Skip to main content

Definition of RISC and CISC ARCHITECTURE and their difference | Computer science fundamentals tutorial


RISC (Reduced Instruction set computer) AND CISC(Complex instruction set computer) ARCHITECTURE

RISC(Reduced Instruction set computer): -
Main idea behind is to make hardware simpler by using an instruction set composed of a few basic steps for loading, evaluating and storing operation just like load command will load data, store command will store data.
Characteristic of RISC architecture:-
1. Simpler instructions, hence simple instruction decoding.
2. Instruction come under size of one word.
3. Instruction take single clock cycle to get executed.
4. More number of general purpose register.
5. Simple addressing mode.
6. Less data type.
7. Pipelining can be achieved.
CISC(Complex instruction set computer): -
Main idea is to make hardware complex as a single instruction will do all loading evaluating and storing operation just like a multiplication command will do stuff like loading data, evaluating and storing it.
Characteristic of CISC architecture: - 
1. Complex instruction  hence complex instruction decoding.
2. Instruction are larger than one word size.
3. Instruction may take more than single clock cycle to get executed.
4. Less number of general purpose register as operation get performed in memory itself.
5. Complex addressing mode.
6. More data type.

** NOTE**
Both approaches try to increase CPU performance. RISC reduce the cycle per instruction at the cost of increase in the number of  instruction and CISC approach attempt the minimize the number of instruction per program but at the cost of increase in the number of cycle per instruction.

Comparison between RISC(Reduced Instruction set computer) and CISC(Complex instruction set computer)



Characteristic
RISC(Reduced Instruction set computer)
CISC(Complex instruction set computer)
Instruction set size and instruction format
1. Instruction set is small and format is fixed.
1. Instruction set is very large and instruction format is variable 16 to 64 bit per instruction.
Addressing mode
2. Addressing mode of RISC is between 3 to 5
2. Addressing mode of CISC is between 12 to 24.
CPI( Cycle per instruction)
3. In more cases is 1 but average CPI is 1.5.
3. CPI is between 2- 15.
CPU control
4. CPU is control by hardware without control memory.
4. CPU control by control memory using micro program.
General purpose register and cache design
5. Through most instruction are register based. So larger number of registers 32-192 are used and cache is split in data cache and instruction cache.  
5. 8 to 34 general purpose register is present. Unified cache is used for instruction and data.

Comments

Popular posts from this blog

type casting in C. - computer science fundamentals tutorial

Typecasting in C Typecasting is also known as "forced conversion". It refers to changing variable one data type to another data type.          Typecasting in can be certified into following two types: - 1) Implicit type casting. 2) Explicit type casting. Implicit type casting : - It is also known as "Automatic type conversion". It is done by compiler on its own without any external trigger from user. Generally takes place when in an expression more than one data type is present in such condition. Type conversion take places to avoid data lose. Example : - #include<stdio.h> main() {   char y = 'a';   int b = y; printf("%c",y); printf("%d",b); } Explicit Type casting : - This process also called 'Type casting' and it is user defined . Here the user can type cast the result to make it of particular data type. Example : - #include<stdio.h> main() { int m...

Important MCQ of RDBMS( Relational database management system)-FCST

Important MCQ of RDBMS  1. A RDBMS consists a collection of ? a. Tables b. Fields c. Records d. Keys  ANS/- a. table 2. The term attribute refers to a ___________ of a table a. Record b. Tuple c. Column d. Key   ans/- c. Column 3. In relational model, the row of table is known to be ?  a. Relation b. Entity field c. Tuple d. Attribute  ans/- C. Tuple 4. . Address field of a person should not be part of primary key, since it is likely to ? a. Dependent b. Too long c. Changed d. Not changed  ans/- c. Changed 5. The relational model is concerned with ? a. Data structure and Data integrity b. Data Manipulation c. Both a and b d. None of these  ans/- c. Both a and b 6. Which is the false statement from the following ? a. A veiw is a named derived table b. A name relation is variable c. A veiw is a named reation and is virtual d. None of these  ans/- d. None of these 7. The union of primary key...

Solve-write C program to find grade of student by using nested else-if statement

C program to find grade of student by using nested else-if statement Problem Description This program take input as your number then show your grade. Problem Solution 1. enter your marks as input. 2. then check your marks with 'If' block's condition. if it satisfied then show your grade as output. 3. if it not satisfied then it checks with all else-if block's condition repeatedly. 4. print the grade according to your given marks as input and exit. Program codes:-   #include<stdio.h> main() { int n; printf("\n enter the marks:"); scanf("%d",&n); if(n>89) printf("O"); else if(n>79) printf("E"); else if(n>69) printf("A"); else if(n>59) printf("B"); else if(n>49) printf("C"); else if(n>39) printf("D"); else printf("F"); } Program explanation:- 1. enter your marks. for example we take 70 . ...