A Test Method of SIP Module

被引:0
|
作者
Zhu, Tianrui [1 ]
Liang, Yun [1 ]
Cai, Yimao [1 ]
Lan, Lidong [1 ]
Li, Xin [1 ]
机构
[1] Beijing Microelect Technol Inst, Beijing, Peoples R China
来源
2014 15TH INTERNATIONAL CONFERENCE ON ELECTRONIC PACKAGING TECHNOLOGY (ICEPT) | 2014年
关键词
SIP; testing method; ATE; functional testing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Developing from IC and PCB, the SIP (system in a package) has already been one of the most important development directions of future electronic system; therefore, we desiderate the study of testing design and test method. Being incapable of adding circuits for testable design, the SIP can only design test method and process according to the existing resources. Test method in this paper takes into account both the IC characteristic and the PCB characteristic of SIP, using the test results of bare dies and substrates in SIP, combined with the SIP production process, identify the steps may cause failure, determine the test projects, and finally complete the test method design. At the same time, consideration has already be given to both test coverage and the cost, it fulfill the actual requirement of SIP.
引用
收藏
页码:117 / 120
页数:4
相关论文
共 50 条
  • [41] Performance Evaluation of SIP Servers
    Chi, Caixia
    Wang, Dong
    Hao, Ruibing
    Zhou, Wei
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 641 - 646
  • [42] Evaluating SIP Server Performance
    Nahum, Erich M.
    Tracey, John
    Wright, Charles P.
    SIGMETRICS'07: PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON MEASUREMENT & MODELING OF COMPUTER SYSTEMS, 2007, 35 (01): : 349 - 352
  • [43] Practical authentication scheme for SIP
    Shuhua Wu
    Qiong Pu
    Fei Kang
    Peer-to-Peer Networking and Applications, 2013, 6 : 61 - 74
  • [44] Improvement of a SIP Security Mechanism
    Liu, Longtao
    Tang, Wen
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2929 - 2932
  • [45] Overview of SIP Attacks and Countermeasures
    El-moussa, Fadi
    Mudhar, Parmindher
    Jones, Andy
    INFORMATION SECURITY AND DIGITAL FORENSICS, 2010, 41 : 82 - +
  • [46] Updated Approach to SIP Benchmarking
    Rozhon, Jan
    Voznak, Miroslav
    Tomala, Karel
    Vychodil, Jiri
    2012 35TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2012, : 251 - 254
  • [47] Hiding Data in SIP Session
    Mehic, Miralem
    Slachta, Jiri
    Voznak, Miroslav
    2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015,
  • [48] Practical authentication scheme for SIP
    Wu, Shuhua
    Pu, Qiong
    Kang, Fei
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (01) : 61 - 74
  • [49] Providing Anonymity Services in SIP
    Kazatzopoulos, L.
    Delakouridis, C.
    Marias, G. F.
    2008 IEEE 19TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2008, : 2468 - 2473
  • [50] Cryptanalysis of a SIP Authentication Scheme
    Liu, Fuwen
    Koenig, Hartmut
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 134 - 143