SlideShare a Scribd company logo
1 of 27
CPU Organization
Instruction Formats
Addressing Modes
RISC and CISC Characteristics
Central Processing Unit
Introduction
General Register Organization
Stack Organization
 Can be implemented in two ways:
 Register Stack
 Memory Stack
Register Stack
Memory Stack
Instruction Formats
 Depend on the organization of the computer. There
are mainly following types of organization:
 Accumulator Based Organization
 Register Based Organization
 Stack Based Organization
Instruction Formats
 Zero Address Instruction
 One Address Instruction
 Two Address Instruction
 Three Address Instruction
 RISC Instruction
Addressing Modes
 Implied Mode
 Immediate Mode
 Register Mode
 Register Indirect Mode
 Auto increment or Auto decrement Mode
 Direct Addressing Mode
 Indirect Addressing Mode
 Relative Addressing Mode
 Indexed Addressing Mode
 Base Register Addressing Mode
CISC
 CISC is a philosophy for designing chips that are easy to
program and which make efficient use of memory.
It stands for - Complex Instruction Set Computer
 Each instruction in a CISC instruction set might perform a
series of operations inside the processor.
 This reduces the number of instructions required to
implement a given program. In general terms, the
instruction sets are designed for the convenience of the
assembly-language programmer
CISC…
 The CISC philosophy made more sense, since the earliest
machines were programmed in assembly language and
memory was slow and expensive
 The design constraints that led to the development of CISC
are
• small amounts of slow memory and
• the fact that most early machines were programmed in
assembly language
CISC: Microprogramming
 The earliest processor designs used dedicated (hardwire)
logic to decode and execute each instruction in the
processor's instruction set.
 This worked well for simple designs with few registers, but
made more complex architectures hard to build, as control
path logic can be hard to implement.
 So, designers switched tactics - they built some simple logic
to control the data paths between the various elements of
the processor, and used a simplified microcode instruction
set to control the data path logic. This type of
implementation is known as a microprogrammed
implementation.
Ideal CISC machine
 CISC processors were designed to execute each instruction
completely before beginning the next instruction. (Similar
to Run To Completion (RTC) model in Co-operative
Schedulers)
 Even so, most processors break the execution of an
instruction into several definite stages; as soon as one stage
is finished, the processor passes the result to the next stage
Ideal CISC machine…
 Four stages in a typical CISC machine:
• An instruction is fetched from main memory.
• The instruction is decoded: the controlling code from the
microprogram identifies the type of operation to be performed,
where to find the data on which to perform the operation, and
where to put the result. If necessary, the processor reads in
additional information from memory.
• The instruction is executed: the controlling code from the
microprogram determines the circuitry/hardware that will
perform the operation.
• The results are written to memory.
CISC advantages:
 As each instruction is more capable, fewer instructions
could be used to implement a given task. This made more
efficient use of the relatively slow main memory.
 Microprogramming is as easy as assembly language to
implement, and much less expensive than hardwiring a
control unit.
 The ease of micro coding new instructions allowed
designers to make CISC machines upwardly compatible.
 Because microprogram instruction sets can be written to
match the constructs of high-level languages, the compiler
does not have to be as complicated.
CISC disadvantages:
 Many specialized instructions aren't used frequently
enough to justify their existence - approximately 20% of the
available instructions are used in a typical program.
 Earlier generations of a processor family generally were
contained as a subset in every new version - this made the
machines compatible - but the instruction set & chip
hardware become more complex with each generation of
computers.
 Different instructions take different amount of clock time to
execute, due to their variable length, slowing down the
overall performance of the machine.
RISC
 RISC is a microprocessor that is designed to perform a
smaller number computer instructions so that it can
operate at a higher speed.
It stands for - Reduced Instruction Set Computer
 John Cocke of IBM Research in Yorktown, New York,
originated the RISC concept in 1974 by proving that about
20% of the instructions in a computer did 80% of the work.
 The term itself (RISC) is credited to David Patterson, a
teacher at the University of California in Berkeley
RISC characteristics
 Simple instruction set.
 Same length instructions.
 1 machine-cycle instructions(Pipelining).
 Overlapped Register Widows
RISC’s advantages
 Speed.
Since it uses pipelining concept, its speed is faster
 Simpler hardware.
Because the instruction set of a RISC processor is so simple,
it uses up much less chip space
 Shorter design cycle.
Since RISC processors are simpler than corresponding
CISC processors, they can be designed more quickly
RISC’s disadvantages
 Code Quality
If the programmer (or compiler) does a poor job of instruction
scheduling, the processor can spend quite a bit stalling:
waiting for the result of one instruction before it can proceed
with a subsequent instruction.
Since the scheduling rules can be complicated, most
programmers use a high level language (such as C or C++) and
leave the instruction scheduling to the compiler.
This makes the performance of a RISC application depend
critically on the quality of the code generated by the compiler.
Therefore, developers (and development tool suppliers such as
Apple) have to choose their compiler carefully based on the
quality of the generated code.
RISC’s disadvantages…
 Code expansion
Code expansion refers to the increase in size that you get
when you take a program that had been compiled for a
CISC machine and re-compile it for a RISC machine. The
exact expansion depends primarily on the quality of the
compiler and the nature of the machine's instruction set.
Since CISC machines perform complex actions with a
single instruction, when RISC machines may require
multiple instructions for the same action, code expansion
can be a problem.
RISC’s disadvantages…
 System Design
They require more instructions, and hence memory, than
CISCs to implement applications.
Another problem the RISC machines faces is that they
require very fast memory systems to feed them
instructions.
Classic Performance Equation
 The Performance Equation
The following equation is commonly used for expressing a
computer's performance ability:
time time cycles instructions
Program cycle instruction program
CISC’s Performance Equation
 CISC approach attempts to minimize the number of
instructions per program, sacrificing the number of cycles
per instruction.
time time cycles instructions
Program cycle instruction program
RISC’s Performance Equation
 RISC does the opposite, reducing the cycles per instruction
at the cost of the number of instructions per program.
time time cycles instructions
Program cycle instruction program
RISC vs CISC
CISC RISC
Complex instructions require
multiple cycles
Reduced instructions take 1 cycle
Many instructions can reference
memory
Only Load and Store instructions
can reference memory
Instructions are executed one at
a time
Uses pipelining to execute
instructions
Few general registers Many general registers
Use micro programmed Control
Unit
Use hardwired Control unit
Large Number of instructions
and many addressing modes
Few instructions and less
addressing modes
Why CISC still lives?
 Why are there still CISC CPUs being developed?
 Why is Intel spending time and money to manufacture the Pentium III and
Pentium 4?
 Answer
The answer is simple, backward compatibility.
The IBM compatible PC is the most common computer in the world. Intel
wanted a CPU that would run all the applications that are in the hands of more
than 100 million users.

More Related Content

What's hot

Auxiliary memory
Auxiliary memoryAuxiliary memory
Auxiliary memoryYuvrajVyas2
 
Computer architecture instruction formats
Computer architecture instruction formatsComputer architecture instruction formats
Computer architecture instruction formatsMazin Alwaaly
 
Computer Organization and Architecture.
Computer Organization and Architecture.Computer Organization and Architecture.
Computer Organization and Architecture.CS_GDRCST
 
Flynns classification
Flynns classificationFlynns classification
Flynns classificationYasir Khan
 
Hashing in datastructure
Hashing in datastructureHashing in datastructure
Hashing in datastructurerajshreemuthiah
 
Computer registers
Computer registersComputer registers
Computer registersJatin Grover
 
Operating system paging and segmentation
Operating system paging and segmentationOperating system paging and segmentation
Operating system paging and segmentationhamza haseeb
 
Processor Organization and Architecture
Processor Organization and ArchitectureProcessor Organization and Architecture
Processor Organization and ArchitectureVinit Raut
 
Computer architecture multi processor
Computer architecture multi processorComputer architecture multi processor
Computer architecture multi processorMazin Alwaaly
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithmsPiyush Rochwani
 
Computer instruction
Computer instructionComputer instruction
Computer instructionSanjeev Patel
 
Memory organization (Computer architecture)
Memory organization (Computer architecture)Memory organization (Computer architecture)
Memory organization (Computer architecture)Sandesh Jonchhe
 

What's hot (20)

Auxiliary memory
Auxiliary memoryAuxiliary memory
Auxiliary memory
 
Computer architecture instruction formats
Computer architecture instruction formatsComputer architecture instruction formats
Computer architecture instruction formats
 
Computer Organization and Architecture.
Computer Organization and Architecture.Computer Organization and Architecture.
Computer Organization and Architecture.
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
ADDRESSING MODES
ADDRESSING MODESADDRESSING MODES
ADDRESSING MODES
 
Memory management
Memory managementMemory management
Memory management
 
Computer architecture
Computer architecture Computer architecture
Computer architecture
 
Paging and segmentation
Paging and segmentationPaging and segmentation
Paging and segmentation
 
Flynns classification
Flynns classificationFlynns classification
Flynns classification
 
Hashing in datastructure
Hashing in datastructureHashing in datastructure
Hashing in datastructure
 
Computer registers
Computer registersComputer registers
Computer registers
 
Semaphore
SemaphoreSemaphore
Semaphore
 
Operating system paging and segmentation
Operating system paging and segmentationOperating system paging and segmentation
Operating system paging and segmentation
 
Processor Organization and Architecture
Processor Organization and ArchitectureProcessor Organization and Architecture
Processor Organization and Architecture
 
Computer architecture multi processor
Computer architecture multi processorComputer architecture multi processor
Computer architecture multi processor
 
Shared memory
Shared memoryShared memory
Shared memory
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
 
Computer instruction
Computer instructionComputer instruction
Computer instruction
 
Memory organization (Computer architecture)
Memory organization (Computer architecture)Memory organization (Computer architecture)
Memory organization (Computer architecture)
 

Viewers also liked

The central processing unit by group 5 2015
The central processing unit by group 5 2015The central processing unit by group 5 2015
The central processing unit by group 5 2015Tendai Karuma
 
Central processing unit
Central processing unitCentral processing unit
Central processing unitjyoti_lakhani
 
Decoder for digital electronics
Decoder for digital electronicsDecoder for digital electronics
Decoder for digital electronicsIIT, KANPUR INDIA
 
Three Central Processing Unit
Three   Central Processing UnitThree   Central Processing Unit
Three Central Processing UnitMISY
 
central processing unit and pipeline
central processing unit and pipelinecentral processing unit and pipeline
central processing unit and pipelineRai University
 
Central processing unit
Central processing unitCentral processing unit
Central processing unitKumar
 
08. Central Processing Unit (CPU)
08. Central Processing Unit (CPU)08. Central Processing Unit (CPU)
08. Central Processing Unit (CPU)Akhila Dakshina
 

Viewers also liked (11)

Computer Architecture
Computer ArchitectureComputer Architecture
Computer Architecture
 
The central processing unit by group 5 2015
The central processing unit by group 5 2015The central processing unit by group 5 2015
The central processing unit by group 5 2015
 
Cpu
CpuCpu
Cpu
 
Central processing unit
Central processing unitCentral processing unit
Central processing unit
 
Decoder for digital electronics
Decoder for digital electronicsDecoder for digital electronics
Decoder for digital electronics
 
Three Central Processing Unit
Three   Central Processing UnitThree   Central Processing Unit
Three Central Processing Unit
 
central processing unit and pipeline
central processing unit and pipelinecentral processing unit and pipeline
central processing unit and pipeline
 
Cpu
CpuCpu
Cpu
 
Central processing unit
Central processing unitCentral processing unit
Central processing unit
 
08. Central Processing Unit (CPU)
08. Central Processing Unit (CPU)08. Central Processing Unit (CPU)
08. Central Processing Unit (CPU)
 
CO Module 5
CO Module 5CO Module 5
CO Module 5
 

Similar to Central processing unit

CS304PC:Computer Organization and Architecture UNIT V_merged_merged.pdf
CS304PC:Computer Organization and Architecture UNIT V_merged_merged.pdfCS304PC:Computer Organization and Architecture UNIT V_merged_merged.pdf
CS304PC:Computer Organization and Architecture UNIT V_merged_merged.pdfAsst.prof M.Gokilavani
 
Processors used in System on chip
Processors used in System on chip Processors used in System on chip
Processors used in System on chip A B Shinde
 
Risc and cisc computers
Risc and cisc computersRisc and cisc computers
Risc and cisc computersankita mundhra
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlowChaudhary Manzoor
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlowkaran saini
 
Computer architecture
Computer architectureComputer architecture
Computer architectureAbash shah
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlowManish Prajapati
 
Computer Organization.pptx
Computer Organization.pptxComputer Organization.pptx
Computer Organization.pptxsaimagul310
 
Embedded System IoT_4.pptx ppt presentation
Embedded System  IoT_4.pptx ppt presentationEmbedded System  IoT_4.pptx ppt presentation
Embedded System IoT_4.pptx ppt presentationMITS
 
Risc and cisc casestudy
Risc and cisc casestudyRisc and cisc casestudy
Risc and cisc casestudyjvs71294
 
CS304PC:Computer Organization and Architecture Session 30 RISC.pptx
CS304PC:Computer Organization and Architecture Session 30 RISC.pptxCS304PC:Computer Organization and Architecture Session 30 RISC.pptx
CS304PC:Computer Organization and Architecture Session 30 RISC.pptxAsst.prof M.Gokilavani
 
risc_and_cisc.ppt
risc_and_cisc.pptrisc_and_cisc.ppt
risc_and_cisc.pptRuhul Amin
 
Question 1. please describe an embedded system in less than 100 word.pdf
Question 1. please describe an embedded system in less than 100 word.pdfQuestion 1. please describe an embedded system in less than 100 word.pdf
Question 1. please describe an embedded system in less than 100 word.pdfarmcomputers
 
Advanced Processor Power Point Presentation
Advanced Processor  Power Point  PresentationAdvanced Processor  Power Point  Presentation
Advanced Processor Power Point PresentationPrashantYadav931011
 
Microprocessor presentation.pptx
Microprocessor presentation.pptxMicroprocessor presentation.pptx
Microprocessor presentation.pptxRajeshwariBaniya
 

Similar to Central processing unit (20)

CS304PC:Computer Organization and Architecture UNIT V_merged_merged.pdf
CS304PC:Computer Organization and Architecture UNIT V_merged_merged.pdfCS304PC:Computer Organization and Architecture UNIT V_merged_merged.pdf
CS304PC:Computer Organization and Architecture UNIT V_merged_merged.pdf
 
Processors used in System on chip
Processors used in System on chip Processors used in System on chip
Processors used in System on chip
 
R&c
R&cR&c
R&c
 
Risc and cisc computers
Risc and cisc computersRisc and cisc computers
Risc and cisc computers
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlow
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlow
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlow
 
Computer Organization.pptx
Computer Organization.pptxComputer Organization.pptx
Computer Organization.pptx
 
Embedded System IoT_4.pptx ppt presentation
Embedded System  IoT_4.pptx ppt presentationEmbedded System  IoT_4.pptx ppt presentation
Embedded System IoT_4.pptx ppt presentation
 
Risc and cisc casestudy
Risc and cisc casestudyRisc and cisc casestudy
Risc and cisc casestudy
 
CISC.pptx
CISC.pptxCISC.pptx
CISC.pptx
 
CS304PC:Computer Organization and Architecture Session 30 RISC.pptx
CS304PC:Computer Organization and Architecture Session 30 RISC.pptxCS304PC:Computer Organization and Architecture Session 30 RISC.pptx
CS304PC:Computer Organization and Architecture Session 30 RISC.pptx
 
risc_and_cisc.ppt
risc_and_cisc.pptrisc_and_cisc.ppt
risc_and_cisc.ppt
 
Risc & cisk
Risc & ciskRisc & cisk
Risc & cisk
 
Question 1. please describe an embedded system in less than 100 word.pdf
Question 1. please describe an embedded system in less than 100 word.pdfQuestion 1. please describe an embedded system in less than 100 word.pdf
Question 1. please describe an embedded system in less than 100 word.pdf
 
CISC & RISC Architecture
CISC & RISC Architecture CISC & RISC Architecture
CISC & RISC Architecture
 
Advanced Processor Power Point Presentation
Advanced Processor  Power Point  PresentationAdvanced Processor  Power Point  Presentation
Advanced Processor Power Point Presentation
 
Microprocessor presentation.pptx
Microprocessor presentation.pptxMicroprocessor presentation.pptx
Microprocessor presentation.pptx
 
Hg3612911294
Hg3612911294Hg3612911294
Hg3612911294
 

More from Kamal Acharya

Programming the basic computer
Programming the basic computerProgramming the basic computer
Programming the basic computerKamal Acharya
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer SecurityKamal Acharya
 
Making decision and repeating in PHP
Making decision and repeating  in PHPMaking decision and repeating  in PHP
Making decision and repeating in PHPKamal Acharya
 
Working with arrays in php
Working with arrays in phpWorking with arrays in php
Working with arrays in phpKamal Acharya
 
Text and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPText and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPKamal Acharya
 
Capacity Planning of Data Warehousing
Capacity Planning of Data WarehousingCapacity Planning of Data Warehousing
Capacity Planning of Data WarehousingKamal Acharya
 
Information Privacy and Data Mining
Information Privacy and Data MiningInformation Privacy and Data Mining
Information Privacy and Data MiningKamal Acharya
 
Association Analysis in Data Mining
Association Analysis in Data MiningAssociation Analysis in Data Mining
Association Analysis in Data MiningKamal Acharya
 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data miningKamal Acharya
 
Introduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingIntroduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingKamal Acharya
 

More from Kamal Acharya (20)

Programming the basic computer
Programming the basic computerProgramming the basic computer
Programming the basic computer
 
Computer Arithmetic
Computer ArithmeticComputer Arithmetic
Computer Arithmetic
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
Session and Cookies
Session and CookiesSession and Cookies
Session and Cookies
 
Functions in php
Functions in phpFunctions in php
Functions in php
 
Web forms in php
Web forms in phpWeb forms in php
Web forms in php
 
Making decision and repeating in PHP
Making decision and repeating  in PHPMaking decision and repeating  in PHP
Making decision and repeating in PHP
 
Working with arrays in php
Working with arrays in phpWorking with arrays in php
Working with arrays in php
 
Text and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPText and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHP
 
Introduction to PHP
Introduction to PHPIntroduction to PHP
Introduction to PHP
 
Capacity Planning of Data Warehousing
Capacity Planning of Data WarehousingCapacity Planning of Data Warehousing
Capacity Planning of Data Warehousing
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
 
Search Engines
Search EnginesSearch Engines
Search Engines
 
Web Mining
Web MiningWeb Mining
Web Mining
 
Information Privacy and Data Mining
Information Privacy and Data MiningInformation Privacy and Data Mining
Information Privacy and Data Mining
 
Cluster Analysis
Cluster AnalysisCluster Analysis
Cluster Analysis
 
Association Analysis in Data Mining
Association Analysis in Data MiningAssociation Analysis in Data Mining
Association Analysis in Data Mining
 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data mining
 
Data Preprocessing
Data PreprocessingData Preprocessing
Data Preprocessing
 
Introduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingIntroduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data Warehousing
 

Recently uploaded

Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Recently uploaded (20)

Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Central processing unit

  • 1. CPU Organization Instruction Formats Addressing Modes RISC and CISC Characteristics Central Processing Unit
  • 4. Stack Organization  Can be implemented in two ways:  Register Stack  Memory Stack
  • 7. Instruction Formats  Depend on the organization of the computer. There are mainly following types of organization:  Accumulator Based Organization  Register Based Organization  Stack Based Organization
  • 8. Instruction Formats  Zero Address Instruction  One Address Instruction  Two Address Instruction  Three Address Instruction  RISC Instruction
  • 9. Addressing Modes  Implied Mode  Immediate Mode  Register Mode  Register Indirect Mode  Auto increment or Auto decrement Mode  Direct Addressing Mode  Indirect Addressing Mode  Relative Addressing Mode  Indexed Addressing Mode  Base Register Addressing Mode
  • 10. CISC  CISC is a philosophy for designing chips that are easy to program and which make efficient use of memory. It stands for - Complex Instruction Set Computer  Each instruction in a CISC instruction set might perform a series of operations inside the processor.  This reduces the number of instructions required to implement a given program. In general terms, the instruction sets are designed for the convenience of the assembly-language programmer
  • 11. CISC…  The CISC philosophy made more sense, since the earliest machines were programmed in assembly language and memory was slow and expensive  The design constraints that led to the development of CISC are • small amounts of slow memory and • the fact that most early machines were programmed in assembly language
  • 12. CISC: Microprogramming  The earliest processor designs used dedicated (hardwire) logic to decode and execute each instruction in the processor's instruction set.  This worked well for simple designs with few registers, but made more complex architectures hard to build, as control path logic can be hard to implement.  So, designers switched tactics - they built some simple logic to control the data paths between the various elements of the processor, and used a simplified microcode instruction set to control the data path logic. This type of implementation is known as a microprogrammed implementation.
  • 13. Ideal CISC machine  CISC processors were designed to execute each instruction completely before beginning the next instruction. (Similar to Run To Completion (RTC) model in Co-operative Schedulers)  Even so, most processors break the execution of an instruction into several definite stages; as soon as one stage is finished, the processor passes the result to the next stage
  • 14. Ideal CISC machine…  Four stages in a typical CISC machine: • An instruction is fetched from main memory. • The instruction is decoded: the controlling code from the microprogram identifies the type of operation to be performed, where to find the data on which to perform the operation, and where to put the result. If necessary, the processor reads in additional information from memory. • The instruction is executed: the controlling code from the microprogram determines the circuitry/hardware that will perform the operation. • The results are written to memory.
  • 15. CISC advantages:  As each instruction is more capable, fewer instructions could be used to implement a given task. This made more efficient use of the relatively slow main memory.  Microprogramming is as easy as assembly language to implement, and much less expensive than hardwiring a control unit.  The ease of micro coding new instructions allowed designers to make CISC machines upwardly compatible.  Because microprogram instruction sets can be written to match the constructs of high-level languages, the compiler does not have to be as complicated.
  • 16. CISC disadvantages:  Many specialized instructions aren't used frequently enough to justify their existence - approximately 20% of the available instructions are used in a typical program.  Earlier generations of a processor family generally were contained as a subset in every new version - this made the machines compatible - but the instruction set & chip hardware become more complex with each generation of computers.  Different instructions take different amount of clock time to execute, due to their variable length, slowing down the overall performance of the machine.
  • 17. RISC  RISC is a microprocessor that is designed to perform a smaller number computer instructions so that it can operate at a higher speed. It stands for - Reduced Instruction Set Computer  John Cocke of IBM Research in Yorktown, New York, originated the RISC concept in 1974 by proving that about 20% of the instructions in a computer did 80% of the work.  The term itself (RISC) is credited to David Patterson, a teacher at the University of California in Berkeley
  • 18. RISC characteristics  Simple instruction set.  Same length instructions.  1 machine-cycle instructions(Pipelining).  Overlapped Register Widows
  • 19. RISC’s advantages  Speed. Since it uses pipelining concept, its speed is faster  Simpler hardware. Because the instruction set of a RISC processor is so simple, it uses up much less chip space  Shorter design cycle. Since RISC processors are simpler than corresponding CISC processors, they can be designed more quickly
  • 20. RISC’s disadvantages  Code Quality If the programmer (or compiler) does a poor job of instruction scheduling, the processor can spend quite a bit stalling: waiting for the result of one instruction before it can proceed with a subsequent instruction. Since the scheduling rules can be complicated, most programmers use a high level language (such as C or C++) and leave the instruction scheduling to the compiler. This makes the performance of a RISC application depend critically on the quality of the code generated by the compiler. Therefore, developers (and development tool suppliers such as Apple) have to choose their compiler carefully based on the quality of the generated code.
  • 21. RISC’s disadvantages…  Code expansion Code expansion refers to the increase in size that you get when you take a program that had been compiled for a CISC machine and re-compile it for a RISC machine. The exact expansion depends primarily on the quality of the compiler and the nature of the machine's instruction set. Since CISC machines perform complex actions with a single instruction, when RISC machines may require multiple instructions for the same action, code expansion can be a problem.
  • 22. RISC’s disadvantages…  System Design They require more instructions, and hence memory, than CISCs to implement applications. Another problem the RISC machines faces is that they require very fast memory systems to feed them instructions.
  • 23. Classic Performance Equation  The Performance Equation The following equation is commonly used for expressing a computer's performance ability: time time cycles instructions Program cycle instruction program
  • 24. CISC’s Performance Equation  CISC approach attempts to minimize the number of instructions per program, sacrificing the number of cycles per instruction. time time cycles instructions Program cycle instruction program
  • 25. RISC’s Performance Equation  RISC does the opposite, reducing the cycles per instruction at the cost of the number of instructions per program. time time cycles instructions Program cycle instruction program
  • 26. RISC vs CISC CISC RISC Complex instructions require multiple cycles Reduced instructions take 1 cycle Many instructions can reference memory Only Load and Store instructions can reference memory Instructions are executed one at a time Uses pipelining to execute instructions Few general registers Many general registers Use micro programmed Control Unit Use hardwired Control unit Large Number of instructions and many addressing modes Few instructions and less addressing modes
  • 27. Why CISC still lives?  Why are there still CISC CPUs being developed?  Why is Intel spending time and money to manufacture the Pentium III and Pentium 4?  Answer The answer is simple, backward compatibility. The IBM compatible PC is the most common computer in the world. Intel wanted a CPU that would run all the applications that are in the hands of more than 100 million users.