Changing clock delays in an integrated circuit for skew optimization

Information

  • Patent Grant
  • 6550045
  • Patent Number
    6,550,045
  • Date Filed
    Tuesday, November 20, 2001
    23 years ago
  • Date Issued
    Tuesday, April 15, 2003
    21 years ago
Abstract
Clock delays are changed in a clock network of an ASIC. Global skew optimization is achieved by restructuring a clock domain to balance clock delays in the domain, and by equalizing clock delays of several domains of a group that have timing paths between them. Clock delays are equalized using buffer chains affecting all leaves of the respective domain, and an additional delay coefficient that equalizes clock delay. The clock insertion delays are changed for each group by restructuring the buffers in the group, based on both the data and clock logics to optimize the paths. Local skew optimization is achieved by restructuring the clock domain using a heuristic algorithm and re-ordering the buffers of the domain. A computer program enables a processor to carry out the processes.
Description




FIELD OF THE INVENTION




This invention relates to designing integrated circuit (IC) chips, and particularly to changing clock delays within a clock net of a complex application specific integrated circuit (ASIC). Most particularly, the invention is directed to changing the clock delay within a clock net for skew optimization, and to changing and budgeting clock delays between several clock nets of an ASIC to achieve optimal global clock delay and skew.




BACKGROUND OF THE INVENTION




Problems associated with timing closure of clock nets in ASICs increase with the complexity of ASIC designs and the need for higher operating frequencies of ASIC chips. Presently, timing closure is resolved using clock optimization techniques that address the clock logics separately from the data logics. While the clock optimization problem might be simplified by separating clock logics and data logics in synthesis, this technique also reduces the optimization potential by dividing a single two-dimensional optimization problem into two one-dimensional problems.




The data logics affect timing closure in clock logics. Consequently, the one-dimensional problem solution addressing only the clock logics did not always lead to optimal clock balance between different clock nets. As a result, new optimization techniques are needed to implement the designs more efficiently.




SUMMARY OF THE INVENTION




To achieve better timing results, the present invention provides an integrated approach whereby the clock logics are synthesized and optimized simultaneously with the data logics. The clock logics are restructured based on the timing information of the data logics so that the clock delays (or useful skews) can be used to fix timing violations.




In one embodiment, clock delays are balanced for optimization of clock skew in a clock net of an ASIC by restructuring part of the net. The clock net has at least one clock source. Clock cells to be balanced are selected and a slack is calculated for each selected clock cell based on an insertion delay associated with the clock source and the clock arrival and transition times required by the selected clock cell. The cell delay is adjusted based on the calculated slack.




In other embodiments, groups of clock domains having timing paths between them are identified. Clock insertion delays are equalized for all clock domains of the group. Preferably, clock insertion delay equalization is performed using buffers and an additional delay coefficient. The clock insertion delays are changed by restructuring the buffers to optimize paths between different clock domains.




In other embodiments, clock pins having timing violations are identified based on both clock delay and data delay. The clock net is restructured to optimize timing in the domain.




In one embodiment, the invention is manifest as a computer readable program containing code that, when executed by a processor, causes the processor to balance clock delays to optimize skew in the clock network of an ASIC. More particularly, a storage medium contains processor executable instructions that enable the processor to perform the processes of the invention and alter the clock network to adjusting the cell delay.











BRIEF DESCRIPTION OF THE DRAWINGS





FIG. 1

is diagram of a portion of an ASIC design useful in explaining certain aspects of the present invention.





FIG. 2

is a diagram of a buffer tree useful in explaining certain aspects of the present invention.





FIG. 3

is a flowchart of a process of changing cell delays in accordance with an embodiment of the present invention.





FIG. 4

is a flowchart of a process of buffer insertion useful in the process shown in FIG.


3


.





FIGS. 5A and 5B

are diagrams of a portion of an ASIC design useful in explaining the buffer insertion process of FIG.


4


.





FIG. 6

is a diagram of a portion of an ASIC design useful in explaining other aspects of the invention.





FIG. 7

is a flowchart of a process of reducing slack among clock domains in accordance with another embodiment of the invention.











DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS





FIG. 1

illustrates a portion of an ASIC design and is useful to explain part of the clock optimization techniques of the present invention. The ASIC design of

FIG. 1

includes a clock source


10


that drives clock logic devices


12


,


14


,


16


and


18


. For example, clock logic devices


12


-


18


may include clock buffers, identified as bufO, buf


1


and buf


2


, as well as multiplexers, identified as MUXO. The clock logic starts with clock source


10


and ends at sequential cells


20


,


22


and


24


. Cells


20


-


24


may, for example, be flip-flops, memories and the like that have clock inputs at CP


i


, CP


j


, CP


k


, etc. that are clock ending points (or clock leaves) of the clock logic. Data logic circuits


30


and


32


are coupled between sequential cells to transfer data between the sequential cells. The data logic paths provide timing information that can affect the clock network timing. Although

FIG. 1

shows an ASIC having a four clock logic devices


12


-


18


coupled to three sequential devices, in practice the ASIC will contain many thousands of sequential devices coupled through several levels of clock logic devices to a single clock source. Moreover, several clock sources may be included on the ASIC, each driving thousands of sequential devices through respective clock logic devices. Each clock source and its respective clock logic devices is herein referred to as a clock domain.




The clock delay at each clock ending point is defined as the delay from clock source


10


to the respective ending point CP


i


, CP


j


, CP


k


. The clock delay is represented by D


i


, i∈{O . . . N}, where N is the number of ending points from clock source


10


. The clock insertion delay, D


insertion


, for each clock domain is the average of clock delays of the domain, represented by







D
insertion

=




i
=
0


N
-
1









D
i

/

N
.













If there are C clock domains in one design, each clock insertion delay is represented by D|


insertion




i


, i∈{1 . . . C}. Each clock domain usually consists of one or more high fanout nets and a set of gated logics. The high fanout net can drive many sequential cells (over 100,000 such cells in some designs).





FIG. 2

illustrates the general structure of a buffer tree of a high fanout net. One such buffer tree is described in application Ser. No. 09/820,059 filed Mar. 28, 2001 by Lu et al. for “Distribution Dependent Clustering in Buffer Insertion of High Fanout Nets” and assigned to the same assignee as the present invention. The Lu et al. buffer tree is constructed using a placement-based buffer insertion algorithm.




As shown in

FIG. 2

, several levels of buffers may be required for the high fanout clock net, each buffer provides a prescribed time delay for clock signals. Thus, with clock source


10


at level


0


, buffers


12


and


13


are at level


1


and are connected to source


10


, buffers


14


-


19


and


21


are at level


2


with buffers


14


,


16


and


18


connected to buffer


12


and buffers


15


,


17


,


19


and


21


connected to buffer


13


. Changes to the buffer tree at lower levels closest to source


10


(e.g., level


1


) will affect numerous clock leaves. Each clock leaf may have different timing constraints from other clock leaves of the net. The different timing constraints of the several clock leaves makes it improbable that a change in the buffer tree will be useful to reduce any timing violation. Consequently, it is difficult to optimize skew in the buffer tree.




In one embodiment of the invention, clock delays are balanced in the lower buffer levels of the clock network. The number of buffer levels that are delay-balanced is based on the slack and the total level count.




The maximal delay D


max


from clock source


10


to leaves CP (

FIG. 1

) is the maximal time required to propagate a clock signal from source


10


to any leaf. The arrival time Arr


i


at the input pin of a buffer i is the maximal time required to propagate a clock signal from clock source


10


to this pin. The required time Req


i


that is necessary for the clock signal to transition through buffer i to all fanout leaves of buffer i. The slack S


i


at the input pin is the difference between the maximum delay and the time required to propagate a clock signal and transition buffer i: S


i


=D


max


−(Arr


i


+Req


i


). Because buffers


12


,


14


and


16


in

FIG. 1

have one input and one output, the slack at the output pin is the same as the slack at the input pin. Hence, in

FIG. 1

, the slack at pin CP


i


is S


i


=D


max


−(Arr


i


+Req


i


)





FIG. 3

is a flowchart of a process of delay balancing cells, including buffers and gated logic elements, in accordance with one embodiment of the present invention. At step


302


, the cells to be balanced are selected. For the purposes of this embodiment, cells in half of the levels closest to the clock source will be considered for delay balancing. Thus, those cells located in levels 1 through level L/2 (or (L+1)/2 if L is an odd number) are considered as candidates for delay balancing, where L is the total number of levels of the clock network (both gated logics and buffered high fanout nets). Each candidate cell is selected based on its level. If either of the following two conditions are satisfied, the cell will be considered for delay-balancing:




(1) |S


i


|≧T/8, where S


i


is the slack at the cell output pin.




(2) Max


arr


−Min


min


≧T/8, where Max


arr


−Min


min


is an arrival window between the maximal arrival time Max


arr


and the minimal arrival time Min


min


of all input pins driven by the cell.




It is evident that the criteria for selecting a cell as a candidate for delay balancing is empirically derived. Consequently, cells in any number or portion of levels may be considered for delay balancing. Additionally, the minimal limit for the slack and/or the arrival window may be selected using other convenient criteria, although a fraction(s) of the clock cycle is quite convenient. Hence, a cell is selected if it is within some range of levels from the clock source and either the slack at the cell output is greater than some time period or the arrival window for all pins of the cell is greater than some time period.




At step


304


, the slack on each pin of the selected cells is recalculated as S


Ri


=D


insertion


−(Arr


i


+Req


i


). At step


306


, the delay is adjusted based on the value of the recalculated slack S


Ri


. More particularly, if the recalculated slack of a cell i is greater than zero (S


Ri


>0), the cell delay is increased. If the recalculated slack of a cell i is smaller than zero (S


Ri


<0), the cell delay is decreased. Consequently, the delays are balanced within the clock domain. Moreover, the above described delay balancing serves as a good starting point for skew optimization for groups of clock domains having paths, such as data logic circuits, between individual clock domains of the group.




Adjustment of the cell delay is performed by cell resizing techniques and by buffer insertion. Buffer insertion in a clock path will change the delay in the path to thereby achieve cell delay adjustment. However, changing the delay will affect skew values of the affected clock leaves. Thus in

FIG. 1

, the slack from pin CP


j


to data pin D


k


of sequential device


22


is S


jk


=T−SK


j


−D


jk


−C


k


+SK


k


, where T is the clock cycle, SK


j


and SK


k


are the skews at pins CP


j


and CP


k


, respectively, D


jk


is the worst case delay along data logics path


32


between pins CP


j


and D


k


, and C


k


is the sum of the setup time (which is based technology and cell type) and a user-defined clock uncertainty. The skew SK at a pin is the delay from the clock source to the pin minus the clock insertion delay. If S


jk


is negative (i.e., if SK


j


+D


jk


+C


k


>T+SK


k


), there is a timing violation at pin D


k


. If (in the example of

FIG. 1

) the slack S


jk


along the data logics path from pin CP


j


to data pin D


k


is negative (indicating a timing violation), then a reduction of SK


j


will improve the performance of the path, possibly making the slack positive to remove the timing violation (e.g., SK


j


+D


jk


+C


k


<T+SK


k


). However, reducing SK


j


may adversely affect slack along another path. Thus in

FIG. 1

, the slack from pin CP


i


to pin D


j


is S


ij


=T−SK


i


−D


ij


−C


k


+SK


j


. Reduction of SK


j


to improve performance of the path from pin CP


j


to D


k


will worsen the performance of the path from pin CP


i


to pin D


j


.





FIG. 4

is a flowchart of the process of inserting buffers to adjust delays in the subtree. The process of

FIG. 4

identifies clock pins having timing violations (considering delays of both the clock and data paths) and restructures the clock net to optimize timing. At step


402


, a subtree is defined having a leaf with a violated clock pin. At step


404


, upper and lower global bounds GUB and GLB are defined to set bounds of the skew value allowed:







GUB
=


Min


(


T
2

,

T
-

D
insertion



)


-
α


,
and





GLB
=


-

Min


(


T
2

,

T
-

D
insertion



)



+
α


,










where α is a constant that depends on implementation technology to avoid signal competition and Min is the operation to obtain minimum value. At step


406


, maximal timing violations are calculated for all paths starting with a sequential cell and for all paths ending with the sequential cell. If a sequential cell j (such as a flip-flop) has only one pin connected to the clock net, the initial skew at that pin is SK


j


. The input pin that is connected to the clock domain is selected as the starting point of the delay paths. The maximal timing violation for all paths starting from cell j is Vio


fj


and the maximal timing violation for all paths ending at cell j is Vio


tj


. If path j→k is the worst case of all paths starting from cell j, Vio


fj


=−S


jk


; if path i→j is the worst case of all paths ending at cell j, Vio


tj


=−S


ij


.




At step


408


, path starting and ending constraints are established. The path starting constraint PSC and path ending constraint PEC for cell j, are:






PSC


j


=Min(SK


j


−GLB, TS), if TS≧0, or








PSC


j


=−Min(GUB−SK


j


, −TS), if TS<0, and








PEC


j


=Min(SK


j


−GLB, TE), if TE≧0, or








PEC


j


=Min(GUB−SK


j


, −TE), if TE<0, where








TS=Vio


fj


and TE=−Vio


tj


if Vio


fj


<0 && Vio


tj


<0 or TS=TE=(Vio


fj


−Vio


tj


)/2 for all other conditions.






If a subtree contains a single level, having N leaves whose path constraints PSC and PEC have been calculated in step


408


as PSC


i


and PEC


i


(i





{1, 2, . . . , N}), the delay from the clock root to leaf i should be reduced by reducing skew SK


i


if PSC


i


>0 and PEC


i


>0, with the upper limit of the delay reduction being PEC


i


. Similarly, the delay from the clock root to leaf i should be increased if PEC


i


<0 and PSC


i


<0, with the upper limit of the delay increase being |PSC


i


|. A heuristic procedure or algorithm for this is




(1) The original subtree leaves (OriN) are ordered based on PSC


i


(i





{1, 2, . . . , N}) in decreasing order. The leaf with the maximal PSC is ordered first and the leaf with the minimal PSC is ordered last. This results in a new leaf set MidN.




(2) From the ordered MidN leaves, find leaf j that satisfies PSC


j


<0.




(3) for leaves i





{j, j+1, . . . , N} in MidN, order the leaves based on PEC


i


in decreasing order, resulting in leaf set TmpN.




(4) Form final ordered leaves OrdN in which








OrdN|




i





{1, 2, . . . , N}




=MidN|




i





{1, 2, . . . , j−1}




, TmpN|




i





{j, . . . N}


.






At step


410


, clock buffers are inserted into the tree identified at step


402


. This is accomplished by ordering the leaves of the subtree and inserting buffers to drive one or more of the ordered leaves.

FIGS. 5A and 5B

set forth an example in which F


N


becomes the first leaf, F


2


becomes the second leaf and F


1


is ordered to the last leaf. After all leaves are ordered, a new buffer buf


1


is inserted at step


410


(

FIG. 4

) to drive one or more leaves in OrdN. Thus, as shown in

FIG. 5B

, new buffer buf


1


drives leaves F


j


and F


1


.




After new buffer buf


1


is inserted, the timing constraints are checked at step


412


. If the timing constraints are met, the skew value and timing information are updated for all paths starting or ending at the leaves. If the timing constraints cannot be met, and if all violated clock pins have been tried, the process ends.




Most ASICs, such as system-on-chip ASICs, employ more than one clock domain. Where several clock domains are coupled together, such as by data logics, the clock domains should be synchronized for optimal timing. Clock insertion delay is used as the reference point to calculate delays from one clock domain to another clock domain.





FIG. 6

illustrates a portion of an ASIC having data timing paths between two clock domains. More particularly, clock source


610


supplies clock


1


signals to clock logic devices


612


, which in turn supplies clock signals to the clock input pins CP


i


and CP


k


of sequential elements


614


and


616


. Data logic circuits


618


provide timing paths between elements


614


and


616


. A clock insertion delay D|


insertion




clock1


exists for the clock network, or domain, that starts from source


610


and ends at pins CP


i


and CP


k


. Thus, the clock domain starting from clock source


610


is similar to the clock domain illustrated in

FIG. 1. A

second clock source


620


supplies clock


2


signals to clock logic devices


622


, which in turn supplies clock signals to the clock input pins CP


j


of sequential element


624


. Thus a second clock domain, also similar to the clock domain illustrated in

FIG. 1

, starts from source


620


and ends at pins CP


j


. The second clock domain has clock insertion delay D|


insertion




clock2


that may be different from D|


insertion




clock1


.




As shown in

FIG. 6

, data logic circuits


626


provide a timing path between elements


616


and


624


of the two clock domains. The clock skew at a clock pin is the delay from clock source to the pin, less the clock's insertion delay. The skew at the clock pin CP


i


is SK


i


, and the skew at the clock pin CP


j


is SK


j


. D


datamax


is the maximal path delay along the data logic path from input pin CP


i


of cell FF


i


to data pin CD


j


of cell FF


j


. Consequently, the maximal path delay, D


ij


, representing both the clock path and the data path from FF


i


to FF


j


is D


ij


=C


k


+D|


insertion




clock1


+SK


i


+D


datamax


−D|


insertion




clock2


−SK


j


.




The above delay calculation demonstrates that clock insertion delays and data paths are factors which should be taken into account to adjust skew between clock domains. Because clock insertion delays are used as the reference values to calculate the skews, they should not be changed when optimizing skew. However, at this point, global timing budget can be achieved for the paths between different clock domains if the clock networks are restructured properly.




It should be noted that changing the clock insertion delay will not change the path delays within the same clock domain. For example, in

FIG. 6

the path delay from input pin CP


k


in cell FF


k


to data pin CD


i


in cell FF


i


will be the same regardless of the value of D|


insertion




clock1


. This is because any change to D|


insertion




clock1


will have the same effect on both skews SK


k


and SK


i


.




The required time R


ij


for the path between FF


i


and FF


j


can be obtained from an analysis of the waveform of clock


1


and clock


2


. Therefore, the slack at data pin CD


j


, denoted as S


ij


, is R


ij


−D


ij


. If S


ij


is negative, there is a timing violation at data pin CD


j


(data input pin). The goal of all timing optimization techniques is to eliminate negative slacks at each data input pin. The total negative slack of a design is the sum of the negative slacks at each data input pin. Therefore, if the total negative slack is 0, there will be no timing violation in the design.




If the value of D|


insertion




clock1


can be reduced, D


ij


is also reduced, making S


ij


positive (or reducing the total negative slack).

FIG. 7

is a flowchart of the process to accomplish reduction of slack. At step


702


, the group(s) of clocks are identified where there are real timing paths among the clocks of the group. Based on the timing path analysis (also including any user-specified false paths), timing paths between two clock domains can be identified. If there are N clocks in a design, an array CN[N] represents the dependency between clocks. If CN[i] equals −1, clock i does not have any path from its clock domain to any other clock domain. Therefore, CN[i]=−1 means that clock i is an independent clock. If CN[j]=CN[k] and CN[k]≠−1, real timing paths exist between clock domain j and clock domain k. For example, if a design has ten clocks, designated clock


0


through clock


9


, and the path analysis gives CN=[1,0,0,0,0,1,2,2,1,−1] clock


9


is an independent clock because CN[


9


]=−1. Since CN[


0


)=CN[


5


]=CN[


8


]=1, clock


0


, clock


5


and clock


8


belong to the same group. Similarly, clock


1


, clock


2


, clock


3


and clock


4


belong to one group, and clock


6


and clock


7


belong to one group. Therefore, there are three clock groups: a first group composed of clock


0


, clocks and clock


8


, a second group composed of clock


1


, clock


2


, clock


3


and clock


4


, and a third group composed of clock


6


and clock


7


. Clock


9


is an independent clock.




At step


704


, the clock insertion delay is equalized for all clocks belonging to each respective clock group. To simplify the description (without losing the generality), a group composed of clock


0


, clock


5


and clock


8


have insertion delays D|


insertion




clock0


, D|


insertion




clock5


and D|


insertion




clock8


, respectively. MaxD


insertion


is the maximal value among these insertion delays. Clock insertion delays are equalized among the clock domains of the group by inserting delay, such as in the form of a chain of inserted buffer cells, at each clock source so that the clock insertion delay for each clock of the group equals MaxD


insertion


+Coef, where Coef is an additional value. The additional value, Coef, may be different for each domain, depending on the domain's insertion delay. Thus, D|


insertion




clock0


+Coef


0


=D|


insertion




clock5


+Coef


5


=D|


insertion




clock8


+Coef


8


=MaxD


insertion


+Coef. To ensure that changing the clock insertion delay gives the same effect on all leaves of the clock, a chain of buffers is built from the clock source.




At step


706


, the insertion delays are changed for each clock group to minimize the total negative slacks. Because changing a given clock insertion delay only affects paths between the affected clock and other clocks in the group, the slacks for only the related data input pins need to be updated. Because, after step


706


, each clock source drives a chain of cells, removing buffers from or inserting buffers into this chain will only affect the clock's insertion delay, but will not affect the skews at the leaves of this clock. Therefore, only the clock insertion delay is used for global timing budget for the paths between clock domains. As a result, calculation is greatly simplified.




The present invention thus provides for the changing of clock delays and optimization of clock skew in a clock network of an ASIC. The processes of

FIGS. 3 and 7

balance clock delays for global skew optimization in the ASIC. Thus, in

FIG. 3

, clock cells to be balanced are selected as a subtree of a clock tree and the subtree is restructured to optimize skew within the subtree. More particularly, a slack is calculated for each selected clock cell based on an insertion delay associated with the clock source and the clock arrival and transition times required by the selected clock cell. The cell delay is adjusted based on the calculated slack.




In

FIG. 7

, the clock network includes a plurality of clock sources each defining a clock domain, and the ASIC further includes data circuits that define timing paths between at least two clock domains. At least one group of clock domains having timing paths between member domains is identified and the clock insertion delays are equalized for all clock domains of the group. The clock insertion delays are equalized using a chain of buffers with an additional delay coefficient for each clock. The clock insertion delays are then changed by restructuring the buffer chain to thereby optimize clock paths.




The process of

FIG. 4

changes clock delays to optimize skew at a local level. In this case, timing violations are found based on both the clock and data delays and the subtree is restructured to optimize timing based on a heuristic process and ordering of the leaves.




In one form, the invention is carried out through use of a processor programmed to carry out the processes. A computer readable program code is stored in a computer readable storage medium, such as a disc drive, and contains instructions that enable the processor to carry out the steps of the processes of changing clock delays and optimization of clock skew in a clock network of an ASIC. More particularly, the instructions enable the processor to balance clock delays for global skew optimization in the ASIC, including between clock domains of a group of domains having timing paths between them. Other instructions enable the processor to change clock delays to optimize skew at a local level. In this case, the instructions enable the processor to locate timing violations based on both clock and data delays and to restructure the subtree to optimize timing based on a heuristic algorithm to re-order the leaves.




Although the present invention has been described with reference to preferred embodiments, workers skilled in the art will recognize that changes may be made in form and detail without departing from the spirit and scope of the invention.



Claims
  • 1. A process of designing a clock network of an ASIC to change clock delays, the clock network having a plurality of clock sources each having a clock domain, and the ASIC further includes data circuits that define timing paths between at least two clock domains, the process comprising steps of:a) selecting clock cells to be changed in the clock network; b) calculating a slack for each selected clock cell based on an insertion delay associated with at least one clock source and clock arrival and transition times required by the selected clock cell; c) adjusting cell delay based on the calculated slack d) identifying at least one group of clock domains having timing paths between member domains; e) equalizing clock insertion delays for all clock domains of the group; and f) altering clock insertion delays for clock domains in each group to minimize slack.
  • 2. The process of claim 1, wherein the clock network is a clock tree having a plurality of levels, and step (a) comprises steps of:a1) calculating a slack to the cells of the clock tree based on a maximum delay between the at least one clock source and the leaves of the clock tree, an arrival time of a clock signal to each input of the respective cell and a transition time to transition the clock signal through the cell, and a2) selecting clock cells based on the tree level at which the cell is located and at least one of (i) the slack of the cell and (ii) an arrival window for all inputs of the cell.
  • 3. The process of claim 2, wherein step (b) comprises recalculating the slack at each cell selected at step (a2).
  • 4. The process of claim 1, wherein the clock network is a clock tree having a plurality of levels and wherein step (c) is performed by steps of:c1) defining a subtree of the clock tree, c2) for each cell in the subtree, defining maximum timing violations for all clock paths starting at the cell and for all clock paths ending at the cell, c3) establishing starting and ending path constraints based on the defined maximum timing violations, and c4) inserting clock buffers into the paths based on the starting and ending path constraints.
  • 5. The process of claim 4, wherein step (c2) comprises, for each cell in subtree, steps of:c2a) identifying a maximum timing violation for all paths starting from the cell based on a worst case clock skew value of the paths from the cell, and c2b) identifying a maximum timing violation for all paths ending at the cell based on a worst case clock skew value of the paths to the cell.
  • 6. The process of claim 4, wherein step (c3) comprises, for each cell in the subtree, steps of:c3a) calculating allowable upper and lower bounds for the skew value of the cell based on the clock period and the insertion delay of the clock source, and c3b) establishing starting and ending path constraints based on the maximum timing violations and the calculated upper and lower bounds.
  • 7. The process of claim 4, wherein step (c4) comprises steps of:c4a) ordering the leaves of the clock tree to place cells having negative starting and ending path constraints at a selected position in the order, and c4b) inserting buffer cells between the clock source and the cells in the selected position.
  • 8. The process of claim 1, wherein step (e) comprises adding a delay to the clock insertion delay of each clock domain of the group to equalize the insertion delay of all of the clock domains of the group.
  • 9. The process of claim 8, wherein step (f) comprises reducing the clock insertion delay of each clock domain of the group to minimize negative slack for cells of the domain.
  • 10. A process of designing a clock network of an ASIC to change clock delays, the clock network having a plurality of clock sources each having a clock domain, and the ASIC further includes data circuits that define timing paths between at least two clock domains, the process comprising steps of:a) balancing clock delays for cells within each clock domain; b) identifying at least one group of clock domains having timing paths between member domains; c) equalizing clock insertion delays for all clock domains of the group; and d) altering clock insertion delays for clock domains in each group to minimize slack.
  • 11. The process of claim 10, wherein step (c) comprises adding a delay to the clock insertion delay of each clock domain of the group to equalize the insertion delay of all of the clock domains of the group.
  • 12. The process of claim 11, wherein step (d) comprises reducing the clock insertion delay of each clock domain of the group to minimize negative slack for cells of the domain.
  • 13. A storage medium having stored therein processor executable instructions that enable a processor to change clock delays in a clock network design for an ASIC having a plurality of clock sources, and the ASIC further includes data circuits that define timing paths between at least two clock domains, the processor executable instructions include:selection instructions that enable the processor to select clock cells to be changed in the clock network design; calculating instructions that enable the processor to calculate a slack for each selected clock cell based on an insertion delay associated with at least one clock source and clock arrival and transition times required by the selected clock cell; adjusting instructions that enable the processor to adjust cell delay based on the calculated slack; identifying instructions that enable the processor to identify at least one group of clock domains having timing paths between member domains; insertion instructions that enable the processor to equalize clock insertion delays for all clock domains of the group; and altering instructions that enable the processor to alter clock insertion delays for clock domains in each group to minimize slack.
  • 14. The storage medium of claim 13, wherein the clock network is a clock tree having a plurality of levels, and the selection instructions include:instructions that enable the processor to calculate a slack to the cells of the clock tree based on a maximum delay between the at least one clock source and the leaves of the clock tree, an arrival time of a clock signal to each input of the respective cell and a transition time to transition the clock signal through the cell, and instructions that enable the processor to select clock cells based on the tree level at which the cell is located and at least one of (i) the slack of the cell and (ii) an arrival window for all inputs of the cell.
  • 15. The storage medium of claim 13, wherein the adjusting instructions include:instructions that enable the processor to define a subtree of the clock tree, instructions that enable the processor to define maximum timing violations for all clock paths starting at each cell in the subtree and for all clock paths ending at each cell in the subtree, instructions that enable the processor to establish starting and ending path constraints based on the defined maximum timing violations, and instructions that enable the processor to insert clock buffers into the paths of the clock network design based on the starting and ending path constraints.
  • 16. The storage medium of claim 13, wherein the insertion instructions comprises instructions that enable the processor to add a delay to the clock insertion delay of each clock domain of the group to equalize the insertion delay of all of the clock domains of the group.
US Referenced Citations (13)
Number Name Date Kind
5740067 Hathaway Apr 1998 A
5849610 Zhu Dec 1998 A
5980092 Merryman et al. Nov 1999 A
6014510 Burks et al. Jan 2000 A
6205572 Dupenloup Mar 2001 B1
6292931 Dupenloup Sep 2001 B1
6367060 Cheng et al. Apr 2002 B1
6425114 Chan et al. Jul 2002 B1
6442737 Tetelbaum et al. Aug 2002 B1
6473890 Yasui et al. Oct 2002 B1
6480994 Tetelbaum et al. Nov 2002 B1
20010010092 Kato Jul 2001 A1
20010021992 Yamashita Sep 2001 A1
Non-Patent Literature Citations (2)
Entry
I.S.Kourtev et al, Synthesis of clock tree topologies to implement nonzero clock skew schedule, IEE Proc.-Circuits Devices Syst., vol. 146, No. 6, Dec. 1999 pp 321-326.*
M.C. Chi et al, A reliable clock tree design methodology for ASIC designs, ISQED 2000, Proceedings 2000, pp269-274.