Digital VLSI Design: T.Rajeswari (IN1729) Anusha G (IN1727)
Digital VLSI Design: T.Rajeswari (IN1729) Anusha G (IN1727)
T.Rajeswari (IN1729)
Anusha G (IN1727)
1 Confidential
©2022 The information in this document is the property of Quest Global Services Private Limited and may not be disclosed in any manner to a third party nor used for any purpose other than that for which it is supplied without prior written consent.
Introduction
2 Confidential
Outline of the course:
Motivation
Building a chip
The integrated circuit – 1964 The intel 4004, 2300 transistors – 1971 Intel 486DX2 1.2M transistors-1992
4 Confidential
Features of Core i7-6950X
5 Confidential
Moore’s law
It is the observation that the number of transistors in a dense integrated circuit (IC) doubles
about every two years.Moore's law is an observation and projection of a historical trend.
6 Confidential
The observation is named after Gordon Moore, the co-founder of Fairchild Semiconductor and
Intel (and former CEO of the latter), who in 1965 posited a doubling every year in the number of
components per integrated circuit,[a] and projected this rate of growth would continue for at least
another decade.
Moore's prediction has been used in the semiconductor industry to guide long-term planning and
to set targets for research and development, thus functioning to some extent as a self-fulfilling
prophecy.
Advancements in digital electronics, such as the reduction in quality-adjusted microprocessor
prices, the increase in memory capacity (RAM and flash), the improvement of sensors, and even
the number and size of pixels in digital cameras, are strongly linked to Moore's law. These
ongoing changes in digital electronics have been a driving force of technological and social
change, productivity, and economic growth.
Industry experts have not reached a consensus on exactly when Moore's law will cease to apply.
Microprocessor architects report that semiconductor advancement has slowed industry-wide
since around 2010, slightly below the pace predicted by Moore's law.
7 Confidential
Theoretical system on a chip
Here is the block diagram:
8 Confidential
Design Abstraction:
If we want to abstract away each part of design of our engineering task and each factor,
in each team of engineers is specializes in one part of it, but we can get input from other
engineers and we give output to other engineers, we can specialize in our one part and
do it the best and we can deal with the bigger problems by connecting all those different
abstractions together so, design abstraction is key to solve such a problem.
Design Automation:
If we are part of dealing with many transistors and this is very difficult functionality, there
we need to make automation and we need to use our computers to work for us and help
us more out of what we can do. So design automation we can often call as EDA(electric
design automation). It is a key part to how we can deal with this problem.
9 Confidential
Design Re-Use(IP)
10 Confidential
Building a chip
General Design Approach: Partition
Model/Solution
How do engineers build a bridge?
13 Confidential
Register transfer level
It is also calld as RTL.
It is used in hardware description languages like Verilog and VHDL to create high-level
representations of a circuit, from which lower-level representations and ultimately actual wiring
can be derived. Design at the RTL level is typical practice in modern digital design.
RTL is very close to the hardware implementation.
Here we use bit vector data and operations.
e.g:
module ckt(q,a,b,clk);
input a,b,clk;
output q;
wire din;
reg[31:0] q;
assign din=((~q)&(a|b))|((~a)&b);
always@(posedge clk)
q<=din;
endmodule
14 Confidential
Gate level
This is the lowest level of abstraction.
Here to make this gate level we need to use register transfer level so, by taking some static
machine we turn these into logic gates.
e.g:
So, here we can see the NAND gates and
also the flip-flops here they will carry out
whatever we wrote in the register transfer
level by using the Boolean logic
15 Confidential
Transistor level
In this transistor level we take a compact level and run thorough simulation of the circuit
and also helps us to build gates.
Layout level
By using transistors it will design the actual layers
that they will be connected together.
Mask level
In this we take the layouts and create photographical
mask which we can be use to do fabrication.
16 Confidential
In olden days...
The original
Tape-out
17 Confidential
Design Automation
Logic synthesis
19 Confidential
Definition and planning
There are many different design documents that you can hear from our mangement and
marketing andd so far.. we can usually start with a
Chip Architecture
In this we will have the buses, the connectivity partitions, diff.functionality, bandwidth,
power, frequency, hardware vs software
Deign documents
For each block we can make the document which is disscuss in the design with small
enough sub-partitions and actually start drawing with state machine diff.kind of wave-
forms which we expect to see in the actual design.
20 Confidential
Board requirements
In this we will discuss about the board requirements, size of chip and how the floorplan
is going to be setout
Fabrication
The most important step in the process is fabrication.
There are diff.type of processess they can from diff.prices which has diff.features and
diff.specifications based upon that we will decide what type of process we are going to
use, which has lot of effect on the actual performance and specification of our chip.
21 Confidential
Design and verification
3. synthesability checks:
Linting is the automated checking of your source code for programmatic and stylistic
errors. This is done by using a lint tool (otherwise known as linter). A lint tool is a basic
static code analyzer.
22 Confidential
4. Formal verification:
We do formal verification actually checking of every single thing inside a certain block
whether we did according to the mathematical models or not.
Unit level:
A module is verified in it’s own test environment to prove that logic, control,
data paths are functionally correct or not. The goal of the unit level verification is to
ensure that unit/components been tested and conforms to its specifications and ready
to integrated with other sub components of the product.
23 Confidential
Sub-system level:
Once the components are verified and integrated into sub-systems.
These higher level assemblies are also individually verified before integrated with others
to produce larger assemblies untill the complete system has been integrated and
verified.
Chip(SOC) level:
SOC verification is a process in which the design is tested(or verified)
against a given design specification beore the tape-out. This happens along with
development of the design and start from the time of the design architecture defination
happens.
24 Confidential
IP integration
Soft IP:
It is in RTL fomat these are technology independent synthesizable RTL
discription return using any HDL. These IP’s are modifable and can be extended
funtionally and it takes lot of work to integrate and make it work at our specification we
need.
Hard IP:
These are design exactly for one process and they cannot be modifable easily
from one process to other process and the design functionality implemented in fixed
logic at the gate and signal route level.
25 Confidential
Prototyping
It is the process of implementing or synthesizing an ASSIC RTL on a platform
comprising one or more FPGA’s.
There are diff.levels of verification in prototype:
FPGA prototyping:
1. Synthesize to FPGA
2. Speeds up the testing where it is possible
26 Confidential
Hardware Emulation
It is very imp.type of verification nowadays. It is the one of the big box such as cadence
palladium. Which has several 100 cores on it and we can map actual gate level of bit
component may be even a whole chip to these palladiums and actually test the gate
level at diff.speeds.
It has big serves that can emulate entire design.
27 Confidential
Logic synthesis
It is the process of taking a high level behavioural model and a register transfer level
and turns into actual gate.
It consists of inputs like
1. Technology lib.file
2. RTL file
3. SDC(constraint) file
4. DFT definitions
Synthesis:
It converts RTL code to generic logic netlist.
28 Confidential
Technology mapping
We can take logic netlist and with the help of gates which are available in standard cell
lib.for implementation.
Optimization:
We check and meet the timing/area/power constraints.
29 Confidential
Physical design(back-end)
From our logic synthesis we have gate level netlist and we can start doing our physical
implementation of our back-end in our P.D.
Floorplan
I/O ring
Powerplan
Placement
CTS
Route
DRC, LVS
LEC, post layout
30 Confidential
Physical implementation inputs
Front end Vendors Foundary
Spec standard cells device models
Architecture memory compiler tech file
RTL I/O’s design rules
Verification hard IP’s
PHYSICAL DESIGN(Backend)
31 Confidential
Back-end flow
32 Confidential
Sign off and tape-out
Parasitic extraction
Post layout
Power analysis
DFT
Logic equivalence
33 Confidential
Silicon validation
Here a Chip Manufacturer uses the actual fabricated silicon (Pre-production sample) to
run the software and conduct the Silicon Validation Process.
Pre-silicon vadilation/verification:
Before fabrication, the designs are generally described in HDL language and simulated
on the high-end simulators. Such design modules are synthesized and are transformed
to the gate-level netlists. Several test cases are run on such netlists to check whether
the design behaves functionally correct or not.
Post-silicon vadilation/verification:
Post-silicon validation is deployed to capture the escaped bugs from the pre-silicon
verification phase. This phase also tries to check the functional correctness of the
design but on the real hardware in the actual working environment. When a design
passes from pre-silicon verification, few initial prototypes of the chips are fabricated and
are used as test objects.
34 Confidential
So this is all about building and designing the chip
35 Confidential
Thank You
36 Confidential