The presentation discusses RISC (Reduced Instruction Set Computer), a microprocessor architecture that uses a small set of optimized instructions for efficiency. It highlights the history, characteristics, and design principles of RISC, including simplified instruction execution, large register sets, and fixed-length instructions. RISC architectures are widely utilized in modern devices like cell phones and tablets, enabling faster microprocessor development.
RISC is atype of microprocessor architecture that utilizes a small,
highly-optimized set of instructions, rather than a more specialized
set of instructions often found in other types of architectures.
WHAT
IS
RISC???
4
5.
History Of RISC:
1.RISC approach developed as a result of development in
1970âs.
2. Increase in memory size.
3. Decrease in cost.
4. Advanced compilers.
5. In late 1970âs IBM was the first to start.
6. In 1980 , David Patterson ,began the project that gives
this approach RISC.
5
6.
Characteristics Of RISC:
Simplifiedinstructions , taking 1 clock cycle.
Large no. of general purpose registers.
Circuit is much simpler.
Fast to decode.
Fast to execute.
Pipelining- fetching of next instruction while
previous instruction executes.
6
7.
RISC Has FiveDesign Principles:
â˘Simple Instructions:
The objective is to design simple instruction so that
each can execute in one cycle.
â˘Register-to-Register Operations:
RISC processors only allow LOAD/STORE operations
to access memory. Rest of the operations work on
the register-to-register basis. This feature of
restricting operands to registers also simplifies the
control-unit.
7
8.
â˘Simple Addressing Modes:
RISCprocessors employ register-to-register instruction so
most instruction use register based addressing.
Only LOAD/STORE instructions need memory addressing
modes.
â˘Large Register Set:
For register-to-register operation large number of
registers required.
Provide ample opportunities for the compiler to optimize
their usage.
8
9.
â˘Fixed-Length:
RISC design usefixed-length instructions. Variable
length instructions cause implementation and
execution inefficient.
The boundaries of various fields in an instruction such
as opcode and source operands are fixed. This allows
efficient decoding and scheduling of instructions.
9
10.
What Actually RISCDoes?
ď Break Operation into Simple Sub-Operation.
Example:-
Load X, Load Y,
add X and Y,
Store on Z
X * Y â Z
10
11.
In Real LifeUse of RISC Architectures:
ďś RISC architectures are now used across a wide range of
platforms, from cellular telephones and tablet computers.
ďś Intel was able to spend vast amounts of money on
processor development to offset the RISC advantages enough
to maintain PC market share.
ďś New microprocessors can be developed and tested more
quickly if being less complicated is one of itâs aims.
11