Explain what logic gets synthesized , Computer Engineering

Assignment Help:

What logic gets synthesized when I use an integer instead of a reg variable as a storage element? Is use of integer recommended?

An  integer  can  take  place  of  a  reg  as  a  storage  element.  An instance to illustrate  this  is  as follows:

658_reg variable.png

 

In  this  example,  variable  int_tmp  is  defined  as  an  integer,  rather than reg  that  it  would normally be (the reg declaration is commented in the instance for illustration). Note that, although default  width  of  the  integer  declaration  is  32  bits,  final  result  of  the  int_tmp  registers synthesis  yield  is  only  4  bits.  This  is  since the  optimiser  in  the  synthesis  tool  removes  the unnecessary higher order bits, in order to minimize the area.

Even though  the  use  of  integer  as  shown  above  is  a  legal  construct,  it's  not  recommended  for  the synthesis of storage elements.

 

 


Related Discussions:- Explain what logic gets synthesized

What are the minimal cost and minimal risksolution, In binary representatio...

In binary representation there are some states that are believed to be never occurred because of some particular functionality of a given circuit. If zero output is assigned to suc

What is a packet switching, End systems are connected together by communica...

End systems are connected together by communication links. There are various types of communication links, which are made of numerous types of physical media, comprising twisted pa

-bit comparator using combinational logic, Design a 4-bit comparator using ...

Design a 4-bit comparator using combinational logic, and Karnaugh Maps. The inputs of the circuit are two 2-bit numbers. a) Construct the truth table given 2-bits inputs A and B, a

What is called pcp, What is called PCP? The phenomenon of un-decidabili...

What is called PCP? The phenomenon of un-decidability is not confined to problems concerning automata. An un-decidable problem concerning on simple manipulation of strings is k

Discuss about the bus and memory transfer, Discuss about the Bus and Memory...

Discuss about the Bus and Memory Transfer A read action implies transfer of information to outside environment from a memory word, whereas storage of information inside memory

Smli firewalls are different from the conventional, SMLI firewalls are diff...

SMLI firewalls are different from the conventional The SMLI firewalls are different from the conventional "stand in" proxies in a way that the stand-in proxies are used for th

What is double entry - verification, What is Double entry - Verification ...

What is Double entry - Verification In this approach, data is entered twice (using two different people); data is only accepted if both versions match up. Generally used to ve

What are the 3 things that are needed to specify a route, 1. URL Pattern - ...

1. URL Pattern - You can contain placeholders in a URL pattern so that variable data can be passed to the request handler without having a query string. 2. Handler - The handle

In ldb what determines hierarchy of the tables, In LDB what determines hier...

In LDB what determines hierarchy of the tables? Structure

Distributivity of connectives, Distributivity of Connectives : In our ...

Distributivity of Connectives : In our last analogy with arithmetic will involve a very well-technique need for playing around with algebraic properties. But assume there if w

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd