Fundamental differences between risc and cisc architecture, Computer Engineering

Assignment Help:

Q. Fundamental differences between RISC and CISC architecture?

Fundamental differences between RISC and CISC architecture. The following table lists following differences:

CISC

RISC

1.  Large number of instructions - from

120 to 350.

 

1. Relatively fewer instructions - less than 100.

2. Employs a variety of data types and a large number of addressing modes.

2. Relatively fewer addressing modes.

3. Variable-length instruction formats.

3. Fixed-length instructions generally 32 bits, easy to decode instruction format.

4. Instructions manipulate operands residing in memory.

4. Mostly register-register operations. The only memory access is by explicit LOAD/STORE instructions.

5. Number of Cycles Per Instruction (CPI) varies from 1-20 depending upon the instruction. 

5. Number of CPI is one as it uses pipelining. Pipeline in RISC is optimised due to simple instructions and instruction formats.

6. GPRs varies from 8-32. But no support is available for the parameter passing and function calls.

6. Large number of GPRs are available which are mainly used as Global registers and as a register based procedural call and parameter passing stack so optimised for structured programming. 

7. Microprogrammed Control Unit.

7. Hardwired Control Unit.


Related Discussions:- Fundamental differences between risc and cisc architecture

State the implementation of a security policy, State the implementation of ...

State the implementation of a security policy The implementation of a security policy should invariably cover all parameters of security such as physical access to the server,

Build and explain a prototype model-uml, International Coal Coal-fire...

International Coal Coal-fired Power Generation Compared with other fossil fuels, burning coal produces relatively large amounts of atmospheric pollutants: carbon dioxide

Electrically erasable programmable rom - computer memory, Explain Electrica...

Explain Electrically Erasable Programmable ROM - Computer Memory? The next level of erasability is the EEPROM which able to be erased under software control. This is the most f

Describe the interpretation features of vba, VBA is licensed to Microsoft a...

VBA is licensed to Microsoft and this compatible with and only Microsoft products. Code written is compiled by an intermediate language known as P-code and this is stored in hostin

What problem does the namespace feature solve, Multiple providers of librar...

Multiple providers of libraries may use common global identifiers causing a name collision when an application tries to link with two or more such libraries. The namespace feature

Applications of parallel processing, Applications Of Parallel Processing ...

Applications Of Parallel Processing Parallel computing is an development of serial computing that effort to emulate what has always been the affirm of affairs in the natural wo

What is constrained-random verification, What is Constrained-Random Verific...

What is Constrained-Random Verification ? As ASIC and system-on-chip (SoC) designs continue to increase in size and complexity, there is an equal or greater increase in the si

Thematic analysis - flash design, Thematic Analysis & Interpretation: ...

Thematic Analysis & Interpretation: The next steps in analysis are to move beyond what is literally there in the image (formal visual elements) and examine the meaning they re

What is a pipeline hazard, What is a pipeline hazard? Any condition tha...

What is a pipeline hazard? Any condition that causes the pipeline to stall is known as hazard. They are also known as stalls or bubbles.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd