Explain the working of a three bit binary ripple counter, Computer Engineering

Assignment Help:

With the help of clocked JK flip flops and waveforms, explain the working of a three bit binary ripple counter. Write truth table for clock transitions.

Ans. Three-Bit Binary Ripple Counter: Into Ripple Counters, each Flip-flop are not clocked concurrently and the flip-flops do not change state accurately at the similar time. A three-bit Binary Counter has maximum of 23 states that is, 8 states, that needs 3 Flip-Flops. The word Binary Counter implies a counter that counts and makes binary outputs 000,001,010--111. This goes through a binary sequence of 8 different states (that is from 0 to 7). Fig.(a) demonstrates the logic circuit of a three-bit Binary Ripple Counter having 3 Edge Triggered JK flip-flops. Here indicated by tiny circles at the CLK input of flip- flops, the triggering happens while CLK input finds a negative edge. Q0 is the Least Significant Bit i.e. LSB and Q2 is the Most Significant Bit i.e. MSB. The flip-flops are linked in series. The Q0 output is linked to CLK terminal of second flip-flop. The Q1 output is linked to CLK terminal of 3rd flip-flop. This is termed as a Ripple Counter since the carry moves by the flip-flops like a ripple on water.

Working: Initially, CLR is changed to Low and all flip-flops Reset providing an output Q = 000. While CLR becomes High, the counter is get ready to start. As LSB gets its clock pulse, the total output Q = 001 and its output changes from 0 to 1. While second clock pulse arrives, Q0 resets and carries (that is, Q0 goes from 1 to 0 and, second flip flop will receive CLK input. There is the output is Q = 010. The third CLK pulse changing from Q0 to 1 providing a total output Q = 011. The fourth CLK pulse because of Q0 to reset and carry and Q1 also resets and carries providing a total output Q = 100 and thus the process goes on. The action is illustrated is Table. The no. of output states of a counter is termed as Modulus or Mod. A Ripple Counter along with 3 flip-flops can count 0 to 7 and is thus, termed as Mod-8 counter.

Counter State

Q2

Q1

Q0

0

0

0

0

1

0

0

1

2

0

1

0

3

0

1

1

4

1

0

0

5

1

0

1

6

1

1

0

7

1

1

1

Table: Counting Sequence of a 3-bit Binary Ripple Counter

101_xplain the working of a three bit binary ripple counter.png

Fig.(a) Logic Diagram of 3-Bit Binary Ripple Counter

Ripple counters are easy to fabricate but contain the problem as the carry has to propagate by a no. of flip flops. The delay times of whole the flip flops are added. Thus, they are extremely slow for several applications. The other problem is that unnecessary pulses happen at the output of gates.

1935_Explain the working of a three bit binary ripple counter12.png

Fig.(b) Timing Diagram of 3-bit Binary Ripple Counter

The timing diagram is demonstrated in Fig.(b). Here FF0 is LSB flip flop as well as FF2 is the MSB flip flop. Because FF0 obtains each clock pulse, Q0 toggles once per negative clock edge as demonstrated in Fig. (b). All remaining flip flops toggle less frequently since they receive negative clock edge through preceding flip flops. While Q0 goes from 1 to 0, FF1 obtains a negative edge and toggles. Likewise, when Q1 changes 1 to 0, FF2 obtains a negative edge and toggles. At last when Q2 changes 1 to 0, FF3 obtains a negative edge and toggles. Therefore, whenever a flip flop resets to 0, the subsequent higher flip flop toggles.

This counter is termed as ripple counter since the 8th clock pulse is applied; the trailing edges of 8th pulse cause a transition in every flip flop. So Q0 goes from High to Low, it causes Q1 go from High to Low that causes Q2 to go from High to Low that causes Q3 to go from High to Low. Therefore the effect ripples throughout the counter. This is the delay caused by this ripple that results in a limitation upon the maximum frequency of input signal.


Related Discussions:- Explain the working of a three bit binary ripple counter

Explain difference between security and protection, Explain difference betw...

Explain difference between Security and Protection? Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a

Explain the program invisible registers, What are program invisible registe...

What are program invisible registers? Global and local descriptor tables are found in memory system. In order to specify and access the address of these tables, program invisi

What are the digital certificates of hardware computations, What are the Di...

What are the Digital certificates of hardware computations Digital certificates are highly dependent on hardware computations, it is essential that mechanisms are evolved to i

Why a function canot have delays, Why a function canot have delays? How...

Why a function canot have delays? However in Open Vera, delays are allowed in function. A function returns a value and hence can be used as a part of any expression. This doesn

The types of parameters in the function modules, What are the types of para...

What are the types of parameters in the function modules? In general, function module can have four types of parameters: EXPORTING : for passing data to the called function

Mpi, write an8086 alp to exchange a block of N bytes of data between sourc...

write an8086 alp to exchange a block of N bytes of data between source and destination

Differentiate the latch and flip-flop, Differentiate the latch and flip-flo...

Differentiate the latch and flip-flop? The major difference between latch and FF is which latches is level sensitive whereas FF is edge sensitive. They both need the use of clo

Which objects are independent transport objects, Which objects are independ...

Which objects are independent transport objects? Domains, Data elements, Tables, Technical settings for tables, Secondary indexes for transparent tables, Structures, Views, Ma

Conversion of data types done between abap/4 & db layer, How is conversion ...

How is conversion of data types done between ABAP/4 & DB layer? Conversion among ABAP/4 data types and the database layer is complete within the database interface

State about the data glove, State about the Data Glove  Data glove is u...

State about the Data Glove  Data glove is used to grasp a "virtual" object. The glove is constructed with a series of sensors that detect hand and finger motions. Electromagnet

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd