Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write short note on the Johnson counter.
Ans:
Johnson Counter: It is a synchronous counter, where all flip-flops are clocked concurrently and the clock pulses drive the clock input of all the flip-flops together therefore there is no propagation delay. Fig.(a) demonstrates the circuit of Johnson counter. In case of the D input of FF0 is driven by Q‾ output of FF3, that is, the complement of the output of the final flip flop is fed to the D of FF0. Feedback of this arrangement generates the sequence of states illustrated in Table no.1. The 4 bit sequence has a total of 8 states (there is n bit sequence will have 2n states). Therefore an n bit Johnson counter will have a modulus of 2n.
The Q output of all stage feeds the D input of next stage. Although the Q‾ output of the final stage feeds the D input of primary stage. The counter fills up along with 1's from left to right and after that fills up 0s again as demonstrated in Table no.2. Fig. (b) Demonstrates the wave shapes/timing diagram of 4 bit Johnson counter.
Fig.(a) Logic Diagram of Johnson counter
Clock Pulse
Q0
Q1
Q2
Q3
0
1
2
3
4
5
6
7
Table no.1 Sequence of states of 4 bit Johnson Counter
Fig.(b) Timing Diagram of 4-bit Johnson Counter
Token packets in universal serial bus - computer architecture: Token packets consist of a PID byte followed by two payload bytes: a 5-bit CRC and 11 bits of address. Tokens
Question 1: Spreadsheet packages are widely used in Business. a) Explain why spreadsheets are so useful. b) Spreadsheet files are sometimes saved for use by other software p
How can I read .doc document in ASP.Net? You can read from a text file like this. Private void Button12_Click(object sender, System.EventArgs e) { string path="C:
Determine about the security- accidental damage accidental damage is best guarded against by keeping back up files or use Grandfather-Father-Son (GFS) method; also use of passw
Q. Limitations of execution of instructions? 1. Size of memory shown in 16 words while instruction is capable of addressing 210 =1 K words of Memory. However why 210 since 10 b
a) Total available bandwidth = 1 Mbps = 1000 Kbps Each user requires send data at the rate of = 500 kbps As it is circuit switched network we have to dedicate the bandwidth So the
Q. A. Which gates are called Universal Gates? Why? B. State and prove any one of the DeMorgen's Laws. Show that these theorems can be extended up to any number of variables.
A communication protocol is an agreement which specifies a common language two computers use to exchange messages. For instance, a protocol specifies exact format and meaning of ev
Q. Connection Machine FORTRAN? Connection Machine Fortran was a subsequent SIMD language developed by Thinking Machines Corporation. Connection Machine Fortran incorporated all
The current 32 and 64 bit machines can represent integers of around 9 digits and 30 digits respectively, while various scientific and mathematical applications have to represent in
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd