欢迎访问ic37.com |
会员登录 免费注册
发布采购

TSC87C52-16CJB 参数 Datasheet PDF下载

TSC87C52-16CJB图片预览
型号: TSC87C52-16CJB
PDF下载: 下载PDF文件 查看货源
内容描述: CMOS 0至33 MHz的可编程的8位微控制器 [CMOS 0 to 33 MHz Programmable 8?bit Microcontroller]
分类和应用: 微控制器
文件页数/大小: 24 页 / 184 K
品牌: TEMIC [ TEMIC SEMICONDUCTORS ]
 浏览型号TSC87C52-16CJB的Datasheet PDF文件第8页浏览型号TSC87C52-16CJB的Datasheet PDF文件第9页浏览型号TSC87C52-16CJB的Datasheet PDF文件第10页浏览型号TSC87C52-16CJB的Datasheet PDF文件第11页浏览型号TSC87C52-16CJB的Datasheet PDF文件第13页浏览型号TSC87C52-16CJB的Datasheet PDF文件第14页浏览型号TSC87C52-16CJB的Datasheet PDF文件第15页浏览型号TSC87C52-16CJB的Datasheet PDF文件第16页  
TSC87C52  
+5V  
EA/VPP  
VCC  
PROGRAM  
SIGNALS*  
ALE/PROG  
P0.0–P0.7  
D0–D7  
RST  
PSEN  
P2.6  
P2.7  
P3.3  
P3.6  
P3.7  
P1.0–P1.7  
P2.0–P2.4  
A0–A7  
CONTROL  
SIGNALS*  
A8–A12  
4 to 6 MHz  
XTAL1  
VSS  
GND  
* See Table 6 for proper value on these inputs  
Figure 8 Set–up modes configuration  
Programming algorithm  
The Improved Quick Pulse algorithm is based on the Quick Pulse algorithm and decreases the number of pulses applied  
during byte programming from 25 to 5.  
To program the TSC87C52 the following sequence must be exercised:  
D
D
D
D
D
Step 1: Input the valid address on the address lines.  
Step 2: Input the appropriate data on the data lines.  
Step 3: Activate the combination of control signals.  
Step 4: Raise EA/VPP from VCC to VPP (typical 12.75V).  
Step 5: Pulse ALE/PROG 5 times.  
Repeat step 1 through 5 changing the address and data for the entire array or until the end of the object file is reached  
(see Figure 9).  
Verify algorithm  
Code array verify must be done after each byte or block of bytes is programmed. In either case, a complete verify of  
the programmed array will ensure reliable programming of the TSC87C52.  
To verify the TSC87C52 code the following sequence must be exercised :  
D
D
D
D
Step 1: Activate the combination of program signals.  
Step 2: Input the valid address on the address lines.  
Step 3: Input the appropriate data on the data lines.  
Step 4: Activate the combination of control signals.  
Repeat step 2 through 4 changing the address and data for the entire array (see Figure 9).  
The encryption array cannot be directly verified. Verification of the encryption array is done by observing that the code  
array is well encrypted.  
MATRA MHS  
Rev. C – 10 Sept 1997  
12  
Preliminary