SlideShare a Scribd company logo
1 of 32
RISC Vs CISC
Classification of
Microprocessors:
• The classification based on
– the word length,
– the architecture i.e. Instruction Set of the
microprocessor.
• These are categorized into RISC and CISC.
Before start !
RISC is the way to make hardware simpler
whereas CISC is the single instruction that
handles multiple work.
RISC
• Definition
– stands for Reduced Instruction Set Computers.
– is a type of microprocessor architecture that utilizes a
small, highly-optimized set of instructions,
– The main idea behind this, is
• to simplify hardware by using an instruction set composed
of a few basic steps for loading, evaluating, and storing
operations just like
– a load command will load data,
– a store command will store the data.
• Examples: SPARC, POWER PC, etc.
Characteristics of RISC
• Simpler instruction, hence simple instruction
decoding.
• Instruction comes undersize of one word.
• Instruction takes a single clock cycle to get
executed.
• More general-purpose registers.
• Simple Addressing Modes.
• Fewer Data types.
• A pipeline can be achieved.
Advantages of RISC
• Simpler instructions:
• RISC processors use a smaller set of simple
instructions,
• which makes them easier to decode and execute quickly.
• This results in faster processing times.
• Faster execution:
• Because RISC processors have a simpler instruction
set,
• they can execute instructions faster than CISC processors.
• Lower power consumption:
• RISC processors consume less power than CISC
processors,
• making them ideal for portable devices.
Disadvantages of RISC
• More instructions required:
• RISC processors require more instructions to
perform complex tasks than CISC processors.
• Increased memory usage:
• RISC processors require more memory to store
the additional instructions needed to perform
complex tasks.
• Higher cost:
• Developing and manufacturing RISC processors
can be more expensive than CISC processors.
Complex Instruction Set
Architecture (CISC)
• The main idea is that a single instruction
will do all loading, evaluating, and storing
operations just like
– a multiplication command will do stuff like
• loading data,
• evaluating,
• storing it,
– hence it’s complex.
• Examples: Intel architecture, AMD
Characteristics of CISC
• Complex instruction, hence complex
instruction decoding.
• Instructions are larger than one-word size.
• Instruction may take more than a single clock
cycle to get executed.
• Less number of general-purpose registers as
operations get performed in memory itself.
• Complex Addressing Modes.
• More Data types.
Advantages of CISC
• Reduced code size:
• CISC processors use complex instructions that can perform
multiple operations,
• reducing the amount of code needed to perform a task.
• More efficient memory:
• Because CISC instructions are more complex,
• they require fewer instructions to perform complex tasks,
• This can result in more memory-efficient code.
• Widely used:
• CISC processors have been in use for a longer time than
RISC processors,
• so they have a larger user base and more available
software.
Disadvantages of CISC
• Slower execution:
• CISC processors take longer to execute instructions
because
• they have more complex instructions and
• need more time to decode them.
• More complex design:
• CISC processors have more complex instruction sets,
• which makes them more difficult to design and
manufacture.
• Higher power consumption:
• CISC processors consume more power than RISC
processors
• because of their more complex instruction sets.
Example:
Multiplying Two Numbers in Memory
• The figure in the next slide is a diagram representing the
storage scheme for a generic computer.
• The main memory is divided into locations numbered from
(row) 1: (column) 1 to (row) 6: (column) 4.
• The execution unit is responsible for carrying out all
computations.
• However, the execution unit can only operate on data that
has been loaded into one of the six registers (A, B, C, D, E,
or F).
Example:
Multiplying Two Numbers in Memory
• Let's say we want to find the product of two
numbers
– one stored in location 2:3 and another stored in location 5:2
– then store the product back in the location 2:3.
Cont. example:
The CISC Approach
• The primary goal of CISC architecture is to complete
a task in as few lines of assembly as possible.
• This is achieved by building processor hardware
– that is capable of understanding and executing a series of
operations.
• For this particular task,
– a CISC processor would come prepared with a specific instruction
(we'll call it "MULT").
• When executed, this instruction
– loads the two values into separate registers,
– multiplies the operands in the execution unit,
– stores the product in the appropriate register.
• Thus, the entire task of multiplying two numbers
can be completed with one instruction:
– MULT 2:3, 5:2
• For instance,
– if we let "a" represent the value of 2:3 and "b" represent
the value of 5:2, then this command is identical to the C
statement "a = a * b."
• One of the primary advantages of this system is
– that the compiler has to do very little work to translate a
high-level language statement into assembly.
• Because the length of the code is relatively short,
– very little RAM is required to store instructions.
• The emphasis is put on building complex instructions
directly into the hardware.
Cont. example:
The CISC Approach
• RISC processors only use simple instructions that
can be executed within one clock cycle.
• Thus, the "MULT" command described above could
be divided into three separate commands
– "LOAD," which moves data from the memory bank to a
register,
– "PROD," which finds the product of two operands located
within the registers, and
– "STORE,“ which moves data from a register to the memory
banks.
Cont. example:
The RISC Approach
• In order to perform the exact series of
steps described in the CISC approach,
a programmer would need to code four
lines of assembly:
– LOAD A, 2:3
– LOAD B, 5:2
– PROD A, B
– STORE 2:3, A
Cont. example:
The RISC Approach
• At first, this may seem like a much less
efficient way of completing the
operation.
– Because there are more lines of code,
• more RAM is needed to store the assembly level
instructions.
– The compiler must also perform more
work to convert a high-level language
statement into code of this form.
Cont. example:
The RISC Approach
• However, the RISC strategy also brings some very
important advantages.
– 1 Because each instruction requires only one clock
cycle to execute,
• the entire program will execute in approximately the same
amount of time as the multi-cycle "MULT" command.
• These RISC "reduced instructions" require less transistors of
hardware space than the complex instructions, leaving
more room for general purpose registers.
• Because all of the instructions execute in a uniform amount
of time (i.e. one clock), pipelining is possible.
Cont. example:
The RISC Approach
• 2- Separating the "LOAD" and "STORE"
instructions actually reduces the amount of
work that the computer must perform.
Cont. example:
The RISC Approach
• 3- After a CISC-style "MULT" command is
executed,
– the processor automatically erases the registers.
– If one of the operands needs to be used for
another computation,
• the processor must re-load the data from the memory
bank into a register.
– In RISC, the operand will remain in the register
until another value is loaded in its place.
Cont. example:
The RISC Approach
Difference between CISC and RISC
• Here, are important differences between CISC
vs. RISC
Difference between CISC and RISC
• RISC • CISC
Focus on software Focus on hardware
Uses only Hardwired control unit
Uses hardwired
& microprogrammed control
unit
Fixed sized instructions Variable sized instructions
An instruction fit in one word.
(mostly 32-bits)
Instructions are larger than the
size of one word
Requires more number of
registers
Requires less number of registers
Difference between CISC and RISC
RISC CISC
Simple addressing formats are
supported.
Only base and displacement
addressing is allowed.
Multiple formats are supported for
specifying operands.
A memory operand specifier can
have many different combinations
of displacement, base, and index
register.
Simple and limited addressing
modes.
Complex and more addressing
modes.
Difference between CISC and RISC
RISC CISC
It consumes low power. It consumes more/high power.
RISC is highly pipelined. CISC is less pipelined.
RISC required more RAM for
storing codes for storing codes.
CISC required less RAM for storing
codes.
Code size is large Code size is small
An instruction executed in a single
clock cycle
Instruction takes more than one
clock cycle
CISC and RISC Convergence
• Because a number of advancements are used by
both RISC and CISC processors,
– the lines between the two architectures have begun
to blur.
• In fact, the two architectures almost seem to
have adopted the strategies of the other.
• Because processor speeds have increased,
– CISC chips are now able to execute more than one
instruction within a single clock.
– This also allows CISC chips to make use of pipelining.
CISC and RISC Convergence
• With other technological improvements,
– it is now possible to fit many more transistors on a single chip.
– This gives RISC processors enough space to incorporate more
complicated, CISC-like commands.
• RISC chips also make use of more complicated hardware,
– making use of extra functional units for superscalar execution.
• All of these factors have led some groups to argue that we
are now in a "post-RISC" era,
– in which the two styles have become so similar that
distinguishing between them is no longer relevant.
CISC and RISC Convergence
• However, it should be noted that RISC chips still
retain some important behaviors.
• RISC chips
– strictly utilize uniform, single-cycle instructions.
– They also retain the register-to-register, load/store
architecture.
– despite their extended instruction sets,
• RISC chips still have a large number of general purpose
registers.
RISC Roadblocks
• Despite the advantages of RISC based
processing,
– RISC chips took over a decade to gain a foothold in the
commercial world.
– This was largely due to a lack of software support.
• although Apple's Power Macintosh line
featured RISC-based chips and Windows NT
was RISC compatible,
– Windows 3.1 and Windows 95, and later versions were
designed with CISC processors in mind.
– Many companies were unwilling to take a chance with the
emerging RISC technology.
RISC Roadblocks
• Without commercial interest,
– processor developers were unable to manufacture RISC
chips in large enough volumes to make their price
competitive.
• Another major setback was the presence of
Intel.
– Although their CISC chips were becoming increasingly
awkward and difficult to develop,
• Intel had the resources to plow through development and
produce powerful processors.
– Although RISC chips might surpass Intel's efforts in
specific areas,
• the differences were not great enough to persuade buyers to
change technologies.
EPIC
• It stands for Explicitly Parallel Instruction Computing
• The best features of RISC and CISC processors are
combined in the architecture.
• It implements parallel processing of instructions rather
than using fixed-length instructions.
• The working of EPIC processors is supported by using
– a set of complex instructions that contain both basic
instructions as well as the information of execution of
parallel instructions.
• It substantially increases the efficiency of these
processors.

More Related Content

Similar to RISC Vs CISC Computer architecture and design

Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlowChaudhary Manzoor
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlowkaran saini
 
Processors used in System on chip
Processors used in System on chip Processors used in System on chip
Processors used in System on chip A B Shinde
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlowManish Prajapati
 
Advanced Processor Power Point Presentation
Advanced Processor  Power Point  PresentationAdvanced Processor  Power Point  Presentation
Advanced Processor Power Point PresentationPrashantYadav931011
 
Advanced processor principles
Advanced processor principlesAdvanced processor principles
Advanced processor principlesDhaval Bagal
 
EE5440 – Computer Architecture - Lecture 3
EE5440 – Computer Architecture - Lecture 3EE5440 – Computer Architecture - Lecture 3
EE5440 – Computer Architecture - Lecture 3Dilawar Khan
 
Computer Organization.pptx
Computer Organization.pptxComputer Organization.pptx
Computer Organization.pptxsaimagul310
 
Embedded System IoT_4.pptx ppt presentation
Embedded System  IoT_4.pptx ppt presentationEmbedded System  IoT_4.pptx ppt presentation
Embedded System IoT_4.pptx ppt presentationMITS
 
Microcontroller architecture
Microcontroller architectureMicrocontroller architecture
Microcontroller architectureVikas Dongre
 
Central processing unit
Central processing unitCentral processing unit
Central processing unitKamal Acharya
 
software engineering CSE675_01_Introduction.ppt
software engineering CSE675_01_Introduction.pptsoftware engineering CSE675_01_Introduction.ppt
software engineering CSE675_01_Introduction.pptSomnathMule5
 
CS304PC:Computer Organization and Architecture Session 30 RISC.pptx
CS304PC:Computer Organization and Architecture Session 30 RISC.pptxCS304PC:Computer Organization and Architecture Session 30 RISC.pptx
CS304PC:Computer Organization and Architecture Session 30 RISC.pptxAsst.prof M.Gokilavani
 
CSE675_01_Introduction.ppt
CSE675_01_Introduction.pptCSE675_01_Introduction.ppt
CSE675_01_Introduction.pptAshokRachapalli1
 
CSE675_01_Introduction.ppt
CSE675_01_Introduction.pptCSE675_01_Introduction.ppt
CSE675_01_Introduction.pptAshokRachapalli1
 

Similar to RISC Vs CISC Computer architecture and design (20)

Processors selection
Processors selectionProcessors selection
Processors selection
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlow
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlow
 
Processors used in System on chip
Processors used in System on chip Processors used in System on chip
Processors used in System on chip
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlow
 
Advanced Processor Power Point Presentation
Advanced Processor  Power Point  PresentationAdvanced Processor  Power Point  Presentation
Advanced Processor Power Point Presentation
 
Advanced processor principles
Advanced processor principlesAdvanced processor principles
Advanced processor principles
 
EE5440 – Computer Architecture - Lecture 3
EE5440 – Computer Architecture - Lecture 3EE5440 – Computer Architecture - Lecture 3
EE5440 – Computer Architecture - Lecture 3
 
CISC.pptx
CISC.pptxCISC.pptx
CISC.pptx
 
RISC AND CISC.pptx
RISC AND CISC.pptxRISC AND CISC.pptx
RISC AND CISC.pptx
 
R&c
R&cR&c
R&c
 
Computer Organization.pptx
Computer Organization.pptxComputer Organization.pptx
Computer Organization.pptx
 
Embedded System IoT_4.pptx ppt presentation
Embedded System  IoT_4.pptx ppt presentationEmbedded System  IoT_4.pptx ppt presentation
Embedded System IoT_4.pptx ppt presentation
 
Microcontroller architecture
Microcontroller architectureMicrocontroller architecture
Microcontroller architecture
 
Central processing unit
Central processing unitCentral processing unit
Central processing unit
 
software engineering CSE675_01_Introduction.ppt
software engineering CSE675_01_Introduction.pptsoftware engineering CSE675_01_Introduction.ppt
software engineering CSE675_01_Introduction.ppt
 
CS304PC:Computer Organization and Architecture Session 30 RISC.pptx
CS304PC:Computer Organization and Architecture Session 30 RISC.pptxCS304PC:Computer Organization and Architecture Session 30 RISC.pptx
CS304PC:Computer Organization and Architecture Session 30 RISC.pptx
 
esunit1.pptx
esunit1.pptxesunit1.pptx
esunit1.pptx
 
CSE675_01_Introduction.ppt
CSE675_01_Introduction.pptCSE675_01_Introduction.ppt
CSE675_01_Introduction.ppt
 
CSE675_01_Introduction.ppt
CSE675_01_Introduction.pptCSE675_01_Introduction.ppt
CSE675_01_Introduction.ppt
 

Recently uploaded

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

RISC Vs CISC Computer architecture and design

  • 2. Classification of Microprocessors: • The classification based on – the word length, – the architecture i.e. Instruction Set of the microprocessor. • These are categorized into RISC and CISC.
  • 3. Before start ! RISC is the way to make hardware simpler whereas CISC is the single instruction that handles multiple work.
  • 4. RISC • Definition – stands for Reduced Instruction Set Computers. – is a type of microprocessor architecture that utilizes a small, highly-optimized set of instructions, – The main idea behind this, is • to simplify hardware by using an instruction set composed of a few basic steps for loading, evaluating, and storing operations just like – a load command will load data, – a store command will store the data. • Examples: SPARC, POWER PC, etc.
  • 5. Characteristics of RISC • Simpler instruction, hence simple instruction decoding. • Instruction comes undersize of one word. • Instruction takes a single clock cycle to get executed. • More general-purpose registers. • Simple Addressing Modes. • Fewer Data types. • A pipeline can be achieved.
  • 6. Advantages of RISC • Simpler instructions: • RISC processors use a smaller set of simple instructions, • which makes them easier to decode and execute quickly. • This results in faster processing times. • Faster execution: • Because RISC processors have a simpler instruction set, • they can execute instructions faster than CISC processors. • Lower power consumption: • RISC processors consume less power than CISC processors, • making them ideal for portable devices.
  • 7. Disadvantages of RISC • More instructions required: • RISC processors require more instructions to perform complex tasks than CISC processors. • Increased memory usage: • RISC processors require more memory to store the additional instructions needed to perform complex tasks. • Higher cost: • Developing and manufacturing RISC processors can be more expensive than CISC processors.
  • 8. Complex Instruction Set Architecture (CISC) • The main idea is that a single instruction will do all loading, evaluating, and storing operations just like – a multiplication command will do stuff like • loading data, • evaluating, • storing it, – hence it’s complex. • Examples: Intel architecture, AMD
  • 9. Characteristics of CISC • Complex instruction, hence complex instruction decoding. • Instructions are larger than one-word size. • Instruction may take more than a single clock cycle to get executed. • Less number of general-purpose registers as operations get performed in memory itself. • Complex Addressing Modes. • More Data types.
  • 10. Advantages of CISC • Reduced code size: • CISC processors use complex instructions that can perform multiple operations, • reducing the amount of code needed to perform a task. • More efficient memory: • Because CISC instructions are more complex, • they require fewer instructions to perform complex tasks, • This can result in more memory-efficient code. • Widely used: • CISC processors have been in use for a longer time than RISC processors, • so they have a larger user base and more available software.
  • 11. Disadvantages of CISC • Slower execution: • CISC processors take longer to execute instructions because • they have more complex instructions and • need more time to decode them. • More complex design: • CISC processors have more complex instruction sets, • which makes them more difficult to design and manufacture. • Higher power consumption: • CISC processors consume more power than RISC processors • because of their more complex instruction sets.
  • 12. Example: Multiplying Two Numbers in Memory • The figure in the next slide is a diagram representing the storage scheme for a generic computer. • The main memory is divided into locations numbered from (row) 1: (column) 1 to (row) 6: (column) 4. • The execution unit is responsible for carrying out all computations. • However, the execution unit can only operate on data that has been loaded into one of the six registers (A, B, C, D, E, or F).
  • 13.
  • 14. Example: Multiplying Two Numbers in Memory • Let's say we want to find the product of two numbers – one stored in location 2:3 and another stored in location 5:2 – then store the product back in the location 2:3.
  • 15. Cont. example: The CISC Approach • The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. • This is achieved by building processor hardware – that is capable of understanding and executing a series of operations. • For this particular task, – a CISC processor would come prepared with a specific instruction (we'll call it "MULT"). • When executed, this instruction – loads the two values into separate registers, – multiplies the operands in the execution unit, – stores the product in the appropriate register. • Thus, the entire task of multiplying two numbers can be completed with one instruction: – MULT 2:3, 5:2
  • 16. • For instance, – if we let "a" represent the value of 2:3 and "b" represent the value of 5:2, then this command is identical to the C statement "a = a * b." • One of the primary advantages of this system is – that the compiler has to do very little work to translate a high-level language statement into assembly. • Because the length of the code is relatively short, – very little RAM is required to store instructions. • The emphasis is put on building complex instructions directly into the hardware. Cont. example: The CISC Approach
  • 17. • RISC processors only use simple instructions that can be executed within one clock cycle. • Thus, the "MULT" command described above could be divided into three separate commands – "LOAD," which moves data from the memory bank to a register, – "PROD," which finds the product of two operands located within the registers, and – "STORE,“ which moves data from a register to the memory banks. Cont. example: The RISC Approach
  • 18. • In order to perform the exact series of steps described in the CISC approach, a programmer would need to code four lines of assembly: – LOAD A, 2:3 – LOAD B, 5:2 – PROD A, B – STORE 2:3, A Cont. example: The RISC Approach
  • 19. • At first, this may seem like a much less efficient way of completing the operation. – Because there are more lines of code, • more RAM is needed to store the assembly level instructions. – The compiler must also perform more work to convert a high-level language statement into code of this form. Cont. example: The RISC Approach
  • 20. • However, the RISC strategy also brings some very important advantages. – 1 Because each instruction requires only one clock cycle to execute, • the entire program will execute in approximately the same amount of time as the multi-cycle "MULT" command. • These RISC "reduced instructions" require less transistors of hardware space than the complex instructions, leaving more room for general purpose registers. • Because all of the instructions execute in a uniform amount of time (i.e. one clock), pipelining is possible. Cont. example: The RISC Approach
  • 21. • 2- Separating the "LOAD" and "STORE" instructions actually reduces the amount of work that the computer must perform. Cont. example: The RISC Approach
  • 22. • 3- After a CISC-style "MULT" command is executed, – the processor automatically erases the registers. – If one of the operands needs to be used for another computation, • the processor must re-load the data from the memory bank into a register. – In RISC, the operand will remain in the register until another value is loaded in its place. Cont. example: The RISC Approach
  • 23. Difference between CISC and RISC • Here, are important differences between CISC vs. RISC
  • 24. Difference between CISC and RISC • RISC • CISC Focus on software Focus on hardware Uses only Hardwired control unit Uses hardwired & microprogrammed control unit Fixed sized instructions Variable sized instructions An instruction fit in one word. (mostly 32-bits) Instructions are larger than the size of one word Requires more number of registers Requires less number of registers
  • 25. Difference between CISC and RISC RISC CISC Simple addressing formats are supported. Only base and displacement addressing is allowed. Multiple formats are supported for specifying operands. A memory operand specifier can have many different combinations of displacement, base, and index register. Simple and limited addressing modes. Complex and more addressing modes.
  • 26. Difference between CISC and RISC RISC CISC It consumes low power. It consumes more/high power. RISC is highly pipelined. CISC is less pipelined. RISC required more RAM for storing codes for storing codes. CISC required less RAM for storing codes. Code size is large Code size is small An instruction executed in a single clock cycle Instruction takes more than one clock cycle
  • 27. CISC and RISC Convergence • Because a number of advancements are used by both RISC and CISC processors, – the lines between the two architectures have begun to blur. • In fact, the two architectures almost seem to have adopted the strategies of the other. • Because processor speeds have increased, – CISC chips are now able to execute more than one instruction within a single clock. – This also allows CISC chips to make use of pipelining.
  • 28. CISC and RISC Convergence • With other technological improvements, – it is now possible to fit many more transistors on a single chip. – This gives RISC processors enough space to incorporate more complicated, CISC-like commands. • RISC chips also make use of more complicated hardware, – making use of extra functional units for superscalar execution. • All of these factors have led some groups to argue that we are now in a "post-RISC" era, – in which the two styles have become so similar that distinguishing between them is no longer relevant.
  • 29. CISC and RISC Convergence • However, it should be noted that RISC chips still retain some important behaviors. • RISC chips – strictly utilize uniform, single-cycle instructions. – They also retain the register-to-register, load/store architecture. – despite their extended instruction sets, • RISC chips still have a large number of general purpose registers.
  • 30. RISC Roadblocks • Despite the advantages of RISC based processing, – RISC chips took over a decade to gain a foothold in the commercial world. – This was largely due to a lack of software support. • although Apple's Power Macintosh line featured RISC-based chips and Windows NT was RISC compatible, – Windows 3.1 and Windows 95, and later versions were designed with CISC processors in mind. – Many companies were unwilling to take a chance with the emerging RISC technology.
  • 31. RISC Roadblocks • Without commercial interest, – processor developers were unable to manufacture RISC chips in large enough volumes to make their price competitive. • Another major setback was the presence of Intel. – Although their CISC chips were becoming increasingly awkward and difficult to develop, • Intel had the resources to plow through development and produce powerful processors. – Although RISC chips might surpass Intel's efforts in specific areas, • the differences were not great enough to persuade buyers to change technologies.
  • 32. EPIC • It stands for Explicitly Parallel Instruction Computing • The best features of RISC and CISC processors are combined in the architecture. • It implements parallel processing of instructions rather than using fixed-length instructions. • The working of EPIC processors is supported by using – a set of complex instructions that contain both basic instructions as well as the information of execution of parallel instructions. • It substantially increases the efficiency of these processors.