Académique Documents
Professionnel Documents
Culture Documents
Contents
Introduction to Physical Design- Layout
ASIC Construction : Floorplanning, Placement &
Routing ;
Physical verification: DRC, LVS
Basics of Digital CMOS Design
2 of X
Confidential
Design Entry
Simulation
Functional Verification
Synthesizer
Synthesis
ASIC Specific
Flow
DFT
Verification Formal Verification
Layout
Layout Editor
PAR
Physical VerificationPhysical Verification
Post-PAR Verification
Simulation
Fabrication
Bit-Format
3 of X
Verification
Confidential
4 of X
Confidential
Foundry
(Fabricator)
TSMC,
UMC,
Faraday, etc
Chip
GDS = Graphic Database System
Its the de facto industry standard for data exchange of IC layout artwork.
5 of X
CoreEl confidential
Transistors
Drain
Gate Drain
Source
Width
Gate
Source
Length
a) Circuit Symbol
Minimum Length=2
b) Physical Realization
Drain
Ron
Gate
Source
Bulk
Gate
Drain Width=4
Cgate
Cdrain
Csource
Source
d) Simple RC Model
c) Layout View
6 of X
Confidential
7 of X
Confidential
8 of X
Confidential
Comparison
General definition
module mux1( select, d, q );
input[1:0] select;
input[3:0] d;
output q;
wire
q;
wire[1:0] select;
wire[3:0] d;
assign q = d[select];
endmodule
9 of X
Synthesized Code
// Verilog description for cell mux1,
// LeonardoSpectrum Level 3,
2010a.7
Confidential
Design Kit
Digital Design Kit
10 of X
Confidential
Standard Cells
11 of X
Confidential
12 of X
Confidential
Floorplan
The input to a floorplanning tool is a hierarchical netlist that
describes the interconnection of the blocks
The goals of floorplanning are to:
arrange the blocks on a chip,
decide the location of the I/O pads,
decide the location and number of the power pads,
decide the type of power distribution, and
decide the location and type of clock distribution
13 of X
Confidential
Placement
The goal of a placement tool is to arrange all the logic cells
within the flexible blocks on a chip
Goals:
Guarantee the router can complete the routing step
Minimize all the critical net delays
Make the chip as dense as possible
14 of X
Confidential
Placement Algorithms
Two Types of Algorithms used:
Min-cut algorithm
Eigenvalue method
Pairwise-interchange algorithm
15 of X
Confidential
Algorithms
Min-Cut Algorithm
Cut the placement area into two pieces.
Swap the logic cells to minimize the cut cost.
Repeat the process from step 1, cutting smaller pieces
until all the logic cells are placed.
16 of X
Confidential
Routing
Process of placing and connecting signal and power
paths between the standard cells or blocks
17 of X
Confidential
General Routing
Two phases:
18 of X
Confidential
Detailed Routing
The detailed router decides the exact location and
layers for each interconnect.
19 of X
Confidential
Special Routing
Clock Routing :
Uses Higher metal Layer (has less resistance & capacitance )
Power Routing:
20 of X
Confidential
Design Entry
Simulation
Functional Verification
Synthesizer
Synthesis
ASIC Specific
Flow
DFT
Verification Formal Verification
Layout
Layout Editor
PAR
Physical VerificationPhysical Verification
Post-PAR Verification
Simulation
Fabrication
Bit-Format
21 of X
Verification
Confidential
References
Application Specific Integrated Circuits-- By Smith Pearson Publication
http://iroi.seu.edu.cn/books/asics/asics.htm#anchor11320
Physical design essentials: an ASIC design implementation perspective- By Khosrow Golshan Springer Publication
Algorithms for VLSI Design Automation-- By Gerez Wiley India Edition
VLSI physical design automation: theory and practice By Sadiq M. Sait,
Habib Youssef World Scientific.
Introduction to Place and Route Design in Vlsis-- By Patrick Lee
CMOS: Circuit Design, Layout, and Simulation-- By R. Jacob Baker
22 of X
Confidential
23 of X
Confidential
Confidential
DRC Errors
oxide
Internal
Width:
INT oxide <=3
Overlap:
INT Oxide poly <=3
poly
Internal: Width
External
EXT oxide <=2
EXT oxide poly <= 2
External
Internal: Overlap
Enclosure
ENC poly oxide < 2
Enclosure
Extension
ENC oxide poly < 2
25 of X
Confidential
Design View
RESET
Design Architect
Composer
Layout View
G
S
DESIGNrev
Connectivity
Extraction
Virtuoso
StreamView
Device
Extraction
Schematic
Compilation
HDL
Compilation
COMPARISON
PHASE
LAYOUT NETLIST
26 of X
VERIFICATION
RESULTS
Confidential
SOURCE NETLIST
27 of X
Confidential
28 of X
Confidential
Device
// Device Statement
DEVICE MN NGATE POLY NSD NSD PWELL [0]
ELEMENT = MN
NET Y
M2
G
S
LAYER PWELL
LAYER OXIDE
LAYER POLY
LAYER NPLUS
PAREA
NGATE
NOX
NSD
29 of X
1
2
4
5
Confidential
Parasitic Extraction
Extracts the parasitic values of each interconnect, via, and
contact that will be on the silicon wafer
Confidential
Layout
GDSII
Source
netlist
Hcell list
(optional)
Netlist extraction
Calibre LVS-H
Comparison
Extraction
report
Extracted
netlist
Fix layout
errors
31 of X
LVS
report
svdb
Confidential
References
Physical design essentials: an ASIC design implementation
perspective-- By Khosrow Golshan Springer Publication
http://www.mentor.com/products/ic_nanometer_design/verifi
cation-signoff/physical-verification/
IC mask design: essential layout techniques-- by
Christopher Saint, Judy Saint
CMOS: Circuit Design, Layout, and Simulation-- By R.
Jacob Baker
32 of X
Confidential
33 of X
Confidential
Complementary CMOS
Complementary CMOS logic gates
nMOS pull-down network
pMOS pull-up network
a.k.a. static CMOS
pMOS
pull-up
network
inputs
output
Pull-up OFF
Pull-up ON
Pull-down ON
X (crowbar)
34 of X
Confidential
nMOS
pull-down
network
nMOS: 1 = ON
pMOS: 0 = ON
Series: both must be ON
Parallel: either can be ON
a
g1
g2
1
b
OFF
ON
(b)
a
g2
(c)
a
g1
g2
b
(d)
ON
OFF
OFF
OFF
Confidential
b
OFF
35 of X
b
OFF
g1
(a)
g2
g1
OFF
ON
ON
ON
ON
ON
ON
OFF
Conduction Complement
Complementary CMOS gates always produce 0 or 1
Ex: NAND gate
Series nMOS: Y=0 when both inputs are 1
Thus Y=1 when either input is 0
Y
Requires parallel pMOS
A
36 of X
Confidential
Compound Gates
Compound gates can do any inverting function
Ex:
Y = A B + C D (AND-AND-OR-INVERT, AOI22)
A
(a)
(b)
B C
(c)
(d)
A
B
C
D
Y
A
(f)
(e)
37 of X
Confidential
Signal Strength
Strength of signal
How close it approximates ideal voltage source
38 of X
Confidential
As source goes from 0V 5V, VGS goes from 5V 0V.
When VS > 4.3V, then VGS < VT, so switch stops
conducting.
VD left at 5V - VT = 5V - 0.7V = 4.3V or Vdd - VT.
39 of X
Confidential
Pass Transistors
Transistors can be used as switches
g=0
g
s
Input g = 1 Output
0
strong 0
g=1
s
d
g=0
g
s
g=1
Input
d
g=1
s
40 of X
Confidential
degraded 1
g=0
Output
degraded 0
g=0
strong 1
Transmission Gates
Pass transistors produce degraded outputs
Transmission gates pass both 0 and 1 well
41 of X
Confidential
Transmission Gates
Pass transistors produce degraded outputs
Transmission gates pass both 0 and 1 well
Input
g
a
b
gb
b
gb
42 of X
g = 0, gb = 1
a
b
g = 1, gb = 0
0
strong 0
g = 1, gb = 0
a
b
g = 1, gb = 0
strong 1
1
g
a
g
b
gb
Output
b
gb
Confidential
CMOS Inverter
N Well
VDD
VDD
PMOS
Contacts
PMOS
In
Out
In
Out
Metal 1
Polysilicon
NMOS
NMOS
GND
43 of X
Confidential
PMOS
Vin = 0
Vin = 2.5
Vin = 0.5
Vin = 2
Vin = 1
NMOS
Vin = 1.5
Vin = 1.5
Vin = 1
Vin = 1.5
Vin = 1
Vin = 2
Vin = 0.5
Vin = 2.5
Vin = 0
Vout
44 of X
Confidential
2.5
Vout
NMOS s at
PMOS res
1.5
NMOS sat
PMOS sat
0.5
NMOS res
PMOS sat
0.5
45 of X
1.5
Confidential
NMOS res
PMOS off
2.5
Vin
Switching Characteristics
Define:
Rise time tr = time required for a node to charge from the 10% point to 90% point
Fall time tf = time required for a node to discharge from 90% to 10% point
Delay time td = delay from the 50% point on the input to the 50% point on the
output
Falling delay tdf = delay time with output falling
Rising delay tdr = delay time with output rising
46 of X
Confidential
Noise Margin
Noise margin = voltage difference between output of one
gate and input of next. Noise must exceed noise margin to
make second gate produce wrong output.
47 of X
Confidential
Inverter Sizing
Confidential
Logic Gate
Confidential
50 of X
Confidential
Relative
Transistor
Widths
1
Inverter
Input Cap = 3 units
L.E.=1 (definition)
51 of X
4
(2n+1)/3
(n+2)/3
2
NAND
Input Cap = 4 units
L.E.=4/3
Confidential
4
1
NOR
Input Cap = 5 units
L.E.=5/3
Logic Blocks
F = AB(C+D)
Confidential
CMOS Buffer
output
High Z
High Z
53 of X
54 of X
Confidential
Static CMOS
Characteristics
At every point in time, each gate output is connected to either Vdd or Vss via a
low-resistance path
It have rail-to-rail swing , no static power dissipation
Speed depends on the transistor sizing and parasitic that are involved with it.
Disadvantage
The problem with this type of implementation is that for N fan-in gate 2N
number of transistors are required, ie, more area required to implement logic.
This has an impact on the capacitance and thus the speed of the gate.
55 of X
Confidential
Dynamic CMOS
Characteristics
Dynamic CMOS circuits rely on the temporary storage of signal values on the
capacitance of high-impedance circuit nodes.
no static power dissipation.
Disadvantage
the need for repeated charging and discharging even when the inputs do not
change their state.
56 of X
Confidential
Pseudo NMOS
Characteristics
The advantage of pseudo-NMOS logic are its high speed and low transistor
count.
Disadvantage
Static power consumption of the pull-up transistor as well as the reduced
output voltage swing and gain, which makes the gate more susceptible to
noise.
57 of X
Confidential
Characteristics
The advantages of pass-transistor logic are
the simple design, the reuse of already
available signals.
Low contribution to static power.
Disadvantage
Output levels can be no higher than the input
level
58 of X
Confidential
References
CMOS: Circuit Design, Layout, and Simulation-- By R. Jacob Baker
CMOS Digital Integrated Circuits-- By Sung-Mo Kang, Yusuf Leblebici
CMOS logic circuit design-- By John Paul Uyemura
Cmos Vlsi Design: A Circuits And Systems Perspective, 3/E-- By Weste,
Weste Neil H.E.
Douglas A. Pucknell and Kamran Eshraghian, Basic VLSI Design, Third
Edition
http://www.iue.tuwien.ac.at/phd/schrom/node93.html
59 of X
Confidential
Thank You
upt@coreel.com
60 of X
Confidential