Explain the working of a 4-bit SISO shift register, Computer Engineering

Assignment Help:

Using D-Flip flops and waveforms explain the working of a 4-bit SISO shift register.

Ans. Serial In-Serail Out Shift Register: Fig.(a) demonstrates a 4 bit serial in-serial out shift register having four D flip flops FF0 , FF1 , FF2 and FF3. As demonstrated it is a positive edge triggered device. The working of such register for the data 1010 is specified in the subsequent steps.

2154_Explain the working of a 4-bit SISO shift register.png

1. Bit 0 is entered in data input line. D0 = 0, primary clock pulse is applied, FF0 is reset and stores 0.
2. Subsequently bit 1 is entered. Q0 = 0, as Q0 is linked to D1, D1 becomes 0.
3. Then second clock pulse is applied, the 1 upon the input line is moved or shifts into FF0 since FF0 sets. The 0 that was stored in FF0 is moved into FF1.
4. Subsequently bit 0 is entered and third clock pulse applied. 0 is goes into FF0, 1 stored in FF0 is shifts to FF1 and 0 stored in FF1 is shifts to FF2.
5. Final bit 1 is entered and 4th clock pulse applied. 1 is goes into FF0, 0 stored in FF0 is shifts to FF1, 1 stored in FF1 is shifts to FF2 and 0 stored in FF2 is shifts to FF3.
This finishes the serial entry of 4 bit data in the register. Then the LSB0 is on the output Q3.
6. Clock pulse 5 is then applied. LSB0 is shifted out. The subsequent bit 1 shows on Q3 output.
7. Clock pulse 6 is then applied. The 1 on Q3 is shifted out and 0 appears on Q3 output.
8. Clock pulse 7 is then applied. 0 on Q3 is shifted out. Here 1 shows on Q3 output.
9. Clock pulse 8 is then applied. 1 on Q3 is shifted out.
10. While the bits are being shifted out (upon CLK pulse 5 to 8) extra data bits can be entered in.

 

 


Related Discussions:- Explain the working of a 4-bit SISO shift register

Describe functions of data flow diagram, Describe functions of data flow di...

Describe functions of data flow diagram After you have roughly designed data flow diagram, you could write a description of each function and you could describe the function i

Differentiate between sequential access and direct access, Question: (a...

Question: (a) Briefly explain how the functionality of the WWW has been enhanced, after its birth at CERN site. Use examples to illustrate your answer. (b) Many modern com

What is automated information system, What is automated information system ...

What is automated information system Using this automated information system affords below benefits to the company and customers: -  System can be linked into websites to g

How do you debug a loadrunner script, VuGen have two options to help debug ...

VuGen have two options to help debug Vuser scripts-the Run Step by Step command and breakpoints. The Debug settings in the Options dialog box permit us to verify the extent of the

Define the meaning of business-to-business, Define the meaning of business-...

Define the meaning of business-to-business. B2B (business-to-business): The consensus is universal: it is the priority; it is where the money is. It’s rather true; theref

Explain the storage class auto, Explain The Storage Class auto The Stor...

Explain The Storage Class auto The Storage Class auto : Variables declared within function bodies are automatic by default. Thus, automatic is the most common of the four stora

Signaling pvm process, Q. Signaling PVM process? int pvm_sendsig( ...

Q. Signaling PVM process? int pvm_sendsig( int tid, int signum ) Transmits a signal to other PVM process. tid is task identifier of PVM process to receive signal.

Generic techniques developed - artificial intelligence, Generic Techniques ...

Generic Techniques Developed: In the pursuit of solutions to various problems in the above categories, various individual fundamental techniques have sprung up which have been

Explain the race condition, Explain the Race Condition The situation wh...

Explain the Race Condition The situation where various processes access - and manipulate shared data concurrently. The final value of the shared data relies upon which process

Determine the primary memory of the server, Determine the primary memory of...

Determine the primary memory of the server The keys used for accessing the server are held at a secret location in the primary memory of the server. This area or location is hi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd