ABSTRACT:

This paper highlights key advances in the presilicon verification effort of the IBM zEnterprise® 196 (z196) microprocessor and storage hierarchy. It focuses on the unique set of verification challenges as well as the process innovations that address them. At the time of product launch, the z196 system represented the industry's fastest and most scalable enterprise system, with up to 80 customer-configurable out-of-order core processors operating at 5.2 GHz. In addition to offering industry-leading performance, the z196 system builds upon its leadership in reliability by introducing a new redundant array of independent memory (RAIM) technology into its memory subsystem. The new product features in this system drove innovations in all aspects of processor functional verification, including stimulus generation, functional checking, debugging, and coverage. A new hybrid RAIM verification methodology, which includes both formal and random methods, is described. Many process and methodology improvements were made to improve developmental collaboration across a global team. These enhancements include a simulation development environment that uses common shared components across functional partitions, as well as a shared cache loader that was used across multiple environments. We also present a self-configuring test-case generation process that focused on the coverage of functional stimulus.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage ABSTRACT: Cloud storage has become a primary industry in remote data management services, but it also attracts security concerns.
PROJECT TITLE : Key Points Estimation and Point Instance Segmentation Approach for Lane Detection ABSTRACT: Techniques of perception used in autonomous vehicles should be adaptable to the various environments they encounter.
PROJECT TITLE : A Fault-Tolerant and Secure Architecture for Key Management in LoRaWAN Based on Permissioned Blockchain ABSTRACT: LoRaWAN is one of the primary technologies that is currently available to enable Low-Power Wide-Area
PROJECT TITLE :Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays - 2018ABSTRACT:Physical layer security (PLS) is a promising technology in device-to-device (D2D)
PROJECT TITLE :Key Reconciliation Protocols for Error Correction of Silicon PUF Responses - 2017ABSTRACT:Physical unclonable functions (PUFs) are promising primitives for the light-weight authentication of an integrated circuit

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry