SlideShare a Scribd company logo
1 of 27
CPU Organization
Instruction Formats
Addressing Modes
RISC and CISC Characteristics
Central Processing Unit
Introduction
General Register Organization
Stack Organization
 Can be implemented in two ways:
 Register Stack
 Memory Stack
Register Stack
Memory Stack
Instruction Formats
 Depend on the organization of the computer. There
are mainly following types of organization:
 Accumulator Based Organization
 Register Based Organization
 Stack Based Organization
Instruction Formats
 Zero Address Instruction
 One Address Instruction
 Two Address Instruction
 Three Address Instruction
 RISC Instruction
Addressing Modes
 Implied Mode
 Immediate Mode
 Register Mode
 Register Indirect Mode
 Auto increment or Auto decrement Mode
 Direct Addressing Mode
 Indirect Addressing Mode
 Relative Addressing Mode
 Indexed Addressing Mode
 Base Register Addressing Mode
CISC
 CISC is a philosophy for designing chips that are easy to
program and which make efficient use of memory.
It stands for - Complex Instruction Set Computer
 Each instruction in a CISC instruction set might perform a
series of operations inside the processor.
 This reduces the number of instructions required to
implement a given program. In general terms, the
instruction sets are designed for the convenience of the
assembly-language programmer
CISC…
 The CISC philosophy made more sense, since the earliest
machines were programmed in assembly language and
memory was slow and expensive
 The design constraints that led to the development of CISC
are
• small amounts of slow memory and
• the fact that most early machines were programmed in
assembly language
CISC: Microprogramming
 The earliest processor designs used dedicated (hardwire)
logic to decode and execute each instruction in the
processor's instruction set.
 This worked well for simple designs with few registers, but
made more complex architectures hard to build, as control
path logic can be hard to implement.
 So, designers switched tactics - they built some simple logic
to control the data paths between the various elements of
the processor, and used a simplified microcode instruction
set to control the data path logic. This type of
implementation is known as a microprogrammed
implementation.
Ideal CISC machine
 CISC processors were designed to execute each instruction
completely before beginning the next instruction. (Similar
to Run To Completion (RTC) model in Co-operative
Schedulers)
 Even so, most processors break the execution of an
instruction into several definite stages; as soon as one stage
is finished, the processor passes the result to the next stage
Ideal CISC machine…
 Four stages in a typical CISC machine:
• An instruction is fetched from main memory.
• The instruction is decoded: the controlling code from the
microprogram identifies the type of operation to be performed,
where to find the data on which to perform the operation, and
where to put the result. If necessary, the processor reads in
additional information from memory.
• The instruction is executed: the controlling code from the
microprogram determines the circuitry/hardware that will
perform the operation.
• The results are written to memory.
CISC advantages:
 As each instruction is more capable, fewer instructions
could be used to implement a given task. This made more
efficient use of the relatively slow main memory.
 Microprogramming is as easy as assembly language to
implement, and much less expensive than hardwiring a
control unit.
 The ease of micro coding new instructions allowed
designers to make CISC machines upwardly compatible.
 Because microprogram instruction sets can be written to
match the constructs of high-level languages, the compiler
does not have to be as complicated.
CISC disadvantages:
 Many specialized instructions aren't used frequently
enough to justify their existence - approximately 20% of the
available instructions are used in a typical program.
 Earlier generations of a processor family generally were
contained as a subset in every new version - this made the
machines compatible - but the instruction set & chip
hardware become more complex with each generation of
computers.
 Different instructions take different amount of clock time to
execute, due to their variable length, slowing down the
overall performance of the machine.
RISC
 RISC is a microprocessor that is designed to perform a
smaller number computer instructions so that it can
operate at a higher speed.
It stands for - Reduced Instruction Set Computer
 John Cocke of IBM Research in Yorktown, New York,
originated the RISC concept in 1974 by proving that about
20% of the instructions in a computer did 80% of the work.
 The term itself (RISC) is credited to David Patterson, a
teacher at the University of California in Berkeley
RISC characteristics
 Simple instruction set.
 Same length instructions.
 1 machine-cycle instructions(Pipelining).
 Overlapped Register Widows
RISC’s advantages
 Speed.
Since it uses pipelining concept, its speed is faster
 Simpler hardware.
Because the instruction set of a RISC processor is so simple,
it uses up much less chip space
 Shorter design cycle.
Since RISC processors are simpler than corresponding
CISC processors, they can be designed more quickly
RISC’s disadvantages
 Code Quality
If the programmer (or compiler) does a poor job of instruction
scheduling, the processor can spend quite a bit stalling:
waiting for the result of one instruction before it can proceed
with a subsequent instruction.
Since the scheduling rules can be complicated, most
programmers use a high level language (such as C or C++) and
leave the instruction scheduling to the compiler.
This makes the performance of a RISC application depend
critically on the quality of the code generated by the compiler.
Therefore, developers (and development tool suppliers such as
Apple) have to choose their compiler carefully based on the
quality of the generated code.
RISC’s disadvantages…
 Code expansion
Code expansion refers to the increase in size that you get
when you take a program that had been compiled for a
CISC machine and re-compile it for a RISC machine. The
exact expansion depends primarily on the quality of the
compiler and the nature of the machine's instruction set.
Since CISC machines perform complex actions with a
single instruction, when RISC machines may require
multiple instructions for the same action, code expansion
can be a problem.
RISC’s disadvantages…
 System Design
They require more instructions, and hence memory, than
CISCs to implement applications.
Another problem the RISC machines faces is that they
require very fast memory systems to feed them
instructions.
Classic Performance Equation
 The Performance Equation
The following equation is commonly used for expressing a
computer's performance ability:
time time cycles instructions
Program cycle instruction program
CISC’s Performance Equation
 CISC approach attempts to minimize the number of
instructions per program, sacrificing the number of cycles
per instruction.
time time cycles instructions
Program cycle instruction program
RISC’s Performance Equation
 RISC does the opposite, reducing the cycles per instruction
at the cost of the number of instructions per program.
time time cycles instructions
Program cycle instruction program
RISC vs CISC
CISC RISC
Complex instructions require
multiple cycles
Reduced instructions take 1 cycle
Many instructions can reference
memory
Only Load and Store instructions
can reference memory
Instructions are executed one at
a time
Uses pipelining to execute
instructions
Few general registers Many general registers
Use micro programmed Control
Unit
Use hardwired Control unit
Large Number of instructions
and many addressing modes
Few instructions and less
addressing modes
Why CISC still lives?
 Why are there still CISC CPUs being developed?
 Why is Intel spending time and money to manufacture the Pentium III and
Pentium 4?
 Answer
The answer is simple, backward compatibility.
The IBM compatible PC is the most common computer in the world. Intel
wanted a CPU that would run all the applications that are in the hands of more
than 100 million users.

More Related Content

What's hot

What's hot (20)

Computer registers
Computer registersComputer registers
Computer registers
 
EE5440 – Computer Architecture - Lecture 2
EE5440 – Computer Architecture - Lecture 2EE5440 – Computer Architecture - Lecture 2
EE5440 – Computer Architecture - Lecture 2
 
Register transfer language & its micro operations
Register transfer language & its micro operationsRegister transfer language & its micro operations
Register transfer language & its micro operations
 
Compiler Design Unit 4
Compiler Design Unit 4Compiler Design Unit 4
Compiler Design Unit 4
 
Micro programmed control
Micro programmed controlMicro programmed control
Micro programmed control
 
Memory organisation ppt final presentation
Memory organisation ppt final presentationMemory organisation ppt final presentation
Memory organisation ppt final presentation
 
Addressing modes ppt
Addressing modes pptAddressing modes ppt
Addressing modes ppt
 
Input Output Organization
Input Output OrganizationInput Output Organization
Input Output Organization
 
Pointers
PointersPointers
Pointers
 
Instruction code
Instruction codeInstruction code
Instruction code
 
Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulation
 
Recursive Function
Recursive FunctionRecursive Function
Recursive Function
 
Instruction cycle
Instruction cycleInstruction cycle
Instruction cycle
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
5bit field
5bit field5bit field
5bit field
 
Register organization, stack
Register organization, stackRegister organization, stack
Register organization, stack
 
Code optimization in compiler design
Code optimization in compiler designCode optimization in compiler design
Code optimization in compiler design
 
Mapping
MappingMapping
Mapping
 
Code Optimization
Code OptimizationCode Optimization
Code Optimization
 
How to execute a C program
How to execute a C  program How to execute a C  program
How to execute a C program
 

Viewers also liked (11)

Computer Architecture
Computer ArchitectureComputer Architecture
Computer Architecture
 
The central processing unit by group 5 2015
The central processing unit by group 5 2015The central processing unit by group 5 2015
The central processing unit by group 5 2015
 
Cpu
CpuCpu
Cpu
 
Central processing unit
Central processing unitCentral processing unit
Central processing unit
 
Decoder for digital electronics
Decoder for digital electronicsDecoder for digital electronics
Decoder for digital electronics
 
Three Central Processing Unit
Three   Central Processing UnitThree   Central Processing Unit
Three Central Processing Unit
 
central processing unit and pipeline
central processing unit and pipelinecentral processing unit and pipeline
central processing unit and pipeline
 
Cpu
CpuCpu
Cpu
 
Central processing unit
Central processing unitCentral processing unit
Central processing unit
 
08. Central Processing Unit (CPU)
08. Central Processing Unit (CPU)08. Central Processing Unit (CPU)
08. Central Processing Unit (CPU)
 
CO Module 5
CO Module 5CO Module 5
CO Module 5
 

Similar to Central processing unit

Question 1. please describe an embedded system in less than 100 word.pdf
Question 1. please describe an embedded system in less than 100 word.pdfQuestion 1. please describe an embedded system in less than 100 word.pdf
Question 1. please describe an embedded system in less than 100 word.pdf
armcomputers
 

Similar to Central processing unit (20)

CS304PC:Computer Organization and Architecture UNIT V_merged_merged.pdf
CS304PC:Computer Organization and Architecture UNIT V_merged_merged.pdfCS304PC:Computer Organization and Architecture UNIT V_merged_merged.pdf
CS304PC:Computer Organization and Architecture UNIT V_merged_merged.pdf
 
Processors used in System on chip
Processors used in System on chip Processors used in System on chip
Processors used in System on chip
 
R&c
R&cR&c
R&c
 
Risc and cisc computers
Risc and cisc computersRisc and cisc computers
Risc and cisc computers
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlow
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlow
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlow
 
Computer Organization.pptx
Computer Organization.pptxComputer Organization.pptx
Computer Organization.pptx
 
Embedded System IoT_4.pptx ppt presentation
Embedded System  IoT_4.pptx ppt presentationEmbedded System  IoT_4.pptx ppt presentation
Embedded System IoT_4.pptx ppt presentation
 
Risc and cisc casestudy
Risc and cisc casestudyRisc and cisc casestudy
Risc and cisc casestudy
 
CISC.pptx
CISC.pptxCISC.pptx
CISC.pptx
 
CS304PC:Computer Organization and Architecture Session 30 RISC.pptx
CS304PC:Computer Organization and Architecture Session 30 RISC.pptxCS304PC:Computer Organization and Architecture Session 30 RISC.pptx
CS304PC:Computer Organization and Architecture Session 30 RISC.pptx
 
risc_and_cisc.ppt
risc_and_cisc.pptrisc_and_cisc.ppt
risc_and_cisc.ppt
 
Risc & cisk
Risc & ciskRisc & cisk
Risc & cisk
 
Question 1. please describe an embedded system in less than 100 word.pdf
Question 1. please describe an embedded system in less than 100 word.pdfQuestion 1. please describe an embedded system in less than 100 word.pdf
Question 1. please describe an embedded system in less than 100 word.pdf
 
CISC & RISC Architecture
CISC & RISC Architecture CISC & RISC Architecture
CISC & RISC Architecture
 
Advanced Processor Power Point Presentation
Advanced Processor  Power Point  PresentationAdvanced Processor  Power Point  Presentation
Advanced Processor Power Point Presentation
 
Microprocessor presentation.pptx
Microprocessor presentation.pptxMicroprocessor presentation.pptx
Microprocessor presentation.pptx
 
Hg3612911294
Hg3612911294Hg3612911294
Hg3612911294
 

More from Kamal Acharya

More from Kamal Acharya (20)

Programming the basic computer
Programming the basic computerProgramming the basic computer
Programming the basic computer
 
Computer Arithmetic
Computer ArithmeticComputer Arithmetic
Computer Arithmetic
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
Session and Cookies
Session and CookiesSession and Cookies
Session and Cookies
 
Functions in php
Functions in phpFunctions in php
Functions in php
 
Web forms in php
Web forms in phpWeb forms in php
Web forms in php
 
Making decision and repeating in PHP
Making decision and repeating  in PHPMaking decision and repeating  in PHP
Making decision and repeating in PHP
 
Working with arrays in php
Working with arrays in phpWorking with arrays in php
Working with arrays in php
 
Text and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPText and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHP
 
Introduction to PHP
Introduction to PHPIntroduction to PHP
Introduction to PHP
 
Capacity Planning of Data Warehousing
Capacity Planning of Data WarehousingCapacity Planning of Data Warehousing
Capacity Planning of Data Warehousing
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
 
Search Engines
Search EnginesSearch Engines
Search Engines
 
Web Mining
Web MiningWeb Mining
Web Mining
 
Information Privacy and Data Mining
Information Privacy and Data MiningInformation Privacy and Data Mining
Information Privacy and Data Mining
 
Cluster Analysis
Cluster AnalysisCluster Analysis
Cluster Analysis
 
Association Analysis in Data Mining
Association Analysis in Data MiningAssociation Analysis in Data Mining
Association Analysis in Data Mining
 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data mining
 
Data Preprocessing
Data PreprocessingData Preprocessing
Data Preprocessing
 
Introduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingIntroduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data Warehousing
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Central processing unit

  • 1. CPU Organization Instruction Formats Addressing Modes RISC and CISC Characteristics Central Processing Unit
  • 4. Stack Organization  Can be implemented in two ways:  Register Stack  Memory Stack
  • 7. Instruction Formats  Depend on the organization of the computer. There are mainly following types of organization:  Accumulator Based Organization  Register Based Organization  Stack Based Organization
  • 8. Instruction Formats  Zero Address Instruction  One Address Instruction  Two Address Instruction  Three Address Instruction  RISC Instruction
  • 9. Addressing Modes  Implied Mode  Immediate Mode  Register Mode  Register Indirect Mode  Auto increment or Auto decrement Mode  Direct Addressing Mode  Indirect Addressing Mode  Relative Addressing Mode  Indexed Addressing Mode  Base Register Addressing Mode
  • 10. CISC  CISC is a philosophy for designing chips that are easy to program and which make efficient use of memory. It stands for - Complex Instruction Set Computer  Each instruction in a CISC instruction set might perform a series of operations inside the processor.  This reduces the number of instructions required to implement a given program. In general terms, the instruction sets are designed for the convenience of the assembly-language programmer
  • 11. CISC…  The CISC philosophy made more sense, since the earliest machines were programmed in assembly language and memory was slow and expensive  The design constraints that led to the development of CISC are • small amounts of slow memory and • the fact that most early machines were programmed in assembly language
  • 12. CISC: Microprogramming  The earliest processor designs used dedicated (hardwire) logic to decode and execute each instruction in the processor's instruction set.  This worked well for simple designs with few registers, but made more complex architectures hard to build, as control path logic can be hard to implement.  So, designers switched tactics - they built some simple logic to control the data paths between the various elements of the processor, and used a simplified microcode instruction set to control the data path logic. This type of implementation is known as a microprogrammed implementation.
  • 13. Ideal CISC machine  CISC processors were designed to execute each instruction completely before beginning the next instruction. (Similar to Run To Completion (RTC) model in Co-operative Schedulers)  Even so, most processors break the execution of an instruction into several definite stages; as soon as one stage is finished, the processor passes the result to the next stage
  • 14. Ideal CISC machine…  Four stages in a typical CISC machine: • An instruction is fetched from main memory. • The instruction is decoded: the controlling code from the microprogram identifies the type of operation to be performed, where to find the data on which to perform the operation, and where to put the result. If necessary, the processor reads in additional information from memory. • The instruction is executed: the controlling code from the microprogram determines the circuitry/hardware that will perform the operation. • The results are written to memory.
  • 15. CISC advantages:  As each instruction is more capable, fewer instructions could be used to implement a given task. This made more efficient use of the relatively slow main memory.  Microprogramming is as easy as assembly language to implement, and much less expensive than hardwiring a control unit.  The ease of micro coding new instructions allowed designers to make CISC machines upwardly compatible.  Because microprogram instruction sets can be written to match the constructs of high-level languages, the compiler does not have to be as complicated.
  • 16. CISC disadvantages:  Many specialized instructions aren't used frequently enough to justify their existence - approximately 20% of the available instructions are used in a typical program.  Earlier generations of a processor family generally were contained as a subset in every new version - this made the machines compatible - but the instruction set & chip hardware become more complex with each generation of computers.  Different instructions take different amount of clock time to execute, due to their variable length, slowing down the overall performance of the machine.
  • 17. RISC  RISC is a microprocessor that is designed to perform a smaller number computer instructions so that it can operate at a higher speed. It stands for - Reduced Instruction Set Computer  John Cocke of IBM Research in Yorktown, New York, originated the RISC concept in 1974 by proving that about 20% of the instructions in a computer did 80% of the work.  The term itself (RISC) is credited to David Patterson, a teacher at the University of California in Berkeley
  • 18. RISC characteristics  Simple instruction set.  Same length instructions.  1 machine-cycle instructions(Pipelining).  Overlapped Register Widows
  • 19. RISC’s advantages  Speed. Since it uses pipelining concept, its speed is faster  Simpler hardware. Because the instruction set of a RISC processor is so simple, it uses up much less chip space  Shorter design cycle. Since RISC processors are simpler than corresponding CISC processors, they can be designed more quickly
  • 20. RISC’s disadvantages  Code Quality If the programmer (or compiler) does a poor job of instruction scheduling, the processor can spend quite a bit stalling: waiting for the result of one instruction before it can proceed with a subsequent instruction. Since the scheduling rules can be complicated, most programmers use a high level language (such as C or C++) and leave the instruction scheduling to the compiler. This makes the performance of a RISC application depend critically on the quality of the code generated by the compiler. Therefore, developers (and development tool suppliers such as Apple) have to choose their compiler carefully based on the quality of the generated code.
  • 21. RISC’s disadvantages…  Code expansion Code expansion refers to the increase in size that you get when you take a program that had been compiled for a CISC machine and re-compile it for a RISC machine. The exact expansion depends primarily on the quality of the compiler and the nature of the machine's instruction set. Since CISC machines perform complex actions with a single instruction, when RISC machines may require multiple instructions for the same action, code expansion can be a problem.
  • 22. RISC’s disadvantages…  System Design They require more instructions, and hence memory, than CISCs to implement applications. Another problem the RISC machines faces is that they require very fast memory systems to feed them instructions.
  • 23. Classic Performance Equation  The Performance Equation The following equation is commonly used for expressing a computer's performance ability: time time cycles instructions Program cycle instruction program
  • 24. CISC’s Performance Equation  CISC approach attempts to minimize the number of instructions per program, sacrificing the number of cycles per instruction. time time cycles instructions Program cycle instruction program
  • 25. RISC’s Performance Equation  RISC does the opposite, reducing the cycles per instruction at the cost of the number of instructions per program. time time cycles instructions Program cycle instruction program
  • 26. RISC vs CISC CISC RISC Complex instructions require multiple cycles Reduced instructions take 1 cycle Many instructions can reference memory Only Load and Store instructions can reference memory Instructions are executed one at a time Uses pipelining to execute instructions Few general registers Many general registers Use micro programmed Control Unit Use hardwired Control unit Large Number of instructions and many addressing modes Few instructions and less addressing modes
  • 27. Why CISC still lives?  Why are there still CISC CPUs being developed?  Why is Intel spending time and money to manufacture the Pentium III and Pentium 4?  Answer The answer is simple, backward compatibility. The IBM compatible PC is the most common computer in the world. Intel wanted a CPU that would run all the applications that are in the hands of more than 100 million users.