This document discusses data transfer schemes and serial communication modes of the 8051 microcontroller. It describes serial interface data transfer where bytes are transferred in parallel over short distances. It also explains asynchronous and synchronous communication, with asynchronous using start, stop, and parity bits. The document outlines the four serial communication modes of the 8051: Mode 0 uses RxD and TxD pins for bidirectional communication; Mode 1 separates RxD and TxD pins; Mode 2 adds a programmable 9th bit; Mode 3 is similar to Mode 2 but has a variable baud rate. It also discusses the power control register PCON and its role in baud rate selection.
The document discusses the USART-8251 chip, which converts parallel data to serial and vice versa. It has sections for a data bus buffer, read/write control logic, modem control, transmitter and receiver. The read/write control logic handles the control and status registers using signals like CS, C/D, WR and RD. The transmitter converts 8-bit parallel data to a serial stream, while the receiver does the opposite. The modem control signals interface with external modems. Overall, the USART-8251 chip facilitates serial communication by converting between serial and parallel formats.
This document summarizes a student project to design a logic circuit with 3 inputs that has 4 possible output states. The circuit was designed and simulated using SimUaid tools. Two designs were developed - an initial design that met requirements, and an improved design that addressed delays. The final circuit uses combination logic to determine the input state and shift registers to control the output sequence indicating the state. The circuit was tested and shown to respond faster than the original design. Common devices using digital logic are also listed.
- Serial communication involves transmitting data one bit at a time over a single wire, using shift registers at the transmitter and receiver. This allows data to be sent over long distances or inherently single-wire mediums like phone lines.
- For asynchronous serial communication, start and stop bits are used to synchronize the transmitter and receiver clocks, since they have small mismatches. This results in a 10-bit frame structure.
- The 8051 microcontroller has built-in support for serial communication through its SBUF register and SCON configuration register. It can implement both synchronous and asynchronous serial protocols for transmitting and receiving serial data.
The document discusses interfacing a microcontroller with various peripherals including timers, serial communication, interrupts, LCDs, and keyboards. It provides details on:
- Programming timers in 8051 microcontrollers for time delays and waveform generation.
- Serial communication protocols including asynchronous communication and RS-232 standards.
- Configuring and handling interrupts from different sources and writing interrupt service routines.
- Interfacing 8051 with LCDs for display and matrix keyboards for input using specific I/O ports for scanning rows and columns.
This document describes the basic concepts and components of burglar alarm systems. It discusses how alarms work by breaking and then reconnecting electrical circuits to detect intrusions and trigger alarms. Common components include motion detectors, control boxes to monitor circuits and sound alarms, and sirens or auto-dialers to alert occupants. The document provides details on a basic magnetic sensor design and improved alarm circuit that uses a CMOS 4011 chip with capacitors to create entry/exit delays and prevent false alarms.
This document discusses analog to digital conversion fundamentals. It defines analog and digital signals and introduces analog to digital converters (ADCs) which convert continuous analog signals to discrete digital values. It discusses important ADC characteristics like resolution, quantization error, differential and integral nonlinearity. Sample and hold circuits are explained along with errors like aperture uncertainty. Specifications of digital to analog converters (DACs) like output voltage, resolution and nonlinearity errors are also covered.
The document summarizes key concepts relating to the data link layer, including:
1) The data link layer provides services to the network layer such as framing data and error control. It regulates data flow and deals with transmission errors.
2) Framing involves delimiting frames with flags or escape sequences to handle bit stuffing. Error detection uses techniques like CRC checksums while error correction uses codes like Hamming codes.
3) Stop-and-wait protocols were improved with sliding window protocols using sequence numbers and acknowledgments to allow pipelining and handle lost frames more efficiently through techniques like selective repeat.
UNIT 4 & 5 - I nterfacing_Lecture7.pptxnaveen088888
The document discusses analog sensor interfacing and analog to digital conversion. It explains that physical quantities in the real world are analog while computers use digital values, so an analog to digital converter (ADC) is used to convert analog sensor signals to digital values. It then describes the characteristics of ADCs like resolution, conversion time, reference voltage, and output data format. It provides examples of calculating the step size and digital output for different resolutions and reference voltages. Finally, it discusses different types of sensors, interfacing techniques for sensors, displays, and relays with microcontrollers.
Universal synchronous asynchronous receiver transmitter(usart) and AtoD CoverterTejas Shetye
The document discusses the Universal Synchronous Asynchronous Receiver Transmitter (USART) and Analog-to-Digital Converter (ADC) components in PIC microcontrollers. It describes how USART can be configured for synchronous or asynchronous communication and the functions of its TXSTA and RCSTA registers. It also explains the steps for ADC conversion, including configuring the ADC module, selecting the input channel, starting conversion, and reading the result registers.
One Wire Serial Communication allows for transmission of data over a single wire between a master and slave device. It uses precise timing of signal levels to delineate bits. The protocol involves the master sending a reset pulse, slaves responding with presence pulses, then the master sending ROM and memory commands. Communication follows a standard sequence of reset, presence, ROM command, and memory command. CRC is used for error checking.
The document discusses various data link layer protocols for medium access control in computer networks. It describes error control techniques like automatic repeat request (ARQ) and error correcting codes such as Hamming codes that allow detection and correction of errors during transmission. It also explains error detecting codes including cyclic redundancy checks (CRC) that enable detection of errors. Additionally, it covers multiple access protocols for shared mediums like Aloha, slotted Aloha, carrier sense multiple access, polling, token passing and code division multiple access.
This document contains 56 questions and answers related to VLSI design. The questions cover topics such as logic gates, multiplexers, flip-flops, finite state machines, adders, encoders, decoders, PLAs, FPGAs, CPLDs, K-maps, and more. While the answers provide explanations and circuit implementations to help understand the concepts being asked about.
The document discusses various types of errors that can occur during data transmission and different error detection and correction techniques. It defines transmission errors as errors caused when data is corrupted during network transmission. The main types of transmission errors are bit errors, multiple bit errors, and burst errors. Error detection techniques discussed include vertical redundancy check (VRC/parity check), longitudinal redundancy check (LRC), checksum, and cyclic redundancy check (CRC). Forward error correction techniques like Hamming codes are also summarized that allow detecting and correcting errors without retransmission.
This document discusses serial communication between an 8051 microcontroller and a PC. It describes the registers involved in serial communication like SCON and TMOD. It explains how to set the baud rate using Timer1. A level converter chip like MAX232 is needed to convert voltage levels between serial ports and microcontrollers. The document provides code examples to transmit and receive data through the serial port. It discusses connecting the microcontroller to a PC using a serial cable and level shifter for debugging serial communication.
The document discusses number systems and coding schemes. It describes how to convert between decimal, binary, octal, hexadecimal and other number systems. It also discusses various coding schemes like binary coded decimal, excess-3 code, gray code, alphanumeric codes and complements. The key points are:
1) A number system with base 'r' contains 'r' different digits from 0 to r-1. Decimal to other bases conversions involve dividing the integer part by the base and multiplying the fractional part by the base.
2) Coding schemes discussed include binary coded decimal (BCD), excess-3 code, gray code, alphanumeric codes like EBCDIC.
3) Complements like 1's complement
ELECTRONICS PROJECT REPORT OF HOME AUTOMATION CUM BUILDING SECUIRITYEldhose George
This document summarizes a home security and automation system that uses an intruder detection system and cameras for security, and controls lights, garden watering, and a water pump for automation. The security section uses IR sensors and cameras to detect intruders and monitor areas. The automation section controls lights, garden watering using a solenoid valve, and a water pump for an overhead tank. The system is controlled by a microcontroller and includes circuits for sensors, cameras, relays, and a power supply.
WCDMA uses spread spectrum technology to allow multiple users to access the same frequency band simultaneously. It spreads user data over a wide bandwidth through multiplication with unique spreading codes. At the receiver, the desired user's signal is recovered through correlation with the same spreading code. WCDMA employs RAKE receivers to combine signals from different propagation paths using maximal ratio combining for improved reception. Power control is used to manage interference between users communicating over the same frequency channel.
This document discusses different types of digital logic families. It describes Transistor-Transistor Logic (TTL) circuits, including TTL NAND gates which use a totem pole configuration to provide high speed and low output impedance. Metal-oxide-semiconductor (MOS) and complementary MOS (CMOS) circuits are also covered, with CMOS NAND gates using both N-channel and P-channel MOSFETs for low power dissipation. Emitter-coupled logic (ECL) is described as the fastest logic family using current-mode switching, though it has higher power dissipation. Key specifications for digital ICs like propagation delay, power, noise immunity, and fan-in
This document discusses analog to digital conversion fundamentals. It defines analog and digital signals and introduces analog to digital converters (ADCs) which convert continuous analog signals to discrete digital values. It discusses important ADC characteristics like resolution, quantization error, differential and integral nonlinearity. Sample and hold circuits are explained along with errors like aperture uncertainty. Specifications of digital to analog converters (DACs) like output voltage, resolution and nonlinearity errors are also covered.
The document summarizes key concepts relating to the data link layer, including:
1) The data link layer provides services to the network layer such as framing data and error control. It regulates data flow and deals with transmission errors.
2) Framing involves delimiting frames with flags or escape sequences to handle bit stuffing. Error detection uses techniques like CRC checksums while error correction uses codes like Hamming codes.
3) Stop-and-wait protocols were improved with sliding window protocols using sequence numbers and acknowledgments to allow pipelining and handle lost frames more efficiently through techniques like selective repeat.
UNIT 4 & 5 - I nterfacing_Lecture7.pptxnaveen088888
The document discusses analog sensor interfacing and analog to digital conversion. It explains that physical quantities in the real world are analog while computers use digital values, so an analog to digital converter (ADC) is used to convert analog sensor signals to digital values. It then describes the characteristics of ADCs like resolution, conversion time, reference voltage, and output data format. It provides examples of calculating the step size and digital output for different resolutions and reference voltages. Finally, it discusses different types of sensors, interfacing techniques for sensors, displays, and relays with microcontrollers.
Universal synchronous asynchronous receiver transmitter(usart) and AtoD CoverterTejas Shetye
The document discusses the Universal Synchronous Asynchronous Receiver Transmitter (USART) and Analog-to-Digital Converter (ADC) components in PIC microcontrollers. It describes how USART can be configured for synchronous or asynchronous communication and the functions of its TXSTA and RCSTA registers. It also explains the steps for ADC conversion, including configuring the ADC module, selecting the input channel, starting conversion, and reading the result registers.
One Wire Serial Communication allows for transmission of data over a single wire between a master and slave device. It uses precise timing of signal levels to delineate bits. The protocol involves the master sending a reset pulse, slaves responding with presence pulses, then the master sending ROM and memory commands. Communication follows a standard sequence of reset, presence, ROM command, and memory command. CRC is used for error checking.
The document discusses various data link layer protocols for medium access control in computer networks. It describes error control techniques like automatic repeat request (ARQ) and error correcting codes such as Hamming codes that allow detection and correction of errors during transmission. It also explains error detecting codes including cyclic redundancy checks (CRC) that enable detection of errors. Additionally, it covers multiple access protocols for shared mediums like Aloha, slotted Aloha, carrier sense multiple access, polling, token passing and code division multiple access.
This document contains 56 questions and answers related to VLSI design. The questions cover topics such as logic gates, multiplexers, flip-flops, finite state machines, adders, encoders, decoders, PLAs, FPGAs, CPLDs, K-maps, and more. While the answers provide explanations and circuit implementations to help understand the concepts being asked about.
The document discusses various types of errors that can occur during data transmission and different error detection and correction techniques. It defines transmission errors as errors caused when data is corrupted during network transmission. The main types of transmission errors are bit errors, multiple bit errors, and burst errors. Error detection techniques discussed include vertical redundancy check (VRC/parity check), longitudinal redundancy check (LRC), checksum, and cyclic redundancy check (CRC). Forward error correction techniques like Hamming codes are also summarized that allow detecting and correcting errors without retransmission.
This document discusses serial communication between an 8051 microcontroller and a PC. It describes the registers involved in serial communication like SCON and TMOD. It explains how to set the baud rate using Timer1. A level converter chip like MAX232 is needed to convert voltage levels between serial ports and microcontrollers. The document provides code examples to transmit and receive data through the serial port. It discusses connecting the microcontroller to a PC using a serial cable and level shifter for debugging serial communication.
The document discusses number systems and coding schemes. It describes how to convert between decimal, binary, octal, hexadecimal and other number systems. It also discusses various coding schemes like binary coded decimal, excess-3 code, gray code, alphanumeric codes and complements. The key points are:
1) A number system with base 'r' contains 'r' different digits from 0 to r-1. Decimal to other bases conversions involve dividing the integer part by the base and multiplying the fractional part by the base.
2) Coding schemes discussed include binary coded decimal (BCD), excess-3 code, gray code, alphanumeric codes like EBCDIC.
3) Complements like 1's complement
ELECTRONICS PROJECT REPORT OF HOME AUTOMATION CUM BUILDING SECUIRITYEldhose George
This document summarizes a home security and automation system that uses an intruder detection system and cameras for security, and controls lights, garden watering, and a water pump for automation. The security section uses IR sensors and cameras to detect intruders and monitor areas. The automation section controls lights, garden watering using a solenoid valve, and a water pump for an overhead tank. The system is controlled by a microcontroller and includes circuits for sensors, cameras, relays, and a power supply.
WCDMA uses spread spectrum technology to allow multiple users to access the same frequency band simultaneously. It spreads user data over a wide bandwidth through multiplication with unique spreading codes. At the receiver, the desired user's signal is recovered through correlation with the same spreading code. WCDMA employs RAKE receivers to combine signals from different propagation paths using maximal ratio combining for improved reception. Power control is used to manage interference between users communicating over the same frequency channel.
This document discusses different types of digital logic families. It describes Transistor-Transistor Logic (TTL) circuits, including TTL NAND gates which use a totem pole configuration to provide high speed and low output impedance. Metal-oxide-semiconductor (MOS) and complementary MOS (CMOS) circuits are also covered, with CMOS NAND gates using both N-channel and P-channel MOSFETs for low power dissipation. Emitter-coupled logic (ECL) is described as the fastest logic family using current-mode switching, though it has higher power dissipation. Key specifications for digital ICs like propagation delay, power, noise immunity, and fan-in
VLSI Static Timing Analysis Setup And Hold Part 2Amr Adel
Understanding setup and hold timing checks and how to fix the
Topics included:
- Setup timing
- Hold timing
- 20 methods to fix timing violations. Each explained in detail
- ASIC flow, synthesis, local skew, pipelining, retiming, MCP, false paths, etc
Part 1 of VLSI STA Documents
Topics Included:
- PPA Metrics
- Interconnect/Cell propagation delay
- Transition time
- Standard cells libraries
- Timing path calculations
- MTCMOS
- Setup / Hold / Tcq times
Construction Materials (Paints) in Civil EngineeringLavish Kashyap
This file will provide you information about various types of Paints in Civil Engineering field under Construction Materials.
It will be very useful for all Civil Engineering students who wants to search about various Construction Materials used in Civil Engineering field.
Paint is a vital construction material used for protecting surfaces and enhancing the aesthetic appeal of buildings and structures. It consists of several components, including pigments (for color), binders (to hold the pigment together), solvents or thinners (to adjust viscosity), and additives (to improve properties like durability and drying time).
Paint is one of the material used in Civil Engineering field. It is especially used in final stages of construction project.
Paint plays a dual role in construction: it protects building materials and contributes to the overall appearance and ambiance of a space.
David Boutry - Specializes In AWS, Microservices And PythonDavid Boutry
With over eight years of experience, David Boutry specializes in AWS, microservices, and Python. As a Senior Software Engineer in New York, he spearheaded initiatives that reduced data processing times by 40%. His prior work in Seattle focused on optimizing e-commerce platforms, leading to a 25% sales increase. David is committed to mentoring junior developers and supporting nonprofit organizations through coding workshops and software development.
OPTIMIZING DATA INTEROPERABILITY IN AGILE ORGANIZATIONS: INTEGRATING NONAKA’S...ijdmsjournal
Agile methodologies have transformed organizational management by prioritizing team autonomy and
iterative learning cycles. However, these approaches often lack structured mechanisms for knowledge
retention and interoperability, leading to fragmented decision-making, information silos, and strategic
misalignment. This study proposes an alternative approach to knowledge management in Agile
environments by integrating Ikujiro Nonaka and Hirotaka Takeuchi’s theory of knowledge creation—
specifically the concept of Ba, a shared space where knowledge is created and validated—with Jürgen
Habermas’s Theory of Communicative Action, which emphasizes deliberation as the foundation for trust
and legitimacy in organizational decision-making. To operationalize this integration, we propose the
Deliberative Permeability Metric (DPM), a diagnostic tool that evaluates knowledge flow and the
deliberative foundation of organizational decisions, and the Communicative Rationality Cycle (CRC), a
structured feedback model that extends the DPM, ensuring long-term adaptability and data governance.
This model was applied at Livelo, a Brazilian loyalty program company, demonstrating that structured
deliberation improves operational efficiency and reduces knowledge fragmentation. The findings indicate
that institutionalizing deliberative processes strengthens knowledge interoperability, fostering a more
resilient and adaptive approach to data governance in complex organizations.
Introduction to ANN, McCulloch Pitts Neuron, Perceptron and its Learning
Algorithm, Sigmoid Neuron, Activation Functions: Tanh, ReLu Multi- layer Perceptron
Model – Introduction, learning parameters: Weight and Bias, Loss function: Mean
Square Error, Back Propagation Learning Convolutional Neural Network, Building
blocks of CNN, Transfer Learning, R-CNN,Auto encoders, LSTM Networks, Recent
Trends in Deep Learning.
Welcome to the May 2025 edition of WIPAC Monthly celebrating the 14th anniversary of the WIPAC Group and WIPAC monthly.
In this edition along with the usual news from around the industry we have three great articles for your contemplation
Firstly from Michael Dooley we have a feature article about ammonia ion selective electrodes and their online applications
Secondly we have an article from myself which highlights the increasing amount of wastewater monitoring and asks "what is the overall" strategy or are we installing monitoring for the sake of monitoring
Lastly we have an article on data as a service for resilient utility operations and how it can be used effectively.
Newly poured concrete opposing hot and windy conditions is considerably susceptible to plastic shrinkage cracking. Crack-free concrete structures are essential in ensuring high level of durability and functionality as cracks allow harmful instances or water to penetrate in the concrete resulting in structural damages, e.g. reinforcement corrosion or pressure application on the crack sides due to water freezing effect. Among other factors influencing plastic shrinkage, an important one is the concrete surface humidity evaporation rate. The evaporation rate is currently calculated in practice by using a quite complex Nomograph, a process rather tedious, time consuming and prone to inaccuracies. In response to such limitations, three analytical models for estimating the evaporation rate are developed and evaluated in this paper on the basis of the ACI 305R-10 Nomograph for “Hot Weather Concreting”. In this direction, several methods and techniques are employed including curve fitting via Genetic Algorithm optimization and Artificial Neural Networks techniques. The models are developed and tested upon datasets from two different countries and compared to the results of a previous similar study. The outcomes of this study indicate that such models can effectively re-develop the Nomograph output and estimate the concrete evaporation rate with high accuracy compared to typical curve-fitting statistical models or models from the literature. Among the proposed methods, the optimization via Genetic Algorithms, individually applied at each estimation process step, provides the best fitting result.
This research presents the optimization techniques for reinforced concrete waffle slab design because the EC2 code cannot provide an efficient and optimum design. Waffle slab is mostly used where there is necessity to avoid column interfering the spaces or for a slab with large span or as an aesthetic purpose. Design optimization has been carried out here with MATLAB, using genetic algorithm. The objective function include the overall cost of reinforcement, concrete and formwork while the variables comprise of the depth of the rib including the topping thickness, rib width, and ribs spacing. The optimization constraints are the minimum and maximum areas of steel, flexural moment capacity, shear capacity and the geometry. The optimized cost and slab dimensions are obtained through genetic algorithm in MATLAB. The optimum steel ratio is 2.2% with minimum slab dimensions. The outcomes indicate that the design of reinforced concrete waffle slabs can be effectively carried out using the optimization process of genetic algorithm.
Optimization techniques can be divided to two groups: Traditional or numerical methods and methods based on stochastic. The essential problem of the traditional methods, that by searching the ideal variables are found for the point that differential reaches zero, is staying in local optimum points, can not solving the non-linear non-convex problems with lots of constraints and variables, and needs other complex mathematical operations such as derivative. In order to satisfy the aforementioned problems, the scientists become interested on meta-heuristic optimization techniques, those are classified into two essential kinds, which are single and population-based solutions. The method does not require unique knowledge to the problem. By general knowledge the optimal solution can be achieved. The optimization methods based on population can be divided into 4 classes from inspiration point of view and physical based optimization methods is one of them. Physical based optimization algorithm: that the physical rules are used for updating the solutions are:, Lighting Attachment Procedure Optimization (LAPO), Gravitational Search Algorithm (GSA) Water Evaporation Optimization Algorithm, Multi-Verse Optimizer (MVO), Galaxy-based Search Algorithm (GbSA), Small-World Optimization Algorithm (SWOA), Black Hole (BH) algorithm, Ray Optimization (RO) algorithm, Artificial Chemical Reaction Optimization Algorithm (ACROA), Central Force Optimization (CFO) and Charged System Search (CSS) are some of physical methods. In this paper physical and physic-chemical phenomena based optimization methods are discuss and compare with other optimization methods. Some examples of these methods are shown and results compared with other well known methods. The physical phenomena based methods are shown reasonable results.
Deepfake Phishing: A New Frontier in Cyber ThreatsRaviKumar256934
n today’s hyper-connected digital world, cybercriminals continue to develop increasingly sophisticated methods of deception. Among these, deepfake phishing represents a chilling evolution—a combination of artificial intelligence and social engineering used to exploit trust and compromise security.
Deepfake technology, once a novelty used in entertainment, has quickly found its way into the toolkit of cybercriminals. It allows for the creation of hyper-realistic synthetic media, including images, audio, and videos. When paired with phishing strategies, deepfakes can become powerful weapons of fraud, impersonation, and manipulation.
This document explores the phenomenon of deepfake phishing, detailing how it works, why it’s dangerous, and how individuals and organizations can defend themselves against this emerging threat.
The main purpose of the current study was to formulate an empirical expression for predicting the axial compression capacity and axial strain of concrete-filled plastic tubular specimens (CFPT) using the artificial neural network (ANN). A total of seventy-two experimental test data of CFPT and unconfined concrete were used for training, testing, and validating the ANN models. The ANN axial strength and strain predictions were compared with the experimental data and predictions from several existing strength models for fiber-reinforced polymer (FRP)-confined concrete. Five statistical indices were used to determine the performance of all models considered in the present study. The statistical evaluation showed that the ANN model was more effective and precise than the other models in predicting the compressive strength, with 2.8% AA error, and strain at peak stress, with 6.58% AA error, of concrete-filled plastic tube tested under axial compression load. Similar lower values were obtained for the NRMSE index.
AI-Powered Data Management and Governance in RetailIJDKP
Artificial intelligence (AI) is transforming the retail industry’s approach to data management and decisionmaking. This journal explores how AI-powered techniques enhance data governance in retail, ensuring data quality, security, and compliance in an era of big data and real-time analytics. We review the current landscape of AI adoption in retail, underscoring the need for robust data governance frameworks to handle the influx of data and support AI initiatives. Drawing on literature and industry examples, we examine established data governance frameworks and how AI technologies (such as machine learning and automation) are augmenting traditional data management practices. Key applications are identified, including AI-driven data quality improvement, automated metadata management, and intelligent data lineage tracking, illustrating how these innovations streamline operations and maintain data integrity. Ethical considerations including customer privacy, bias mitigation, transparency, and regulatory compliance are discussed to address the challenges of deploying AI in data governance responsibly.
この資料は、Roy FieldingのREST論文(第5章)を振り返り、現代Webで誤解されがちなRESTの本質を解説しています。特に、ハイパーメディア制御やアプリケーション状態の管理に関する重要なポイントをわかりやすく紹介しています。
This presentation revisits Chapter 5 of Roy Fielding's PhD dissertation on REST, clarifying concepts that are often misunderstood in modern web design—such as hypermedia controls within representations and the role of hypermedia in managing application state.
2. /amradelm
/amradelm
Introduction
2
• In the previous part we discussed CDC synchronizers their rules and how to ensure safe capture by
launching a wide pulse.
• Our CDC concerns till now are:
o Data corruption: Partially fixed. The system, till now, can only send 1-bit data. Also, this data has a
varying arrival time.
o Data incoherence: Fixed. The metastable value settles within the synchronizers at 0 or 1 and then
propagates to all the 2nd domain blocks with the same settled value. We saw the divergence issues
and learned how to avoid them.
o Data loss: Fixed. The pulse is wide enough that it won’t be missed by domain 2
o Data duplication: Not fixed
o Chip burning: Fixed. We limited the metastability propagation between the synchronizers and reduced
its occurrence frequency.
o In this part we will handle data duplication
metastability
4. /amradelm
/amradelm
Data Duplication
4
• Consider the following example : Domain 1 sends a control signal to domain 2 to enable a counter. Each enable means one count up
1. Domain 1 sends a logic “1” to domain 2.
1. The data goes through metastability and settles at “logic 0”.
2. Then finally settles at 1 because the pulse was wide enough.
3. It then safely reach C and cause the counter to increment one count.
2. Domain 1 sends another logic “1” to domain 2.
1. This time the data come out of metastability as “logic 1” which happens to be the correct data.
2. The next cycle we get another “logic 1” because we made the pulse wide to ensure safe capture.
3. The counter gets 2 enable signals causing it to count 2 times while it was intended to count only once.
• This example shows the problem with data duplication even if the two clocks have the same frequency.
• We need to find a way to make domain 2 sees a single cycle pulse for each wide pulse sent by domain 1
1
2
6. /amradelm
/amradelm
Pulse Generator
6
• Consider the circuit on the right:
1. The input changes to logic 1.
The XOR inputs are (In= 1) and (FF/Q= 0) so the (output= 1)
2. The input remains at logic 1. The FF now stores the previous value “1”.
The XOR inputs are (In= 1) and (FF/Q= 1) so the (output= 0)
The output remains “0” as long as the input remains constant.
3. The input changes to logic 0.
The XOR inputs are (In= 0) and (FF/Q= 1) and so the (output= 1)
4. The input remains at logic 0. The FF now stores the previous value “0”.
The XOR inputs are (In= 0) and (FF/Q= 0) so the (output= 0)
The output remains “0” as long as the input remains constant.
• As we can see, this circuit outputs “1” for one cycle whenever the input changes/toggles.
And outputs “0” as long as the input remain constant.
• This circuit is called a pulse generator and will help us deal with the CDC
data duplication issue.
A B XOR
0 0 0
0 1 1
1 0 1
1 1 0
1 2 3 4
7. /amradelm
/amradelm
Data Duplication
7
• Lets analyze the same example we saw earlier but now with the pulse generator added:
1. Domain 1 sends a logic “1” to domain 2.
1. The data goes through metastability and settles at “logic 0”.
2. Then finally settles at 1 because the pulse was wide enough.
3. It then safely reaches the pulse generator. The pulse generator ensures that the pulse
remains 1 for only one cycle as long as the input to remains constant
2. After some time domain 1 sends another enable to domain 2. The enable is sent by toggling the signal to “0”.
1. The data goes through metastability and settles at “logic 0”.
2. The next cycle we get another “logic 0” because we made the pulse wide to ensure safe capture.
3. The pulse generator outputs “logic 1” for only one cycle.
• As you can see the pulse generator fixed the data duplication issue because it converts a wide pulse into a single cycle pulse.
1
2
10. /amradelm
/amradelm
Edge Detector
10
• Consider the circuit on the right:
1. The input changes to logic 1.
The inputs to the AND are In: “1” and FF/Q: “0” so the output: “1”
2. The input remains at logic 1. The FF now stores the previous value “1”.
The AND inputs are In: “1” and FF/Q: “1” so the output: “0”
The output remains “0” as long as the input remains constant.
3. The input changes to logic 0.
The inputs to the AND are In: “0” and FF/Q: “1” and so the output: “0”
4. The input remains at logic 0. The FF now stores the previous value “0”.
The AND inputs are In: “0” and FF/Q: “0” so the output: “0”
The output remains “0” as long as the input remains constant.
• Compared to the pulse generator, this circuit produced a pulse only when the input changed from 0 → 1
while the pulse generator produced a pulse whether the input changed from 0 → 1 or from 1 → 0.
A B Out
0 0 0
0 1 0
1 0 1
1 1 0
1 2 3 4
A
B
11. /amradelm
/amradelm
Pulse Generator vs Edge Detector
11
Pulse Generator Edge Detector
En2.2
A B Out
0 0 0
0 1 0
1 0 1
1 1 0
A
B
A B XOR
0 0 0
0 1 1
1 0 1
1 1 0
12. /amradelm
/amradelm
Edge Detector Types
12
Rising Edge Detection
Active High Output
Rising Edge Detection
Active Low Output
Falling Edge Detection
Active High Output
Falling Edge Detection
Active Low Output
13. /amradelm
/amradelm
Conclusion
13
• We want to know what we solved till now. Our CDC concerns were:
o Data corruption: Partially fixed. The system, till now, can only send 1-bit data. Also, this data has a varying arrival time.
o Data incoherence: Fixed. The metastable value settles within the synchronizers at 0 or 1 and then propagates to all the 2nd domain blocks with the same
settled value
o Data loss: Fixed. The pulse is wide enough that it won’t be missed by domain 2
o Data duplication: Fixed
o Chip burning: Fixed. We limited the metastability propagation between the synchronizers and reduced its occurrence frequency.
• In the next parts we will see how to send a multi-bit signal.