Explain 16-bit ROM array, Computer Engineering

Assignment Help:

Draw the logic diagram of 16-bit ROM Array and explain its principle of operation.

Ans:

16-bit ROM Array: A ROM that is read-only memory is an array of selectively closed and open unidirectional contacts. A 16-bit ROM array is demonstrated in Fig. (b). To choose any one of the 16 bits, a 4-bit address (A3, A2, A1, A0) is needed. The lower order two bits (A1, A0) are decoded through the decoder DL that selects one of the four rows, while the higher order two bits (A3, A2) are decoded through the decoder DH that activates one of the 4 column sense amplifiers.

2163_Logic Diagram of 16-bit ROM array.png

Fig.(a) Logic Diagram of 16-bit ROM array

The diode matrix is made by connecting one diode with a switch among each row and column. For illustration the diode D21 is connected in between column 1 and row 2. The output is enabled through applying logic 1 at the CS input that is chip select. Programming a ROM implies to selectively open and close the switches in series along with the diodes. For illustration, if the switch of diode D21 is into closed position and if the address input is 0110, the row 2 is activated linking this to the column 1. As well the sense amplifier of column 1 is enabled that provides logic 1 output if the chip is selected means CS = 1. It shows as a logic1 is stored at the address 0110. Conversely, if the switch of diode D21 is open, logic 0 is stored on the address 0110.


Related Discussions:- Explain 16-bit ROM array

Logical user-centered interactive design methodology, Question: Logical...

Question: Logical User-Centered Interactive Design Methodology is a methodology that identifies six clear stages to help in software development while keeping the user in mind.

Using bit wise operator implement nor and nand gate, Q. Write a program t...

Q. Write a program to implement NOR, NAND, XOR and XNOR gates using and without using bit wise operator. Also perform necessary checking. The user has option to give n numbe

Illustrate the table of types of serach engines, Illustrate the table of ty...

Illustrate the table of types of serach engines Type in: CIE and the search engine would return about 22 million hits Type in

What are the disadvantages of a vpn implementation, What are the Disadvanta...

What are the Disadvantages of a VPN implementation The greatest disadvantage of a VPN implementation is its non-flexibility to accept unknown locations. VPN works extremely wel

How much duration is required for an off-hook signal, An off-hook signal wi...

An off-hook signal will repeat for a/an                   duration. For a/an finite duration, an off-hook signal will repeat.

DFD, Define software architecture and describe which types of architectures...

Define software architecture and describe which types of architectures can be used in Email or Facebook applications

Java Programming, How to parse n size depth node in java and create output ...

How to parse n size depth node in java and create output in same tree format?

Determine frequency of a dtmf phone, In a DTMF phone a dialling of 8 genera...

In a DTMF phone a dialling of 8 generates (A) 1336 Hz- 770 Hz                      (B)  1209 Hz - 1477 Hz (C)  1209 Hz- 941 Hz                     (D)  1336 Hz-852 Hz

Hashing, what is hashing in database management system?

what is hashing in database management system?

Software, is c++ is language or any software

is c++ is language or any software

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd