欢迎访问ic37.com |
会员登录 免费注册
发布采购

TSC87C52-25IBD 参数 Datasheet PDF下载

TSC87C52-25IBD图片预览
型号: TSC87C52-25IBD
PDF下载: 下载PDF文件 查看货源
内容描述: CMOS 0至33 MHz的可编程的8位微控制器 [CMOS 0 to 33 MHz Programmable 8?bit Microcontroller]
分类和应用: 微控制器和处理器外围集成电路异步传输模式ATM可编程只读存储器时钟
文件页数/大小: 24 页 / 184 K
品牌: TEMIC [ TEMIC SEMICONDUCTORS ]
 浏览型号TSC87C52-25IBD的Datasheet PDF文件第8页浏览型号TSC87C52-25IBD的Datasheet PDF文件第9页浏览型号TSC87C52-25IBD的Datasheet PDF文件第10页浏览型号TSC87C52-25IBD的Datasheet PDF文件第11页浏览型号TSC87C52-25IBD的Datasheet PDF文件第13页浏览型号TSC87C52-25IBD的Datasheet PDF文件第14页浏览型号TSC87C52-25IBD的Datasheet PDF文件第15页浏览型号TSC87C52-25IBD的Datasheet PDF文件第16页  
TSC87C52  
+5V  
EA/VPP  
VCC  
PROGRAM  
SIGNALS*  
ALE/PROG  
P0.0–P0.7  
D0–D7  
RST  
PSEN  
P2.6  
P2.7  
P3.3  
P3.6  
P3.7  
P1.0–P1.7  
P2.0–P2.4  
A0–A7  
CONTROL  
SIGNALS*  
A8–A12  
4 to 6 MHz  
XTAL1  
VSS  
GND  
* See Table 6 for proper value on these inputs  
Figure 8 Set–up modes configuration  
Programming algorithm  
The Improved Quick Pulse algorithm is based on the Quick Pulse algorithm and decreases the number of pulses applied  
during byte programming from 25 to 5.  
To program the TSC87C52 the following sequence must be exercised:  
D
D
D
D
D
Step 1: Input the valid address on the address lines.  
Step 2: Input the appropriate data on the data lines.  
Step 3: Activate the combination of control signals.  
Step 4: Raise EA/VPP from VCC to VPP (typical 12.75V).  
Step 5: Pulse ALE/PROG 5 times.  
Repeat step 1 through 5 changing the address and data for the entire array or until the end of the object file is reached  
(see Figure 9).  
Verify algorithm  
Code array verify must be done after each byte or block of bytes is programmed. In either case, a complete verify of  
the programmed array will ensure reliable programming of the TSC87C52.  
To verify the TSC87C52 code the following sequence must be exercised :  
D
D
D
D
Step 1: Activate the combination of program signals.  
Step 2: Input the valid address on the address lines.  
Step 3: Input the appropriate data on the data lines.  
Step 4: Activate the combination of control signals.  
Repeat step 2 through 4 changing the address and data for the entire array (see Figure 9).  
The encryption array cannot be directly verified. Verification of the encryption array is done by observing that the code  
array is well encrypted.  
MATRA MHS  
Rev. C – 10 Sept 1997  
12  
Preliminary  
 复制成功!