Explain most computer memories are composed of a large

Assignment Help Computer Engineering
Reference no: EM13141841

Address Decoding

Most computer memories are composed of a large number different devices that are interconnected to form the whole memory array which is accessed using the address bus. All of the chips are also connected to the data bus. To create a simple memory map, each chip must be allocated a range of memory addresses which are unique. This means that only one chip will respond with data when a particular address is placed on the address bus.

The process that ensures this unique response to a given address is known as address decoding. This may be implemented in a variety of ways. Remember that a memory organisation of 1K x 8 means a chip has 10 address lines an addressing range of $000 to $3FF (1K) and a data size of 1 byte (8 bits).

A small microprocessor system with a 16bit address bus (A0 to A15) has three memory devices, a 4K x 8 ROM and two 2K x 8 RAM chips (RAM1 and RAM2). It is required to locate them starting at addresses 0000 hex, 2000 hex, and 4000 hex respectively. Each chip is activated by a chip enable pin (CE) going high.

Consider the chip address range allocated and the address lines activated within this range. Inspect the MOST SIGNIFICANT BIT hex digit for each and identify how you might use this to drive the Chip Enable (CE) pin to uniquely activate each chip as well as acting as an address line. Design the simplest address decode circuit using the necessary address lines A15 to A12 and any appropriate simple logic gates, to drive the three different chips.

Reference no: EM13141841

Questions Cloud

Argumentative essay : This paper is an argumentative essay; you will need to take a position on the issue and support that position. You will need to convince your readers to agree with your thesis by writing an argumentative paper that is based on your ideas and supporte..
What would have been the percent error : if the syinge colume had been incorrectly read, giving a calculated system volume of 25.6 mL, what would have been the percent error in the calculated value of R?
Find number of batteries that must be tested : Suppose that 80% of all batteries have acceptable voltages, and let y denote the number of batteries that must be tested. What is p(2), that is, P(y=2).
Operating expenses-non-controlling interest in subsidiary : Several years ago Polar Inc. purchased an 80% interest in Icecap Co. The book values of Icecap's asset and liability accounts at that time were considered to be equal to their fair values. Polar paid an amount corresponding to the underlying book ..
Explain most computer memories are composed of a large : Most computer memories are composed of a large number different devices that are interconnected to form the whole memory array which is accessed using the address bus.
How a ruler can attain and retain power : Machiavelli's instruction on how a ruler can attain and retain power is often summed up in his statement, "the end justifies the means." Identify a current political leader who seems to follow Machiavelli's principles outlined in The Prince, and expl..
Distribution of partnership net income : Calculate the distribution of partnership net income (loss) for each independent situation below (for each situation, assume the average capital balance of P is $140,000 and of Q is $240,000).
What features are shared among these two : One of the most interesting concepts in animal evolution is the relationship between the phylum Echinoderms and the phylum Chordates. Humans belong to the phylum Chordata.
Explain the z-transform of the following system transfer : Discrete Time Systems, 1. a) Find the z-transform of the following system transfer function assuming the input is a unit staircase (i.e. zero order held). The sampling rate is T=0.2.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What security measures required to address vulnerabilities

What security measures required to address vulnerabilities Illustrate threats and vulnerabilities that are possible after implementing "big data" technologies in online auctioning company.

  Findout which one is false statement

Findout which one is false statement.

  Computer rendering of stochastic models

Prepare a slideshow on Computer rendering of stochastic models

  Implementing the java application

Write down a Java application which enables a user to enter 10 numbers (double precision) into an array and then sorts and shows the numbers from lowest to highest.

  Explain substantial benefits to the company

A medium sized company requires to upgrade the computer facilities for administrative and design and development applications. At the moment all computer-based applications are processed on a very cold 'Batch' machine whose operating system does n..

  Write down an sql statement

Write down an SQL statement

  Handling the situation of passing of fragment through filter

If ?rst fragment is rejected, all the susequent fragments can be rejected. Though, the nature of IP is such that fragments can arrive out of order. However, an intermediate fragment may pass through ?lter before initial fragment is rejected.

  Shiny buttons game

Write a public void cleanTable() method in the ShinyGame class that causes all selected sequences of game pieces to be removed from the game board and add a private score integer attribute to the ShinyButtons model class. Create a getScore() method..

  Explain the method to find cost of sorting the relation

Explain the method to find cost of sorting the relation In each case, how many combine passes are required?

  Online procurement technologies

Identify and explain two major initiatives undertaken by Australian government (at federal/ state/local government level) in order to introduce the online procurement technologies.

  Assume that we compare the insertion sort method

assume that we compare the insertion sort method. while classification with merge requires 64n*lg(n) steps. For which values of n, does insertion sort method outclass the merge sort process.

  Write down a program that, given the amount of a purchase

note down a program that, given the amount of a purchase and the amount received in payment, computes the change in dollars, half-dollars, quarters, dimes, nickles, and pennies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd