SlideShare a Scribd company logo
1 of 19
Download to read offline
READ ONLY MEMORY
(ROM)
18-Apr-19 1
Syed Hasan Saeed, Integral University,
Lucknow
SYED HASAN SAEED
hasansaeedcontrol@gmail.com
https://shasansaeed.yolasite.com
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
2
ROM
• In ROM Binary information is stored permanently.
• Block diagram of ROM (size m x n ) is shown in fig.1, where ‘m’ is
the number of locations and ‘n’ is the number of bit words that can
stored in each locations.
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
3
2k x n
ROM
m x n
Data Outputs ‘n’Address Inputs (k) Data Outputs ‘n’Address Inputs (k)
Fig. 1 Fig. 2
Io
I1
Ik-1
.
.
.
.
.
.
ROM
O0
O1
O2
ON-1
‘k’ inputs
Address
‘n’ outputs
Data
ROM
• There are ‘k’ number of address lines to access ‘m’ locations.
• ‘n’ is the data output lines. This gives the data bits of the stored
word selected by the address.
• Therefore for implementation of ‘k’ variables and ‘n’ outputs then
the size of ROM is represented by 2k x n as shown in fig.2. this
will generates all possible 2k minterms.
• ROMs are designed only for reading the stored informations.
• ROM does not have write operation i.e user cannot write any
information.
• ROM is used to store fixed information like instructions, look up
tables etc.
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
4
k
2m 
ROM
• ROMs are programmed at the time of manufacturing.
• ROMs are costly.
• ROMs can be used for the implementation of combinational
circuits
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
5
EXAMPLE 1
The following memory units are specified by the number of words times the number of bit
per word. How many address lines and input-output data lines are required in each case.
(i) 4K x 16 (ii) 2G x 8 (iii) 16M x 32 (iv) 256K x 64
Reference: Moris Mano
Solution: (i) since, 1K=1024=210
4K=22 x 210= 212
4K x 16 can be written as 212 x 16
Therefore, there are 12 address lines and 16 data lines.
Total input-output lines = 12+16=32
(ii) 2G x 8
1 G = 230
2G = 2 x 230 = 231
2G x 8 = 231 * 8
Therefore, there are 31 address lines and 8 data lines.
Total input-output lines = 31+8 =39
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
6
No. of Address line
(iii) 16M x 32
1 M = 220
16M = 24 x 220 = 224
16M x 32 can be written as
16M x 32 = 224 x 32
Therefore, there are 24 address lines and 32 data lines.
Total input-output lines = 24 + 32 = 56
(iv) 256K x 64
Since, 1K=1024 = 210
256K = 28 x 210 = 218
256K x 64 can be written as 218 x 64
Therefore, there are 18 address lines and 64data lines.
Total input-output lines = 18 + 64 = 82
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
7
No. of Address line
No. of Address line
EXAMPLE 2: Give the number of bytes stored in the memories listed in example 1.
SOLUTION:
(i) 4K x 16
A byte is equivalent to 8 bits.
No. of 16 bit words = 4K= 4 * 1024 = 212 = 4096
Memory Size = No. of words * word size = 4096 * 16 bit = 65536 bits
(Output is 16 i.e. 2 bytes)
Memory size =65536 / 8 = 8192 bytes = 8kB
(ii) 2G x 8
A byte is equivalent to 8 bits.
No. of 8 bit words = 2G = 2G = 2 x 230 = 231 = 2,147,483,648
Memory Size = No. of words * word size = 2,147,483,648 * 8 bit = 17179869184
bits
(Output is 8 i.e. 1 bytes)
Memory size = 17179869184 /8 = 2,147,483,648 =2GB
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
8
(iii) 16 M x 32
A byte is equivalent to 8 bits.
No. of 16 bit words = 24 x 220 = 224 = 16777216
Memory Size = No. of words * word size = 16777216 * 32 bit = 536870912 bits
(Output is 32 i.e. 4 bytes)
Memory size = 536870912 / 8 = 67108864 bytes = 64 MB
Alternate 1: 16M = 224
16 M x 32 = 224 * 4* 8 = 224* 22*8 = 226 *8
No. of Bytes stored = 226 = 67108864 bytes = 64 MB
Alternate 2: Memory Size = No. of words * word size
= 16 M * 4 B = 64 MB
(iv) 256K x 64
256K x 64
Memory Size = No. of words * word size
= 256 k * 8B
= 2048 kB = 2 MB
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
9
32
TYPES OF ROM
 Mask Programmed ROM (MROM)
 Programmable Read Only Memory (PROM)
 Erasable Programmable Read Only Memory (EPROM)
 E2PROM
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
10
ADVANTAGES OF ROM
• Low Cost
• High Speed
• Flexibility in system designed
• ROM is non-volatile memory.
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
11
APPLICATIONS OF ROM
• It is used for the implementation of combinational circuits.
• It is used for the implementation of sequential circuits.
• Used for look up tables.
• Used for storage purpose of microprocessor program.
• It is suitable for the LSI manufacturing process.
• Used in function generators.
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
12
INTERNAL STRUCTURE OF ROM
18-Apr-19 13
.
.
.
.
.
5x32
DECODER
A7 A0
A1A2A6 A5 A4 A3
I0
I4
I3
I2
I1
1
2
3
31
30
29
0
8 Data Output
.
.
.
.
.
Each OR gate has 32 inputs
Five
Inputs
256 interconnections and each interconnection is programmable
Fig. 3
EXAMPLE: Consider 32 x 8 ROM.
• It consists of 32 words of 8 bits each.
• To access 32 locations (addresses) there are 5 input lines (m =32,
m= 25, k = 5) which forms the binary numbers equivalent to 0 to 31.
• Fig.5 shows the internal logic of a ROM.
• The five inputs are decoded into 32 different outputs with the help
of a 5 x 32 decoder and each output of the decoder represent a
memory address.
• The 32 outputs of the decoder are connected to each of the eight OR
gates. It means that each OR gate having 32 inputs.
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
14
• There are 8 OR gates and each OR gate has 32 connections,
therefore total internal connections will be 32 x 8 = 256
• In general ‘2k x n’ ROM will have ‘k x 2k’ decoder and ‘n’ OR
gates.
• Each OR gate has 2k inputs, which are connected to each of the
outputs of the decoder.
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
15
• All 256 intersections are programmable.
• A programmable connection between two lines is equivalent to a
switch which is either turned ON or OFF. ON means two lines are
connected with each other and OFF means two lines are not
connected.
• ROM truth table is shown in fig.4
• Truth table shows that there are 5 inputs and 8 outputs.
• There are 32 locations (addresses) and each location stored 8 bits
word.
• ‘0’ in truth table indicates there is no connection and ‘1’ indicates a
connection.
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
16
TRUTH TABLE:
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
17
Location No.
Inputs Outputs
I4 I3 I2 I1 I0 A7 A6 A5 A4 A3 A2 A1 A0
0 0 0 0 0 0 1 0 0 1 0 0 1 1
1 0 0 0 0 1 0 0 0 1 1 1 0 1
2 0 0 0 1 0 1 0 1 1 0 0 0 1
3 0 0 0 1 1 1 0 0 0 1 1 1 0
29 1 1 1 0 1 1 0 0 0 1 0 1 0
30 1 1 1 1 0 0 1 1 1 0 0 0 1
31 1 1 1 1 1 0 1 1 0 0 0 1 1
------
Fig. 4
INTERNAL STRUCTURE OF 32 x 8 ROM
18-Apr-19 18
.
.
.
.
.
5x32
DECODER
A7 A0
A1A2A6 A5 A4 A3
I0
I4
I3
I2
I1
1
2
3
31
30
29
0
8 Data Output
.
.
.
.
.
Each OR gate has 32 inputs
Five
Inputs
256 interconnections and each interconnection is programmable
Fig. 3
0 0 0 0
0 0 0 0
0 0 00
0000
0 0 0 0 0
0
0
0 0 0
000
1 1 1 1
1 1 1
1111
1 1 1 1
111
1 11 1
1 1 1 1
THANK YOU
18-Apr-19
Syed Hasan Saeed, Integral University,
Lucknow
19

More Related Content

What's hot

Processor Organization and Architecture
Processor Organization and ArchitectureProcessor Organization and Architecture
Processor Organization and ArchitectureVinit Raut
 
Encoder, decoder, multiplexers and demultiplexers
Encoder, decoder, multiplexers and demultiplexersEncoder, decoder, multiplexers and demultiplexers
Encoder, decoder, multiplexers and demultiplexerspubgalarab
 
Code Conversion in 8085 Microprocessor
Code Conversion in 8085 MicroprocessorCode Conversion in 8085 Microprocessor
Code Conversion in 8085 MicroprocessorMOHIT AGARWAL
 
Machine cycles
Machine cyclesMachine cycles
Machine cyclesWafaAbied
 
Computer instructions
Computer instructionsComputer instructions
Computer instructionsAnuj Modi
 
Computer organization memory
Computer organization memoryComputer organization memory
Computer organization memoryDeepak John
 
Basic ops concept of comp
Basic ops  concept of compBasic ops  concept of comp
Basic ops concept of compgaurav jain
 
Static and Dynamic Read/Write memories
Static and Dynamic Read/Write memoriesStatic and Dynamic Read/Write memories
Static and Dynamic Read/Write memoriesAbhilash Nair
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 MicroprocessorNahian Ahmed
 
Logical micro-operations
Logical micro-operationsLogical micro-operations
Logical micro-operationsVATSAL TRIVEDI
 
Memory banking-of-8086-final
Memory banking-of-8086-finalMemory banking-of-8086-final
Memory banking-of-8086-finalEstiak Khan
 
Introduction to pic microcontroller
Introduction to pic microcontrollerIntroduction to pic microcontroller
Introduction to pic microcontrollerSiva Kumar
 
Multiplication algorithm, hardware and flowchart
Multiplication algorithm, hardware and flowchartMultiplication algorithm, hardware and flowchart
Multiplication algorithm, hardware and flowchartTanjarul Islam Mishu
 
Chapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMING
Chapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMINGChapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMING
Chapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMINGFrankie Jones
 
General Purpose Input Output - Brief Introduction
General Purpose Input Output - Brief IntroductionGeneral Purpose Input Output - Brief Introduction
General Purpose Input Output - Brief IntroductionNEEVEE Technologies
 
Basic Computer Organization and Design
Basic Computer Organization and DesignBasic Computer Organization and Design
Basic Computer Organization and Designmekind
 
Computer organisation
Computer organisationComputer organisation
Computer organisationMohd Arif
 

What's hot (20)

Computer Organization
Computer OrganizationComputer Organization
Computer Organization
 
Processor Organization and Architecture
Processor Organization and ArchitectureProcessor Organization and Architecture
Processor Organization and Architecture
 
Combinational circuit
Combinational circuitCombinational circuit
Combinational circuit
 
Encoder, decoder, multiplexers and demultiplexers
Encoder, decoder, multiplexers and demultiplexersEncoder, decoder, multiplexers and demultiplexers
Encoder, decoder, multiplexers and demultiplexers
 
Code Conversion in 8085 Microprocessor
Code Conversion in 8085 MicroprocessorCode Conversion in 8085 Microprocessor
Code Conversion in 8085 Microprocessor
 
Machine cycles
Machine cyclesMachine cycles
Machine cycles
 
Computer instructions
Computer instructionsComputer instructions
Computer instructions
 
Computer organization memory
Computer organization memoryComputer organization memory
Computer organization memory
 
Basic ops concept of comp
Basic ops  concept of compBasic ops  concept of comp
Basic ops concept of comp
 
Static and Dynamic Read/Write memories
Static and Dynamic Read/Write memoriesStatic and Dynamic Read/Write memories
Static and Dynamic Read/Write memories
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 Microprocessor
 
Logical micro-operations
Logical micro-operationsLogical micro-operations
Logical micro-operations
 
Memory banking-of-8086-final
Memory banking-of-8086-finalMemory banking-of-8086-final
Memory banking-of-8086-final
 
Micro program example
Micro program exampleMicro program example
Micro program example
 
Introduction to pic microcontroller
Introduction to pic microcontrollerIntroduction to pic microcontroller
Introduction to pic microcontroller
 
Multiplication algorithm, hardware and flowchart
Multiplication algorithm, hardware and flowchartMultiplication algorithm, hardware and flowchart
Multiplication algorithm, hardware and flowchart
 
Chapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMING
Chapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMINGChapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMING
Chapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMING
 
General Purpose Input Output - Brief Introduction
General Purpose Input Output - Brief IntroductionGeneral Purpose Input Output - Brief Introduction
General Purpose Input Output - Brief Introduction
 
Basic Computer Organization and Design
Basic Computer Organization and DesignBasic Computer Organization and Design
Basic Computer Organization and Design
 
Computer organisation
Computer organisationComputer organisation
Computer organisation
 

Similar to Read only memory(rom)

ENG 202 – Digital Electronics 1 - Chapter 4 (1).pptx
ENG 202 – Digital Electronics 1 - Chapter 4 (1).pptxENG 202 – Digital Electronics 1 - Chapter 4 (1).pptx
ENG 202 – Digital Electronics 1 - Chapter 4 (1).pptxAishah928448
 
Introduction to Microprocessor lecture 01
Introduction to Microprocessor lecture  01Introduction to Microprocessor lecture  01
Introduction to Microprocessor lecture 01Md. Murshedul Arifeen
 
Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESPerformance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESijtsrd
 
Mcs 012 computer organisation and assemly language programming- ignou assignm...
Mcs 012 computer organisation and assemly language programming- ignou assignm...Mcs 012 computer organisation and assemly language programming- ignou assignm...
Mcs 012 computer organisation and assemly language programming- ignou assignm...Dr. Loganathan R
 
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAA Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAIOSRJECE
 
Hexaware 1
Hexaware 1Hexaware 1
Hexaware 1ncct
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
EFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEM
EFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEMEFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEM
EFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEMelelijjournal
 
Two fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmTwo fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmRifat Tasnim
 
IRJET - Multi-Key Privacy in Cloud Computing
IRJET -  	  Multi-Key Privacy in Cloud ComputingIRJET -  	  Multi-Key Privacy in Cloud Computing
IRJET - Multi-Key Privacy in Cloud ComputingIRJET Journal
 

Similar to Read only memory(rom) (20)

Prom
PromProm
Prom
 
The Understanding of GOST Cryptography Technique
The Understanding of GOST Cryptography TechniqueThe Understanding of GOST Cryptography Technique
The Understanding of GOST Cryptography Technique
 
Basittttt
BasitttttBasittttt
Basittttt
 
Topic 2.3 (1)
Topic 2.3 (1)Topic 2.3 (1)
Topic 2.3 (1)
 
4-DES.pdf
4-DES.pdf4-DES.pdf
4-DES.pdf
 
DESIGN OF COMBINATIONAL LOGIC
DESIGN OF COMBINATIONAL LOGICDESIGN OF COMBINATIONAL LOGIC
DESIGN OF COMBINATIONAL LOGIC
 
ENG 202 – Digital Electronics 1 - Chapter 4 (1).pptx
ENG 202 – Digital Electronics 1 - Chapter 4 (1).pptxENG 202 – Digital Electronics 1 - Chapter 4 (1).pptx
ENG 202 – Digital Electronics 1 - Chapter 4 (1).pptx
 
Introduction to Microprocessor lecture 01
Introduction to Microprocessor lecture  01Introduction to Microprocessor lecture  01
Introduction to Microprocessor lecture 01
 
Decoders.pptx
Decoders.pptxDecoders.pptx
Decoders.pptx
 
Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESPerformance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DES
 
Mcs 012 computer organisation and assemly language programming- ignou assignm...
Mcs 012 computer organisation and assemly language programming- ignou assignm...Mcs 012 computer organisation and assemly language programming- ignou assignm...
Mcs 012 computer organisation and assemly language programming- ignou assignm...
 
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAA Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
 
Hexaware 1
Hexaware 1Hexaware 1
Hexaware 1
 
Ch07
Ch07Ch07
Ch07
 
Coa presentation1
Coa presentation1Coa presentation1
Coa presentation1
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
EFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEM
EFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEMEFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEM
EFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEM
 
Unit 2 module-2
Unit 2 module-2Unit 2 module-2
Unit 2 module-2
 
Two fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmTwo fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption Algorithm
 
IRJET - Multi-Key Privacy in Cloud Computing
IRJET -  	  Multi-Key Privacy in Cloud ComputingIRJET -  	  Multi-Key Privacy in Cloud Computing
IRJET - Multi-Key Privacy in Cloud Computing
 

More from Syed Saeed

Laplace transform of periodic functions
Laplace transform of periodic functionsLaplace transform of periodic functions
Laplace transform of periodic functionsSyed Saeed
 
Maximum power transfer theorem for ac network
Maximum power transfer theorem for ac networkMaximum power transfer theorem for ac network
Maximum power transfer theorem for ac networkSyed Saeed
 
Thevenin's theorem for ac network
Thevenin's theorem for ac network Thevenin's theorem for ac network
Thevenin's theorem for ac network Syed Saeed
 
Tellegen's theorem
Tellegen's theoremTellegen's theorem
Tellegen's theoremSyed Saeed
 
Millman's theorem
Millman's theoremMillman's theorem
Millman's theoremSyed Saeed
 
Subsitution theorem
Subsitution theoremSubsitution theorem
Subsitution theoremSyed Saeed
 
Max. power transfer theorem dc network (Revised)
Max. power transfer theorem dc network (Revised)Max. power transfer theorem dc network (Revised)
Max. power transfer theorem dc network (Revised)Syed Saeed
 
Norton's theorem
Norton's theoremNorton's theorem
Norton's theoremSyed Saeed
 
Circuit theory thevenin theorem
Circuit theory thevenin theoremCircuit theory thevenin theorem
Circuit theory thevenin theoremSyed Saeed
 
Basic definitions & laws revised
Basic definitions & laws revisedBasic definitions & laws revised
Basic definitions & laws revisedSyed Saeed
 
Encoder & Decoder
Encoder & DecoderEncoder & Decoder
Encoder & DecoderSyed Saeed
 
Binary multipliers
Binary multipliersBinary multipliers
Binary multipliersSyed Saeed
 
Magnitude comparator
Magnitude comparatorMagnitude comparator
Magnitude comparatorSyed Saeed
 
Quine Mc Clusky (Tabular) method
Quine Mc Clusky (Tabular) methodQuine Mc Clusky (Tabular) method
Quine Mc Clusky (Tabular) methodSyed Saeed
 
Time domain definition 6
Time domain definition 6Time domain definition 6
Time domain definition 6Syed Saeed
 

More from Syed Saeed (20)

Laplace transform of periodic functions
Laplace transform of periodic functionsLaplace transform of periodic functions
Laplace transform of periodic functions
 
Maximum power transfer theorem for ac network
Maximum power transfer theorem for ac networkMaximum power transfer theorem for ac network
Maximum power transfer theorem for ac network
 
Thevenin's theorem for ac network
Thevenin's theorem for ac network Thevenin's theorem for ac network
Thevenin's theorem for ac network
 
Tellegen's theorem
Tellegen's theoremTellegen's theorem
Tellegen's theorem
 
Millman's theorem
Millman's theoremMillman's theorem
Millman's theorem
 
Subsitution theorem
Subsitution theoremSubsitution theorem
Subsitution theorem
 
Max. power transfer theorem dc network (Revised)
Max. power transfer theorem dc network (Revised)Max. power transfer theorem dc network (Revised)
Max. power transfer theorem dc network (Revised)
 
Norton's theorem
Norton's theoremNorton's theorem
Norton's theorem
 
Circuit theory thevenin theorem
Circuit theory thevenin theoremCircuit theory thevenin theorem
Circuit theory thevenin theorem
 
Basic definitions & laws revised
Basic definitions & laws revisedBasic definitions & laws revised
Basic definitions & laws revised
 
FPGA
FPGAFPGA
FPGA
 
PAL
PALPAL
PAL
 
PLA
PLAPLA
PLA
 
Encoder & Decoder
Encoder & DecoderEncoder & Decoder
Encoder & Decoder
 
Subtractor
SubtractorSubtractor
Subtractor
 
Binary multipliers
Binary multipliersBinary multipliers
Binary multipliers
 
Decimal adder
Decimal adderDecimal adder
Decimal adder
 
Magnitude comparator
Magnitude comparatorMagnitude comparator
Magnitude comparator
 
Quine Mc Clusky (Tabular) method
Quine Mc Clusky (Tabular) methodQuine Mc Clusky (Tabular) method
Quine Mc Clusky (Tabular) method
 
Time domain definition 6
Time domain definition 6Time domain definition 6
Time domain definition 6
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

Read only memory(rom)

  • 1. READ ONLY MEMORY (ROM) 18-Apr-19 1 Syed Hasan Saeed, Integral University, Lucknow
  • 3. ROM • In ROM Binary information is stored permanently. • Block diagram of ROM (size m x n ) is shown in fig.1, where ‘m’ is the number of locations and ‘n’ is the number of bit words that can stored in each locations. 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 3 2k x n ROM m x n Data Outputs ‘n’Address Inputs (k) Data Outputs ‘n’Address Inputs (k) Fig. 1 Fig. 2 Io I1 Ik-1 . . . . . . ROM O0 O1 O2 ON-1 ‘k’ inputs Address ‘n’ outputs Data
  • 4. ROM • There are ‘k’ number of address lines to access ‘m’ locations. • ‘n’ is the data output lines. This gives the data bits of the stored word selected by the address. • Therefore for implementation of ‘k’ variables and ‘n’ outputs then the size of ROM is represented by 2k x n as shown in fig.2. this will generates all possible 2k minterms. • ROMs are designed only for reading the stored informations. • ROM does not have write operation i.e user cannot write any information. • ROM is used to store fixed information like instructions, look up tables etc. 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 4 k 2m 
  • 5. ROM • ROMs are programmed at the time of manufacturing. • ROMs are costly. • ROMs can be used for the implementation of combinational circuits 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 5
  • 6. EXAMPLE 1 The following memory units are specified by the number of words times the number of bit per word. How many address lines and input-output data lines are required in each case. (i) 4K x 16 (ii) 2G x 8 (iii) 16M x 32 (iv) 256K x 64 Reference: Moris Mano Solution: (i) since, 1K=1024=210 4K=22 x 210= 212 4K x 16 can be written as 212 x 16 Therefore, there are 12 address lines and 16 data lines. Total input-output lines = 12+16=32 (ii) 2G x 8 1 G = 230 2G = 2 x 230 = 231 2G x 8 = 231 * 8 Therefore, there are 31 address lines and 8 data lines. Total input-output lines = 31+8 =39 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 6 No. of Address line
  • 7. (iii) 16M x 32 1 M = 220 16M = 24 x 220 = 224 16M x 32 can be written as 16M x 32 = 224 x 32 Therefore, there are 24 address lines and 32 data lines. Total input-output lines = 24 + 32 = 56 (iv) 256K x 64 Since, 1K=1024 = 210 256K = 28 x 210 = 218 256K x 64 can be written as 218 x 64 Therefore, there are 18 address lines and 64data lines. Total input-output lines = 18 + 64 = 82 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 7 No. of Address line No. of Address line
  • 8. EXAMPLE 2: Give the number of bytes stored in the memories listed in example 1. SOLUTION: (i) 4K x 16 A byte is equivalent to 8 bits. No. of 16 bit words = 4K= 4 * 1024 = 212 = 4096 Memory Size = No. of words * word size = 4096 * 16 bit = 65536 bits (Output is 16 i.e. 2 bytes) Memory size =65536 / 8 = 8192 bytes = 8kB (ii) 2G x 8 A byte is equivalent to 8 bits. No. of 8 bit words = 2G = 2G = 2 x 230 = 231 = 2,147,483,648 Memory Size = No. of words * word size = 2,147,483,648 * 8 bit = 17179869184 bits (Output is 8 i.e. 1 bytes) Memory size = 17179869184 /8 = 2,147,483,648 =2GB 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 8
  • 9. (iii) 16 M x 32 A byte is equivalent to 8 bits. No. of 16 bit words = 24 x 220 = 224 = 16777216 Memory Size = No. of words * word size = 16777216 * 32 bit = 536870912 bits (Output is 32 i.e. 4 bytes) Memory size = 536870912 / 8 = 67108864 bytes = 64 MB Alternate 1: 16M = 224 16 M x 32 = 224 * 4* 8 = 224* 22*8 = 226 *8 No. of Bytes stored = 226 = 67108864 bytes = 64 MB Alternate 2: Memory Size = No. of words * word size = 16 M * 4 B = 64 MB (iv) 256K x 64 256K x 64 Memory Size = No. of words * word size = 256 k * 8B = 2048 kB = 2 MB 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 9 32
  • 10. TYPES OF ROM  Mask Programmed ROM (MROM)  Programmable Read Only Memory (PROM)  Erasable Programmable Read Only Memory (EPROM)  E2PROM 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 10
  • 11. ADVANTAGES OF ROM • Low Cost • High Speed • Flexibility in system designed • ROM is non-volatile memory. 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 11
  • 12. APPLICATIONS OF ROM • It is used for the implementation of combinational circuits. • It is used for the implementation of sequential circuits. • Used for look up tables. • Used for storage purpose of microprocessor program. • It is suitable for the LSI manufacturing process. • Used in function generators. 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 12
  • 13. INTERNAL STRUCTURE OF ROM 18-Apr-19 13 . . . . . 5x32 DECODER A7 A0 A1A2A6 A5 A4 A3 I0 I4 I3 I2 I1 1 2 3 31 30 29 0 8 Data Output . . . . . Each OR gate has 32 inputs Five Inputs 256 interconnections and each interconnection is programmable Fig. 3
  • 14. EXAMPLE: Consider 32 x 8 ROM. • It consists of 32 words of 8 bits each. • To access 32 locations (addresses) there are 5 input lines (m =32, m= 25, k = 5) which forms the binary numbers equivalent to 0 to 31. • Fig.5 shows the internal logic of a ROM. • The five inputs are decoded into 32 different outputs with the help of a 5 x 32 decoder and each output of the decoder represent a memory address. • The 32 outputs of the decoder are connected to each of the eight OR gates. It means that each OR gate having 32 inputs. 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 14
  • 15. • There are 8 OR gates and each OR gate has 32 connections, therefore total internal connections will be 32 x 8 = 256 • In general ‘2k x n’ ROM will have ‘k x 2k’ decoder and ‘n’ OR gates. • Each OR gate has 2k inputs, which are connected to each of the outputs of the decoder. 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 15
  • 16. • All 256 intersections are programmable. • A programmable connection between two lines is equivalent to a switch which is either turned ON or OFF. ON means two lines are connected with each other and OFF means two lines are not connected. • ROM truth table is shown in fig.4 • Truth table shows that there are 5 inputs and 8 outputs. • There are 32 locations (addresses) and each location stored 8 bits word. • ‘0’ in truth table indicates there is no connection and ‘1’ indicates a connection. 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 16
  • 17. TRUTH TABLE: 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 17 Location No. Inputs Outputs I4 I3 I2 I1 I0 A7 A6 A5 A4 A3 A2 A1 A0 0 0 0 0 0 0 1 0 0 1 0 0 1 1 1 0 0 0 0 1 0 0 0 1 1 1 0 1 2 0 0 0 1 0 1 0 1 1 0 0 0 1 3 0 0 0 1 1 1 0 0 0 1 1 1 0 29 1 1 1 0 1 1 0 0 0 1 0 1 0 30 1 1 1 1 0 0 1 1 1 0 0 0 1 31 1 1 1 1 1 0 1 1 0 0 0 1 1 ------ Fig. 4
  • 18. INTERNAL STRUCTURE OF 32 x 8 ROM 18-Apr-19 18 . . . . . 5x32 DECODER A7 A0 A1A2A6 A5 A4 A3 I0 I4 I3 I2 I1 1 2 3 31 30 29 0 8 Data Output . . . . . Each OR gate has 32 inputs Five Inputs 256 interconnections and each interconnection is programmable Fig. 3 0 0 0 0 0 0 0 0 0 0 00 0000 0 0 0 0 0 0 0 0 0 0 000 1 1 1 1 1 1 1 1111 1 1 1 1 111 1 11 1 1 1 1 1
  • 19. THANK YOU 18-Apr-19 Syed Hasan Saeed, Integral University, Lucknow 19