WO2000073925A2 - Using budgeted required time during technology mapping - Google Patents

Using budgeted required time during technology mapping Download PDF

Info

Publication number
WO2000073925A2
WO2000073925A2 PCT/US2000/013919 US0013919W WO0073925A2 WO 2000073925 A2 WO2000073925 A2 WO 2000073925A2 US 0013919 W US0013919 W US 0013919W WO 0073925 A2 WO0073925 A2 WO 0073925A2
Authority
WO
WIPO (PCT)
Prior art keywords
covers
node
cover
match
list
Prior art date
Application number
PCT/US2000/013919
Other languages
French (fr)
Other versions
WO2000073925A3 (en
Inventor
Arnold Ginetti
Original Assignee
Cadence Design Systems, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cadence Design Systems, Inc. filed Critical Cadence Design Systems, Inc.
Publication of WO2000073925A2 publication Critical patent/WO2000073925A2/en
Publication of WO2000073925A3 publication Critical patent/WO2000073925A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/30Circuit design
    • G06F30/32Circuit design at the digital level
    • G06F30/327Logic synthesis; Behaviour synthesis, e.g. mapping logic, HDL to netlist, high-level language to RTL or netlist

Definitions

  • This invention pertains to the field of electronic design automation. More specifically, this invention pertains to the operation of a technology mapping tool.
  • Modem logic circuits are so complex that designers generally require computer-based techniques to aid in their design.
  • a process called "Technology Mapping" is employed to transform an abstract representation of a design into a technology-dependent netlist, which is a representation of the design using cells of a technology-specific target library.
  • the abstract representation of the design is generally made up of combinatorial blocks separated by sequential blocks.
  • a combinatorial block represents a multiple-input Boolean equation in which the output is a logical combination of the input signals, and is often described by Directed Acyclic Graphs (DAGs).
  • a sequential block is one that maintains a state representation, so that the outputs are not simply a logical combination of the inputs.
  • the technology mapping can be carried out in a series of steps.
  • the technology mapper partitions a DAG into a set of interconnected logic cones and buffer trees.
  • a logic cone is a set of fanout free interconnected 2-input AND nodes and 2-input OR nodes delimited by multi-fanout nodes, inverters, and buffers.
  • a buffer tree is a set of interconnected inverters and buffers (sometimes reduced to a simple multi-fanout wire) delimited by 2-input AND nodes, 2-input OR nodes, and by DAG terminals.
  • a DAG is illustrated as having been partitioned into three logic cones and eight buffer trees. After the DAG has been partitioned, the logic cones and the buffer trees are sorted in a forward Breadth First Search (BFS) order.
  • BFS Breadth First Search
  • the logic cones are tiled one by one, according to the BFS sorted order.
  • the inputs of each logic cone are assumed to be available both in direct and inverted form.
  • the tiling is attempted for each logic cone in both direct and inverted form, with the best tiling being kept.
  • the technology mapper iterates through all of the available library cells to determine whether each cell can cover the current node. This involves determining whether a covering is possible in either direct or inverted form. If so, a correspondence is established between the current cell input terminals and the input nodes driving that cell. The polarity of the terminals is defined as well.
  • the technology mapper When the technology mapper reaches the root node of a logic cone (whose output is the logic cone output), it determines the best cover for the whole logic cone. That selection induces a polarity on the logic cone, as well as on all the logic cone input terminals.
  • the buffer trees are then buffered one by one, based on: (i) the initial polarity of the logic cone input terminals driven by the buffer tree, (ii) the tiler-produced polarity of the logic cone input terminals driven by the buffer tree, and (iii) the tiler-produced polarity of the logic cone output terminals driving the buffer tree.
  • the results of the tiling and buffering replace the abstract representation of the combinatorial block in the design.
  • the technology mapper visits nodes within a logic cone in a BFS order from the inputs to the output. At each visited node, in a first phase, the technology mapper invokes a matcher with a given matchable library cell.
  • the matcher produces a list of matches, each of which is composed of the following information:
  • the matcher invoked for node n would produce a match including information such as that presented in Fig. 2b.
  • a child node is one which has an output connected to an input of the current node.
  • a node cover is recursively defined as a match plus one cover for each child node of the match.
  • a node cover can be seen as one set of interconnected components which are necessary to cover the functionality of that node from the logic cone input terminals.
  • a node cover includes the following information:
  • the performance of a cover includes the area of the cover and the slack of the cover.
  • the slack of the cover is automatically deduced by comparing the covered node rising/falling arrival times with the covered node budgeted required times.
  • the potential of creating physical problems i.e. routing problems
  • a logic cone root node cover may be called a logic cone cover, because the full cover of the logic cone is revealed by recursively visiting the child node covers of that cover.
  • the tiling process generates many potential covers and it is a difficult task to select the best of these. The task is difficult in part because covers are difficult to compare and to trim.
  • a cover is considered to be inferior to another cover if it is worse (i.e. bigger, worse slack, more difficult to place and route) than the other cover in at least one aspect and is not better than the other cover in any other aspect.
  • Inferior covers can generally be immediately rejected in the tiling process.
  • a child node cover is said to be Logic Design Rule (LDR) compatible with a node cover if the connection of the child cover to the node cover does not create any LDR violation.
  • LDR Logic Design Rule
  • slacks is smaller than a certain threshold ⁇ .
  • The physical concept behind the ⁇ parameter is
  • the timing that is measured within a timing engine is
  • cover a produces a slack ⁇ /2 better than cover b and
  • cover b is smaller than cover a, then cover a will be considered inferior to cover b, and will be rejected. This rejection is meaningful up to a certain threshold, because selecting smaller cover will decrease the final size of the design and will thus decrease the average wiring capacitance of the design.
  • the technology mapper associates covers with the matches produced by the matcher and evaluates the performance of these covers.
  • the performance of a cover which is exclusively driven by logic cone input terminals can be computed as follows:
  • the slack is computed as the difference between the timing engine budgeted required time and the timing engine computed arrival time on the output node of the matched cell.
  • the technology mapper compares the performance of the covers, eliminating rejectable covers, such as covers which do not respect a Logic Design Rule, covers which cover gates placed very far away from each other, and inferior covers.
  • the performance of a cover which is not exclusively driven by logic cone input terminals is computed as follows:
  • the technology mapper selects the most appropriate logic cone cover (the one which best respects the constraints) for that logic cone. This selection will imply the polarity of the logic cone output terminal.
  • the child node covers are recursively found by visiting the cover child node covers. Those recursive visits will imply the logic cone input terminal polarity.
  • Fig. 3a illustrates a typical logic cone. Nodes n and m have already been tiled, and the direct covers are as shown in Figs. 3b and 3c, respectively.
  • the matcher produces a series of potential matches, one of those being a 2-input AND gate.
  • the goal of the matcher is to find the covers which will result in the best performance for the current logic cone.
  • One problem is that the performance of the logic cone is only known once it has been totally tiled. Therefore, the best cover for a given node can only be known after the logic cone has been tiled.
  • the matcher must estimate the performance of all the possible covers, and store all the non-inferior covers. In the case illustrated in Fig.
  • cover performance estimation is itself a CPU-intensive process. It consists primarily of placing a matched cell, estimating wiring capacitance, and estimating the timing of the cover. The location of the matched cell is necessary because the wiring capacitance is calculated from the wiring length between the matched cell and other matched cells. In order to estimate the wiring length, the location of the matched cells is required.
  • the CM-of-Covered method comprises placing a matched gate in the center of mass of the positions of the different basic gates covered by the matched cell.
  • the CM-of-Fan method comprises placing the matched cell in the center of mass of the interconnections of the matched cell, so that the total wire length necessary to connect that matched cell is minimized.
  • CM-of-Covered method is that the placement of a matched cell is independent of the interconnections of the matched cell.
  • a disadvantage of the CM-of-Fan method is that to minimize the length of the interconnections, the positions of the gates connected to the matched cell are necessary, but the position of the gate driven by the current matched cell is not yet known. Also, because several covers are kept for each child node, the position of the gates driving the current matched cell are not known.
  • Another problem with conventional methods is that a large number of potential covers must be maintained for each node in a logic cone. As the logic cone grows larger, the amount of cover information which must be stored grows as well. Each successive node performance calculation requires an increasing amount of computational resources.
  • the complexity of conventional methods fails to scale well with increasing size of logic cones and cell libraries. What is needed is a system and method for estimating the placement of a matched cell from a global placement which takes the interconnections of the matched cell into account, but which does not require information about the position of the cells connected to the matched cell. What is also needed is a system and method for selecting covers for each node which does not become computationally difficult as logic cone and cell library sizes grow large.
  • a system and method for estimating the position of a matched cell is presented which takes into account the interconnectivities of that cell, without relying on the location of cells connected to the matched cell.
  • the new method is referred to as the Weighted Center of Mass of Covered method (in short, WCM-of-Covered method).
  • WCM-of-Covered method Weighted Center of Mass of Covered method
  • weights are given to the various nodes which are part of the match. These weights are based on the number of connections between the nodes and child nodes of the match.
  • the placement of the matched cell is based on the initial positions given to the nodes making up the match, and the weights calculated for those nodes.
  • a system and method for selecting which covers to retain for each node reduces the computational burden for large logic cones and large cell libraries. At each node only K covers are retained. These covers have timing performances which are centered around the ideal timing performance for that node, and do not include inferior covers.
  • the computational burden in selecting the covers for each node is based on the number K, and the number of inputs to that node.
  • Fig. 1 illustrates the partitioning of a DAG into logic cones and buffer trees.
  • Figs. 2a and 2b illustrate the relationship between nodes of a logic cone and possible matches of those nodes.
  • Figs. 3a, 3b, and 3c illustrate the relationship between nodes of a logic cone and possible covers at those nodes.
  • Fig. 4 illustrates a flowchart of the operation of one embodiment of the invention.
  • Fig. 5 illustrates the weights associated with nodes of a matched cell.
  • Fig. 6 illustrates the weighted center of mass method.
  • Fig. 7 illustrates the relationship between a match and child nodes of the match.
  • Figs. 8a and 8b illustrate the timing performance matrix P.
  • the input to a technology mapper is a decomposed netlist made up of (i) basic 2-input AND gates, (ii) basic 2-input OR gates, (iii) inverters, and (iv) sequential elements. Logic cones of this netlist are identified, and the technology mapper operates on each of these logic cones. In the illustrated embodiment, the netlist has been constructed in a timing-driven manner, so that no restructuring of the netlist is necessary. Referring now to Fig. 4, a flowchart illustrates the operation of a technology mapping according to one embodiment of the invention.
  • the information which makes up each match can include: the current node, the matched library cell, the polarity of the match of the appropriate node output connector, the child nodes reached by that match, the correspondence between the child nodes and the gate input connectors, and the polarity of each of the child nodes.
  • the technology mapper then loops 404 through each of the potential matches for that node. For each match, the placement of the library cell corresponding to that match must be estimated 406. To do this, a matched cell is placed in the center of mass of the weighted positions of the different basic gates covered by the matched cell (the current node and child nodes covered by the match). As illustrated in Fig. 5, the weights are distributed to these nodes according to the number of connections from these nodes to nodes which are not part of the match. In the exemplary embodiment of the present invention, the weights are:
  • no weight is specified for nodes touching three or more matched cell connections because, in that case, the matched cell only covers a single node, and no weighting is necessary.
  • a weight would be specified for nodes touching more than two nodes outside the matched cell.
  • Fig. 6 illustrates the implementation of a weighted center of mass calculation.
  • a reference coordinate point is determined, such as point o.
  • a two-dimensional vector (v a , V b , and v c ) from reference point o to the node is calculated.
  • the number on each node of Fig. 6 shows the weight on that node.
  • each vector (v a , V , and v c ) is multiplied by the weight of the associated node, and the multiplied vectors are summed.
  • the magnitude of the summed vector is then divided by the sum of all node weights, yielding a vector V pointing to the weighted center of mass of the nodes.
  • This method has the advantage that interconnections are accounted for without requiring information about the position of the nodes driving and driven by the matched cell. It also has the advantage that it is relatively easy to implement. Note that in other embodiments, the weight values in the cases of one or two touched cell connections could be set to values other than 1 and 2.
  • the pin-to-pin timing performance of each child cover of the match is estimated 408.
  • nodes n and m are considered child nodes of the match. If there are such child nodes, they will have been visited by the technology mapper prior to the current node, and a set of K covers will have been determined for each of these match child nodes.
  • a timing performance matrix is determined 410.
  • a timing performance matrix P is defined as an N by K matrix where each element P u is the timing performance of the match due to the j th cover of the i th , child node of the match.
  • a timing arc is a path from an input to the match to the output of the match.
  • the performances of each row of matrix P corresponding to a single child node are ordered from best to worst, as illustrated in Fig. 8a.
  • a sorted list of covers for the current node is constructed from worst to best. As indicated above, each cover will incorporate not only a particular match, but also a particular cover for each child node of that match.
  • the worst cover for the current match will be the one using the child node covers in the column of matrix P which corresponds to the worst timing performances.
  • this is the far right column, which is made up of timings 3, 4, 9, 7, and 6 ns.
  • the slowest of these timings, 9 ns is the timing performance for the cover utilizing these child node covers.
  • This cover is constructed 412 by combining the current match with each of the specified covers for the child nodes.
  • a test is performed 414 to determine whether there are already at least K covers
  • Such an ideal performance time can be obtained from doing a Zero Slack Algorithm (ZSA) or Iterative Minimax-PERT (IMP) computation.
  • ZSA Zero Slack Algorithm
  • IMP Iterative Minimax-PERT
  • the ZSA and IMP algorithms are described in Youssef, Habib, et al., "Bounds on Net Delays for VLSI Circuits", IEEE Transactions on Circuits and Systems, Vol. 39, No. 11, November 1992, which is incorporated by reference herein in its entirety.
  • the IMP algorithm distributes slack as a function of weights specified on gate timing arcs. In the context of this embodiment, these weights can be automatically generated as a function of the flexibility of the logic cone of
  • Performance timings which are much slower than the ideal will result in unmet timing performance criteria. Performance timings which are much faster than the ideal will often
  • is equal to K times ⁇ . If both of these tests are true, then there are no more
  • a cover can be considered inferior, for example, if it has slower timing than another cover and it has an area which is at least as large as that other cover.
  • other criteria can be applied to determine whether the cover should be retained. For example, if the cover violates any logic design rules, or if the cover creates placement problems, the cover should be rejected as though it were inferior. If the current cover is not rejected, then the cover is added 418 to the list of covers for this match.
  • matrix P is adjusted 420 to remove the current cover.
  • Each instance of the current timing performance in this case the 9 ns timing performance, is eliminated from matrix P and each such row is shifted to the right, as in Fig. 8b.
  • the new right-hand column corresponds to a different cover, with a better timing performance, in this case 8 ns.
  • a new cover is constructed 412 for this column, and the process is repeated until at least one row has been entirely eliminated, in this case after the 4 ns cover has been added to the sorted fist.
  • is 3 and ⁇ is computed to be K* ⁇ , where ⁇ is half of the pin-to-pin delay timing of the fastest
  • the end of the node loop 426 is reached and execution continues with the next node 400.
  • the "root node” will have K individual covers, each implying a particular match for each node of the tree.
  • the optimum root node cover is selected, for example, by determining which is closest to the ideal timing performance for the entire tree. This root node cover includes all of the information necessary to determine which match is appropriate for each node of the tree.

Abstract

A method for selecting which covers to retain for each node reduces the computational burden for large logic cones and large cell libraries. At each node only K covers are retained. These covers have timing preformances which are centered around the ideal timing performance for that node, and do not include inferior covers. The computational burden in selecting the covers for each node is based on the number K, and the number of inputs to that node.

Description

USING BUDGETED REQUIRED TIME DURING TECHNOLOGY MAPPING
CROSS-REFERENCE TO RELATED APPLICATION This application is related to commonly assigned U.S. Patent Application Serial No.
09/322,262 for "Updating Placement During Technology Mapping", filed on the same day as the present application. The disclosure of the related application is incorporated herein by reference.
FIELD OF INVENTION This invention pertains to the field of electronic design automation. More specifically, this invention pertains to the operation of a technology mapping tool.
BACKGROUND OF THE INVENTION Modem logic circuits are so complex that designers generally require computer-based techniques to aid in their design. During the design of a complex logic circuit, a process called "Technology Mapping" is employed to transform an abstract representation of a design into a technology-dependent netlist, which is a representation of the design using cells of a technology-specific target library. The abstract representation of the design is generally made up of combinatorial blocks separated by sequential blocks. A combinatorial block represents a multiple-input Boolean equation in which the output is a logical combination of the input signals, and is often described by Directed Acyclic Graphs (DAGs). A sequential block is one that maintains a state representation, so that the outputs are not simply a logical combination of the inputs.
The technology mapping can be carried out in a series of steps. In a first step, the technology mapper partitions a DAG into a set of interconnected logic cones and buffer trees. A logic cone is a set of fanout free interconnected 2-input AND nodes and 2-input OR nodes delimited by multi-fanout nodes, inverters, and buffers. A buffer tree is a set of interconnected inverters and buffers (sometimes reduced to a simple multi-fanout wire) delimited by 2-input AND nodes, 2-input OR nodes, and by DAG terminals. In Fig. 1, a DAG is illustrated as having been partitioned into three logic cones and eight buffer trees. After the DAG has been partitioned, the logic cones and the buffer trees are sorted in a forward Breadth First Search (BFS) order.
The logic cones are tiled one by one, according to the BFS sorted order. During the tiling step, the inputs of each logic cone are assumed to be available both in direct and inverted form. Also, the tiling is attempted for each logic cone in both direct and inverted form, with the best tiling being kept. At each node of a logic cone, the technology mapper iterates through all of the available library cells to determine whether each cell can cover the current node. This involves determining whether a covering is possible in either direct or inverted form. If so, a correspondence is established between the current cell input terminals and the input nodes driving that cell. The polarity of the terminals is defined as well. When the technology mapper reaches the root node of a logic cone (whose output is the logic cone output), it determines the best cover for the whole logic cone. That selection induces a polarity on the logic cone, as well as on all the logic cone input terminals. The buffer trees are then buffered one by one, based on: (i) the initial polarity of the logic cone input terminals driven by the buffer tree, (ii) the tiler-produced polarity of the logic cone input terminals driven by the buffer tree, and (iii) the tiler-produced polarity of the logic cone output terminals driving the buffer tree. The results of the tiling and buffering replace the abstract representation of the combinatorial block in the design.
In the tiling step above, the technology mapper visits nodes within a logic cone in a BFS order from the inputs to the output. At each visited node, in a first phase, the technology mapper invokes a matcher with a given matchable library cell. The matcher produces a list of matches, each of which is composed of the following information:
Contents of a Match
the matched library cell the polarity of the match of the appropriate node output connector
an identification of each of the child nodes reached by that cell the correspondence between the child nodes and the gate input connectors
the polarity of each of the child nodes
Table 1.
For example, in the case of Fig. 2a, the matcher invoked for node n would produce a match including information such as that presented in Fig. 2b. A child node is one which has an output connected to an input of the current node.
After the production of the list of matches is completed, potential node covers are determined. A node cover is recursively defined as a match plus one cover for each child node of the match. A node cover can be seen as one set of interconnected components which are necessary to cover the functionality of that node from the logic cone input terminals. A node cover includes the following information:
Contents of a Cover a match for the node
the performance of the node cover the polarity of the node cover node covers for each of the child nodes of the match
Table 2
As used herein, the performance of a cover includes the area of the cover and the slack of the cover. The slack of the cover is automatically deduced by comparing the covered node rising/falling arrival times with the covered node budgeted required times. In some cases the potential of creating physical problems (i.e. routing problems) is also included in performance. A logic cone root node cover may be called a logic cone cover, because the full cover of the logic cone is revealed by recursively visiting the child node covers of that cover. The tiling process generates many potential covers and it is a difficult task to select the best of these. The task is difficult in part because covers are difficult to compare and to trim. For example, it is not clear whether a smaller and slower cover should be preferred to a bigger and faster cover. However, there does exist an inferiority relationship between some covers which allows for an easy comparison of these covers. A cover is considered to be inferior to another cover if it is worse (i.e. bigger, worse slack, more difficult to place and route) than the other cover in at least one aspect and is not better than the other cover in any other aspect. Inferior covers can generally be immediately rejected in the tiling process.
A child node cover is said to be Logic Design Rule (LDR) compatible with a node cover if the connection of the child cover to the node cover does not create any LDR violation.
Two covers are considered to be timing equivalent if the difference between their
slacks is smaller than a certain threshold τ. The physical concept behind the τ parameter is
the fact that below a certain threshold, the timing that is measured within a timing engine is
not meaningful. Note that the direct impact of the τ parameter is that non-inferior covers can
be considered as inferior. For instance, if cover a produces a slack τ/2 better than cover b and
if cover b is smaller than cover a, then cover a will be considered inferior to cover b, and will be rejected. This rejection is meaningful up to a certain threshold, because selecting smaller cover will decrease the final size of the design and will thus decrease the average wiring capacitance of the design. In a second phase, the technology mapper associates covers with the matches produced by the matcher and evaluates the performance of these covers. The performance of a cover which is exclusively driven by logic cone input terminals can be computed as follows:
• the area is the area of the matched cell; and
• the slack is computed as the difference between the timing engine budgeted required time and the timing engine computed arrival time on the output node of the matched cell. While producing the different covers, the technology mapper compares the performance of the covers, eliminating rejectable covers, such as covers which do not respect a Logic Design Rule, covers which cover gates placed very far away from each other, and inferior covers. The performance of a cover which is not exclusively driven by logic cone input terminals is computed as follows:
• the area is the sum of the matched cell area plus the areas of the cover child node covers; and
• the slack is computed as the difference between the timing engine budgeted required time and the timing engine computed arrival time on the output node of the matched cell. Once the logic cone output node has been visited, and once the cover performance values are known, the technology mapper selects the most appropriate logic cone cover (the one which best respects the constraints) for that logic cone. This selection will imply the polarity of the logic cone output terminal. The child node covers are recursively found by visiting the cover child node covers. Those recursive visits will imply the logic cone input terminal polarity.
Fig. 3a illustrates a typical logic cone. Nodes n and m have already been tiled, and the direct covers are as shown in Figs. 3b and 3c, respectively. In tiling node p the matcher produces a series of potential matches, one of those being a 2-input AND gate. The goal of the matcher is to find the covers which will result in the best performance for the current logic cone. One problem is that the performance of the logic cone is only known once it has been totally tiled. Therefore, the best cover for a given node can only be known after the logic cone has been tiled. For any intermediate node, the matcher must estimate the performance of all the possible covers, and store all the non-inferior covers. In the case illustrated in Fig. 3, the matcher would try coverl(n) with coverl(m), coverl(n) with cover2(m), cover2(n) with coverl(m) and cover2(n) with cover2(m). In the general case, a large number of cover performances will have to be estimated for each node. Note also that cover performance estimation is itself a CPU-intensive process. It consists primarily of placing a matched cell, estimating wiring capacitance, and estimating the timing of the cover. The location of the matched cell is necessary because the wiring capacitance is calculated from the wiring length between the matched cell and other matched cells. In order to estimate the wiring length, the location of the matched cells is required.
Conventionally, two methods have been used to estimate the placement of a matched cell from an initial global placement:
• the Center of Mass of Covered Nodes method (CM-of-Covered method);
* the Center of Mass of Fan method (CM-of-Fan method).
The CM-of-Covered method comprises placing a matched gate in the center of mass of the positions of the different basic gates covered by the matched cell. The CM-of-Fan method comprises placing the matched cell in the center of mass of the interconnections of the matched cell, so that the total wire length necessary to connect that matched cell is minimized. These methods are described in Pedram, Massoud, et al., "Lavout Driven Technology
Mapping", 28th ACM/IEEE Design Automation Conference, 1991, which is incorporated by reference herein in its entirety. One disadvantage of the CM-of-Covered method is that the placement of a matched cell is independent of the interconnections of the matched cell. A disadvantage of the CM-of-Fan method is that to minimize the length of the interconnections, the positions of the gates connected to the matched cell are necessary, but the position of the gate driven by the current matched cell is not yet known. Also, because several covers are kept for each child node, the position of the gates driving the current matched cell are not known.
Another problem with conventional methods is that a large number of potential covers must be maintained for each node in a logic cone. As the logic cone grows larger, the amount of cover information which must be stored grows as well. Each successive node performance calculation requires an increasing amount of computational resources. The complexity of conventional methods fails to scale well with increasing size of logic cones and cell libraries. What is needed is a system and method for estimating the placement of a matched cell from a global placement which takes the interconnections of the matched cell into account, but which does not require information about the position of the cells connected to the matched cell. What is also needed is a system and method for selecting covers for each node which does not become computationally difficult as logic cone and cell library sizes grow large.
SUMMARY OF THE INVENTION A system and method for estimating the position of a matched cell is presented which takes into account the interconnectivities of that cell, without relying on the location of cells connected to the matched cell. The new method is referred to as the Weighted Center of Mass of Covered method (in short, WCM-of-Covered method). In- this method, weights are given to the various nodes which are part of the match. These weights are based on the number of connections between the nodes and child nodes of the match. The placement of the matched cell is based on the initial positions given to the nodes making up the match, and the weights calculated for those nodes. A system and method for selecting which covers to retain for each node reduces the computational burden for large logic cones and large cell libraries. At each node only K covers are retained. These covers have timing performances which are centered around the ideal timing performance for that node, and do not include inferior covers. The computational burden in selecting the covers for each node is based on the number K, and the number of inputs to that node.
BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 illustrates the partitioning of a DAG into logic cones and buffer trees. Figs. 2a and 2b illustrate the relationship between nodes of a logic cone and possible matches of those nodes. Figs. 3a, 3b, and 3c illustrate the relationship between nodes of a logic cone and possible covers at those nodes.
Fig. 4 illustrates a flowchart of the operation of one embodiment of the invention. Fig. 5 illustrates the weights associated with nodes of a matched cell. Fig. 6 illustrates the weighted center of mass method. Fig. 7 illustrates the relationship between a match and child nodes of the match.
Figs. 8a and 8b illustrate the timing performance matrix P. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The input to a technology mapper is a decomposed netlist made up of (i) basic 2-input AND gates, (ii) basic 2-input OR gates, (iii) inverters, and (iv) sequential elements. Logic cones of this netlist are identified, and the technology mapper operates on each of these logic cones. In the illustrated embodiment, the netlist has been constructed in a timing-driven manner, so that no restructuring of the netlist is necessary. Referring now to Fig. 4, a flowchart illustrates the operation of a technology mapping according to one embodiment of the invention. The technology mapper loops 400 through each node of a logic cone, in BFS order. First, all input nodes are mapped, then each successive layer of nodes. The output node of the logic cone is mapped last. At each node, matches are found 402 from a library of matchable cells. Each cell of the library which can match the current node, in either direct or inverted form, is added to a list of potential matches for that node. Each match includes the functionality of the current node and zero or more child nodes of the current node. The information which makes up each match can include: the current node, the matched library cell, the polarity of the match of the appropriate node output connector, the child nodes reached by that match, the correspondence between the child nodes and the gate input connectors, and the polarity of each of the child nodes.
The technology mapper then loops 404 through each of the potential matches for that node. For each match, the placement of the library cell corresponding to that match must be estimated 406. To do this, a matched cell is placed in the center of mass of the weighted positions of the different basic gates covered by the matched cell (the current node and child nodes covered by the match). As illustrated in Fig. 5, the weights are distributed to these nodes according to the number of connections from these nodes to nodes which are not part of the match. In the exemplary embodiment of the present invention, the weights are:
• 0 weight for a node which is not touching any node outside the matched cell (for instance the node b in Fig. 5); • 1 weight for a node touching exactly one node outside the matched cell (for instance the nodes a and c in Fig. 5); and
• 2 weight for a node touching exactly two of the nodes outside the matched cell (for instance the nodes d, e, and f in Fig. 4).
In this embodiment, no weight is specified for nodes touching three or more matched cell connections because, in that case, the matched cell only covers a single node, and no weighting is necessary. For alternate embodiments in which nodes can be in contact with more than three other nodes, a weight would be specified for nodes touching more than two nodes outside the matched cell.
The matched cell is then placed in the center of mass of the weighted nodes making up the match. Those nodes with a weight of 2 will exert twice the influence of nodes with a weight of 1. Those nodes with a weight of 0 will not exert any influence. Fig. 6 illustrates the implementation of a weighted center of mass calculation. First, a reference coordinate point is determined, such as point o. Then, for each weighted node (a, b, and c), a two-dimensional vector (va, Vb, and vc) from reference point o to the node is calculated. The number on each node of Fig. 6 shows the weight on that node. The magnitude of each vector (va, V , and vc) is multiplied by the weight of the associated node, and the multiplied vectors are summed. The magnitude of the summed vector is then divided by the sum of all node weights, yielding a vector V pointing to the weighted center of mass of the nodes.
This method has the advantage that interconnections are accounted for without requiring information about the position of the nodes driving and driven by the matched cell. It also has the advantage that it is relatively easy to implement. Note that in other embodiments, the weight values in the cases of one or two touched cell connections could be set to values other than 1 and 2.
After the location of the matched cell has been estimated, the pin-to-pin timing performance of each child cover of the match is estimated 408. In the general case, there will be nodes which are not part of the match, but which are child nodes of nodes which are part of the match. As illustrated in Fig. 7, nodes n and m are considered child nodes of the match. If there are such child nodes, they will have been visited by the technology mapper prior to the current node, and a set of K covers will have been determined for each of these match child nodes. In order to calculate the pin-to-pin timing performance of each child cover of the match, it is necessary to know where the match will be located, because the distance from the child cover to the match affect the capacitance, and therefore the timing, of the connection between them. Because the match location has been estimated 406, the timing performance for each cover of each child node of the match can be estimated directly. In order to avoid recomputing the timing performance too many times, the timing performance for each cover can be cached with the capacitance load which was used, so that if any future estimations of the timing performance for the cover have a similar capacitance, the timing performance can be read out of the cache. From these match cover timing performances, a timing performance matrix is determined 410. A timing performance matrix P is defined as an N by K matrix where each element Pu is the timing performance of the match due to the jth cover of the ith, child node of the match. These performances are computed by propagating the child node cover timing performance on the match timing arc from the child node to the match output node. As used here, a timing arc is a path from an input to the match to the output of the match. The performances of each row of matrix P corresponding to a single child node are ordered from best to worst, as illustrated in Fig. 8a. A sorted list of covers for the current node is constructed from worst to best. As indicated above, each cover will incorporate not only a particular match, but also a particular cover for each child node of that match. The worst cover for the current match will be the one using the child node covers in the column of matrix P which corresponds to the worst timing performances. In Fig. 8a, this is the far right column, which is made up of timings 3, 4, 9, 7, and 6 ns. The slowest of these timings, 9 ns, is the timing performance for the cover utilizing these child node covers. This cover is constructed 412 by combining the current match with each of the specified covers for the child nodes. A test is performed 414 to determine whether there are already at least K covers
within a predefined performance range, Δ, and whether the current cover is outside of Δ. In
one embodiment of the invention, it is preferable to find K covers within a range Δ of an
"ideal" performance time. Such an ideal performance time can be obtained from doing a Zero Slack Algorithm (ZSA) or Iterative Minimax-PERT (IMP) computation. The ZSA and IMP algorithms are described in Youssef, Habib, et al., "Bounds on Net Delays for VLSI Circuits", IEEE Transactions on Circuits and Systems, Vol. 39, No. 11, November 1992, which is incorporated by reference herein in its entirety. The IMP algorithm distributes slack as a function of weights specified on gate timing arcs. In the context of this embodiment, these weights can be automatically generated as a function of the flexibility of the logic cone of
which the gate is a part. Performance timings which are much slower than the ideal will result in unmet timing performance criteria. Performance timings which are much faster than the ideal will often
result in non-optimum timing and area tradeoffs. After K covers within Δ have been
identified, it is no longer necessary to consider covers which are not in Δ. In one embodiment
of the invention, Δ is equal to K times τ. If both of these tests are true, then there are no more
covers from the current match for the cover list, and the end of the loop for the current match 422 has been reached. Otherwise, another test is performed 416 to determine whether the current cover is inferior to another cover in the list. A cover can be considered inferior, for example, if it has slower timing than another cover and it has an area which is at least as large as that other cover. At this stage, other criteria can be applied to determine whether the cover should be retained. For example, if the cover violates any logic design rules, or if the cover creates placement problems, the cover should be rejected as though it were inferior. If the current cover is not rejected, then the cover is added 418 to the list of covers for this match. After adding the cover 418 (in the case of non-rejected covers), or after determining 416 that a cover is inferior, matrix P is adjusted 420 to remove the current cover. Each instance of the current timing performance, in this case the 9 ns timing performance, is eliminated from matrix P and each such row is shifted to the right, as in Fig. 8b. The new right-hand column corresponds to a different cover, with a better timing performance, in this case 8 ns. A new cover is constructed 412 for this column, and the process is repeated until at least one row has been entirely eliminated, in this case after the 4 ns cover has been added to the sorted fist.
At this point the current match is complete 422, and execution continues with the next match 404. This process is continued, adding covers to the cover list for the current node, until all matches have been exhausted.
At this point the cover list is complete. The K covers which are closest to the ideal performance timing are retained 424, and the other covers are deleted. In one embodiment, K
is 3 and Δ is computed to be K*τ, where τ is half of the pin-to-pin delay timing of the fastest
inverter in the cell library.
After determining the final list of K covers for the current node, the end of the node loop 426 is reached and execution continues with the next node 400. After all nodes have been covered, the last node visited, the "root node" will have K individual covers, each implying a particular match for each node of the tree. The optimum root node cover is selected, for example, by determining which is closest to the ideal timing performance for the entire tree. This root node cover includes all of the information necessary to determine which match is appropriate for each node of the tree.
The above description is included to illustrate the operation of exemplary embodiments and is not meant to limit the scope of the invention. The scope of the invention is to be limited only by the following claims. From the above description, many variations will be apparent to one skilled in the art that would yet be encompassed by the spirit and scope of the present invention.

Claims

What is claimed is:CLAIMS
1. A method of determining a set of K covers for a node, wherein a cover comprises a match and a cover for each child node of the match, the node has at least one match associated with it, each match is associated with at least one child node, each child node has a set of covers associated with it, and the node has a desired timing performance associated with it, the method comprising the steps of: initializing a list of covers associated with the node; for each match associated with the node: creating at least one cover based on the match and based on at least one cover of each child node of the match; comparing the created cover to at least one retention criterion; and responsive to the comparison indicating that the created cover should be retained, adding the created cover to the list of covers associated with the node; and selecting K covers from the list of covers.
2. The method of claim 1 wherein the step of selecting K covers from the list of covers comprises selecting from the list of covers the K covers with timing performances nearest to the desired timing performance.
3. The method of claim 1 wherein the step of selecting K covers from the list of covers comprises the substeps of: determining a range of timing performances centered around the desired timing performance; dividing the range into K segments; and for each segment selecting from the list of covers one cover with a timing performance within the segment.
4. The method of claim 1 wherein the desired timing performance is based on results from performing an Iterative Minimax-PERT analysis of a logic cone which includes the node.
5. The method of claim 1 wherein the desired timing performance is based on results from performing Zero Slack Algorithm analysis of a logic cone which includes the node.
6. The method of claim 1 wherein at least one retention criterion is whether the created cover is inferior to any covers in the list of covers.
7. The method of claim 1 wherein at least one retention criterion is whether the created cover violates any logic design rules.
8. The method of claim 1 wherein at least one retention criterion is the extent to which the created cover creates a placement problem.
9. The method of claim 1 wherein the set of covers associated with each child node includes K covers.
10. A method of determining a set of K covers for a node, wherein a cover comprises a match and a cover for each child node of the match, the node has at least one match associated with it, each match is associated with at least one child node, each child node has a set of covers associated with it, and the node has a desired timing performance associated with it, the method comprising the steps of: initializing a list of covers associated with the node; for each match associated with the node: creating at least one cover based on the match and based on at least one cover of each child node of the match; and adding the created cover to the list of covers associated with the node; and selecting from the list of covers the K covers with timing performances nearest to the desired timing performance.
11. A system for determining a set of K covers for a node, wherein a cover comprises a match and a cover for each child node of the match, the node has at least one match associated with it, each match is associated with at least one child node, each child node has a set of covers associated with it, and the node has a desired timing performance associated with it, the system comprising: means for initializing a list of covers associated with the node; for each match associated with the node: means for creating at least one cover based on the match and based on at least one cover of each child node of the match; means for comparing the created cover to at least one retention criterion; and means for, responsive to the comparison indicating that the created cover should be retained, adding the created cover to the list of covers associated with the node; and means for selecting K covers from the list of covers.
12. The system of claim 11 wherein the means for selecting K covers from the list of covers comprises means for selecting from the list of covers the K covers with timing performances nearest to the desired timing performance.
13. The system of claim 11 wherein the means for selecting K covers from the list of covers comprises: means for determining a range of timing performances centered around the desired timing performance; means for dividing the range into K segments; and for each segment, means for selecting from the list of covers one cover with a timing performance within the segment.
14. The system of claim 11 wherein at least one retention criterion is whether the created cover is inferior to any covers in the list of covers.
15. The system of claim 11 wherein at least one retention criterion is to whether the created cover violates any logic design rules.
16. The system of claim 11 wherein at least one retention criterion is the extent to which the created cover creates a placement problem.
17. A computer readable medium containing a computer program for determining a set of K covers for a node, wherein a cover comprises a match and a cover for each child node of the match, the node has at least one match associated with it, each match is associated with at least one child node, each child node has a set of covers associated with it, and the node has a desired timing performance associated with it, the computer program, when executed by a processor, performing the steps of: initializing a list of covers associated with the node; for each match associated with the node: creating at least one cover based on the match and based on at least one cover of each child node of the match; comparing the created cover to at least one retention criterion; and responsive to the comparison indicating that the created cover should be retained, adding the created cover to the list of covers associated with the node; and selecting K covers from the list of covers.
18. The computer readable medium of claim 17 wherein the step of selecting K covers from the list of covers comprises selecting from the list of covers the K covers with timing performances nearest to the desired timing performance.
19. The computer readable medium of claim 17 wherein the step of selecting K covers from the list of covers comprises the substeps of: determining a range of timing performances centered around the desired timing performance; dividing the range into K segments; and for each segment, selecting from the list of covers one cover with a timing performance within the segment.
20. The computer readable medium of claim 17 wherein at least one retention criterion is whether the created cover is inferior to any covers in the list of covers.
21. The computer readable medium of claim 17 wherein at least one retention criterion is whether the created cover violates any logic design rules.
22. The computer readable medium of claim 17 wherein at least one retention criterion is the extent to which the created cover creates a placement problem.
PCT/US2000/013919 1999-05-28 2000-05-19 Using budgeted required time during technology mapping WO2000073925A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/322,696 1999-05-28
US09/322,696 US6378116B1 (en) 1999-05-28 1999-05-28 Using budgeted required time during technology mapping

Publications (2)

Publication Number Publication Date
WO2000073925A2 true WO2000073925A2 (en) 2000-12-07
WO2000073925A3 WO2000073925A3 (en) 2001-09-13

Family

ID=23256020

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/013919 WO2000073925A2 (en) 1999-05-28 2000-05-19 Using budgeted required time during technology mapping

Country Status (2)

Country Link
US (1) US6378116B1 (en)
WO (1) WO2000073925A2 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6519743B1 (en) * 2000-08-24 2003-02-11 Cadence Design Systems, Inc. Method and system for timing and area driven binary and/or matching
US6836753B1 (en) * 2001-06-13 2004-12-28 Cadence Design Systems, Inc. Cone slack allocator for computing time budgets
JP2007004563A (en) * 2005-06-24 2007-01-11 Nec Electronics Corp Library creating device, library creation program and library creating method
US7877711B2 (en) * 2006-03-01 2011-01-25 Nangate A/S Methods of deriving switch networks
US7634743B1 (en) 2006-07-21 2009-12-15 Cadence Design Systems, Inc. Method for updating a placed and routed netlist
US9286421B1 (en) 2014-08-05 2016-03-15 Cadence Design Systems, Inc. Methods, systems, and articles of manufacture for back annotating and visualizing parasitic models of electronic designs
US9779193B1 (en) 2015-03-31 2017-10-03 Cadence Design Systems, Inc. Methods, systems, and computer program product for implementing electronic design layouts with symbolic representations
US9881119B1 (en) 2015-06-29 2018-01-30 Cadence Design Systems, Inc. Methods, systems, and computer program product for constructing a simulation schematic of an electronic design across multiple design fabrics
US10346573B1 (en) 2015-09-30 2019-07-09 Cadence Design Systems, Inc. Method and system for performing incremental post layout simulation with layout edits
US9881120B1 (en) 2015-09-30 2018-01-30 Cadence Design Systems, Inc. Method, system, and computer program product for implementing a multi-fabric mixed-signal design spanning across multiple design fabrics with electrical and thermal analysis awareness
US9798840B1 (en) 2015-10-15 2017-10-24 Cadence Design Systems, Inc. Methods, systems, and computer program product for implementing a simulation platform with dynamic device model libraries for electronic designs
US10331841B1 (en) 2016-01-15 2019-06-25 Cadence Design Systems, Inc. Methods, systems, and computer program product for implementing virtual prototyping for electronic designs
US10354037B1 (en) 2016-06-30 2019-07-16 Cadence Design Systems, Inc. Methods, systems, and computer program product for implementing an electronic design by manipulating a hierarchical structure of the electronic design
US9934354B1 (en) 2016-06-30 2018-04-03 Cadence Design Systems, Inc. Methods, systems, and computer program product for implementing a layout-driven, multi-fabric schematic design
US10133841B1 (en) 2016-09-30 2018-11-20 Cadence Design Systems, Inc. Methods, systems, and computer program product for implementing three-dimensional integrated circuit designs

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5787010A (en) * 1992-04-02 1998-07-28 Schaefer; Thomas J. Enhanced dynamic programming method for technology mapping of combinational logic circuits
US5801957A (en) * 1995-11-01 1998-09-01 Digital Equipment Corporation Implicit tree-mapping technique

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5524082A (en) * 1991-06-28 1996-06-04 International Business Machines Corporation Redundancy removal using quasi-algebraic methods
US5513124A (en) 1991-10-30 1996-04-30 Xilinx, Inc. Logic placement using positionally asymmetrical partitioning method
US5349659A (en) 1992-01-23 1994-09-20 Cadence Design Systems, Inc. Hierarchical ordering of logical elements in the canonical mapping of net lists
US5553000A (en) * 1992-11-05 1996-09-03 Nec Usa, Inc. Eliminating retiming bottlenecks to improve performance of synchronous sequential VLSI circuits
US5526276A (en) 1994-04-21 1996-06-11 Quicklogic Corporation Select set-based technology mapping method and apparatus
US5668732A (en) * 1994-06-03 1997-09-16 Synopsys, Inc. Method for estimating power consumption of a cyclic sequential electronic circuit
US5537330A (en) 1994-06-10 1996-07-16 International Business Machines Corporation Method for mapping in logic synthesis by logic classification
JPH08212246A (en) 1995-02-08 1996-08-20 Hitachi Ltd Logic generation method
US5838585A (en) * 1995-03-24 1998-11-17 Lsi Logic Corporation Physical design automation system and method using monotonically improving linear clusterization
US5805462A (en) * 1995-08-18 1998-09-08 Vlsi Technology, Inc. Automatic synthesis of integrated circuits employing boolean decomposition
US5815406A (en) 1996-03-25 1998-09-29 International Business Machines Corporation Method and system for designing a circuit using RC and timing weighting of nets
US5754454A (en) * 1997-03-03 1998-05-19 Motorola, Inc. Method for determining functional equivalence between design models
US5974242A (en) * 1997-09-25 1999-10-26 The United States Of America As Represented By The Secretary Of The Army Methods and computer programs for minimizing logic circuit design using identity cells
US6195788B1 (en) * 1997-10-17 2001-02-27 Altera Corporation Mapping heterogeneous logic elements in a programmable logic device
US6154874A (en) * 1998-04-17 2000-11-28 Lsi Logic Corporation Memory-saving method and apparatus for partitioning high fanout nets

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5787010A (en) * 1992-04-02 1998-07-28 Schaefer; Thomas J. Enhanced dynamic programming method for technology mapping of combinational logic circuits
US5801957A (en) * 1995-11-01 1998-09-01 Digital Equipment Corporation Implicit tree-mapping technique

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HINSBERGER U ET AL: "Boolean matching for large libraries" PROCEEDINGS 1998 DESIGN AND AUTOMATION CONFERENCE. 35TH DAC. (CAT. NO.98CH36175), PROCEEDINGS 1998 DESIGN AND AUTOMATION CONFERENCE. 35TH DAC, SAN FRANCISCO, CA, USA, 15-19 JUNE 1998, pages 206-211, XP002163813 1998, New York, NY, USA, IEEE, USA ISBN: 0-89791-964-5 *
PEDRAM M ET AL: "Combining technology mapping with layout" VLSI DESIGN, 1997, GORDON & BREACH, SWITZERLAND, vol. 5, no. 2, pages 111-124, XP000992465 ISSN: 1065-514X *

Also Published As

Publication number Publication date
WO2000073925A3 (en) 2001-09-13
US6378116B1 (en) 2002-04-23

Similar Documents

Publication Publication Date Title
EP1192559B1 (en) Updating placement during technology mapping
US6701505B1 (en) Circuit optimization for minimum path timing violations
JP2891328B2 (en) A Method of Generating Delay Time Values for Multilevel Hierarchical Circuit Design
US6286128B1 (en) Method for design optimization using logical and physical information
JP3836715B2 (en) System and method for inserting leakage reduction control into a logic circuit
US5396435A (en) Automated circuit design system and method for reducing critical path delay times
US7676780B2 (en) Techniques for super fast buffer insertion
US6378116B1 (en) Using budgeted required time during technology mapping
US6334205B1 (en) Wavefront technology mapping
US5553000A (en) Eliminating retiming bottlenecks to improve performance of synchronous sequential VLSI circuits
JPH04316151A (en) Method for minimizing bus delay and for optimizing machine-cycle time
JP2002500435A (en) Timing closure method
US6836753B1 (en) Cone slack allocator for computing time budgets
US6763513B1 (en) Clock tree synthesizer for balancing reconvergent and crossover clock trees
US6601226B1 (en) Tightloop method of timing driven placement
US20040123261A1 (en) Buffer insertion with adaptive blockage avoidance
US6640330B1 (en) System and method for setup and hold characterization in integrated circuit cells
US7168057B2 (en) Targeted optimization of buffer-tree logic
US5805459A (en) Method of measuring activity in a digital circuit
Zapletina et al. The acceleration techniques for the modified pathfinder routing algorithm on an island-style FPGA
Fujita et al. Delay estimation and optimization of logic circuits: a survey
Xiao et al. Functional correlation analysis in crosstalk induced critical paths identification
Sharma et al. Development of a place and route tool for the RaPiD architecture
Zheng et al. Topopart: a multi-level topology-driven partitioning framework for multi-fpga systems
US7010765B2 (en) Method for identifying removable inverters in an IC design

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP