Comparison between risc and cisc - computer architecture, Computer Engineering

Assignment Help:

Comparison between risc and cisc - computer architecture:

CISC 

Emphasis on hardware 

Includes multi-clock

complex instructions 

Memory-to-memory:

"LOAD" and "STORE"

incorporated in instructions

Small code sizes,

high cycles per second 

Transistors used for storing

complex instructions 

RISC 

Emphasis on software 

Single-clock,

reduced instruction only 

Register to register:

"LOAD" and "STORE"

are independent instructions

Low cycles per second,

large code sizes 

Spends more transistors

on memory registers 

Though, the RISC strategy also brings some very significant advantages. Because each instruction need only one clock cycle to execute, the whole program will execute in about the same amount of time as the multi-cycle "MULT" command. These RISC "reduced instructions" needed less transistors of hardware space than the multifaceted instructions, leaving more space for general purpose registers. Because all of the instructions execute in a uniform amount of time (for example: one clock), pipelining is possible.

Separating the "STORE" and "LOAD " instructions in fact reduce the amount of work that the computer have to perform. After the execution of CISC-style "MULT" command, the processor automatically clear the registers. If one of the operands required to be used for another computation, the processor has to re-load the data from the memory bank into a register. In RISC, the operand will leave in the register until another value is loaded in its place.

 

 


Related Discussions:- Comparison between risc and cisc - computer architecture

Find the responses when a computer broadcast an arp reqqest, How many respo...

How many responses does a computer expect to receive when it broadcast an ARP request? Why? An ARP (Address Resolution Protocol) request message is put in a hardware frame and

Ifstream on the input file, Write a main function that opens an ifstream on...

Write a main function that opens an ifstream on the input file, "person.dat".  If the stream cannot be  opened, output an error message and exit.       The file format is as foll

Explain program source code, Q. Explain Program Source Code? Program S...

Q. Explain Program Source Code? Program Source Code  Every assembly language statement appears as: {identifier}  Keyword {{parameter},}  {;comment}.   Element of a

C++, what is polymorphism

what is polymorphism

What are the four factors of open source software, What are the four signif...

What are the four significant factors that led to the development of open source software? 1. To diminish the high control value of the Proprietary Software 2. To avoid disc

Java, mine sweeper algorithm.

mine sweeper algorithm.

How cloud can be used in event schedules, How cloud can be used in Event Sc...

How cloud can be used in Event Schedules and Management with an example. Web-based calendars can be used to post dates and schedules for specific public events, such as school

Control hazard and delayed branching, Described Instruction or control haza...

Described Instruction or control hazard? Ans: The pipeline can be stalled due to delay in the availability of an instruction. For instance, this may be a result of a miss in t

What interprets can a browser contain besides html and http, What interpret...

What interprets can a browser contain besides HTML and HTTP? Besides an HTTP client and an HTML interpreter, a browser can have elements whihc enable the browser to perform any

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd