Describe about full adder, Computer Engineering

Assignment Help:

Q. Describe about full adder?

Let's take full adder. For this other variable carry from previous bit addition is added let'us call it 'p'. Truth table and K-Map for this is displayed in figure below.

1448_Describe about full adder.png

1500_Describe about full adder1.png

Figure: Full-adder implementation

Three adjacencies marked a,b,c in K-Map of 'C' are

a)

x  y¯  p  + x y p 

  =   x p ( y +  y¯ ) 

  =   x p 

b)

x y p  + x y  p¯ 

  =   x y

c)

  x¯ y p + x y p  

  =   y p

So C = x p + x y + y p

In case of K-Map for 'S' there are no adjacencies. So

       S =  x¯y¯ p +  x¯yp¯  + xy¯p¯ + x y p

Until now we have determined about addition of bit only however what will happen if we are in fact adding two numbers. A number in computer can be 4 byte it implies that 32 bit long or even more. Even for these cases fundamental unit is full adder. Let's see (e.g.) how can we create an adder that adds two 4 bit numbers. Let's presume the numbers are:  x3 x2 x1 x0 and y3 y2 y1 y0 here xi and yi (i = 0 to 3) express a bit. 4-bit adder is displayed in figure.

453_Describe about full adder2.png

Figure:  4-bit Adder

Overall sum is expressed by S3 S2 S1 S0 and over all carry is C3 from 4th bit adder. The main feature of this adder is that carry of every lower bit is fed to subsequent higher bit addition phase it means that addition of next higher bit has to wait for previous stage addition. This is known as ripple carry adder. Ripple carry becomes time consuming when we are going for addition of let's say 32 bit. Here most important bit it implies that 32nd bit has to wait until addition of first 31 bits is complete. 

Consequently a high-speed adder that produces input carry bit of any stage directly from input to previous stages was created. These are known as carry look ahead adders. In this adder carry for several stages can be produced directly by logic expressions for example:

C0   = x0 y0

C1   = x1 y1 + (x1 + y1) C0

Complexity of look ahead carry bit raises with higher bits. However in turn it generates the addition in a very small time. Carry look ahead becomes increasingly complex with increasing numbers of bits. So carry look ahead adders are generally implemented for adding chunks of 4 to 8 bits and carry is rippled to subsequent chunk of 4 to 8 bits carry look ahead circuit.


Related Discussions:- Describe about full adder

Effective branching rate - heuristic searches, Effective Branching Rate: ...

Effective Branching Rate: Assessing heuristic functions is an important part of "AI" research: a particular heuristic function may sound such a good idea, but in practice give

Explain COMS inverter, Explain CMOS Inverter with the help of a neat circui...

Explain CMOS Inverter with the help of a neat circuit diagram. Ans: CMOS Inverter: The fundamental CMOS logic circuit is an inverter demonstrated in Fig.(a). For above

Explain csmsginterface() function with predefined protocol, Explain CSMsgIn...

Explain CSMsgInterface() Function with Predefined Protocol  A REQUEST structure is created for each message sent to the server. Messages passed to CSMsgInterface() as *dataMSG

Give brief description about arithmetic processing unit, Give brief descrip...

Give brief description about arithmetic processing unit To execute the arithmetic operations there is a separate section known as arithmetic processing unit in CPU. The arithme

Benefits of traditional hard disks and cd-rom, Q. Benefits of traditional h...

Q. Benefits of traditional hard disks and CD-ROM? CD-ROM is suitable for distribution of large amounts of data to a large number of users. CD-ROMs are a general medium these da

Explain the difference between a subroutine and macro, Explain the differen...

Explain the difference between a subroutine & macro. It is inefficient to have to write code for standard routines.  For instance reading a character form the keyboard or savin

Explain about the public key cryptography, Explain about the Public Key Cry...

Explain about the Public Key Cryptography. Public Key Cryptography: It is a cryptographic system which uses two keys as a public key identified to everyone and a private

Determine the abstraction mechanisms for modelling, Determine the abstracti...

Determine the abstraction mechanisms for modelling The object orientation conceptual structure helps in providing abstraction mechanisms for modelling, that includes: Cl

Explain about synchronous dram, Q. Explain about Synchronous DRAM? One ...

Q. Explain about Synchronous DRAM? One of the most broadly used forms of DRAM is synchronous DRAM (SDRAM). Unlike the conventional DRAM that is asynchronous SDRAM exchanges dat

Example of unification, Example of Unification: Let now here, assume i...

Example of Unification: Let now here, assume instead that we had these two sentences as:  knows(john,X) → hates(john, X)  knows(jack, mary)  Thus here the predicate n

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd