Sunday, January 26, 2020

Study of various RISC and CISC processor

Study of various RISC and CISC processor INTRODUCTION: The processor (CPU, for Central Processing Unit) is the computers brain. It allows the processing of numeric data, meaning information entered in binary form, and the execution of instructions stored in memory. The first microprocessor (Intel 4004) was invented in 1971. It was a 4-bit calculation device with a speed of 108 kHz. Since then, microprocessor power has grown exponentially. Operation The processor (called CPU, for Central Processing Unit) is an electronic circuit that operates at the speed of an internal clock thanks to a quartz crystal that, when subjected to an electrical currant, send pulses, called peaks. The clock speed (also called cycle), corresponds to the number of pulses per second, written in Hertz (Hz). Thus, a 200 MHz computer has a clock that sends 200,000,000 pulses per second. With each clock peak, the processor performs an action that corresponds to an instruction or a part there of. A measure called CPI (Cycles Per Instruction) gives a representation of the average number of clock cycles required for a microprocessor to execute an instruction. A microprocessor power can thus be characterized by the number of instructions per second that it is capable of processing. MIPS (millions of instructions per second) is the unit used and corresponds to the processor frequency divided by the CPI. One of the primary goals of computer architects is to design computers that are more cost effective than their predecessors. Cost-effectiveness includes the cost of hardware to manufacture the machine, the cost of programming, and costs incurred related to the architecture in debugging.Both the initial hardware and subsequent programs. If we review the history of computer families we find that the most common architectural change is the trend toward ever more complex machines. Presumably this additional complexity has a positive trade off with regard to the cost effectiveness of newer models. The Microprocessor Revolution:- The engine of the computer revolution is the microprocessor. It has led to new inventions, such as FAX machines and personal computers, as well as adding intelligence to existing devices, such as wristwatches and automobiles. Moreover, its performance has improved by a factor of roughly 10,000 in the 25 years since its birth in 1971. This increase coincided with the introduction of Reduced Instruction Set Computers (RISC). The instruction set is the hardware language in which the software tells the processor what to do. Surprisingly, reducing the size of the instruction set eliminating certain instructions based upon a careful quantitative analysis, and requiring these seldom-used instructions to be emulated in software can lead to higher performance, for several reasons:- REASONS FOR INCREASED COMPLEXITY Speed of Memory vs. Speed of CPU:- .from the 701 to the 709 [Cocke80]. The 701 CPU was about ten times as fast as the core main memory this made any primitives that were implemented as subroutines much slower than primitives that were instructions. 709 more cost-effective than the 701. Since then, many higher-level instructions have been added to machines in an attempt to improve performance. Microcode and LSI Technology:- Microprogrammed control allows the implementation of complex architectures more cost-effectively than hardwired control.Advances in integrated circuit memories made in the late 60s and early 70s have caused microprogrammed control to be the more cost-effective approach in almost every case. Once the decision is made to use microprogrammed control, the cost to expand an instruction set is very small; only a few more words of control store. Examples of such instructions are string editing, integer-to-floating conversion, and mathematical operations such as polynomial evaluation. Code Density:- With early computers, memory was very expensive. It was therefore cost effective to have very compact programs. Attempting to obtain code density by increasing the complexity of the instruction set is often a double-edged the cost of 10% more memory is often far cheaper than the cost of squeezing 10% out of the CPU by architectural innovations. Marketing Strategy:- Unfortunately, the primary goal of a computer company is not to design the most cost-effective computer; the primary goal of a computer company is to make the most money by selling computers. In order to sell computers manufacturers must convince customers that their design is superior to their competitors.In order to keep their jobs, architects must keep selling new and better designs to their internal management. Upward Compatibility:- Coincident with marketing strategy is the perceived need for upward compatibility. Upward compatibility means that the primary way to improve a design is to add new, and usually more complex, features. Seldom are instructions or addressing modes removed from an architecture, resulting in a gradual increase in both the number and complexity of instructions over a series of computers. Support for High Level Languages:- As the use of high level languages becomes increasingly popular, manufacturers have become eager to provide more powerful instructions to support them. Unfortunately there is little evidence to suggest that any of the more complicated instruction sets have actually provided such support.The effort to support high-level languages is laudable, but we feel that often the focus has been on the wrong issues. Use of Multiprogramming:- The rise of timesharing required that computers be able to respond to interrupts with the ability to halt an executing process and restart it at a later time. Memory management and paging additionally required that instructions could be halted before completion and later restarted. RISC(Reduced Instruction Set Computing) The acronym RISC (pronounced risk), for reduced instruction set computing, represents a CPU design strategy emphasizing the insight that simplified instructions that do less may still provide for higher performance if this simplicity can be utilized to make instructions execute very quickly. Many proposals for a precise definition have been attempted, and the term is being slowly replaced by the more descriptive load-store architecture. Being an old idea, some aspects attributed to the first RISC-labeled designs (around 1975) include the observations that the memory restricted compilers of the time were often unable to take advantage of features intended to facilitate coding, and that complex addressing inherently takes many cycles to perform. It was argued that such functions would better be performed by sequences of simpler instructions, if this could yield implementations simple enough to cope with really high frequencies, and small enough to leave room for many registers, factoring out slow memory accesses. Uniform, fixed length an instruction with arithmetics restricted to registers was chosen to ease instruction pipelining in these simple designs, with special load-store instructions accessing memory. The RISC Design Strategies:- The basic RISC principle: A simpler CPU is a faster CPU. The focus of the RISC design is reduction of the number and complexity of instructions in the ISA. A number of the more common strategies include: 1) Fixed instruction length, generally one word. This simplifies instruction fetch. 2) Simplified addressing modes. 3) Fewer and simpler instructions in the instruction set. 4) Only load and store instructions access memory; no add memory to register, add memory to memory, etc. 5) Let the compiler do it. Use a good compiler to break complex high-level language statements into a number of simple assembly language statements. Typical characteristics of RISC:- For any given level of general performance, a RISC chip will typically have far fewer transistors dedicated to the core logic which originally allowed designers to increase the size of the register set and increase internal parallelism. Other features, which are typically found in RISC architectures, are: Uniform instruction format, using a single word with the opcode in the same bit positions in every instruction, demanding less decoding; Identical general purpose registers, allowing any register to be used in any context, simplifying compiler design (although normally there are separate floating point registers); Simple addressing modes. Complex addressing performed via sequences of arithmetic and/or load-store operations. à ¢Ã¢â€š ¬Ã‚ ¢ Fixed length instructions which (a) are easier to decode than variable length instructions, and (b) use fast, inexpensive memory to execute a larger piece of code. à ¢Ã¢â€š ¬Ã‚ ¢ Hardwired controller instructions (as opposed to microcoded instructions). This is where RISC really shines as hardware implementation of instructions is much faster and uses less silicon real estate than a microstore area. à ¢Ã¢â€š ¬Ã‚ ¢ Fused or compound instructions which are heavily optimized for the most commonly used functions. à ¢Ã¢â€š ¬Ã‚ ¢ Pipelined implementations with goal of executing one instruction (or more) per machine cycle. à ¢Ã¢â€š ¬Ã‚ ¢ Large uniform register set à ¢Ã¢â€š ¬Ã‚ ¢ minimal number of addressing modes à ¢Ã¢â€š ¬Ã‚ ¢ no/minimal support for misaligned accesses. RISC Examples:- à ¢Ã¢â€š ¬Ã‚ ¢ Apple iPods (custom ARM7TDMI SoC) à ¢Ã¢â€š ¬Ã‚ ¢ Apple iPhone (Samsung ARM1176JZF) à ¢Ã¢â€š ¬Ã‚ ¢ Palm and PocketPC PDAs and smartphones (Intel XScale family, Samsung SC32442 ARM9) à ¢Ã¢â€š ¬Ã‚ ¢ Nintendo Game Boy Advance (ARM7) à ¢Ã¢â€š ¬Ã‚ ¢ Nintendo DS (ARM7, ARM9) à ¢Ã¢â€š ¬Ã‚ ¢ Sony Network Walkman (Sony in-house ARM based chip) Advantages of RISC * Speed * Simpler hardware * Shorter design cycle * User (programmers benifits) Disadvantages Of RISC q A more sophisticated compiler is required q A sequence of RISC instructions is needed to implement complex instructions. q Require very fast memory systems to feed them instructions. q Performance of a RISC application depend critically on the quality of the code generated by the compiler. CISC(complex instruction set computer) A complex instruction set computer (CISC, pronounced like sisk) is a computer instruction set architecture (ISA) in which each instruction can execute several low-level operations, such as a load from memory, an arithmetic operation, and a memory store, all in a single instruction. Performance:- Some instructions were added that were never intended to be used in assembly language but fit well with compiled high level languages. Compilers were updated to take advantage of these instructions. The benefits of semantically rich instructions with compact encodings can be seen in modern processors as well, particularly in the high performance segment where caches are a central component (as opposed to most embedded systems). This is because these fast, but complex and expensive, memories are inherently limited in size, making compact code beneficial. Of course, the fundamental reason they are needed is that main memories (i.e. dynamic RAM today) remain slow compared to a (high performance) CPU-core. ADVANTAGES OF CISC * A new processor design could incorporate the instruction set of its predecessor as a subset of an ever-growing languageno need to reinvent the wheel, code-wise, with each design cycle. * Fewer instructions were needed to implement a particular computing task, which led to lower memory use for program storage and fewer time-consuming instruction fetches from memory. * Simpler compilers sufficed, as complex CISC instructions could be written that closely resembled the instructions of high-level languages. In effect, CISC made a computers assembly language more like a high-level language to begin with, leaving the compiler less to do. DISADVANTAGES OF CISC * The first advantage listed above could be viewed as a disadvantage. That is, the incorporation of older instruction sets into new generations of processors tended to force growing complexity. * Many specialized CISC instructions were not used frequently enough to justify their existence. The existence of each instruction needed to be justified because each one requires the storage of more microcode at in the central processing unit (the final and lowest layer of code translation), which must be built in at some cost. * Because each CISC command must be translated by the processor into tens or even hundreds of lines of microcode, it tends to run slower than an equivalent series of simpler commands that do not require so much translation. All translation requires time. * Because a CISC machine builds complexity into the processor, where all its various commands must be translated into microcode for actual execution, the design of CISC hardware is more difficult and the CISC design cycle correspondingly long; this means delay in getting to market with a new chip. Comparison of RISC and CISC This table is taken from an IEEE tutorial on RISC architecture. CISC Type Computers RISC Type IBM 370/168 VAX-11/780 Intel 8086 RISC I IBM 801 Developed 1973 1978 1978 1981 1980 Instructions 208 303 133 31 120 Instruction size (bits) 16 48 16 456 8 32 32 32 Addressing Modes 4 22 6 3 3 General Registers 16 16 4 138 32 Control Memory Size 420 Kb 480 Kb Not given 0 0 Cache Size 64 Kb 64 Kb Not given 0 Not given However, nowadays, the difference between RISC and CISC chips is getting smaller and smaller. RISC and CISC architectures are becoming more and more alike. Many of todays RISC chips support just as many instructions as yesterdays CISC chips. The PowerPC 601, for example, supports more instructions than the Pentium. Yet the 601 is considered a RISC chip, while the Pentium is definitely CISC. RISCs are leading in:- * New machine designs * Research funding * Publications * Reported performance * CISCs are leading in: * REVENUE Performance * The CISC approach attempts to minimize the number of instructions per program, sacrificing the number of cycles per instruction. * RISC does the opposite, reducing the cycles per instruction at the cost of the number of instructions per program. * Hybrid solutions: * RISC core CISC interface * Still has specific performance tuning Future Aspects Todays microprocessors are roughly 10,000 times faster than their ancestors. And microprocessor-based computer systems now cost only 1/40th as much as their ancestors, when inflation is considered. The result: an overall cost-performance improvement of roughly 1,000,000, in only 25 years! This extraordinary advance is why computing plays such a large role in todays world. Had the research at universities and industrial laboratories not occurred had the complex interplay between government, industry, and academia not been so successful a comparable advance would still be years away. Microprocessor performance can continue to double every 18 months beyond the turn of the century. This rate can be sustained by continued research innovation. Significant new ideas will be needed in the next decade to continue the pace; such ideas are being developed by research groups today. Conclusion The research that led to the development of RISC architectures represented an important shift in computer science, with emphasis moving from hardware to software. The eventual dominance of RISC technology in high-performance workstations from the mid to late 1980s was a deserved success. In recent years CISC processors have been designed that successfully overcome the limitations of their instruction set architecture that is more elegant and power-efficient, but compilers need to be improved and clock speeds need to increase to match the aggressive design of the latest Intel processors. REFERENCES: Books: 1. Computer system Architecture by M. Morris Mano 2. Processor Archicture by jurij silc, Borut Robic 3. George Radin, The 801 Minicomputer, IBM Journal of Research and Development, Vol.27 No.3, 1983 4. John Cocke and V. Markstein, The evolution of RISC technology at IBM, IBM Journal of Research and Development, Vol.34 No.1, 1990 5. Dileep Bhandarkar, RISC versus CISC: A Tale of Two Chips, Intel Corporation, Santa Clara, California Encyclopedia: 1. Encarta 2. Britanica

Saturday, January 18, 2020

Warren Buffett

Warren Buffett There are many ways to describe Warren Buffett such as genius, best investor of all time, down to earth, and full of wisdom. Buffett is the second richest man on the planet and still seems to come off as an average person. He is a native of Omaha, Nebraska and attended the University of Nebraska-Lincoln for his undergraduate degree. Buffett attended Columbia of the Ivy League for his graduate degree. He has been very generous with his wealth, which is estimated to be worth $40 billion. When Warren Buffett was 25 years old, he began a limited partnership with his close family and friends. His original capital was estimated just over $100,000, over the next decade he added partners who brought money with them for him to invest. He did not have a year in which his company did not make money that decade and in return was paid 25% of the profits. Once his partnership dissolved, he began distributing shares of Berkshire Hathaway. Long story short, Buffett has taken Berkshire Hathaway from $7 per hare to $103,000 today and owns over 65 companies. The most recent company Buffett purchased was Burlington Northern for $34 billion, which is the biggest acquisition of his life. By purchasing Burlington Northern, Buffett is betting on the United States economy making a comeback. Moving materials by railroad is much more cost effective than by trucks. Buffett is a man who has many followers and he has given hope to people by making this gamble on America. Warren Buffett plans to give away 85% of his fortune to charities and foundations, most of it going to the Bill and Melinda Gates foundation. He is a truly generous man and cares deeply about the people of America. Buffett will go down in history forever because of his brilliant investing but will be remembered by many around the country for what he gave back to it. References 1. CNN Money. 25 June 2006. Web. 15 Nov. 2009. . 2. About. com. 2009. Web. 25 Nov. 2009. . 3. Los Angeles Times. 4 Nov. 2009. Web. 15 Nov. 2009. .

Friday, January 10, 2020

The Most Neglected Answer for University of Texas Essay Samples

The Most Neglected Answer for University of Texas Essay Samples The Key to Successful University of Texas Essay Samples Ultimately, the detail of true speech makes the scene pop. The author starts with a rather comprehensive story of an event or description of an individual or place. Consult your parents to spell out the rear row to you. Professor Mitchell obtained a grant to have a category of students to Belgium to be able to study the EU. Students lead busy lives and frequently forget about a coming deadline. Thus, State University isn't only the ideal spot for me, it is the sole spot for me. On top of its growing cultural and ethnic diversity, it is becoming a master at creating a niche for every student. It must be at this degree of detail. The utmost length indicates you've roughly around 600 words. You'll observe a similar structure in a lot of the essays. To be able to attain such dimensions and be an acceptable size in the modern society, an individual would n eed to cease eating until her or his body began digesting itself. Our writers always create unique content that's totally free from all grammatical error. We'll deal with them, and for a fair price, as we understand that students generally don't have a great deal of money to spare. I'd received the maximum grade on the team. Where to Find University of Texas Essay Samples On some platforms, it's still visible for people who started applications while the question was live, though it's not used. Your list is only going to supply you with a headache if you don't locate a remedy to end your problems. Here are a few suggestions for tactics to use this resource effectively. Check georgetown our application for the remainder. University of Texas Essay Samples for Dummies So in case you have an essay assigned that you will need help with, you can purchase essay online cheap from us. The sort of essay you're looking for will be offered to you within the deadline provided to you. Bridget's essay is extremely strong, but there continue to be a coup le little things that could be made better. Now you can purchase genuine college essay online, one that is going to fit your financial plan and get your work done too. Stephen's essay is quite effective. So should you need to employ college essay writer online, we're just the people that you want to contact. Regardless of what genre you would like Business Studies, Microeconomics, Business Management and Financial Accounting, we're here to serve your requirements. If you don't meet one or more of these conditions, you're expected to submit the TOEFL or IELTS exam without exception. It's possible to easily depend on us to find essay help as we have a tendency to assist and guide the students with the aid of our professional experts. It's possible to receive a tutor online for help in over 40 subjects. Each one of your wishes concerning the order matters for the writers. University of Texas Essay Samples - Is it a Scam? Writing is a present that comes naturally. Write in clear, strong language that's simple to follow along with. Replace a number of the cliched language. Studying only will help improve your abilities. The Upside to University of Texas Essay Samples Please be aware that payment of the application fee before the processing of the waiver won't be refunded. Even then you're not able to discover the informative and accurate info. Payment of the application fee ahead of processing a waiver isn't going to be refunded. More to the point, you must do well to get a strong application. Secondly, we can assure you that your very first time is not going to be your final moment. Even in the event the deadline is very tight, feel free to get hold of our managers.

Wednesday, January 1, 2020

Case Study on the Murder of Bridgett Frisbie

Bridgett Frisbie was 17 years old and  in her junior year at Raines High School in Katy, Texas, when she was lured into a wooded area in northwest Harris County and murdered by a close friend and schoolmate. According to authorities, near midnight on April 3, 2011, Bridgett Frisbie snuck out of her house to meet up with friends and was walking down the street when she was spotted by Alan Perez and Alex Olivieri who were out looking for her in Olivieris Chevrolet Suburban. The two men had preplanned to rough her (Frisbie) up that night and had prepared accordingly. Both the men were armed with pistols and Perez was dressed in all black and had a black face mask. When the men spotted Frisbie, Perez hid in the back seat of the car under a pile of blankets, as per their plan. A Threat to His Future Frisbie and Olivieri were good friends, so she had no reason not to accept a ride from him that night. Prosecutors believe that she did not realize the degree of anger Olivieri felt towards her because of a previous incident she had witnessed and was talking about with friends at school. Some weeks before, as a favor to Frisbie, Olivieri allegedly did a drive-by shooting at her ex-boyfriend’s house with his Yugo semiautomatic rifle. According to Perez, Olivieri told him that Frisbie was driving while he sprayed her ex-boyfriends home with bullets. He said Olivieri was worried that, if he was arrested for the shooting, it would hurt his future plans of having a career in the Army. The Murder With Frisbie in the Suburban and Perez hiding undetected in the back seat, Olivieri drove to a wooded area under the false pretense of needing to get something he had buried. Carrying a shovel, he and Frisbie walked into the woods. Perez followed the two from a distance and watched as Olivieri placed his hand on Frisbies back, then he pulled out his gun and  shot her in the back of the neck, killing her instantly. At around 3 a.m. Perez and Olivieri drove to downtown Houston to pick up Frisbies boyfriend, Zacharia Richards, from the Greyhound bus station. According to Perez, meeting Richards in Houston was going to part of the pairs alibi if questioned. On April 3, 2011, the body of Bridgette Frisbee was discovered in the wooded area by a group of children who were out riding dirt bikes. A search of the area turned up one 9 mm shell casing in the vicinity of Frisbies body. When the news of the murder was released, Olivieri text-messaged Perez and pretended to be informing him that their friend had been found dead. Confession for Immunity A few days after the discovery of Frisbies body, Perez, through an attorney, contacted police in regards to information that he had about the murder. Once he was  granted immunity  from prosecution, Perez confessed to what he knew about the murder, including fingering Olivieri as the triggerman. Perez later testified in court that the plan was to rough up Frisbie, but that he did not know of Olivieris plan to murder her and, after the shooting, the two exchanged heated words in the woods. Perez told the court, He came running at me, and I was in shock because he shot her. He described Olivieris attitude after murdering his long-time friend as unrepentant and that he showed no signs of remorse. Perez also admitted to following Olivieris instructions that night, to dress in dark clothing and a full face mask, to bring a firearm, and to hide under a stack of blankets in the back of the Chevrolet Suburban. Alexander Olivieri was found guilty of first-degree murder and was sentenced to 60 years in prison. It took the jury just under four hours to decide on Olivieris sentence. Bridgette Frisbie Bridgetts father Bob Frisbie, who adopted her when she was a toddler, described his daughter as being sometimes rebellious, but that she had  been through a lot in her short life, including the loss of her adoptive mother due to illness. He said that what he saw when he looked at his daughter was a fun-spirited 17-year-old who loved poetry and drawing and was a loving daughter. Olivieris Appeal Olivieris sentence was appealed due to three issues, outlined below from court papers filed by his defense attorneys: Issue One:  The trial court committed reversible error in denying defense counsels request to instruct the jury that Alan Perez was an accomplice witness as a matter of law. According to his attorney, by Perezs own testimony, he had entered into a conspiracy to commit a felony, which resulted in the complainants death. If Perezs testimony is taken as true, then there is no question he engaged in criminal conduct for which he could have been charged had he not been granted immunity. Perez was, therefore, an accomplice as a matter of law. Issue Two:  Insufficient evidence was presented to corroborate the testimony of Alan Perez, an accomplice witness. Olivieris attorney argued that corroboration of an accomplice witnesss testimony requires evidence that tends to link the accused with the crime committed. None of the evidence presented at trial tends to link Olivieri to the murder of the complainant for purposes of corroborating Perezs testimony. Issue Three:  The consent to search provided to law enforcement by Samuel Olivieri was not given voluntarily and was therefore invalid. According to the appeal,  police did not have a warrant  to search the Suburban driven by Olivieri, despite prior knowledge gleaned from Perez that it may contain evidence. As a way around the warrant requirement, police sought and received the consent of Olivieri s father to search the vehicle. The consent by Olivieris father was involuntary, as he was not aware that he had a right to refuse to give consent, had been subjected to a coercive show of authority by law enforcement, and was operating with less than full mental faculties after being awoken at 2 a.m. by police. The Court of Appeals for the First District of Texas overruled the three arguments and voted to uphold the trial court’s judgment. Alex Olivieri is currently housed at the Connally (CY) Correctional Institution in  Kenedy, Texas. His projected release date is November 2071. He will be 79 years old.