3.6. Summary

In this chapter, we completed the two SOC examples (VoIP and STB) we started in Chapter 1. We also discussed design for integration.

In addition to the verification issues that we face when designing ASICs, we have new challenges in verification of SOCs that arise mainly from the mixing of silicon IPs. Verification planning and execution, automation, and IP verification are all key factors in SOC verification.

Get From ASICs to SOCs: A Practical Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.