Professional Documents
Culture Documents
A Review Report On Multi-Voltage Rule Check - HBRP Publication
A Review Report On Multi-Voltage Rule Check - HBRP Publication
A Review Report On Multi-Voltage Rule Check - HBRP Publication
Volume 3 Issue 2
DOI: [To be assigned]
ABSTRACT
In order to decrease the power dissipation in ASIC design, Multi-voltage design techniques
such as Power gating, Clock gating, Power down mode, Multi-threshold, etc. are employed.
To help designers verify the correct implementation of these low power design techniques,
Multi-voltage Rule Check is used. The implementation of different Multi-voltage design
elements such as Isolation Cell, Level Shifter Cell, Retention Cell and power aware design is
explained using Unified power format (UPF). And in the design process from Register-
transfer level (RTL) to Graphic Database System (GDSII) various changes are made to the
netlist to make it easily testable, to satisfy the timing constraints, to optimally place and route
the design. These processes introduce variations in the netlist, which must be checked to
make sure that its functionality has not changed. So Formal Verification is performed to
confirm that Golden netlist (Reference) and revised netlist are equivalent at different phases,
example Synthesis, Design for Testability (DFT), Place and route. This paper discusses the
different mathematical algorithms underlying formal Verification such as Binary decision
diagram and Satisfiability solvers. It provides a detailed review of both formal verification
and multi-voltage rule check.
Keywords: Power gating, clock gating, unified power format, binary decision diagram,
satisfiability solvers
main thing to be noted is that all these are are added, and optimizations are
additional methods should not affect the performed in order to reduce area, power
original intended functionality of the and delay. Formal verification plays an
design. And in order to make sure this, the important role in making sure the
Multi-Voltage rule check (MVRC) is used. functionality of the design is not changing
It checks for all the power related issues in after each stage from RTL to GDSII. The
the design and reports them, so that the traditional way of performing this
designer can add suitable cells to verification was simulation, where a set of
overcome this or the design will be input vectors are applied and the outputs
tweaked accordingly to ensure that the data were checked against the expected results.
integrity is maintained. There are various But as input size increases the number of
tools available in the market to perform testcases to be verified will also increase
MVRC and FV as shown in Table-1, this exponentially and after a point it becomes
paper discusses about the Cadence practically impossible within a given time
Conformal tool. to verify the entire design. And the
testcases applied may not completely
Table 1: Different EDA Tools for FV and cover all the possibilities. There is a
MVRC. famous case of Intel Pentium FDIV where
EDA Formal MVRC after the chip was released, a bug was
TOOLS Verification found in the floating-point unit, because of
Cadence Conformal Conformal which it was giving incorrect results after a
LEC Low Power few decimal places for division. Since this
Synopsys Formality Eclypse was a very rare case, it was missed during
Mentor Formal Pro the verification.
Graphics
BACKGROUND
Formal verification (FV) is another Power Dissipation in CMOS
process used to perform the equivalence The total power dissipation in CMOS
check between two netlists at different circuits can be divided into static and
stage in ASIC design flow. The RTL code dynamic power.
in Verilog or VHDL format is converted to
gate level net list after synthesis; in this Static power
conversion, the actual human It is dissipated even when there is no clock
understandable code is converted into signal applied. It is due to the following
logic gates and optimizations are factors:
performed on the netlist. In the DFT 1. Subthreshold conduction: If the input
(Design for Testability) stage, extra logic voltage of a transistor is less than the
is inserted into the netlist to make the threshold, ideally there should not be
design testable; various operations any drain current, but due to
performed are scan chain insertion and subthreshold conduction of transistors,
built in self-test etc. After fabrication there there will be some leakage current [9].
could be some defect in silicon, the DFT 2. Reverse bias leakage: In CMOS
logic helps in identifying these defects at circuits, at the junction between the
the post-silicon test. In the next stage the diffusion and well, reverse biased
DFT netlist is placed and routed, the clock diodes are formed, and this constitutes
network is built; buffer/inverters are added to reverse biased leakage current.
to satisfy timing constrains [6]. As it can 3. Tunneling Current: As the size of the
be seen, the netlist at the end of each stage MOSFET is made smaller in order to
has some modifications, a few components reduce area, the thickness of the oxide
is also reduced and when this due to the quadratic dependency of leakage
dielectric layer is reduced beyond a power on total number of transistors, it
certain point it will increase the makes reducing the leakage current as an
probability of electrons tunneling from important objective. With every 10°C rise
gate to the channel due to Quantum in temperature of high-power devices, the
mechanical effects. This process is silicon failure rate is doubling, which
called Gate tunneling. prioritizes the power reduction of deep
submicron nodes and nanometer
Dynamic power technologies [8].
It is constituted by the following factors:
1. Switching Power: It is due to the net From the view of power management, the
capacitance at the load of a gate. low power circuit consists of three
Hence higher the load or if the components they are: the design which is
switching activity is more, dynamic divided into various power domains, the
power will be high; that is the power control circuitry containing level
capacitor will get charged and shifter cells, retention cells, isolation cells.
discharged quickly. Without switching And the power control logic [13].
there is no dynamic power, but static
power still exists. Low Power techniques
2. Short Circuit Power: During switching The various low power design techniques
an instantaneous short-circuits is implemented in the design for power
formed between the supply and the reduction are:
ground, as both pMOS and nMOS are
ON, this gives rise to short circuit Clock gating
power [8]. The distribution networks of clock
contribute to around 50 percent of dynamic
The total power dissipation is the amount power consumed. The clock buffers have
of leakage and dynamic power. high switching rate and require larger
Total Power = Pleakage + Pswitching + Pshort- driving strength in order to minimize the
circuit clock delay [4]. This clock signal can be
Pleakage is a function of {VDD , Vth , W/L}, disable when not required by clock gating;
Since ,
and Pshort-circuit = ISC * VDD * f, where Ceff and if the switching frequency that is * f
is the effective capacitance, VDD is the is reduced, this will significantly reduce
supply voltage, is the switching activity, the switching power.
f is switching frequency and ISC is the
short-circuit current. Multi Vt
In this technique MOSFETs with higher
As technology progresses, the linear threshold voltages are be used, in order to
dimension of the design is scaled usually reduce the sub-threshold conduction
by a factor of 0.7, since that factor will (Pstatic). But its drawback is that the
reduce the chip area by approximately half transistor will take more time to turn ON.
of its original size [12]. As the process Hence in blocks where performance
technology decreases below 100nm, the matters the most, low Vt or normal Vt cells
contribution of leakage power also are used.
increases along with switching power.
According to reports, around 40 percent of Multi VDD
the total power is constituted by leakage Since all the power domains does not
power at 65nm technology node [1]. And require the same supply voltage,
depending on the power requirement the But in this case an isolation cell must be
supply voltage can be reduced, where inserted if the block turned off is a driver
some blocks use low power, and some be of some other block.
completely shut off depending on the
mode of operation. Using multiple voltage Some or all the above discussed techniques
domains will reduce dynamic voltage. And are implemented in a design to minimize
if two different power domains must the power consumption, but at the same
communicate then level shifter cells are time it is crucial to verify the working of
used between them to preserve the data the design and if it is performing in the
integrity. intended way and that the data is not
getting corrupted due to any of this low
Dynamic voltage scaling power techniques. To verify this Multi-
It is a technique by which, the chip can voltage rule check is needed where
change its power supply value depending additional cells are added for proper
upon the required performance, such as functionality.
sleep mode, standby mode, full power or
overdrive mode. This will reduce the METHODOLOGY
dynamic power consumption. The flowchart in Figure 1 is the ASIC
design flow from RTL to GDSII; it shows
Power gating the different stages where MVRC and
If the power is not required to a particular Formal verification are performed on the
block, then it is turned off using switching design.
cells and this reduces the static power [2].
The two types of Isolation cells are: to a greater extent by removing the
Clamp 1 Isolation Cell (e.g. OR gate) redundant entries and duplicate sub-trees.
Clamp 0 Isolation Cell. (e.g. AND The BDD representation depends on the
gate). ordering of the variables, for some order
there could be more reduction in the size
Level Shifter Cell of BDD compared to others. But for a
given order of variables, the BDD has a
Level shifter cells are used if there are
unique representation. There are reduction
components with different power domains.
algorithms that can be used to reduce the
If a component with a power domain of BDD. Hence a wonderful property
0.7V must send data to a 1.0V power emerges that is, for a given Boolean
domain, the data must be shifted by the equation by restricting the global ordering
level shifter cell before transmitting in of variables that can be obtained is a
order to maintain the data integrity. It canonical representation of BDD which
basically translates values between two will always be the same and the
power domains with different operating redundancy from the truth table is
voltages; this makes sure the data integrity significantly removed. Such reduced
of the signal is maintained. Possible level BDDs are called Reduced Ordered Binary
Shifters are: Low to High, High to Low or Decision Diagram (ROBDD). An example
Both Low to high, High to low (Employed of BDD and ROBDD representation is
in a Dynamic Voltage Scaling design). shown in Figure 4 for the function
̅ ̅ . Also, every node in a
Retention Cell BDD represents some Boolean function,
Retention cell is used to store the register so it can be shared between multiple
state before power down mode. These functions and are called multi-rooted BDD
values will be restored when power is up. [17]; this will also result in reduction in
So, retention cell be always on to serve the size. They are implemented in a bottom-up
fashion by building a set of operators and
purpose. As these are always ON, it can
joining them using recursive methods.
consume power even in power down mode This helps in comparing logic
[3]. implementations [14] that are if two
functions are equivalent then they will also
Concepts of Formal Verification have the same BDD representation as
Binary decision diagram (BDD) BDDs are canonical and they have a
BDDs are data structures that provide an unique representation for a given function.
efficient way of representing the Boolean And if the functions are not logically
function. The traditional truth table method equivalent their BDDs will differ hence it
is very space consuming; it requires 2n has to be verified to check for any
(n+1) entries for n variable function. But problems.
by using BDDs this space can be reduced
The comparison report includes the Golden design or in only the Revised
following classification: design but does not affect the circuit
functionality. Example: scan_in,
Categories of mapped points scan_out
1. Equivalent: The compared points are 2. Unreachable: Key point that is not
logically equivalent. propagated to any observable point.
2. Inverted Equivalent: The compared Example: spare flops not connected,
points are logically inverted. scan flops blocked after constraining
3. Non-Equivalent: The compared points 3. Not-mapped: Key point which cannot
are not equivalent and have different be mapped because there is no
functions correspondence on the other side.
4. Abort: The compared points are not Such points may be resolved with
yet proved because of timeout or some renaming rules.
other system parameter.
RESULTS AND DISCUSSION
Categories of unmapped points BDD and SAT techniques provide a better
1. Extra: Key point that exists in only the way to perform formal verification
compared to the traditional simulation R., Holcomb, K., & Wood, T. (2013,
techniques. But the problem with BDD is March). Low power design flow based
that since they vary as the order of variable on Unified Power Format and
changes, they do not always give the Synopsys tool chain. In 2013 3rd
smallest representation. So, for a bad Interdisciplinary Engineering Design
ordering there will be exponential growth Education Conference (pp. 28-31).
in the BDD representation [18]. In order to IEEE.
overcome this, there are some algorithms 5. Mandal, S., Da Costa, A. B., Hazra,
that can select the order dynamically to A., Dasgupta, P., Naware, B.,
give a better reduction but choosing the Chunduri, R. M., & Basu, S. (2017,
order in a most efficient way is not January). Formal verification of power
possible. Hence BDD based FV can be management logic with mixed-signal
used in cases where complete coverage is domains. In 2017 30th International
required like in floating point arithmetic Conference on VLSI Design and 2017
and SAT based FV can be used in cases 16th International Conference on
where the design is larger, quick results are Embedded Systems (VLSID) (pp. 239-
required. 244). IEEE.
6. Gayathri, S., & Taranath, T. C. (2017,
CONCLUSION December). RTL synthesis of case
This paper gives a detailed literature study using design compiler. In 2017
review of Multi-voltage rule check and International Conference on
Formal verification techniques. It explains Electrical, Electronics,
the power dissipation in CMOS circuits, Communication, Computer, and
various low pow techniques, and multi- Optimization Techniques
voltage design elements such as Isolation (ICEECCOT) (pp. 1-7). IEEE.
cell, level shifter cell and retention cells. It 7. Bhatt, H., Decker, J., & Desai, H. The
discusses the need for FV, and briefs the Case for Low-Power Simulation-to-
underlying mathematics of FV that is BDD Implementation Equivalence
and SAT. It also describes steps involved Checking.
in FV with respect to the Cadence 8. Varadharajan, S. K., & Nallasamy, V.
Conformal tool. (2017, March). Low power VLSI
circuits design strategies and
REFERENCES methodologies: A literature review. In
1. Bailey, S., Chidolue, G., & Crone, A. 2017 Conference on Emerging
(2007). Low power design and Devices and Smart Systems (ICEDSS)
verification techniques. Mentor (pp. 245-251). IEEE.
Graphics, white paper. 9. Klavakolanu, S. S., Raju, M. K.,
2. Challa, N.K., Nelakuditi, & U.R. Noorbasha, F., & Kanth, B. R. (2015,
(2016). The New Era on Low Power January). A review report on low
Design and Verification Methodology. power VLSI systems analysis and
International Journal of Advances in modeling techniques. In 2015
Science Engineering and Technology, International Conference on Signal
4(3). Processing and Communication
3. Bembaron, F., Kakkar, S., Mukherjee, Engineering Systems (pp. 142-146).
R., & Srivastava, A. (2009). Low IEEE.
power verification methodology using 10. Sharafinejad, R., Alizadeh, B., &
UPF. Proc. DVCon, 228-233. Fujita, M. (2015, April). UPF-based
4. Gourisetty, V., Mahmoodi, H., formal verification of low power
Melikyan, V., Babayan, E., Goldman, techniques in modern processors. In