Tessent IJTAG Student Workbook
Student Workbook
2016 Mentor Graphics Corporation
All rights reserved.
This document contains information that is trade secret and proprietary to Mentor Graphics Corporation or its licensors and
is subject to license terms. No part of this document may be photocopied, reproduced, translated, distributed, disclosed or
provided to third parties without the prior written consent of Mentor Graphics.
This document is for information and instruction purposes. Mentor Graphics reserves the right to make changes
in specifications and other information contained in this publication without prior notice, and the reader should, in
all cases, consult Mentor Graphics to determine whether any changes have been made.
The terms and conditions governing the sale and licensing of Mentor Graphics products are set forth in written
agreements between Mentor Graphics and its customers. No representation or other affirmation of fact
contained in this publication shall be deemed to be a warranty or give rise to any liability of Mentor Graphics
whatsoever.
MENTOR GRAPHICS MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE.
MENTOR GRAPHICS SHALL NOT BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR
CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS)
ARISING OUT OF OR RELATED TO THIS PUBLICATION OR THE INFORMATION CONTAINED IN IT, EVEN
IF MENTOR GRAPHICS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
U.S. GOVERNMENT LICENSE RIGHTS: The software and documentation were developed entirely at private
expense and are commercial computer software and commercial computer software documentation within the
meaning of the applicable acquisition regulations. Accordingly, pursuant to FAR 48 CFR 12.212 and DFARS
48 CFR 227.7202, use, duplication and disclosure by or for the U.S. Government or a U.S. Government
subcontractor is subject solely to the terms and conditions set forth in the license agreement provided with the
software, except for provisions which are contrary to applicable mandatory federal laws.
TRADEMARKS: The trademarks, logos and service marks ("Marks") used herein are the property of Mentor
Graphics Corporation or other parties. No one is permitted to use these Marks without the prior written consent
of Mentor Graphics or the owner of the Mark, as applicable. The use herein of a third- party Mark is not an
attempt to indicate Mentor Graphics as a source of a product, but is intended to indicate a product from, or
associated with, a particular third party. A current list of Mentor Graphics’ trademarks may be viewed at:
www.mentor.com/trademarks.
End-User License Agreement: You can print a copy of the End-User License Agreement from:
www.mentor.com/eula.
Mentor Graphics Corporation
8005 S.W. Boeckman Road, Wilsonville, Oregon 97070-7777
Telephone: 503.685.7000
Toll-Free Telephone: 800.592.2210
Website: www.mentor.com
SupportNet: supportnet.mentor.com/
Send Feedback on Documentation: supportnet.mentor.com/doc_feedback_form
Part Number: 073426
Table of Contents
Module 1: IEEE 1687 Introduction ..................................................................... 11
Objectives ........................................................................................................................................... 12
IEEE 1687 Motivation ....................................................................................................................... 13
IEEE 1687 Motivation (Cont.) ........................................................................................................... 14
IEEE 1687 Motivation (Cont.) ........................................................................................................... 15
IEEE 1687 Motivation (Cont.) ........................................................................................................... 16
IEEE 1687 Motivation (Cont.) ........................................................................................................... 17
IEEE 1687 Motivation (Cont.) ........................................................................................................... 18
IEEE 1687 Motivation (Cont.) ........................................................................................................... 19
IEEE 1687 Motivation (Cont.) ........................................................................................................... 20
IEEE 1687 .......................................................................................................................................... 21
IEEE 1687 (Cont.) .............................................................................................................................. 22
Who can Use Tessent IJTAG? ........................................................................................................... 23
IEEE 1687 Provides a Uniform Standard .......................................................................................... 24
IEEE 1687 Glossary .......................................................................................................................... 25
Tessent IJTAG Use Model of IEEE 1687 .......................................................................................... 26
Comparing IEEE 1687 versus IEEE 1149.1 and IEEE 1500 ............................................................. 27
How IJTAG Extends the use of JTAG ............................................................................................... 28
Key Differences Between JTAG and IJTAG ..................................................................................... 29
Getting Help With Tessent Tools ....................................................................................................... 30
Getting Help With Tessent Tools (Cont.) .......................................................................................... 31
Getting Help With Tessent Tools (Cont.) .......................................................................................... 32
Tessent Bookcase: Accessing Manuals .............................................................................................. 33
SupportNet ......................................................................................................................................... 34
Tessent IJTAG Student Workbook I
Table of Contents
Customer Support ............................................................................................................................... 35
Lab 1: Exploring the Help System ..................................................................................................... 36
Module 2: Tessent IJTAG Overview ................................................................... 37
Objectives ........................................................................................................................................... 38
Differences Between IEEE 1687 and Tessent IJTAG ....................................................................... 39
Summary: IEEE 1687 ......................................................................................................................... 40
Operation Example: Accessing Instruments ...................................................................................... 41
Setup to Enable Access to BLOCK1/TDR ........................................................................................ 42
Enable Access BLOCK1/TDR ........................................................................................................... 43
Load Data into BLOCK1/TDR — Enable Block2/TDR ................................................................... 44
Load Data into BLOCK2/TDR .......................................................................................................... 45
IEEE 1687 ICL Instrument Example: Test Data Register (TDR) ...................................................... 46
Building ICL Netlist ........................................................................................................................... 47
PDL Commands ................................................................................................................................. 48
PDL Retargeting ................................................................................................................................. 49
ICL Network Extraction ..................................................................................................................... 50
Tessent IJTAG Flow ( PDL Command Retargeting) ......................................................................... 51
Basic Retargeting Flow Versus ICL Extraction Flow ........................................................................ 52
Generic ICL Extraction Flow (in Retargeting Flow) ......................................................................... 53
ICL Query .......................................................................................................................................... 54
SUPPLEMENTAL: Introduction to Tessent Shell ............................................................................ 55
Introduction to Tessent Shell (Cont.) ................................................................................................. 56
Introduction to Tessent Shell (Cont.) ................................................................................................. 57
Introduction to Tessent Shell (Cont.) ................................................................................................. 58
Introduction to Tessent Shell: Introspection and Tcl Collections ...................................................... 59
Tessent IJTAG Student Workbook II
Table of Contents
Introduction to Tessent Shell: Introspection and Tcl Collections (Cont.) .......................................... 60
Introduction to Tessent Shell: Design Editing Command Set............................................................ 61
Introduction to Tessent Shell: Object Attributes ................................................................................ 62
Summary: Tessent Shell ..................................................................................................................... 63
Lab Exercise ....................................................................................................................................... 64
Module 3: Basic IJTAG Flow ............................................................................... 65
Objectives ........................................................................................................................................... 66
Building Block: ICL Module ............................................................................................................. 67
Building Block: ICL Module — Port Keywords ............................................................................... 68
Building Block: ICL Module: Test Data Register (TDR) ................................................................. 69
Building Block: ICL Module: Segment Insertion Bit (SIB) .............................................................. 70
Building Block: ICL Module — Segment Insertion Bit (SIB) (Cont.) .............................................. 71
IJTAG Building Block: ICL Netlist ................................................................................................... 72
IJTAG Building Block: ICL Netlist (Cont.) ....................................................................................... 73
IJTAG Building Block: ICL Netlist (Cont.) ....................................................................................... 74
ICL Versus Verilog Modeling............................................................................................................ 75
Creating ICL for a Module ................................................................................................................. 76
Basic PLL Model ............................................................................................................................... 77
Basic PLL Model (Cont.) ................................................................................................................... 78
Read in ICL and PDL Files ................................................................................................................ 79
PDL Commands: Creating PDL Comments ...................................................................................... 80
PDL Commands: Writing to an Object .............................................................................................. 81
PDL Commands: Reading From an Object ........................................................................................ 82
PDL Commands: Executing PDL Commands ................................................................................... 83
Executing PDL Commands: Order of Execution ............................................................................... 84
Tessent IJTAG Student Workbook III
Table of Contents
Order of Execution: iApply Group in Retargeted PDL Pattern ......................................................... 85
Order of Execution: Examples ........................................................................................................... 86
Order of Execution: Examples (Cont.) ............................................................................................... 87
Order of Execution: iMerge ............................................................................................................... 88
Creating a Pattern Set ......................................................................................................................... 89
Writing PDL Patterns and Test Bench Files ...................................................................................... 90
Review ................................................................................................................................................ 91
Lab 3: Understanding the Basic IJTAG Flow .................................................................................... 92
Module 4: ICL, PDL Retargeting and Reuse ..................................................... 93
Objectives ........................................................................................................................................... 94
Advanced ICL Constructs .................................................................................................................. 95
Parameter ............................................................................................................................................ 96
Alias ................................................................................................................................................... 97
Alias (Cont.) ....................................................................................................................................... 98
Enumeration Tables............................................................................................................................ 99
Enumeration Tables (Cont.) ............................................................................................................. 100
PLL.icl: More Complex Model ........................................................................................................ 101
PLL Data Sheet — Control Definitions ........................................................................................... 102
PLL.icl: More Complex Model ........................................................................................................ 103
PDL Command Retargeting Principle .............................................................................................. 104
PDL Command Retargeting Principle (Cont.) ................................................................................. 105
PDL Command Retargeting Principle (Cont.) ................................................................................. 106
PDL Command Retargeting Principle: Segment Insertion Bit (SIB) .............................................. 107
PDL Command Retargeting Principle: Segment Insertion Bit (SIB) (Cont.) .................................. 108
PDL Command Retargeting Principle Example .............................................................................. 109
Tessent IJTAG Student Workbook IV
Table of Contents
PDL Command Retargeting Principle: Calling a PDL Procedure ................................................... 110
PDL Command Retargeting Principle: Calling a PDL Procedure (Cont.) ....................................... 111
Calling a Procedure to Read From an Object ................................................................................... 112
Typical PDL Command Retargeting Flow ....................................................................................... 113
Example: Invoke and Setup.............................................................................................................. 114
Example: Invoke and Setup (Cont.) ................................................................................................. 115
Example: Create and Write Out Pattern Set ..................................................................................... 116
Example: Calling a PDL Procedure ................................................................................................. 117
Example: Retargeted PDL Output .................................................................................................... 118
Example: (Resulted) Retargeted PDL Patterns ................................................................................ 119
Another Example of PDL Command Retargeting ........................................................................... 120
Another Example of Creating and Writing Out a Pattern Set ......................................................... 121
Retargeted PDL Pattern 1 ................................................................................................................. 122
PDL Retargeting Command Summary ............................................................................................ 123
Tessent Shell Tool Commands Used With Tessent IJTAG ............................................................. 124
Additional Topics: Clocks ................................................................................................................ 125
Additional Components: Clocks (Cont.) .......................................................................................... 126
Additional Components: Default Clock ........................................................................................... 127
Additional Components: Modifying Default Clock ......................................................................... 128
Additional Components: Synchronous Clocks ................................................................................ 129
Additional Components: Clocks — Synchronous Clocks (Cont.) ................................................... 130
Additional Components: Clocks — Asynchronous Clocks ............................................................. 131
Additional Components: Clocks — Synchronous and Asynchronous ............................................. 132
Optional Commands of the PDL Retargeting Flow: IJTAG Query ................................................. 133
Optional Commands of the PDL Retargeting Flow: IJTAG Query (Cont.) .................................... 134
Tessent IJTAG Student Workbook V
Table of Contents
IJTAG Query — Examples .............................................................................................................. 135
IJTAG Query — Examples (Cont.).................................................................................................. 136
IJTAG Query — Examples (Cont.).................................................................................................. 137
IJTAG Query Commands................................................................................................................. 138
Lab 4: PDL Retargeting and Reuse .................................................................................................. 139
Module 5: Migrating Designs to Tessent IJTAG ............................................. 141
Objectives ......................................................................................................................................... 142
Advantages of Migrating to IJTAG (1687) ...................................................................................... 143
Migration Methodology ................................................................................................................... 144
Migration Methodology (Cont.) ....................................................................................................... 145
How IEEE 1687 Extends the Use of IEEE 1149.1 and IEEE 1500 ................................................. 146
Tessent IJTAG Use Model of IEEE 1687 ........................................................................................ 147
Tessent IJTAG Use Model of IEEE 1687 (Cont.) ........................................................................... 148
Migration Methodology: IEEE 1149.1 Example 1 .......................................................................... 149
Example: ICL for General TAP Controller ...................................................................................... 150
Example: ICL for General TAP Controller (Cont.) ......................................................................... 151
Migration Methodology: IEEE 1149.1 Example 2 .......................................................................... 152
Migration Methodology: IEEE 1149.1 Example (Cont.) ................................................................. 153
Example: ICL Netlist ....................................................................................................................... 154
Example: Retargeted PDL Patterns .................................................................................................. 155
Example: Retargeted PDL Patterns (Cont.) ..................................................................................... 156
Migration Methodology: Combined TAP and WTAP Scenario ...................................................... 157
Migration Methodology: Combined TAP and WTAP Scenario (Cont.) ......................................... 158
Migration Methodology: Combined TAP and WTAP Scenario (Cont.) ......................................... 159
Migration Methodology: Combined TAP and WTAP Scenario (Cont.) ......................................... 160
Tessent IJTAG Student Workbook VI
Table of Contents
Migration Methodology: Combined TAP and WTAP Scenario (Cont.) ......................................... 161
Lab 5: Migrating Designs to Tessent IJTAG ................................................................................... 162
Module 6: ICL Network Extraction .................................................................. 163
Objectives ......................................................................................................................................... 164
Revisiting PDL Retargeting ............................................................................................................. 165
Overview: ICL Network Extraction ................................................................................................. 166
Overview: ICL Network Extraction (Cont.) .................................................................................... 167
Overview: ICL Network Extraction (Cont.) .................................................................................... 168
Overview: ICL Network Extraction (Cont.) .................................................................................... 169
Overview: ICL Network Extraction (Cont.) .................................................................................... 170
Overview: ICL Network Extraction (Cont.) .................................................................................... 171
Overview: ICL Network Extraction (Cont.) .................................................................................... 172
Generic ICL Extraction Flow (in Retargeting Flow) ....................................................................... 173
ICL Network Extraction Step-By-Step ............................................................................................ 174
ICL Network Extraction Step-By-Step (Cont.) ................................................................................ 175
ICL Network Extraction Commands................................................................................................ 176
set_module_matching_options Example.......................................................................................... 177
More ICL Network Extraction Commands ...................................................................................... 178
More ICL Network Extraction Commands (Cont.) ......................................................................... 179
Top-Down Versus Bottom-Up Extraction ....................................................................................... 180
Example — Design View ................................................................................................................. 181
Top-Down Extraction Example........................................................................................................ 182
Top-Down Extraction Example: Results.......................................................................................... 183
Bottom-Up Extraction Example ....................................................................................................... 184
Bottom-Up Extraction Example — Extract Top-Level When Loading Block-Level Result ......... 185
Tessent IJTAG Student Workbook VII
Table of Contents
ICL Network Extraction Design Rule Check (DRC) and Debugging ............................................. 186
ICL Network Extraction DRC.......................................................................................................... 187
Using DFTVisualizer for Debugging ............................................................................................... 188
Special ICL Extraction Attributes .................................................................................................... 189
Special ICL Extraction Attributes (Cont.)........................................................................................ 190
Special ICL Extraction Attributes — Example ................................................................................ 191
ICL Network Extraction Commands................................................................................................ 192
ICL Sematic Rules ........................................................................................................................... 193
ICL Sematic Rules: Parser Rule Example........................................................................................ 194
ICL Sematic Rules: Module Rule Example ..................................................................................... 195
ICL Sematic Rules: ICL Primitive Model Rule Example ................................................................ 196
Lab 6: ICL Network Extraction........................................................................................................ 197
Module 7: Tessent IJTAG in the Tessent Flow ................................................ 199
Objectives ......................................................................................................................................... 200
Ijtag Network (Top Level Example) ................................................................................................ 201
Tessent MemoryBIST Flow ............................................................................................................. 202
Specify Requirements: Design Level ............................................................................................... 203
Specify Requirements: Memory BIST Options ............................................................................... 204
Tessent MemoryBIST Flow ............................................................................................................. 205
Create the DftSpecification .............................................................................................................. 206
DFTSpecification: report_config_data ............................................................................................. 207
DFTSpecification: display_specification ......................................................................................... 208
DFTSpecification: Insert Test Logic ................................................................................................ 209
blockA: Design ................................................................................................................................. 210
blockA: DFTSpecification ............................................................................................................... 211
Tessent IJTAG Student Workbook VIII
Table of Contents
blockA: Post DFTSpecification Processing Block Diagram............................................................ 212
Extract ICL ....................................................................................................................................... 213
Patterns Specification ....................................................................................................................... 214
Extract ICL and PatternsSpecification Review ................................................................................ 215
Lab 7 ................................................................................................................................................. 216
Tessent IJTAG Student Workbook IX