Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Using a suitable logic diagram explain the working of a 1-to-16 de multiplexer.Ans. 1-to-16 Demultiplexer Working: A demultiplexer obtains in data from one line and directs this to any of its N outputs depending upon the status of the selected inputs. If the no. of output lines is N (16), no. of select lines m is specified by 2m = N that is, 24 = 16. Therefore, the no. of select lines required for a 1 to 16 demultiplexer is 4. Table illustrates the Truth Table of this Demultiplexer. The input can be send to any of the 16 outputs, D0 to D15. The input goes to D0 if DCBA = 0000. The input goes to D1 if DCBA = 0001 and so on.
Fig.(a) demonstrates the logic diagram of a 1-to-16 demultiplexer, contains 8 NOT gates, 16 NAND gates, one data input line(G), 4 select lines (A,B,C,D) and 16 output lines (that is D0, D1, D2 ------D16). 8 NOT gates stop excessive loading of the driving source. Individual data input line G is implemented along with a NOR gate utilized as negative AND gate. A low level in all input G1 and G2 is needed to make the output G high. The output G of allows is one of the inputs to whole 16 NAND gates. G should be high for the gates to be allowed. If allow or enable gate is not activated so all 16 de-multiplexer outputs will be high not respective of the state of the select lines A, B, C, D.
Demulti-
plexer
Input
Selection
Lines
D C B A
Logic
Function
Demultiplexer Outputs
D0 D1 D2 D3 D4 D5 D6 D7 D8 D9 D10 D11 D12 D13 D14 D15
0
0 0 0 0
0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1
0 0 0 1
1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1
2
0 0 1 0
1 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1
3
0 0 1 1
1 1 1 0 1 1 1 1 1 1 1 1 1 1 1 1
4
0 1 0 0
1 1 1 1 0 1 1 1 1 1 1 1 1 1 1 1
5
0 1 0 1
1 1 1 1 1 0 1 1 1 1 1 1 1 1 1 1
6
0 1 1 0
1 1 1 1 1 1 0 1 1 1 1 1 1 1 1 1
7
0 1 1 1
1 1 1 1 1 1 1 0 1 1 1 1 1 1 1 1
8
1 0 0 0
1 1 1 1 1 1 1 1 0 1 1 1 1 1 1 1
9
1 0 0 1
1 1 1 1 1 1 1 1 1 0 1 1 1 1 1 1
10
1 0 1 0
1 1 1 1 1 1 1 1 1 1 0 1 1 1 1 1
11
1 0 1 1
1 1 1 1 1 1 1 1 1 1 1 0 1 1 1 1
12
1 1 0 0
1 1 1 1 1 1 1 1 1 1 1 1 0 1 1 1
13
1 1 0 1
1 1 1 1 1 1 1 1 1 1 1 1 1 0 1 1
14
1 1 1 0
1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 1
15
1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0
Truth Table of 1-to-16 Demultiplexer
Fig(a): Logic Diagram of 1-to-16 De multiplexer
Draw a neat labelled diagram of the OSI reference model for computer networks showing all the layers and the communication subnet boundary. The computer network consists of all
Find the Nyquist rate for the following signals: (a) x(t) = 5 sin 3000πt cos 4000πt (b) A binary channel with bit rate 36000 bps is available for PCM voice transmission. Fi
What is automated information system Using this automated information system affords below benefits to the company and customers: - System can be linked into websites to g
Question 1 Give a brief explanation on message oriented middleware Question 2 Describe Distributed object model Question 3 Explain File systems in a distributed computing Env
Multiple Layers of Intranet Security Security requirements vary from organisation to organisation. They also vary on the content that the organisations intend to place on their
Problem: a) Most RMI and RPC systems expect to be supported by the "Request-Reply Protocol". Describe what "Request-Reply Protocol" is. b) Describe the invocation semantics
Write a script called addnames that is to be called as follows, where classlist is the name of the classlist file, and username is a particular student''s username. ./addnames cla
Optical disk becomes an attractive alternative for backing up information from hard disk drives and employs large text, audio and video data. Advent of CD-ROM-R and DVD-ROM-R has b
Explain pointers We can have a pointer pointing to a structure just the same way a pointer pointing to an int, such pointers are called as structure pointers
Branch (control) hazards in computer architecture : Branching hazards (also called control hazards) take place when the processor is told to branch -for example, if a defin
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd