skip to main content
research-article

ISA Wars: Understanding the Relevance of ISA being RISC or CISC to Performance, Power, and Energy on Modern Architectures

Published:11 March 2015Publication History
Skip Abstract Section

Abstract

RISC versus CISC wars raged in the 1980s when chip area and processor design complexity were the primary constraints and desktops and servers exclusively dominated the computing landscape. Today, energy and power are the primary design constraints and the computing landscape is significantly different: Growth in tablets and smartphones running ARM (a RISC ISA) is surpassing that of desktops and laptops running x86 (a CISC ISA). Furthermore, the traditionally low-power ARM ISA is entering the high-performance server market, while the traditionally high-performance x86 ISA is entering the mobile low-power device market. Thus, the question of whether ISA plays an intrinsic role in performance or energy efficiency is becoming important again, and we seek to answer this question through a detailed measurement-based study on real hardware running real applications. We analyze measurements on seven platforms spanning three ISAs (MIPS, ARM, and x86) over workloads spanning mobile, desktop, and server computing. Our methodical investigation demonstrates the role of ISA in modern microprocessors’ performance and energy efficiency. We find that ARM, MIPS, and x86 processors are simply engineering design points optimized for different levels of performance, and there is nothing fundamentally more energy efficient in one ISA class or the other. The ISA being RISC or CISC seems irrelevant.

References

  1. Max Baron. 2010. The single-chip cloud computer. Microprocessor Report (April 2010).Google ScholarGoogle Scholar
  2. Dileep Bhandarkar. 1997. RISC versus CISC: A tale of two chips. SIGARCH Computer Architecture News 25, 1 (March 1997), 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Dileep Bhandarkar and Douglas W. Clark. 1991. Performance from architecture: Comparing a RISC and a CISC with similar hardware organization. In ASPLOS’91. 310--319. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Nathan Binkert, Bradford Beckmann, Gabriel Black, Steven Reinhardt, Ali Saidi, Arkaprava Basu, Joel Hestness, Derek Hower, Tushar Krishna, Somayeh Sardashti, Rathijit Sen, Korey Sewell, Muhammad Shoaib, Nilay Vaish, Mark Hill, and David Wood. 2011. The gem5 simulator. SIGARCH Computer Architecture News 39, 2 (Aug. 2011), 1--7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. W. Lloyd Bircher and Lizy K. John. 2008. Analysis of dynamic power management on multi-core processors. In ICS’08. 327--338. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Emily Blem, Jaikrishnan Menon, and Karthikeyan Sankaralingam. 2013. Power struggles: Revisiting the RISC vs. CISC debate on contemporary ARM and x86 architectures. In HPCA’13. 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Derek Bruening, Timothy Garnett, and Saman Amarasinghe. 2003. An infrastructure for adaptive dynamic optimization. In CGO’03. 265--275. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Robert Colwell, Charles Y. Hitchcock, III, E. Jensen, H. Brinkley Sprunt, and Charles Kollar. 1985. Instruction sets and beyond: Computers, complexity, and controversy. Computer 18, 9 (Sept. 1985), 8--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Marc de Kruijf, Shuou Nomura, and Karthikeyan Sankaralingam. 2010. Relax: An architectural framework for software recovery of hardware faults. In ISCA’10. 497--508. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hadi Esmaeilzadeh, Ting Cao, Yang Xi, Stephen Blackburn, and Kathryn McKinley. 2011. Looking back on the language and hardware revolutions: Measured power, performance, and scaling. In ASPLOS’11. 319--332. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hadi Esmaeilzadeh, Adrian Sampson, Luis Ceze, and Doug Burger. 2012. Architecture support for disciplined approximate programming. In ASPLOS’12. 301--312. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Michael Ferdman, Almutaz Adileh, Onur Kocberber, Stavros Volos, Mohammad Alisafaee, Djordje Jevdjic, Cansu Kaynak, Adrian Daniel Popescu, Anastasia Ailamaki, and Babak Falsafi. 2012. Clearing the clouds: A study of emerging scale-out workloads on modern hardware. In ASPLOS’12. 37--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Michael J. Flynn, Chad L. Mitchell, and Johannes M. Mulder. 1987. And now a case for more complex instruction sets. Computer 20, 9 (1987), 71--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Venkatraman Govindaraju, Chen-Han Ho, and Karthikeyan Sankaralingam. 2011. Dynamically specialized datapaths for energy efficient computing. In HPCA’11. 503--514. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Anthony Gutierrez, Ronald G. Dreslinski, Thomas F. Wenisch, Trevor Mudge, Ali Saidi, Chris Emmons, and Nigel Paver. 2011. Full-system analysis and characterization of interactive smartphone applications. In IISWC’11. 81--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. Hoste and L. Eeckhout. 2007. Microarchitecture-independent workload characterization. IEEE Micro 27, 3 (2007), 63--72. DOI: http://dx.doi.org/10.1109/MM.2007.56 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Canturk Isci and Margaret Martonosi. 2003. Runtime power monitoring in high-end processors: Methodology and empirical data. In MICRO’03. 93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Ciji Isen, Lizy John, and Eugene John. 2009. A tale of two processors: Revisiting the RISC-CISC debate. In 2009 SPEC Benchmark Workshop. 57--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Changkyu Kim, Tim Kaldewey, Victor W. Lee, Eric Sedlar, Anthony D. Nguyen, Nadathur Satish, Jatin Chhugani, Andrea Di Blas, and Pradeep Dubey. 2009. Sort vs. hash revisited: Fast join implementation on modern multi-core CPUs. VLDB’09 (2009), 1378--1389. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. David A. Patterson and David R. Ditzel. 1980. The case for the reduced instruction set computer. SIGARCH Comp. Arch. News 8, 6 (1980), 25--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Jun Rao and Kenneth A. Ross. 2000. Making B+− trees cache conscious in main memory. In SIGMOD’00. 475--486. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Ashish Venkat and Dean M. Tullsen. 2014. Harnessing ISA diversity: Design of a heterogeneous-ISA chip multiprocessor. In ISCA’14. 121--132. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. ISA Wars: Understanding the Relevance of ISA being RISC or CISC to Performance, Power, and Energy on Modern Architectures

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Computer Systems
      ACM Transactions on Computer Systems  Volume 33, Issue 1
      March 2015
      114 pages
      ISSN:0734-2071
      EISSN:1557-7333
      DOI:10.1145/2745713
      Issue’s Table of Contents

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 March 2015
      • Accepted: 1 October 2014
      • Revised: 1 June 2014
      • Received: 1 December 2013
      Published in tocs Volume 33, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader