| 研究生: |
范盛維 Fan, Sheng-Wei |
|---|---|
| 論文名稱: |
半導體工程鏈資料交換機制之設計與實作 Data Exchange Mechanism Design and Implementation of Semiconductor Engineering Chain |
| 指導教授: |
鄭芳田
Cheng, Fan-Tien 洪敏雄 Hung, Min-Hsiung |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 製造工程研究所 Institute of Manufacturing Engineering |
| 論文出版年: | 2006 |
| 畢業學年度: | 94 |
| 語文別: | 中文 |
| 論文頁數: | 107 |
| 中文關鍵詞: | 商業流程處理 、巨大檔案傳輸 、資料傳輸安全 、工程鏈 |
| 外文關鍵詞: | Data Transmission Security, Business Process Handling, Large Data Transmission, Engineering Chain |
| 相關次數: | 點閱:114 下載:4 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
IC生產進入奈米製程世代,許多良率(Yield)問題與設計有很大關係,傳統將晶片設計、光罩製造及晶圓代工分離獨自運作的模式將難以適用。這促使許多IC設計公司採用「可製造性設計」(Design for Manufacturability, DFM)策略,亦即藉由半導體生產鏈協力廠商(特別是設計公司、光罩廠、晶圓代工廠)間彼此緊密分享資訊,以確保在設計階段便能將可製造性及良率因素納入考量,使得新的IC晶片得以提高良率,並有效降低成本及上市時間(Time to Market)。因此,半導體業急需要有工程鏈管理系統,來有效解決合作的半導體公司間工程資料交換與分享問題。本論文針對工程鏈管理系統中工程資料交換之需求,研發ㄧ個以網路服務(Web Services)為基礎的「半導體工程鏈資料交換機制」。本研究除了系統架構設計外,還發展與實作了4個機制:(1)資料溝通與整合機制、(2)資料傳輸安全機制、(3)巨大檔案傳輸機制及(4)商業流程處理機制。最後,本研究建構了一個工程鏈管理系統雛型,以進行系統之功能驗證與效能測試。實驗測試結果顯示,本工程鏈資料交換機制可以符合設計之功能需求,也有不錯之效能表現,相信能夠被應用來有效解決半導體工程鏈之資料交換問題。
When IC production enters nano-meter generation, many yield problems are related to design. The traditional mode of letting IC design, mask fabrication, and foundry service operate independently may not be applicable. This forces many IC design companies to adopt the Design-for-Manufacturability (DFM) strategy, which tightly shares information among cooperative semiconductor companies, especially Design House, Masking House, and Foundry, to make sure that the manufacturability and yield factors are considered in the IC design phase. Consequently, the yield can be increased, and the cost and time to market can be reduced for a new IC. Thus, the semiconductor industry is eager to have engineering chain management systems (ECMS) to solve the problem of exchanging and sharing engineering data among cooperative semiconductor companies. This thesis aims at the data exchange requirements in the engineering chain management system, and develops a Web Services-based semiconductor engineering chain data exchange scheme. In addition to designing the system framework, this research also develops and implements four mechanisms: (1) Data Communication and Integration Mechanism, (2) Data Transmission Security Mechanism, (3) Large File Transmission Mechanism, and (4) Business Process Handling Mechanism. Finally, a prototype ECMS is constructed to verify the system functions and to test the performance. Experimental test results show that the proposed engineering chain data exchange scheme can fulfill the desired functional requirements and demonstrate a good performance. Thus, it can be a valid solution to the data exchange problem of the semiconductor engineering chain.
[1] Gartner, “Gartner Says Worldwide Semiconductor Revenue On Pace for 27 Percent Growth in 2004,” at Fairmont San Francisco, Press Release, Inc., 2004 [Online], http://www4.gartner.com/5_about/press_releases/asset_101627_11.jsp.
[2] K. Jou, “IC Design House Survey 2004,” EE Times, Taiwan, 2004 [Online], http://www.eetasia.com/SURVEYS/EETT_ICD_TW04.PPT.
[3] R. Madhavan, “Changing Economics of Chip Design,” at FSA presentation, 2004.
[4] SEMI, “What Are the Challenges and Opportunities in Semiconductor IP?,” FSA, 2004 [Online], http://fsa.org/resources/presentations/SVF_III_051304.pdf.
[5] ITRS, “2003 ITRS Factory Integration - Factory Information & Control Systems (FICS),” Backup Foils, 2003 [Online], http://public.itrs.net/.
[6] IDC Web Site. [Online], http://www.idc.com/.
[7] H. H. Jones, “A Delayed 90-nm Surprise-Why Designers Need to Spend the Next Year Focusing on Yield,” Electronics Design Chain Magazine, 2004.
[8] G. James, “Navigting 65-nm Design Limits,” in Electronics Design Chain Magazine, 2004.
[9] S. E. Schulz, “Electronic Design and Solution Fair 2005, 2005 [Online],” http://techon.nikkeibp.co.jp/article/NEWS/20050203/101419/.
[10] R. Goering, “SEMI's Oasis Provides Respite from GDSII, EE Times, 2002 [Online],” http://www.eedesign.com/article/printableArticle.jhtml?articleID=10806053.
[11] Open Access Specification. [Online], http://www.si2.org/.
[12] N. Iriki, N. Miyazaki, M. Homma, T. Sato, T. Onodera, T. Matsuda, T. Uga, H. Higashino, I. Higashikawa, and N. Yoshioka, “The guideline of reticle data management (Ver. 2), vol. 5504: Proceedings of the SPIE,” 2004.
[13] SEMI, “Specification of Data Structures for Photomask Orders,” P10, 2003.
[14] SEMI, “Specification for Mask Defect Data Handling with XML,” P41, Between Defect Inspection Tools, Repair Tools and Review Tools, 2004.
[15] SEMI, “Specification of Reticle Data for Automatic Reciprocal Transfer to Wafer Exposure System,” P42, 2004.
[16] N. Miyazaki, “JEITA Reticle Management Subcommittee Activity,” at SEMICON WEST 2004, 2004.
[17] SEMI, “Guide for Developing Specification Forms for Order Entry of Silicon Wafers,” M18, 2006.
[18] 鄭淑芬, 電子商務整合方案實作-Biztalk Server 2000 與XML, Pearson Education, 2001.
[19] SEMI, “Interface C Requirements of e-Diagnostics Guidebook (version 2.1),” 2005 [Online], http://www.sematech.org/.
[20] M.-H. Hung, F.-Y. Hsu, T.-L. Wang, F.-T. Cheng, R. Lai, and T. Huang, “A Secure Collaborative e-Diagnostics Framework for Semiconductor Factories,” presented at 2005 IEEE International Conference on Automation Science and Engineering, Edmonton, Canada, 2005.
[21] L. F. Cabrera, C. Kurt, and D. Box, “An Introduction to the Web Services Architecture and Its Specifications (Version 2),” Microsoft Corporation [Online], October 2004, http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwebsrv/html/introwsa.asp
[22] Web Services Enhancements (WSE). [Online], http://msdn.microsoft.com/webservices/webservices/building/wse/default.aspx.
[23] How SSL Works. [Online], http://developer.netscape.com/tech/security/ssl/howitworks.html.
[24] M.-H. Hung, K.-Y. Chen, R.-W. Ho, and F.-T. Cheng, “Development of an e-Diagnostics/Maintenance Framework for Semiconductor Factories with Security Considerations,” Special Issue on Intelligent Maintenance Systems for International Journal of Advanced Engineering Informatics, vol. 17, issues 3-4, pp. 165-178, 2004.
[25] XML-Signature Syntax and Processing. [Online], http://www.w3.org/TR/xmldsig-core/.
[26] XML Encryption Syntax and Processing. [Online]. http://www.w3.org/TR/xmlenc-core/.
[27] M. Birbeck, J. Duckett, and O. Gauti, “Profession XML 2nd Edition,” in Wrox Press, 2001.
[28] P. Hall, “Web Services A Technical Introduction,” in Upper Saddle River, New Jersey, 2003.
[29] UDDI Technical White Paper, UDDI.org [Online], 2000, http://www.uddi.org.
[30] Xquery. [Online], http://www.datadirect.com/developer/xquery/references/definitions/index.ssp.
[31] XSLT. [Online], http://www.d3magazine.com/glossary.
[32] XPath. [Online], http://www.dpawson.co.uk/xsl/xslvocab.html.
[33] base64. [Online], http://secwatch.org/glossary/terms/B.
[34] MIME. [Online], http://www.acad.bg/beginner/gnrt/appendix/glossary.html.
[35] MIME Multipart/Related. [Online], http://xml.coverpages.org/mimesgml-drafts.html.
[36] XPat. [Online], http://www.dlxs.org/products/xpat.html.
[37] Message Transmission Optimization Mechanism. [Online], http://www.w3.org/TR/soap12-mtom/.
[38] XML-binary Optimized Packaging. [Online], http://www.w3.org/TR/soap12-xop.
[39] Resource Representation SOAP Header Block. [Online], http://www.w3.org/TR/soap12-rep/.
[40] Uniform Resource Identifier. [Online], http://www.freesoft.org/CIE/RFC/1866/7.htm.
[41] Biztalk Framework 2.0. [Online], http://www.microsoft.com/biztalk/techinfo/BizTalkFramework20.doc.
[42] D. Chappell, “Understand BizTalk Server 2004,” Microsoft Corporation [Online], Redmond, San Francisco, October 2003.
[43] B. E. Travis, “XML and SOAP Programming for Biztalk Servers,” Microsoft Corporation, Redmond, Washington, 2000.
[44] eXternal Data Representation. [Online], http://www2.themanualpage.org/glossary/glo_x.php3.
[45] XML Schema Definition. [Online], http://en.wikipedia.org/wiki/XSD.
[46] Biztalk Server 2004 Product Documentation. [Online], http://www.microsoft.com/technet/biztalk/btsdocs/.
[47] S. S. Albir, “UML in a Nutshell,” O’Reilly & Associates Inc., New York, 1999.
[48] G. Booch, J. Rumbaugh, and I. Jacobson, “The Unified Modeling Language:User Guide,” Massachusetts, 1999.
[49] P. B. Kruchten, “The 4+1 View Model of Architecture,” IEEE Software 42-50, 1995.
[50] R. Sessions, “COM and DCOM: Micrsoft's Vision for Distributed Objects,” John Wiley & Sons Inc, June 1997.
[51] H. Balen, “Distributed Object Architectures with Corba,” SIGS BOOKS, May 2000.
[52] R. Cattell, J. Inscore, and E. Pa, “J2EE Technology in Practice: Building Business Applications with the Java,” Addison-Wesley, June 2001.
[53] D. Sprott and L. Wilkes, “Understanding Service-Oriented Architecture,” Microsoft Corporation [Online], January 2004. http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnmaj/html/aj1soa.asp.
[54] 簡西村, “服務導向架構(Service Oriented Architecture)應用,” December 2004, http://www.microsoft.com/taiwan/msdn/columns/SOA/SOA_overview_2004112901.htm.
[55] 林耀珍, 如何導入服務導向架構SOA, July 2004. http://www.microsoft.com/taiwan/msdn/columns/200407softdev.htm.
[56] C. Vawter and E. Roman, “J2EE vs. Microsoft .NET A comparison of building XML-based Web Services,” The Middleware Company, June 2001
[57] T. S. Zhan and S. U. Wu, 資訊與網路安全技術, December 2004.
[58] 賴榮樞, “企業資安防護的重要觀念,” Microsoft Corporation, October 2004, http://www.microsoft.com/taiwan/technet/columns/profwin/15-security_enterprise.mspx
[59] Z. Svoboda, “Securing Web Services with Single Sign-On,” Systinet Inc, February 2002, http://www.theserverside.com/tt/articles/article.tss?l=Systinet-web-services-part-6
[60] Microsoft Passport. [Online], http://www.microsoft.com/netservices/passport/
[61] OASIS Web Site. [Online], http://www.oasis-open.org/