Claims
- 1. A method of characterizing an electronic system comprising the steps of:
defining a range of drive strength; defining a range of line lengths; defining a range of coupling efficiency values; and generating a vulnerability table in response to the range of drive strengths, in response to the range of line lengths and in response to the range of coupling efficiency values.
- 2. A method of characterizing an electronic system as set forth in claim 1, wherein the method is implemented with computer instructions stored on a computer readable medium which when accessed by a computer cause the computer to perform the method of claim 1.
- 3. A method of characterizing an electronic system as set forth in claim 1, wherein the method is implemented with computer instructions, the computer instructions are stored on a computer readable medium, the computer readable medium is distributed in at least two computers.
- 4. A method of characterizing an electronic system as set forth in claim 1, wherein the method is implemented by computer instructions, which access data stored on a computer readable medium.
- 5. An apparatus comprising:
a means for defining a range of drive strength; a means for defining a range of line lengths; a means for defining a range of coupling efficiency values; and a means for generating a vulnerability table in response to the range of drive strengths, in response to the range of line lengths and in response to the range of coupling efficiency values.
- 6. A method of characterizing an electronic system comprising the steps of:
(a) defining a first drive strength; (b) identifying a first signal path including first line length; (c) identifying a second signal path including a second line length, wherein the second line length is equivalent to the first line; (d) modeling coupling between the first signal path and the second signal path; (e) establishing a coupling efficiency in response to modeling coupling between the first signal path and the second signal path; (f) generating a noise value in response to the drive strength, in response to the first line length and in response to the coupling efficiency; (g) generating a two-dimensional vulnerability relationship for the first line length by repeating steps (e) through (f); (h) generating a two-dimensional vulnerability relationship for multiple line lengths by repeating steps (b) through (g) for a new line length wherein the new line length is always a different numerical value; and (i) generating a three-dimensional vulnerability relationship by repeating steps (b) through (h) and defining a second drive strength wherein the second drive strength is different from the first drive strength.
- 7. A method of characterizing an electronic system comprising the steps of:
defining a plurality of devices in the electronic system; and generating a plurality of vulnerability tables, with at least one of the vulnerability tables associated with at least one of the plurality of devices.
- 8. A method as set forth in claim 7, wherein the plurality of devices include logical gates.
- 9. A method as set forth in claim 7, wherein the plurality of devices include storage devices.
- 10. A method of characterizing an electronic system as set forth in claim 7, wherein the method is implemented with computer instructions stored on a computer readable medium which when accessed by a computer cause the computer to perform the method of claim 7.
- 11. An apparatus comprising:
means for defining a plurality of devices in the electronic system; and means for generating a plurality of vulnerability tables, with at least one of the vulnerability tables associated with at least one of the plurality of devices.
- 12. A method of characterizing an electronic system comprising the steps of:
defining a vulnerability window for an input to a storage device; determining a range of delay times for a signal communicated from a driving device to the input to the storage device; and generating a mapped vulnerability window in response to the vulnerability window and in response to the range of delay times.
- 13. A method of characterizing an electronic system as set forth in claim 12, wherein the input to the storage device is a data input to the storage device.
- 14. A method of characterizing an electronic system as set forth in claim 12, wherein the input to the storage device is a clock input to the storage device.
- 15. A method of characterizing an electronic system as set forth in claim 12, wherein the input to the storage device is a synchronous control input to the storage device.
- 16. A method of characterizing an electronic system as set forth in claim 12, wherein the input to the storage device is an asynchronous control input to the storage device.
- 17. A method of characterizing an electronic system as set forth in claim 12, wherein the method is implemented with computer instructions stored on a computer readable medium which when accessed by a computer cause the computer to perform the method of claim 16.
- 18. An apparatus comprising:
means for defining a vulnerability window for an input to a storage device; means for determining a range of delay times for a signal communicated from a driving device to the input to the storage device; and means for generating a mapped vulnerability window in response to the vulnerability window and in response to the range of delay times.
- 19. A method of characterizing an electronic system, the method comprising the steps of:
identifying an input to a storage device; and generating a vulnerability window for the input to the storage device.
- 20. A method of characterizing an electronic system as set forth in claim 19, wherein the input to the storage device is a data input.
- 21. A method of characterizing an electronic system as set forth in claim 19, wherein the input to the storage device is a synchronous control input.
- 22. A method of characterizing an electronic system as set forth in claim 19, where the input to the storage device is an asynchronous control input.
- 23. A method of characterizing an electronic system as set forth in claim 19, where the input to a storage device is a clock input.
- 24. A method of characterizing an electronic system as set forth in claim 19, wherein the method is implemented with computer instructions stored on a computer readable medium which when accessed by a computer cause the computer to perform the method of claim 19.
- 25. An apparatus comprising:
means for identifying an input to a storage device; and means for generating a vulnerability window for the input to the storage device.
- 26. A method of determining signal integrity in an electronic system comprising the steps of:
simulating operation of the storage device including a node; and characterizing the signal integrity of the electronic system by measuring the node of the storage device to determine a state of the storage device.
- 27. A method of determining signal integrity of an electronic system as set forth in claim 26 wherein node of the storage element is an internal node.
- 28. A method of determining signal integrity of an electronic system as set forth in claim 26 wherein node of the storage element is an external node.
- 29. A method of determining signal integrity of an electronic system as set forth in claim 26 wherein signal integrity is determined by measuring the node of the storage device to determine if the storage device has stored incorrect data.
- 30. A method of characterizing an electronic system as set forth in claim 26, wherein the method is implemented with computer instructions stored on a computer readable medium which when accessed by a computer cause the computer to perform the method of claim 26.
- 31. An apparatus comprising:
means for simulating operation of the storage device including a node; and means for characterizing the signal integrity of the electronic system by measuring the node of the storage device to determine a state of the storage device.
- 32. A method of determining signal integrity in an electronic system comprising the steps of:
simulating operation of a gate driving a storage device, the storage device including a node; and characterizing the signal integrity of the electronic system by measuring the node of the storage device to determine a state of the storage device.
- 33. A method of determining signal integrity of an electronic system as set forth in claim 32, wherein the node of the storage device is an internal node.
- 34. A method of determining signal integrity of an electronic system as set forth in claim 32, wherein the node of the storage device is an external node.
- 35. A method of determining signal integrity of an electronic system as set forth in claim 32, wherein signal integrity is determined by measuring the node of the storage device to determine if the storage device has an incorrect state.
- 36. A method of characterizing an electronic system as set forth in claim 32, wherein the method is implemented with computer instructions stored on a computer readable medium which when accessed by a computer cause the computer to perform the method of claim 32.
- 37. An apparatus comprising:
means for simulating operation of a gate driving a storage device, the storage device including a node; and means for characterizing the signal integrity of the electronic system by measuring the node of the storage device to determine a state of the storage device.
- 38. A method of characterizing an electronic system, the electronic system including at least one trace providing a signal to a storage device, the method comprising the steps of:
defining a time period during which noise on the trace will cause the storage device to store incorrect data; and defining device relationships in the electronic system in response to the time period.
- 39. A method of characterizing an electronic system as set forth in claim 38, wherein the signal is a data signal and the trace is a data input to the storage device.
- 40. A method of characterizing an electronic system as set forth in claim 38, wherein the signal is a clock signal and the trace is a clock input to the storage device.
- 41. A method of characterizing an electronic system as set forth in claim 38, wherein the signal is a synchronous control signal and the trace is a synchronous control input to the storage device.
- 42. A method of characterizing an electronic system as set forth in claim 38, wherein the signal is an asynchronous control signal and the trace is an asynchronous control input to the storage device.
- 43. A method of characterizing an electronic system as set forth in claim 38, wherein a data flow failure mechanism is simulated in response to the step of defining the device relationships.
- 44. A method of characterizing an electronic system as set forth in claim 38, wherein a clock failure mechanism is simulated in response to the step of defining the device relationships.
- 45. A method of characterizing an electronic system as set forth in claim 38, wherein simulation of a synchronous control failure mechanism is simulated in response to the step of defining the device relationships.
- 46. A method of characterizing an electronic system as set forth in claim 38, wherein simulation of an asynchronous control failure mechanism is simulated in response to the step of defining the device relationships.
- 47. A method of characterizing an electronic system as set forth in claim 38, wherein the method is implemented with computer instructions stored on a computer readable medium which when accessed by a computer cause the computer to perform the method of claim 38.
- 48. An apparatus comprising:
means for defining a time period during which noise on the trace will cause the storage device to store incorrect data; and means for defining device relationships in the electronic system in response to the time period.
- 49. A method of determining signal integrity in an electronic system comprising the steps of:
defining a storage device including an input; generating a vulnerability table associated with the input of the storage device; generating a vulnerability window associated with the input to the storage device; and defining invalid operation of the electronic system in response to the vulnerability table associated with the storage device and in response to the vulnerability window associated with the input to the storage device.
- 50. A method of determining signal integrity in an electronic system comprising the steps of:
defining a gate driving a storage device, the storage device including a vulnerability window associated therewith; generating a vulnerability table associated with the gate; generating a mapped vulnerability window associated with the gate, the mapped vulnerability window generated in response to the vulnerability window associated with the storage device; and defining invalid operation of the electronic system in response the vulnerability table associated with the gate and in response to the mapped vulnerability window associated with the gate.
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application is related to U.S. application Ser. No. ______ filed ______, which is hereby incorporated by reference in its entirety.