Simultaneous switching noise analysis

ABSTRACT

A method for determining an impact of simultaneous switching noise (SSN) for a linearly based metric is provided. The method includes generating a waveform representing an impact of SSN from a rising aggressor for each of at least two victim pins associated with the metric and generating a waveform representing an impact of SSN from a falling aggressor for each of at least two victim pins associated with the metric. The waveforms from the rising aggressor are collapsed into a single waveform for the rising aggressor and the waveforms from the falling aggressor are collapsed into a single waveform for the falling aggressor. The single waveform for the rising aggressor and the single waveform for the falling aggressor are merged into a merged waveform. Through a computing device, switching window SSN analysis of the circuit design is performed with a common uncertainty removal utilizing the merged waveform.

CLAIM OF PRIORITY

This application is a continuation-in-part of prior U.S. application Ser. No. 12/034,400, filed Feb. 20, 2008, now U.S. Pat. No. 7,983,880 and prior U.S. application Ser. No. 12/137,407, filed Jun. 11, 2008. The disclosures of each of these prior applications are incorporated herein by reference.

BACKGROUND

It is a difficult task to verify that a system design, under the influence of simultaneous switching noise (SSN), meets a required noise margin. Existing simulation techniques can be used to predict the magnitude of a noise event caused by a given set of aggressor signals on a victim pin, but these techniques do not address how to determine the set of aggressors or how to interpret the resulting noise. The naïve approach of assuming all possible pins are aggressors, and that any noise spikes that cross into the switching region of an input buffer is a failure, presents too many false failures.

Examples of where the naïve approach predicts failures, when none are seen in practice, are PCI (Peripheral Component Interconnect) and DDR (Double data rate) buses. Both of these buses incorporate high drive strength output buffers which are capable of inducing significant amounts of SSN voltage noise. These buses function properly because aggressors and victims are synchronously aligned. This alignment guarantees that the noise event occurs when the bus signals are switching and the receiver is not sampling. Under this condition, a violation of the input threshold, due to noise, is not a real failure.

With regard to differential pins, existing techniques for SSN analysis are unable to analyze differential victim pins, as the worst case aggressor pattern for single ended pins is not the worst case aggressor pattern for differential pins. Thus, SSN analysis for differential pins is largely ignored.

It is in this context that embodiments of the invention arise.

SUMMARY

Methods for determining induced noise on a given victim by an aggressor signal pattern for differential pins and for identifying the worst case aggressor switching pattern time alignment that causes the worst case victim noise for a differential pin are presented.

In one embodiment, a method for analyzing simultaneous switching noise (SSN) in a circuit design tool is provided. The method includes selecting a metric and executing simulations based on a circuit design for a plurality of victim-aggressor combinations associated with the metric. Multiple waveforms are generated for each one of the victim-aggressor combinations and the multiple waveforms are collapsed to a single waveform for each one of the victim-aggressor combination. A worst case waveform is identified from the single waveform for each one of the victim-aggressor combinations and the circuit design with the worst case waveform is simulated through a computing device.

In another embodiment, a method to analyze a timing impact of simultaneous switching noise (SSN) on a differential pair in a circuit design tool is provided. The method includes generating a first victim noise waveform for the differential pair based on an aggressor rising pattern and generating a second victim noise waveform for the differential pair based on an aggressor falling pattern. The first noise waveform is combined with a quiet victim switching waveform to form a first differential mode voltage waveform and the second noise waveform is combined with the quiet victim switching waveform to form a second differential mode voltage waveform. The first and the second differential mode voltage waveforms into a profile waveform, which is then utilized for simulating the circuit design while considering an impact of the SSN.

In yet another embodiment, a method for determining an impact of simultaneous switching noise (SSN) for a linearly based metric is provided. The method includes generating a waveform representing an impact of SSN from a rising aggressor for each of at least two victim pins associated with the metric and generating a waveform representing an impact of SSN from a falling aggressor for each of at least two victim pins associated with the metric. The waveforms from the rising aggressor are collapsed into a single waveform for the rising aggressor and the waveforms from the falling aggressor are collapsed into a single waveform for the falling aggressor. The single waveform for the rising aggressor and the single waveform for the falling aggressor are merged into a merged waveform. Through a computing device, switching window SSN analysis of the circuit design is performed with a common uncertainty removal utilizing the merged waveform.

It should be appreciated that the present invention can be implemented in numerous ways, such as a process, an apparatus, a system, a device or a method on a computer readable medium. Several inventive embodiments of the present invention are described below.

Other aspects of the invention will become apparent from the following detailed description, taken in conjunction with the accompanying drawings, illustrating by way of example the principles of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention may best be understood by reference to the following description taken in conjunction with the accompanying drawings in which:

FIG. 1 illustrates the use of timing windows to estimate worst case aggressor timing alignment in accordance with one embodiment of the invention.

FIG. 2 shows a sample timing forest with two independent clock domains in accordance with one embodiment of the invention.

FIG. 3 illustrates the creation of a noise profile waveform in accordance to one embodiment of the invention.

FIG. 4 shows pictorially the process of propagating back waveform profiles according to one embodiment.

FIG. 5 describes the process of collapsing the timing forest in accordance with one embodiment of the invention.

FIG. 6 illustrates one embodiment to propagate delays forward in the timing tree.

FIG. 7 depicts a case of worst-case noise alignment for three aggressor pins in accordance with one embodiment of the invention.

FIG. 8 depicts one embodiment of the invention for estimating timing noise using switching windows analysis.

FIG. 9 illustrates the process flow for removing circuit analysis pessimism related to SSN in a circuit design tool, in accordance with one embodiment of the invention.

FIG. 10 is a flowchart diagram illustrating the method operations for extending simultaneous switching noise (SSN) analysis in a circuit design tool to any metric that is a linear combination of voltage waveforms in accordance with one embodiment of the invention.

FIG. 11 is a simplified schematic diagram of a computer system for implementing embodiments of the present invention.

FIG. 12 is graphical representation of calculated SSN for the pins of an electronic component according to one embodiment.

DETAILED DESCRIPTION

Methods and systems to extend simultaneous switching noise (SSN) analysis in a circuit design tool to any metric that is a linear combination of voltage waveforms are provided. It will be obvious to one skilled in the art, that the present invention may be practiced without some or all of these specific details. In other instances, well known process operations have not been described in detail in order not to unnecessarily obscure the present invention.

In one embodiment, the linear combination of voltage waveforms is a differential voltage. In this embodiment, the method determines the voltage noise waveforms for the victim pins of interest for both rising and falling aggressor cases, i.e., as the aggressor(s) switches from a low to high value or from a high to low value, respectively. Where there are multiple victim pin waveforms for both, or either one of the rising and falling aggressor cases, the multiple victim waveforms are merged into two metric of interest waveforms, one for a rising aggressor and one for a falling aggressor, through the linear combination definition of the metric. For example, with a differential voltage the definition may be illustrated as: differential voltage=Vpositive−Vnegative. The separate rising and falling aggressor waveforms are combined into one waveform by performing a min or max operation between the two waveforms depending on if the goal is to maximize or minimize the metric of interest. One skilled in the art will appreciate that where the maximum is goal, then a max operation is executed. Alternatively, if the goal is minimize the metric of intertest, then a minimum operation is executed. The merged profile waveform is annotated onto the aggressor leaf node and the merging process continues as described in U.S. application Ser. No. 12/137,407, which has been incorporated herein by reference.

Simultaneous switching noise (SSN) is defined as a noise voltage induced onto a single victim I/O pin of an electronic component due to the switching behavior of other aggressor I/O pins in the device. This voltage noise can cause device operation failures either by violating input voltage thresholds or by changing delays such that timing is no longer met. The design of reliable electronic systems requires that SSN be effectively managed.

In general, SSN is a very difficult problem to accurately analyze. There are many different parameters that can affect the magnitude of SSN noise, many of which can be difficult to determine. The problem is even more difficult when it is considered in the context of field-programmable gate arrays (FPGA). Unlike an application-specific integrated circuit (ASIC), that has a fix pin-out and fixed pin functionality, an FPGA is a customizable device for which the user has the flexibility to select the pin-out, I/O buffer configurations, as well as the I/O timing and functional relationships. Yet another level of complexity is added when the SSN is considered for other than single ended pins, e.g., differential signaling.

Differential signaling is a technique that utilizes two wires that are typically closely coupled together. Conceptually these wires can be though as two separate wires which carry the complement signal to the other. For example, if one wire, referred to as WireP, is driven high then the other wire, referred to as WireN, is driven low. A differential receiver listens to both wires, computes the voltage, which is equal to WireP−WireN, and maps this to a binary value of 1 or 0 depending if the sum is greater than or less than zero.

Differential signaling has a number of benefits, but the one most relevant to SSN analysis is the property of common mode noise immunity. Ignoring physical implementation limitations, it is easy to see that any amount of noise that is equally applied to both WireP and WireN will have no effect on the receiver. The reason for this is illustrated below:

Quiet voltages:

-   -   WireP=Vlow WireN=Vhigh     -   Receiver voltage=WireP−WireN         -   =Vlow−Vhigh

Common mode voltage noise

-   -   WireP=Vlow+Vnoise WireN=Vhigh+Vnoise     -   Reciever voltage=WireP−WireN         -   =Vlow+Vnoise−Vhigh−Vnoise         -   =Vlow−Vhigh             This example clearly shows the theoretical common mode             immunity inherent in differential signaling. One thing to             note is that while differential signaling is ideally immune             to common mode noise it is still susceptible to differential             noise.

Existing solutions for analyzing FPGA SSN typically involve reducing the underlying model complexity by making a number of simplifying assumptions. These assumptions trade off analysis accuracy for ease of use. The simplifications are usually made in such a way that the results of the simplified analysis are more pessimistic than the results from an ideal analysis. The idea being that if a design is found to work, given a pessimistic analysis, then the same design will work even better given the better performance of the actual FPGA. The down side of this approach is that the pessimistic analysis can report SSN failures that would not actually be failures on real devices.

One of the most common simplifying assumptions for SSN modeling relates to the identification of what set of switching aggressors causes the worst case SSN noise to be induced on a given victim pin. The most pessimistic approximation is to assume that every pin, besides the output, switches at the same time. In practice this is not always the case, due to physical timing and circuit functionality relationships.

Another common assumption is that any noise event that causes a victim pin to cross into the switching region of a receiver should be flagged as a failure, but this is not always the case. Glitches can occur outside of the sampling window of a receiver. Typically these noise events are caused by aggressors that are synchronously related to the victim. These noise events can affect the switching time of a victim but are not generally considered as an input threshold violation failure.

The amount SSN noise induced on a victim pin depends on the number of aggressors and their switching behavior. For single ended pins it is more straight forward to show that the worst case aggressor pattern is all aggressors switching in the same direction. For inductively dominant coupling this pattern is all aggressors switching low to high, to determine the maximum induced voltage drop, and all aggressors switching high to low, to determine the maximum induced voltage spike. For differential pins this pattern will result in the worst case common mode noise but will not represent the worst case differential noise.

In general the worst case aggressor pattern for generating differential noise will require some fraction of aggressors to switch in a given direction while the other pins switch in the opposite direction. The specific aggressor pattern is dependent on the amount of coupling aggressors and victim pins. The embodiments described herein present a general technique for determining aggressor switching patterns.

It should be appreciated that there are 8 types of SSN analysis results that are relevant to differential signals:

Maximum positive common mode voltage noise on a quiet victim

Maximum negative common mode voltage noise on a quiet victim

Maximum positive differential noise voltage on a quiet low victim

Maximum negative differential noise voltage on a quiet high victim

Maximum timing push-out on a switching low→high differential victim

Maximum timing pull-in on a switching low→high differential victim

Maximum timing push-out on a switching high→low differential victim

Maximum timing pull-in on a switching high→low differential victim

In addition there are also two separate types of aggressor constraints:

Known fixed aggressor switching time

Constrained aggressor switching windows

The embodiments described herein may be integrated into any suitable electronic design automation tool, such as the QUARTUS™ tool owned by the assignee. As mentioned above, the techniques described herein extend the SSN analysis described in U.S. application Ser. Nos. 12/034,400 and 12/137,407. A brief synopsis of the information detailed in those applications is provided below prior to the detailed explanation of the extension to linear combinations of waveforms.

The above referenced applications presented methods for removing the two assumptions mentioned previously by considering physical timing and circuit functionality relationships when performing SSN analysis and by filtering the result through the use of victim sensitivity window information. The resulting analysis using the disclosed techniques is less pessimistic than one in which these assumptions are not made.

Switching window techniques are commonly used for reducing pessimism when analyzing on-die cross talk. Published methods fall into two major categories. The first category relates to the problems where the desire is to the find switching time of aggressor buffers such that the noise pulse or timing noise is maximized. The second category of published work relating to reducing pessimism using switching window analysis involves the more difficult form of cross-talk aware timing analysis. This problem is significantly different than the first category of work because it deals with multiple layers of logic and interconnects. The complexity of the problem arises from the fact that the switching window and cross talk problem is coupled because cross talk can change timing and the amount of cross talk is in turn dependent on the timing of the aggressors.

Existing solutions for using timing windows to reduce cross talk estimation pessimism typically make the assumption that the system can be approximated as a linear time invariant (LTI) system. Under this approximation the worst case peak noise considering globally referenced switching windows can be found very easily.

FIG. 1 illustrates the use of timing windows to estimate worst case aggressor timing alignment in accordance with one embodiment of the invention. For each aggressor, a simulation is performed with only that aggressor switching while other aggressors are held quiet. The resulting victim noise waveform is represented in the simulation column of FIG. 1. Using the switching window for each aggressor, W₁ for A1, and W₂ for A2, an expanded profile waveform is created by sweeping the simulation waveform across the switching window. Mathematically this operation can be described as: f _(sweep)(t)=max(f(t−t _(sweep)) for t _(sweep) between delay_(min) and delay_(max)) Where f(t) is the simulation waveform and f_(sweep)(t) is the profile waveform. The resulting profile waveforms are then summed together. The maximum value of the summed waveform is equal to the worst case induced noise, assuming the LTI assumption holds.

The exact switching times are determined by identifying the time at which the peak noise event occurs in the summed waveform, and then finding for each aggressor the switching time that is within the specified switching window and maximizes the noise value at the time identified previously.

In one embodiment, a method for determining the worst case SSN induced voltage noise and worst case timing noise is presented. The method uses switching window analysis to reduce cross talk pessimism and performs several operations geared to handle I/O specific problems. In particular, the methodology has been extended to deal with common path pessimism, source synchronous victim sensitivity windows, unrelated clock domains, physical circuit enforced constraints, and the ability to determine worst case timing noise instead of just worst case voltage noise.

The method uses several inputs in one embodiment. The method provides for determining the worst case peak SSN induce voltage noise and the worst case SSN induced timing push-out or pull-in by assuming the SSN model is close to being linear time invariant, or in other words, the SSN model behaves linearly. The methodology accounts for many common sources of pessimism. In particular, the methodology utilizes the following information to avoid much of the pessimism caused by ignoring timing and functional constraints related to a circuit's physical structure: a timing forest, common output enable signal constraints, exclusive output enable signal constraints, and exclusive activity signal constraints. The timing forest, or set of trees, contains min-max (minimum and maximum) output timing path information for each aggressor and min-max sensitivity window information for each victim.

The purpose of the timing forest input is to encapsulate aggressor output timing and victim sensitivity window timing in a form suitable for later use. FIG. 2 illustrates a sample timing forest with two independent clock domains. The timing forest shown in FIG. 2 is just one example of a timing structure that can be used in the different embodiments of this invention, however different structures can also be used with this invention.

In FIG. 2, there is one tree for each unrelated clock in a design. Related clocks live in the same tree and share a common time reference point. R₀ and R₁ are root nodes for two timing trees and act as the time reference points for each tree. I is an internal node where the timing path diverges. A, B, C, E and F are output buffer nodes that may be aggressor pins and D is a differential pin that may be a victim in one embodiment, as illustrated with reference to FIG. 4. It should be noted that the timing graph has the shape of a tree because I/Os typically do not have re-convergent paths. As described below, D may represent a differential pair having complementary signal lines in one embodiment. FIG. 2 additionally illustrates the rising and falling edges for buffer nodes A, B, C, E, and F, where there is 0 delay for the edges in the embodiment where D represents a differential pair.

Each edge of the graph of FIG. 2 is annotated with a minimum and a maximum delay and the edges for the final column being annotated with no delay. The switching window time of a leaf node is determined by adding the delays from the root to the leaf node. For example, node C has a switching window of [2-4 ns]. The internal nodes enable common path pessimism removal because the sharing of the clock signal is explicitly specified.

Input buffer leaf nodes require additional sensitivity information to allow for proper result filtering. The input buffer nodes are annotated with the required setup (T_(su)) and hold times (T_(h)) relative to the arrival time of the node itself. In one embodiment, the graph is constructed by combining conventional timing analysis techniques with user specifiable constraints providing any missing input T_(su) and T_(h) delays.

There are two types of output enable signal constraints: common output enable groups and intergroup exclusion relationships. The common output enable group specifies that a set of I/O pins share a common output enable signal, meaning that all pins in the group act as inputs, outputs, or tristated outputs at the same time. The second constraint, intergroup exclusion relationships, specifies that two output enable groups are prevented from both being enabled at the same time. This can result from physical properties of a given circuit, such as the enable signals being complemented versions of each other, or because of more complicated circuit state relationships.

Constraints relating to the output enable relationships can either be specified manually or automatically extracted from a netlist using existing netlist traversal algorithms. Most output enable group constraints can be found by identifying output enable signals driven by the same net. More advanced netlist examination can find further common output enables by recognizing that different nets are logically equivalent. For example, an output enable signal might be buffered to account for high fan out resulting in multiple output enable net names that are all logically equivalent. Finally, there can be multiple output enable signals that are not logically identical but are always active at the same time due to circuit design. These types of relationships are difficult to find automatically but can be specified manually or extracted from functional simulations.

Similarly, the intergroup exclusion relationship constraints can be specified manually or automatically extracted from a netlist. Existing netlist traversal algorithms are used to determine basic exclusion relationships, such as two output enable group signals being complemented versions of each other. More complicated circuit functionality relationships are hard to automatically extract and can be specified manually.

The method also uses pin activity signal constraints in one embodiment. A simple form of a circuit enforced output switching constraint is the constraint that two outputs can not be actively switching at the same time. This type of constraint is an activity exclusion constraint. The activity exclusion constraint is similar to the intergroup exclusion constraint for output enable signals but instead indicates that if one pin is actively toggling then the other pin must be driving a constant value. The only difference is that the underlying SSN noise model can generate different noise results for pins that are tristated versus pins that are outputs but driving a quiet voltage. This type of constraint can be automatically extracted from a netlist using existing netlist traversal techniques or specified manually. Typically, the activity exclusion constraints can be generated by considering circuit state information or flip-flop enable signal logic, however, other sources of information can also be used.

There are two primary stages of the SSN analysis methodology. In one embodiment, the first stage uses both the output enable and switching activity constraints to cull out some physically impossible victim-aggressor combinations. This first stage is followed by the application of the switching window SSN analysis with common uncertainty removal algorithm. The method is first described for determining maximum voltage noise with some comments regarding timing noise analysis. Determining maximum timing noise requires a modification to the voltage noise method and is described following the voltage noise method.

In the first stage, the impossible victim-aggressor combinations are culled. Depending on the type of SSN analysis being performed, voltage noise or timing noise, it is often possible to cull pins from the aggressor list by using the physical circuit derived constraints. The following operations are used to cull potential aggressors:

-   -   1. Select a victim pin of interest.     -   2. Create a candidate aggressor list with every pin in the         design except the victim pin.     -   3. If the victim pin is bi-directional and is configured as an         input, cull any aggressors in the candidate list that belong to         the same output enable group.     -   4. If the victim pin is configured as an output, cull any         aggressors in the candidate list that have an intergroup         exclusion constraint relating the victim pin output enable group         to the aggressor pin output enable group.     -   5. If the victim pin is an output and a timing noise analysis is         being performed, then cull any pins that have a switching         activity exclusion constraint.

Operation 3 captures the physical fact that it is impossible to have two pins with a common enable signal acting as one input and one output. Operation 4 captures the opposite fact, that is, if the victim and potential aggressor pins are prohibited from both being outputs at the same time, then the aggressor can never be an output when the victim is an output. Operation 5 captures the fact that in a noise analysis the victim pin is transitioning, meaning that any potential aggressor with an exclusion activity constraint can not be switching at the same time.

There are other restrictions on which pairs of aggressors can be active at any time but the selection of which potential aggressor to select depends on the amount of noise the aggressor can induce. These types of restrictions are applied as part of the switching window analysis algorithm.

In stage two, the switching window SSN analysis with common uncertainty removal is performed. The core algorithm takes into account timing pessimism, sensitivity windows, and pair-wise constraints. The general idea is to create a profile noise waveform such that the noise value at any time point is equal to the worst possible value caused by the a worst case aggressor switching alignment for that time point. The profile waveform can be used to identify the worst possible noise value and time which can then be worked backwards to determine the alignment that caused this value. In the extension described herein, the profile waveform is determined through an additional collapsing stage as discussed in more detail below.

FIG. 3 illustrates the creation of a noise profile waveform in accordance to one embodiment of the invention. In a simple case where there is one aggressor and one victim, the waveform on the left represents the noise induced on the victim pin due to the switching of the aggressor. The switching window column indicates that the aggressor is free to switch at any time during the period t_(sw). This switching time freedom can be expressed by overlaying every possible switching time waveform and taking the maximum value at any time. This is represented as the waveform sweep process, where every waveform alignment is considered, and the maximum values of the waveforms are used to create a profile waveform. It should be clear that the profile waveform does not represent the physical shape of any one waveform but rather only indicates the maximum amount of possible noise at any given time. It can not be used to determine noise for more than a single point at a time. With regard to the linear based metric, e.g., a differential pair, the waveform sweep process is applied to the profile waveform generated from the complementary pairs of the differential signaling technique.

The switching window analyses and techniques operate on the timing forest structure. As the analyses progress, multiple waveforms or input timing relationships numbers are stored on the nodes. Eventually, a single profile waveform that comprises all possible valid aggressor alignments filtered by all possible sensitivity windows is produced. The worst case noise number can be extracted from this profile waveform and the process reversed to determine the alignment that caused this value.

The method for creating the worst case profile waveform according to one embodiment begins with dividing the set of aggressors into individual sets, such that each set has aggressors that are compatible with each other and also have the same exclusive relationships as each other for pins outside of the set. This is because output enable and switching activity exclusion constraints between pins prevent many possible aggressor combinations.

The method continues by processing every leaf node in the timing forest. First, if the node is an aggressor output, then a simulation of that aggressor is performed, with all other aggressors held quiet, and the resulting waveform on the node is annotated, tagging the waveform with an indication of which exclusion set the aggressor belongs to. Second, if the node is an input then the node is annotated with the proper T_(su) and T_(h) values that will be used later for sensitivity window culling.

In the next operation, the method works from the leaf nodes towards the root nodes calculating the worst possible noise profile waveform considering how the delay uncertainty of an edge smears a child's noise waveform. Starting at each leaf node, the forest is traversed towards the root such that each internal node is processed only after all of its children are processed. The edge delay uncertainties between the node of interest and the children nodes are applied. If the child node contains waveforms, then each waveform is swept using the connected edge's min-max delay numbers, and if the child node contains sensitivity window numbers, then the waveforms are modified using the connected edge's min-max delay numbers.

As each node is processed, decisions must be made on how to collapse the various smeared child waveforms. The collapsing of waveforms with constraints can not occur at internal nodes because it is not known yet how the waveforms should be combined.

The results from the previous operation are annotated on the node being processed as follows: if the child contains only sensitivity window information then annotate the adjusted sensitivity numbers on the node being processed; if the children contain only waveforms, then merge them by summing any swept waveforms that are tagged with the same exclusion set id and annotate the summed waveforms on the node being processed (there can be multiple waveforms on both the children nodes and annotated on the node being processed); and if there are both a sensitivity window child and waveform children then sum the waveforms as above and then set any portion of the waveform that falls outside of the sensitivity window to zero. The resulting waveforms are annotated on the node being processed and also annotate the sensitivity window information for later use. For differential signaling, the profile waveform generated through the merging of a particular rising aggressor pattern and a falling aggressor pattern, each of which are simulated for both pins of the differential signal, is annotated on the node.

At this point each root node in the forest has one or more profile waveforms. Except for the case of exclusion relationships that cross unrelated clock boundaries, the waveforms can be further reduced. The constraint relationships restrict the set of valid I/O aggressor states possible. In the following operations, the optimal set of I/O aggressor states is determined while still respecting the relationship constraints.

Exclusive relationships are implemented by picking one exclusion set out of a group of exclusion sets. The first move in reducing the waveforms annotated on the root nodes is to identify each unique group of exclusion sets, where each group contains a number of exclusion sets for which only one may be selected. For each group within each tree in the forest, all exclusion sets are collapsed down to one waveform per unique group if possible, by taking the maximum value of all exclusions set in the group that only have member pins within the tree being processed, at each time instance. It should be noted that collapsing must not cross tree boundaries at this point. Taking the maximum value is used to collapse exclusion sets because it is known that only one set of pins can be active, while the others are not active. Every possible time must be observed to find the maximum noise possible from every set within the exclusion constraint. This results in a profile waveform indicating the maximum amount of noise possible at a given time when it is possible to select any one active group of pins.

Also for each group, sum together any waveform without exclusion relationships or reduced group waveforms that do not cross a tree boundary. At this point, each root node should have at most one profile waveform with no exclusion relationships and optionally a number of profile waveforms with exclusion relationships that cross tree boundaries. At this point, every valid combination of exclusion relations across tree boundaries must be enumerated and tested.

Typically there will not be very many exclusion relationships that cross tree boundaries so enumeration is a viable methodology. If too many exclusion relationships exist for efficient implementation using all possible combinations, other sub-optimal heuristics can be used while still remaining pessimistic. The active exclusion sets for each trial set are then collapsed. For each tree, a profile waveform is created by adding all waveforms remaining on the root node, ignoring those waveforms explicitly restricted by the enumeration and testing process.

Each root node now has one waveform. Using the fact that there are no phase relationships between different trees, there is freedom to choose any arbitrary alignment such that the noise is maximized. This is accomplished by finding the maximum noise for each tree individually and aligning the trees such that the maximums of each waveform are aligned. The sum of the maximums is the maximum amount of noise for the specified enumeration or trial test. Overall, the maximum amount of possible noise is equal to the maximum noise value from the entire enumeration process.

At this point, the method has calculated the worst case amount of noise present and the time at which the noise occurs, referenced to some root node. Additionally, the worst case relative alignment of signals with unrelated clocks is also known, and which exclusive sets that cross unrelated clock boundaries cause worst case noise. Next, it must be determined which exclusive sets are active for sets that do not cross unrelated clock boundaries. The maximum amount of noise at this point is known, but it is not known which active sets produced the noise as this information was lost when performing the maximum collapsing operation.

To obtain which active sets produced the maximum noise, each group of exclusive pin sets are examined for each tree root node. It is known that one set from each group is active while the others are inactive. Given that the time that the worst case noise event happens is known, each candidate set can be examined to find out the worst case noise that each set can induce at the given worst-case time. This information is contained within the profile waveforms of the children of the root node. Once each exclusive set is examined, the exclusive set that has the most noise is chosen and all other exclusive sets within the group are ignored. Once all exclusive set decisions are known, each node is processed in the forest and the waveforms are collapsed such that each node has only one profile waveform. Some nodes might end up with no waveforms if the nodes are aggressors, or only feed aggressors, that are not active.

The worst case switching time can then be extracted from the forest by traversing the tree starting at the root and replacing each edge minimum or maximum delay with a single delay number that represents the worst case alignment of aggressor pins. At this point, the magnitude of the worst case noise is known but not the aggressor time alignment that caused this noise. This information was lost when the time smearing of waveforms was performed, and the retrieval of this information is discussed below.

In general, unrelated clocks are represented as disconnected trees in a forest. Now that the relative alignment of unrelated clocks that causes the worst case alignment has been determined, a new common root node is created annotating the edges between individual trees root nodes and the common root node with the delay necessary to represent the previously identified worst case alignment. During the following traversal, the time that the worst case noise event occurs referenced to the node being processed time base is tracked. Initially, the time of the worst case noise peak from the final profile waveform is known. As edges in the timing graph are traversed, the method moves forward in time and must adjust the noise event's time accordingly.

For each node, the children of the node are examined in turn, replacing the connecting edge delay with a single number such that the noise at the locally reference peak noise time is maximal. Once each node has been processed, the switching time of any aggressor can be determined by the sum of the edge weights from the root node to the aggressor node.

The previously described method can be better understood via an illustrative example. FIG. 2 shows an example timing forest for a design with five outputs and one input. It can be seen that the design has two different unrelated clock domains, represented by root nodes R₀ and R₁. Within the related domains of R₀, IIOs A-D share a common piece of path uncertainty (the edge from R₀ to I). The tree in FIG. 2 will be used in an example to find the worst case aggressor alignment for noise on input D. In the embodiments described below I/O D is a differential signaling buffer that may function according to any known differential signaling standard, such as the low voltage differential signaling (LVDS) standard.

Initially, the victim noise waveforms for each aggressor are simulated. FIG. 4 pictorially illustrates the process of propagating back waveform profiles according to one embodiment. Column (a′) illustrates exemplary rising edge and falling edge waveform patterns that may be simulated for aggressor pins A-C and F on differential pin D in one embodiment of the invention. As mentioned above, a rising edge and falling edge pattern may be applied to or simulated for each of the differential pins in column (a′). Then, the victim noise waveforms for the rising and falling aggressors generate aggressor patterns and ultimately a worst case noise pattern. The differential mode voltage wave forms are combined into the profile waveform in column (a). Additional details for the processing illustrated between column (a′) and column (a) is provided below. Column (a) in FIG. 4 shows the profile waveforms generated by combining simulated waveforms of column (a′). As illustrated, the waveforms are swept across the connected edge delay window and a profile waveform is created. Since the maximum noise magnitude is being searched, the maximum profile waveform is taken, as shown in column (b) of FIG. 4. The input sensitivity window information is also propagated up the tree and adjusted according to the edge uncertainty.

The method continues by propagating back the profile waveforms towards the root taking care to keep the different exclusion sets separate. Column (c) in FIG. 4 shows the waveforms stored on node I. Node I has four children, three aggressor children and one sensitivity window child. The waveforms in column (b) are then added together at the corresponding node in column (c). It can be seen that the aggressor children belong to two exclusion sets. The waveforms for these sets are kept separate. The result of the addition is the two waveforms above node I. The method further includes filtering the summated waveforms with the input sensitivity window. In this case, the setup and hold time requirements are −1 ns and 3 ns relative to node I's time base. The profile waveforms are forced to zero outside of this sensitivity window. The sensitivity window is also annotated on node I for later use.

Column (d) in FIG. 4 shows the uncertainty sweep process again and column (e) shows the back propagation process for node R0. At this stage, the waveforms due to the cross unrelated domain exclusive set S2 can not be further collapsed and the options must be enumerated to be tested separately.

The methods for analyzing single-ended voltage and timing noise under SSN conditions using superposition and switching window techniques are extended to differential techniques as provided herein. It should be appreciated that the single-ended techniques of the above referenced applications are a specific case of a more general method that could be applied to either single-ended or differential types of pins. The following subsections provide a higher-level general methodology for analyzing SSN while providing details for the particular usage required to analyzing differential noise.

To apply a similar methodology to differential pins it is necessary to extend the single ended methodologies to: (a) calculate a different metric of interest (differential voltage, etc) and (b) to determine the worst case aggressor pattern that maximizes the amount of noise for a given metric. Described below is a technique to handle more general cases than just single ended noise. A description of how to apply the general techniques to differential I/O analysis is also provided.

Typical SSN analysis techniques rely on prior knowledge of how aggressors affect single ended victim pins. In general it is not always possible to identify the worst case aggressor pattern prior to performing the analysis. Through the embodiments described herein switching window techniques are extended while assuming nothing about aggressor switching directions and the embodiments may be used to both determine the metric of interest and the worst case aggressor pattern impacting the metric of interest.

The method described in application Ser. No. 12/137,407 utilized profile waveforms to determine the maximum or minimum amount of noise induced. At each stage of the process these profile waveforms are combined together using various mathematical operations e.g., add, maximum, clip. Once combined into a single profile waveform the metric of interest can be extracted and the time of occurrence is determined. Through the use of this identified time the mathematical operations used to generate the profile waveforms are unrolled and the individual switching times of each aggressor determined.

It should be appreciated that instead of assuming a fixed aggressor switching direction and generating a victim noise waveform the process is extended to perform two separate simulations, e.g., a rising edge and a falling edge, to create two different victim noise waveforms. These waveforms are combined using either a minimum or maximum function, depending on the metric being considered, and the rest of the profile collapsing process continues as described herein. Further details on the combining are provided with reference to FIG. 10.

The unrolling process is similar to that described in application Ser. No. 12/137,407 with the additional method operation of determination of which switching direction caused the worst case noise. The embodiments provide for unrolling the profile waveforms until only the rising and falling noise waveforms remain. These two waveforms (rising and falling waveforms) can be unrolled by examining each separate waveform at the time where noise is maximized (or minimized) and selecting whichever aggressor pattern induces the maximum (or minimum) amount of noise. In the present embodiments, linear superposition is being utilized and rather than looking at a single pin, the embodiments described herein look at the simulation of aggressors on a differential buffer to obtain the noise waveforms on the positive and negative pins for the differential signaling.

As mentioned in above, there are at least 8 SSN related metrics of interest for differential pins including: common mode noise, differential noise and timing push-out/pull-in. Discussed below are three techniques that provide the details of how to use the generalization described above to predict each of the three types of metrics.

Common mode voltage for a differential pin is defined as the average voltage of the positive and negative pins referenced to a common ground as follows:

Positive pin voltage: Vp Negative pin voltage: Vn Common mode voltage: 0.5 × Vp + 0.5 × Vn Since this metric is a linear combination of voltages, the techniques described above can be applied. An outline of the method is as follows:

-   -   For a quiet pair of victim pins driving either a differential         high or low signal consider each aggressor in turn     -   For each aggressor determine the low→high and high→low voltage         noise waveforms for the pair of victim pins     -   Combine the victim waveforms determined from each aggressor into         a single profile waveform as follows:         -   For the low→high transition calculate the common mode             voltage waveform by calculating the average of the positive             and negative pin voltage waveforms         -   Do the same for the high→low transition waveforms         -   Combine the two calculated common mode voltage waveforms             into a single profile waveform by taking the maximum or             minimum voltage, depending on if the goal is to find the             maximum or minimum common mode noise, at each time point     -   Continue the switching window profile waveform collapsing         technique with regard to FIG. 4-9

Differential mode voltage for a differential pin is defined as the voltage difference between the positive and negative pins. For example:

Positive pin voltage: Vp Negative pin voltage: Vn Differential voltage: Vp − Vn Since this metric is a linear combination of voltages, the techniques described above can be applied. An outline of the method is as follows:

-   -   For a quiet pair of victim pins driving either a differential         high or low signal consider each aggressor in turn     -   For each aggressor determine the low→high and high→low voltage         noise waveforms for the pair of victim pins     -   Combine the victim waveforms determined from each aggressor into         a single profile waveform as follows:         -   For the low→high transition calculate the differential mode             voltage waveform by calculating the difference between the             positive and negative pin voltage waveforms.         -   Do the same for the high→low transition waveforms         -   Combine the two calculated differential mode voltage             waveforms into a single profile waveform by taking the             maximum or minimum voltage, depending on if the goal is to             find the maximum or minimum common mode noise, at each time             point     -   Continue the switching window profile waveform collapsing         technique with regard to FIG. 4-9

The manner in which timing is defined for differential signals is different from that of single ended signals. For single ended signals, voltages are referenced to a global reference. For these signals timing is defined in relation to when the single ended voltage crosses a specified voltage relative to the goal reference.

For differential signals, there are two pins which allow for the definition of a voltage without the need for a global reference. This voltage is the previously described differential voltage and is the difference between the positive and negative pin voltages. For a differential signal, timing is defined in relation to when the differential voltage crosses the zero voltage threshold.

The differential definition of timing can be transformed into the framework used by single ended signals by calculating the differential voltage, using the linear combination described previously and in the incorporated references, and then using this waveform as if the waveform was a single ended voltage waveform with a switching threshold of 0 volts. The general outline of this technique is as follows:

-   -   For a given victim switching direction, low→high or high→low         consider each aggressor in turn     -   For the given victim pin determine the switching voltage         waveform for the case of quiet aggressors     -   For each aggressor determine the low→high and high→low voltage         noise waveforms for the pair of victim pins     -   Combine the victim waveforms, determined from an aggressor and         the initial quiet switching waveform, into a single profile         waveform as follows:         -   For the low→high transition aggressor waveforms calculate             the differential mode voltage waveform by calculating the             difference between the positive and negative pin voltage             waveforms.         -   Do the same for the high→low transition waveforms         -   Combine the two calculated differential mode voltage             waveforms into a single profile waveform by taking the             maximum or minimum voltage, depending on if the goal is to             find the pull-in or push-out.         -   Add or subtract the profile waveform to the differential             switching victim waveform depending on if the goal is to             find the maximum pull-in or push-out     -   Continue the switching window profile waveform collapsing         technique with regard to FIG. 4-9

FIG. 5 describes the process of collapsing the timing forest. There are two enumerated cases: ‘use set 1’ and ‘use set 2’. It can be seen that in set 1 only tree R0 is active. For set 2, both trees have noise waveforms. The final collapsing phase for ‘use set 2’ requires that the maximum values of each profile waveform be aligned. In this case, it can be seen that a 0 phase shift between profile waveforms will result in the maximum noise value of 3 v. In this simple example, both set 1 and set 2 options produce the same amount of peak noise so there is freedom to pick either one.

At this point, it is known that the maximum amount of noise is 3 v and the method continues by figuring out which switching aggressor time causes this maximum amount of noise. From the profile waveform for ‘use set 1,’ it is observed that the maximum noise occurs at 4 ns. The timing tree must now be traversed in the forward direction assigning actual delays for each edge. FIG. 6 shows the remaining nodes in the timing tree that have active aggressors.

The forward traversal process initially looks at the root node. The question to be answered is, which edge delay causes the maximum value of each child profile waveform to be located at 4 ns? In this case, the answer is lns because the peak of the child profile happens at 3 ns. Then node I is processed, and must change the maximum noise time to be reference to node I, by subtracting the edge delay between R₀ and Ito give 3 ns.

Then, each child node of I is examined in turn and the edge delays are set to maximize the voltage at 3 ns. The result is that the worst case edge delays are 1 ns for outputs A and B and 2 ns for output C. FIG. 7 shows how adding together the switching time waveforms results in a waveform that has 3 v noise, as expected.

The person skilled in the art will appreciate that the methods previously described for calculating worst induced voltage on a victim pin can be extended to the analysis of timing induced noise. Timing delays are defined as starting and ending at a specific voltage reference level. SSN noise can induce noise on a transitioning signal such that the signal either crosses the reference voltage earlier or later than if the noise was not present. In one embodiment, the methodology previously described for induced voltage noise is modified to support the determination of worst case timing noise.

FIG. 8 depicts one embodiment of the invention for estimating timing noise using switching windows analysis. FIG. 8 illustrates how the switching window method described above can be modified to support timing noise. The example has two output pins, one aggressor and one differential. The first case, on top of FIG. 8, has a positive noise aggressor that would be expected to constructively interfere with the differential pin. The second case of FIG. 8 has a negative noise aggressor that should destructively interfere with the differential pin. The method annotates an output switching waveform on the victim and performs the same algorithm to generate a profile waveform on the root node as in the case of determining voltage noise previously discussed.

The bottom of FIG. 8 shows three overlaid profile waveforms, a nominal profile, a positive noise profile and a negative noiseprofile. It is important to note that these are profile waveforms and not actual signal transition waveforms. The information that can be extracted is that for each time point, the worst possible voltage noise is equal to the value of the profile waveform. Conveniently, the timing problem is only concerned about how early or how late the first or last crossing of the timing reference threshold is, i.e., what is the earliest and what is the latest time for crossing the threshold with reference to the differential signaling embodiment. It should be appreciated that the profile waveforms can be used to directly read both the early and latest timing references.

In the case of the negative noise profile, it can be seen that noise is negative in sign rather than the typical positive sign used in most examples. This must be taken into consideration when determining the profile waveform. The sweeping process takes the minimum voltage and not the maximum voltage as below. In one embodiment, the victim output might have some switching variations not already encapsulated in the timing graph. For example transistor process models or temperature might change the expected nominal timing switching waveform. This can be handled by ensuring that the even phase aggressor case uses the fastest victim buffer transition waveform and that the odd phase aggressor case uses the slowest victim buffer transition waveform. The process of determining the worst case alignment is similar to the method for determining maximum voltage noise as mentioned above. One difference is that the time that the timing threshold is crossed is selected as the time to propagate forward through the graph rather than the time of the maximum amount of noise

FIG. 9 shows the process flow for removing circuit analysis pessimism related to SSN in a circuit design tool, in accordance with one embodiment of the invention. In operation 602, the physically impossible combinations of victim-aggressor input/output (I/O) pins in a circuit design are determined. In one embodiment, the output enable groups and the intergroup exclusion constraints are used to determine the physically impossible combinations. Then, the physically impossible combinations are culled out a list of possible victim-aggressor combinations in operation 604. By reducing the number of aggressors, the pessimism is reduced with respect to the victim pin whose worst noise case is being calculated.

In operation 606, a switching window SSN analysis of the circuit design with a common uncertainty removal algorithm is performed. The switching window analysis takes into consideration the list of possible victim-aggressor combinations that was culled out in operation 604. In one embodiment, an example is provided in FIG. 4 depicting the process for switching window SSN analysis. The extension of the methodology as described with reference to FIG. 10 includes a merging process for the rising and falling edges as applied to the victim pins.

Once the timing tree is populated with the switching window analysis, the maximum voltage noise induced on I/O pins of the circuit design is determined in operation 608. FIG. 5 shows an example on how to calculate the maximum induced voltage noise on a victim pin. Additionally, FIG. 6 illustrates how to traverse the tree from the root to the leaf nodes to determine the alignment of induced noise from the different leaf nodes that cause the maximum induced voltage noise.

After the maximum induced noise is calculated the results can be presented to the user in operation 610. The results can be presented in a variety of forms, such as giving a graphical representation of noise in a computer display as seen in FIG. 12, generating a printout, creating a file with the results, sending an email to the user, etc.

FIG. 10 is a flowchart diagram illustrating the method operations for extending simultaneous switching noise (SSN) analysis in a circuit design tool to any metric that is a linear combination of voltage waveforms in accordance with one embodiment of the invention. It should be appreciated that the method operations of FIG. 10 further expand operations 606 and 608 of FIG. 9 for the generalized scheme discussed herein. The method initiates with operation 650 where a specific metric of interest for a linear combination of voltages is selected. In one embodiment, the linear combination is a differential signaling scheme. The method then proceeds to operation 660 where a simulation is performed to generate the waveform from which the metric can be ultimately determined. With reference to differential signaling, the metric may be represented as Vp−Vn and the waveform as a rising or falling aggressor. In one embodiment, a plurality of waveforms for different patterns or combinations of rising and/or falling aggressors is provided. The method then advances to operation 680 where the plurality of waveforms for the rising aggressors are collapsed to a single waveform for the rising aggressor and the plurality of waveforms for the falling aggressors are collapsed to a single waveform for the falling aggressor for a max and a min condition. Thus, there are two sets of waveforms (a single waveform for the rising aggressor and a single waveform for the falling aggressor for the max condition and another for the min condition). Depending on whether a max or min function is being pursued, the maximum voltage or the minimum voltage across the two differential pins are collapsed to a single profile waveform in operation 680. In operation 690 the single profile waveform is collapsed back and the switching window analysis is performed as described with reference to FIGS. 4-9. The switching window analysis and collapsing includes unrolling back to the stage where the rising and falling waveforms are merged. Accordingly, the unrolling is performed one more time than the previous referenced applications to determine if the rising aggressor simulation or the falling aggressor simulation caused the max or min.

FIG. 11 is a simplified schematic diagram of computer system 700 for implementing embodiments of the present invention. It should be appreciated that the methods described herein may be performed with a digital processing system, such as a conventional, general-purpose computer system. Special purpose computers, which are designed or programmed to perform only one function may be used in the alternative. In addition, the computer system of FIG. 10 may be used to calculate SSN. The computer system includes a central processing unit (CPU) 704, which is coupled through bus 710 to random access memory (RAM) 706, read-only memory (ROM) 712, and mass storage device 714. SSN simulation program 708 resides in random access memory (RAM) 706, but can also reside in mass storage 714. SSN simulation program may embody executable code that when executed through CPU 704 performs the functionality associated with applying the SSN analysis in a circuit design tool to any metric that is a linear combination of voltage waveforms, e.g., to differential pins.

Mass storage device 714 represents a persistent data storage device such as a floppy disc drive or a fixed disc drive, which may be local or remote. SSN simulation model 716 resides in mass storage device 714, but can also reside in RAM 706 during processing. Model 716 may contain circuit models for SSN calculations. It should be appreciated that CPU 704 may be embodied in a general-purpose processor, a special purpose processor, or a specially programmed logic device. Display 718 is in communication with CPU 704, RAM 706, ROM 712, and mass storage device 714, through bus 710 and display interface 720. Of course, display 718 is configured to display the user interfaces described herein. Keyboard 722, cursor control 724, and input/output interface 726 are coupled to bus 710 in order to communicate information in command selections to CPU 704. It should be appreciated that data to and from external devices may be communicated through input output interface 726.

FIG. 12 is graphical representation of calculated SSN for the pins of an electronic component according to one embodiment. In this embodiment, a matrix representation of the different I/O pins on the device shows the level of noise at different pins by using different colors and shading intensity. In this example, SSN is more intense on the pins in the top right corner, thereby suggesting a relocation of some of these I/O pins to different physical locations in the electronic component to decrease the interference of aggressor pins. This representation is shown as way of example, but other representations are possible using different layouts, icons, colors, shadings, etc., as long as the functionality described herein is maintained. The representation can be shown on a monitor for a user.

Embodiments of the present invention may be practiced with various computer system configurations including hand-held devices, microprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers and the like. The invention can also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a wire-based or wireless network.

Any of the operations described herein that form part of the invention are useful machine operations. The invention also relates to a device or an apparatus for performing these operations. The apparatus can be specially constructed for the required purpose, or the apparatus can be a general-purpose computer selectively activated or configured by a computer program stored in the computer. In particular, various general-purpose machines can be used with computer programs written in accordance with the teachings herein, or it may be more convenient to construct a more specialized apparatus to perform the required operations.

The embodiments, described herein may be employed with any integrated circuit, such as processors and programmable logic devices (PLDs). Exemplary PLDs include but are not limited to a programmable array logic (PAL), programmable logic arrays (PLAs), field programmable logic arrays (FPLAs), electrically programmable logic devices (EPLDs), electrically erasable programmable logic devices (EEPLDs), logic cell arrays (LCAs), field programmable gate arrays (FPGAs), application specific standard product (ASSPs), application specific integrated circuit (ASICs), just to name a few.

The programmable logic device described herein may be part of a data processing system that includes one or more of the following components; a processor; memory; I/O circuitry; and peripheral devices. The data processing system can be used in a wide variety of applications, such as computer networking, data networking, instrumentation, video processing, digital signal processing, or any suitable other application where the advantage of using programmable or re-programmable logic is desirable. The programmable logic device can be used to perform a variety of different logic functions. For example, the programmable logic device can be configured as a processor or controller that works in cooperation with a system processor. The programmable logic device may also be used as an arbiter for arbitrating access to a shared resource in the data processing system. In yet another example, the programmable logic device can be configured as an interface between a processor and one of the other components in the system. In one embodiment, the programmable logic device may be the STRATIXR II GX devices owned by the assignee.

Although the method operations were described in a specific order, it should be understood that other housekeeping operations may be performed in between operations, or operations may be adjusted so that they occur at slightly different times, or may be distributed in a system which allows the occurrence of the processing operations at various intervals associated with the processing, as long as the processing of the overlay operations are performed in the desired way.

Although the foregoing invention has been described in some detail for purposes of clarity of understanding, it will be apparent that certain changes and modifications can be practiced within the scope of the appended claims. Accordingly, the present embodiments are to be considered as illustrative and not restrictive, and the invention is not to be limited to the details given herein, but may be modified within the scope and equivalents of the appended claims. 

What is claimed is:
 1. A method for analyzing simultaneous switching noise (SSN) in a circuit design tool, comprising: selecting a metric; executing simulations based on a circuit design for a plurality of victim-aggressor combinations associated with the metric; generating multiple waveforms for each one of the victim-aggressor combinations; collapsing the multiple waveforms to a plurality of single profile waveforms, one profile waveform being generated for each one of the victim-aggressor combinations, wherein the collapsing incorporates one of a minimum for each relevant one of the multiple waveforms at each time point or a maximum for each relevant one of the multiple waveforms at each time point, for the single profile waveform; identifying a worst case profile waveform from the plurality of single profile waveforms; simulating the circuit design with the worst case profile waveform; performing switching window SSN analysis of the circuit design with a common uncertainty removal utilizing one of the single profile waveforms, wherein the performing comprises: processing leaf nodes of a timing forest containing one or more timing trees, wherein each link between a child node and the child node's parent includes delay information, the delay information including minimum and maximum delays; determining one of a maximum voltage noise or a minimum voltage noise induced on the victim, wherein at least one method operation is executed through a processor.
 2. The method of claim 1, further comprising: determining physically impossible combinations of victim-aggressor combinations in the circuit design; and eliminating the physically impossible combinations.
 3. The method of claim 1, wherein the metric is a differential voltage.
 4. The method of claim 1, wherein each one of the multiple waveforms for one of the victim pin aggressor pin combinations includes at least one rising aggressor waveform and at least one falling aggressor waveform.
 5. The method of claim 4, wherein the at least one rising waveform and the at least one falling waveform are collapsed to the single profile waveform.
 6. The method of claim 1, wherein the processing comprises: if the leaf node is an aggressor output, performing a simulation for the leaf node with all other aggressors held quiet, annotating a resulting victim pin waveform from the simulation at the leaf node with an indication of which exclusion set the leaf node belongs to, if the leaf node is the victim and is an input, annotating the leaf node with a sensitivity window, the sensitivity window including setup and hold time values; and traversing the timing forest from the leaf nodes to the timing trees root nodes.
 7. The method of claim 6, wherein the traversing of a given node comprises: sweeping waveforms in every child node of the given node containing waveforms using the delay information in the link between the given node and the child, calculating sensitivity windows at the given node according to the delay information in the link between the given node and the child node for each child node of the given node containing a sensitivity window, calculating exclusion set waveforms at the given node by summing any swept waveforms for children nodes of the given node having the same exclusion set, annotating on the given node any swept waveforms that have not been summed during the calculation of exclusion set waveforms, and setting any portions of the waveforms at the given node that fall outside of the calculated sensitivity windows to zero when the given node has at least one child with sensitivity windows and at least one child with waveforms.
 8. The method as recited in claim 7 further including, enumerating a list of trial cases by creating all possible waveform combinations of the remaining waveforms at the root nodes, creating a profile waveform at each root node by adding all waveforms at each root node in the trial case, aligning the maximums of the profile waveforms from all the root nodes; and calculating the maximum trial noise by adding the maximums of the aligned profile waveforms.
 9. The method as recited in claim 8 further including determining the worst case switching time, the determining the worst case switching time including, creating a new common root as a predecessor of all root nodes; annotating a delay on edges to the new common root such that the alignment of waveforms at the new common root causes the maximum voltage noise; traversing a resulting tree starting at the common root node; annotating edge delays at the link between a parent node and a child node to make the maximum noise of the profile waveform at the child node correspond to the time of maximum noise, the annotated edge delays constrained by the minimum and maximum delays of the link; adjusting the profile waveform at each node according to the annotated edge delays; and calculating a switching time for any aggressor pin that results in maximum noise at the selected victim pin caused by all the aggressor pins by adding all annotated edge delays from the timing tree root node to the any aggressor pin node.
 10. A method to analyze a timing impact of simultaneous switching noise (SSN) on a differential pair in a circuit design tool, comprising: generating a first victim noise waveform for the differential pair based on an aggressor rising pattern; generating a second victim noise waveform for the differential pair based on an aggressor falling pattern; and combining the first and the second victim noise waveforms into a single profile waveform for the differential pair, wherein at least one method operation is executed through a processor; wherein combining the first and the second differential mode voltage waveforms further comprises: basing the combining on a maximum voltage noise to find timing pull in; and basing the combining on a minimum voltage noise to find timing push out.
 11. The method of claim 10, further comprising: adding the profile waveform to the quiet victim switching waveform to determine a maximum pull in.
 12. The method of claim 10, further comprising: subtracting the profile waveform from the quiet victim switching waveform to determine a maximum push out.
 13. The method of claim 10, wherein the differential pair supports a low voltage differential signaling (LVDS) standard.
 14. A method for determining an impact of simultaneous switching noise (SSN) for a linearly based metric, comprising: generating a waveform representing an impact of SSN from a rising aggressor for each of at least two victim pins associated with the metric; generating a waveform representing an impact of SSN from a falling aggressor for each of at least two victim pins associated with the metric; collapsing the waveforms from the rising aggressor into a single waveform for the rising aggressor; collapsing the waveforms from the falling aggressor into a single waveform for the falling aggressor; merging the single waveform for the rising aggressor and the single waveform for the falling aggressor into a merged waveform; and performing switching window SSN analysis of the circuit design with a common uncertainty removal utilizing the merged waveform, wherein at least one method operation is executed through a processor.
 15. The method of claim 14, wherein the metric is a linear combination of voltages.
 16. The method of claim 14, wherein the merging incorporates one of a minimum or a maximum at each time point for the merged waveform.
 17. The method of claim 14 wherein the metric is one of a common mode voltage or a differential voltage.
 18. The method of claim 17, wherein the differential voltage is a voltage difference between a positive pin and a negative pin, and wherein the common mode voltage is an average voltage of the positive and negative pins. 