Tuesday 7 May 2013

Passband modulation
                                                                AM,FM,PM,QAM,SM,SSB
                                          ASK,APSK,CPM,FSK,MFSK,MSK,OOK,PPM,PSK,QAM,SC-FDE,TCM
                                                                        CSS,DSSS,FHSS,THSS
                                                                                        See also
                                           Capacity-approaching codes,Demodulation,Line coding,Modem,PAM,PCM,PWM



In electronics and telecommunications, modulation is the process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal which typically contains information to be transmitted. This is done in a similar fashion to a musician modulating a tone (a periodic waveform) from a musical instrument by varying its volume, timing and pitch. The three key parameters of a periodic waveform are its amplitude("volume"), its phase ("timing") and its frequency ("pitch"). Any of these properties can be modified in accordance with a low frequency signal to obtain the modulated signal. Typically a high-frequency sinusoid waveform is used as carrier signal, but a square wave pulse train may also be used.
In telecommunications, modulation is the process of conveying a message signal, for example a digital bit stream or an analog audio signal, inside another signal that can be physically transmitted. Modulation of a sine waveform is used to transform a baseband message signal into a passband signal, for example low-frequency audio signal into a radio-frequency signal (RF signal). In radio communications, cable TV systems or the public switched telephone network for instance, electrical signals can only be transferred over a limited passband frequency spectrum, with specific (non-zero) lower and upper cutoff frequencies. Modulating a sine-wave carrier makes it possible to keep the frequency content of the transferred signal as close as possible to the centre frequency (typically the carrier frequency) of the passband.
A device that performs modulation is known as a modulator and a device that performs the inverse operation of modulation is known as a demodulator(sometimes detector or demod). A device that can do both operations is a modem (from "modulator–demodulator").
The aim of digital modulation is to transfer a digital bit stream over an analog bandpass channel, for example over the public switched telephone network (where a bandpass filter limits the frequency range to between 300 and 3400 Hz), or over a limited radio frequency band.
The aim of analog modulation is to transfer an analog baseband (or lowpass) signal, for example an audio signal or TV signal, over an analog bandpass channel at a different frequency, for example over a limited radio frequency band or a cable TV network channel.
Analog and digital modulation facilitate frequency division multiplexing (FDM), where several low pass information signals are transferred simultaneously over the same shared physical medium, using separate passband channels (several different carrier frequencies).
The aim of digital baseband modulation methods, also known as line coding, is to transfer a digital bit stream over a baseband channel, typically a non-filtered copper wire such as a serial busor a wired local area network.
The aim of pulse modulation methods is to transfer a narrowband analog signal, for example a phone call over a wideband baseband channel or, in some of the schemes, as a bit stream over another digital transmission system.
In music synthesizers, modulation may be used to synthesise waveforms with an extensive overtone spectrum using a small number of oscillators. In this case the carrier frequency is typically in the same order or much lower than the modulating waveform. See for example frequency modulation synthesis or ring modulation synthesis.
Contents
  [hide
·         1 Analog modulation methods
·         2 Digital modulation methods
·         4 Pulse modulation methods
·         6 See also
·         7 References
Analog modulation methods [edit]
http://upload.wikimedia.org/wikipedia/commons/thumb/a/a4/Amfm3-en-de.gif/200px-Amfm3-en-de.gif
http://bits.wikimedia.org/static-1.22wmf3/skins/common/images/magnify-clip.png
A low-frequency message signal (top) may be carried by an AM or FM radio wave.
In analog modulation, the modulation is applied continuously in response to the analog information signal. Common analog modulation techniques are:[1]
·         Amplitude modulation (AM) (here the amplitude of the carrier signal is varied in accordance to the instantaneous amplitude of the modulating signal)
·         Double-sideband modulation (DSB)
·         Double-sideband modulation with carrier (DSB-WC) (used on the AM radio broadcasting band)
·         Double-sideband reduced carrier transmission (DSB-RC)
·         Single-sideband modulation (SSB, or SSB-AM)
·         SSB with carrier (SSB-WC)
·         SSB suppressed carrier modulation (SSB-SC)
·         Vestigial sideband modulation (VSB, or VSB-AM)
·         Quadrature amplitude modulation (QAM)
·         Angle modulation, which is approximately constant envelope
·         Frequency modulation (FM) (here the frequency of the carrier signal is varied in accordance to the instantaneous amplitude of the modulating signal)
·         Phase modulation (PM) (here the phase shift of the carrier signal is varied in accordance to the instantaneous amplitude of the modulating signal)
Digital modulation methods [edit]
In digital modulation, an analog carrier signal is modulated by a discrete signal. Digital modulation methods can be considered as digital-to-analog conversion, and the corresponding demodulationor detection as analog-to-digital conversion. The changes in the carrier signal are chosen from a finite number of M alternative symbols (the modulation alphabet).
http://upload.wikimedia.org/wikipedia/en/thumb/4/4a/Baud.svg/200px-Baud.svg.png
http://bits.wikimedia.org/static-1.22wmf3/skins/common/images/magnify-clip.png
Schematic of 4 baud (8 bit/s) data link containing arbitraily chosen values.
A simple example: A telephone line is designed for transferring audible sounds, for example tones, and not digital bits (zeros and ones). Computers may however communicate over a telephone line by means of modems, which are representing the digital bits by tones, called symbols. If there are four alternative symbols (corresponding to a musical instrument that can generate four different tones, one at a time), the first symbol may represent the bit sequence 00, the second 01, the third 10 and the fourth 11. If the modem plays a melody consisting of 1000 tones per second, the symbol rate is 1000 symbols/second, or baud. Since each tone (i.e., symbol) represents a message consisting of two digital bits in this example, the bit rate is twice the symbol rate, i.e. 2000 bits per second. This is similar to the technique used by dialup modems as opposed to DSLmodems.
According to one definition of digital signal, the modulated signal is a digital signal, and according to another definition, the modulation is a form of digital-to-analog conversion. Most textbooks would consider digital modulation schemes as a form of digital transmission, synonymous to data transmission; very few would consider it as analog transmission.
Fundamental digital modulation methods [edit]
The most fundamental digital modulation techniques are based on keying:
·         PSK (phase-shift keying): a finite number of phases are used.
·         FSK (frequency-shift keying): a finite number of frequencies are used.
·         ASK (amplitude-shift keying): a finite number of amplitudes are used.
·         QAM (quadrature amplitude modulation): a finite number of at least two phases and at least two amplitudes are used.
In QAM, an inphase signal (the I signal, for example a cosine waveform) and a quadrature phase signal (the Q signal, for example a sine wave) are amplitude modulated with a finite number of amplitudes, and summed. It can be seen as a two-channel system, each channel using ASK. The resulting signal is equivalent to a combination of PSK and ASK.
In all of the above methods, each of these phases, frequencies or amplitudes are assigned a unique pattern of binary bits. Usually, each phase, frequency or amplitude encodes an equal number of bits. This number of bits comprises the symbol that is represented by the particular phase, frequency or amplitude.
If the alphabet consists of M = 2^N  alternative symbols, each symbol represents a message consisting of N bits. If the symbol rate (also known as the baud rate) is f_{S} symbols/second (orbaud), the data rate is N f_{S} bit/second.
For example, with an alphabet consisting of 16 alternative symbols, each symbol represents 4 bits. Thus, the data rate is four times the baud rate.
In the case of PSK, ASK or QAM, where the carrier frequency of the modulated signal is constant, the modulation alphabet is often conveniently represented on a constellation diagram, showing the amplitude of the I signal at the x-axis, and the amplitude of the Q signal at the y-axis, for each symbol.
Modulator and detector principles of operation [edit]
PSK and ASK, and sometimes also FSK, are often generated and detected using the principle of QAM. The I and Q signals can be combined into a complex-valued signal I+jQ (where j is theimaginary unit). The resulting so called equivalent lowpass signal or equivalent baseband signal is a complex-valued representation of the real-valued modulated physical signal (the so-calledpassband signal or RF signal).
These are the general steps used by the modulator to transmit data:
1.    Group the incoming data bits into codewords, one for each symbol that will be transmitted.
2.    Map the codewords to attributes, for example amplitudes of the I and Q signals (the equivalent low pass signal), or frequency or phase values.
3.    Adapt pulse shaping or some other filtering to limit the bandwidth and form the spectrum of the equivalent low pass signal, typically using digital signal processing.
4.    Perform digital to analog conversion (DAC) of the I and Q signals (since today all of the above is normally achieved using digital signal processing, DSP).
5.    Generate a high frequency sine carrier waveform, and perhaps also a cosine quadrature component. Carry out the modulation, for example by multiplying the sine and cosine waveform with the I and Q signals, resulting in the equivalent low pass signal being frequency shifted to the modulated passband signal or RF signal. Sometimes this is achieved using DSP technology, for example direct digital synthesis using a waveform table, instead of analog signal processing. In that case the above DAC step should be done after this step.
6.    Amplification and analog bandpass filtering to avoid harmonic distortion and periodic spectrum
At the receiver side, the demodulator typically performs:
1.    Bandpass filtering.
2.    Automatic gain control, AGC (to compensate for attenuation, for example fading).
3.    Frequency shifting of the RF signal to the equivalent baseband I and Q signals, or to an intermediate frequency (IF) signal, by multiplying the RF signal with a local oscillator sinewave and cosine wave frequency (see the superheterodyne receiver principle).
4.    Sampling and analog-to-digital conversion (ADC) (Sometimes before or instead of the above point, for example by means of undersampling).
5.    Equalization filtering, for example a matched filter, compensation for multipath propagation, time spreading, phase distortion and frequency selective fading, to avoid intersymbol interferenceand symbol distortion.
6.    Detection of the amplitudes of the I and Q signals, or the frequency or phase of the IF signal.
7.    Quantization of the amplitudes, frequencies or phases to the nearest allowed symbol values.
8.    Mapping of the quantized amplitudes, frequencies or phases to codewords (bit groups).
9.    Parallel-to-serial conversion of the codewords into a bit stream.
10. Pass the resultant bit stream on for further processing such as removal of any error-correcting codes.
As is common to all digital communication systems, the design of both the modulator and demodulator must be done simultaneously. Digital modulation schemes are possible because the transmitter-receiver pair have prior knowledge of how data is encoded and represented in the communications system. In all digital communication systems, both the modulator at the transmitter and the demodulator at the receiver are structured so that they perform inverse operations.
Non-coherent modulation methods do not require a receiver reference clock signal that is phase synchronized with the sender carrier wave. In this case, modulation symbols (rather than bits, characters, or data packets) are asynchronously transferred. The opposite is coherent modulation.
List of common digital modulation techniques [edit]
The most common digital modulation techniques are:
·         Phase-shift keying (PSK):
·         Binary PSK (BPSK), using M=2 symbols
·         Quadrature PSK (QPSK), using M=4 symbols
·         8PSK, using M=8 symbols
·         16PSK, using M=16 symbols
·         Differential PSK (DPSK)
·         Differential QPSK (DQPSK)
·         Offset QPSK (OQPSK)
·         π/4–QPSK
·         Frequency-shift keying (FSK):
·         Audio frequency-shift keying (AFSK)
·         Multi-frequency shift keying (M-ary FSK or MFSK)
·         Dual-tone multi-frequency (DTMF)
·         Amplitude-shift keying (ASK)
·         On-off keying (OOK), the most common ASK form
·         M-ary vestigial sideband modulation, for example 8VSB
·         Quadrature amplitude modulation (QAM) - a combination of PSK and ASK:
·         Polar modulation like QAM a combination of PSK and ASK.[citation needed]
·         Continuous phase modulation (CPM) methods:
·         Minimum-shift keying (MSK)
·         Gaussian minimum-shift keying (GMSK)
·         Continuous-phase frequency-shift keying (CPFSK)
·         Orthogonal frequency-division multiplexing (OFDM) modulation:
·         discrete multitone (DMT) - including adaptive modulation and bit-loading.
·         Wavelet modulation
·         Trellis coded modulation (TCM), also known as trellis modulation
·         Spread-spectrum techniques:
·         Direct-sequence spread spectrum (DSSS)
·         Chirp spread spectrum (CSS) according to IEEE 802.15.4a CSS uses pseudo-stochastic coding
·         Frequency-hopping spread spectrum (FHSS) applies a special scheme for channel release
MSK and GMSK are particular cases of continuous phase modulation. Indeed, MSK is a particular case of the sub-family of CPM known as continuous-phase frequency-shift keying (CPFSK) which is defined by a rectangular frequency pulse (i.e. a linearly increasing phase pulse) of one symbol-time duration (total response signaling).
OFDM is based on the idea of frequency-division multiplexing (FDM), but the multiplexed streams are all parts of a single original stream. The bit stream is split into several parallel data streams, each transferred over its own sub-carrier using some conventional digital modulation scheme. The modulated sub-carriers are summed to form an OFDM signal. This dividing and recombining helps with handling channel impairments. OFDM is considered as a modulation technique rather than a multiplex technique, since it transfers one bit stream over one communication channel using one sequence of so-called OFDM symbols. OFDM can be extended to multi-user channel access method in the orthogonal frequency-division multiple access (OFDMA) and multi-carrier code division multiple access (MC-CDMA) schemes, allowing several users to share the same physical medium by giving different sub-carriers or spreading codes to different users.
Of the two kinds of RF power amplifier, switching amplifiers (Class D amplifiers) cost less and use less battery power than linear amplifiers of the same output power. However, they only work with relatively constant-amplitude-modulation signals such as angle modulation (FSK or PSK) and CDMA, but not with QAM and OFDM. Nevertheless, even though switching amplifiers are completely unsuitable for normal QAM constellations, often the QAM modulation principle are used to drive switching amplifiers with these FM and other waveforms, and sometimes QAM demodulators are used to receive the signals put out by these switching amplifiers.
Automatic digital modulation recognition (ADMR) [edit]
Automatic digital modulation recognition in intelligent communication systems is one of the most important issues in software defined radio and cognitive radio. According to incremental expanse of intelligent receivers, automatic modulation recognition becomes a challenging topic in telecommunication systems and computer engineering. Such systems have many civil and military applications. Moreover, blind recognition of modulation type is an important problem in commercial systems, especially in software defined radio. Usually in such systems, there are some extra information for system configuration, but considering blind approaches in intelligent receivers, we can reduce information overload and increase transmission performance.[2] Obviously, with no knowledge of the transmitted data and many unknown parameters at the receiver, such as the signal power, carrier frequency and phase offsets, timing information, etc., blind identification of the modulation is a difficult task. This becomes even more challenging in real-world scenarios with multipath fading, frequency-selective and time-varying channels.[3]
There are two main approaches to automatic modulation recognition. The first approach uses likelihood-based methods to assign an input signal to a proper class. Another recent approach is based on feature extraction.
Digital baseband modulation or line coding [edit]
Main article: Line code
The term digital baseband modulation (or digital baseband transmission) is synonymous to line codes. These are methods to transfer a digital bit stream over an analog baseband channel (a.k.a. lowpass channel) using a pulse train, i.e. a discrete number of signal levels, by directly modulating the voltage or current on a cable. Common examples are unipolar, non-return-to-zero(NRZ), Manchester and alternate mark inversion (AMI) codings.[4]
[show]
·         v

·         t

·         e
Line coding (digital baseband transmission)
Pulse modulation methods [edit]
Pulse modulation schemes aim at transferring a narrowband analog signal over an analog baseband channel as a two-level signal by modulating a pulse wave. Some pulse modulation schemes also allow the narrowband analog signal to be transferred as a digital signal (i.e. as a quantized discrete-time signal) with a fixed bit rate, which can be transferred over an underlying digital transmission system, for example some line code. These are not modulation schemes in the conventional sense since they are not channel coding schemes, but should be considered as source coding schemes, and in some cases analog-to-digital conversion techniques.
Analog-over-analog methods:
·         Pulse-amplitude modulation (PAM)
·         Pulse-width modulation (PWM)
·         Pulse-position modulation (PPM)
Analog-over-digital methods:
·         Pulse-code modulation (PCM)
·         Differential PCM (DPCM)
·         Adaptive DPCM (ADPCM)
·         Delta modulation (DM or Δ-modulation)
·         Delta-sigma modulation (∑Δ)
·         Continuously variable slope delta modulation (CVSDM), also called Adaptive-delta modulation (ADM)
·         Pulse-density modulation (PDM)

TCP/ip and osi model:
OSI Model (7 layers)
    
Internet Model (4 layers)
Layer Name
Layer Name
Protocol
Address
Application
Application
Telnet, SSH
hostname
Presentation 
E-mail
user@domain
Session
Web Browser
URL
Transport
Transport
Transmission Control Protocol 
or 
User Datagram Protocol
Port Numbers
Network
Network
Interrnet Protocol
IP Address
Data Link
Network 
Interface
Network Interface Device 
FastEthernet, GigE, WiFi (802.11a, b, g, n)
MAC Address
Physical

OSI 7 LAYERS:
The OSI, or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. This article explains the 7 Layers of the OSI Model.
The OSI, or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.
Application (Layer 7)
This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.
Presentation (Layer 6)
Sponsored
This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.
Transport (Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Network (Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling,congestion control and packet sequencing.
Data Link (Layer 2)
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls framesynchronization, flow control and error checking.
Physical (Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.

The TCP/IP model
TCP/IP is based on a four-layer reference model. All protocols that belong to the TCP/IP protocol suite are located in the top three layers of this model.
As shown in the following illustration, each layer of the TCP/IP model corresponds to one or more layers of the seven-layer Open Systems Interconnection (OSI) reference model proposed by the International Standards Organization (ISO).
OSI layer model and TCP/IP model
The types of services performed and protocols used at each layer within the TCP/IP model are described in more detail in the following table.

Layer
Description
Protocols
Application
Defines TCP/IP application protocols and how host programs interface with transport layer services to use the network.
HTTP, Telnet, FTP, TFTP, SNMP, DNS, SMTP, X Windows, other application protocols
Transport
Provides communication session management between host computers. Defines the level of service and status of the connection used when transporting data.
TCP, UDP, RTP
Internet
Packages data into IP datagrams, which contain source and destination address information that is used to forward the datagrams between hosts and across networks. Performs routing of IP datagrams.
IP, ICMP, ARP, RARP
Network interface
Specifies details of how data is physically sent through the network, including how bits are electrically signaled by hardware devices that interface directly with a network medium, such as coaxial cable, optical fiber, or twisted-pair copper wire.
Ethernet, Token Ring, FDDI, X.25, Frame Relay, RS-232, v.35

====================================================

Multiplexer

Description

This component contains a multiplexer for boolean values. The multiplexer routes one of the input values to the output connector. The selected input connector depends on the address read from the address inputs.
The component has an internal address latch. This latch is activated if the optional connector 'Enable Latch Address' is activated. During true condition at this input the current address is used. A change to false condition latches the address. During false condition at this input the latched address is used. The latch is bypassed if the optional connector 'Enable Latch Address' is deactivated.
The component also has an internal output latch. This latch is activated if the connector 'Enable Latch Output' is activated. During true condition at this input the current addressed input value is used. A change to false condition latches the output value. During false condition at this input the latched output value is used. The latch is bypassed if the optional connector 'Enable Latch Output' is deactivated.
If an input is addressed which does not exist (e.g. the 15th input is selected but the component has only 14 inputs) the reset value is used.

Features

·         Up to 16 inputs.
·         The all inputs and outputs are negatable.
·         The 'Latch Address Input' and 'Latch Output' inputs are level or edge sensitive.
·         Activate or deactivate the optional 'Latch Address Input' and 'Latch Output' inputs (deactivated connectors are hidden).
·         The component is rotatable.

View

http://ksimus.berlios.de/odoc/boolean/boolean_multiplexer.png http://ksimus.berlios.de/odoc/boolean/boolean_multiplexer_2.png

Truth Table

Address A
Address B
Input A
Input B
Input C
Input D

Output
False
False
False
X
X
X

False
False
False
True
X
X
X

True
True
False
X
False
X
X

False
True
False
X
True
X
X

True
False
True
X
X
False
X

False
False
True
X
X
True
X

True
True
True
X
X
X
False

False
True
True
X
X
X
True

True
The truth table shows a 4-input multiplexer.
Enable Output Latch
Address A
Input A
Input B

Output(t)
True
False
False
X

False
True
False
True
X

True
True
True
X
False

False
True
True
X
True

True
False
X
X
X

Output(t-1)
The truth table shows a 2-input multiplexer width output latch. The enable input of the output latch input is level senitive.

Location

Boolean -> Mux & Demux -> Multiplexer

Demultiplexer

Description

This component contains a demultiplexer for boolean values. The demultiplexer routes the input value to one of the output connectors. The selected output connector depends on the address read from the address inputs.
The component has an internal address latch. This latch is activated if the optional connector 'Enable Latch Address' is activated. During true condition at this input the current address is used. A change to false condition latches the address. During false condition at this input the latched address is used. The latch is bypassed if the optional connector 'Enable Latch Address' is deactivated.
The component also has an internal output latch. This latch is activated if the connector 'Enable Latch Output' is activated. During true condition at this input the latch is bypassed. A change to false condition latches the last output values. During false condition at this input the latched output values are used. The latch is bypassed if the optional connector 'Enable Latch' is deactivated.

Features

·         Up to 16 outputs.
·         The all inputs and outputs are negatable.
·         The 'Latch Address Input' input are level or edge sensitive.
·         Activate or deactivate the optional 'Latch Address Input' (deactivated connectors are hidden).
·         The component is rotatable.

View

http://ksimus.berlios.de/odoc/boolean/boolean_demultiplexer.png http://ksimus.berlios.de/odoc/boolean/boolean_demultiplexer_2.png

Truth Table

Address A
Address B
Input

Output A
Output B
Output C
Output D
X
X
False

False
False
False
False
False
False
True

True
False
False
False
True
False
True

False
True
False
False
False
True
True

False
False
True
False
True
True
True

False
False
False
True
The truth table shows a 4-output demultiplexer (or a 2-to-4 decoder).
Enable Output Latch
Address A
Input

Output A(t)
Output B(t)
True
X
False

False
False
True
False
True

True
False
True
True
True

False
True
False
X
X

Output A(t-1)
Output B(t-1)
The truth table shows a 2-input multiplexer width output latch. The enable input of the output latch input is level senitive.

Location

Boolean -> Mux & Demux -> Demultiplexe


Digital Electronics: Types of Flip-Flop Circuits?

In electronics, a flip-flop is a special type of gated latch circuit. There are several different types of flip-flops. The most common types of flip flops are:
·         SR flip-flop: Is similar to an SR latch. Besides the CLOCK input, an SR flip-flop has two inputs, labeled SET and RESET. If the SET input is HIGH when the clock is triggered, the Q output goes HIGH. If the RESET input is HIGH when the clock is triggered, the Q output goes LOW.
Note that in an SR flip-flop, the SET and RESET inputs shouldn't both be HIGH when the clock is triggered. This is considered an invalid input condition, and the resulting output isn't predictable if this condition occurs.
·         D flip-flop: Has just one input in addition to the CLOCK input. This input is called the DATA input. When the clock is triggered, the Q output is matched to the DATA input. Thus, if the DATA input is HIGH, the Q output goes HIGH, and if the DATA input is LOW, the Q output goes LOW.
Most D-type flip-flops also include S and R inputs that let you set or reset the flip-flop. Note that the S and R inputs in a D flip-flop ignore the CLOCK input. Thus, if you apply a HIGH to either S or R, the flip-flop will be set or reset immediately, without waiting for a clock pulse.
·         JK flip-flop: A common variation of the SR flip-flop. A JK flip-flop has two inputs, labeled J and K.The J input corresponds to the SET input in an SR flip-flop, and the K input corresponds to the RESET input.
The difference between a JK flip-flop and an SR flip-flop is that in a JK flip-flop, both inputs can be HIGH. When both the J and K inputs are HIGH, the Q output is toggled, which means that the output alternates between HIGH and LOW.
For example, if the Q output is HIGH when the clock is triggered and J and K are both HIGH, the Q output is set to LOW. If the clock is triggered again while J and K both remain HIGH, the Q output is set to HIGH again, and so forth, with the Q output alternating from HIGH to LOW at every clock tick.
·         T flip-flop: This is simply a JK flip-flop whose output alternates between HIGH and LOW with each clock pulse. Toggles are widely used in logic circuits because they can be combined to form counting circuits that count the number of clock pulses received.
You can create a T flip-flop from a D flip-flop by connecting the Q-bar output directly to the D input. Thus, whenever a clock pulse is received, the current state of the Q output is inverted (that’s what the Q-bar output is) and fed back into the D input. This causes the output to alternate between HIGH and LOW.
You can also create a T flip-flop from a JK flip-flop simply by hard-wiring both the J and K inputs to HIGH. When both J and K are HIGH, the JK flip-flop acts as a toggle.
Although you can construct your own flip-flop circuits using NAND gates, it’s much easier to use integrated circuits (ICs) that contain flip-flops. One common example is the 4013 Dual D Flip-Flop. This chip contains two D-type flip-flops in a 14-pin DIP package.
Pin
Name
Explanation
Pin
Name
Explanation
1
Q1
Flip-flop 1 Q output
8
SET2
Flip-flop 2 SET input
2
Q1-bar
Flip-flop 1 Q-bar output
9
DATA2
Flip-flop 2 DATA input
3
CLOCK1
Flip-flop 1 CLOCK input
10
RESET2
Flip-flop 2 RESET input
4
RESET1
Flip-flop 1 RESET input
11
CLOCK2
Flip-flop 2 CLOCK input
5
DATA1
Flip-flop 1 DATA input
12
Q2-bar
Flip-flop 2 Q-bar output
6
SET
Flip-flop 1 SET input
13
Q2
Flip-flop 2 Q output
7
GND
Ground
14
VDD
+3 to 15 V

Synchronous and Asynchronous Counters in Digital Electronics

A counter is a sequential circuit that counts in a cyclic sequence. It is essentially a register that goes through a predetermined sequence of states upon the application of input pulses. There are two types of counters – Synchronous Counter & Asynchronous Counter.

Synchronous Counter

In a synchronous counter, the input pulses are applied to all clock pulse inputs of all flip flops simultaneously (directly). Synchronous counter is also known asparallel sequential circuit. Examples of Synchronous Counters are as below:
·         Ring Counter

Asynchronous Counter

In an asynchronous counter, the flip flop output transition serves as a source for triggering other flip flops. In other words, the clock pulse inputs of all flip flops, except the first, are triggered not by the incoming pulses, but rather by the transition that occurs in previous flip flop’s output.. Asynchronous counter is also known as serial sequential circuit. Example of Asynchronous Counters are as below:
·         Binary Ripple Counter
·         Up Down Counter
Synchronous counters are faster than asynchronous counter because in synchronous counter all flip flops are clocked simultaneously.

Ring Counter in Digital Electronics

Ring counter is a synchronous counter since all the flip flops are clocked simultaneously. A ring counter is a circular shift register with only one flip flopbeing set at any particular time, all others are cleared. The single bit is shifted from one flip flop to the other to produce the sequence of timing signals.
Ring counter in digital electronicsIt is a 4-bit shift register connected as a ring counter. In this counter, Serial In Da is connected to Serial Out Qd.
First of all, CLR’ is set to 0 to clear all flip flops and then it is set to 1 for the circuit operation. After clearing all the flip flops, Pr’ of 4th flip flop is set to 0 while for all other three flip flops, it set to 1. This is done so that the initial value of register becomes 0001 [Pr’=0, sets the 4th flip flop to 1].
Single bit is shifted right with every clock pulse. Each flip flop is in 1 state once every four clock pulses.
CLK
Qa
Qb
Qc
Qd
0
0
0
0
0
0
0
0
0
1
1
1
0
0
0
2
0
1
0
0
3
0
0
1
0
4
0
0
0
1
Disadvantages of Ring Counter
1.      Using ring counter, one can count only four distinct states which is totally wastage of flip flops.
2.      Ring counter doesn’t count in a binary sequence so it is not preferred.
Mod of the Ring Counter is “n” where n is the number of flip flops. In a Ring Counter, the frequency of output is divided by n, therefore, it is known as divide by N counter.

Johnson Counter in Digital Electronics

Johnson counter or Switch Tail or Twisted Ring Counter is a synchronous counter. An n-bit ring counter circulates a single bit among the flip flops to provide n distinct states. The number of states can be doubled if the shift register is connected as a switch tail ring counter.
A switch tail ring counter is a circular shift register with the complement output of the last flip flop connected to the input of the fist flip flop. The circular connection is made from the complement output of the rightmost flip flop to the input of the leftmost flip flop. The register shifts its contents once to the right with every clock pulse and at the same time, the complement value of flip flop 4 are transferred to flip flop 1.
Johnson counter in digital electronicsStarting from cleared states, the 4-bit switch tail ring counter goes through a sequence of 8 states. In general, a k-bit switch tail ring counter will go through a sequence of 2k states.
Starting from all 0’s, each shift operation inserts 1’s from the left until the register is filled with all 1’s. In the following sequence 0’s are inserted from the left until the register is again filled with all 0’s.
CLK
Qa
Qb
Qc
Qd
Qd
0
0
0
0
0
1
1
1
0
0
0
2
1
1
0
0
3
1
1
1
0
4
1
1
1
1
0
5
0
1
1
1
6
0
0
1
1
7
0
0
0
1
8
0
0
0
0
1
Mod of Johnson Counter is 2n, therefore it is known as Divide by 2N Counter.
Frequency of Output = frequency of Clock Pulse / mod
fjohnson = f / 2n
Disadvantage of Johnson Counter
Disadvantage of Johnson Counter is that it doesn’t count in a binary sequence.
Johnson counters can be constructed for any number of timing sequences. The number of flip flops needed is one half the numbers of timing signals.

Binary Ripple Counter in Digital Electronics

A counter that follows the binary sequence is called a binary counter. A binary ripple counter consists of a series of complementing flip flops (T or JK FF) with the output of each flip flop connected to the clock pulse input of the next higher order flip flop. The flip flop holding the least significant bit receives the incoming count pulses.
It is known as ripple counter because the flip flops change one at a time in rapid succession and the signal propagates through the counter in a ripple fashion. CLK is coming for subsequent flip flops from previous flip flops and change state only when transition of previous flip flop’s output is from high to low i.e. from 1 to 0.
Binary ripple counter in digital electronicsThe lowest order bit Q0 gets complimented with each count pulse. Every time Q0 goes from 1 to 0, it complements Q1. Every time Q1 goes from 1 to 0, it complements Q2 and so on.
A complimentary flip flop can be obtained in 3 ways as described below:
1.      Using T Flip Flop
2.      Using JK Flip Flop with J & K inputs tied together
3.      Using D Flip Flop with the complement output connected to the D input. In this way the D input is always the complement of the present state and next clock pulse will cause the flip flop to complement.
CLK
Q3
Q2
Q1
Q0
0
0
0
0
0
1
0
0
0
1
2
0
0
1
0
3
0
0
1
1
4
0
1
0
0
5
0
1
0
1
6
0
1
1
0
7
0
1
1
1
8
1
0
0
0
9
1
0
0
1
10
1
0
1
0
11
1
0
1
1
12
1
1
0
0
13
1
1
0
1
14
1
1
1
0
15
1
1
1
1
Mod of Binary Ripple Counter = 2n,, where n is the number of flip flops
The counter counts in a binary sequence from 0 to 2n-1
Disadvantage of Binary Ripple Counter
This counter is slow as delay of each flip flop has to be taken into account as they are not clocked simultaneously.

Up Down Counter in Digital Electronics

A counter which can be made to count in either the forward or reverse direction is called an up-down, a reversible or forward-backward counter.
Down Counter
A binary counter with a reverse count is called a binary down counter. In a down counter, the binary counter is decremented by 1 with every input count pulse. The count of a 4-bit down counter starts from binary 15 and continues to binary counts 14, 13, 12… 0 and then back to 15. In a binary down counter, outputs are taken from the complement terminals Q’ of all flip flops.
For a down counter, when Q goes from 0 to 1, Q’ will go from 1 to 0 and complement the next flip flop.
Up Counter
A binary counter with a normal count is called a binary up counter. In a up counter, the binary counter is incremented by 1 with every input clock pulse. Outputs are taken drom the normal output terminal Q of all flip flops. For a up counter when Q goes from 1 to 0, it complements the next flip flop.
Up Down counter in digital electronics
In above diagram, mode control line is also called up down counter line.
When mode control line is 1, all gates labeled as 1 will be enabled and all gates labeled as 2 will be disabled. The counter works like a Up Counter.
When mode control line is 0, all gates labeled as 1 will be disabled and all gates labeles as 1 will be enabled. The counter works like a Down Counter.
CLK
Q2
Q1
Q0
Q0
Q1
Q2
0
0
0
0
1
1
1
1
1
1
1
0
0
0
2
1
1
0
1
0
0
3
1
0
1
0
1
0
4
1
0
0
1
1
0
5
0
1
1
0
0
1
6
0
1
0
1
0
1
7
0
0
1
0
1
1
8
0
0
0
1
1
1

Shift Registers In Digital Electronics

There are couple of ways to define a Register used in Digital Electronics.
“Registers are data storage devices that are more sophisticated than latches.”
“A register is a group of binary cells suitable for holding binary information.”
“A group of cascaded flip flops used to store related bits of information is known as a register.”

Application of Registers

These are used in computers for
·         Temporary storage
·         Data transferring
·         Data manipulation
·         As counters

Shift Register

A register that is used to assemble and store information arriving from a serial source is called a shift register. Each flip flop output of a shift register is a connected to the input of the following flip flop and a common clock pulse is applied to all flip flops, clocking them synchronously. Hence the shift register is asynchronous sequential circuit. An n-bit shift register consists of n Flip Flops and the gates control the shift operation.
There are four types of Shift Registers:
1.      Serial-In, Serial-Out (SISO)
2.      Parallel-In, Serial-Out (PISO)
3.      Serial-In, Parallel-Out (SIPO)
4.      Parallel-In, Parallel-Out (PIPO)
 http://verticalhorizons.in/wp-content/uploads/2012/05/Shift_Registers_1.bmp

Serial-In, Serial-Out (SISO)

Serial-In, Serial-Out shift register can be constructed by using D flip flops. This type of shift register accepts data serially i.e. one bit at a time and produces stored information on its output serially.
http://verticalhorizons.in/wp-content/uploads/2012/05/Serial_In_Serial_Out_Shift_Register_1.bmp
Here, four flip flops are cascaded. Since each flip flop can store only one bit, the register can store maximum four bits. More flip flops can be cascaded to store more than 4 bits. Clock is applied simultaneously to all flip flops clocking them synchronously.
We know that in a D Flip Flop, the Q output is identical to the D input except with one pulse time delay. Therefore, there will be a delay i.e. it will take one clock pulse to transfer the bit to next flip flop.
Let’s understand Shifting by taking an example. Let say the 4-bits applied to serial input are 1010. Here LSB 0 is applied first and MSB 1 is applied last since the input is applied in serial fashion.
Now, refer the table below. At first clock pulse, i.e. when CLK = 1, LSB 0 is applied to Serial In.
At CLK = 2, next bit i.e. 1 is applied to Serial In. At this moment, 0 applied at CLK=1, shifts to Qa.
At CLK = 3, next bit i.e. 0 is applied to Serial In. At this moment , 1 applied at CLK = 2 shifts to Qa and o applied at CLK = 1 shifts to Qb.
And so on. For shifting out, 0′s are applied at Serial In.
CLK
Da / Serial In
Qa
Qb
Qc
Qd / Serial Out
0
0
0
0
0
0
1
0
0
0
0
0
2
1
0
0
0
0
3
0
1
0
0
0
4
1
0
1
0
0
5
0
1
0
1
0
6
0
0
1
0
1
7
0
0
0
1
0
8
0
0
0
0
1
9
0
0
0
0
0
It will require 4 clock pulses for Shifting In the data and 4 clock pulses for Shifting Out the data. Thus, for an n-bit SISO shift register, 2n clock pulses are required.

Serial-In, Parallel-Out (SIPO)

Serial-In, Parallel-Out shift register can be constructed by using D flip flops. This type of shift register accepts data serially i.e. one bit at a time and produces stored information on its output parallely i.e. all the outputs are available simultaneously.
http://verticalhorizons.in/wp-content/uploads/2012/05/Serial_In_Parallel_Out_Shift_Register_1.bmp
Here, four flip flops are cascaded. Since each flip flop can store only one bit, the register can store maximum four bits. More flip flops can be cascaded to store more than 4 bits. Clock is applied simultaneously to all flip flops clocking them synchronously.
We know that in a D Flip Flop, the Q output is identical to the D input except with one pulse time delay. Therefore, there will be a delay i.e. it will take one clock pulse to transfer the bit to next flip flop. All the outputs are available simultaneously at Qa, Qb, Qc and Qd.
Note: Circuit diagram of SIPO is same as SISO except that outputs are available simultaneously rather than serially at Serial Out.
Parallel-In, Serial-Out (PISO)

Parallel-In shift register can be constructed by using D flip flops. This type of shift register accepts data parallely i.e. all the bits are input simultaneously.

http://verticalhorizons.in/wp-content/uploads/2012/05/Parallel_In_Serial_Out_Shift_Register_1.bmp
·         Serial In is kept at 0.
·         For shifting in the data parallely i.e. all the bits are fed simultaneously, LOAD=1. Whatever is available at a3 will be applied to Preset input of flip flop. Thus, the flip flop is set or reset based on the Preset input and this is how all the input bits are applied in parallel.
·         After shifting the data in, LOAD=0 and output is obtained from Serial Out.
The data will be available at the output after 4 clock pulse.

Parallel-In, Parallel-Out (PIPO)

Parallel-In shift register can be constructed by using D flip flops. This type of shift register accepts data parallely i.e. all the bits are input simultaneously and produces stored information on its output parallely i.e. all the outputs are available simultaneously.
http://verticalhorizons.in/wp-content/uploads/2012/05/Parallel_In_Parallel_Out_Shift_Register_1.bmp
·         Serial In is kept at 0.
·         For shifting in the data parallely i.e. all the bits are fed simultaneously, LOAD=1. Whatever is available at a3 will be applied to Preset input of flip flop. Thus, the flip flop is set or reset based on the Preset input and this is how all the input bits are applied in parallel.
·         After shifting the data in, LOAD=0 and output is obtained from Parallel Outputs Qa, Qb, Qc and Qd.
No clock pulse is required. Data can be shifted into or out of the register in parallel.
Note: Circuit diagram of PIPO is same as PISO except that outputs are available simultaneously rather than serially at Serial Out.


No comments:

Post a Comment