CAO CiscRisc
CAO CiscRisc
The execution process typically follows a cycle known as the Instruction Cycle, which includes several stages:
1. Fetch:
The CPU retrieves the instruction from memory. The Program Counter (PC) holds the address of the next instruction.
The instruction is fetched from the memory address in the PC and loaded into the Instruction Register (IR).
2. Decode:
The fetched instruction is then decoded to determine what action needs to be performed.
The instruction's opcode (operation code) is analyzed, and the necessary signals are sent to the appropriate parts of the
CPU.
3. Fetch Operands (if needed):
If the instruction requires operands, they are fetched from registers or memory.
Depending on the addressing mode, this could involve additional memory accesses.
4. Execute:
The actual operation specified by the instruction is performed. This could involve arithmetic or logic operations, data
transfers, or control instructions.
For example, if it is an arithmetic operation like ADD, the values are added, and the result is stored.
5. Write Back:
The result of the execution is written back to the appropriate location (e.g., a register or memory).
6. Update Program Counter:
The PC is updated to point to the next instruction in the sequence, and the cycle begins again.
This entire process can be summarized as the Fetch-Decode-Execute cycle and occurs continuously until the program
execution is complete or an interrupt occurs.
Example of Instruction Execution:
Consider an ADD instruction that adds the contents of two registers, say R1 and R2,
and stores the result in R3:
Manages system-level control over the processor and influences how the processor interacts
with external devices, memory, and the operating system.
Contains fields that control execution modes, memory access, privilege levels, and interrupt
handling.
Primarily deals with the overall system's operational state and environment control.
Reflects the outcome of instruction execution and holds status flags such as carry, zero, sign,
and overflow.
Primarily used for controlling the flow of execution based on the results of instructions and
handling processor-level tasks such as branching and interrupt handling.
More focused on the processor’s internal status during instruction execution rather than
system-level control.
Introduction
What is Computer Architecture? Instruction Set Architecture (ISA)?
Computer architecture refers to the design of ISA serves as an interface between hardware and
computer systems, including their instruction sets, software.
memory hierarchy, and CPU organization. It defines set of instructions that a processor can
execute & how they are encoded.
ISA impacts the performance, power consumption, and
software compatibility of a processor.
CISC
Instruction Set Architecture (ISA)
RISC
Evolution of CISC and RISC Architectures
CISC (Complex Instruction Set Computer): Developed in the 1970s, CISC aimed to reduce the number of
Instruction needed per program, often including complex instructions that could perform multiple
operations.
RISC(Reduced Instruction Set Computer): Introduced in the 1980s, RISC focused on simplifying the
instruction set by using a smaller set of simple and efficient instructions, with the goal of improving
performance by executing instructions faster.
Instruction Set Architecture (ISA) - for Computer
+ CISC (Complex Instruction Set Computer) A computer with a large number of instructions is
CISE have large number of instructions to classified as a Complex Instruction Set
Computer, or CISC. (Developed in 1970s)
write efficient programs
In the early 1980s, a number of computer
* RISC (Reduced Instruction Set Computer) designers recommended that computers use
RISC have small number of simple, frequently fewer instructions with simple constructs so they
used can be executed much faster within the CPU
without having to use memory as often. This
type of computer is classified as a Reduced
Instruction Set Computer or RISC.
CISC (Complex Instruction Set Computer)
CISC is a computer architecture that emphasizes a large and complex instruction set.
CISC processors have many instructions that can perform multiple operations in a
single instruction.
CISC used in PC, desktop computers, laptops, Workstations
Intel x86 Architecture: CISC processors include the x86 architecture used in most
desktop and laptop computers today. The x86 family of processors, including Intel's
Pentium, Core i7, and Xeon series, follows a CISC architecture. These processors
support a wide range of complex instructions, including arithmetic, memory access,
and string manipulation.
For instance, the ADD instruction can add two numbers, load data from memory,
and store the result-all in a single instruction.
Motorola 68k Series: The Motorola 68000 series is another classic example of CISC
architecture. These processors were widely used in early personal computers and
workstations. They featured complex instructions for handling various data types and
addressing modes.
CISC
Advantages of CISC:
Disadvantages of CISC:
Advantages of RISC:
Disadvantages of RISC:
It is original microprocessor ISA Redesigned ISA that emerged in the early 1980s
It uses a large number of instructions (typically from 100- It uses relatively few instructions.
250 instruction) It uses relatively few addressing modes typically from 3
It uses a large number of addressing modes typically to 5.
from 5 to 20 diffeent modes). It uses fixed length instruction format (typically 32 bit
It uses variable length instruction formats (typically 16 to format).
64 bit per instructions) Simple instructions taking single-clock cycles to execute.
Complex instructions taking multiple-clock cycles to It uses relatively large number of registers (from 32 to
execute. 192)
It uses fewer general purpose registers (ranging from 8 to Only LOAD and STORE instructions reference to
24) Memory
Any nstruction may reference to Memory It uses hardwired control unit.
It uses microprogrammed control unit. All the instructions available in RISC are executed
Not pipelined or less pipelined. Pipeline is difficult directly by the hardwired control.
CISC are relatively expensive and complex to design Highly pipelined. Pipeline is easy.
Examples: Intel and AMD architecture used in PC, RISC are inexpensive and easier to design
Laptop, Desktop Computers, Workstations Examples: ARM, MIPS, PowerPC architecture used in
Mobile, tablets, embedded systems, routers