Claims
- 1. A method of determining signal integrity comprising the steps of:
defining a victim vulnerability window; identifying a plurality of critical timing windows in response to defining the victim vulnerability window; and determining signal integrity in response to moving the plurality of critical timing windows relative to the victim vulnerability window.
- 2. A method of determining signal integrity as set forth in claim 1, wherein the victim vulnerability window includes a time period defined by a clock transition minus a setup time minus a recovery time to the clock transition plus the hold time.
- 3. A method of determining signal integrity as set forth in claim 1, wherein the critical timing windows are timing windows, which overlap with the victim vulnerability window.
- 4. A method of determining signal integrity as set forth in claim 1, wherein the step of determining signal integrity is the step of determining cross-coupling.
- 5. A method of determining signal integrity as set forth in claim 1, wherein the step of determining signal integrity further comprises the step of defining a worse case scenario by moving the plurality of critical timing windows relative to the victim vulnerability window.
- 6. A method of determining signal integrity as set forth in claim 1, further comprising the steps of,
generating an abstracted circuit in response to the critical timing windows; and simulating the abstracted circuit.
- 7. A method as set forth in claim 1, wherein a computer readable medium stores computer instructions the computer instructions causing a computer to perform the method of claim 1 when accessed by a computer.
- 8. A system comprising:
means for defining a victim vulnerability window; means for identifying a plurality of critical timing windows in response to defining the victim vulnerability window; and means for determining signal integrity in response to moving the plurality of critical timing windows relative to the victim vulnerability window
- 9. A method of performing simulation comprising the steps of:
determining timing windows in a circuit including traces, each trace connecting driving devices to storage devices; defining a victim vulnerability window; determining critical timing windows in response to the timing windows and in response to the victim vulnerability window; determining aggressor traces in response to the critical timing windows; determining victim traces receiving enough coupling from the aggressor traces; identifying a subset of the storage devices in response to the victim traces; generating an extracted circuit in response to the aggressor traces, in response to the victim traces and in response to the subset of storage devices; generating a worse case scenario in response to the extracted circuit; and simulating the worse case scenario.
- 10. A method of determining a vulnerability window for a storage device including an input, the method comprising the steps of:
defining a clock transition; defining a first boundary of the vulnerability window as the clock transition, minus a setup time for the storage device, minus a recovery time for the input to the storage device; and defining a second boundary of the vulnerability window as the clock transition plus the hold time for the storage device.
- 11. A method as set forth in claim 10, wherein a computer readable medium stores computer instructions the computer instructions causing a computer to perform the method of claim 10 when accessed by a computer.
- 12. An apparatus comprising:
mean for defining a clock transition; means for defining a first boundary of the vulnerability window as the clock transition, minus a setup time for the storage device, minus a recovery time for the input to the storage device; and means for defining a second boundary of the vulnerability window as the clock transition plus the hold time for the storage device.
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application is related to U.S. application Ser. No. ______ filed ______, which is hereby incorporated by reference in its entirety.