Explain the working of a three bit binary ripple counter, Computer Engineering

Assignment Help:

With the help of clocked JK flip flops and waveforms, explain the working of a three bit binary ripple counter. Write truth table for clock transitions.

Ans. Three-Bit Binary Ripple Counter: Into Ripple Counters, each Flip-flop are not clocked concurrently and the flip-flops do not change state accurately at the similar time. A three-bit Binary Counter has maximum of 23 states that is, 8 states, that needs 3 Flip-Flops. The word Binary Counter implies a counter that counts and makes binary outputs 000,001,010--111. This goes through a binary sequence of 8 different states (that is from 0 to 7). Fig.(a) demonstrates the logic circuit of a three-bit Binary Ripple Counter having 3 Edge Triggered JK flip-flops. Here indicated by tiny circles at the CLK input of flip- flops, the triggering happens while CLK input finds a negative edge. Q0 is the Least Significant Bit i.e. LSB and Q2 is the Most Significant Bit i.e. MSB. The flip-flops are linked in series. The Q0 output is linked to CLK terminal of second flip-flop. The Q1 output is linked to CLK terminal of 3rd flip-flop. This is termed as a Ripple Counter since the carry moves by the flip-flops like a ripple on water.

Working: Initially, CLR is changed to Low and all flip-flops Reset providing an output Q = 000. While CLR becomes High, the counter is get ready to start. As LSB gets its clock pulse, the total output Q = 001 and its output changes from 0 to 1. While second clock pulse arrives, Q0 resets and carries (that is, Q0 goes from 1 to 0 and, second flip flop will receive CLK input. There is the output is Q = 010. The third CLK pulse changing from Q0 to 1 providing a total output Q = 011. The fourth CLK pulse because of Q0 to reset and carry and Q1 also resets and carries providing a total output Q = 100 and thus the process goes on. The action is illustrated is Table. The no. of output states of a counter is termed as Modulus or Mod. A Ripple Counter along with 3 flip-flops can count 0 to 7 and is thus, termed as Mod-8 counter.

Counter State

Q2

Q1

Q0

0

0

0

0

1

0

0

1

2

0

1

0

3

0

1

1

4

1

0

0

5

1

0

1

6

1

1

0

7

1

1

1

Table: Counting Sequence of a 3-bit Binary Ripple Counter

101_xplain the working of a three bit binary ripple counter.png

Fig.(a) Logic Diagram of 3-Bit Binary Ripple Counter

Ripple counters are easy to fabricate but contain the problem as the carry has to propagate by a no. of flip flops. The delay times of whole the flip flops are added. Thus, they are extremely slow for several applications. The other problem is that unnecessary pulses happen at the output of gates.

1935_Explain the working of a three bit binary ripple counter12.png

Fig.(b) Timing Diagram of 3-bit Binary Ripple Counter

The timing diagram is demonstrated in Fig.(b). Here FF0 is LSB flip flop as well as FF2 is the MSB flip flop. Because FF0 obtains each clock pulse, Q0 toggles once per negative clock edge as demonstrated in Fig. (b). All remaining flip flops toggle less frequently since they receive negative clock edge through preceding flip flops. While Q0 goes from 1 to 0, FF1 obtains a negative edge and toggles. Likewise, when Q1 changes 1 to 0, FF2 obtains a negative edge and toggles. At last when Q2 changes 1 to 0, FF3 obtains a negative edge and toggles. Therefore, whenever a flip flop resets to 0, the subsequent higher flip flop toggles.

This counter is termed as ripple counter since the 8th clock pulse is applied; the trailing edges of 8th pulse cause a transition in every flip flop. So Q0 goes from High to Low, it causes Q1 go from High to Low that causes Q2 to go from High to Low that causes Q3 to go from High to Low. Therefore the effect ripples throughout the counter. This is the delay caused by this ripple that results in a limitation upon the maximum frequency of input signal.


Related Discussions:- Explain the working of a three bit binary ripple counter

What is shadow ram, Shadow RAM is a copy of Basic Input/Output Operating Sy...

Shadow RAM is a copy of Basic Input/Output Operating System (BIOS) routines from read-only memory (ROM) into a particular area of random access memory (RAM) so that they can be acc

Intentional hacking helps in maintaining better security, Intentional hacki...

Intentional hacking helps in maintaining better security Several companies employ professionals as security specialists whose basic job is to detect and cover loopholes in t

Execution of a full instruction - computer architecture, Execution of a ful...

Execution of a full Instruction: Regard as the instruction: Add (R3), R1 Executing this particular instruction needed the below described actions: a) Fetch the

Elements of composition - line, Line A Line is, on a simple level, a ma...

Line A Line is, on a simple level, a mark connecting 2 points. However, how lines are used in an image is extremely important. By varying the quality of line used in an image,

Describe the difference between cache and virtual memory, Question 1: (...

Question 1: (a) What do you meant by an expert system? (b) Describe benefits of the EDI. (c) Describe what you understand by: (i) File Infectors (ii) Boot Sect

What is indirect addressing mode explain, Q. What is Indirect Addressing Mo...

Q. What is Indirect Addressing Mode explain? Indirect Addressing Mode In the indirect addressing modes operands employ registers to point to locations in memory. So it is

Distributivity of connectives, Distributivity of Connectives : In our ...

Distributivity of Connectives : In our last analogy with arithmetic will involve a very well-technique need for playing around with algebraic properties. But assume there if w

Discuss functioning of different network access equipments, Discuss the fun...

Discuss the functioning of different network access equipments. The E1 multiplexers MX2000 and MX2411 and E1/T1 MX200 are giving multi interface user access to network PDH or S

What is pattern, What is pattern? A pattern is a proven solution to a g...

What is pattern? A pattern is a proven solution to a general problem. Lots of patterns are used. There are patterns for analysis, architecture, design and execution. Patterns c

Calculate register transfer time, Q. Calculate Register Transfer Time? ...

Q. Calculate Register Transfer Time? A clock isn't included explicitly in any statements discussed above. But it is presumed that all transfers take place during clock edge tra

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd