Академический Документы
Профессиональный Документы
Культура Документы
Introduction
Figure 1
Digital integrated circuits are found everywhere in modern life and many of
them are embedded in mobile devices where limited power resource is
available (e.g. mobile phones, watches, mobile computers, personal
assistants, ...). To permit an usable battery runtime, such devices must be
designed to consume the lowest possible power. Furthermore, low power is
also very important for non-portable devices, too. Indeed,a reduced power
consumption can highly decrease the packaging costs and highly increase
the circuit reliability, which is tightly related to the circuit working
temperature.
Table-1 shows the technology scaling of the components and the estimated
power consumption. The number of transistors per circuit will continue to
increase as predicted by Moore’s law, whereas the transistor sizes will
continue to shrink. Despite a decreased supply voltage, the total power will
continue to increase.
Two distinct contributions exist. The first is the so called switching energy
and corresponds to the energy required to charge (and discharge) the node
capacitances during transitions. The second is the energy dissipated during
transitions due to the conductive path existing, for a short period of time,
between the supply voltage and the ground. This effect is known as shortcut
or short-circuit.
Figure-2.1
For well designed cells (i.e. with balanced rising and falling edges), the
shortcut energy is in general much smaller than the switching energy.
Moreover, for very low supply voltage designs, the value Vdd − Vth nmos − Vth
pmos can be very small. Additionally, the case where Vdd < Vth nmos + Vth pmos will
not present shortcut dissipation at all. For these reasons, in modern designs,
shortcut power is often not considered or is simply included in the switching
consumption by increasing the switching capacitance to an equivalent
capacitance which incorporates the shortcut effect.
.
These mechanisms are:
With Io the reference static current, V th the threshold voltage, n the sub-
threshold slope, Ut (=kbT/q) the thermal potential and Vds the Drain-Source
voltage. The sbove equation shows an exponential dependency of the sub-
threshold current on the threshold voltage Vth. This is the reason why the low
Vth characterizing recent technologies leads to large sub-threshold currents.
10
The value of Vth is not fixed for a given technology; in fact, it can be
modulated through different effects like:
11
12
With Vth0 the reference threshold voltage for Vds = Vbs = 0, η (eta) the DIBL
effect coefficient and γ (gamma, equal to n-1 for Vbs = 0) the linearized body
effect coefficient.
13
Band to band tunneling happens on junctions with high electric field (> 10 6
V/cm) and is due to the direct tunneling of electrons from the band of
valence of the p region to the band of conduction in the n region.
14
In the overlapping zone between gate and drain, a high electric field can
exist, leading to the generation of currents from drain to substrate. Consider
a NMOS transistor; when a low gate potential is applied (V g near zero volts
or below), holes accumulate at the surface and create a region which is more
heavily p doped than the substrate. If this happens while the drain is
connected to a high potential (let say V dd), the depletion layer near the
drain becomes narrower. If this is important enough to invert the polarity of
the n+ drain region under the gate, high field effects like band-to-band
tunneling, avalanche multiplication and traps-assisted tunneling take place.
As a consequence minority carriers are emitted in the drain region
underneath the gate and pushed to the substrate due to the vertical electric
field. All these effects are increased by a reduction of the gate oxide
thickness.
The equivalent of the GIDL effect for a “high” source potential is called GISL
(Gate-Induced Source Leakage). This effect is generally not considered
because, in normal transistor operations, the source will show a low or zero
potential compared to the bulk.
2.2.5 Punchthrough
15
where CL, Vdd, and f denote the load capacitance of a CMOS gate, the supply
voltage and the clock frequency, respectively. Notation pt denotes the
switching ratio of a gate output; this switching ratio represents the number
of times the particular gate’s output changes from Gnd to Vdd per second –
please note that when output capacitance discharges from Vdd to Gnd,
switching power is not consumed because power from Vdd is not used (e.g.,
discharging to Gnd does not consume battery power). The switching ratio
varies according to the input vectors and benchmark programs, and thus an
average value of each benchmark may be used as a switching ratio.
16
where Td, Vth, and α denote the gate delay in a CMOS circuit, the threshold
voltage and velocity saturation index of a transistor, respectively.
Chapter-3
17
18
19
20
Figure 3.1
21
Figure 3.2
transistors increase area and delay. Furthermore, the pull-up and pull-down
networks will have floating values and thus will lose state during sleep mode.
22
For the stack approach, every transistor in the base case network is
duplicated with both original and duplicate bearing half the original transistor
width (Fig 3.3). Duplicated transistors cause a slight reverse bias between
the gate and source when both transistors are turned off. Because sub
threshold current is exponentially dependent on gate bias, a substantial
current reduction is obtained. Since all transistors are placed in-between two
parallel rows of continuous VDD and GND, stack approach design forces an
increase in row length because of an increase in the number of transistors
and decrease in transistor width.
Figure-3.3
23
Figure-3.3
transistor and W/L = 3 for the pull-down transistor (assuming μn = 2μp). Then
sleep transistors are added in parallel to one of the transistors in each set of
two stacked transistors. We use half size transistor width of the original
transistor (i.e., we use W0/2) for the sleep transistor width of the sleepy
stack. Although we use W0/2 for the width of the sleep transistor, changing
24
25
Chapter-4
Experimental Methodology
26
Using the Tanner tools we will drae the schematics and then we will extract
the Netlist from it
Then by SPICE tools and the required technology files we will simulate the
netlist
From the output waveforms we can observe the delay and power
27
A B C Cout Sum
0 0 0 0 0
0 0 1 0 1
0 1 0 0 1
0 1 1 1 0
1 0 0 0 1
1 0 1 1 0
1 1 0 1 0
1 1 1 1 1
Logic Equation
28
29
31
32
33
34
35
36
Base Case
37
Power Results
Sleepy Stack
38
Power Results
Base Case
39
Power Results
Sleepy Stack
40
Power Results
Base Case
41
Power Results
Sleepy Stack
42
Power Results
Base Case
43
Power Results
Sleepy Stack
44
Power Results
Base Case
45
Power Results
Sleepy Stack
46
Base Case
47
Sleepy Stack
48
Base Case
49
Sleepy Stack
50
Base Case
51
Sleepy Stack
52
Dynamic Waveforms
Base Case
53
54
55
56
57
[3] P. Pfeiffenberger, J. C. Park and V. J. Mooney, “Some Layouts Using the Sleepy Stack
Approach,” Technical Report GIT-CC-04-05, Georgia Institute of Technology, June 2004,
[Online] Available http://www.cc.gatech.edu/tech reports/index.04.html.
58
[5] A. Balasundaram, A. Pereira, J. C. Park and V. J. Mooney, “Golay and Wavelet Error
Control Codes in VLSI,” Technical Report GIT-CC-03-33, Georgia Institute of Technology,
December 2003,
59
Appendix-A
Netlist Programs
Base Case (180nm)
.probe
.options probefilename="BaseAdder180.dat"
60
+ probetopmodule="Module0"
61
+Level = 49
62
+xw= 0 binflag= 0
63
+B1= 0.00
64
+Level = 49
65
+xw= 0.00
+rsc= 0 rdc= 0
+B1= 0.00
66
67
.probe
.options probefilename="stackadder180.dat"
68
+ probetopmodule="Module0"
69
70
71
72
+Level = 49
73
+xw= 0 binflag= 0
+B1= 0.00
74
75
+Level = 49
+xw= 0.00
76
+rsc= 0 rdc= 0
+B1= 0.00
77
78
APPENDIX-B
79
S-EDIT V 8.0
MICROWIND
T-SPICE
W-EDIT
80