SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Charles Kime & Thomas Kaminski
Š 2008 Pearson Education, Inc.
(Hyperlinks are active in View Show mode)
Chapter 4 – Arithmetic
Functions
Logic and Computer Design Fundamentals
Chapter 4 2
Overview
 Iterative combinational circuits
 Binary adders
• Half and full adders
• Ripple carry and carry lookahead adders
 Binary subtraction
 Binary adder-subtractors
• Signed binary numbers
• Signed binary addition and subtraction
• Overflow
 Binary multiplication
 Other arithmetic functions
• Design by contraction
Chapter 4 3
Iterative Combinational Circuits
 Arithmetic functions
• Operate on binary vectors
• Use the same subfunction in each bit position
 Can design functional block for subfunction
and repeat to obtain functional block for
overall function
 Cell - subfunction block
 Iterative array - a array of interconnected cells
 An iterative array can be in a single dimension
(1D) or multiple dimensions
Chapter 4 4
Block Diagram of a 1D Iterative Array
 Example: n = 32
• Number of inputs = ?
• Truth table rows = ?
• Equations with up to ? input variables
• Equations with huge number of terms
• Design impractical!
 Iterative array takes advantage of the regularity to
make design feasible
Chapter 4 5
Functional Blocks: Addition
 Binary addition used frequently
 Addition Development:
• Half-Adder (HA), a 2-input bit-wise addition
functional block,
• Full-Adder (FA), a 3-input bit-wise addition
functional block,
• Ripple Carry Adder, an iterative array to
perform binary addition, and
• Carry-Look-Ahead Adder (CLA), a
hierarchical structure to improve
performance.
Chapter 4 6
Functional Block: Half-Adder
 A 2-input, 1-bit width binary adder that performs the
following computations:
 A half adder adds two bits to produce a two-bit sum
 The sum is expressed as a
sum bit , S and a carry bit, C
 The half adder can be specified
as a truth table for S and C 
X 0 0 1 1
+ Y + 0 + 1 + 0 + 1
C S 0 0 0 1 0 1 1 0
X Y C S
0 0 0 0
0 1 0 1
1 0 0 1
1 1 1 0
Chapter 4 7
Logic Simplification: Half-Adder
 The K-Map for S, C is:
 This is a pretty trivial map!
By inspection:
 and
 These equations lead to several implementations.
Y
X
0 1
321
1
S Y
X
0 1
32 1
C
)YX()YX(S
YXYXYXS
++=
=+=
)(C
YXC
)YX( =
=
Chapter 4 8
Five Implementations: Half-Adder
 We can derive following sets of equations for a half-
adder:
 (a), (b), and (e) are SOP, POS, and XOR
implementations for S.
 In (c), the C function is used as a term in the AND-
NOR implementation of S, and in (d), the function is
used in a POS term for S.
YXC
)(S)c(
YXC
)YX()YX(S)b(
YXC
YXYXS)a(
YXC
=
=
=
++=
=
+=
+
YXC
YXS)e(
)YX(C
C)YX(S)d(
=
=
+=
+=
C
Chapter 4 9
Implementations: Half-Adder
 The most common half
adder implementation is: (e)
 A NAND only implementation is:
YXC
YXS
=
=
)(C
C)YX(S
)YX( =
+=
X
Y
C
S
X
Y
C
S
Chapter 4 10
Functional Block: Full-Adder
 A full adder is similar to a half adder, but includes a
carry-in bit from lower stages. Like the half-adder, it
computes a sum bit, S and a carry bit, C.
• For a carry-in (Z) of
0, it is the same as
the half-adder:
• For a carry- in
(Z) of 1:
Z 0 0 0 0
X 0 0 1 1
+ Y + 0 + 1 + 0 + 1
C S 0 0 0 1 0 1 1 0
Z 1 1 1 1
X 0 0 1 1
+ Y + 0 + 1 + 0 + 1
C S 0 1 1 0 1 0 1 1
Chapter 4 11
Logic Optimization: Full-Adder
 Full-Adder Truth Table:
 Full-Adder K-Map:
X Y Z C S
0 0 0 0 0
0 0 1 0 1
0 1 0 0 1
0 1 1 1 0
1 0 0 0 1
1 0 1 1 0
1 1 0 1 0
1 1 1 1 1
X
Y
Z
0 1 3 2
4 5 7 6
1
1
1
1
S
X
Y
Z
0 1 3 2
4 5 7 6
1 11
1
C
Chapter 4 12
Equations: Full-Adder
 From the K-Map, we get:
 The S function is the three-bit XOR function (Odd
Function):
 The Carry bit C is 1 if both X and Y are 1 (the sum is
2), or if the sum is 1 and a carry-in (Z) occurs. Thus C
can be re-written as:
 The term X·Y is carry generate.
 The term XY is carry propagate.
ZYZXYXC
ZYXZYXZYXZYXS
++=
+++=
ZYXS =
Z)YX(YXC +=
Chapter 4 13
Implementation: Full Adder
 Full Adder Schematic
 Here X, Y, and Z, and C
(from the previous pages)
are A, B, Ci and Co,
respectively. Also,
G = generate and
P = propagate.
 Note: This is really a combination
of a 3-bit odd function (for S)) and
Carry logic (for Co):
(G = Generate) OR (P =Propagate AND Ci = Carry In)
Co = G + P ¡ Ci
Ai Bi
Ci
Ci+1
Gi
Pi
Si
Chapter 4 14
Binary Adders
 To add multiple operands, we ―bundle‖ logical signals
together into vectors and use functional blocks that
operate on the vectors
 Example: 4-bit ripple carry
adder: Adds input vectors
A(3:0) and B(3:0) to get
a sum vector S(3:0)
 Note: carry out of cell i
becomes carry in of cell
i + 1
Description Subscript
3 2 1 0
Name
Carry In 0 1 1 0 Ci
Augend 1 0 1 1 Ai
Addend 0 0 1 1 Bi
Sum 1 1 1 0 Si
Carry out 0 0 1 1 Ci+1
Chapter 4 15
4-bit Ripple-Carry Binary Adder
 A four-bit Ripple Carry Adder made from four
1-bit Full Adders:
B3 A 3
FA
B2 A 2
FA
B1
S3C4
C0
C3 C2 C1
S2 S1 S0
A 1
FA
B0 A 0
FA
Chapter 4 16
Unsigned Subtraction
 Algorithm:
• Subtract the subtrahend N from the minuend M
• If no end borrow occurs, then M  N, and the result
is a non-negative number and correct.
• If an end borrow occurs, the N > M and the
difference M - N + 2n is subtracted from 2n, and a
minus sign is appended to the result.
 Examples:
0 1
1001 0100
- 0111 - 0111
0010 1101
10000
- 1101
(-) 0011
Chapter 4 17
Unsigned Subtraction (continued)
 The subtraction, 2n - N, is taking the 2’s
complement of N
 To do both unsigned addition and unsigned
subtraction requires:
 Quite complex!
 Goal: Shared simpler
logic for both addition
and subtraction
 Introduce complements
as an approach
A B
Binary adder Binary subtractor
Selective
2's complementer
Quadruple 2-to-1
multiplexer
Result
Borrow
Complement
S
0 1
Subtract/Add
Chapter 4 18
Complements
 Two complements:
• Diminished Radix Complement of N
 (r - 1)’s complement for radix r
 1’s complement for radix 2
 Defined as (rn - 1) - N
• Radix Complement
 r’s complement for radix r
 2’s complement in binary
 Defined as rn - N
 Subtraction is done by adding the complement of
the subtrahend
 If the result is negative, takes its 2’s complement
Chapter 4 19
Binary 1's Complement
 For r = 2, N = 011100112, n = 8 (8 digits):
(rn – 1) = 256 -1 = 25510 or 111111112
 The 1's complement of 011100112 is then:
11111111
– 01110011
10001100
 Since the 2n – 1 factor consists of all 1's and
since 1 – 0 = 1 and 1 – 1 = 0, the one's
complement is obtained by complementing
each individual bit (bitwise NOT).
Chapter 4 20
Binary 2's Complement
 For r = 2, N = 011100112, n = 8 (8 digits),
we have:
(rn ) = 25610 or 1000000002
 The 2's complement of 01110011 is then:
100000000
– 01110011
10001101
 Note the result is the 1's complement plus
1, a fact that can be used in designing
hardware
Chapter 4 21
Alternate 2’s Complement Method
 Given: an n-bit binary number, beginning at the
least significant bit and proceeding upward:
• Copy all least significant 0’s
• Copy the first 1
• Complement all bits thereafter.
 2’s Complement Example:
10010100
• Copy underlined bits:
100
• and complement bits to the left:
01101100
Chapter 4 22
Subtraction with 2’s Complement
 For n-digit, unsigned numbers M and N, find M
- N in base 2:
• Add the 2's complement of the subtrahend N to
the minuend M:
M + (2n - N) = M - N + 2n
• If M  N, the sum produces end carry rn which is
discarded; from above, M - N remains.
• If M < N, the sum does not produce an end carry
and, from above, is equal to 2n - ( N - M ), the 2's
complement of ( N - M ).
• To obtain the result - (N – M) , take the 2's
complement of the sum and place a - to its left.
Chapter 4 23
Unsigned 2’s Complement Subtraction Example 1
 Find 010101002 – 010000112
01010100 01010100
– 01000011 + 10111101
00010001
 The carry of 1 indicates that no
correction of the result is required.
1
2’s comp
Chapter 4 24
Unsigned 2’s Complement Subtraction Example 2
 Find 010000112 – 010101002
01000011 01000011
– 01010100 + 10101100
11101111
00010001
 The carry of 0 indicates that a correction
of the result is required.
 Result = – (00010001)
0
2’s comp
2’s comp
Chapter 4 25
Signed Integers
 Positive numbers and zero can be represented by
unsigned n-digit, radix r numbers. We need a
representation for negative numbers.
 To represent a sign (+ or –) we need exactly one more
bit of information (1 binary digit gives 21 = 2 elements
which is exactly what is needed).
 Since computers use binary numbers, by convention,
the most significant bit is interpreted as a sign bit:
s an–2  a2a1a0
where:
s = 0 for Positive numbers
s = 1 for Negative numbers
and ai = 0 or 1 represent the magnitude in some form.
Chapter 4 26
Signed Integer Representations
Signed-Magnitude – here the n – 1 digits are
interpreted as a positive magnitude.
Signed-Complement – here the digits are
interpreted as the rest of the complement of the
number. There are two possibilities here:
• Signed 1's Complement
 Uses 1's Complement Arithmetic
• Signed 2's Complement
 Uses 2's Complement Arithmetic
Chapter 4 27
Signed Integer Representation Example
 r =2, n=3
Number Sign -Mag. 1's Comp. 2's Comp.
+3 011 011 011
+2 010 010 010
+1 001 001 001
+0 000 000 000
– 0 100 111 —
– 1 101 110 111
– 2 110 101 110
– 3 111 100 101
– 4 — — 100
Chapter 4 28
Signed-Magnitude Arithmetic
 If the parity of the three signs is 0:
1. Add the magnitudes.
2. Check for overflow (a carry out of the MSB)
3. The sign of the result is the same as the sign of the
first operand.
If the parity of the three signs is 1:
1. Subtract the second magnitude from the first.
2. If a borrow occurs:
• take the two’s complement of result
• and make the result sign the complement of the
sign of the first operand.
3. Overflow will never occur.
Chapter 4 29
 Example 1: 0010
+0101
 Example 2: 0010
+1101
 Example 3: 1010
- 0101
Sign-Magnitude Arithmetic Examples
Chapter 4 30
Signed-Complement Arithmetic
 Addition:
1. Add the numbers including the sign bits,
discarding a carry out of the sign bits (2's
Complement), or using an end-around carry (1's
Complement).
2. If the sign bits were the same for both
numbers and the sign of the result is different, an
overflow has occurred.
3. The sign of the result is computed in step 1.
 Subtraction:
Form the complement of the number you are
subtracting and follow the rules for addition.
Chapter 4 31
 Example 1: 1101
+0011
 Example 2: 1101
-0011
Signed 2’s Complement Examples
Chapter 4 32
2’s Complement Adder/Subtractor
 Subtraction can be done by addition of the 2's Complement.
1. Complement each bit (1's Complement.)
2. Add 1 to the result.
 The circuit shown computes A + B and A – B:
 For S = 1, subtract,
the 2’s complement
of B is formed by using
XORs to form the 1’s
comp and adding the 1
applied to C0.
 For S = 0, add, B is
passed through
unchanged
FA FA FA FA
S
B3
C3
S2 S1 S0S3C4
C2 C1 C0
A 3 B2 A 2 B1 A 1 B0 A 0
Chapter 4 33
Overflow Detection
 Overflow occurs if n + 1 bits are required to contain the
result from an n-bit addition or subtraction
 Overflow can occur for:
• Addition of two operands with the same sign
• Subtraction of operands with different signs
 Signed number overflow cases with correct result sign
0 0 1 1
+ 0 - 1 - 0 + 1
0 0 1 1
 Detection can be performed by examining the result
signs which should match the signs of the top operand
Chapter 4 34
Overflow Detection
 Signed number cases with carries Cn and Cn-1 shown for correct
result signs:
0 0 0 0 1 1 1 1
0 0 1 1
+ 0 -1 -0 +1
0 0 1 1
 Signed number cases with carries shown for erroneous result signs
(indicating overflow):
0 1 0 1 1 0 1 0
0 0 1 1
+ 0 - 1 -0 + 1
1 1 0 0
 Simplest way to implement overflow V = Cn + Cn - 1
 This works correctly only if 1’s complement and the addition of the
carry in of 1 is used to implement the complementation! Otherwise
fails for - 10 ... 0

Weitere ähnliche Inhalte

Was ist angesagt?

Design half ,full Adder and Subtractor
Design half ,full Adder and SubtractorDesign half ,full Adder and Subtractor
Design half ,full Adder and SubtractorJaimin@prt.ltd.
 
Half adder & full adder
Half adder & full adderHalf adder & full adder
Half adder & full adderGaditek
 
Half Adder and Full Adder
Half Adder and Full AdderHalf Adder and Full Adder
Half Adder and Full AdderShayshab Azad
 
What is Adder-Half and Full Adder
What is Adder-Half and Full AdderWhat is Adder-Half and Full Adder
What is Adder-Half and Full AdderAdeel Rasheed
 
Half subtracter
Half subtracterHalf subtracter
Half subtracterawais ahmad
 
Half Subtractor : Combiational Circuit
Half Subtractor : Combiational CircuitHalf Subtractor : Combiational Circuit
Half Subtractor : Combiational CircuitDoCircuits
 
adder and subtractor
 adder and subtractor adder and subtractor
adder and subtractorUnsa Shakir
 
Computer architecture
Computer architectureComputer architecture
Computer architectureSanjeev Patel
 
Adder Presentation
Adder PresentationAdder Presentation
Adder PresentationMoeez Ahmad
 
Subtractor (1)
Subtractor (1)Subtractor (1)
Subtractor (1)Self-employed
 
1.ripple carry adder, full adder implementation using half adder.
1.ripple carry adder, full adder implementation using half adder.1.ripple carry adder, full adder implementation using half adder.
1.ripple carry adder, full adder implementation using half adder.MdFazleRabbi18
 
Half adder and full adder
Half adder and full adderHalf adder and full adder
Half adder and full adderSanjuktaBanik
 
Adder & subtractor (Half adder, Full adder, Half subtractor, Full subtractor)
Adder & subtractor (Half adder, Full adder, Half subtractor, Full subtractor)Adder & subtractor (Half adder, Full adder, Half subtractor, Full subtractor)
Adder & subtractor (Half adder, Full adder, Half subtractor, Full subtractor)ISMT College
 
Half Adder_Digital logic_
Half Adder_Digital logic_Half Adder_Digital logic_
Half Adder_Digital logic_Rabin BK
 
Half Adder - Combinational Circuit
Half Adder - Combinational CircuitHalf Adder - Combinational Circuit
Half Adder - Combinational CircuitDoCircuits
 
Half adder and full adder | Digital electronics | engineering
Half adder  and full adder | Digital electronics | engineeringHalf adder  and full adder | Digital electronics | engineering
Half adder and full adder | Digital electronics | engineeringNITESH POONIA
 
Parallel Adder and Subtractor
Parallel Adder and SubtractorParallel Adder and Subtractor
Parallel Adder and SubtractorSmit Shah
 

Was ist angesagt? (20)

Design half ,full Adder and Subtractor
Design half ,full Adder and SubtractorDesign half ,full Adder and Subtractor
Design half ,full Adder and Subtractor
 
Half adder & full adder
Half adder & full adderHalf adder & full adder
Half adder & full adder
 
Half Adder and Full Adder
Half Adder and Full AdderHalf Adder and Full Adder
Half Adder and Full Adder
 
What is Adder-Half and Full Adder
What is Adder-Half and Full AdderWhat is Adder-Half and Full Adder
What is Adder-Half and Full Adder
 
Half subtracter
Half subtracterHalf subtracter
Half subtracter
 
Half Subtractor : Combiational Circuit
Half Subtractor : Combiational CircuitHalf Subtractor : Combiational Circuit
Half Subtractor : Combiational Circuit
 
adder and subtractor
 adder and subtractor adder and subtractor
adder and subtractor
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Adder Presentation
Adder PresentationAdder Presentation
Adder Presentation
 
Subtractor (1)
Subtractor (1)Subtractor (1)
Subtractor (1)
 
1.ripple carry adder, full adder implementation using half adder.
1.ripple carry adder, full adder implementation using half adder.1.ripple carry adder, full adder implementation using half adder.
1.ripple carry adder, full adder implementation using half adder.
 
Half adder and full adder
Half adder and full adderHalf adder and full adder
Half adder and full adder
 
Adder & subtractor (Half adder, Full adder, Half subtractor, Full subtractor)
Adder & subtractor (Half adder, Full adder, Half subtractor, Full subtractor)Adder & subtractor (Half adder, Full adder, Half subtractor, Full subtractor)
Adder & subtractor (Half adder, Full adder, Half subtractor, Full subtractor)
 
Half adder and full adder
Half adder and full adderHalf adder and full adder
Half adder and full adder
 
Half Adder_Digital logic_
Half Adder_Digital logic_Half Adder_Digital logic_
Half Adder_Digital logic_
 
Half Adder - Combinational Circuit
Half Adder - Combinational CircuitHalf Adder - Combinational Circuit
Half Adder - Combinational Circuit
 
Half adder layout design
Half adder layout designHalf adder layout design
Half adder layout design
 
Half adder and full adder | Digital electronics | engineering
Half adder  and full adder | Digital electronics | engineeringHalf adder  and full adder | Digital electronics | engineering
Half adder and full adder | Digital electronics | engineering
 
Adder ppt
Adder pptAdder ppt
Adder ppt
 
Parallel Adder and Subtractor
Parallel Adder and SubtractorParallel Adder and Subtractor
Parallel Adder and Subtractor
 

Andere mochten auch

4 bit binary full subtractor
4 bit binary full subtractor4 bit binary full subtractor
4 bit binary full subtractorPathurOzie Wafferz
 
IS 139 Lecture 4
IS 139 Lecture 4IS 139 Lecture 4
IS 139 Lecture 4wajanga
 
Verilog Lecture2 thhts
Verilog Lecture2 thhtsVerilog Lecture2 thhts
Verilog Lecture2 thhtsBĂŠo TĂş
 
Logic microoperations
Logic microoperationsLogic microoperations
Logic microoperationsNitesh Singh
 
Logical and shift micro operations
Logical and shift micro operationsLogical and shift micro operations
Logical and shift micro operationsSanjeev Patel
 
Register transfer and micro-operation
Register transfer and micro-operationRegister transfer and micro-operation
Register transfer and micro-operationNikhil Pandit
 
Register transfer and micro operation
Register transfer and micro operationRegister transfer and micro operation
Register transfer and micro operationKamal Acharya
 

Andere mochten auch (10)

4 bit add sub
4 bit add sub4 bit add sub
4 bit add sub
 
4 bit binary full subtractor
4 bit binary full subtractor4 bit binary full subtractor
4 bit binary full subtractor
 
IS 139 Lecture 4
IS 139 Lecture 4IS 139 Lecture 4
IS 139 Lecture 4
 
Verilog Lecture2 thhts
Verilog Lecture2 thhtsVerilog Lecture2 thhts
Verilog Lecture2 thhts
 
Logic microoperations
Logic microoperationsLogic microoperations
Logic microoperations
 
Logical and shift micro operations
Logical and shift micro operationsLogical and shift micro operations
Logical and shift micro operations
 
Register transfer and micro-operation
Register transfer and micro-operationRegister transfer and micro-operation
Register transfer and micro-operation
 
Register transfer and micro operation
Register transfer and micro operationRegister transfer and micro operation
Register transfer and micro operation
 
Logic Gates
Logic GatesLogic Gates
Logic Gates
 
Encoder and decoder
Encoder and decoderEncoder and decoder
Encoder and decoder
 

Ähnlich wie Lec20

105_2_digitalSystem_Chap_3_part_3.ppt
105_2_digitalSystem_Chap_3_part_3.ppt105_2_digitalSystem_Chap_3_part_3.ppt
105_2_digitalSystem_Chap_3_part_3.pptJeanie Delos Arcos
 
digital systems and information
digital systems and informationdigital systems and information
digital systems and informationKamran Zafar
 
100_2_digitalSystem_Chap1 (2).ppt
100_2_digitalSystem_Chap1 (2).ppt100_2_digitalSystem_Chap1 (2).ppt
100_2_digitalSystem_Chap1 (2).pptnamraashraf56
 
Computer organization and architecture lab manual
Computer organization and architecture lab manual Computer organization and architecture lab manual
Computer organization and architecture lab manual Shankar Gangaju
 
Comp Arithmetic Basic.ppt
Comp Arithmetic Basic.pptComp Arithmetic Basic.ppt
Comp Arithmetic Basic.pptskatiarrahaman
 
Chapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbersChapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbersMohammad Bashartullah
 
Mba admission in india
Mba admission in indiaMba admission in india
Mba admission in indiaEdhole.com
 
chapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptx
chapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptxchapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptx
chapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptxSurendra Loya
 
cs 3351 dpco
cs 3351 dpcocs 3351 dpco
cs 3351 dpcoudhayaveenaa
 
LCDF3_Chap_01x.pptx
LCDF3_Chap_01x.pptxLCDF3_Chap_01x.pptx
LCDF3_Chap_01x.pptxDaniyalMunir1
 
Number system
Number systemNumber system
Number systemMantra VLSI
 
B sc cs i bo-de u-i number system
B sc cs i bo-de u-i number systemB sc cs i bo-de u-i number system
B sc cs i bo-de u-i number systemRai University
 
Logic System Design KTU Chapter-4.ppt
Logic System Design KTU Chapter-4.pptLogic System Design KTU Chapter-4.ppt
Logic System Design KTU Chapter-4.pptAlbin562191
 
COMPUTER ORGANIZATION NOTES Unit 6
COMPUTER ORGANIZATION NOTES Unit 6COMPUTER ORGANIZATION NOTES Unit 6
COMPUTER ORGANIZATION NOTES Unit 6Dr.MAYA NAYAK
 
Mba admission in india
Mba admission in indiaMba admission in india
Mba admission in indiaEdhole.com
 
Computer arithmetic
Computer arithmeticComputer arithmetic
Computer arithmeticUsiju Gadzama
 
combinational-circuit (1).ppt
combinational-circuit (1).pptcombinational-circuit (1).ppt
combinational-circuit (1).pptKrishnavenimanickam2
 
Module 4_Digital Electronics till complements.pdf
Module 4_Digital Electronics till complements.pdfModule 4_Digital Electronics till complements.pdf
Module 4_Digital Electronics till complements.pdfmanjunath V Gudur
 

Ähnlich wie Lec20 (20)

105_2_digitalSystem_Chap_3_part_3.ppt
105_2_digitalSystem_Chap_3_part_3.ppt105_2_digitalSystem_Chap_3_part_3.ppt
105_2_digitalSystem_Chap_3_part_3.ppt
 
digital systems and information
digital systems and informationdigital systems and information
digital systems and information
 
100_2_digitalSystem_Chap1 (2).ppt
100_2_digitalSystem_Chap1 (2).ppt100_2_digitalSystem_Chap1 (2).ppt
100_2_digitalSystem_Chap1 (2).ppt
 
Computer organization and architecture lab manual
Computer organization and architecture lab manual Computer organization and architecture lab manual
Computer organization and architecture lab manual
 
Comp Arithmetic Basic.ppt
Comp Arithmetic Basic.pptComp Arithmetic Basic.ppt
Comp Arithmetic Basic.ppt
 
Chapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbersChapter 1 digital systems and binary numbers
Chapter 1 digital systems and binary numbers
 
Mba admission in india
Mba admission in indiaMba admission in india
Mba admission in india
 
Lecture_5-2.ppt
Lecture_5-2.pptLecture_5-2.ppt
Lecture_5-2.ppt
 
chapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptx
chapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptxchapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptx
chapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptx
 
cs 3351 dpco
cs 3351 dpcocs 3351 dpco
cs 3351 dpco
 
Module 4
Module 4Module 4
Module 4
 
LCDF3_Chap_01x.pptx
LCDF3_Chap_01x.pptxLCDF3_Chap_01x.pptx
LCDF3_Chap_01x.pptx
 
Number system
Number systemNumber system
Number system
 
B sc cs i bo-de u-i number system
B sc cs i bo-de u-i number systemB sc cs i bo-de u-i number system
B sc cs i bo-de u-i number system
 
Logic System Design KTU Chapter-4.ppt
Logic System Design KTU Chapter-4.pptLogic System Design KTU Chapter-4.ppt
Logic System Design KTU Chapter-4.ppt
 
COMPUTER ORGANIZATION NOTES Unit 6
COMPUTER ORGANIZATION NOTES Unit 6COMPUTER ORGANIZATION NOTES Unit 6
COMPUTER ORGANIZATION NOTES Unit 6
 
Mba admission in india
Mba admission in indiaMba admission in india
Mba admission in india
 
Computer arithmetic
Computer arithmeticComputer arithmetic
Computer arithmetic
 
combinational-circuit (1).ppt
combinational-circuit (1).pptcombinational-circuit (1).ppt
combinational-circuit (1).ppt
 
Module 4_Digital Electronics till complements.pdf
Module 4_Digital Electronics till complements.pdfModule 4_Digital Electronics till complements.pdf
Module 4_Digital Electronics till complements.pdf
 

Mehr von Zain Ul Abedeen

Priprincipl telecommunications and networks es learning objectivesnciples lea...
Priprincipl telecommunications and networks es learning objectivesnciples lea...Priprincipl telecommunications and networks es learning objectivesnciples lea...
Priprincipl telecommunications and networks es learning objectivesnciples lea...Zain Ul Abedeen
 
Priprincipl telecommunications and networks es learning objectivesnciples lea...
Priprincipl telecommunications and networks es learning objectivesnciples lea...Priprincipl telecommunications and networks es learning objectivesnciples lea...
Priprincipl telecommunications and networks es learning objectivesnciples lea...Zain Ul Abedeen
 
Why learn about the internet 7
Why learn about the internet 7Why learn about the internet 7
Why learn about the internet 7Zain Ul Abedeen
 
Why learn about the internet 7
Why learn about the internet 7Why learn about the internet 7
Why learn about the internet 7Zain Ul Abedeen
 

Mehr von Zain Ul Abedeen (7)

Priprincipl telecommunications and networks es learning objectivesnciples lea...
Priprincipl telecommunications and networks es learning objectivesnciples lea...Priprincipl telecommunications and networks es learning objectivesnciples lea...
Priprincipl telecommunications and networks es learning objectivesnciples lea...
 
Priprincipl telecommunications and networks es learning objectivesnciples lea...
Priprincipl telecommunications and networks es learning objectivesnciples lea...Priprincipl telecommunications and networks es learning objectivesnciples lea...
Priprincipl telecommunications and networks es learning objectivesnciples lea...
 
Why learn about the internet 7
Why learn about the internet 7Why learn about the internet 7
Why learn about the internet 7
 
Why learn about the internet 7
Why learn about the internet 7Why learn about the internet 7
Why learn about the internet 7
 
Lec 25 26_27
Lec 25 26_27Lec 25 26_27
Lec 25 26_27
 
Dld
DldDld
Dld
 
Sequential
SequentialSequential
Sequential
 

KĂźrzlich hochgeladen

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

KĂźrzlich hochgeladen (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Lec20

  • 1. Charles Kime & Thomas Kaminski Š 2008 Pearson Education, Inc. (Hyperlinks are active in View Show mode) Chapter 4 – Arithmetic Functions Logic and Computer Design Fundamentals
  • 2. Chapter 4 2 Overview  Iterative combinational circuits  Binary adders • Half and full adders • Ripple carry and carry lookahead adders  Binary subtraction  Binary adder-subtractors • Signed binary numbers • Signed binary addition and subtraction • Overflow  Binary multiplication  Other arithmetic functions • Design by contraction
  • 3. Chapter 4 3 Iterative Combinational Circuits  Arithmetic functions • Operate on binary vectors • Use the same subfunction in each bit position  Can design functional block for subfunction and repeat to obtain functional block for overall function  Cell - subfunction block  Iterative array - a array of interconnected cells  An iterative array can be in a single dimension (1D) or multiple dimensions
  • 4. Chapter 4 4 Block Diagram of a 1D Iterative Array  Example: n = 32 • Number of inputs = ? • Truth table rows = ? • Equations with up to ? input variables • Equations with huge number of terms • Design impractical!  Iterative array takes advantage of the regularity to make design feasible
  • 5. Chapter 4 5 Functional Blocks: Addition  Binary addition used frequently  Addition Development: • Half-Adder (HA), a 2-input bit-wise addition functional block, • Full-Adder (FA), a 3-input bit-wise addition functional block, • Ripple Carry Adder, an iterative array to perform binary addition, and • Carry-Look-Ahead Adder (CLA), a hierarchical structure to improve performance.
  • 6. Chapter 4 6 Functional Block: Half-Adder  A 2-input, 1-bit width binary adder that performs the following computations:  A half adder adds two bits to produce a two-bit sum  The sum is expressed as a sum bit , S and a carry bit, C  The half adder can be specified as a truth table for S and C  X 0 0 1 1 + Y + 0 + 1 + 0 + 1 C S 0 0 0 1 0 1 1 0 X Y C S 0 0 0 0 0 1 0 1 1 0 0 1 1 1 1 0
  • 7. Chapter 4 7 Logic Simplification: Half-Adder  The K-Map for S, C is:  This is a pretty trivial map! By inspection:  and  These equations lead to several implementations. Y X 0 1 321 1 S Y X 0 1 32 1 C )YX()YX(S YXYXYXS ++= =+= )(C YXC )YX( = =
  • 8. Chapter 4 8 Five Implementations: Half-Adder  We can derive following sets of equations for a half- adder:  (a), (b), and (e) are SOP, POS, and XOR implementations for S.  In (c), the C function is used as a term in the AND- NOR implementation of S, and in (d), the function is used in a POS term for S. YXC )(S)c( YXC )YX()YX(S)b( YXC YXYXS)a( YXC = = = ++= = += + YXC YXS)e( )YX(C C)YX(S)d( = = += += C
  • 9. Chapter 4 9 Implementations: Half-Adder  The most common half adder implementation is: (e)  A NAND only implementation is: YXC YXS = = )(C C)YX(S )YX( = += X Y C S X Y C S
  • 10. Chapter 4 10 Functional Block: Full-Adder  A full adder is similar to a half adder, but includes a carry-in bit from lower stages. Like the half-adder, it computes a sum bit, S and a carry bit, C. • For a carry-in (Z) of 0, it is the same as the half-adder: • For a carry- in (Z) of 1: Z 0 0 0 0 X 0 0 1 1 + Y + 0 + 1 + 0 + 1 C S 0 0 0 1 0 1 1 0 Z 1 1 1 1 X 0 0 1 1 + Y + 0 + 1 + 0 + 1 C S 0 1 1 0 1 0 1 1
  • 11. Chapter 4 11 Logic Optimization: Full-Adder  Full-Adder Truth Table:  Full-Adder K-Map: X Y Z C S 0 0 0 0 0 0 0 1 0 1 0 1 0 0 1 0 1 1 1 0 1 0 0 0 1 1 0 1 1 0 1 1 0 1 0 1 1 1 1 1 X Y Z 0 1 3 2 4 5 7 6 1 1 1 1 S X Y Z 0 1 3 2 4 5 7 6 1 11 1 C
  • 12. Chapter 4 12 Equations: Full-Adder  From the K-Map, we get:  The S function is the three-bit XOR function (Odd Function):  The Carry bit C is 1 if both X and Y are 1 (the sum is 2), or if the sum is 1 and a carry-in (Z) occurs. Thus C can be re-written as:  The term X¡Y is carry generate.  The term XY is carry propagate. ZYZXYXC ZYXZYXZYXZYXS ++= +++= ZYXS = Z)YX(YXC +=
  • 13. Chapter 4 13 Implementation: Full Adder  Full Adder Schematic  Here X, Y, and Z, and C (from the previous pages) are A, B, Ci and Co, respectively. Also, G = generate and P = propagate.  Note: This is really a combination of a 3-bit odd function (for S)) and Carry logic (for Co): (G = Generate) OR (P =Propagate AND Ci = Carry In) Co = G + P ¡ Ci Ai Bi Ci Ci+1 Gi Pi Si
  • 14. Chapter 4 14 Binary Adders  To add multiple operands, we ―bundle‖ logical signals together into vectors and use functional blocks that operate on the vectors  Example: 4-bit ripple carry adder: Adds input vectors A(3:0) and B(3:0) to get a sum vector S(3:0)  Note: carry out of cell i becomes carry in of cell i + 1 Description Subscript 3 2 1 0 Name Carry In 0 1 1 0 Ci Augend 1 0 1 1 Ai Addend 0 0 1 1 Bi Sum 1 1 1 0 Si Carry out 0 0 1 1 Ci+1
  • 15. Chapter 4 15 4-bit Ripple-Carry Binary Adder  A four-bit Ripple Carry Adder made from four 1-bit Full Adders: B3 A 3 FA B2 A 2 FA B1 S3C4 C0 C3 C2 C1 S2 S1 S0 A 1 FA B0 A 0 FA
  • 16. Chapter 4 16 Unsigned Subtraction  Algorithm: • Subtract the subtrahend N from the minuend M • If no end borrow occurs, then M  N, and the result is a non-negative number and correct. • If an end borrow occurs, the N > M and the difference M - N + 2n is subtracted from 2n, and a minus sign is appended to the result.  Examples: 0 1 1001 0100 - 0111 - 0111 0010 1101 10000 - 1101 (-) 0011
  • 17. Chapter 4 17 Unsigned Subtraction (continued)  The subtraction, 2n - N, is taking the 2’s complement of N  To do both unsigned addition and unsigned subtraction requires:  Quite complex!  Goal: Shared simpler logic for both addition and subtraction  Introduce complements as an approach A B Binary adder Binary subtractor Selective 2's complementer Quadruple 2-to-1 multiplexer Result Borrow Complement S 0 1 Subtract/Add
  • 18. Chapter 4 18 Complements  Two complements: • Diminished Radix Complement of N  (r - 1)’s complement for radix r  1’s complement for radix 2  Defined as (rn - 1) - N • Radix Complement  r’s complement for radix r  2’s complement in binary  Defined as rn - N  Subtraction is done by adding the complement of the subtrahend  If the result is negative, takes its 2’s complement
  • 19. Chapter 4 19 Binary 1's Complement  For r = 2, N = 011100112, n = 8 (8 digits): (rn – 1) = 256 -1 = 25510 or 111111112  The 1's complement of 011100112 is then: 11111111 – 01110011 10001100  Since the 2n – 1 factor consists of all 1's and since 1 – 0 = 1 and 1 – 1 = 0, the one's complement is obtained by complementing each individual bit (bitwise NOT).
  • 20. Chapter 4 20 Binary 2's Complement  For r = 2, N = 011100112, n = 8 (8 digits), we have: (rn ) = 25610 or 1000000002  The 2's complement of 01110011 is then: 100000000 – 01110011 10001101  Note the result is the 1's complement plus 1, a fact that can be used in designing hardware
  • 21. Chapter 4 21 Alternate 2’s Complement Method  Given: an n-bit binary number, beginning at the least significant bit and proceeding upward: • Copy all least significant 0’s • Copy the first 1 • Complement all bits thereafter.  2’s Complement Example: 10010100 • Copy underlined bits: 100 • and complement bits to the left: 01101100
  • 22. Chapter 4 22 Subtraction with 2’s Complement  For n-digit, unsigned numbers M and N, find M - N in base 2: • Add the 2's complement of the subtrahend N to the minuend M: M + (2n - N) = M - N + 2n • If M  N, the sum produces end carry rn which is discarded; from above, M - N remains. • If M < N, the sum does not produce an end carry and, from above, is equal to 2n - ( N - M ), the 2's complement of ( N - M ). • To obtain the result - (N – M) , take the 2's complement of the sum and place a - to its left.
  • 23. Chapter 4 23 Unsigned 2’s Complement Subtraction Example 1  Find 010101002 – 010000112 01010100 01010100 – 01000011 + 10111101 00010001  The carry of 1 indicates that no correction of the result is required. 1 2’s comp
  • 24. Chapter 4 24 Unsigned 2’s Complement Subtraction Example 2  Find 010000112 – 010101002 01000011 01000011 – 01010100 + 10101100 11101111 00010001  The carry of 0 indicates that a correction of the result is required.  Result = – (00010001) 0 2’s comp 2’s comp
  • 25. Chapter 4 25 Signed Integers  Positive numbers and zero can be represented by unsigned n-digit, radix r numbers. We need a representation for negative numbers.  To represent a sign (+ or –) we need exactly one more bit of information (1 binary digit gives 21 = 2 elements which is exactly what is needed).  Since computers use binary numbers, by convention, the most significant bit is interpreted as a sign bit: s an–2  a2a1a0 where: s = 0 for Positive numbers s = 1 for Negative numbers and ai = 0 or 1 represent the magnitude in some form.
  • 26. Chapter 4 26 Signed Integer Representations Signed-Magnitude – here the n – 1 digits are interpreted as a positive magnitude. Signed-Complement – here the digits are interpreted as the rest of the complement of the number. There are two possibilities here: • Signed 1's Complement  Uses 1's Complement Arithmetic • Signed 2's Complement  Uses 2's Complement Arithmetic
  • 27. Chapter 4 27 Signed Integer Representation Example  r =2, n=3 Number Sign -Mag. 1's Comp. 2's Comp. +3 011 011 011 +2 010 010 010 +1 001 001 001 +0 000 000 000 – 0 100 111 — – 1 101 110 111 – 2 110 101 110 – 3 111 100 101 – 4 — — 100
  • 28. Chapter 4 28 Signed-Magnitude Arithmetic  If the parity of the three signs is 0: 1. Add the magnitudes. 2. Check for overflow (a carry out of the MSB) 3. The sign of the result is the same as the sign of the first operand. If the parity of the three signs is 1: 1. Subtract the second magnitude from the first. 2. If a borrow occurs: • take the two’s complement of result • and make the result sign the complement of the sign of the first operand. 3. Overflow will never occur.
  • 29. Chapter 4 29  Example 1: 0010 +0101  Example 2: 0010 +1101  Example 3: 1010 - 0101 Sign-Magnitude Arithmetic Examples
  • 30. Chapter 4 30 Signed-Complement Arithmetic  Addition: 1. Add the numbers including the sign bits, discarding a carry out of the sign bits (2's Complement), or using an end-around carry (1's Complement). 2. If the sign bits were the same for both numbers and the sign of the result is different, an overflow has occurred. 3. The sign of the result is computed in step 1.  Subtraction: Form the complement of the number you are subtracting and follow the rules for addition.
  • 31. Chapter 4 31  Example 1: 1101 +0011  Example 2: 1101 -0011 Signed 2’s Complement Examples
  • 32. Chapter 4 32 2’s Complement Adder/Subtractor  Subtraction can be done by addition of the 2's Complement. 1. Complement each bit (1's Complement.) 2. Add 1 to the result.  The circuit shown computes A + B and A – B:  For S = 1, subtract, the 2’s complement of B is formed by using XORs to form the 1’s comp and adding the 1 applied to C0.  For S = 0, add, B is passed through unchanged FA FA FA FA S B3 C3 S2 S1 S0S3C4 C2 C1 C0 A 3 B2 A 2 B1 A 1 B0 A 0
  • 33. Chapter 4 33 Overflow Detection  Overflow occurs if n + 1 bits are required to contain the result from an n-bit addition or subtraction  Overflow can occur for: • Addition of two operands with the same sign • Subtraction of operands with different signs  Signed number overflow cases with correct result sign 0 0 1 1 + 0 - 1 - 0 + 1 0 0 1 1  Detection can be performed by examining the result signs which should match the signs of the top operand
  • 34. Chapter 4 34 Overflow Detection  Signed number cases with carries Cn and Cn-1 shown for correct result signs: 0 0 0 0 1 1 1 1 0 0 1 1 + 0 -1 -0 +1 0 0 1 1  Signed number cases with carries shown for erroneous result signs (indicating overflow): 0 1 0 1 1 0 1 0 0 0 1 1 + 0 - 1 -0 + 1 1 1 0 0  Simplest way to implement overflow V = Cn + Cn - 1  This works correctly only if 1’s complement and the addition of the carry in of 1 is used to implement the complementation! Otherwise fails for - 10 ... 0