How a shift register can be used as a ring counter, Computer Engineering

Assignment Help:

Explain how a shift register can be used as a ring counter giving the wave forms at the output of the flipflops.

Ans:

Shift Register as a Ring Counter: A Ring Counter is a Circular Shift Register along with only one flip-flop being set at any exacting time; all other are cleared. The particular bit is shifted from one flip-flop to another to produce the sequence of timing signals. Fig.(a) demonstrates a 4-bit shift register linked as a ring counter. The initial value of the register is 1000, that produces the variable T0. The single bit is shifted right along with every clock pulse and circulates back from T3 to T0. Each flip-flop is in the 1 state once all four clocks pulses and generates one of the four timing signals demonstrates in Fig.(b). All output becomes 1 after the negative-edge transition of a clock pulse and keeps 1 during the next clock pulse.

1666_4-bit shift register connected as a ring counter.png

Fig.(a) 4-bit shift register connected as a ring counter.

 

261_Waveforms at the output of Flip-Flops.png

Fig.(b) Waveforms at the output of Flip-Flops


Related Discussions:- How a shift register can be used as a ring counter

What is the file-system security, What is the File-system security Most...

What is the File-system security Most commercial servers use a powerful operating system as base that provides good methods of file-system security. Some servers require additi

First order logic, "George has a dog called Ernie, which is a trained Labra...

"George has a dog called Ernie, which is a trained Labrador. Trained Labradors and poodles are obedient, and all obedient dogs are good dogs. All good dogs that have a master will

What is the meaning of rigging, Rigging is use for if we need to give anima...

Rigging is use for if we need to give animation for any object or character then we apply to character or object internal bone setting(like our bones).that is known as rigging. Whe

State the web server security through ssl, Web server security through SSL ...

Web server security through SSL (Secure Socket Layer) As it is well known that the Intranets and internet are purely based on use of powerful web servers to deliver information

Appropriate name for the superclass, Suppose that your team is then asked t...

Suppose that your team is then asked to expand the system. The publisher now wishes to make other computer science publications. As a team member, you are asked to make a class tha

What are concentrators, What are concentrators? Explain how it helps in con...

What are concentrators? Explain how it helps in connecting number of subscribers. In rural areas, subscribers are usually dispersed. This is both unessential and expensive to g

Transport protocol you use to call a web service soap, What is the transpor...

What is the transport protocol you use to call a Web service SOAP? Http is preferred for Soap whereas tcp for binary i.e. HTTP is used in web services and tcp works well in rem

Define about hyper-threading technology, Q. Define about Hyper-threading te...

Q. Define about Hyper-threading technology? Hyper-threading technology enables a single microprocessor to behave as two separate threaded processors to operating system and app

How e-commerce works for the shop owner, E-commerce is working in tandem wi...

E-commerce is working in tandem with the real shop and if all the products are online running the e-commerce shop is becoming simpler. Owner log in on the special admin side of the

Spcc, Disadvantages of macro processor

Disadvantages of macro processor

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd