Jeffery Burl Scott - Durham NC Kenneth Michael Key - Raleigh NC Michael L. Wright - Raleigh NC Scott Nellenbach - Apex NC
Assignee:
Cisco Technology, Inc. - San Jose CA
International Classification:
G11C 2900
US Classification:
714724, 365201
Abstract:
A technique is provided for use in testing replicated components (e. g. , identical circuit components) of an electronic device for defects. In one aspect of this testing technique, the same test inputs may be broadcast, in parallel, from a single test interface to each of the replicated components of the electronic device under test. Respective test outputs generated by the replicated components in response to the test inputs may be supplied to a comparator, comprised in the electronic device, that compares the respective test outputs to each other and generates a fault signal if corresponding test outputs are not identical. This fault signal may be supplied to an external test interface pin of the single test interface, and its assertion may indicate that one or more of the replicated components may be defective. The respective test outputs may be multiplexed to permit output via an external interface of respective test outputs from a selected component. These respective test outputs may be compared to expected values therefor whereby to determine presence and/or nature of defects in the replicated components.
Kwok Ken Mak - Chapel Hill NC, US Kenneth M. Key - Raleigh NC, US Xiaoming Sun - Chapel Hill NC, US L. Duane Richardson - Apex NC, US
Assignee:
Cisco Technology, Inc. - San Jose CA
International Classification:
G06F 1300
US Classification:
711154, 711100, 709200
Abstract:
The present invention incorporates a technique that enables the processing of memory requests without requiring memory devices that support a request identifier (ID). The present invention maintains an association between a request identifier and a first memory request issued by a requestor and directed to a memory location. The first memory request contains an address corresponding to the memory location. A memory device corresponding to the address is selected. A second memory request without the identifier is issued to the selected memory device to access information stored at the location. The information is received from the memory device and associated with the request identifier.