Professional Documents
Culture Documents
RISC and CISC Architectures
RISC and CISC Architectures
Abstract- In this paper, we have made a comparison operations [4-8] or tending to modes inside single
between RISC (Reduced Instruction Set Computer) guidelines, as its name clear up "COMPLEX
and CISC (Complex Instruction Set Computer.) RISC INSTRUCTION SET".
and CISC are two different types of microprocessor
architectures. RISC is a computer microprocessor The CISC approach tries to reduce the number of
that uses simple instructions which can be divided instructions per program, reducing the number of
into multiple instructions that performs low level cycles per instruction. Computers based on the CISC
operations within a single clock cycle while CISC is architecture are designed to decrease the memory
a PC processor which utilizes single direction to cost. As large programs need more storage, so
execute a few low level operations, for example, increasing the memory cost and large memory
stacking from memory, a number juggling operation, becomes more expensive. To tackle these issues, the
and a memory store or are fit for multi-step quantity of directions per system can be diminished
operations or tending to modes inside single by installing the quantity of operations in a solitary
guideline. The principle distinction amongst RISC guideline, subsequently making the guidelines more
and CISC is in the quantity of figuring cycles each of intricate. The engineering of a CISC is appeared in
their directions take. The distinction in the quantity of Figure 2.
cycles depends on the intricacy and the objective of
their directions.
I. INTRODUCTION
[14]. Khan, F., Khan, S., & Khan, S. A. (2015, [22]. M. A. Jan, “Energy-efficient routing and secure
October). Performance improvement in wireless communication in wireless sensor networks,”
sensor and actor networks based on actor Ph.D. dissertation, 2016.
repositioning. In 2015 International Conference [23]. M. A. Jan, P. Nanda, X. He, and R. P. Liu, “A
on Connected Vehicles and Expo (ICCVE) (pp. Lightweight Mutual Authentication Scheme for
134-139). IEEE. IoT Objects,” IEEE Transactions on
[15]. Khan, S., Khan, F., Jabeen. Q., Arif. F., & Jan. Dependable and Secure Computing (TDSC),
M. A. (2016). Performance Improvement in “Submitted”, 2016.
Wireless Sensor and Actor Networks. in the [24]. M. A. Jan, P. Nanda, X. He, and R. P. Liu, “A
Journal Applied, Environmental, and Biological Sybil Attack Detection Scheme for a Forest
Sciences Print ISSN: 2090-4274 Online ISSN: Wildfire Monitoring Application,” Elsevier
2090-4215 Future Generation Computer Systems (FGCS),
[16]. Mian Ahmad Jan and Muhammad Khan, “Accepted”, 2016.
“Denial of Service Attacks and Their [25]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J.
Countermeasures in WSN”, in IRACST– (2015, August). DPBSV--An Efficient and
International Journal of Computer Networks and Secure Scheme for Big Sensing Data Stream.
Wireless Communications (IJCNWC), Vol.3, InTrustcom/BigDataSE/ISPA, 2015 IEEE (Vol.
April. 2013. 1, pp. 246-253). IEEE.
[17]. M. A. Jan, P. Nanda, X. He and R. P. Liu, “A [26]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J.
Sybil Attack Detection Scheme for a (2015). A Dynamic Key Length Based
Centralized Clustering-based Hierarchical Approach for Real-Time Security Verification
Network” in Trustcom/BigDataSE/ISPA, Vol.1, of Big Sensing Data Stream. In Web
PP-318-325, 2015, IEEE. Information Systems Engineering–WISE
[18]. Jabeen, Q., Khan, F., Hayat, M.N., Khan, H., 2015 (pp. 93-108). Springer International
Jan., S.R., Ullah, F., (2016) A Survey : Publishing.
Embedded Systems Supporting By Different [27]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J.
Operating Systems in the International Journal (2016). A dynamic prime number based
of Scientific Research in Science, Engineering efficient security mechanism for big sensing
and Technology(IJSRSET), Print ISSN : 2395- data streams.Journal of Computer and System
1990, Online ISSN : 2394-4099, Volume 2 Sciences.
Issue 2, pp.664-673.
[28]. Puthal, D., &Sahoo, B. (2012). Secure Data
[19]. Syed Roohullah Jan, Syed TauhidUllah Shah, Collection & Critical Data Transmission in
Zia UllahJohar, Yasin Shah, Khan, F., " An Mobile Sink WSN: Secure and Energy efficient
Innovative Approach to Investigate Various data collection technique.
Software Testing Techniques and Strategies",
International Journal of Scientific Research in [29]. Puthal, D., Sahoo, B., &Sahoo, B. P. S. (2012).
Science, Engineering and Effective Machine to Machine Communications
Technology(IJSRSET), Print ISSN : 2395-1990, in Smart Grid Networks. ARPN J. Syst.
Online ISSN : 2394-4099, Volume 2 Issue 2, Softw.© 2009-2011 AJSS Journal, 2(1), 18-22.
pp.682-689, March-April 2016. URL [30]. M. A. Jan, P. Nanda, M. Usman, and X. He,
: http://ijsrset.com/IJSRSET1622210.php “PAWN: A Payload-based mutual
[20]. Khan, F., Jan, SR, Tahir, M., & Khan, S., (2015) Authentication scheme for Wireless Sensor
Applications, Limitations, and Improvements in Networks,” “accepted”, 2016.
Visible Light Communication Systems” In 2015 [31]. M. Usman, M. A. Jan, and X. He,
International Conference on Connected “Cryptography-based Secure Data Storage and
Vehicles and Expo (ICCVE) (pp. 259-262). Sharing Using HEVC and Public Clouds,”
IEEE. Elsevier Information sciences, “accepted”,
[21]. Syed Roohullah Jan, Khan, F., Muhammad 2016.
Tahir, Shahzad Khan,, (2016) “Survey: Dealing [32]. Jan, S. R., Khan, F., &Zaman, A. THE
Non-Functional Requirements At Architecture PERCEPTION OF STUDENTS ABOUT
Level”, VFAST Transactions on Software MOBILE LEARNING AT UNIVERSITY
Engineering, (Accepted 2016) LEVEL. NO. CONTENTS PAGE NO., 97.