Build the digital logic circuit in the logisim simulator

Assignment Help Computer Networking
Reference no: EM131048132

Computer Systems and Networks Assignment-

Software requirement: You must use the Logisim simulator to create your circuits.

Task Description: You are to build (and test) the following digital logic circuit in the Logisim simulator and write a short report that describes your circuit. The maximum mark that you are able to achieve on the assignment will be determined by the difficulty of the circuit you decide to build (Option 1 or Option 2, see below).

Circuit Options:

OPTION1: Part A only

OPTION2: Part A and Part B

Requirements:

For this assignment you are required to implement a simple key and lock mechanism. The key will be an octal digit (3 input bits, values 0..7). The lock will also be an octal digit (3 input bits, values 0..7). The key will fit the lock if its octal digit matches the octal digit of the lock.

Example 1: Key is 2 and Lock is 7. The numbers (2 and 7) do not match, the key does not unlock the lock.

Example 2: Key is 6 and lock is 3. The numbers (6 and 3) do not match, the key does not unlock the lock.

Example 3: Key is 5 and lock is 5. The numbers (5 and 5) match, the key unlocks the lock.

Note: These are just a couple of examples. There are more cases that result in the key unlocking the lock or failing to unlock the lock. Your circuit must correctly unlock or keep the lock locked for all cases.

For this assignment, the key will be represented by three inputs (3 bits). The three key inputs are named as K1, K2, and K3. The table below shows the assignment of bits to each key value for K1, K2, and K3.

Key Inputs

Key value

K1

K2

K3

0

0

0

0

1

0

0

1

2

0

1

0

3

0

1

1

4

1

0

0

5

1

0

1

6

1

1

0

7

1

1

1

For this assignment, the lock will be represented by three inputs (3 bits). The three lock inputs are named as L1, L2, and L3. The table below shows the assignment of bits to each lock value for L1, L2, and L3.

Lock Inputs

Lock value

L1

L2

L3

0

0

0

0

1

0

0

1

2

0

1

0

3

0

1

1

4

1

0

0

5

1

0

1

6

1

1

0

7

1

1

1

Part A- Circuit Option 1: Part A Only:

The implementation for this part must use only the three basic logic gates (AND, OR, NOT) with maximum 2 inputs.

You are required to implement a circuit where the user (you) can input a key value (K1, K2, and K3) and a lock value (L1, L2, and L3) and the circuit decodes the K1, K2, K3 and L1, L2, L3 values using a decoder (see lecture notes) as well as other permitted logic gates to determine if the key matches the lock.

The output will be a single LED labelled OPEN which is lit if the key matches the lock, and is not lit if the key and lock are different.

Part B- Circuit Option 2: Part A and Part B:

For this part, the lock allows a certain number (n) of incorrect attempts. The number of times an invalid key value can be input ranges from 0 to 7 and should be set via a combination of three separate inputs: X1, X2 and X3 Note: You can combine the 3 inputs into a single 3 bit input. With an n value of 0 you can make 0 incorrect key attempts (ie. The first attempt has to work and the OPEN LED has to light up and be set to 1).

Using the same circuit as Part A, add additional circuitry to count how many incorrect attempts have been made.

Counting incorrect key attempts (for the case where n is greater than 0): If the number of incorrect attempts in a row is equal to n (the total number of allowable incorrect attempts) then the lock is permanently locked and can no longer be unlocked even if the correct key value is supplied after that.

Counting incorrect key attempts (for the case where n is equal to 0) With an n value of 0 you can make 0 incorrect key attempts (ie. The first attempt has to work and the OPEN LED has to light up and be set to 1).

Reset when correctly unlocked

If the lock is unlocked before n incorrect attempts have occurred, then the count of the number of incorrect attempts resets to 0. This means that if the lock is unlocked, then n incorrect attempts will again be possible before the lock is locked forever.

The circuit will have a single LED output labelled OPEN. If, and only if, the key and lock match then the OPEN LED will be set to 1. If the key and lock value do not match the OPEN LED will be 0. If n incorrect unlocking attempts are made, the OPEN LED will remain at 0 and cannot be set to 1.

n

X1

X2

X3

0

0

0

0

1

0

0

1

2

0

1

0

3

0

1

1

4

1

0

0

5

1

0

1

6

1

1

0

7

1

1

1

Values for X1, X2, X3

For Part B only, you may use only the three basic logic gates (AND, OR, NOT) with maximum 2 inputs, as well as the more advanced counter and comparator circuits (only those two) from the Logisim circuit library.

Reference no: EM131048132

Questions Cloud

How the product was disruptive and the market at the time : The product or service should be a product that disrupted the market. Explain how the product was disruptive and the market at the time.
How much does leisure time planners : In 2009, LEISURE TIME PLANNERS, LLC rented a 10,000 SF office space from Martha Associates with the following terms: 5 year lease commencing on 1/1/2009, base rent of $4.00 PSF, and an expense stop of $2 PSF. In 2010, if utilities, property and other..
Reliance on analytical procedures would not be advisable : Give two examples of circumstances in which the auditor can rely on analytical procedures and two circumstances when reliance on analytical procedures would not be advisable.
Below average gross profit margin may result from : A below average gross profit margin may result from ?
Build the digital logic circuit in the logisim simulator : 1007ICT / 7611ICT Computer Systems and Networks- Task Description: You are to build (and test) the following digital logic circuit in the Logisim simulator and write a short report that describes your circuit. The maximum mark that you are able to ..
Annualized interest rates-foreign currency : Assume the following annualized interest rates: Bank Pinetree can borrow either $5 million or foreign currency (FC) 5 million. The current spot rate of the foreign currency (FC) is $1.13 and the Bank expects the spot rate to be $1.10 in 90 days. What..
What is the nature of the possible errors : Discuss the associations that you can see in this data. What is the nature of the possible errors?
What will the stock price be in three years : The Jackson–Timberlake Wardrobe Co. just paid a dividend of $1.40 per share on its stock. The dividends are expected to grow at a constant rate of 5 percent per year indefinitely. Investors require a return of 12 percent on the company's stock. What ..
First example of politicalmovement that extolled violence : anarchism was the first example of politicalmovement that extolled violence as a positive virtue, rather than a necessary evil. discuss with reference to anarchist writings

Reviews

Write a Review

Computer Networking Questions & Answers

  An application-level and a circuit-level one

What is a gateway, and what is the difference between an application-level and a circuit-level one?

  Network protocol exchange well-defined messages

Create a list of messages that you think would be necessary during server-client and client-client interactions. Do not rely on the implicit acknowledgement of Transmission Control Protocol (TCP) but provide a mechanism for an explicit acknowledgm..

  Create a technical proposal for a network services

You will create a technical proposal for a Windows Server-based set of network services given the simplified RFP (Request for Proposal) provided below

  Finally implemented your firewall and vpn solutions

You have finally implemented your firewall and VPN solutions and are feeling much better about your network's security posture. It is now the end of the fiscal year, and your CISO is looking to you for future budget requirements.

  Describe the methods to tackle and mitigate rf multipath

Describe the methods to tackle and mitigate RF multipath that impact to WLAN throughput. Explain the purposes of POE in WLAN design.

  Explaining significant obstacle to encryption

It is significant to know what issues are for encrypting data in the database. Comment on what you think is most significant obstacle to encryption. Describe your position.

  Biometric authentication methods for online transactions

Biometric authentication methods for online transactions, The physical attributes inherent in biometric authentication methods raise interesting problems

  What information in packet does switch use to find link

When one of these packets arrives to packet switch, what information in packet does switch use to determine link onto which packet is forwarded?

  Internet technologies

The convergence of communications and computing technologies has increased the tools available to create completely new media possibilities and experiences. This module aims to explore the Internet technology and examine its applications, including t..

  Suggest a method for consolidating core network services

Suggest a method for consolidating Core Network services. Provide a plan for integrating both AD forests eliminating duplication of service wherever possible

  What do you look for in the trace file you were sent

Based on the data you have in this scenario, state a possible explanation for the cause of the problem.

  Research various features that were added to ipv6 protocol

Take the time to research the various features that were added to the IPv6 protocol (compared to IPv4). Choose one feature and provide a brief explanation of its benefits.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd