Usually any logic circuit has 2 states, i.e., in binary form (0 and 1). The buffer exhibits three states. It has 3 pins which include:
Input – accepts 1 or 0 (0 – disable and 1 – enable)
Output – if 3-state control is 0 then output follows input(according to the input 0 and 1).
A three state bus buffer is an integrated circuit that connects multiple data sources to a single bus. The open drivers can be selected to be either a logical high, a logical low, or high impedance which allows other buffers to drive the bus.
Now, let’s see the more detailed analysis of a 3-state bus buffer in points:
- As in a conventional gate, 1 and 0 are two states.
- Third state is a high impedance state.
- The third state behaves like an open circuit.
- If the output is not connected, than there is no logical significance.
- It may perform ant type of conventional logic operations such as AND, OR, NAND, etc.
Difference between normal buffer and three-state buffer:
It contains both normal input and control input. Here, the output state is determined by the control input.
- When the control input is 1, the output is enabled and the gate will behave like conventional buffer.
- When the control input is 0, the output is disabled and the gate will be in high impedance state.
- To form a single bus line, all the outputs of the 4 buffers are connected together.
- The control input will now decide which of the 4 normal inputs will communicate with the bus line.
- The decoder is used to ensure that only one control input is active at a time.
- The diagram of a 3-state buffer can be seen as below.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Difference between Single Bus Structure and Double Bus Structure
- Bus organization of 8085 microprocessor
- BUS Arbitration in Computer Organization
- Token Bus (IEEE 802.4)
- System Bus Design
- Common Bus System
- Common Bus System using multiplexers
- Bus Cycles of 8086 Microprocessor
- Minimum removal of subsequences of distinct consecutive characters required to empty a given string
- 14 Most Common Network Protocols And Their Vulnerabilities
- Types of Attacks on PoW (Proof of Work) based systems
- Rational Numbers
- How to Temporarily Stop a Thread in Java?
- SSL Subject Alternative Names
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.