Removing False Paths from Combinational Modules

نویسندگان

  • Yuji Kukimoto
  • Robert K. Brayton
چکیده

The existence of false paths complicates the task of accurate timing analysis significantly. A technique to remove false paths from a combinational circuit without degrading its performance has a practical value since topological timing analysis is then good enough to estimate the performance of false-path-free circuits accurately. One can think of the KMS algorithm [1] as such a procedure. It takes a combinational circuit and arrival times at its primary inputs, and returns an equivalent irredundant circuit no slower than the original. One major problem is that it only guarantees the performance of the final circuit under the given arrival times; under different arrival time conditions the transformed circuit can be slower than the original. We propose a technique to remove false paths from a combinational module without slowing down the circuit under any arrival time condition. The procedure is particularly useful in the context of hierarchical synthesis. For example, if the same module is used more than once, the master module can be made false-path-free once and for all without affecting the performance of any instance. Even if a module is used only once, the procedure removes false paths safely without any knowledge on arrival times at the primary inputs. This makes it possible to synthesize the module before the surrounding design is fixed. We also show that the final redundancy removal of the KMS algorithm can slow down a circuit if the delay of the circuit is computed separately for each input pattern. Since replacing the original circuit with the irredundant one in a hierarchical circuit can worsen the delay of the entire circuit, redundancy removal is dropped to guarantee the delay-preserving property.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Delay Characterization of Combinational Modules1

We address three related issues on timing characterization of combinational modules. We first introduce a new notion called timing safe-replaceability as a way of comparing the timing characteristics of two combinational modules formally. This notion allows us to determine whether a new module is a safe replacement of an original module in terms of timing under any surrounding environment. Seco...

متن کامل

Hierarchical Timing Analysis under the XBD0 Model

We propose a hierarchical timing analysis technique applicable to the XBD0 delay model, which is the underlying model for floating mode analysis and viability analysis. Given a hierarchical combinational circuit, the timing property of each leaf module is characterized first. Since this timing characterization step takes into account false paths in each module, a timing model constructed is mor...

متن کامل

Delay Characterization of Combinational Modules by Functional Arrival Time Analysis

A combinational module is a combinational circuit that can be used under any arrival time condition. In 8] we showed that exact false-path-aware delay characterization of a com-binational module can be reduced to functional required time analysis 6] of the module. This reduction makes it possible to detect false paths of a combinational module without assuming any speciic arrival time condition...

متن کامل

False Path Analysis in Sequential Circuits

We propose a formulation of the sensitization constraints that must be satisfied by all true paths in a sequential circuit and suggest a number of approximations to these constraints aimed at simplifying their computation while capturing their essential dependencies. Using one of these approximations we show how an existing combinational timing analysis tool, can be easily augmented to identify...

متن کامل

TimingCamouflage: Improving Circuit Security against Counterfeiting by Unconventional Timing

With recent advances in reverse engineering, attackers can reconstruct a netlist to counterfeit chips by opening the die and scanning all layers of original chips. This relatively easy counterfeiting is made possible by the use of the standard simple clocking scheme where all combinational blocks function within one clock period. In this paper, we propose a method to invalidate the assumption t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997