Fundamental differences between risc and cisc architecture, Computer Engineering

Assignment Help:

Q. Fundamental differences between RISC and CISC architecture?

Fundamental differences between RISC and CISC architecture. The following table lists following differences:

CISC

RISC

1.  Large number of instructions - from

120 to 350.

 

1. Relatively fewer instructions - less than 100.

2. Employs a variety of data types and a large number of addressing modes.

2. Relatively fewer addressing modes.

3. Variable-length instruction formats.

3. Fixed-length instructions generally 32 bits, easy to decode instruction format.

4. Instructions manipulate operands residing in memory.

4. Mostly register-register operations. The only memory access is by explicit LOAD/STORE instructions.

5. Number of Cycles Per Instruction (CPI) varies from 1-20 depending upon the instruction. 

5. Number of CPI is one as it uses pipelining. Pipeline in RISC is optimised due to simple instructions and instruction formats.

6. GPRs varies from 8-32. But no support is available for the parameter passing and function calls.

6. Large number of GPRs are available which are mainly used as Global registers and as a register based procedural call and parameter passing stack so optimised for structured programming. 

7. Microprogrammed Control Unit.

7. Hardwired Control Unit.


Related Discussions:- Fundamental differences between risc and cisc architecture

Update -task updates, Update -task updates are Asynchronous updates.

Update -task updates are Asynchronous updates.

Define the meaning of document and finger print, a. Define the meaning of "...

a. Define the meaning of "Document & Finger print" and "Message & Message Digest". What's the difference among the 2 pairs? b. Describe Davies Meyer scheme with diagram. c. W

Define the message queues, The message queue provides the information about...

The message queue provides the information about sizes of queues under utilization of various processors. It points to size of every processor incoming message queue that would be

Explain about the term false path, Explain about the term false path? How i...

Explain about the term false path? How it find out in circuit? What the effect of false path in circuit? By timing all the paths into the circuit the timing analyzer can find o

Signaling - universal serial bus , Signaling - Universal Serial Bus: U...

Signaling - Universal Serial Bus: USB supports following signaling rates: o   A low speed rate of 1.5 Mbit/s is defined by USB 1.0. This is so much similar to "full speed"

Determine the term- files, Determine the term- Files File maintenance i...

Determine the term- Files File maintenance is significant. Updating of files generally involves inserting, amending and deleting data. Example: A bank would amend data

Calculate print speed of printers, Q. Calculate Print Speed of printers? ...

Q. Calculate Print Speed of printers? Speed at which a printer prints is generally an important issue. Though the printer has to take a certain time to print. Printing time ris

Define password methods and biometric systems, Define the password methods ...

Define the password methods and Biometric systems for implementing client server network security. In cyberspace, buyers and sellers cannot notice each other. Also within video

What is double entry - verification, What is Double entry - Verification ...

What is Double entry - Verification In this approach, data is entered twice (using two different people); data is only accepted if both versions match up. Generally used to ve

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd