Vivado IP Release Notes
This article contains a list of all 'Vivado™ IP Release Notes - All IP Change Log Information' answer records and the associated Vivado Tools release.
发布者: AMD
The IEEE 802.3 Clause 74 FEC IP core performs the functions of the IEEE Clause 74 FEC, sometimes known as “KR FEC”, as described in Clause 74 of IEEE Standard for Ethernet IEEE 802.3-2015.
The IEEE 802.3 Clause 74 FEC IP core performs the functions of the IEEE Clause 74 FEC, sometimes known as “KR FEC”, as described in Clause 74 of IEEE Standard for Ethernet IEEE 802.3-2015.
This core can be used to implement FEC for 10G and 25G BASE-R Ethernet PHYs, as well as for 16G Fibre Channel (16GFC) links and other standards which use the Clause 74 FEC: see Fibre Channel Framing and Signaling - 4 T11/15-253v2 rev 1.40, INCITS, October 2015.
Hardware Evaluation Time Out Period * : ~ 1-8 hrs
| LogiCORE™ | Version | Software Support | Supported Device Families |
|---|---|---|---|
| IEEE 802.3 Clause 74 FEC EF-DI-CLAUSE74-FEC-PROJ EF-DI-CLAUSE74-FEC-SITE |
v1.0 | Vivado™ 2018.1 | Kintex™ UltraScale+™ Virtex™ UltraScale+ Zynq™ UltraScale+ Kintex UltraScale™ Virtex UltraScale |
Download the required software from the AMD Downloads page. For information on New Features, Known Issues, and Patches please refer to the Licensing Solution Center.
* A Hardware Evaluation license for any of the IP cores above will enable you to parameterize, generate and instantiate these cores in your design. You will also be able to perform functional and timing simulation and generate a bitstream that you can use to download and configure your design in hardware.
The IP cores in this table will be fully functional in the programmed device for certain amount of time. After this time, the IP will "time out" (cease to function) and you will need to download and configure the FPGA again.
Certain AMD technologies may require third-party enablement or activation. Supported features may vary by operating system. Please confirm with system manufacturer for specific features. No technology or product can be completely secure.