- Welcome to the course
- Part 1: Verilog Recap
- Part 2: Debugging
- Part 3: Zynq Architecture
- Part 4: Boot Procedure
Embedded Systems (EMBED) Track
Week 1 - Theory Module
EMBED Team: Yuri Cauwerts, Songqiao Cui
Academic Year 2024-2025 Campus Groep T - KU Leuven
Describe
We can express digital logic elements and circuits (NOT, AND, adder, flip-flop, memory, etc.)
Simulate
We can validate the functional specification under certain input stimuli
Module Identifier
Module Identifier
Module Declaration
Module Identifier
Module Declaration
Module Architecture
Module Identifier
Module Declaration
Module Architecture
Module Identifier
Module Declaration
Module Architecture
In this example: simple continous assignment
0 | Logic zero |
1 | Logic one |
Z | Logic High impedance |
X | Undefined value |
Boolean (or bitwise) operators in Verilog:
Verilog symbol | Description |
---|---|
~ | Bitwise NOT |
& | Bitwise AND |
| | Bitwise OR |
^ | Bitwise XOR |
Boolean Equation
$Y = A . C + B . \bar C $
1A. Simple continuous assignments
Equality operators
Verilog symbol | Description |
---|---|
== | Equal to |
!= | Not equal to |
Relational operators
Verilog symbol | Description |
---|---|
> | Greater than |
< | Less than |
>= | Greater than or equal to |
<= | Less than or equal to |
Logical operators
Verilog symbol | Description |
---|---|
! | Logical negation |
&& | Logical AND |
|| | Logical OR |
Behaviour
When C=1 then Y=A When C=0 then Y=B
1B. Conditional continous assignments
In Elaborated Design, this code translates to:
which is a more compact and intuitive visualization than the previous code:
Important! Both codes are completely equivalent!!!
Internally, a MUX requires the same logic gates
Structural Design
\[\begin{aligned} \dot{x} & = \sigma(y-x) \\ \dot{y} & = \rho x - y - xz \\ \dot{z} & = -\beta z + xy \end{aligned} \] When \(a \ne 0\), there are two solutions to \(ax^2 + bx + c = 0\) and they are $x = \dfrac{-b \pm \sqrt{b^2-4ac}}{2a}.$
@startuml
skinparam sequenceArrowThickness 5
Alice -> Bob: Authentication Request
Bob --> Alice: Authentication Response
Alice -> Bob: Another authentication Request
Bob --> Alice: Another authentication Response
@enduml