What are the characteristics of digital ics, Computer Engineering

Assignment Help:

What are the characteristics of digital ICs used to compute their performance?

Ans:

Characteristics of Digital Integrated Circuits

1. Speed of operation:  The Speed of operation of a digital circuit is given in terms of the propagation delay time. The input delay times and output delay times can be demonstrated as:

792_Characteristics of Digital Integrated Circuits.png

The delay times are measured in between the 50% voltage levels of input and output wave forms. Here two delay times those are t

phl, while the output goes from the high state to low state and tphl, while output goes from low state to high state.

2. Power Dissipation: It is the amount of power dissipated in an IC. It is determined through the current, ICC that this draws from the Vcc supply and is provided by Vcc x Icc. Icc is the av value of ICC [O] and ICC [1]. This is specified in mW.

3. Figure of merit: For digital IC, this is explained as the product of speed and power. This is specified in Pico joules i.e. ns x mw= pj. The low value of speed power product is required.

4. Fan Out: It is the no of the same gates that can be driven by a gate. High fan out is beneficial, as this reduces the requirement for additional drivers to drive more gates.

5. Noise Immunity: Stray electric and magnetic fields make unnecessary voltages termed as noise, on the connecting wires in between logic circuits. It may cause the voltage at the input to a logic circuit to drop below Vih or fuse above Vil and may generate unwanted operation. The circuit's capability to tolerate noise signals is termed to as the noise immunity.

909_Digital Integrated Circuits.png

6. Operating Temperature: A range of temperature wherein an IC functions properly should be identified. The accepted temperature range for consumer IC' s are from 0 to 70 degree C and for industrial applications [from -55° C to +125° C for military applications].


Related Discussions:- What are the characteristics of digital ics

Write an algorithm for deadlock detection, Write an algorithm for deadlock ...

Write an algorithm for deadlock detection. An algorithm for deadlock detection: 1. Assume that Work and Finish be vectors of length m and n, correspondingly. Initialize:

Give brief summary of common aspects found in spreadsheets, Give brief summ...

Give brief summary of common aspects found in spreadsheets -  It's made up of columns and rows; every row is identified by a number and every column is identified with a letter

Instruction of a micro-program, Q. Instruction of a micro-program? A mi...

Q. Instruction of a micro-program? A micro-instruction is an instruction of a micro-program. It specifies one or more than one micro-operations that can be executed concurrentl

Explain about workstations, Q. Explain about Workstations? The workstat...

Q. Explain about Workstations? The workstations are used for engineering applications like CAD/CAM or other types of applications which need a moderate computing power and rela

Estimate the circuit switched network, a) Total available bandwidth = 1 Mbp...

a) Total available bandwidth = 1 Mbps = 1000 Kbps Each user requires send data at the rate of = 500 kbps As it is circuit switched network we have to dedicate the bandwidth So the

What is garbage collection and what is it used for, In computer science, ga...

In computer science, garbage collection (GC) is a form of automatic memory management. The garbage collector, or just collector, attempts to reclaim garbage, or memory occupied by

Defining data definition, Defining Types of Data ? The subsequent forma...

Defining Types of Data ? The subsequent format is used for defining data definition:  Format for data definition:  {Name}  Name -   a program references the data

Write a small program using floating-point operations, Question: a) Wri...

Question: a) Write a small program using floating-point operations in Reverse Polish Notation to evaluate the following: Volume of Sphere = (4/3)πr 3 Consider that the u

Explain public key encryption, Public Key Encryption A cryptographic sy...

Public Key Encryption A cryptographic system that uses two-keys-a public  key known to everyone and a private or secret key known only to the recipient of the message. An si

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd