How a shift register can be used as a ring counter, Computer Engineering

Assignment Help:

Explain how a shift register can be used as a ring counter giving the wave forms at the output of the flipflops.

Ans:

Shift Register as a Ring Counter: A Ring Counter is a Circular Shift Register along with only one flip-flop being set at any exacting time; all other are cleared. The particular bit is shifted from one flip-flop to another to produce the sequence of timing signals. Fig.(a) demonstrates a 4-bit shift register linked as a ring counter. The initial value of the register is 1000, that produces the variable T0. The single bit is shifted right along with every clock pulse and circulates back from T3 to T0. Each flip-flop is in the 1 state once all four clocks pulses and generates one of the four timing signals demonstrates in Fig.(b). All output becomes 1 after the negative-edge transition of a clock pulse and keeps 1 during the next clock pulse.

1666_4-bit shift register connected as a ring counter.png

Fig.(a) 4-bit shift register connected as a ring counter.

 

261_Waveforms at the output of Flip-Flops.png

Fig.(b) Waveforms at the output of Flip-Flops


Related Discussions:- How a shift register can be used as a ring counter

What is domain analysis, What is domain analysis? Domain analysis is c...

What is domain analysis? Domain analysis is concerned with devising a precise, concise, understandable and correct model of the real world. Analysis starts with problem statem

Name the concepts of object oriented, Name the concepts of Object oriented ...

Name the concepts of Object oriented There are various concepts of object oriented analysis Abstraction, Encapsulation, Identity, Modularity, Hierarchy, Typin

Syntax and semantics for first-order logic , Syntax and Semanticsx and Sema...

Syntax and Semanticsx and Semantics for First-order logic - artificial intelligence: Propositional logic is limited  in its expressiveness: it may just represent true and false

Explain asymmetric cryptographyand its components, Explain Asymmetric crypt...

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

Drawbacks, drawbacks of shadow paging

drawbacks of shadow paging

How to clear computer motherboard cmos password, As CMOS is a special chip ...

As CMOS is a special chip with its own battery, the best way to clear out a CMOS chip is to cut off it from its power supply. To clear the CMOS password you just take away the

user to enter the weight, A red and blue car were involved in a head-on co...

A red and blue car were involved in a head-on collision. The red car was at a standstill and the blue car was possibly  speeding. Eye witness video recorded suddenly following the

#title, what are the applications of microprogramming

what are the applications of microprogramming

Exit command, Your shell must accept the exit command. This command will ...

Your shell must accept the exit command. This command will be in the form: e x i t When you encounter this command, your shell should terminate. Please note that when you

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd