AMBA CHI Training

Home > Course

AMBA CHI Training AMBA protocol training is focused on all aspects of cache coherency, cache state model and channels.
switching, register and reset, initialization, configuration, etc.

Course Overview

AMBA CHI Training
AMBA protocol training is focused on all aspects of cache coherency, cache state model and channels,switching, register and reset, initialization, configuration, etc.

Course also focus on power management, security, performance, etc.

Demo Videos
Unit NumberTopicDuration (Mins)
1Agenda6
2Need for CHI Protocol55
3Cache coherency46
4Cache line states33
5MOESI state diagram51
6MOESI state diagram40
7CHI cache line states24
8Cache coherence protocols6
9CHI Protocol fundaments25
10CHI architecture layers48
11Protocol layer - Deep dive33
12Read transaction flow63
13Dataless transactions summary18
14Read transactions95
15Write transactions47
16Write request transaction flow56
17Write Unique full stash19
18CopyBack write transactions26
19Ordering guidelines25
20CHI TRANSFER TYPES - READ DATA SOURCE7
21CHI CHANNELS42
22TRANSACTION STRUCTURE15
23READ TRANSACTIONS65
24DATALESS TRANSACTION8
25DATALESS TRANSACTIONS, CACHE STASHING36
26ORDERING AND COMPACK RULES6
27WriteNoSnpDef19
28CompAck flow11
29Atomic transactions17
30Misc transactions - DVM, PrefetchTgt5
31Transaction retry sequence5
32Snoop transactions14
33Snoop request types21
34Combined Write Requests9
35Transaction identifier fields26
36Address, Control, Data46
37CHI transaction attributes6
38Data transfer75
39Request retry5
40Request types and corresponding snoop requests6
41Interconnect behavior - Snoop requests3
42Response types61
43Misc responses15
44Silent cache state transactions3
45Cache state transitions at requester40
46Cache state transitions at Snoopee28
47Cache state transitions at Snoopee29
48TRANSACTION IDENTIFIER FIELDS23
49ORDERING - MULTICOPY ATOMICITY4
50Channels at different nodes9
51Request channel flit fields35
52Snoop request flit fields16
53Data flit fields, response flit fields17
54flit packet definitions11
55Exclusive accesses27
56Error handling56
57Error response in write transactions23
58Memory tagging extensions55
59Memory tagging extensions summary9
60System control, debug, track and monitoring49
61DVM operations36
62DVM operations summary8

 

Curriculum
  • Course content summary

    • CHI Introduction
    • Transactions
    • Network Layer
    • Coherence Protocol
    • Interconnect Protocol Flows
    • Exclusive Accesses
    • Cache Stashing
    • DVM Operations
    • Error Handling

    Detailed Course content

    • CHI Introduction
      • Architecture overview
      • Topology
      • Terminology
      • Transaction classification
      • Coherence overview
      • Component naming
    • Transactions
      • Channels overview
      • Channel fields
      • Transaction structure
      • Transaction identifier fields
      • Details of transaction identifier fields
      • Transaction identifier field flows
      • Logical Processor Identifier
      • Ordering
      • Address, Control, and Data
      • Data transfer
      • Request Retry
    • Network Layer
      • System address map
      • Node ID
      • Target ID determination
      • Network layer flow examples
    • Coherence Protocol
      • Cache line states
      • Request types
      • Snoop request types
      • Request types and corresponding Snoop requests
      • Response types
      • Silent cache state transitions
      • Cache state transitions at a Requester
      • Cache state transitions at a Snoopee
      • Returning Data with Snoop response
      • Do not transition to SD
      • Hazard conditions
    • Interconnect Protocol Flows
      • Read transaction flows
      • Dataless transaction flows
      • Write transaction flows
      • Atomic transaction flows
      • Stash transaction flows
      • Hazard handling examples
    • Exclusive Accesses
      • Overview
      • Exclusive monitors
      • Exclusive transactions
    • Cache Stashing
      • Overview
      • Write with Stash hint
      • Independent Stash request
      • Stash target identifiers
      • Stash messages
    • DVM Operations
      • DVM transaction flow
      • DVM Operation types
      • DVM Operations
    • Error Handling
      • Error types
      • Error response fields
      • Errors and transaction structure
      • Error response use by transaction type
      • Poison
      • Data Check
Benefits of eLearning?

 

  • Access to the Instructor - Ask questions to the Instructor who taught the course
  • Available 24/7 - VLSIGuru eLearning courses are available when and where you need them
  • Learn at Your Pace - VLSIGuru eLearning courses are self-paced, so you can proceed when you're ready
Course Instructor
  • Dedicated Trainer Accessible On Phone / Email / Whatsapp
  • Trainer Exp: 15 Years

Price - ₹9,000 + GST

₹12,000    (25% Off)

10 hours left to avail at this price

Edit Template

Course Highlights

Edit Template

TESTIMONIALS

What Our Students Says About Inskill

FAQ

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit. Magni dolorum quidem ipsam eligendi, totam, facilis laudantium cum accusamus ullam voluptatibus commodi numquam, error, est. Ea, consequatur.

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit. Magni dolorum quidem ipsam eligendi, totam, facilis laudantium cum accusamus ullam voluptatibus commodi numquam, error, est. Ea, consequatur.

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit. Magni dolorum quidem ipsam eligendi, totam, facilis laudantium cum accusamus ullam voluptatibus commodi numquam, error, est. Ea, consequatur.

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit. Magni dolorum quidem ipsam eligendi, totam, facilis laudantium cum accusamus ullam voluptatibus commodi numquam, error, est. Ea, consequatur.

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit. Magni dolorum quidem ipsam eligendi, totam, facilis laudantium cum accusamus ullam voluptatibus commodi numquam, error, est. Ea, consequatur.