Skip to main content

Integrated Injection Logic (I2L)


Integrated Injection Logic (I2L) was disclosed in 1972 at International Solid State Circuits Conference by C. M. Hart and A. Slob of Philips, The Netherlands, and by H. H. Berger and S. K. Wiedmann of IBM, West Germany simultaneously.
The basic logic unit is a multiple output inverter which is physically realized as a conventional npn multi-emitter transistor operated in the inverse mode. Base drive to the npn inverters is supplied by multicollector lateral pnp current source transistors. The emitter of the pnp transistor is referred to as the injector, and a single injector distributes base drive to many npn logic units.
The outputs of I2L units may be " wire AND " with outputs from other units for NAND implementation of logic functions.
Integrated Injection Logic (I2L)

I2L is a bipolar LSI circuit technique which achieves high packing density and good power-delay efficiency using conventional bipolar processing. It uses the properties of ion implantation to achieve improved performance capabilities.

Applications of I2L :-

1.     It was to construct an integrated circuit, and commonly used before the advent of CMOS logic by companies such as Motorola and Texas Instruments (e.g. SBP0400).
2.     In 1975, Sinclair Radionics introduced the first consumer-grade digital watches, the Black Watch, which used I2L technology. 
3.     In 1979, HP introduced a frequency measurement instrument based on LSI chip that uses integrated injection logic (I2L) for low power consumption and high density, enabling portable battery operation, and emitter function logic (EFL) circuits where high speed is required.

Comments

Popular posts from this blog

Nagware

Nagware is a software utility that adds users into upgrading or buying a premium version of software by sending constant pop-up messages or notifications.   It is a marketing tactic used by software developers in order to remind users to take advantage of special offers and purchase software. Nagware is also known as begware , annoyware , nagscreen and guiltware . It is built into commercial software that periodically prompts the user to register the product. Nagware is commonly used with  shareware  programs which have been downloaded for trial use. It keeps the message up for a certain time period, forcing the user to continue using the program. 

Atanasoff - Berry Computer ( ABC )

The Atanasoff – Berry Computer (ABC)   was the first electronic computer, designed and built by Lowa State College Mathematics and Physics professor John Vincent Atanasoff and his assistant, Clifford E. Berry ( a graduate student) . They worked in the basement of the physics building at Lowa State College on the computer from 1939 until 1942 when it was abandoned due to World War II . Unfortunately, after being abandoned , it was neglected and eventually disassembled for parts. In 1994, a team from Lowa state University began to rebuild the computer, finishing it in 1997. The system weighed more than seven hundred pounds (320 kg). It contained approximately 1-mile (1.6 km) of wire, 280 dual-triode vacuum tubes, 31  thyratrons , and was about the size of a desk.  The idea behind the ABC were later used in the construction of the ENIAC, the world’s first general purpose computer. Purpose / Working ABC was designed only to solve systems of  linear equations  and was succ

Virus

Virus  A virus is a computer code or program, which is capable of affecting your computer data badly by corrupting or destroying them. Computer virus has the tendency to make its duplicate copies at a swift pace, and also spread it across every folder and damage the data of your computer system. A computer virus is a malicious software program or "malware" which, when infecting your system, replicates itself by modifying other computer programs and inserting its own code. Types Of Virus :- File Infector Virus Multipartite Virus Resident Virus Boot Virus Macro Viruss Overwrite Virus Web Scripting Virus Impact of Virus :- Disrupts the normal functionality of respective computer system. Disrupts system network use. Modifies configuration setting of the system. Destructs data. Disrupts computer network resources. Destructs of confidential data. Infected computer programs may include data files, or even the "boot" sector of the hard dr