Complex micro-controller, Computer Engineering

Assignment Help:

The 68Hc11 is actually a complex micro-controller its contains internally RAM, EEPROM, Parallel IO and serial ports, hardware timers and a 8 channel ADC.  The internal structure is shown .A micro controller is only useful if the operator can communicate with the outside world, for this purpose the I/O devices have been included. The 68HC11 series of micro controllers have many I/O devices in their family, each devices has its own particular quirks. The different devices are appended by a letter denoted the series type

711_Complex micro-controller.png

MC68HC11A0  5 ports, serial comms 256 byte RAM and 8 channel 8 Bit ADC

MC68HC11A1  5 ports, serial comms 256 byte RAM and 8 channel 8 Bit ADC 16 Timer and 512 byte EEPROM

MC68HC11A8  5 ports, serial comms 256 byte RAM and 8 channel 8 Bit ADC 16 Timerand 512 byte EEPROM 8K ROM

MC68HC11E1    5 ports, serial comms 512 byte RAM and 8 channel 8 Bit ADC 16 Timer and 512 byte EEPROM

MC68HC11E9    5 ports, serial comms 512 byte RAM and 8 channel 8 Bit ADC 16 Timer and 512 byte EEPROM 12K ROM

MC68HC11F1    6 ports, serial comms 1024 byte RAM and 8 channel 8 Bit ADC 16 Timer and 512 byte EEPROM

MC68HC11D3    5 ports, serial comms 256 byte RAM and 8 channel 8 Bit ADC 16 Timer and 512 byte EEPROM 4k  One time PROM


Related Discussions:- Complex micro-controller

Physics, what is fresnel''s biprism?how it is used to determine wavelength ...

what is fresnel''s biprism?how it is used to determine wavelength of monochromatic source of light

Multiple instruction and multiple data stream (mimd), Multiple Instruction ...

Multiple Instruction and Multiple Data stream (MIMD) In this association, multiple control units and multiple processing elements are prepared as in MISD. But the discrepancy i

State the implementation of a security policy, State the implementation of ...

State the implementation of a security policy The implementation of a security policy should invariably cover all parameters of security such as physical access to the server,

Convert number to hexadecimal and decimal, Perform the following calculatio...

Perform the following calculations assuming that all numbers are stored in 16-bit registers as 2's complement binary numbers with no overflow provision. Convert each of the numbers

What are digital signatures and its uses, What are Digital Signatures and i...

What are Digital Signatures and its uses? A digital signature is an electronic quite than a written signature which can be used through someone to authenticate the identity of

What is the session, What is the session.  Session is a collection of v...

What is the session.  Session is a collection of various groups of method. Every session is assigned to a single control terminal. This terminal is either a pseudo-device. or a

Linux, Explain about unix file system architecture

Explain about unix file system architecture

How race around condition can be avoided, How Race Around Condition can...

How Race Around Condition can be avoided? Ans: The race around condition can be avoided if 1. Duration of clock pulse being high is small like comparative to the dela

A sorting algorithm is stable, A sorting algorithm is stable if  Preser...

A sorting algorithm is stable if  Preserves the original order of records with equivalent keys.

Algorithms, Design an algorithm (using pseudocode) that takes in as an inpu...

Design an algorithm (using pseudocode) that takes in as an input, two 2-D int arrays that are assumed to be 2 black-and-white images: initialImage x, whose dimensions are IxJ, and

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd