当前位置:网站首页>Model analysis of establishment time and holding time
Model analysis of establishment time and holding time
2022-07-06 00:23:00 【Silly boy: CPU】
Build time and hold time model analysis
The starting point is the source trigger D1 Sampling time of , The destination is the destination trigger D2 Sampling time of , It is assumed that the starting point has met the requirements of establishment time and holding time , Now analyze whether the end-point sampling time also meets the requirements .
among
- Tco: The data is sampled correctly from D End arrival Q The delay of the end , Trigger intrinsic properties , It can't be changed .
- TDelay:D1 Output to D2 Combinational logic delay and wiring delay at the input .
- Tsu: Trigger setup time , Inherent properties of triggers , It can't be changed .
- Th: Hold time of trigger , Inherent properties of triggers , It can't be changed .
- Tclk: Clock cycle .
- t1: Assume that the source clock is clka,clka arrive D1 Time delay of .
- t2:clka arrive D2 Time delay of .
The behavior of triggers : Sampling data when the clock edge arrives D, Deposit the collected data , And output to the Q End , All if no new clock comes along , be Q The output of the terminal is always the last sampled data , Every clock edge , Sample the data once D.
hypothesis clk There is no delay in transmission : Then the rising edge of each clock will arrive at the same time D1 and D2. The beginning of time , The first clock edge D1 Sampling time of , The end of time , The second clock edge D2 Sampling time of . Physical starting point ,D1 The input end of the , Physical end point ,D2 The input end of the .
Set up time to meet ( Focus on data headers ): When the first clock comes , data data From the starting point ① Start transmitting , after Tco arrive ②, after TDelay
边栏推荐
- Determinant learning notes (I)
- Intranet Security Learning (V) -- domain horizontal: SPN & RDP & Cobalt strike
- [noi simulation] Anaid's tree (Mobius inversion, exponential generating function, Ehrlich sieve, virtual tree)
- How to use the flutter framework to develop and run small programs
- About the slmgr command
- There is no network after configuring the agent by capturing packets with Fiddler mobile phones
- FFT learning notes (I think it is detailed)
- Codeforces gr19 D (think more about why the first-hand value range is 100, JLS yyds)
- notepad++正则表达式替换字符串
- 【EI会议分享】2022年第三届智能制造与自动化前沿国际会议(CFIMA 2022)
猜你喜欢
剖面测量之提取剖面数据
Problems encountered in the database
AtCoder Beginner Contest 254【VP记录】
Room cannot create an SQLite connection to verify the queries
Basic introduction and source code analysis of webrtc threads
MDK debug时设置数据实时更新
Browser local storage
[designmode] composite mode
【EI会议分享】2022年第三届智能制造与自动化前沿国际会议(CFIMA 2022)
Hardware and interface learning summary
随机推荐
多线程与高并发(8)—— 从CountDownLatch总结AQS共享锁(三周年打卡)
Extension and application of timestamp
STM32 configuration after chip replacement and possible errors
Global and Chinese market of valve institutions 2022-2028: Research Report on technology, participants, trends, market size and share
Permission problem: source bash_ profile permission denied
LeetCode 1598. Folder operation log collector
Gavin teacher's perception of transformer live class - rasa project actual combat e-commerce retail customer service intelligent business dialogue robot system behavior analysis and project summary (4
Atcoder beginer contest 254 [VP record]
Ffmpeg learning - core module
What is information security? What is included? What is the difference with network security?
An understanding of & array names
Uniapp development, packaged as H5 and deployed to the server
FFMPEG关键结构体——AVFormatContext
Pointer - character pointer
SQLServer连接数据库读取中文乱码问题解决
How to solve the problems caused by the import process of ecology9.0
7.5 装饰器
Browser local storage
Transport layer protocol ----- UDP protocol
Leetcode 450 deleting nodes in a binary search tree