1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FinnZ [79.3K]
3 years ago
11

1. Defines and uses an interface block to connect to the test program and the DUT. The interface block should also contain a clo

cking block and modport statements for defining signal direction to the testbench and to the DUT. 2. Generates the clock signal 3. Applies reset at the beginning 4. Checks the success of the reset operation and displays a success/fail message 5. Makes use of a class for defining random variables and a dynamic array to hold the random values. 6. Constraints the generated random values such that the number of generated random values (i.e. size of dynamic array) is less than 500 and their sum will be greater than 16'hFFFF 7. Applies the generated random values to the design input (in), one at every clock cycle 8. Checks the correctness of the design output (sum) at every clock cycle while applying inputs, and reports if there is a mismatch between the output of the design and the expected output.
Computers and Technology
1 answer:
Roman55 [17]3 years ago
7 0

Answer:

It might helpful or might be the correct answer to provide the complete question or problem:

This is a testbench design problem, within it, you need to consider the module describing an accumulator.

Explanation:

Consider the following module describing an accumulator:

module  accumulator (

       output reg:  [ 15:0 ]   sum,     // acumulated out

       input [ 7:0 ] in,                      //in

       input rst / clk ) ;                   //reset and clock inputs

       wire  carry ;

       wire [ 15:0 ] sum_in ;

       assign  { carry , sum_in } =  sum + in ;

        alwaysatt ( posedge clock )

                 if ( rst ) sum ∠ = 0 ; else

                 sum ∠ = ( carry ) ?  16´hFFFF  :   sum_in ;

endmodule

From the design code, these are the specifications:

- An active high reset ( rst ) that is synchronous to the positive edge of the clock ( clk ) and clears the output ( sum ) to zero.

- Once reset is removed, the accumulator accumulates summation of the data present on the input ( in ) on every positive clock edge and if the summation exceeds the maximum value that can be represented using a 16-bit number (i.e. 16´hFFFF), the output gets saturated at 16´hFFFF

- The design treats the input data as an unsigned number and produces the output also as unsigned value.

Now write a complete system verilog for this desing that:

(See  1, 2, 3, 4, 5, 6, 7, 8 system requirements)

Defines and uses an interface block to connect to the test program and the DUT.

The interface block should also contain a clocking block and modport statements for defining signal direction to the testbench and to the DUT.

2. Generates the clock signal

3. Applies reset at the beginning

4. Checks the success of the reset operation and displays a success/fail message

5. Makes use of a class for defining random variables and a dynamic array to hold the random values.

6. Constraints the generated random values such that the number of generated random values (i.e. size of dynamic array) is less than 500 and their sum will be greater than 16'hFFFF

7. Applies the generated random values to the design input (in), one at every clock cycle

8. Checks the correctness of the design output (sum) at every clock cycle while applying inputs, and reports if there is a mismatch between the output of the design and the expected output.  

 

Explanation:

 

You might be interested in
What is a music composition copyright?
Anestetic [448]
For copyright<span> purposes, there is a difference between </span>MUSICAL<span> COMPOSITIONS and SOUND RECORDINGS. A </span>Musical Composition<span> consists of </span>music<span>, including any accompanying words, and is normally registered as a work of performing arts. The author of a </span>musical composition<span> is generally the composer and the lyricist, if any.</span>
3 0
3 years ago
Read 2 more answers
Directions: Give the shortcut key for the following commands: 1. Open 2. Save 3. New document 4. Copy 5. Undo 6. Redo 7. Paste 8
stepan [7]

Answer:

Explanation:

1 : Ctrl + X

2 Ctrl + C

3 Ctrl + L

4 Ctrl + V

5 Ctrl + B

6 Ctrl + R

7 Ctrl + I

8 Ctrl + E

9 Ctrl + U

10 Ctrl + Z

11 Ctrl + Y

12 Ctrl + N

End

13 Ctrl + A

Home

14 Ctrl + J

15 Ctrl + 2

16 Ctrl + S

17 Ctrl + 1

18 F12

19 Ctrl + W

-----------

20 Ctrl + K

21 Ctrl + ]

22 Ctrl + (left arrow)

23 Ctrl + (right arrow)

24 Ctrl + [

25 Ctrl + Del

26 Ctrl + 5

27 F1                                                         pls mark me as brainliest and              

                                                                   check all the short cuts

8 0
2 years ago
How can people efficiently and effectively influence lots of people throughout the world
tatuchka [14]

Answer:

The word efficient denotes the ability to achieve a good goal toward a person, and effectiveness denotes reliable production or achievement.

Explanation:

Many people around the world can set efficient goals, that is, to influence or encourage other people to make good projects or changes in their lives, by example or simply teach them with patience and altruism.

In this way effectiveness will be seen, that is, the product or the achievement precisely when we observe how people undertake new projects in their lives

3 0
3 years ago
Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
Tatiana [17]

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

8 0
3 years ago
Ann wants to save her presentation so she can work on it later. Which device on her computer can store this data long term?
igomit [66]
She can use a flashdrive to store it, or she can go to her documents folder and store it. When she gets on the computer later, she can then continue working on the project.
3 0
3 years ago
Other questions:
  • Trevor got home from work and suddenly realized that he needed to edit a certain file stored in the company network's server. ho
    11·1 answer
  • Which of the following is NOT a common GUI component? O a. Label b. Button c. Key press d. Text box
    12·2 answers
  • _____ includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, analys
    9·1 answer
  • They begin beating it with a hose to find out what it really means. How does the figurative language in this excerpt reveal Coll
    9·2 answers
  • A ___________ organizes related commands together, under a tab.
    15·1 answer
  • What is the term for sending emails that imitate legitimate companies?
    6·2 answers
  • dentify the type of observational study​ (cross-sectional, retrospective, or​ prospective) described below. A research company u
    5·1 answer
  • Which of the following describes the term "false information?"
    5·1 answer
  • A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status
    11·1 answer
  • Write a function check_palindrome that takes a string as an input and within that function determines whether the input string i
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!