Show the data path for the shifter subsystem

Assignment Help Basic Computer Science
Reference no: EM131385930

(Shift-register Design) Your task is to design a shift-register subsystem based on the TTL 74194 component that can implement the six kinds of shifts described in Exercise 6.24. The subsystem has three control inputs, S2, S1, and S0, that are interpreted as follows: S2, S1, S0 = 000 is hold; 001 is circular shift right; 010 is circular shift left; 011 is logic shift right; 100 is logic shift left; 101 is arithmetic shift right; 110 is arithmetic shift left; and 111 is parallel load.

(a) Show the data path for the shifter subsystem. You may use multiplexers at the shift inputs to the 74194.

(b) Show the combinational logic (equations or schematics) to decode the global S2, Si, and So control inputs into the appropriate detailed control signals for the 74194 shifter and the external data-path logic for handling the serial-shift inputs.

Exercise 6.24

(Shift-register Design) Shifters normally are used to shift data in a circular pattern (the data that shifts out at one end of the shifter is shifted back into the other end), or as a logic shift (fill the shifted positions with 0s) or an arithmetic shift (propagate the high-order sign bit to the right or shift in 0s to the left). For example, if a 4-bit register contains the data 1110, the effects of the six kinds of shifts are the following:

Circular shift right: 1110 becomes 0111
Circular shift left: 1110 becomes 1101
Logical shift right: 1110 becomes 0111
Logical shift left: 1110 becomes 1100
Arithmetic shift right: 1110 becomes 1111
Arithmetic shift left: 1110 becomes 1100

Show how to wire up a 4-bit universal shift register (TTL component 74194) to perform the following kinds of shifts:

(a) Circular shift right

(b) Circular shift left

(c) Logic shift right

(d) Logic shift left

(e) Arithmetic shift right

(f) Arithmetic shift left

Reference no: EM131385930

Questions Cloud

Discuss the advantages of the energy sources : To reduce the negative environmental impacts of an ever growing human population and increasing demands for energy as technological advances continue, individual countries, states, cities and even households could shift their energy sources to tho..
Show how to wire up a 4-bit universal shift register : (Shift-register Design) Shifters normally are used to shift data in a circular pattern (the data that shifts out at one end of the shifter is shifted back into the other end), or as a logic shift (fill the shifted positions with 0s) or an arithmet..
Strengths and weaknesses of the different approaches : Briefly summarize the article by Reinhardt. Compare the strengths and weaknesses of the different approaches described in the article.
Management of information systems : Write your position (3 to 4 paragraphs) about Who Controls the Internet based on Dr. Wu's actions related to what he called for a Carterfone rule for mobile phone service providers in order to allow consumers to select whatever handset they want t..
Show the data path for the shifter subsystem : Show the combinational logic (equations or schematics) to decode the global S2, Si, and So control inputs into the appropriate detailed control signals for the 74194 shifter and the external data-path logic for handling the serial-shift inputs.
Analyze the theories that support your chosen section : One excellent resource available in this course is the Premier Sport Psychology Mental Training System workbook. It gives many hands-on strategies to use with athletes. By examining the theoretical framework of a section from the workbook, you wil..
Relationship between obesity and socio-economic status : Is there a relationship between obesity and socio-economic status? Should obese people be considered a protected class under Title VII of the Civil Rights Act? Why? Support your reasoning with specific examples and please use class material to su..
Robina bank must keep on hand as required by federal reserve : Suppose Robina Bank receives a deposit of $53,589 and the reserve requirement is 5%. What is the amount that Robina Bank must keep on hand as required by the Federal Reserve (Fed)? What is the amount that Robina Bank will have in excess reserves from..
Presentation on career development for executives : You have been asked to create a PowerPoint presentation on career development for executives at an organization you currently work for or an organization you wish to work for in the future. In your presentation, you will explain how your organizat..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the primary role of chief information officer

What is the primary role of the Chief Information Officer in organizations today? If you are able, please use your own organization in your response.

  What is an advanced persistent threat

What is an Advanced Persistent Threat (APT)? What is the goal of an APT? How can a business protect itself from an APT? What tools can be used to detect an APT? Be sure to cite sources.

  Result of an operation is overflowed

If the result of an operation is overflowed (exceeded than 16 bits) or underflowed then, only the lower 16-bits of the result are stored in the register and this effect is known as

  Determine the value of tplz for the test circuit

determine the value of tPLZ for the test circuit and waveforms in Figure 3-24. (Hint: You have to determine the time using an RC time constant

  The medical biller

A physician has treated a patient who has a diagnosis that is not listed on the superbill. How is this handled by the physician? The medical biller?

  Preferences of automobile owners

An actuary studying the insurance preferences of automobile owners makes the following conclusions: (i) An automobile owner is twice as likely to purchase collision coverage as disabilitycoverage.

  What is the data rate of the resulting composite digital

An audio CD is created by sampling analog stereo audio signals at a rate of 44.1 ksamples/s for each. Each sample is then encoded into a 16-bit word. What is the data rate of the resulting composite digital?

  Secure multipurpose internet mail extensions

Compare and contrast Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP) as solutions for securing email.

  Describe the three-level architecture of dbms

Describe the three-level architecture of DBMS?

  Describes what icann does

The ICANN is in the news. Write a short document (in your own words) that describes what ICANN does and why they are in the news.

  Discuss the types of privileges at the account level

Discuss what is meant by each of the following terms: database authorization, access control, data encryption, privileged (system) account, database audit, audit trail.

  Creating data encryption standard for ibm

Let us start off with once widely used Data Encryption Standard (DES) which was created by International Business Machines (IBM).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd