define CISC and RISC ?, Basic Computer Science

Assignment Help:
Two competing architectures were developed for improving the architecture of the central processing unit, and different processors are conventional to each one. Both had their power and weaknesses, and as such also had supporters and detractors.
CISC: Complex Instruction Set Computers
Earlier developments were based in the order of the idea that making the CPU more complex and supporting a superior number of potential instructions would lead to amplified performance. This thought is at the root of CISC processors, such as the Intel x 86 ranges, which have very large instruction sets reaching up to and on top of three hundred separate instructions. They also have amplified complexity in other areas, with many more specialized addressing modes and registers also being implemented and variable length of the instruction codes themselves.
Performance was getting better here by allowing the generalization of program compilers, as the range of more advanced instructions available led to fewer refinements having to be made at the compilation process. But, the complexity of the processor hardware and architecture that resulted can cause such chips to be hard to understand and program for, and also means they can be exclusive to produce.
RISC: (Reduced Instruction Set Computers)
In conflict to CISC, the mid-1980s saw the beginnings of the RISC philosophy. The plan here was that the best way to get better performance would be to make simpler the processor workings as much as probable. RISC processors, for example the IBM PowerPC processor, have a greatly simplified and concentrated instruction set, numbering in the region of one hundred instructions or less. Addressing modes are basic back to four or less, and the length of the codes is fixed so as to allow standardization across the instruction set.
Changing the architecture to this extent means that fewer transistors are used to create the processors. This means that RISC chips are much cheaper to produce than their CISC counterparts. As well the reduced instruction set means that the processor can execute the instructions more rapidly, potentially allowing for greater speeds. However, only allowing such easy instructions means a greater burden is placed upon the software itself. Less instructions in the instruction set means a greater stress on the efficient writing of software with the instructions that are accessible. Supporters of the CISC architecture will point out that their processors are of good sufficient performance and cost to make such efforts not worth the problem.
CISC RISC
Large (100 to 300) Instruction Set Small (100 or less)
Complex (8 to 20) Addressing Modes Simple (4 or less)
Specialized Instruction Format Simple
Variable Code Lengths Fixed
Variable Execution Cycles Standard for most
Higher Cost / CPU Complexity Lower
Compilation Simplifies Processor design
Processor design Complicates Software

Related Discussions:- define CISC and RISC ?

Description of external hardware interruptions, External interruptions are...

External interruptions are produced by peripheral devices, for example keyboards, printers, communication cards, etc. They are also produced by coprocessors. It is not achievable t

Comp 100, I have an account in my www.itlab.com and i have a test and it s...

I have an account in my www.itlab.com and i have a test and it should do tonight, so do you have any one to help me and do this test and it is about excel

Turn-around, The term ‘page traffic’ describes

The term ‘page traffic’ describes

String problem, c program to convert S to palindromes with minimum number o...

c program to convert S to palindromes with minimum number of character replacements

Normalization, how we come to know about primary key,if more than ids gathe...

how we come to know about primary key,if more than ids gather?

Accessing folders and printers, Accessing Folders and Printers Accessi...

Accessing Folders and Printers Accessing folders, files and printers of another computer is as easy as accessing another computer. To access folders and printers of another c

Database reports, The first report, Report #1, is to be an ordered list of ...

The first report, Report #1, is to be an ordered list of the contents of the database, sorted in ascending order by a major field. Report #1 is to include all of the fields and rec

Browser security, Browser Security: WWW is used for many applications ...

Browser Security: WWW is used for many applications today including Banking, reservation, trading,  e-commence and many such applications which require security and confidenti

How is python Using Blank Lines and Waiting for the User, A line holds onl...

A line holds only whitespace, probably with a comment, is identified as a blank line, and Python completely avoids it. In an interrelated interpreter session, you need to enter an

Discuss the challenges in it infrastructure management, Question 1 What is...

Question 1 What is difference between cathode ray tube monitors and LCD monitors? List three popular types of operating systems and give brief introduction of each type Que

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd