Cisc approach - cisc architecture, Computer Engineering

Assignment Help:

CISC Approach - CISC architecture:

The main goal of CISC architecture is to finish a task in as few lines of assembly as possible as. This is gain by building processor hardware that is able to understand and execute a series of operations. For this specific task, a CISC processor would come prepared with a individual instruction (we'll call it "MULT"). When this instruction is executed, it loads the two values into distant registers, multiplies the operands in the execution unit, and then holds the product in the proper register. Thus, the all task of multiplying two numbers can be completed with only one instruction:

                                                         MULT 2:3, 5:2

MULT which is known as a "complex instruction." It directly operates on the computer's memory banks and does not need the programmer to explicitly call any loading or storing functions. It nearly resembles a command in a higher level language. For an example, if we let "a" stand for 2:3 and "b" stand for 5:2, then this command is identical to the C statement "a = a * b."

One of the main advantages of this system is that the compiler has to do very small work to translate a high- level language statement into assembly language. Because the length of the code is relatively small, very little RAM is needed to store instructions. The emphasis is put on building difficult instructions directly into the hardware.

 


Related Discussions:- Cisc approach - cisc architecture

Describe loading disk operating system, Q. Describe Loading Disk Operating ...

Q. Describe Loading Disk Operating System? Different version of DOS, such as 2.0, 3.0, 3.2, 4.0, 5.0, 6.0, 6.2, 6.22, 7.0, 7.2 are present. The newer versions have additional

What are program-invisible registers, What are program-invisible registers?...

What are program-invisible registers? Ans: the local and global descriptor tables are found in the memory system. To access and specify the address of these tables, program inv

What is the analysis techniques object modelling, What is the Analysis Tech...

What is the Analysis Techniques Object Modelling Object modelling is very significant for any object oriented development, object modelling shows static data structure of real

Illustrate simple ALU organisation, Q. Illustrate Simple ALU Organisation? ...

Q. Illustrate Simple ALU Organisation? An ALU comprises circuits which perform data processing micro-operations. Though how are these ALU circuits used in conjunction of other

What is collective message passing, Q. What is Collective Message Passing? ...

Q. What is Collective Message Passing? In collective message passing all the processes of a group take part in communication. MPI offers a number of functions to apply the coll

Define polling, Define Polling. A Polling process is used to recognize...

Define Polling. A Polling process is used to recognize the highest priority source by software means. In this process there is one common branch address for all interrupts.

Explain mutual-exclusion implementation with semaphores, Disadvantage and...

Disadvantage and Advantage of mutual-exclusion implementation with semaphores. Disadvantage: Mutual-exclusion solutions specified by semaphores require busy waiting. Tha

Oo modelling, We might model such a scenario using three types of object: o...

We might model such a scenario using three types of object: one for Customers, one for BankAccounts and another for Transactions. In terms of data required, for Customers assume we

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd