12.07.2015 Views

Configuration Handbook - Kamami.pl

Configuration Handbook - Kamami.pl

Configuration Handbook - Kamami.pl

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Configuration</strong> Features6. Select the name of the file you added to the SOF Data area and clickProperties.7. Check the Compression check box.When multi<strong>pl</strong>e Stratix II or Stratix II GX devices are cascaded, you canselectively enable the compression feature for each device in the chain ifyou are using a serial configuration scheme. Figure 7–2 depicts a chain oftwo Stratix II or Stratix II GX devices. The first Stratix II or Stratix II GXdevice has compression enabled and therefore receives a compressed bitstream from the configuration device. The second Stratix II orStratix II GX device has the compression feature disabled and receivesuncompressed data.In a multi-device FPP configuration chain all Stratix II or Stratix II GXdevices in the chain must either enable of disable the decompressionfeature. You can not selectively enable the compression feature for eachdevice in the chain because of the DATA and DCLK relationship.Figure 7–2. Compressed & Uncompressed <strong>Configuration</strong> Data in the Same<strong>Configuration</strong> FileSerial <strong>Configuration</strong> DataCompressed<strong>Configuration</strong>DataDecompressionControllerStratix II orStratix II GXFPGAnCEnCEOUncompressed<strong>Configuration</strong>DataStratix II orStratix II GXFPGAnCE nCEO N.C.Serial or Enhanced<strong>Configuration</strong>DeviceGNDYou can generate programming files for this setup from the ConvertProgramming Files window (File menu) in the Quartus II software.Design Security Using <strong>Configuration</strong> Bitstream EncryptionStratix II and Stratix II GX devices are the industry’s first devices with theability to decrypt a configuration bitstream using the AdvancedEncryption Standard (AES) algorithm—the most advanced encryptionalgorithm available today. When using the design security feature, a7–8 Altera CorporationStratix II Device <strong>Handbook</strong>, Volume 2 May 2007

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!