How a shift register can be used as a ring counter, Computer Engineering

Assignment Help:

Explain how a shift register can be used as a ring counter giving the wave forms at the output of the flipflops.

Ans:

Shift Register as a Ring Counter: A Ring Counter is a Circular Shift Register along with only one flip-flop being set at any exacting time; all other are cleared. The particular bit is shifted from one flip-flop to another to produce the sequence of timing signals. Fig.(a) demonstrates a 4-bit shift register linked as a ring counter. The initial value of the register is 1000, that produces the variable T0. The single bit is shifted right along with every clock pulse and circulates back from T3 to T0. Each flip-flop is in the 1 state once all four clocks pulses and generates one of the four timing signals demonstrates in Fig.(b). All output becomes 1 after the negative-edge transition of a clock pulse and keeps 1 during the next clock pulse.

1666_4-bit shift register connected as a ring counter.png

Fig.(a) 4-bit shift register connected as a ring counter.

 

261_Waveforms at the output of Flip-Flops.png

Fig.(b) Waveforms at the output of Flip-Flops


Related Discussions:- How a shift register can be used as a ring counter

State and prove any one of the demorgen''s laws, Q. F(x,y,z) = ∑m (4,6,7,8...

Q. F(x,y,z) = ∑m (4,6,7,8)+ ∑d (2,5,11,12) Using K-Map. Q. State and prove any one of the DeMorgen's Laws. Show that these theorems can be extended up to any number of variabl

Global business-to-consumer e-commerce, "Global business-to-consumer e-comm...

"Global business-to-consumer e-commerce sales will pass the 1 trillion euro ($1.25 trillion) mark by 2013, and the total number of Internet users will increase to approximately 3.5

Security, We now consider the relation between passwords and key size. For ...

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

Pd controller, PD controller Student should aim for Kp and Kd value that...

PD controller Student should aim for Kp and Kd value that will minimize the steady error with improved rise time and settling time. The amount of over shoot should not be more t

Determine the purpose of GDTR, Elucidate the purpose of GDTR. If the microp...

Elucidate the purpose of GDTR. If the microprocessor sends linear address 00200000H to paging mechanism, which paging directory entry and which page table entry is accessed? GD

Applications of microprogramming - computer architecture, Applications of M...

Applications of Microprogramming: Microprogramming application:: emulation o   Use of a micro program on 1 machine to execute programs initially written to run on ano

Define the term internet, Internet:  The Internet, an umbrella term cov...

Internet:  The Internet, an umbrella term cover countless network and services that comprise a super-network, is a global network of computer networks that was started in the 1

State in brief about third generation electronic computers, Third Generatio...

Third Generation (1963-1972) The third generation introduced huge gains in computational power. Innovations in this time include use of integrated circuits or ICs (semiconducto

What are the advantages of using uml, Benefits of using UML breaks the comp...

Benefits of using UML breaks the complex system into discrete pieces that can be understood simply. Handover the system to new team becomes simpler. Complex system can be un

Convert, haw to convert context free grammar to regular grammar

haw to convert context free grammar to regular grammar

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd