A JTAG enthusiast writes of his experience using JTAG to de-brick a router with corrupted firmware. JTAG is used to basically get access to the chips containing corrupted firmware and reprogram/reset code in the memory.
Since its introduction as an industry standard in 1990, boundary-scan (also known as JTAG) has enjoyed growing popularity for board level manufacturing test applications.
Boundary-scan has rapidly become the technology of choice for building reliable high technology electronic products with a high degree of testability. Due to the low-cost and IC level access capabilities of boundary-scan, its use has expanded beyond traditional board test applications into product design and service.
This blog provides a brief overview of the boundary-scan architecture and the new technology trends that make using boundary-scan essential for dramatically reducing development and production costs. We will also describe the various uses of boundary-scan and its application.
A JTAG enthusiast, I am providing an overview of the JTAG architecture and the new technology trends that make using boundary-scan essential for
dramatically reducing development and production costs. I also describe the
various uses of JTAG and the tools available today for supporting
boundary-scan technology.
Read how JTAG boundary-scan technology can be applied to the whole product life
cycle including product design, prototype debugging, production, and field
service. This means the cost of the boundary-scan tools can be amortized over
the entire product life cycle, not just the production phase.