Comparison between risc and cisc - computer architecture, Computer Engineering

Comparison between risc and cisc - computer architecture:

CISC 

Emphasis on hardware 

Includes multi-clock

complex instructions 

Memory-to-memory:

"LOAD" and "STORE"

incorporated in instructions

Small code sizes,

high cycles per second 

Transistors used for storing

complex instructions 

RISC 

Emphasis on software 

Single-clock,

reduced instruction only 

Register to register:

"LOAD" and "STORE"

are independent instructions

Low cycles per second,

large code sizes 

Spends more transistors

on memory registers 

Though, the RISC strategy also brings some very significant advantages. Because each instruction need only one clock cycle to execute, the whole program will execute in about the same amount of time as the multi-cycle "MULT" command. These RISC "reduced instructions" needed less transistors of hardware space than the multifaceted instructions, leaving more space for general purpose registers. Because all of the instructions execute in a uniform amount of time (for example: one clock), pipelining is possible.

Separating the "STORE" and "LOAD " instructions in fact reduce the amount of work that the computer have to perform. After the execution of CISC-style "MULT" command, the processor automatically clear the registers. If one of the operands required to be used for another computation, the processor has to re-load the data from the memory bank into a register. In RISC, the operand will leave in the register until another value is loaded in its place.

 

 

Posted Date: 10/13/2012 3:50:17 AM | Location : United States







Related Discussions:- Comparison between risc and cisc - computer architecture, Assignment Help, Ask Question on Comparison between risc and cisc - computer architecture, Get Answer, Expert's Help, Comparison between risc and cisc - computer architecture Discussions

Write discussion on Comparison between risc and cisc - computer architecture
Your posts are moderated
Related Questions
Q. Explain the Fetch Cycle? The beginning of every instruction cycle is the fetch cycle and causes an instruction tobe fetched from memory.   The fetch cycle comprises four

Why does FTP use two standard ports whereas other protocols, in general use only one port? Justify. File transfer protocol uses a control connection just to send commands and r

Q. What is Unordered Lists? First, we will build an unordered list. Many times, these lists are also termed as bulleted lists. These lists are characterized by list items which

Describe about the role of bitmap indexes to solve aggregation problems? Ans) Bitmaps are very useful in begin schema to join large databases to small databases. Answer queries

Explain about the value chain for a manufactured product. The products sold in shops and purchased for use within organizations are the result of a complicated web of relations

Q. Define Colspan and Rowspan? Now let's see how to work with COLSPAN (Column Span) and ROWSPAN (Row Span). If we want cell containing Ajay in Figure to be extended to the next

Generally the Instruction Set Architecture (ISA) of a processor can be distinguished using five categories:  Operand Storage in the CPU - Where are the operands kept other t

Reduce the following equation using k-map Y = BC‾D‾ + A‾BC‾D + ABC‾D + A‾BCD + ABCD Ans. Multiplying the first term with (A+A') Y = A'BC'D' + ABC'D' + A'BC'D + ABC'D + A'BCD + A

A combinational circuit has 3 inputs A, B, C and output F.  F is true for following input combinations A is False, B is True A is False, C is True A, B, C

Discuss the advantages of automatic switching systems over manual switching system. Automatic switching systems have some advantages over the manual exchanges: 1. In a manua