Comparison between risc and cisc - computer architecture, Computer Engineering

Comparison between risc and cisc - computer architecture:

CISC 

Emphasis on hardware 

Includes multi-clock

complex instructions 

Memory-to-memory:

"LOAD" and "STORE"

incorporated in instructions

Small code sizes,

high cycles per second 

Transistors used for storing

complex instructions 

RISC 

Emphasis on software 

Single-clock,

reduced instruction only 

Register to register:

"LOAD" and "STORE"

are independent instructions

Low cycles per second,

large code sizes 

Spends more transistors

on memory registers 

Though, the RISC strategy also brings some very significant advantages. Because each instruction need only one clock cycle to execute, the whole program will execute in about the same amount of time as the multi-cycle "MULT" command. These RISC "reduced instructions" needed less transistors of hardware space than the multifaceted instructions, leaving more space for general purpose registers. Because all of the instructions execute in a uniform amount of time (for example: one clock), pipelining is possible.

Separating the "STORE" and "LOAD " instructions in fact reduce the amount of work that the computer have to perform. After the execution of CISC-style "MULT" command, the processor automatically clear the registers. If one of the operands required to be used for another computation, the processor has to re-load the data from the memory bank into a register. In RISC, the operand will leave in the register until another value is loaded in its place.

 

 

Posted Date: 10/13/2012 3:50:17 AM | Location : United States







Related Discussions:- Comparison between risc and cisc - computer architecture, Assignment Help, Ask Question on Comparison between risc and cisc - computer architecture, Get Answer, Expert's Help, Comparison between risc and cisc - computer architecture Discussions

Write discussion on Comparison between risc and cisc - computer architecture
Your posts are moderated
Related Questions
What are the uses of Router? Router: A router is used to transfer or route data among two or more similar networks. This determines the next network point to that a data

Illustrate about object oriented development object oriented development is not direct way of system development as in this approach a holistic view of application domain is co

What is the role of MAR and MDR? The MAR (memory address register) is used to hold the address of the location to or from which data are to be transferred and the MDR(memory d

Given the subsequent FIFO and rules, how deep does the FIFO require to be to stop underflow or overflow? RULES: a. frequency(clk_A) = frequency(clk_B) / 4 b. per

The Concept of Parallel Execution and Concurrent Real world systems are obviously concurrent, and computer science is about modelling the actual world. Examples of actual worl

What is secondary list? It permits you to enhance the information presented in the basic list.  The user can, for example, select a line of the basic list for which he require

What are the risks by customer's perspective in Electronic Payment Systems? Risks within Electronic Payment Systems: Through the customer's perspective are as follows:

What is recursion?  A recursive procedure should have two properties.  What are they? Recursion means function call itself repeatedly.         Properties : (1) There

Highly Encoded micro-instructions Encoded bits required in micro-instructions are small. It provided an aggregated view that is a higher view of CPU as just an encoded

For this part of your assessment you are required to prepare and conduct a usability test of the website that you have chosen to review from Part A . You must design the script,c