chapter 5 configuration, reconfiguration and security

28
CHAPTER 5 Configuration, Reconfiguration and Security

Upload: marcia-briggs

Post on 05-Jan-2016

230 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: CHAPTER 5 Configuration, Reconfiguration and Security

CHAPTER 5

Configuration, Reconfiguration and Security

Page 2: CHAPTER 5 Configuration, Reconfiguration and Security

Agenda

• Configuration basics– Controller structure– Frame structure– Different modes

• Reconfiguration– Modular– Differential– Partial

• 3DES and AES decryption

Page 3: CHAPTER 5 Configuration, Reconfiguration and Security

Config. Memory Related to Logic

Page 4: CHAPTER 5 Configuration, Reconfiguration and Security

Frame Shifter Related to Config.cells

Page 5: CHAPTER 5 Configuration, Reconfiguration and Security

Config. Sequence of Actions

1. Device Power Up2. Clear the Configuration Memory3. Sample the Mode Pins (described shortly)4. Synchronize5. Check Device ID6. Load the configuration data7. Check the CRC8. Startup

Page 6: CHAPTER 5 Configuration, Reconfiguration and Security

Virtex Configuration Modes

Note: Spartan 3E adds new modes with SPI and Byte Parallel Interface

Page 7: CHAPTER 5 Configuration, Reconfiguration and Security

Bitstream In, Config. Data Out

Page 8: CHAPTER 5 Configuration, Reconfiguration and Security

General Serial Configuration Model

Page 9: CHAPTER 5 Configuration, Reconfiguration and Security

Master Serial ModeNote

Page 10: CHAPTER 5 Configuration, Reconfiguration and Security

Master/Slave Serial ModeNote:

Page 11: CHAPTER 5 Configuration, Reconfiguration and Security

M/S Serial config. From Parallel EPROM

Page 12: CHAPTER 5 Configuration, Reconfiguration and Security

General Parallel Config. Model

Page 13: CHAPTER 5 Configuration, Reconfiguration and Security

Single Master SelectMap Mode

Page 14: CHAPTER 5 Configuration, Reconfiguration and Security

Single Master Config. From Micro/CPLD

Page 15: CHAPTER 5 Configuration, Reconfiguration and Security

Multi SelectMap Config.

Page 16: CHAPTER 5 Configuration, Reconfiguration and Security

JTAG Configuration

Page 17: CHAPTER 5 Configuration, Reconfiguration and Security

Configuration Controller

Page 18: CHAPTER 5 Configuration, Reconfiguration and Security

Reconfiguration

Field upgrade – changing the design when it is installed at a remote site.

Feature enhancement – adding features to an already deployed design.

Reconfigurable coprocessor- changing a coprocessor function

Modify connections on a printed circuit board – reroute existing connections

Self reconfiguration (or dynamic reconfiguration) where an FPGA modifies itself

Self correcting circuits – circuits that recover from failure, automatically

Page 19: CHAPTER 5 Configuration, Reconfiguration and Security

Configuration Column Sequencing

First frame Set Second Frame SetThird Frame Set

Page 20: CHAPTER 5 Configuration, Reconfiguration and Security

External Config. Controller

Page 21: CHAPTER 5 Configuration, Reconfiguration and Security

Scrub Controller

Used with Triple Modular Redundancy to virtuallyeliminate single event upset errors due to nuclear radiation

Page 22: CHAPTER 5 Configuration, Reconfiguration and Security

Modular Partial Reconfiguration

Page 23: CHAPTER 5 Configuration, Reconfiguration and Security

Bus Macro

Page 24: CHAPTER 5 Configuration, Reconfiguration and Security

3DES Encryption/Decryption Flow

Path taken by iMPACT

Path taken by FPGA

Page 25: CHAPTER 5 Configuration, Reconfiguration and Security

Configuration Decryptor

Page 26: CHAPTER 5 Configuration, Reconfiguration and Security

Decryption/Configuration Interaction

Page 27: CHAPTER 5 Configuration, Reconfiguration and Security

Configuration Close• Configuration offers more options than you might

expect– Many modes– Reconfiguration/partial reconfiguration– Decryption

• Lots of future work can be done here, to offer new operation models

• So far, nobody has built a serious “cache controller” that makes a coprocessor automatically sense the need to become a new function . . .

Page 28: CHAPTER 5 Configuration, Reconfiguration and Security