Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

RISC Vs CISC

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

Embedded Systems

Topic : RISC vs CISC

Dr. Parth S. Thakar

Assistant Professor, ECE, PDEU


Multiplying Two Numbers in Memory
• The simplest way to examine the
advantages and disadvantages of RISC
architecture is by contrasting it with it's
predecessor: CISC (Complex Instruction
Set Computers) architecture.
• On the right is a diagram representing the
storage scheme for a generic computer.
The main memory is divided into locations
numbered from (row) 1: (column) 1 to
(row) 6: (column) 4.
Multiplying Two Numbers in Memory
• The execution unit is responsible for carrying out all computations.
However, the execution unit can only operate on data that has been
loaded into one of the six registers (A, B, C, D, E, or F).

• Let's say we want to find the product of two numbers - one stored in
location 2:3 and another stored in location 5:2 - and then store the
product back in the location 2:3.
The CISC Approach
• The primary goal of CISC architecture is to complete a task in as few lines of assembly as
possible.

• This is achieved by building processor hardware that is capable of understanding and


executing a series of operations.

• For this particular task, a CISC processor would come prepared with a specific instruction (we'll
call it "MULT").

• When executed, this instruction loads the two values into separate registers, multiplies the
operands in the execution unit, and then stores the product in the appropriate register.

• Thus, the entire task of multiplying two numbers can be completed with one instruction:

MULT 2:3, 5:2


The CISC approach (cont..)
• MULT is what is known as a "complex • Advantages :
instruction.“
One of the primary advantages of this
system is that the compiler has to do
• It operates directly on the computer's very little work to translate a high-level
memory banks and does not require the language statement into assembly.
programmer to explicitly call any loading or
storing functions. Because the length of the code is
relatively short, very little RAM is
required to store instructions.
• It closely resembles a command in a higher
level language. For instance, if we let "a" The emphasis is put on building
represent the value of 2:3 and "b" represent complex instructions directly into the
the value of 5:2, then this command is hardware.
identical to the C statement "a = a * b."
The RISC Approach
• RISC processors only use simple instructions that can be executed within
one clock cycle.

• Thus, the "MULT" command described above could be divided into three
separate commands: "LOAD," which moves data from the memory bank to
a register, "PROD," which finds the product of two operands located within
the registers, and "STORE," which moves data from a register to the
memory banks.

• In order to perform the exact series of steps described in the CISC


approach, a programmer would need to code four lines of assembly:
RISC approach (cont..)
• At first, this may seem like a much less efficient way of completing the operation.
Because there are more lines of code, more RAM is needed to store the assembly
level instructions. The compiler must also perform more work to convert a high-
level language statement into code of this form.

LOAD A, 2:3
LOAD B, 5:2 • Because each instruction requires only one clock cycle to execute, the entire
PROD A, B program will execute in approximately the same amount of time as the multi-cycle
STORE 2:3, A "MULT" command. These RISC "reduced instructions" require less transistors of
hardware space than the complex instructions, leaving more room for general
purpose registers. Because all of the instructions execute in a uniform amount of
(Multiplication in RISC) time (i.e. one clock), pipelining is possible.

• Separating the "LOAD" and "STORE" instructions actually reduces the amount of
work that the computer must perform. After a CISC-style "MULT" command is
executed, the processor automatically erases the registers. If one of the operands
needs to be used for another computation, the processor must re-load the data
from the memory bank into a register. In RISC, the operand will remain in the
register until another value is loaded in its place.
The Performance Equation
• The following equation is commonly used for expressing a computer's performance
ability:

• The CISC approach attempts to minimize the number of instructions per program,
sacrificing the number of cycles per instruction. RISC does the opposite, reducing the
cycles per instruction at the cost of the number of instructions per program.
RISC
Roadblocks
• Although Apple's Power Macintosh line featured RISC-based
chips and Windows NT was RISC compatible, Windows 3.1 and
Windows 95 were designed with CISC processors in mind.

• Many companies were unwilling to take a chance with the


emerging RISC technology. Without commercial interest,
processor developers were unable to manufacture RISC chips in
large enough volumes to make their price competitive.

• Another major setback was the presence of Intel. Although their Despite the advantages of RISC
CISC chips were becoming increasingly unwieldy and difficult to based processing, RISC chips
develop, Intel had the resources to plow through development took over a decade to gain a
and produce powerful processors. Although RISC chips might
surpass Intel's efforts in specific areas, the differences were not foothold in the commercial
great enough to persuade buyers to change technologies. world. This was largely due to a
lack of software support.
The Overall RISC Advantage
• Today, the Intel x86 is arguable the only chip which retains CISC
architecture.

• This is primarily due to advancements in other areas of computer


technology. The price of RAM has decreased dramatically. In 1977,
1MB of DRAM cost about $5,000. By 1994, the same amount of
memory cost only $6 (when adjusted for inflation).

• Compiler technology has also become more sophisticated, so that the


RISC use of RAM and emphasis on software has become ideal.

You might also like