How a shift register can be used as a ring counter, Computer Engineering

Assignment Help:

Explain how a shift register can be used as a ring counter giving the wave forms at the output of the flipflops.

Ans:

Shift Register as a Ring Counter: A Ring Counter is a Circular Shift Register along with only one flip-flop being set at any exacting time; all other are cleared. The particular bit is shifted from one flip-flop to another to produce the sequence of timing signals. Fig.(a) demonstrates a 4-bit shift register linked as a ring counter. The initial value of the register is 1000, that produces the variable T0. The single bit is shifted right along with every clock pulse and circulates back from T3 to T0. Each flip-flop is in the 1 state once all four clocks pulses and generates one of the four timing signals demonstrates in Fig.(b). All output becomes 1 after the negative-edge transition of a clock pulse and keeps 1 during the next clock pulse.

1666_4-bit shift register connected as a ring counter.png

Fig.(a) 4-bit shift register connected as a ring counter.

 

261_Waveforms at the output of Flip-Flops.png

Fig.(b) Waveforms at the output of Flip-Flops


Related Discussions:- How a shift register can be used as a ring counter

Hat are the advantages and disadvantages of hardwired, What are the advanta...

What are the advantages and disadvantages of hardwired and micro programmed control? Advantages of hardwired control i. Operate at high speed ii Each state of this coun

Congestion in network layer, explain different types of congestion in netwo...

explain different types of congestion in network layer?

How will you reuse a plan, How will you reuse a plan? Reuse is an benef...

How will you reuse a plan? Reuse is an benefit of OO technology. Two aspects of reuse: Using existing things and making reusable new things It is simpler to reus

Is tcp connection-oriented?, Q. Is tcp Connection-oriented? TCP is conn...

Q. Is tcp Connection-oriented? TCP is connection-oriented. This means a connection is established between source and destination machines before any data is sent it implies tha

Java, differentiate between multitasking and multithreading in java

differentiate between multitasking and multithreading in java

4 variable k-maps, 4-variable K-maps have 16 squares which arearranged in 4...

4-variable K-maps have 16 squares which arearranged in 4 columns and 4 rows.  Columns and rows are labeled with 2 variables. The rows are arranged so that C or D ch

Explain the differences between paging and segmentation, Explain the differ...

Explain the differences between Paging and segmentation. Paging and segmentation P aging Segmentation Computer memory is separa

Doubly linked list, A doubly linked list is like a linked list except that ...

A doubly linked list is like a linked list except that each node has a pointer both to the next node in the list and to the previous node in the list. There are also pointers to th

What is public key cryptography, What is Public Key Cryptography? Pub...

What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd