System requirements for chip design, Computer Engineering

Assignment Help:

The Peripheral interface chip system requires the construction of the interface chip circuit, which is controlled by main micro-controller via the user interface. I also need set of various programs or instructions using C- language/ C - Compiler for the PIC micro and I2C codes to communicate between the main micro and the interface device through a simple bi-directional 2-wire, serial data (SDA) and serial clock (SCL) bus for inter-IC control. The key objectives are listed below.
Key Objectives:

• Interface chip circuit design
• User Interface i.e. (keypads and LCD display)
• Uploading codes to the Main Micro controller using ICD2
• Interface PIC microcontrollers via I2C bus.
• Writing functions or programs in C-language / C - Compiler for both Main Micro controller and Interface PIC microcontroller
• Writing low level routines or programs to handle communications between the peripherals
• I2C codes to communicate between the main micro and the interface device

TABLE: Specifications considered in the Project Designed:

Power Supply Voltage

2.0v to 5.5v

Current Sink/Source

25mA/25mA

Temperature

-40°C to 125°C

Watchdog timer

2.1uA

Clock Frequency (RTC)

32KHz -100KHz

PIC Micro-controller Family

PIC18F452

 User Interface  Device

LCD and 4x4 Matrix keypads

Serial Interface

I2C Protocol Bus

Software application

MPLAB MCC18- language Compiler


Related Discussions:- System requirements for chip design

Define rotational latency and disk bandwidth, Define rotational latency and...

Define rotational latency and disk bandwidth. Rotational latency is the additional time waiting for the disk to rotate the desired sector to the disk head. The disk bandwidth i

What is interpreter, Q. What is interpreter? An interpreter translates ...

Q. What is interpreter? An interpreter translates each high-level-language statement into its equivalent set of machine-language instructions, which are then executed right awa

What are the authentication methods in .net, What are the authentication me...

What are the authentication methods in .NET?   1. WINDOWS AUTHENTICATION 2. FORMS AUTHENTICATION 3. PASSPORT AUTHENTICATION The authentication option for the ASP.N

Compare single bus structure and multiple bus structure, Compare single bus...

Compare single bus structure and multiple bus structure? A system that having only one bus(i.e only one transfer at a time) is known as a single bus structure. A system is know

Explain naming convention libraries, Explanation:- Common used functions...

Explanation:- Common used functions are placed in libraries. These are located in the SQABas32 subdirectory of the Robot working directory. A library is separated into three fil

#title.linear programming, zmax=7.5x1-3x2 subject to constraints 3x1-x2-x3>...

zmax=7.5x1-3x2 subject to constraints 3x1-x2-x3>=3 x1-x2+x3>=2 x1,x2,x3>=0

Cache memories - computer architecture, Cache Memories - computer architect...

Cache Memories - computer architecture: Speed of the primary memory is very low in comparison with the speed of processor For well performance, the processor can't spend

Advantages offered by data mining, Advantages offered by Data Mining: 1...

Advantages offered by Data Mining: 1.  Facilitates discovery of knowledge from big, massive data sets. 2.  Can be used within dissimilar application areas by Fraud detection

What is the file-system security, What is the File-system security Most...

What is the File-system security Most commercial servers use a powerful operating system as base that provides good methods of file-system security. Some servers require additi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd