructure configuration synthesis and debugging. In JNSM, 2008. [21] M. Taghdiri and D. Jackson. Inferring specifications to detect errors in code. JASE, 14(1):87–121, 2007. [22] M. Vaziri. Finding Bugs in Software with a Constraint Solver. PhD thesis, MIT, 2004. [23] L. Zhang and S. Malik. Validating SAT solvers using an independent resolution-based checker. In DATE, pages 10880–10886, 2003.…

    • 7422 Words
    • 30 Pages
    Good Essays
  • Satisfactory Essays

    IMMANUAL ARASAR COLLEGE OF ENGINEERING, NATTALAM DEPARTMENT OF ELECTRONICS AND COMMUNICATION INTERNAL TEST- II YEAR:III EC64-VLSI DESIGN Time:2hrs PART-A 5*2=10 1.What are the test fixtures required to test a chip? 2.State the objective of functionality test. 3.Draw a pseudo NMOS inverter.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ratcheting Analysis

    • 16374 Words
    • 66 Pages

    Submitted in partial fulfillment of the requirements for the award of the degree of Master of Technology by…

    • 16374 Words
    • 66 Pages
    Powerful Essays
  • Satisfactory Essays

    Memory Testing

    • 322 Words
    • 2 Pages

    6. 7. Discuss FuncEonal fault and Reduce FF Coupling fault Address decoder fault March test Algorithm 8.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays