3.6. Summary

In this chapter, we completed the two SOC examples (VoIP and STB) we started in Chapter 1. We also discussed design for integration.

In addition to the verification issues that we face when designing ASICs, we have new challenges in verification of SOCs that arise mainly from the mixing of silicon IPs. Verification planning and execution, automation, and IP verification are all key factors in SOC verification.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.143.3.208