193:. This is where the most common key sequences have been studied, and keys in the same common sequence are placed in the electrical switch matrix such that three keys down cannot produce a fourth "phantom" key by shorting out the matrix. The simplest way to accomplish this is to put all keys in the same common sequence on the same X or Y line of the switch matrix. As long as the electronics do not see more than two keys on different X and Y lines, which would create a phantom key, it will continue to process the next key depressed. This typically produces four- to five-key rollover for the most common key sequences.
46:
162:(HID) "report protocol" and "boot protocol". The (optional) boot protocol, which is solely used by very limited USB host implementations such as BIOS, is limited to eight modifier keys (left and right versions of Ctrl, Shift, Alt, and Win), followed by maximum six key codes. This will limit the number of simultaneous key presses that can be reported. The (mandatory) HID report protocol, which is what operating systems use, imposes no restrictions and supports full
37:) can correctly detect input from each key on the keyboard at the same time, regardless of how many other keys are also being pressed. Keyboards that lack full rollover will register an incorrect keystroke when certain combinations of keys are pressed simultaneously. Rollover has applications for stenotype, electronic music keyboards, gaming, and touch-typing generally.
202:
174:
However, to reduce cost and design complexity, most computer keyboards do not isolate all keys in this way. Instead, they use a matrix of key switches, without any isolation diodes, that assumes that only a limited number of keys will be held down at any given time. With these keyboards, pressing as
216:
This example shows that three keys, brown, blue and green, have been pressed. A signal path is accurately detected from terminal 1, through the brown switch to terminal 6, indicating that key 1/6 has been pressed. However, the signal also routes through the blue and green switches to terminal 4,
178:
A keyboard with "two-key rollover" can reliably detect only any two keys used simultaneously; in other words, a user can hold down any key on the keyboard and press a second key, and be sure that the keypress is correctly detected by the computer. However, if the user has two keys depressed and
221:, as a phantom keypress (1/4) has been detected. This only occurs when three corners of a rectangular set of switches are closed—the "ghost" being the fourth corner. When these three keys are pressed simultaneously, this fourth keypress is erroneously registered by the
179:
attempts to strike a third key, the third keypress may create a "phantom key" by shorting out the switch matrix. This is not acceptable for quality keyboards because there are many cases when more than two keys need to be depressed at the same time, such as
243:) of keys pressed in any order and released in any order—they are immune to both key ghosting and key jamming. Some "gaming keyboards" use a matrix, but only give individual diodes to the most frequently-used keys in gaming such as WASD and the arrow keys.
128:-key rollover (NKRO). This means that each key is scanned completely independently by the keyboard hardware, so that each keypress is correctly detected regardless of how many other keys are being pressed or held down at the time. Full
228:
If necessary, these errors can be eliminated by placing a diode in series with each key switch, as shown in Figure B. In this example, the false signal path is blocked by the diode in series with the blue switch.
166:-key rollover. The HID specification however imposes no requirements on rollover and low-end keyboards may impose the same restrictions regardless of whether the boot protocol or the HID report protocol is used.
263:
use the control, alt, and shift keys by default. Computer keyboards typically are designed to detect these keys being activated in addition to others from the character matrix, and this may prevent key jamming.
62:
such as Shift or
Control, the user intentionally holds the modifier key(s) while pressing and releasing another key. Rapid typists may also sometimes inadvertently press a key before releasing the previous one.
57:
During normal typing on a conventional computer keyboard, only one key is usually pressed at any given time, then released before the next key is pressed. However, this is not always the case. When using
246:
Key jamming is often noticed when using a keyboard to play computer games where many keypresses combine to movement vectors and other simultaneous activities rather than typing text. The original
88:
Some computer games require multiple keys (other than the usual modifier keys) to be held down while others are pressed and released, in order to perform actions simultaneously;
175:
few as three keys can cause ghosting effects, although care is taken when laying out the matrix arrangement that this does not happen for common modifier key combinations.
323:
239:
Most music keyboards and some high-end computer keyboards use an isolation diode with each keyswitch in their matrix, and can correctly read any combination (
158:-key rollover, the complete key press status must be transmitted to the computer. When the data is sent via the USB protocol, there are two operating modes:
361:
256:
for their keyboard, since during gameplay it was common for each of the two players to be pressing three or four keys at the same time.
348:
232:
Modern keyboards detect ghosting, and instead of registering a fourth key, they will ignore the third key. This behavior is known as
103:
236:, as the first two keys jam the third. Which keys jam when pressed together differs between brands and models of keyboards.
53:
to simultaneously hold down the following keys: "Left Shift" for sprinting, "W" for moving forward, and "Space" for jumping.
327:
437:
140:
to input text far faster than conventional typing methods, allowing it to keep pace with the speed of human speech.
45:
210:
144:
365:
159:
417:
183:, or when more than two keys are depressed because of fast typing ("rolling over" more than two keys).
66:
Certain unusual forms of keyboarding require multiple keys to be pressed or held down simultaneously;
278:
222:
213:
keyboards for certain combinations of three keys. The image to the right illustrates the problem.
253:
187:
76:
72:
23:
75:
keying requires as many as six keys to be pressed at once analogous to the six dot keys of a
260:
252:
game included a utility to test for key jamming and help the player to determine the best
180:
422:
205:"Ghosting" can occur when certain combinations of three keys are pressed simultaneously.
273:
431:
303:
248:
190:
59:
16:
Ability of a computer keyboard to correctly handle several simultaneous keystrokes
394:
92:
283:
133:
107:
96:
82:
186:"Multi-key rollover" is considered essential for quality keyboards and for
85:
also requires the ability to press multiple keys at once to form "chords."
240:
137:
395:"Keyboard Matrix Help, section 8: "Getting Rid Of Ghosting and Masking""
151:-key rollover, making them immune to both key ghosting and key jamming.
217:
falsely indicating that key 1/4 has been pressed. This error is called
50:
26:
to correctly handle several simultaneous keystrokes. A keyboard with
201:
200:
44:
106:
with an object or item in the game while holding down an
99:
in order to move the player in a diagonal direction.
143:Most music keyboards use isolation diodes in their
91:a common scenario would be the holding down of two
8:
154:For the user to get the benefit of the full
418:Keyboard ghosting interactive demonstration
102:Other scenarios might be pressing a key to
388:
386:
384:
382:
295:
7:
304:"Braille2000: Keyboard Requirements"
49:It is common for a person playing a
362:"TechEncyclopedia: n-key rollover"
349:"TechEncyclopedia: n-key rollover"
14:
124:Certain high-end keyboards have
132:-key rollover is required for
1:
324:"Looking for a new keyboard?"
326:. 2004-10-26. Archived from
454:
259:Many computer games and
197:Key jamming and ghosting
209:Key ghosting occurs on
206:
160:Human Interface Device
54:
368:on September 27, 2007
204:
48:
110:to signify movement.
22:is the ability of a
279:Keyboard technology
223:keyboard controller
83:Stenographic typing
438:Computer keyboards
207:
170:Multi-key rollover
147:to implement full
136:, which relies on
77:Braille typewriter
55:
423:Key Rollover Test
261:console emulators
24:computer keyboard
445:
405:
404:
402:
401:
390:
377:
376:
374:
373:
364:. Archived from
358:
356:
355:
345:
339:
338:
336:
335:
320:
314:
313:
311:
310:
300:
188:English-language
165:
157:
150:
131:
127:
453:
452:
448:
447:
446:
444:
443:
442:
428:
427:
414:
409:
408:
399:
397:
392:
391:
380:
371:
369:
360:
353:
351:
347:
346:
342:
333:
331:
322:
321:
317:
308:
306:
302:
301:
297:
292:
270:
199:
181:Ctrl-Alt-Delete
172:
163:
155:
148:
145:keyboard matrix
129:
125:
122:
67:
43:
17:
12:
11:
5:
451:
449:
441:
440:
430:
429:
426:
425:
420:
413:
412:External links
410:
407:
406:
393:Dribin, Dave.
378:
340:
315:
294:
293:
291:
288:
287:
286:
281:
276:
274:Charlieplexing
269:
266:
198:
195:
171:
168:
121:
115:
114:
113:
112:
111:
100:
86:
80:
42:
41:Keyboard usage
39:
15:
13:
10:
9:
6:
4:
3:
2:
450:
439:
436:
435:
433:
424:
421:
419:
416:
415:
411:
396:
389:
387:
385:
383:
379:
367:
363:
350:
344:
341:
330:on 2007-09-28
329:
325:
319:
316:
305:
299:
296:
289:
285:
282:
280:
277:
275:
272:
271:
267:
265:
262:
257:
255:
251:
250:
244:
242:
237:
235:
230:
226:
224:
220:
214:
212:
203:
196:
194:
192:
189:
184:
182:
176:
169:
167:
161:
152:
146:
141:
139:
135:
120:-key rollover
119:
116:
109:
105:
101:
98:
94:
90:
89:
87:
84:
81:
78:
74:
71:
70:
69:
68:for example:
64:
61:
60:modifier keys
52:
47:
40:
38:
36:
32:
31:-key rollover
30:
25:
21:
398:. Retrieved
370:. Retrieved
366:the original
352:. Retrieved
343:
332:. Retrieved
328:the original
318:
307:. Retrieved
298:
258:
249:Star Control
247:
245:
238:
233:
231:
227:
218:
215:
208:
191:touch typing
185:
177:
173:
153:
142:
123:
117:
65:
56:
34:
28:
27:
20:Key rollover
19:
18:
254:key mapping
73:Braille2000
400:2008-10-11
372:2007-09-27
354:2011-12-03
334:2006-07-19
309:2006-07-19
290:References
93:Arrow keys
284:Stenotype
134:stenotype
108:Arrow key
97:WASD keys
432:Category
359:mirror:
268:See also
241:chording
219:ghosting
138:chording
104:interact
234:jamming
51:PC game
211:matrix
35:NKRO
225:.
95:or
434::
381:^
403:.
375:.
357:.
337:.
312:.
164:n
156:n
149:n
130:n
126:n
118:n
79:.
33:(
29:n
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.