What Is RISC?
Reduction Instruction Set Computer (RISC) is a
multiprocessor particularly designed to process limited computer instructions
in order to operate at a much higher speed. On any given system, there are
many programs and many instructions being executed. It was discovered that
only 10% of all instructions were frequently executed, and that the other 90%
clogged the pipeline, thus contributing to the system slowness.
What Is CISC?
Unlike the RISC model,
Complex Instruction Set Computer (CISC) is a processor which is
developed with a full (i.e. complex) set of instructions. The aim with this
full instruction set is to provide the full processor capacity in the most
efficient manner. RISC models proved, however, that better efficiency was
achieved by reducing the set of instructions.
Difference between RISC and CISC
RISC
- Richer instruction set, some simple, some very complex.
- Instructions generally take more than 1 clock to execute.
- Instructions of a variable size.
- Instruction interface with memory in multiple mechanism with complex addressing modes.
- No pipelining
- Upward compatibility with a family
- Microcode control
- Work well with simpler compiler.
CISC
- Simple primitive instructions and addressing modes.
- Instructions execute in one clock cycle.
- Uniformed length instructions and fixed instructions format.
- Pipelining.
- Instructions set is orthogonal (little overlapping of instructions functionality).
- Hardwired control.
- Complexity pushed to the compiler.
Disclaimer
All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.
0 comments:
Post a Comment
For Any Tech Updates, Hacking News, Internet, Computer, Technology and related to IT Field Articles Follow Our Blog.