ch6_Functions of Combinational Logic

ch6_Functions of Combinational Logic - Ch.6 Functions of...

Info iconThis preview shows pages 1–21. Sign up to view the full content.

View Full Document Right Arrow Icon
Ch.6 Functions of Combination Logic Basi c Adder s Par al l el Bi nar y Adder s Compar at or s Decoder s Encoder s Code Conver t er s Mul t i pl exer s( Dat a Sel ect or s) Demul t i pl exer s Par i t y Gener at or s/ Checker s Tr oubl eshoot i ng Pr ogr ammabl e Logi c: The FPGA Logi c Funct i ons wi t h VHDL
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Information Security Lab. I nt r oduct i on f n m Y=f(X) X X: the finite set of input symbols Y: the finite set of output symbols f: a Boolean function for the output Digital Logic (1) Combinational Logic Circuit, (2) Sequential Logic Circuit Combinational Logic Circuit
Background image of page 2
3 Information Security Lab. Sequential Logic Circuit Latches, Flip-flops RAM, etc.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Information Security Lab. Basi c Adders The Half-Adder A + B = Σ (sum) and a carry Σ = A B Carry = AB This is logic not math 1 0 1 1 0 1 0 1 0 1 1 0 0 0 0 0 Car r y Σ B A
Background image of page 4
5 Information Security Lab. The Ful l - Adder The f ul l Adder has a Car r y I n 1 1 1 1 1 0 1 0 1 1 0 1 1 0 1 1 0 0 0 1 0 1 1 1 0 1 0 0 1 0 1 0 1 0 0 0 0 0 0 0 Σ C out C i n B A Full Adder Logic Σ = (A B)’C in + (A B )C’ in or Σ = (A B) C in C out = AB + (A B) C in
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Information Security Lab.
Background image of page 6
7 Information Security Lab. Ful l Adder
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Information Security Lab. Figure 6-5 Full-adder implemented with half-adders.
Background image of page 8
9 Information Security Lab. I mpl ement at i on of Ful l Adder i n Sum Pr oduct s
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Information Security Lab. Par al l el Bi nar y Adder s 1 1 1 + 0 1 1 0 0 In this case, the carry bit from second column becomes a sum bit Carry bit from right column
Background image of page 10
11 Information Security Lab. Bi t Par al l el Adder Ripple carry : carry propagation delay Look-ahead carry
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
12 Information Security Lab. Adder Expansi on: 16 bi t adder
Background image of page 12
13 Information Security Lab. Bi nar y Ri ppl e Car r y Adder Input Carry 0110 Augend A 1011 Addend B 0011 Sum S 1110 Output Carry
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
14 Information Security Lab. Fi gur e A- 2 Four - bi t par al l el adder s.
Background image of page 14
15 Information Security Lab. Fi gur e A- 3 Char act er i st i cs f or t he 74LS283.
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
16 Information Security Lab. Ex 6- 4) Show how t wo 4- bi t par al l el adder s can be connect ed t o f or m an 8- bi t adder. out put bi t s f or t he f ol l owi ng 8- bi t i nput A 8 A 7 A 6 A 5 A 4 A 3 A 2 A 1 =1011 B 5 B 4 B 3 B 2 B 1 =1001 1110 Sol )
Background image of page 16
17 Information Security Lab. I n n- bi t r i ppl e car r y adder : 2n( or 2n+2) gat e del ays r educe t he gat e del ays Look- ahead Car y Par t i al Ful l Adder ( PFA) pr opagat e f unct i on P i =A i B i gener at e G i =A i B i Sum S i =P i C i Car r y C i +1 =G i + P i C i S i C i +1 C i A i B i P i G i Car r y Look- ahead Adder
Background image of page 17

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
18 Information Security Lab. C 1 =G 0 +P 0 C 0 C 2 =G 1 +P 1 C 1 = G 1 +P 1 ( G 0 +P 0 C 0 ) = G 1 + P 1 G 0 + P 1 P 0 C 0 C 3 =G 2 +P 2 C 2 = G 2 +P 2 G 1 +P 2 P 1 G 0 + P 2 P 1 P 0 C 0 C 4 =G 3 +P 3 C 3 = G 3 +P 3 G 2 +P 3 P 2 G 1 + P 3 P 2 P 1 G 0 + P 3 P 2 P 1 P 0 C 0 • • • • • • C i =G i - 1 +P i - 1 G i - 2 + P i - 1 P i - 2 G i - 3 + • • + P i - 1 • • P 2 G 0 + P i - 1 • • P 1 P 0 C 0
Background image of page 18
19 Information Security Lab.
Background image of page 19

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
20 Information Security Lab.
Background image of page 20
Image of page 21
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 105

ch6_Functions of Combinational Logic - Ch.6 Functions of...

This preview shows document pages 1 - 21. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online