[SI-LIST] Re: Where are IBIS models with SSO support ?

  • From: "Chris Cheng" <Chris.Cheng@xxxxxxxx>
  • To: "David Lieby" <dlieby@xxxxxxxxxx>, <si-list@xxxxxxxxxxxxx>
  • Date: Tue, 13 Jan 2009 14:49:39 -0800

Can a behavioral model predict SSO impact? Yes, BTDT over ten years ago.
Can an IBIS 2.x I-V curve be somehow hacked to model SSO? No, BTDT and
proved it can not. Hence there is 4.x model.


-----Original Message-----
From: si-list-bounce@xxxxxxxxxxxxx [mailto:si-list-bounce@xxxxxxxxxxxxx]
On Behalf Of David Lieby
Sent: Tuesday, January 13, 2009 2:27 PM
To: si-list@xxxxxxxxxxxxx
Subject: [SI-LIST] Re: Where are IBIS models with SSO support ?


Several years ago I saw a paper by someone (I have forgotten the name of
the author) that detailed the use of IBIS files in HSPICE to get an idea
of SSO in a system.  The system is set up to use the current output and
timing from the IBIS file, along with some extrapolation for cross
current, to get a result of the current usage of a switching output.
Then
several of them are fed from a power bus with a feed that is set up to
look like several adjacent power/ground connections to the board.

Yes, there are a lot of people who are taken aback by this approach.  On
the other hand, once you go through the exercise and calibrate the
results
across at least one existing system (lab measurements, ghastly), you
have
something that is within 10 percent of what you really will see when the
system is built.  It does take time and no one else will do the work or
figure out what you really want.

I kept a whole group of hardware engineers happy with this approach and
the results with real systems.

Cheers,
dav0
David Lieby

Confidentiality Notice.
This message may contain information that is confidential or otherwise
protected from disclosure. If you are not the intended recipient, you
are
hereby notified that any use, disclosure, dissemination, distribution,
or
copying  of this message, or any attachments, is strictly prohibited.
If
you have received this message in error, please advise the sender by
reply
e-mail, and delete the message and any attachments.  Thank you.

------------------------------------------------------------------
To unsubscribe from si-list:
si-list-request@xxxxxxxxxxxxx with 'unsubscribe' in the Subject field

or to administer your membership from a web page, go to:
//www.freelists.org/webpage/si-list

For help:
si-list-request@xxxxxxxxxxxxx with 'help' in the Subject field


List technical documents are available at:
                http://www.si-list.net

List archives are viewable at:
                //www.freelists.org/archives/si-list
or at our remote archives:
                http://groups.yahoo.com/group/si-list/messages
Old (prior to June 6, 2001) list archives are viewable at:
                http://www.qsl.net/wb6tpu




This email and any attachments thereto may contain private, confidential, and 
privileged material for the sole use of the intended recipient. Any review, 
copying, or distribution of this email (or any attachments) by others is 
strictly prohibited. If you are not the intended recipient, please contact the 
sender immediately and permanently delete the original and any copies of this 
email and any attachments thereto.
------------------------------------------------------------------
To unsubscribe from si-list:
si-list-request@xxxxxxxxxxxxx with 'unsubscribe' in the Subject field

or to administer your membership from a web page, go to:
//www.freelists.org/webpage/si-list

For help:
si-list-request@xxxxxxxxxxxxx with 'help' in the Subject field


List technical documents are available at:
                http://www.si-list.net

List archives are viewable at:     
                //www.freelists.org/archives/si-list
or at our remote archives:
                http://groups.yahoo.com/group/si-list/messages
Old (prior to June 6, 2001) list archives are viewable at:
                http://www.qsl.net/wb6tpu
  

Other related posts: