Você está na página 1de 47

SYNAPSE Techno Design Innovation Pvt Ltd

Advanced eXtensible Interface(AXI)

By : Prithvinarayan(EMP ID:225) K.T Santosh (EMP ID:216) R.Sushma (EMP ID:237)


Confidential Information: Do not share or photocopy without prior written approval

Agenda
Introduction Where AXI reside? Signals and Channels Read Burst Operation

Write Burst Operation


Transaction Structure

Confidential Information: Do not share or photocopy without prior written approval

Introduction
targeted at high-performance, high-frequency system designs

AXI bus interface provides high bandwidth between the processor, on-chip RAM, peripherals, and interfaces to external memory.
Confidential Information: Do not share or photocopy without prior written approval

Introduction
Variable-length bursts

Contd

From 1 to 16(AXI3) data transfers (called beats) per burst From 1 to 256(AXI4)

Bursts with a transfer size of 8-1024 bits Wrapping, incrementing, and fixed. Locked accesses

Confidential Information: Do not share or photocopy without prior written approval

Where does AXI Reside?

Confidential Information: Do not share or photocopy without prior written approval

Interconnect, Interface & Channel

Confidential Information: Do not share or photocopy without prior written approval

Channels
Write Address/Control

Contd
AWREADY

Write data
WREADY

AXI Master

Write Response
BREADY

AXI Slave

Read Address/Control
ARREADY

Read data
RREADY
Confidential Information: Do not share or photocopy without prior written approval

Write Channel
SIGNALS -SOU RCE AWID[3:0] ------- M AWADDR[31:0]- M AWLEN[7:0] AWSIZE[2:0] AWBURST[1:0] AWVALID -----AWREADY M M M M S

Prefix - AW

Prefix - B
BID[3:0] -----S

BRESP[1:0] -----BVALID BREADY


Confidential Information: Do not share or photocopy without prior written approval

S
S M

Read Channel
Prefix - AR

Prefix - R

Confidential Information: Do not share or photocopy without prior written approval

Write Operation
Note: data transfers only when valid = ready = 1

Write request A is accepted


Confidential Information: Do not share or photocopy without prior written approval

Response completes write operation


10

Read Operation
Note: data transfers only when valid = ready = 1

Read request is initiated

Data read is ready

1st data is transferred

Read request is accepted


Confidential Information: Do not share or photocopy without prior written approval

The last data is transferred

11

-------------------

Overlapping Read Burst

Read request A is accepted Read request B is accepted via AR channel while data A(0) is transferred via R channel
Confidential Information: Do not share or photocopy without prior written approval

12

Transaction Structure
Burst Addressing
ADDRESS A11 A21 A31

DATA

D11

D12 D13 D14 D21

D22 D23 D31

A21

MASTER ID MASTER 1 TRANSACTION ID 2nd TRANSACTION

Separation of address and data channel


Master provides the start address of burst Slave needs to generate the remaining addresses based on burst type (FIXED, INCR, WRAP)
Confidential Information: Do not share or photocopy without prior written approval

13

Confidential Information: Do not share or photocopy without prior written approval

14

---------------

Address structure

Burst Length no. of data transfers that can occur within each burst AWLEN/ARLEN[7:0] The burst length for AXI3 is defined as, Burst_Length = AxLEN[3:0] + 1 The burst length for AXI4 is defined as, Burst_Length = AxLEN[7:0] + 1,

Confidential Information: Do not share or photocopy without prior written approval

15

Burst Size
ARSIZE/AWSIZE[3:0] Max no. of data bytes to transfer in each beat within a burst

Confidential Information: Do not share or photocopy without prior written approval

16

Burst Type
ARBURST/AWBURST[1:0]: 3 types of bursts
Fixed Incrementing Wrapping

Confidential Information: Do not share or photocopy without prior written approval

17

Locked Access
Normal access, AR(W)LOCK[1:0]=b00 Exclusive access, b01
Exclusive read Exclusive write If no intervening write to the address region, EXOKAY response. If not, OKAY response.

Locked access, b11


Start with b11, and end with b00 During the period, only the lock initiating master can access the address region (not the slave!!!)
Confidential Information: Do not share or photocopy without prior written approval

18

Out-of-Order Addressing
ADDRESS A11 A21 A31

RDATA

D21 D22 D23

D31

D11 D12 D13 D14

Transaction ID is used to identify data transfer at all channels


ARID, AWID, RID, WID, & BID

Ordering by transaction ID
Master needs to finish data transfers with the same transaction ID in the order of request issue. Slave can handle data transfers with different transaction IDs out-of-order
Confidential Information: Do not share or photocopy without prior written approval

19

Aligned & Unaligned Transfers

Confidential Information: Do not share or photocopy without prior written approval

20

Confidential Information: Do not share or photocopy without prior written approval

21

AHB vs. AXI Burst


AHB Burst
Address and Data are locked together (single pipeline stage) HREADY controls intervals of address and data

AXI Burst
One Address for entire burst

Confidential Information: Do not share or photocopy without prior written approval

22

22

AXI Out of Order Completion


With AHB
If one slave is very slow, all data is held up

With AXI Burst


Multiple outstanding addresses, out of order (OO) completion allowed Fast slaves may return data ahead of slow slaves

Confidential Information: Do not share or photocopy without prior written approval

23

23

AXI Burst

AXI Burst
Simultaneous read, write transactions Better bus utilization

Confidential Information: Do not share or photocopy without prior written approval

24

24

FOR MORE INFORMATIONS , REFER TO THE SPECs PROVIDED BY ARM. THEY ARE ALSO ATTACHED HERE IHI0022D_amba_axi_protocol_spec amba_axi4

THANK YOU

Confidential Information: Do not share or photocopy without prior written approval

25

SUPPORTING SLIDES

Confidential Information: Do not share or photocopy without prior written approval

26

AWID[3:0] AWADDR[31:0] AWLEN[7:0] AWSIZE[3:0] AWBURST[1:0] AWLOCK[1:0] AWCACHE[3:0] AWQOS AWREGION AWPROT[2:0] AWVALID AWREADY (S)

WID WDATA WSTRB WREADY WVALID WUSER WLAST BID BRESP BUSER BVALID BREADY

ARID[3:0] ARADDR[31:0] ARLEN[3:0] ARSIZE[3:0] ARBURST[1:0] ARLOCK[1:0] ARCACHE[3:0] ARQOS ARREGION ARPROT[2:0] ARVALID ARREADY (S)

RID RDATA RREADY RVALID RUSER RLAST RRESP

BACK

BACK

Confidential Information: Do not share or photocopy without prior written approval

27

Confidential Information: Do not share or photocopy without prior written approval

28

Confidential Information: Do not share or photocopy without prior written approval

29

Confidential Information: Do not share or photocopy without prior written approval

30

Confidential Information: Do not share or photocopy without prior written approval

31

Confidential Information: Do not share or photocopy without prior written approval

32

Confidential Information: Do not share or photocopy without prior written approval

33

Confidential Information: Do not share or photocopy without prior written approval

34

Confidential Information: Do not share or photocopy without prior written approval

35

Confidential Information: Do not share or photocopy without prior written approval

36

Confidential Information: Do not share or photocopy without prior written approval

37

Confidential Information: Do not share or photocopy without prior written approval

38

Confidential Information: Do not share or photocopy without prior written approval

39

Confidential Information: Do not share or photocopy without prior written approval

40

Write Interleaving
Interleaving rule
Data with different ID can be interleaved. The order within a single burst is maintained The order of first data needs to be the same with that of request Write Interleave Cability The maximum number of transactions that master can interleave
ADDRESS A11 A21 A31

DATA

D11 D21 D22 D12 D23 D31 D13

D14

Confidential Information: Do not share or photocopy without prior written approval

41

Confidential Information: Do not share or photocopy without prior written approval

42

Confidential Information: Do not share or photocopy without prior written approval

43

Confidential Information: Do not share or photocopy without prior written approval

44

Confidential Information: Do not share or photocopy without prior written approval

45

Confidential Information: Do not share or photocopy without prior written approval

46

Confidential Information: Do not share or photocopy without prior written approval

47