Complex micro-controller, Computer Engineering

Assignment Help:

The 68Hc11 is actually a complex micro-controller its contains internally RAM, EEPROM, Parallel IO and serial ports, hardware timers and a 8 channel ADC.  The internal structure is shown .A micro controller is only useful if the operator can communicate with the outside world, for this purpose the I/O devices have been included. The 68HC11 series of micro controllers have many I/O devices in their family, each devices has its own particular quirks. The different devices are appended by a letter denoted the series type

711_Complex micro-controller.png

MC68HC11A0  5 ports, serial comms 256 byte RAM and 8 channel 8 Bit ADC

MC68HC11A1  5 ports, serial comms 256 byte RAM and 8 channel 8 Bit ADC 16 Timer and 512 byte EEPROM

MC68HC11A8  5 ports, serial comms 256 byte RAM and 8 channel 8 Bit ADC 16 Timerand 512 byte EEPROM 8K ROM

MC68HC11E1    5 ports, serial comms 512 byte RAM and 8 channel 8 Bit ADC 16 Timer and 512 byte EEPROM

MC68HC11E9    5 ports, serial comms 512 byte RAM and 8 channel 8 Bit ADC 16 Timer and 512 byte EEPROM 12K ROM

MC68HC11F1    6 ports, serial comms 1024 byte RAM and 8 channel 8 Bit ADC 16 Timer and 512 byte EEPROM

MC68HC11D3    5 ports, serial comms 256 byte RAM and 8 channel 8 Bit ADC 16 Timer and 512 byte EEPROM 4k  One time PROM


Related Discussions:- Complex micro-controller

Develop a program which reads hexadecimal number, Q.  Develop a program, wh...

Q.  Develop a program, which reads Hexadecimal number from an input file & convert it into Octal, Binary, and Decimal. The O/P should be written to a file & displayed accordingly.

How do subroutines help in program writing, How do subroutines help in prog...

How do subroutines help in program writing? Some of the significant characteristics of Subroutine that help in program writing are: A subroutine is named, each have a

Algorithm to have a good best case running time, How can we change almost a...

How can we change almost any algorithm to have a good best case running time? Check whether the input constitutes an input at the very starting Or else run the original algo

What is the use and function of file transfer protocol, What is the use and...

What is the use and function of File Transfer Protocol? FTP : File Transfer Protocol (FTP) is the protocol used upon the Internet for sending files and is usually used fo

Security, We now consider the relation between passwords and key size. For ...

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

Give some technical specification for subscriber lines, Give some technical...

Give some technical specification for subscriber lines. Subscriber pairs and exchange pairs are interconnected at the MDF through jumpers. The MDF therefore gives a flexible in

Show basic types of transmission technologies, Q. What are the basic types ...

Q. What are the basic types of Transmission technologies, basis on which computer networks will be categorized? Ans: Broadly there are two kinds of transmission technology:

Representation scheme in ai, Representation scheme in AI: • It's fairl...

Representation scheme in AI: • It's fairly trouble-free to represent knowledge in this way. It allows us to be expressive enough to represent largely knowledge, while being co

Algorithm of non-repudiation designing e-cash based system, Give a suitable...

Give a suitable algorithm of non-repudiation in designing e-cash based system. The algorithm of non-repudiation in designing e-cash based system is as illustrated below: Ke

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd