ASIC Chip Architecture: How Mining Chips Work
Deep dive into ASIC mining chip architecture — SHA-256 pipeline, die design, voltage-frequency scaling, and Bitmain chip evolution from BM1387 to BM1370.
Introduction
At the heart of every Bitcoin miner sits a tiny silicon chip that does one thing extraordinarily well: compute SHA-256 hashes. These chips — called ASICs (Application-Specific Integrated Circuits) — are purpose-built for mining, and understanding their architecture is essential for anyone who repairs, operates, or builds mining hardware.
This article takes you inside the ASIC mining chip. We will explore why ASICs dominate mining, how the SHA-256 pipeline is implemented in silicon, what a die looks like under the microscope, how voltage and frequency interact to determine performance and efficiency, and how Bitmain's chip lineup has evolved over multiple generations. By the end, you will have the foundational knowledge to reason about chip behavior, diagnose failures, and understand the engineering tradeoffs that define modern mining hardware.
ASIC vs GPU vs CPU: Why ASICs Dominate Mining
To understand why ASICs exist, you need to understand the problem they solve. Bitcoin mining requires computing the SHA-256 hash function — twice — on a block header, billions of times per second, while incrementing a nonce value. The miner that finds a hash below the network's target difficulty wins the block reward.
The Compute Spectrum
Every computing device sits on a spectrum from general-purpose to fully specialized:
| Architecture | Flexibility | SHA-256 Efficiency | Example |
|---|---|---|---|
| CPU | Fully general-purpose | ~50 MH/s, ~500 J/TH | Intel Core i9 |
| GPU | Parallel general-purpose | ~1,500 MH/s, ~50 J/TH | NVIDIA RTX 4090 |
| FPGA | Reconfigurable logic | ~5,000 MH/s, ~10 J/TH | Xilinx Alveo U250 |
| ASIC | Fixed function | ~200,000,000 MH/s, ~15 J/TH* | Bitmain BM1370 |
*Per-chip figures vary by generation. System-level J/TH for a modern S21 Pro is around 15 J/TH.
Why CPUs and GPUs Cannot Compete
A CPU is designed to handle any instruction thrown at it: branching, memory access, floating-point math, encryption, video decoding, and millions of other operations. This generality comes at a cost — the transistors dedicated to branch prediction, out-of-order execution, cache hierarchies, and instruction decoding are all wasted silicon when the only task is SHA-256.
A GPU improves on this by offering thousands of simpler cores running in parallel. GPUs were the dominant mining hardware from 2011 to 2013. However, each GPU core still carries overhead for general-purpose computation: register files, shared memory, texture units, and a flexible instruction set.
An ASIC strips away everything that is not SHA-256. Every transistor on the die serves exactly one purpose: hashing. There is no instruction decoder, no cache, no branch predictor. The result is a chip that computes SHA-256 at orders of magnitude better performance-per-watt than any general-purpose processor.
The efficiency gap between ASICs and GPUs for SHA-256 is roughly 3,000x in terms of joules per terahash. This is why GPU mining of Bitcoin became economically unviable by 2014, and why ASICs are the only viable option today.
The Tradeoff
The disadvantage of an ASIC is obvious: it can only do one thing. If the Bitcoin network switched to a different hash algorithm tomorrow, every SHA-256 ASIC in the world would become paperweights. This rigidity is the price paid for extreme efficiency.
SHA-256 Hashing Pipeline Internals
To understand an ASIC mining chip, you need to understand what it computes. Bitcoin mining uses double SHA-256: the block header is hashed with SHA-256, and the result is hashed again. The miner varies the 32-bit nonce field in the header, checking whether each resulting hash meets the difficulty target.
SHA-256 in Brief
SHA-256 processes data in 512-bit (64-byte) blocks. For each block, it performs 64 rounds of computation, where each round involves:
- Message schedule expansion — deriving 64 words from the 16-word input block
- Compression function — updating eight 32-bit state variables (a through h) using bitwise operations, additions, and predefined constants
# Pseudocode for one SHA-256 round
T1 = h + Sigma1(e) + Ch(e, f, g) + K[i] + W[i]
T2 = Sigma0(a) + Maj(a, b, c)
h = g
g = f
f = e
e = d + T1
d = c
c = b
b = a
a = T1 + T2The key operations are:
- Sigma0, Sigma1 — bitwise rotation and XOR combinations
- Ch (Choice) —
(e AND f) XOR (NOT e AND g) - Maj (Majority) —
(a AND b) XOR (a AND c) XOR (b AND c) - 32-bit modular addition — the most complex operation in the pipeline
How ASICs Implement This in Hardware
In an ASIC, each SHA-256 round is implemented as a fixed combinational logic circuit. There is no software, no instruction fetch, no program counter. The logic gates directly compute the Sigma, Choice, and Majority functions using hardwired connections between flip-flops and adders.
A single hashing core in an ASIC chip typically implements the full 64-round SHA-256 compression as a pipelined datapath:
Stage 1: Message Schedule
The 16-word input block is expanded into 64 words. In hardware, this is a shift register with XOR and rotate logic. Some implementations unroll this entirely; others reuse a smaller circuit across multiple clock cycles.
Stage 2: Compression Rounds
The 64 rounds of the compression function are either fully unrolled (64 separate stages of combinational logic, one round per clock cycle throughput with deep pipelining) or partially unrolled (e.g., 4 rounds per stage, 16 stages). Full unrolling maximizes throughput at the cost of die area.
Stage 3: Nonce Comparison
After both SHA-256 passes complete, the result is compared against the difficulty target. If the hash meets the target, the nonce is flagged as a valid share or solution and sent out through the communication interface.
The Double-Hash Optimization
Since Bitcoin requires SHA-256(SHA-256(header)), a mining ASIC must perform the hash twice. However, the 80-byte block header is split across two SHA-256 blocks:
- Block 1 (bytes 0-63): Contains version, previous block hash, and the first part of the Merkle root. This is constant for a given job and is computed once by the control board, then sent to the chip as a midstate.
- Block 2 (bytes 64-79 + padding): Contains the end of the Merkle root, timestamp, difficulty bits, and the nonce. Only this block changes per attempt.
Block Header (80 bytes):
[version | prev_hash | merkle_root_part1] ← SHA-256 Block 1 (midstate, precomputed)
[merkle_root_part2 | time | bits | nonce] ← SHA-256 Block 2 (varies per attempt)By precomputing the midstate, the ASIC only needs to perform one full SHA-256 compression (64 rounds) plus the second SHA-256 pass (another 64 rounds) per nonce attempt, rather than two full compressions from scratch. This optimization is universal across all mining ASICs.
Parallelism Through Cores
A single hashing core can produce one hash result per clock cycle (in a fully pipelined design). To achieve terahash-level performance, each chip contains hundreds to thousands of cores running in parallel. For example, the BM1366 is estimated to contain over 800 hashing cores, each independently working through its assigned nonce range.
Die Architecture: Cores, Compute Units, and I/O
An ASIC mining chip's die (the actual silicon) is organized into several distinct regions, each serving a specific purpose.
Core Array
The largest portion of the die — typically 70-85% of the silicon area — is devoted to the hashing core array. This is a grid of identical SHA-256 compute units tiled across the die. Each core is a self-contained pipeline that:
- Accepts a job (midstate + block tail)
- Iterates through its assigned nonce range
- Reports valid nonces back to the I/O controller
The cores are grouped into compute domains (sometimes called "groups" or "engines"). Each domain shares a local clock tree and may have independent nonce range assignments. This hierarchical organization simplifies clock distribution and reduces wire congestion.
PLL (Phase-Locked Loop)
Every mining ASIC contains one or more PLLs that generate the internal clock from an external reference (typically 25 MHz crystal). The PLL multiplies this reference frequency to produce the core clock — commonly 400 MHz to 800 MHz depending on the chip generation and operating conditions.
// Example: PLL register configuration for BM1366
// Setting core clock to 500 MHz from 25 MHz reference
// PLL output = (FBDIV / REFDIV) * REF_CLK / POSTDIV
// 500 MHz = (40 / 1) * 25 MHz / 2
#define BM1366_PLL_REFDIV 1
#define BM1366_PLL_FBDIV 40
#define BM1366_PLL_POSTDIV1 2
#define BM1366_PLL_POSTDIV2 1The PLL is a critical block because the core clock directly determines hashrate. Higher frequency means more hashes per second — but also more power consumption and heat. See the Clock Distribution & PLL article for a deeper exploration.
Communication Interface
The I/O block handles all external communication. In Bitmain chips, this is a UART-based serial interface operating at baud rates typically between 1.5 Mbps and 6.25 Mbps (depending on chip generation and configuration). The interface handles:
- Job distribution — receiving work from the control board
- Nonce reporting — sending back valid solutions
- Register access — reading and writing chip configuration registers (PLL settings, voltage trim, chip address, etc.)
- Chain forwarding — passing data to the next chip in the daisy chain
Voltage Regulation Interface
Modern mining ASICs include on-die voltage sensing and sometimes voltage trim circuitry. The chip can report its internal voltage and temperature to the control board, enabling closed-loop voltage optimization. Some generations include configurable voltage offset registers that allow fine-tuning without external hardware changes.
Temperature Sensor
An on-die temperature sensor (typically a bandgap reference-based circuit) reports junction temperature. This reading is critical for thermal management — the control board uses it to adjust fan speed, throttle frequency, or shut down the chip if it exceeds safe operating limits (typically 105-125 degrees C junction temperature).
Voltage and Frequency Relationship
The relationship between voltage, frequency, and power is the single most important concept for understanding ASIC chip performance and efficiency.
The V/F Curve
Every digital circuit has a minimum voltage required to operate reliably at a given frequency. This relationship is known as the voltage-frequency (V/F) curve:
Frequency (MHz)
^
800 | ___________
| __/
700 | __/
| __/
600 | __/
| __/
500 | __/
| /
400 |/
+-----|-----|-----|-----|------> Voltage (V)
0.20 0.25 0.30 0.35At lower voltages, the transistors switch more slowly, limiting the maximum stable frequency. Raising voltage allows faster switching, enabling higher clock speeds — but the relationship is not linear for power.
The Power Equation
Dynamic power consumption in a CMOS circuit follows this fundamental equation:
P = C * V^2 * f * NWhere:
- P = power consumption (watts)
- C = capacitance (determined by die area and process node)
- V = supply voltage
- f = clock frequency
- N = number of active transistors switching per cycle
The critical insight is that power scales with the square of voltage. This means:
| Change | Effect on Power | Effect on Hashrate |
|---|---|---|
| +10% voltage | +21% power | ~+10% hashrate (higher freq) |
| -10% voltage | -19% power | ~-10% hashrate (lower freq) |
| +10% frequency (same V) | +10% power | +10% hashrate |
Because power scales with V-squared but hashrate scales linearly with frequency, running chips at the edge of their V/F curve is always less efficient than running them at a moderate point. This is why undervolting and underclocking often improves J/TH — you sacrifice some hashrate but gain disproportionately on power savings.
Efficiency Sweet Spot
Every chip has an efficiency sweet spot — the voltage/frequency combination that minimizes joules per terahash (J/TH). This point is typically well below the chip's maximum frequency capability.
For example, a hypothetical chip might have:
| Operating Point | Voltage | Frequency | Hashrate | Power | J/TH |
|---|---|---|---|---|---|
| Low power | 0.24V | 400 MHz | 80 GH/s | 2.0W | 25.0 |
| Efficiency sweet spot | 0.28V | 550 MHz | 110 GH/s | 3.0W | 27.3 |
| Balanced | 0.31V | 650 MHz | 130 GH/s | 4.2W | 32.3 |
| Maximum performance | 0.36V | 750 MHz | 150 GH/s | 6.5W | 43.3 |
Auto-tuning firmware (like Braiins OS+ or Vnish) works by dynamically finding each chip's optimal V/F point. Chips on the same board can have different optimal settings due to manufacturing variation (silicon lottery). See Auto-Tuning Explained for more details.
Silicon Lottery
Not all chips are created equal. Manufacturing variation means that two chips from the same wafer can have different V/F characteristics. A "good" chip can reach 600 MHz at 0.27V, while a "bad" chip from the same batch might need 0.30V for the same frequency. This variation is called the silicon lottery, and it is why:
- Some hash boards consistently perform better than others
- Auto-tuning per-chip is more efficient than blanket voltage settings
- Chip binning (sorting by quality) is a key part of the manufacturing process
Power Efficiency Metrics
Efficiency in mining is measured in joules per terahash (J/TH) — the amount of energy consumed to compute one trillion hashes. Lower is better.
Understanding J/TH
J/TH = Power (watts) / Hashrate (TH/s)Since 1 watt = 1 joule per second, J/TH directly tells you how many joules of electrical energy are consumed per terahash of computation. At the wall, you also need to account for PSU efficiency (typically 90-95% for platinum-rated supplies) and ancillary loads (fans, control board).
Real-World Efficiency by Generation
| Miner | Chip | Process | Wall Power | Hashrate | J/TH (wall) |
|---|---|---|---|---|---|
| Antminer S9 (2016) | BM1387 | 16nm | 1,350W | 14 TH/s | 96 J/TH |
| Antminer S17 (2019) | BM1397 | 7nm | 2,520W | 56 TH/s | 45 J/TH |
| Antminer S19 (2020) | BM1398 | 7nm | 3,250W | 95 TH/s | 34.2 J/TH |
| Antminer S19 XP (2022) | BM1366 | 5nm | 3,010W | 140 TH/s | 21.5 J/TH |
| Antminer S21 (2023) | BM1368 | 5nm | 3,500W | 200 TH/s | 17.5 J/TH |
| Antminer S21 Pro (2024) | BM1370 | 3nm | 3,500W | 234 TH/s | 15.0 J/TH |
Over eight years, mining efficiency improved by roughly 6.4x — from 96 J/TH (S9) to 15 J/TH (S21 Pro). Most of this improvement came from process node shrinks (smaller transistors leak less and switch faster at lower voltages) and architectural optimizations within the hashing cores.
What Drives Efficiency Improvement
Three factors drive J/TH improvements across chip generations:
-
Process node shrink — Moving from 16nm to 7nm to 5nm to 3nm reduces transistor size, lowering capacitance (C in the power equation) and enabling lower operating voltages.
-
Architectural optimization — Better pipeline design, improved clock tree distribution, and more efficient adder circuits reduce the energy per hash operation.
-
Voltage reduction — Each generation typically operates at a lower core voltage. Since power scales with V-squared, even small voltage reductions yield significant efficiency gains.
Chip Evolution: BM1387 to BM1370
Bitmain's chip lineup tells the story of mining ASIC evolution. Each generation brought improvements in process technology, efficiency, or both.
The Bitmain Chip Family
| Chip | Year | Process | Core Voltage | Est. Cores | Used In | J/TH (chip level) |
|---|---|---|---|---|---|---|
| BM1387 | 2016 | TSMC 16nm | 0.40V | ~100 | S9, T9+ | ~80 |
| BM1397 | 2019 | TSMC 7nm | 0.35V | ~400 | S17, T17 | ~35 |
| BM1398 | 2020 | TSMC 7nm | 0.31V | ~500 | S19, S19 Pro | ~28 |
| BM1362 | 2022 | TSMC 5nm | 0.28V | ~600 | S19k Pro | ~20 |
| BM1366 | 2022 | TSMC 5nm | 0.28V | ~800 | S19 XP | ~18 |
| BM1368 | 2023 | TSMC 5nm | 0.30V | ~900 | S21 | ~15 |
| BM1370 | 2024 | TSMC 3nm | 0.27V | ~1000+ | S21 Pro | ~12 |
Core counts are estimates based on die area analysis and performance data — Bitmain does not publicly disclose exact core counts. The actual number of functional hashing cores varies by chip revision and binning.
Generation-by-Generation Breakdown
BM1387 (2016) — The Chip That Defined an Era
The BM1387 was the backbone of the legendary Antminer S9, the longest-lived mining platform in Bitcoin history (many S9s ran from 2016 through 2022). Built on TSMC's 16nm FinFET process, it was the first Bitmain chip to break below 100 J/TH at the wall level.
Key characteristics:
- 63 chips per hash board (189 total per S9)
- ~0.40V core voltage
- ~500 MHz typical operating frequency
- QFN package (older, simpler packaging)
- Simple UART communication at 1.5625 Mbps
The BM1387 established many of the architectural patterns still used today: UART daisy chain communication, register-based configuration, PLL-controlled frequency scaling, and midstate-based job distribution.
BM1397 (2019) — The 7nm Leap
The jump from 16nm to 7nm was transformative. The BM1397 roughly doubled efficiency over the BM1387, enabling the S17 to reach 56 TH/s at 45 J/TH. However, the S17 generation was plagued by reliability issues — not from the chips themselves, but from hash board design and solder quality problems.
BM1398 (2020) — Refinement and Reliability
The BM1398 was an iterative improvement on the same 7nm process. Lower operating voltage (0.31V vs 0.35V) and refined architecture brought efficiency down to ~34 J/TH in the Antminer S19 and S19 Pro. The S19 platform became the new workhorse of the industry, with far better reliability than the S17 generation.
Key characteristics:
- 76 chips per hash board (S19 Pro)
- 0.31V core voltage
- UART communication with improved error handling
- BGA package for better thermal performance
BM1362 (2022) — First 5nm Chip
The BM1362 debuted in the S19k Pro, marking Bitmain's transition to TSMC's 5nm process. While not as widely deployed as the BM1366, it demonstrated the efficiency gains possible at 5nm.
BM1366 (2022) — The 5nm Workhorse
The BM1366 is arguably the most significant 5nm chip in Bitmain's lineup. Used in the Antminer S19 XP (140 TH/s at 21.5 J/TH), it brought a 37% efficiency improvement over the BM1398. The S19 XP became one of the most sought-after miners during the 2022-2024 period.
Key characteristics:
- 110 chips per hash board (S19 XP)
- 0.28V core voltage
- Enhanced PLL with finer frequency granularity
- Improved nonce distribution logic
- Higher UART baud rates (up to 3.125 Mbps)
BM1368 (2023) — Pushing 5nm Further
The BM1368 powers the Antminer S21, reaching 200 TH/s at 17.5 J/TH. Despite being on the same 5nm process as the BM1366, architectural improvements and further voltage optimization yielded another meaningful efficiency gain.
Key characteristics:
- 156 chips per hash board (S21)
- 0.30V core voltage (slightly higher than BM1366 to hit higher frequencies)
- Redesigned hash board with improved power delivery
- Higher per-chip hashrate enabled fewer chips per TH/s
BM1370 (2024) — The 3nm Frontier
The BM1370 represents the current state of the art. Built on TSMC's 3nm (N3E) process, it powers the Antminer S21 Pro at 234 TH/s and approximately 15 J/TH — a staggering improvement over the BM1387 from just eight years earlier.
Key characteristics:
- 3nm FinFET process with extreme transistor density
- ~0.27V core voltage (lowest in Bitmain's lineup)
- Estimated 1,000+ hashing cores per chip
- Advanced PLL with wide frequency range
- Higher integration of power management features
The 3nm node pushes against the limits of practical semiconductor scaling. Future improvements will increasingly depend on architectural innovation, advanced packaging (chiplets, 3D stacking), and novel cooling techniques rather than pure process shrinks.
How Chips Communicate
Mining ASIC chips on a hash board do not operate independently — they are connected in a daisy chain and communicate with the control board through a serial protocol. Understanding this communication architecture is essential for diagnosing "missing chip" errors and communication failures.
The Daisy Chain
Chips are connected in series, with data flowing from the control board through each chip sequentially:
Control Board
|
| TX (UART)
v
[Chip 0] --CI/CO--> [Chip 1] --CI/CO--> [Chip 2] ---> ... ---> [Chip N]
[Chip 0] <--RI/RO-- [Chip 1] <--RI/RO-- [Chip 2] <--- ... <--- [Chip N]
|
| RX (UART)
v
Control BoardSignal Lines
Each chip has four key communication pins:
| Signal | Full Name | Direction | Purpose |
|---|---|---|---|
| CI | Clock In | Input from previous chip | Receives serial clock |
| CO | Clock Out | Output to next chip | Forwards serial clock |
| RI | Receive In | Input from previous chip | Receives serial data |
| RO | Receive Out | Output to next chip | Forwards serial data |
In Bitmain's newer chips, CI/CO carry the UART TX signal (commands flowing from control board to chips), while RI/RO carry the UART RX signal (responses flowing from chips back to the control board).
Communication Protocol
When the control board sends a command (e.g., set PLL frequency, assign job), the data flows through the CI/CO chain:
- Control board transmits UART frame on TX line
- Chip 0 receives on CI, processes if addressed to it, forwards on CO
- Chip 1 receives on CI from Chip 0's CO, and so on
- Broadcast commands are processed by every chip in the chain
- Addressed commands include a chip address byte — only the matching chip responds
When a chip finds a valid nonce or responds to a register read, the data flows back through RI/RO:
- Chip N generates response and transmits on RO
- Chip N-1 receives on RI, forwards on RO
- Data propagates back to Chip 0
- Chip 0 forwards to control board on the RX UART line
At startup, the control board must enumerate all chips — assigning each one a unique address:
Reset
All chips are reset to default state (address 0x00).
Sequential Addressing
The control board sends an "assign address" command. Chip 0 claims the first address and increments the address field before forwarding. Each subsequent chip claims the next address.
Verification
The control board reads back the chip count and verifies all expected chips responded. Missing chips indicate a communication break in the chain.
Baud Rate and Timing
Different chip generations operate at different default UART baud rates:
| Chip | Default Baud Rate | Max Baud Rate |
|---|---|---|
| BM1387 | 1,562,500 bps | 3,125,000 bps |
| BM1397/BM1398 | 1,562,500 bps | 3,125,000 bps |
| BM1366/BM1368 | 3,125,000 bps | 6,250,000 bps |
| BM1370 | 3,125,000 bps | 6,250,000 bps |
A broken chip in the middle of the daisy chain will sever communication to all chips downstream of it. This is the single most common cause of "X chips missing" errors in miner logs. For diagnostic techniques, see How Hash Boards Work.
The BO (Break Out) Signal
Some Bitmain chips include a BO (Break Out) pin. When a chip detects an internal fault, it asserts BO, which can trigger a bypass circuit on the hash board to route communication around the failed chip. This feature is not universally implemented across all board designs, but when present, it improves chain resilience.
Common Chip Failures
ASIC chips fail in predictable ways. Understanding these failure modes helps you diagnose problems faster and determine whether a chip needs replacement or whether the root cause lies elsewhere on the board.
1. Short Circuits (VDD to VSS)
A chip with an internal short between the power rail (VDD) and ground (VSS) will drag down the entire voltage domain it belongs to. Symptoms include:
- Domain voltage reads near zero or significantly below target
- Multiple chips in the same domain report as missing (they are all underpowered)
- Excessive current draw on that domain's power rail
- Thermal hotspot — the shorted chip may get extremely hot even at low voltage
Diagnosis: Use a thermal camera or measure domain voltages. A domain with a shorted chip will have abnormally low voltage. You can sometimes identify the specific chip by measuring resistance between VDD and VSS pads with the board unpowered.
Never leave a board powered on with a suspected short-circuit chip. The excessive current can damage the voltage regulator, PCB traces, and adjacent components. See Voltage Domains & Regulators for more on domain-level diagnostics.
2. Open Circuits (Broken Solder Joints)
BGA-packaged chips (BM1366, BM1368, BM1370) can develop open solder joints — where one or more solder balls lose connection to the PCB pad. This can be caused by thermal cycling, mechanical stress, or manufacturing defects.
Symptoms depend on which balls are affected:
- Power balls open: Chip appears dead (no response to communication)
- CI/CO or RI/RO balls open: Chain break — all downstream chips missing
- Partial power open: Intermittent errors, chip works sometimes, fails under load
Diagnosis: Gentle pressure on the chip with a probe while the board is running can sometimes temporarily restore connection, confirming a BGA joint issue. Definitive repair requires BGA rework — removing the chip, reballing, and resoldering.
3. Thermal Damage
ASIC chips are rated for junction temperatures up to 105-125 degrees C, but sustained operation near these limits degrades the silicon over time. Electromigration — the physical movement of metal atoms in the chip's interconnects due to high current density — accelerates at elevated temperatures.
Thermal damage manifests as:
- Gradually increasing error rate over weeks/months
- Chip eventually stops responding entirely
- No visible external damage (the failure is internal to the silicon)
Prevention: Adequate cooling, clean heatsinks, proper thermal paste application, and avoiding operation above rated temperatures. See Cooling and Thermal Management.
4. ESD (Electrostatic Discharge) Damage
ASIC chips operate at very low voltages (0.25-0.40V). An electrostatic discharge of even a few hundred volts — far below what a human can feel — can destroy the thin gate oxide of the chip's transistors.
ESD damage is insidious because:
- It can cause latent damage that does not manifest immediately but causes premature failure weeks later
- There is no visible indication of ESD damage externally
- A single touch without proper grounding can destroy a chip worth $10-50
Always wear a properly grounded ESD wrist strap when handling hash boards. Work on an ESD-safe mat. Never touch chip surfaces directly. These are not suggestions — they are requirements for professional repair work. See Repair Safety Guide.
5. Overvoltage Damage
If a voltage regulator fails or is misconfigured, it can supply voltage above the chip's maximum rating. Even a brief overvoltage event can permanently damage the gate oxide across an entire domain of chips.
Common causes:
- Failed buck converter MOSFET (stuck on)
- Incorrect firmware voltage setting during manual tuning
- Power supply voltage spike during startup or shutdown
Failure Summary Table
| Failure Mode | Symptom | Diagnosis Method | Repair |
|---|---|---|---|
| Short circuit | Domain voltage low, hot chip | Thermal camera, resistance measurement | Replace chip |
| Open solder joint | Missing chip(s), intermittent | Pressure test, X-ray | BGA rework |
| Thermal damage | Gradual degradation | Process of elimination | Replace chip |
| ESD damage | Dead or intermittent chip | Process of elimination | Replace chip |
| Overvoltage | Multiple dead chips in domain | Check regulator output | Replace chips + regulator |
Key Takeaways
-
ASICs dominate mining because they eliminate all general-purpose overhead. Every transistor serves SHA-256 computation, yielding 3,000x better efficiency than GPUs.
-
The SHA-256 pipeline is implemented as fixed combinational logic — no software, no instructions, just hardwired gates computing 64 rounds of compression per hash.
-
Power scales with V-squared, meaning voltage reduction is the most powerful lever for improving efficiency. This is why each chip generation targets lower operating voltages.
-
J/TH is the key metric for mining economics. The industry has improved from 96 J/TH (BM1387, 16nm, 2016) to 15 J/TH (BM1370, 3nm, 2024) — a 6.4x improvement in eight years.
-
Daisy chain communication means a single failed chip can take out the entire downstream chain. This is the most common cause of "missing chips" errors.
-
Chip failures are predictable — shorts, opens, thermal damage, and ESD account for the vast majority of issues. Proper diagnostics start with understanding what each failure looks like.
Apply This Knowledge
Now that you understand how ASIC mining chips work at a fundamental level, here is how to put this knowledge into practice:
Study Specific Chips
Dive into the datasheets and specifications for the chips you work with most. Start with the BM1366 reference page if you work on S19 XP boards.
Understand Your Hash Board
Read How Hash Boards Work to see how chips, power delivery, and communication come together on a real board.
Learn Voltage Domains
Each hash board divides its chips into voltage domains. Understanding how domains work is critical for fault isolation. See Voltage Domains & Regulators.
Practice Diagnostics
Work through the Systematic Diagnostics Methodology guide to build a repeatable process for identifying failed chips and their root causes.
Start Repairing
When you are ready to pick up a soldering iron, the Hashboard Repair Guide walks you through real-world chip replacement procedures step by step.
Understanding chip architecture is not just academic — it directly informs how you diagnose failures, choose operating parameters, and evaluate the economics of mining hardware. Every concept in this article maps to a real-world skill you will use in repair and operations work.
How Hash Boards Work: Complete Guide to Mining Hardware Architecture
Learn how cryptocurrency mining hash boards work — from ASIC chip architecture to voltage domains, signal chains, and common failure modes explained for repair technicians.
Voltage Domains and Regulators in Hash Boards
How voltage domains work in mining hash boards — buck converter operation, domain testing with multimeter, and diagnosing regulator failures for ASIC repair.