Comparison between risc and cisc - computer architecture, Computer Engineering

Comparison between risc and cisc - computer architecture:

CISC 

Emphasis on hardware 

Includes multi-clock

complex instructions 

Memory-to-memory:

"LOAD" and "STORE"

incorporated in instructions

Small code sizes,

high cycles per second 

Transistors used for storing

complex instructions 

RISC 

Emphasis on software 

Single-clock,

reduced instruction only 

Register to register:

"LOAD" and "STORE"

are independent instructions

Low cycles per second,

large code sizes 

Spends more transistors

on memory registers 

Though, the RISC strategy also brings some very significant advantages. Because each instruction need only one clock cycle to execute, the whole program will execute in about the same amount of time as the multi-cycle "MULT" command. These RISC "reduced instructions" needed less transistors of hardware space than the multifaceted instructions, leaving more space for general purpose registers. Because all of the instructions execute in a uniform amount of time (for example: one clock), pipelining is possible.

Separating the "STORE" and "LOAD " instructions in fact reduce the amount of work that the computer have to perform. After the execution of CISC-style "MULT" command, the processor automatically clear the registers. If one of the operands required to be used for another computation, the processor has to re-load the data from the memory bank into a register. In RISC, the operand will leave in the register until another value is loaded in its place.

 

 

Posted Date: 10/13/2012 3:50:17 AM | Location : United States







Related Discussions:- Comparison between risc and cisc - computer architecture, Assignment Help, Ask Question on Comparison between risc and cisc - computer architecture, Get Answer, Expert's Help, Comparison between risc and cisc - computer architecture Discussions

Write discussion on Comparison between risc and cisc - computer architecture
Your posts are moderated
Related Questions
Accessing a Cache:  Direct mapping: (Block address) modulo (Number of cache block in the cache) The valid bit indicate whether an entry contain a valid address.

What are the features of ADO.Net ?  ADO.NET features: 1. Disconnected Data Architecture 2. Data cached in Datasets 3. Data transfer in XML format 4. Interaction wit

General Considerations for Research -artificial intelligence: If we can specify the initial state, the operators or a consumer and the goal check for a search problem, that al

Explain Circular Dependencies. Circular Dependencies: To know the problem of circular dependencies consider a file server which uses a timeserver to acquire the current

Q. What are basic features that collaboration systems might have? ANSWER: Three basic features of collaboration systems are Web-conferencing, project management,

Define macros.   A macro is a pre-processor directive which is a program that processes the source code before it passes by the compiler. These are placed in the source program

Common channel signalling              ? Common channel signalling requires no additional transmission help or facilities.

Explain the Main characteristics of semiconductor memory Memory, with regard to computers, most commonly signifies to semiconductor devices whose contents can be accessed (whic

The first digit of a decimal constant must be Decimal constants having of a set of digit, 0 to 9, preceded by an optional - or + sign.

Q. What is disk access time? The disk access time has two key components: Seek Time: Seek time is the time for disk arm to move heads to the cylinder comprising the desi