DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Related

  • How Developers Can Create “Sticky” Products
  • How Large Tech Companies Architect Resilient Systems for Millions of Users
  • On-Call That Doesn’t Suck: A Guide for Data Engineers
  • From Engineer to Leader: Scaling Impact Beyond Code

Trending

  • How to Perform Custom Error Handling With ANTLR
  • Build a Simple REST API Using Python Flask and SQLite (With Tests)
  • Building Reliable LLM-Powered Microservices With Kubernetes on AWS
  • Infrastructure as Code (IaC) Beyond the Basics
  1. DZone
  2. Culture and Methodologies
  3. Career Development
  4. How Does the ASIC Design Flow Cycle Work?

How Does the ASIC Design Flow Cycle Work?

Learn more about how ASIC design flow cycles work.

By 
Charles Taylor user avatar
Charles Taylor
·
Jun. 10, 19 · Presentation
Likes (4)
Comment
Save
Tweet
Share
12.9K Views

Join the DZone community and get the full member experience.

Join For Free

Today, ASIC design flow is a very mature process in silicon turnkey design. The ASIC design flow and its various steps in VLSI engineering that we describe below are based on best practices and proven methodologies in ASIC chip designs. This blog attempts to explain different steps in the ASIC design flow, starting from the ASIC design concept and moving from specifications to benefits.

Why Adopt ASIC Design Flow?

Why to adopt the ASIC design flow?

To ensure successful ASIC design, engineers must follow a proven ASIC design flow, which is based on a good understanding of ASIC specifications, requirements, low power design, and performance, with a focus on meeting the goal of the right time to market. Every stage of the ASIC design cycle has EDA tools that can help to implement ASIC design with ease.

How Does the ASIC Design Cycle Work?

In order to fulfill the futuristic demands of chip design, changes are required in design tools, methodologies, and software/hardware capabilities. For those changes, ASIC design flow adopted by engineers for efficient structured ASIC chip architecture and focus on its design functionalities

ASIC design flow is a mature and silicon-proven IC design process, which includes various steps like design conceptualization, chip optimization, logical/physical implementation, and design validation and verification. Let’s have an overview of each of the steps involved in the process.

How does the ASIC design cycle work?

Step 1. Chip Specification

This is the stage at which the engineer defines features, microarchitecture, functionalities (hardware/software interface), specifications (Time, Area, Power, Speed) with design guidelines of ASIC. Two different teams are involved at this juncture:

  • Design team: Generates RTL code.
  • Verification team: Generates test bench.

Step 2. Chip Partitioning

This is the stage wherein the engineer follows the ASIC design layout requirement and specification to create its structure using EDA tools and proven methodologies. This design structure is going to be verified with the help of HLL programming languages like C++ or System C.

After understanding the design specifications, the engineers partition the entire ASIC into multiple functional blocks (hierarchical modules), while keeping in mind ASIC’s best performance, technical feasibility, and resource allocation in terms of area, power, cost, and time. Once all the functional blocks are implemented in the architectural document, the engineers need to brainstorm ASIC design partitioning by reusing IPs from previous projects and procuring them from other parties.

Step 3. Design Entry/Functional Verification

Functional verification confirms the functionality and logical behavior of the circuit by simulation on a design entry level. This is the stage where the design team and verification team come into the cycle where they generate RTL code using test-benches. This is known as behavioral simulation.

In this simulation, once the RTL code (RTL code is a set of code that checks whether the RTL implementation meets the design verification) is done in HDL, a lot of code coverage metrics proposed for HDL. Engineers aim to verify the correctness of the code with the help of test vectors and trying to achieve it by 95 percent coverage test. This code coverage includes statement coverage, expression coverage, branch coverage, and toggle coverage.

There are two types of simulation tools:

  • Functional simulation tools: After the testbench and design code, functional simulation verifies logical behavior and its implementation based on design entry.
  • Timing simulation tools: Verifies that circuit design meets the timing requirements and confirms the design is free of circuit signal delays.

Step 4. RTL Block Synthesis/RTL Function

Once the RTL code and testbench are generated, the RTL team works on RTL description – they translate the RTL code into a gate-level netlist using a logical synthesis tool that meets required timing constraints. Thereafter, a synthesized database of the ASIC design is created in the system. When timing constraints are met with the logic synthesis, the design proceeds to the design for testability (DFT) techniques.

Step 5. Design for Test (DFT) Insertion

With the ongoing trend of lower technology nodes, there is an increase in system-on-chip variations like size, threshold voltage, and wire resistance. Due to these factors, new models and techniques are introduced to high-quality testing.

ASIC design is complex enough at different stages of the design cycle. Telling the customers that the chips have a fault when you are already at the production stage is embarrassing and disruptive. It’s a situation that no engineering team wants to be in. In order to overcome this situation, design for test is introduced with a list of techniques:

  • Scan path insertion: A methodology of linking all registers elements into one long shift register (scan path). This can help to check small parts of design instead of the whole design in one go.
  • Memory BIST (built-in Self-Test): In the lower technology node, chip memory requires lower area and fast access time. MBIST is a device that is used to check RAMs. It is a comprehensive solution to memory testing errors and self-repair proficiencies.
  • ATPG (automatic test pattern generation): ATPG is a method of creating test vectors/sequential input patterns to check the design for faults generated within various elements of a circuit.

Step 6. Floor Planning (Blueprint Your Chip)

After DFT, the physical implementation process is to be followed. In physical design, the first step in RTL-to-GDSII design is floorplanning. It is the process of placing blocks in the chip. It includes block placement, design portioning, pin placement, and power optimization.

Floorplan determines the size of the chip, places the gates, and connects them with wires. While connecting, engineers take care of wire length and functionality, which will ensure signals will not interfere with nearby elements. In the end, simulate the final floor plan with the post-layout verification process.

A good floorplanning exercise should come across and take care of the below points; otherwise, the life of IC and its cost will blow out:

  • Minimize the total chip area
  • Make routing phase easy (routable)
  • Improve signal delays

Step 7. Clock Tree Synthesis

Clock tree synthesis is a process of building the clock tree and meeting the defined timing, area, and power requirements. It helps in providing the clock connection to the clock pin of a sequential element in the required time and area, with low power consumption.

In order to avoid high power consumption, increase in delays, and a huge number of transitions, certain structures can be used for optimizing CTS structure such as Mesh Structure, H-Tree Structure, X-Tree Structure, Fishbone Structure, and Hybrid structure.

With the help of these structures, each flop in the clock tree gets the clock connection. During the optimization, tools insert the buffer to build the CTS structure. Different clock structures will build the clock tree with a minimum buffer insertion and lower power consumption of chips.

For more details on CTS challenges, solutions, and benefits, click here to watch this video.

Step 8. Place and Route

  1. Global Routing: Calculates estimated values for each net by the delays of fan-out of wire. Global routing is mainly divided into line routing and maze routing.
  2. Detailed Routing: In detailed routing, the actual delays of wire is calculated by various optimization methods like timing optimization, clock tree synthesis, etc.

As we are moving towards a lower technology node, engineers face complex design challenges with the need for implanting millions of gates in a small area. In order to make this ASIC design routable, placement density range needs to be followed for better QoR. Placement density analysis is an important parameter to get better outcomes with less number of iterations.

Step 9. Final Verification (Physical Verification and Timing)

After routing, the ASIC design layout undergoes three steps of physical verification, known as sign-off checks. This stage helps to check whether the layout working the way it was designed to. The following checks are followed to avoid any errors just before the tape-out:

  1. Layout versus schematic (LVS) is a process of checking that the geometry/layout matches the schematic/netlist.
  2. Design rule checks (DRC) is the process of checking that the geometry in the GDS file follows the rules given by the foundry.
  3. Logical equivalence checks (LVC) is the process of equivalence check between pre and post design layout.

Step 10. GDS II – Graphical Data Stream Information Interchange

In the last stage of the tape-out, the engineer performs wafer processing, packaging, testing, verification and delivery to the physical IC. GDSII is the file produced and used by the semiconductor foundries to fabricate the silicon and handled to the client.

Design Flow (web browser) CHIP (programming language) Clock (cryptography) Engineer

Published at DZone with permission of Charles Taylor. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • How Developers Can Create “Sticky” Products
  • How Large Tech Companies Architect Resilient Systems for Millions of Users
  • On-Call That Doesn’t Suck: A Guide for Data Engineers
  • From Engineer to Leader: Scaling Impact Beyond Code

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!