How a shift register can be used as a ring counter, Computer Engineering

Assignment Help:

Explain how a shift register can be used as a ring counter giving the wave forms at the output of the flipflops.

Ans:

Shift Register as a Ring Counter: A Ring Counter is a Circular Shift Register along with only one flip-flop being set at any exacting time; all other are cleared. The particular bit is shifted from one flip-flop to another to produce the sequence of timing signals. Fig.(a) demonstrates a 4-bit shift register linked as a ring counter. The initial value of the register is 1000, that produces the variable T0. The single bit is shifted right along with every clock pulse and circulates back from T3 to T0. Each flip-flop is in the 1 state once all four clocks pulses and generates one of the four timing signals demonstrates in Fig.(b). All output becomes 1 after the negative-edge transition of a clock pulse and keeps 1 during the next clock pulse.

1666_4-bit shift register connected as a ring counter.png

Fig.(a) 4-bit shift register connected as a ring counter.

 

261_Waveforms at the output of Flip-Flops.png

Fig.(b) Waveforms at the output of Flip-Flops


Related Discussions:- How a shift register can be used as a ring counter

Illustrate the following list of consideration of Laptop, Illustrate the fo...

Illustrate the following list of consideration of laptop computers The following is a list for consideration: -  The processor must consume as little power as possible thus

Define about abstraction- object oriented systems, Define about Abstractio...

Define about Abstraction-  object oriented systems Abstraction is one of the most important ideas of object oriented systems Abstraction focus on the necessary, inherent aspec

Control hazard and delayed branching, Described Instruction or control haza...

Described Instruction or control hazard? Ans: The pipeline can be stalled due to delay in the availability of an instruction. For instance, this may be a result of a miss in t

Handling interrupts - computer architecture, Handling Interrupts: Pre...

Handling Interrupts: Precise interrupts (sequential semantics) Complete instructions before the offending instructions o   Force trap instruction into IF o

What is event-based simulator, Event-based Simulator Digital  Logic  S...

Event-based Simulator Digital  Logic  Simulation  method  sacrifices  performance  for  rich  functionality:  each active signal  is  calculated  for  every  device  it  propa

What is verilog case 1, What is verilog case (1) ? wire [3:0] x; al...

What is verilog case (1) ? wire [3:0] x; always @(...) begin case (1'b1) x[0]: SOMETHING1; x[1]: SOMETHING2; x[2]: SOMETHING3; x[3]: SOMETHING4; endcase

Identify free memory areas in allocation and de-allocations, Name and expla...

Name and explain the popular techniques to identify free memory areas as a result of allocation and de-allocations in a heap. Two well-liked techniques to identify free memory

Transaction that are programmed by the user, How the transaction that are p...

How the transaction that are programmed by the user can be protected? By executing an authority check.

Authentication system differ from a firewall in functioning, How does an au...

How does an authentication system differ from a firewall in functioning?   Authentication vs. firewall User Authentication and Authorization A significant advanced fi

Flynn’s classification, Flynn's Classification  This classification was...

Flynn's Classification  This classification was early proposed and studied by Michael Flynn in 1972. Flynn did not believe the machine architecture for organization of parallel

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd