Explain what logic gets synthesized , Computer Engineering

Assignment Help:

What logic gets synthesized when I use an integer instead of a reg variable as a storage element? Is use of integer recommended?

An  integer  can  take  place  of  a  reg  as  a  storage  element.  An instance to illustrate  this  is  as follows:

658_reg variable.png

 

In  this  example,  variable  int_tmp  is  defined  as  an  integer,  rather than reg  that  it  would normally be (the reg declaration is commented in the instance for illustration). Note that, although default  width  of  the  integer  declaration  is  32  bits,  final  result  of  the  int_tmp  registers synthesis  yield  is  only  4  bits.  This  is  since the  optimiser  in  the  synthesis  tool  removes  the unnecessary higher order bits, in order to minimize the area.

Even though  the  use  of  integer  as  shown  above  is  a  legal  construct,  it's  not  recommended  for  the synthesis of storage elements.

 

 


Related Discussions:- Explain what logic gets synthesized

Weka uses a gaussian - radial basis function, A data set with 1000 rows is ...

A data set with 1000 rows is input to a neural network in Weka. The test option is set to 10-fold cross validation and the neural network option validationSetSize = 20%. How many r

Example of time division multiplexing, Two computers using TDM take up turn...

Two computers using TDM take up turns to send 100-bytes packet over a shared channel that operates at 64000 bits per second. The hardware takes 100 microseconds after one computer

What you mean by organizational effectiveness, Q. What you mean by organiza...

Q. What you mean by organizational effectiveness? Organizational effectiveness is measured in terms of productivity, structural flexibility, Employee involvement and Job satisf

Write explanatory notes on microprocessor development system, Write explana...

Write explanatory notes on Microprocessor development system. Microprocessor development system: Computer systems have undergone many changes recently. Machines which once fi

Write policy of cache memory, Q. Write Policy of cache memory? If conte...

Q. Write Policy of cache memory? If contents of a block in cache are changed then it's essential to write it back to main memory before replacing it. Write policy determines wh

Explain the term confidentiality - firewall design policy, Explain the term...

Explain the term Confidentiality - Firewall Design Policy Whilst some corporate data is for public consumption, the vast majority of it should remain private.

Mac is the abbreviation for which type of control, MAC is the abbreviation ...

MAC is the abbreviation for: (A) Multimedia access control (B) Media access control (C) Mobile access control       (D) Master access point control Ans: MAC is th

Explain about heterogeneous linked list, If you are using C language to imp...

If you are using C language to implement the heterogeneous linked list, what pointer type will you use? The heterogeneous linked list having different data types in its nodes a

What is a work process, What is a work process? A work process is where ...

What is a work process? A work process is where individual dialog steps are in fact processed and the work is done.  Every work process ocuurs one type of request.

Which is not a layer of input-output management module, Which is not a laye...

Which is not a layer of IO management module? Ans. MCS that is Management Control System, is not a layer of IO management module.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd