Fundamental differences between risc and cisc architecture, Computer Engineering

Assignment Help:

Q. Fundamental differences between RISC and CISC architecture?

Fundamental differences between RISC and CISC architecture. The following table lists following differences:

CISC

RISC

1.  Large number of instructions - from

120 to 350.

 

1. Relatively fewer instructions - less than 100.

2. Employs a variety of data types and a large number of addressing modes.

2. Relatively fewer addressing modes.

3. Variable-length instruction formats.

3. Fixed-length instructions generally 32 bits, easy to decode instruction format.

4. Instructions manipulate operands residing in memory.

4. Mostly register-register operations. The only memory access is by explicit LOAD/STORE instructions.

5. Number of Cycles Per Instruction (CPI) varies from 1-20 depending upon the instruction. 

5. Number of CPI is one as it uses pipelining. Pipeline in RISC is optimised due to simple instructions and instruction formats.

6. GPRs varies from 8-32. But no support is available for the parameter passing and function calls.

6. Large number of GPRs are available which are mainly used as Global registers and as a register based procedural call and parameter passing stack so optimised for structured programming. 

7. Microprogrammed Control Unit.

7. Hardwired Control Unit.


Related Discussions:- Fundamental differences between risc and cisc architecture

Explain shift register with diagram and waveform, Q. Explain Shift register...

Q. Explain Shift register with diagram and waveform.   Q. Write a short note on Decoder.

What are the central interfaces of the r/3 system, What are the central int...

What are the central interfaces of the R/3 system? There are three central interfaces:- Presentation Interface. Database Interface. Operating system Interface.

Software, its language base assignment

its language base assignment

Direct or random access of elements, Direct or random access of elements is...

Direct or random access of elements is not possible in:- In Linked list direct or random access of elements is not possible

How optimization is achieved in dns, How optimization is achieved in DNS? ...

How optimization is achieved in DNS? Two primary optimizations used in DNS and they are: replication and caching. All root servers is replicated; various copies of the server

Describe the booch methodology, Object Oriented Analysis and Design 1. ...

Object Oriented Analysis and Design 1. What are the advantages of object-oriented systems? 2. Describe the Booch Methodology. 3. Justify that UML is a language for modeli

Changing the system prompt, Q. Changing the System Prompt? When you cha...

Q. Changing the System Prompt? When you change the directory, you would like to keep track of it. The best way to do this is by displaying the name of the current directory alo

C program, #how to write c program for all types of beam reactions

#how to write c program for all types of beam reactions

Transition management system, please help me with psudocode for schedule ma...

please help me with psudocode for schedule management which contains stakeholder and application table

Example of the horizon problem, Example of the horizon problem: It is ...

Example of the horizon problem: It is also worth bearing in mind the horizon problem, however a game-playing agent cannot see much far satisfactory into the search space. Now

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd