Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

OBJECTIVE:
Learn how a seven-segment display can be used.  In this lab, you will be writing a program that will keep a count, and then output that count to a seven-segment display.

MATERIAL:

- AVR Studio4
- AT90USB1286 Trainer
- LED seven-segment display

BACKGROUND:

A seven-segment display is used to display numbers from zero to nine in an easy-to-read decimal format so that the majority of people do not need to know binary. It is made of seven

LEDs, each labeled with an alphabetic letter, like A, B, C, etc. The LEDs are arranged as is shown below:

In order to display a one, for ex, you would set the B and C pins high, since that would light up the B and C LEDs.
Since BCD only goes from zero to nine, it is perfectly adapted to being used to display decimal digits. This also means one digit can fit into four bits, allowing two digits to be “packed” into one byte. In the second part of this lab, you will use this fact to count from 0-99 as opposed to only counting from zero to nine.

ACTIVITY 1:

1. Start up AVR Studio, and begin a new project named lastname_lab5.  The debug platform and microcontroller are still the same, the AVR Simulator and AT90USB1286.

2. Read the datasheet for the seven-segment display, located here:
http://optoelectronics.liteon.com/enus/api/DwonloadFileHandler.ashx?txtSpecNo=DS30-2002-146&txtPartNo=LSHD-5503.
The data lines for the microcontroller are on port A.

3. Using what you have learned from the data sheet, figure out which lines need to be high for each number to be displayed, and construct a table in your lab notebook.

4. Use the table you've created to prepare a program that will count up from zero to nine, and display that number to the rightmost seven-segment display.

5. Now, extend what you’ve learned to implement a packed BCD counter that counts from zero to 99. The two seven-segment displays use the same data lines, but the left one is toggled by a transistor that is connected to pin D7, so by sending a low on pin D7, the rightmost display is active, and if pin D7 is high, then the leftmost display is active.

Hint: Use the list of AVR assembly instructions located below to check out possible instructions to use in order to make the packed BCD display work:
http://www.atmel.com/dyn/resources/prod_documents/doc0856.pdf

ACTIVITY 2:
prepare a program that find outs (PORTA + 4) * PORTB and sends out the result through PORTC and PORTD. Consider all the values unsigned.  Trace (single step) through your program using AVR Studio4.

ACTIVITY 3:

prepare a program to find out the result of (PORTA + PORTB)/2 and sends out the result through PORTC. Consider all the values unsigned. Trace through your program using AVR
Studio4.

ACTIVITY 4:

prepare a program that find outs (PORTA + 4) * PORTB and sends out the result through PORTC and PORTD. Consider all the values signed. Trace through your program using AVR Studio4.In your report,

1.  Identify the most important lessons of this lab exercise.
2.  Report any activity that gave you difficulty. 
3.  Formulate and document a plan for improving your understanding of

a) Packed and unpacked BCD
b) AVR unsigned arithmetic instructions
c) AVR signed arithmetic instructions

4.  Answer the following problems.

a) Find the value in R0 and R1 after the following code.

LDI  R16, 10
LDI  R17, 20
LDI  R18, 30
MUL R16, R17
ADD R0, R18
R0 = in hex
R1 = in hex

b) Find the value in R0 and R1 after the following code.

LDI  R19, 19
SUBI R19, 10
LDI R30, 30
MUL R30, R19
R0 = in hex
R1 = in hex

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91259

Have any Question? 


Related Questions in Computer Engineering

1 what general attributes do organizations seek in

1. What general attributes do organizations seek in candidates when hiring information security professionals across all positions? Prioritize the list and justify your ranking. 2. What are the critical considerations wh ...

1 discuss a good security auditing system2 compare or

1. Discuss a good security auditing system. 2. Compare or discuss the differences between any two security systems. 3. Discuss human error or human factors as a major security threat. 4. What is the best way to deal with ...

1 how many 16-byte cache blocks are needed to store all

1. How many 16-byte cache blocks are needed to store all 32-bit matrix elements being referenced? 2. References to which variables exhibit temporal locality? 3. References to which variables exhibit spatial locality? 4. ...

1 what is the difference between a console application and

1. What is the difference between a console application and a graphical application? 2. Who calls the paintComponent method of a component? When does the call to the paintComponent method occur? 3. Why does the parameter ...

Assignment1 cloud applications are run on some web

Assignment 1. Cloud Applications are run on some web application server in the internet. 2. Multithreading computer Architectures implement the CPU in such a way that more than one instruction can be performed (completed ...

1 run the binary search method on a set of unordered data

1. Run the binary search method on a set of unordered data. What happens? 2. Using the CArray class with the SeqSearch method and the BinSearch method, create an array of 1,000 random integers. Add a new private Integer ...

A polygon is a closed geometric shape consisting of three

A polygon is a closed geometric shape consisting of three or more line segments that are connected end to end. The endpoints of the line segments are known as vertices, which can be defined by points in the two-dimension ...

1 identify the five components of a data communications

1. Identify the five components of a data communications system. 2. What are the three criteria necessary for an effective and efficient network? 3. What are the advantages of a multipoint connection over a point-to-poin ...

1 discuss the differences between a firewall and a packet

1. Discuss the differences between a firewall and a packet filter. 2. Give reasons why firewalls do not give total security. 3. Discuss the advantages of using an application-level firewall over a network level firewall. ...

1 write a program to find the sum of the first n natural

1. Write a program to find the sum of the first n natural numbers, where the value of n is provided by the user. 2. Write a program to find the sum of the cubes of the first n natural numbers where the value of n is prov ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen