This chapter is from the book
3.6 Summary
In this chapter, we completed the two SOC examples (VoIP and STB) we started in Chapter 1. We also discussed design for integration.
In addition to the verification issues that we face when designing ASICs, we have new challenges in verification of SOCs that arise mainly from the mixing of silicon IPs. Verification planning and execution, automation, and IP verification are all key factors in SOC verification.