The document summarizes the physical design flow for integrated circuits and routing algorithms. It discusses the objectives of routing to minimize wire length for general purpose chips and meet timing budgets for high performance chips. Global routing algorithms like maze routing and Lee algorithm are described. Maze routing works by propagating a wavefront from source to target and backtracking the shortest path. The Lee algorithm finds the shortest two-terminal connection on a grid using this approach.
Module 3 Part B - computer networks module 2 pptanushaj46
Ìý
The document discusses several key issues in network layer design including store-and-forward packet switching, services provided to the transport layer, implementation of connectionless and connection-oriented services, and comparison of virtual-circuit and datagram networks. It also covers routing algorithms such as shortest path, flooding, distance vector, link state, and hierarchical routing.
This document discusses ad-hoc wireless networks and provides examples of different types including sensor networks and vehicular networks. It summarizes key challenges in routing for ad-hoc networks due to lack of infrastructure, mobility, and limited bandwidth. Specific routing protocols for ad-hoc networks like DSR are described, focusing on on-demand route discovery and maintenance. Considerations for sensor networks include power efficiency through data aggregation and computation instead of communication. Vehicular networks introduce extreme mobility that makes traditional routing difficult.
The document discusses network layer design issues and protocols. It covers store-and-forward packet switching, the functions of the network layer including routing and congestion control. It then describes the implementation of connectionless and connection-oriented services, comparing virtual circuits and datagrams. Various routing algorithms are also summarized, such as shortest path, flooding, distance vector, and link state routing.
This document provides an overview of key concepts in network layer design, including:
- Store-and-forward packet switching and the services provided to the transport layer.
- Implementation of connectionless and connection-oriented services, and comparison of virtual circuits and datagrams.
- Routing algorithms like shortest path, flooding, distance vector, link state, and hierarchical routing.
- Quality of service techniques including integrated services, differentiated services, and MPLS.
- Internetworking issues such as connecting different networks, concatenated virtual circuits, tunneling, and fragmentation.
- An overview of the network layer in the Internet including IP, addressing, routing protocols like OSPF and BGP, and
This document provides an overview of key concepts in network layer delivery, forwarding, and routing. It discusses delivery and forwarding of packets, including direct vs indirect delivery and next-hop vs route forwarding methods. It also summarizes several unicast routing protocols, including distance vector protocols like RIP and link state protocols like OSPF. Finally, it discusses path vector routing and Border Gateway Protocol (BGP) for interdomain routing.
Routing protocols for ad hoc networks can be classified as table-driven, on-demand, or hybrid. Table-driven protocols maintain fresh routing tables through periodic updates but generate high overhead. On-demand protocols discover routes only when needed via flooding but have high latency. Hybrid protocols combine the advantages of both approaches. Example protocols discussed include DSDV, DSR, AODV, and CGSR.
The document discusses different types of line configurations, network topologies, and transmission modes. There are two line configurations: point-to-point, which provides a dedicated link between two devices, and multipoint, which allows more than two devices to share a single link. Common network topologies include bus, star, ring, and mesh. Transmission modes include simplex, half-duplex, and full-duplex. The document also defines local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs).
Routing algorithms in computer networks determine the best path for data transfer between nodes. There are two main types - non-adaptive algorithms which use static routes regardless of network conditions, and adaptive algorithms which can change routes dynamically based on conditions. Examples of routing algorithms include flooding, which broadcasts to all nodes, and link state routing which uses Dijkstra's algorithm to calculate the most efficient paths based on information shared between nodes.
This document provides an overview of wireless ad-hoc networks. It discusses the definition and types of multi-hop wireless networks. Some key technical challenges for ad-hoc networks are limited wireless range, mobility, and energy constraints. The document reviews several media access and routing protocols used in ad-hoc networks, including MACA, DSDV, AODV and DSR. It also discusses providing quality of service in ad-hoc networks and some of the challenges in routing, maintenance and variable resources. In conclusion, the document states that flexibility, low cost and applications make ad-hoc networks an essential part of future pervasive computing environments.
The document discusses network layer concepts including routing, forwarding, routing algorithms, and routing protocols.
It begins by explaining the duties of the network layer including interconnecting networks, assigning unique addresses, and encapsulating data from the transport layer. It then discusses routing concepts such as delivery, forwarding using techniques like next-hop routing, and routing tables.
Common routing algorithms are also summarized like distance vector routing using RIP, link state routing using OSPF, and path vector routing. Popular unicast routing protocols and multicast protocols are also briefly mentioned including MOSPF, DVMRP, CBT, and PIM.
The document provides information about network layer concepts including routing, forwarding, routing tables, routing algorithms, and routing protocols.
It discusses key network layer duties like interconnecting networks, assigning unique addresses, and encapsulating data for transfer between networks. Forwarding techniques like next-hop routing and network-specific routing are covered. Popular routing algorithms like distance vector routing, link state routing, and path vector routing are summarized.
Common routing protocols for both unicast (RIP) and multicast (MOSPF, DVMRP, CBT, PIM) are introduced along with their basic operations and differences between source-based and group-shared routing trees. IPv4 addressing and IPv6 improvements like larger addresses
this is a presentation i made to give some introduction to the backward learning algorithm hope it would be use full.Many places were referred to get information here
This document provides an overview of circuit-switched and datagram networks. It discusses:
- Circuit-switched networks require a setup phase to establish a dedicated connection between stations before data transfer can occur. Resources are allocated for the entire connection duration.
- Datagram networks divide messages into packets that are routed independently through the network. Packets may arrive out of order and be lost due to lack of dedicated resources.
- Switches in circuit-switched networks use space-division or time-division techniques, while packet switches contain input/output ports, a routing processor, and a switching fabric to route packets based on destination addresses in routing tables.
What are the only force you have become too much of work and all I can be done by my name Vishnu namaste I have to do you have to do you have to do you have to do you have to.
This document summarizes techniques for minimizing crosstalk in VLSI designs. It discusses the VLSI design cycle and physical design cycle. Routing is a key stage that involves global and detailed routing. Crosstalk occurs due to mutual inductance and capacitance between wires and can affect signal integrity, delay, and timing. Basic approaches to reduce crosstalk include segregating wires, increasing spacing between wires, using ground shields, optimizing the net ordering and layer assignments. Specific techniques mentioned are widening spacing, minimizing wire heights and lengths of parallel runs, using differential routing, and routing orthogonal layers.
Routing protocols are essential for wireless sensor networks to efficiently transmit collected sensor data to data sinks. The document discusses several challenges in designing routing protocols for wireless sensor networks and surveys different routing techniques including flat, hierarchical, and geographic routing. It provides LEACH and PEGASIS as examples of hierarchical routing protocols that use clustering and data aggregation to reduce energy consumption.
Routing protocols designed for ad hoc wireless networks must address high node mobility, bandwidth constraints, and limited resources. Common issues in designing routing protocols include frequent path breaks due to node movement, overhead of maintaining topology information, and hidden and exposed terminal problems. Ideal routing protocols are distributed, adapt to topology changes quickly, are localized, avoid loops and stale routes, and optimize scarce resources like bandwidth and battery power. Routing protocols can be classified based on how routing information is updated, whether temporal information is used, the network topology, and how resources are utilized.
This document discusses network topologies, switching, and routing algorithms. It defines different network topologies including mesh, star, bus, ring, tree, and hybrid topologies. It also describes hubs, switches, circuit switching, message switching, packet switching, datagram networks, and virtual circuit networks. For routing algorithms, it explains distance vector routing which uses hop count as the routing metric and link state routing which uses weighted metrics to calculate the shortest path.
routing table ,What is routing ? , what is static routing , what is dynamic routing , types of routing , routing protocols , routing strategy , Download Routing pdf , Download routing ppt , download routing notes , paper on routing
To Download Complete Documentation Visit My Blog
http://studyofcs.blogspot.com/2015/06/what-is-routerwhat-is-routing.html
Download completer BS Computer Science Degree Study Data
http://studyofcs.blogspot.com/p/bs.html
Preface: The ReGenX Generator innovation operates with a US Patented Frequency Dependent Load
Current Delay which delays the creation and storage of created Electromagnetic Field Energy around
the exterior of the generator coil. The result is the created and Time Delayed Electromagnetic Field
Energy performs any magnitude of Positive Electro-Mechanical Work at infinite efficiency on the
generator's Rotating Magnetic Field, increasing its Kinetic Energy and increasing the Kinetic Energy of
an EV or ICE Vehicle to any magnitude without requiring any Externally Supplied Input Energy. In
Electricity Generation applications the ReGenX Generator innovation now allows all electricity to be
generated at infinite efficiency requiring zero Input Energy, zero Input Energy Cost, while producing
zero Greenhouse Gas Emissions, zero Air Pollution and zero Nuclear Waste during the Electricity
Generation Phase. In Electric Motor operation the ReGen-X Quantum Motor now allows any
magnitude of Work to be performed with zero Electric Input Energy.
Demonstration Protocol: The demonstration protocol involves three prototypes;
1. Protytpe #1, demonstrates the ReGenX Generator's Load Current Time Delay when compared
to the instantaneous Load Current Sine Wave for a Conventional Generator Coil.
2. In the Conventional Faraday Generator operation the created Electromagnetic Field Energy
performs Negative Work at infinite efficiency and it reduces the Kinetic Energy of the system.
3. The Magnitude of the Negative Work / System Kinetic Energy Reduction (in Joules) is equal to
the Magnitude of the created Electromagnetic Field Energy (also in Joules).
4. When the Conventional Faraday Generator is placed On-Load, Negative Work is performed and
the speed of the system decreases according to Lenz's Law of Induction.
5. In order to maintain the System Speed and the Electric Power magnitude to the Loads,
additional Input Power must be supplied to the Prime Mover and additional Mechanical Input
Power must be supplied to the Generator's Drive Shaft.
6. For example, if 100 Watts of Electric Power is delivered to the Load by the Faraday Generator,
an additional >100 Watts of Mechanical Input Power must be supplied to the Generator's Drive
Shaft by the Prime Mover.
7. If 1 MW of Electric Power is delivered to the Load by the Faraday Generator, an additional >1
MW Watts of Mechanical Input Power must be supplied to the Generator's Drive Shaft by the
Prime Mover.
8. Generally speaking the ratio is 2 Watts of Mechanical Input Power to every 1 Watt of Electric
Output Power generated.
9. The increase in Drive Shaft Mechanical Input Power is provided by the Prime Mover and the
Input Energy Source which powers the Prime Mover.
10. In the Heins ReGenX Generator operation the created and Time Delayed Electromagnetic Field
Energy performs Positive Work at infinite efficiency and it increases the Kinetic Energy of the
system.
This document provides an overview of key concepts in network layer design, including:
- Store-and-forward packet switching and the services provided to the transport layer.
- Implementation of connectionless and connection-oriented services, and comparison of virtual circuits and datagrams.
- Routing algorithms like shortest path, flooding, distance vector, link state, and hierarchical routing.
- Quality of service techniques including integrated services, differentiated services, and MPLS.
- Internetworking issues such as connecting different networks, concatenated virtual circuits, tunneling, and fragmentation.
- An overview of the network layer in the Internet including IP, addressing, routing protocols like OSPF and BGP, and
This document provides an overview of key concepts in network layer delivery, forwarding, and routing. It discusses delivery and forwarding of packets, including direct vs indirect delivery and next-hop vs route forwarding methods. It also summarizes several unicast routing protocols, including distance vector protocols like RIP and link state protocols like OSPF. Finally, it discusses path vector routing and Border Gateway Protocol (BGP) for interdomain routing.
Routing protocols for ad hoc networks can be classified as table-driven, on-demand, or hybrid. Table-driven protocols maintain fresh routing tables through periodic updates but generate high overhead. On-demand protocols discover routes only when needed via flooding but have high latency. Hybrid protocols combine the advantages of both approaches. Example protocols discussed include DSDV, DSR, AODV, and CGSR.
The document discusses different types of line configurations, network topologies, and transmission modes. There are two line configurations: point-to-point, which provides a dedicated link between two devices, and multipoint, which allows more than two devices to share a single link. Common network topologies include bus, star, ring, and mesh. Transmission modes include simplex, half-duplex, and full-duplex. The document also defines local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs).
Routing algorithms in computer networks determine the best path for data transfer between nodes. There are two main types - non-adaptive algorithms which use static routes regardless of network conditions, and adaptive algorithms which can change routes dynamically based on conditions. Examples of routing algorithms include flooding, which broadcasts to all nodes, and link state routing which uses Dijkstra's algorithm to calculate the most efficient paths based on information shared between nodes.
This document provides an overview of wireless ad-hoc networks. It discusses the definition and types of multi-hop wireless networks. Some key technical challenges for ad-hoc networks are limited wireless range, mobility, and energy constraints. The document reviews several media access and routing protocols used in ad-hoc networks, including MACA, DSDV, AODV and DSR. It also discusses providing quality of service in ad-hoc networks and some of the challenges in routing, maintenance and variable resources. In conclusion, the document states that flexibility, low cost and applications make ad-hoc networks an essential part of future pervasive computing environments.
The document discusses network layer concepts including routing, forwarding, routing algorithms, and routing protocols.
It begins by explaining the duties of the network layer including interconnecting networks, assigning unique addresses, and encapsulating data from the transport layer. It then discusses routing concepts such as delivery, forwarding using techniques like next-hop routing, and routing tables.
Common routing algorithms are also summarized like distance vector routing using RIP, link state routing using OSPF, and path vector routing. Popular unicast routing protocols and multicast protocols are also briefly mentioned including MOSPF, DVMRP, CBT, and PIM.
The document provides information about network layer concepts including routing, forwarding, routing tables, routing algorithms, and routing protocols.
It discusses key network layer duties like interconnecting networks, assigning unique addresses, and encapsulating data for transfer between networks. Forwarding techniques like next-hop routing and network-specific routing are covered. Popular routing algorithms like distance vector routing, link state routing, and path vector routing are summarized.
Common routing protocols for both unicast (RIP) and multicast (MOSPF, DVMRP, CBT, PIM) are introduced along with their basic operations and differences between source-based and group-shared routing trees. IPv4 addressing and IPv6 improvements like larger addresses
this is a presentation i made to give some introduction to the backward learning algorithm hope it would be use full.Many places were referred to get information here
This document provides an overview of circuit-switched and datagram networks. It discusses:
- Circuit-switched networks require a setup phase to establish a dedicated connection between stations before data transfer can occur. Resources are allocated for the entire connection duration.
- Datagram networks divide messages into packets that are routed independently through the network. Packets may arrive out of order and be lost due to lack of dedicated resources.
- Switches in circuit-switched networks use space-division or time-division techniques, while packet switches contain input/output ports, a routing processor, and a switching fabric to route packets based on destination addresses in routing tables.
What are the only force you have become too much of work and all I can be done by my name Vishnu namaste I have to do you have to do you have to do you have to do you have to.
This document summarizes techniques for minimizing crosstalk in VLSI designs. It discusses the VLSI design cycle and physical design cycle. Routing is a key stage that involves global and detailed routing. Crosstalk occurs due to mutual inductance and capacitance between wires and can affect signal integrity, delay, and timing. Basic approaches to reduce crosstalk include segregating wires, increasing spacing between wires, using ground shields, optimizing the net ordering and layer assignments. Specific techniques mentioned are widening spacing, minimizing wire heights and lengths of parallel runs, using differential routing, and routing orthogonal layers.
Routing protocols are essential for wireless sensor networks to efficiently transmit collected sensor data to data sinks. The document discusses several challenges in designing routing protocols for wireless sensor networks and surveys different routing techniques including flat, hierarchical, and geographic routing. It provides LEACH and PEGASIS as examples of hierarchical routing protocols that use clustering and data aggregation to reduce energy consumption.
Routing protocols designed for ad hoc wireless networks must address high node mobility, bandwidth constraints, and limited resources. Common issues in designing routing protocols include frequent path breaks due to node movement, overhead of maintaining topology information, and hidden and exposed terminal problems. Ideal routing protocols are distributed, adapt to topology changes quickly, are localized, avoid loops and stale routes, and optimize scarce resources like bandwidth and battery power. Routing protocols can be classified based on how routing information is updated, whether temporal information is used, the network topology, and how resources are utilized.
This document discusses network topologies, switching, and routing algorithms. It defines different network topologies including mesh, star, bus, ring, tree, and hybrid topologies. It also describes hubs, switches, circuit switching, message switching, packet switching, datagram networks, and virtual circuit networks. For routing algorithms, it explains distance vector routing which uses hop count as the routing metric and link state routing which uses weighted metrics to calculate the shortest path.
routing table ,What is routing ? , what is static routing , what is dynamic routing , types of routing , routing protocols , routing strategy , Download Routing pdf , Download routing ppt , download routing notes , paper on routing
To Download Complete Documentation Visit My Blog
http://studyofcs.blogspot.com/2015/06/what-is-routerwhat-is-routing.html
Download completer BS Computer Science Degree Study Data
http://studyofcs.blogspot.com/p/bs.html
Preface: The ReGenX Generator innovation operates with a US Patented Frequency Dependent Load
Current Delay which delays the creation and storage of created Electromagnetic Field Energy around
the exterior of the generator coil. The result is the created and Time Delayed Electromagnetic Field
Energy performs any magnitude of Positive Electro-Mechanical Work at infinite efficiency on the
generator's Rotating Magnetic Field, increasing its Kinetic Energy and increasing the Kinetic Energy of
an EV or ICE Vehicle to any magnitude without requiring any Externally Supplied Input Energy. In
Electricity Generation applications the ReGenX Generator innovation now allows all electricity to be
generated at infinite efficiency requiring zero Input Energy, zero Input Energy Cost, while producing
zero Greenhouse Gas Emissions, zero Air Pollution and zero Nuclear Waste during the Electricity
Generation Phase. In Electric Motor operation the ReGen-X Quantum Motor now allows any
magnitude of Work to be performed with zero Electric Input Energy.
Demonstration Protocol: The demonstration protocol involves three prototypes;
1. Protytpe #1, demonstrates the ReGenX Generator's Load Current Time Delay when compared
to the instantaneous Load Current Sine Wave for a Conventional Generator Coil.
2. In the Conventional Faraday Generator operation the created Electromagnetic Field Energy
performs Negative Work at infinite efficiency and it reduces the Kinetic Energy of the system.
3. The Magnitude of the Negative Work / System Kinetic Energy Reduction (in Joules) is equal to
the Magnitude of the created Electromagnetic Field Energy (also in Joules).
4. When the Conventional Faraday Generator is placed On-Load, Negative Work is performed and
the speed of the system decreases according to Lenz's Law of Induction.
5. In order to maintain the System Speed and the Electric Power magnitude to the Loads,
additional Input Power must be supplied to the Prime Mover and additional Mechanical Input
Power must be supplied to the Generator's Drive Shaft.
6. For example, if 100 Watts of Electric Power is delivered to the Load by the Faraday Generator,
an additional >100 Watts of Mechanical Input Power must be supplied to the Generator's Drive
Shaft by the Prime Mover.
7. If 1 MW of Electric Power is delivered to the Load by the Faraday Generator, an additional >1
MW Watts of Mechanical Input Power must be supplied to the Generator's Drive Shaft by the
Prime Mover.
8. Generally speaking the ratio is 2 Watts of Mechanical Input Power to every 1 Watt of Electric
Output Power generated.
9. The increase in Drive Shaft Mechanical Input Power is provided by the Prime Mover and the
Input Energy Source which powers the Prime Mover.
10. In the Heins ReGenX Generator operation the created and Time Delayed Electromagnetic Field
Energy performs Positive Work at infinite efficiency and it increases the Kinetic Energy of the
system.
Welcome to the March 2025 issue of WIPAC Monthly the magazine brought to you by the LinkedIn Group WIPAC Monthly.
In this month's edition, on top of the month's news from the water industry we cover subjects from the intelligent use of wastewater networks, the use of machine learning in water quality as well as how, we as an industry, need to develop the skills base in developing areas such as Machine Learning and Artificial Intelligence.
Enjoy the latest edition
Integration of Additive Manufacturing (AM) with IoT : A Smart Manufacturing A...ASHISHDESAI85
Ìý
Combining 3D printing with Internet of Things (IoT) enables the creation of smart, connected, and customizable objects that can monitor, control, and optimize their performance, potentially revolutionizing various industries. oT-enabled 3D printers can use sensors to monitor the quality of prints during the printing process. If any defects or deviations from the desired specifications are detected, the printer can adjust its parameters in real time to ensure that the final product meets the required standards.
Preface: The ReGenX Generator innovation operates with a US Patented Frequency Dependent Load Current Delay which delays the creation and storage of created Electromagnetic Field Energy around the exterior of the generator coil. The result is the created and Time Delayed Electromagnetic Field Energy performs any magnitude of Positive Electro-Mechanical Work at infinite efficiency on the generator's Rotating Magnetic Field, increasing its Kinetic Energy and increasing the Kinetic Energy of an EV or ICE Vehicle to any magnitude without requiring any Externally Supplied Input Energy. In Electricity Generation applications the ReGenX Generator innovation now allows all electricity to be generated at infinite efficiency requiring zero Input Energy, zero Input Energy Cost, while producing zero Greenhouse Gas Emissions, zero Air Pollution and zero Nuclear Waste during the Electricity Generation Phase. In Electric Motor operation the ReGen-X Quantum Motor now allows any magnitude of Work to be performed with zero Electric Input Energy.
Demonstration Protocol: The demonstration protocol involves three prototypes;
1. Protytpe #1, demonstrates the ReGenX Generator's Load Current Time Delay when compared to the instantaneous Load Current Sine Wave for a Conventional Generator Coil.
2. In the Conventional Faraday Generator operation the created Electromagnetic Field Energy performs Negative Work at infinite efficiency and it reduces the Kinetic Energy of the system.
3. The Magnitude of the Negative Work / System Kinetic Energy Reduction (in Joules) is equal to the Magnitude of the created Electromagnetic Field Energy (also in Joules).
4. When the Conventional Faraday Generator is placed On-Load, Negative Work is performed and the speed of the system decreases according to Lenz's Law of Induction.
5. In order to maintain the System Speed and the Electric Power magnitude to the Loads, additional Input Power must be supplied to the Prime Mover and additional Mechanical Input Power must be supplied to the Generator's Drive Shaft.
6. For example, if 100 Watts of Electric Power is delivered to the Load by the Faraday Generator, an additional >100 Watts of Mechanical Input Power must be supplied to the Generator's Drive Shaft by the Prime Mover.
7. If 1 MW of Electric Power is delivered to the Load by the Faraday Generator, an additional >1 MW Watts of Mechanical Input Power must be supplied to the Generator's Drive Shaft by the Prime Mover.
8. Generally speaking the ratio is 2 Watts of Mechanical Input Power to every 1 Watt of Electric Output Power generated.
9. The increase in Drive Shaft Mechanical Input Power is provided by the Prime Mover and the Input Energy Source which powers the Prime Mover.
10. In the Heins ReGenX Generator operation the created and Time Delayed Electromagnetic Field Energy performs Positive Work at infinite efficiency and it increases the Kinetic Energy of the system.
21EC71_Module-2_Routing PPT Electronics and communication engineering module 2
1. MODULE 2
Floor planning and placement: Goals and objectives, Measurement of delay in
Floor planning, Floor planning tools, Channel definition, I/O and Power planning and
Clock planning.
Placement: Goals and Objectives, Min-cut Placement algorithm, Iterative
Placement Improvement,Time driven placement methods, Physical Design Flow.
Routing: Global Routing: Goals and objectives, Global Routing Methods, Global
routing between blocks, Back annotation. Text Book 1
3. • Once the designer has floorplanned a chip and the logic cells within the
flexible blocks have been placed, it is time to make the connections by
routing the chip.
• This is still a hard problem that is made easier by dividing it into smaller
problems.
• Routing is usually split into global routing followed by detailed routing .
4. Global Routing
Goals :
• The goal of global routing is to provide complete instructions to the
detailed router on where to route every net.
Objectives of global routing :
• Minimize the total interconnect length.
• Maximize the probability that the detailed router can complete the
routing.
• Minimize the critical path delay.
• The input to the global router is a floorplan that includes the locations
of all the fixed and flexible blocks.
• The placement information for flexible blocks and the locations of all
the logic cells.
5. • Sequential global routing Perhaps the most straightforward strategy for
routing is to select a specific net order and then to route nets sequentially
in that order.
• However, this sequential approach often leads to a poor routing result,
because an earlier routed net might block the routing for its subsequent
nets. Therefore, the quality of the routing solution greatly depends on the
net ordering.
• Algorithms can be classified into sequential and concurrent approaches,
6. Sequential routing
•One of the approach for global routing picks up each
net in turn and calculates the shortest path using tree
algorithms also known as Sequential routing
•As this algorithm proceeds, some channels will become
more congested since they hold more nets than others.
•There are two different ways that a global router
handles this congestion problem.
1. Using order-independent and
2. Order-dependent routing.
7. Routing for different net orderings,
(a) One layer routing case with two two-pin nets 1 and 2,
(b) Net ordering of 1 followed by 2 and it is inferior solution,
(c) A better solution by net ordering 2 followed by 1.
8. There are some popular net-ordering schemes as follows:
(1) Order the nets in the ascending order according to the number of
pins within their bounding boxes.
(2) Order the nets in the ascending or descending order of their
lengths if routability is the most critical issue.
Research shows that routing shorter nets first often leads to better
routability.
(3) Order the nets on the basis of their timing criticality.
Other method hierarchical (top down and bottom up)
9. Concurrent routing
• The major drawback of the sequential approach is that it suffers from the
net ordering problem.
• In any net ordering scheme, it is more difficult to route the nets that are
processed later, because they are subjected to more blockages.
• Moreover, when the sequential routing does find a feasible solution, we do
not know whether or not this solution is optimal or how far it is from the
optimal solution.
• One popular concurrent approach is to formulate global routing as a 0-1
integer linear programming algorithm
10. Global Routing Between Blocks
Global routing for a cell-based ASIC formulated as a graph problem.
(a) A cell-based ASIC with numbered channels.
(b) The channels form the edges of a graph.
(c) The channel-intersection graph. Each channel corresponds to an edge on a
graph whose weight corresponds to the channel length.
11. Back-annotation
• Used in connection to netlist simulations and STA where the
propagation delay(s) through each cell in the netlist is overridden by
the delay value(s) specified in a special file called sdf (synopsys delay
format) file.
• The process of putting delays from a given source for the cells in a
netlist during netlist simulation is called Back Annotation.
• Normally the values of the delays corresponding to each cell in the
netlist would come from the simulation library
i.e verilogmodel of library cells.
• But those delays are not the actual delays of cells, as each of them is
instantiated in a netlist in different surroundings, different physical
locations, different loads, different fan in.
12. • The delay of two similar cells in the netlist at two different physical
locations in a chip can be significantly different depending upon above said
factors.
• Therefore in order to have actual delays for the cells in your netlist, an SDF
is written out, by a EDA tool can be a synthesis tool or a layout tool etc..
• which contains the delays of each instance of each library cell in the
netlist, under the circumstances the cell is in.
• During simulations or Static Timing Analysis, each cell in the netlist gets its
correponding delay read, or more technically 'annotated' from the SDF
file.