Preview

Risk vs Cisk

Satisfactory Essays
Open Document
Open Document
670 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk vs Cisk
Different Kinds of ISAs We have looked at LC3 ISA, which is a classic example of RISC type ISA

RISC vs. CISC
CIT 595 Spring 2007

Reduced Instruction Set Architecture (RISC) emerged around early 80s
• Designers re-evaluating the current ISAs of the era • Found that ISAs had extensive instructions that were complex
Complex Instruction Set Architecture (CISC)

• Need only 20% of the instructions that were used most of the time
1

CIT 595

10 - 2

Complex Instruction Set Computer (CISC)
Memory in those days was expensive bigger program->more storage->more money

Reduced Instruction Set Computer (RISC)
Original idea to reduce the ISA
Provide minimal set of instructions that could carry out all essential operations

Hence needed to reduce the number of instructions per program Number of instructions are reduced by having multiple operations within a single instruction Multiple operations lead to many different kinds of instructions that access memory In turn making instruction length variable and fetch-decodeexecute time unpredictable – making it more complex Thus hardware handles the complexity Example: x86 ISA
CIT 595 10 - 3

Instruction complexity is reduced by 1. Having few simple instructions that are the same length 2. Allowed memory access only with explicit load and store instructions Hence each instruction performs less work but instruction execution time among different instructions is consistent The complexity that is removed from ISA is moved into the domain of the assembly programmer/compiler Examples: LC3, MIPS, PowerPC (IBM), SPARC (Sun)

CIT 595

10 - 4

1

RISC vs. CISC
The difference between CISC and RISC becomes evident through the basic computer performance equation:

Example for RISC vs. CISC
Consider the the program fragments: mov ax, 0 mov bx, 10 mov cx, 5 add ax, bx loop Begin

CISC

mov ax, 10 mov bx, 5 mul bx, ax

RISC

Begin

RISC systems shorten execution time by reducing the clock cycles per

You May Also Find These Documents Helpful

  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    1. What is an instruction? – A sequence of bits understood by the processor to signal a certain action…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The second category of fault changes individual instructions in the text segment. These faults are intended to approximate the assembly-level manifestation of real C-level programming…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2670 Final Exam Paper

    • 408 Words
    • 2 Pages

    A – 64 – bit architecture, B – separation of roles, C – unlimited database size, D – Support for new business requirements such as UM and…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    En1320 Unit 1 Research Paper 1

    • 27742 Words
    • 111 Pages

    is extensively discussed in other works and is not the focus of this guide. The second…

    • 27742 Words
    • 111 Pages
    Powerful Essays
  • Satisfactory Essays

    Quiz Comp Archi

    • 438 Words
    • 3 Pages

    11) What are the differences of CISC and RISC architectures? Why ARM architecture is favorable to the mobile device?…

    • 438 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It’s an N-tier API of IIS and consists of two components: extensions and filters. These are the only two types of applications that can be developed using ISAPI, they must be compiled into DLL files which are then registered with IIS to be run on the web server. ISAPI extensions are true applications that run on IIS, ISAPI filters are used to modify or enhance the functionality provided by IIS.…

    • 411 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Risk Scenario

    • 4258 Words
    • 18 Pages

    The issue of risk scenario carries immense importance for most of the hospitals that are part of the healthcare setting. However, there is not only one scenario that can affect the hospitals but there are several scenarios that can create an impact on the functions of the hospital. There are three scenarios that would be highlighted in the current topic. These three scenarios have a tendency to put a hospital at risk for financial stability. The first scenario that can produce a negative impact on the hospital risk is related to patient care and safety. The second scenario is related to the physical plant. The third and last scenario is related to staffing. The role of HIM practitioner in this regard would be very important. They would serve as a clinical quality assessment resource and as a team member to perform their tasks related to healthcare work. Therefore, all the issues related to three scenarios will be discussed in detail.…

    • 4258 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Faith Integration

    • 613 Words
    • 3 Pages

    The processor could keep track of what locations are associated with each process and limit access to locations that are outside of a program's extent. By using base and limits registers and by performing a check for every memory access, information regarding the extent of a program's memory could be maintained…

    • 613 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It allows multiple applications to run in parallel while extracting the maximum performance from every processing core.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    microprocessor chip in addition to their memory chips, sort of like a three legged stool, memory,…

    • 695 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In the past, MS-DOS, a 16-bits operating system (OS), dominates the OS for PCs. For those 32-bits computers i.e. 386/486/586/Pentium, processing speed are reduced because of under-utilize of the other 16-bits.…

    • 1608 Words
    • 7 Pages
    Better Essays
  • Better Essays

    ➢ Adv: One chip can run a range of programs. That 's why you don 't need separate computers for different jobs, such as crunching spreadsheets or editing digital photos…

    • 7887 Words
    • 32 Pages
    Better Essays
  • Satisfactory Essays

    Ans: OCR (Optical Character Recognition) is a computer software designed to translate image of type written test.…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sa3Dany

    • 270 Words
    • 2 Pages

    Trace the following code showing the changes in the value of each variable as the instructions are executed and the output displayed on the screen. Use '-' to show the width of the output field. (To get full grade you have to show all tracing steps)…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bill of right

    • 896 Words
    • 17 Pages

    Only SI, DI and BX can be used inside [ ] from memory addressing point of view. From…

    • 896 Words
    • 17 Pages
    Satisfactory Essays

Related Topics