LogoLogo
Continuum WebsiteContinuum ApplicationsContinuum KnowledgeAxolotl Platform
Continuum Knowledge
Continuum Knowledge
  • Continuum
  • Data
    • Datasets
      • Pre Training Data
      • Types of Fine Tuning
      • Self Instruct Paper
      • Self-Alignment with Instruction Backtranslation
      • Systematic Evaluation of Instruction-Tuned Large Language Models on Open Datasets
      • Instruction Tuning
      • Instruction Fine Tuning - Alpagasus
      • Less is More For Alignment
      • Enhanced Supervised Fine Tuning
      • Visualising Data using t-SNE
      • UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction
      • Training and Evaluation Datasets
      • What is perplexity?
  • MODELS
    • Foundation Models
      • The leaderboard
      • Foundation Models
      • LLama 2 - Analysis
      • Analysis of Llama 3
      • Llama 3.1 series
      • Google Gemini 1.5
      • Platypus: Quick, Cheap, and Powerful Refinement of LLMs
      • Mixtral of Experts
      • Mixture-of-Agents (MoA)
      • Phi 1.5
        • Refining the Art of AI Training: A Deep Dive into Phi 1.5's Innovative Approach
      • Phi 2.0
      • Phi-3 Technical Report
  • Training
    • The Fine Tuning Process
      • Why fine tune?
        • Does Fine-Tuning LLMs on New Knowledge Encourage Hallucinations?
        • Explanations in Fine Tuning
      • Tokenization
        • Tokenization Is More Than Compression
        • Tokenization - SentencePiece
        • Tokenization explore
        • Tokenizer Choice For LLM Training: Negligible or Crucial?
        • Getting the most out of your tokenizer for pre-training and domain adaptation
        • TokenMonster
      • Parameter Efficient Fine Tuning
        • P-Tuning
          • The Power of Scale for Parameter-Efficient Prompt Tuning
        • Prefix-Tuning: Optimizing Continuous Prompts for Generation
        • Harnessing the Power of PEFT: A Smarter Approach to Fine-tuning Pre-trained Models
        • What is Low-Rank Adaptation (LoRA) - explained by the inventor
        • Low Rank Adaptation (Lora)
        • Practical Tips for Fine-tuning LMs Using LoRA (Low-Rank Adaptation)
        • QLORA: Efficient Finetuning of Quantized LLMs
        • Bits and Bytes
        • The Magic behind Qlora
        • Practical Guide to LoRA: Tips and Tricks for Effective Model Adaptation
        • The quantization constant
        • QLORA: Efficient Finetuning of Quantized Language Models
        • QLORA and Fine-Tuning of Quantized Language Models (LMs)
        • ReLoRA: High-Rank Training Through Low-Rank Updates
        • SLoRA: Federated Parameter Efficient Fine-Tuning of Language Models
        • GaLora: Memory-Efficient LLM Training by Gradient Low-Rank Projection
      • Hyperparameters
        • Batch Size
        • Padding Tokens
        • Mixed precision training
        • FP8 Formats for Deep Learning
        • Floating Point Numbers
        • Batch Size and Model loss
        • Batch Normalisation
        • Rethinking Learning Rate Tuning in the Era of Language Models
        • Sample Packing
        • Gradient accumulation
        • A process for choosing the learning rate
        • Learning Rate Scheduler
        • Checkpoints
        • A Survey on Efficient Training of Transformers
        • Sequence Length Warmup
        • Understanding Training vs. Evaluation Data Splits
        • Cross-entropy loss
        • Weight Decay
        • Optimiser
        • Caching
      • Training Processes
        • Extending the context window
        • PyTorch Fully Sharded Data Parallel (FSDP)
        • Train Short, Test Long: Attention with Linear Biases Enables Input Length Extrapolation
        • YaRN: Efficient Context Window Extension of Large Language Models
        • Sliding Window Attention
        • LongRoPE
        • Reinforcement Learning
        • An introduction to reinforcement learning
        • Reinforcement Learning from Human Feedback (RLHF)
        • Direct Preference Optimization: Your Language Model is Secretly a Reward Model
  • INFERENCE
    • Why is inference important?
      • Grouped Query Attention
      • Key Value Cache
      • Flash Attention
      • Flash Attention 2
      • StreamingLLM
      • Paged Attention and vLLM
      • TensorRT-LLM
      • Torchscript
      • NVIDIA L40S GPU
      • Triton Inference Server - Introduction
      • Triton Inference Server
      • FiDO: Fusion-in-Decoder optimised for stronger performance and faster inference
      • Is PUE a useful measure of data centre performance?
      • SLORA
  • KNOWLEDGE
    • Vector Databases
      • A Comprehensive Survey on Vector Databases
      • Vector database management systems: Fundamental concepts, use-cases, and current challenges
      • Using the Output Embedding to Improve Language Models
      • Decoding Sentence-BERT
      • ColBERT: Efficient and Effective Passage Search via Contextualized Late Interaction over BERT
      • SimCSE: Simple Contrastive Learning of Sentence Embeddings
      • Questions Are All You Need to Train a Dense Passage Retriever
      • Improving Text Embeddings with Large Language Models
      • Massive Text Embedding Benchmark
      • RocketQAv2: A Joint Training Method for Dense Passage Retrieval and Passage Re-ranking
      • LLM2Vec: Large Language Models Are Secretly Powerful Text Encoders
      • Embedding and Fine-Tuning in Neural Language Models
      • Embedding Model Construction
      • Demystifying Embedding Spaces using Large Language Models
      • Fine-Tuning Llama for Multi-Stage Text Retrieval
      • Large Language Model Based Text Augmentation Enhanced Personality Detection Model
      • One Embedder, Any Task: Instruction-Finetuned Text Embeddings
      • Vector Databases are not the only solution
      • Knowledge Graphs
        • Harnessing Knowledge Graphs to Elevate AI: A Technical Exploration
        • Unifying Large Language Models and Knowledge Graphs: A Roadmap
      • Approximate Nearest Neighbor (ANN)
      • High Dimensional Data
      • Principal Component Analysis (PCA)
      • Vector Similarity Search - HNSW
      • FAISS (Facebook AI Similarity Search)
      • Unsupervised Dense Retrievers
    • Retrieval Augmented Generation
      • Retrieval-Augmented Generation for Large Language Models: A Survey
      • Fine-Tuning or Retrieval?
      • Revolutionising Information Retrieval: The Power of RAG in Language Models
      • A Survey on Retrieval-Augmented Text Generation
      • REALM: Retrieval-Augmented Language Model Pre-Training
      • Retrieve Anything To Augment Large Language Models
      • Generate Rather Than Retrieve: Large Language Models Are Strong Context Generators
      • Active Retrieval Augmented Generation
      • DSPy: LM Assertions: Enhancing Language Model Pipelines with Computational Constraints
      • DSPy: Compiling Declarative Language Model Calls
      • DSPy: In-Context Learning for Extreme Multi-Label Classification
      • Optimizing Instructions and Demonstrations for Multi-Stage Language Model Programs
      • HYDE: Revolutionising Search with Hypothetical Document Embeddings
      • Enhancing Recommender Systems with Large Language Model Reasoning Graphs
      • Retrieval Augmented Generation (RAG) versus fine tuning
      • RAFT: Adapting Language Model to Domain Specific RAG
      • Summarisation Methods and RAG
      • Lessons Learned on LLM RAG Solutions
      • Stanford: Retrieval Augmented Language Models
      • Overview of RAG Approaches with Vector Databases
      • Mastering Chunking in Retrieval-Augmented Generation (RAG) Systems
    • Semantic Routing
    • Resource Description Framework (RDF)
  • AGENTS
    • What is agency?
      • Rephrase and Respond: Let Large Language Models Ask Better Questions for Themselves
      • Types of Agents
      • The risk of AI agency
      • Understanding Personality in Large Language Models: A New Frontier in AI Psychology
      • AI Agents - Reasoning, Planning, and Tool Calling
      • Personality and Brand
      • Agent Interaction via APIs
      • Bridging Minds and Machines: The Legacy of Newell, Shaw, and Simon
      • A Survey on Language Model based Autonomous Agents
      • Large Language Models as Agents
      • AI Reasoning: A Deep Dive into Chain-of-Thought Prompting
      • Enhancing AI Reasoning with Self-Taught Reasoner (STaR)
      • Exploring the Frontier of AI: The "Tree of Thoughts" Framework
      • Toolformer: Revolutionising Language Models with API Integration - An Analysis
      • TaskMatrix.AI: Bridging Foundational AI Models with Specialised Systems for Enhanced Task Completion
      • Unleashing the Power of LLMs in API Integration: The Rise of Gorilla
      • Andrew Ng's presentation on AI agents
      • Making AI accessible with Andrej Karpathy and Stephanie Zhan
  • Regulation and Ethics
    • Regulation and Ethics
      • Privacy
      • Detecting AI Generated content
      • Navigating the IP Maze in AI: The Convergence of Blockchain, Web 3.0, and LLMs
      • Adverse Reactions to generative AI
      • Navigating the Ethical Minefield: The Challenge of Security in Large Language Models
      • Navigating the Uncharted Waters: The Risks of Autonomous AI in Military Decision-Making
  • DISRUPTION
    • Data Architecture
      • What is a data pipeline?
      • What is Reverse ETL?
      • Unstructured Data and Generatve AI
      • Resource Description Framework (RDF)
      • Integrating generative AI with the Semantic Web
    • Search
      • BM25 - Search Engine Ranking Function
      • BERT as a reranking engine
      • BERT and Google
      • Generative Engine Optimisation (GEO)
      • Billion-scale similarity search with GPUs
      • FOLLOWIR: Evaluating and Teaching Information Retrieval Models to Follow Instructions
      • Neural Collaborative Filtering
      • Federated Neural Collaborative Filtering
      • Latent Space versus Embedding Space
      • Improving Text Embeddings with Large Language Models
    • Recommendation Engines
      • On Interpretation and Measurement of Soft Attributes for Recommendation
      • A Survey on Large Language Models for Recommendation
      • Model driven recommendation systems
      • Recommender AI Agent: Integrating Large Language Models for Interactive Recommendations
      • Foundation Models for Recommender Systems
      • Exploring the Impact of Large Language Models on Recommender Systems: An Extensive Review
      • AI driven recommendations - harming autonomy?
    • Logging
      • A Taxonomy of Anomalies in Log Data
      • Deeplog
      • LogBERT: Log Anomaly Detection via BERT
      • Experience Report: Deep Learning-based System Log Analysis for Anomaly Detection
      • Log-based Anomaly Detection with Deep Learning: How Far Are We?
      • Deep Learning for Anomaly Detection in Log Data: A Survey
      • LogGPT
      • Adaptive Semantic Gate Networks (ASGNet) for log-based anomaly diagnosis
  • Infrastructure
    • The modern data centre
      • Enhancing Data Centre Efficiency: Strategies to Improve PUE
      • TCO of NVIDIA GPUs and falling barriers to entry
      • Maximising GPU Utilisation with Kubernetes and NVIDIA GPU Operator
      • Data Centres
      • Liquid Cooling
    • Servers and Chips
      • The NVIDIA H100 GPU
      • NVIDIA H100 NVL
      • Lambda Hyperplane 8-H100
      • NVIDIA DGX Servers
      • NVIDIA DGX-2
      • NVIDIA DGX H-100 System
      • NVLink Switch
      • Tensor Cores
      • NVIDIA Grace Hopper Superchip
      • NVIDIA Grace CPU Superchip
      • NVIDIA GB200 NVL72
      • Hopper versus Blackwell
      • HGX: High-Performance GPU Platforms
      • ARM Chips
      • ARM versus x86
      • RISC versus CISC
      • Introduction to RISC-V
    • Networking and Connectivity
      • Infiniband versus Ethernet
      • NVIDIA Quantum InfiniBand
      • PCIe (Peripheral Component Interconnect Express)
      • NVIDIA ConnectX InfiniBand adapters
      • NVMe (Non-Volatile Memory Express)
      • NVMe over Fabrics (NVMe-oF)
      • NVIDIA Spectrum-X
      • NVIDIA GPUDirect
      • Evaluating Modern GPU Interconnect
      • Scalable Hierarchical Aggregation and Reduction Protocol (SHARP)
      • Next-generation networking in AI environments
      • NVIDIA Collective Communications Library (NCCL)
    • Data and Memory
      • NVIDIA BlueField Data Processing Units (DPUs)
      • Remote Direct Memory Access (RDMA)
      • High Bandwidth Memory (HBM3)
      • Flash Memory
      • Model Requirements
      • Calculating GPU memory for serving LLMs
      • Transformer training costs
      • GPU Performance Optimisation
    • Libraries and Complements
      • NVIDIA Base Command
      • NVIDIA AI Enterprise
      • CUDA - NVIDIA GTC 2024 presentation
      • RAPIDs
      • RAFT
    • Vast Data Platform
      • Vast Datastore
      • Vast Database
      • Vast Data Engine
      • DASE (Disaggregated and Shared Everything)
      • Dremio and VAST Data
    • Storage
      • WEKA: A High-Performance Storage Solution for AI Workloads
      • Introduction to NVIDIA GPUDirect Storage (GDS)
        • GDS cuFile API
      • NVIDIA Magnum IO GPUDirect Storage (GDS)
      • Vectors in Memory
Powered by GitBook
LogoLogo

Continuum - Accelerated Artificial Intelligence

  • Continuum Website
  • Axolotl Platform

Copyright Continuum Labs - 2023

On this page
  • What Are RISC and CISC?
  • Key Differences and Comparisons
  • Future Prospects
  • The future of RISC
  • Introduction to RISC-V: A New Era in Processor Design
  • Advantages of RISC-V
  • Conclusion

Was this helpful?

  1. Infrastructure
  2. Servers and Chips

RISC versus CISC

RISC (Reduced Instruction Set Computer) and CISC (Complex Instruction Set Computer) are two fundamental processor architectures that handle data processing differently.

Their distinctions lie in how they manage operations, affecting everything from computing speed to energy efficiency and system complexity.

What Are RISC and CISC?

CISC, which stands for Complex Instruction Set Computer, was developed to minimise the number of instructions per program, aiming to achieve higher performance by performing multiple operations with fewer instructions.

This architecture is designed to reduce the software complexity of writing assembly language by incorporating more complex instructions directly into the hardware.

RISC, or Reduced Instruction Set Computer, contrasts this by simplifying the hardware.

RISC uses a larger number of simpler instructions, which are designed to be executed quickly within one or a few clock cycles.

This design philosophy emphasises efficiency and speed, relying on the compiler to break down high-level language commands into simpler machine instructions.

Key Differences and Comparisons

  1. Instruction Complexity:

    • CISC: Uses complex instructions that can execute several low-level operations, such as loading from memory, an arithmetic operation, and storing back to memory, all in a single instruction.

    • RISC: Focuses on simpler instructions that typically do one thing (e.g., either load, store, or arithmetic operation) per instruction.

  2. Performance:

    • CISC: CISC processors generally have more cycles per instruction but can execute more complex operations in a single instruction, potentially reducing the need for numerous instructions.

    • RISC: Aims to complete instructions in one clock cycle, which can lead to better performance in pipelined architectures.

  3. Hardware and Software Dependency:

    • CISC: Leans on hardware to accomplish complex tasks, using more transistors for decoding and executing the multifaceted instructions.

    • RISC: Leans more on software, utilising compilers to optimise instructions into simpler, more manageable tasks for the processor.

  4. Memory Access:

    • CISC: Instructions often manipulate data directly in memory.

    • RISC: Uses a load/store architecture where data must be moved to registers before processing.

  5. Usage in Applications:

    • CISC: Predominantly used in environments where performance per watt is less critical, such as desktop computers and servers (e.g., Intel and AMD processors).

    • RISC: Common in mobile devices where power efficiency is crucial, such as smartphones and tablets (e.g., ARM processors).

Future Prospects

The future of processor architecture seems to be leaning towards a blend of RISC’s efficiency and CISC’s power, particularly as seen in the development of ARM’s RISC-based processors which now power a vast array of devices beyond just mobile technology.

These processors are now found in environments previously dominated by CISC, such as desktops and servers, due to their efficiency and adaptability.

Furthermore, with the rise of AI and machine learning, the efficient handling of parallel tasks has become more critical, spotlighting the advantages of RISC architectures in handling such operations due to their simpler, faster instruction execution which is ideal for parallel processing.

The future of RISC

The future of RISC (Reduced Instruction Set Computer) architecture looks promising and expansive, especially as technological demands evolve towards more energy-efficient, high-performance computing across various platforms.

Here are several key aspects that illustrate how RISC is likely to shape and fit into the future of technology:

Proliferation in Mobile and IoT Devices

RISC architectures, particularly ARM-based processors, are dominant in mobile devices due to their power efficiency and performance.

This trend is expected to continue and expand into the Internet of Things (IoT) where power efficiency, low cost, and connectivity are paramount. As billions of devices get connected to the internet, RISC's efficient processing capabilities make it an ideal choice.

Growth in Edge Computing

Edge computing processes data near the source of data generation rather than relying on a central data centre.

This approach is beneficial for real-time applications like autonomous vehicles, smart cities, and real-time analytics.

RISC's efficient power consumption and performance characteristics make it suitable for edge devices, which often rely on battery power and require efficient processing capabilities to handle complex tasks locally.

Adoption in Servers and High-Performance Computing

Traditionally dominated by CISC architectures like x86, the server and supercomputing space are increasingly adopting RISC architectures.

The ARM architecture is making significant inroads here, offering a compelling mix of performance, scalability, and energy efficiency that is attractive for data centres looking to reduce energy costs and carbon footprints.

Role in Artificial Intelligence and Machine Learning

AI and machine learning workloads benefit from high parallel processing capabilities.

RISC processors, particularly those designed with specific AI acceleration capabilities, are well-positioned to handle these demands efficiently.

The simplicity of the RISC instruction set allows for more straightforward optimisation of AI algorithms, potentially reducing latency and increasing throughput.

Advancements in Semiconductor Technology

As semiconductor manufacturing continues to advance, the ability to pack more transistors into chips will benefit RISC architectures by allowing more room for specialized processing units.

This could lead to more powerful RISC-based multicore processors that can handle a wider array of tasks simultaneously, further enhancing their applicability to complex computing tasks.

Increased Customisation and Specialisation

The future of computing involves more specialised processors tailored for specific applications.

RISC's simpler design allows for easier customisation and the integration of specialised cores alongside traditional processing units. This flexibility will likely be important in developing processors for specific industry needs, such as automotive, telecommunications, and healthcare.

Integration with Open Source and Community-Driven Development

The rise of open-source RISC architectures like RISC-V offers a new paradigm where companies and researchers can collaborate on processor designs without the licensing costs associated with proprietary architectures like ARM. This openness is likely to foster innovation and accelerate the adoption of RISC architectures in various sectors.

Introduction to RISC-V: A New Era in Processor Design

RISC-V (pronounced "risk-five") is an open-source instruction set architecture (ISA) that is revolutionising the world of processor design.

Developed at the University of California, Berkeley, RISC-V offers a fresh approach to creating processors that are cost-effective, customisable, and efficient.

Understanding RISC-V Architecture RISC-V is based on the principles of Reduced Instruction Set Computing (RISC), which aims to simplify processor design by using a smaller, more efficient set of instructions.

The RISC-V ISA is divided into a base integer instruction set and optional extensions, providing a modular and extensible framework for processor design.

The base integer instruction set comes in two variants: RV32I (32-bit) and RV64I (64-bit).

Despite its simplicity, the base set contains only 47 instructions, which are sufficient for general-purpose computing. These instructions cover essential operations like arithmetic, logical, branching, and memory access.

Standard extensions can be added to the base ISA to provide additional functionality. Some notable extensions include:

  • M: Integer Multiply/Divide instructions

  • A: Atomic instructions for synchronisation and memory-ordering

  • F: Single-Precision Floating-Point instructions

  • D: Double-Precision Floating-Point instructions

  • C: Compressed instructions for reduced code size

One of the most powerful features of RISC-V is the ability to create custom extensions.

Designers can define their own instructions to accelerate specific workloads, such as cryptography, signal processing, or machine learning.

This extensibility enables processors to be highly optimised for their target applications.

RISC-V processors have 32 general-purpose registers, with a fixed-length, 32-bit instruction format.

The consistent instruction size simplifies the decoding and execution process, leading to faster and more efficient processors.

RISC-V also follows a load/store architecture, where data must be explicitly moved between memory and registers using load and store instructions.

Applications and Use Cases RISC-V's open-source nature and modular design make it suitable for a wide range of applications, from tiny embedded devices to high-performance computing systems.

Internet of Things (IoT) and Embedded Systems

RISC-V's low cost, customisability, and energy efficiency make it an attractive choice for IoT and embedded devices.

By tailoring the ISA to the specific requirements of the application, designers can create processors that are highly optimised for size, power consumption, and performance. The open-source nature of RISC-V also enables a more diverse and innovative ecosystem of IoT devices.

Artificial Intelligence and Machine Learning

RISC-V's extensibility allows designers to create custom instructions that accelerate AI and machine learning workloads.

By incorporating specialised hardware units for operations like matrix multiplication, convolution, and activation functions, RISC-V processors can deliver high performance and energy efficiency for inference and training tasks.

The open-source nature of RISC-V also facilitates collaboration and innovation in the development of AI accelerators.

Data Centres and Cloud Computing

RISC-V's scalability and energy efficiency make it a promising option for data centre and cloud computing applications.

By leveraging the modular design of RISC-V, processors can be optimised for specific workloads, such as web serving, database processing, or data analytics.

The open-source nature of RISC-V also enables the development of a more diverse and competitive ecosystem of server processors, reducing costs and promoting innovation.

Automotive and Industrial Control Systems

RISC-V's deterministic behavior and customisability make it well-suited for automotive and industrial control systems.

By creating processors with real-time capabilities and fail-safe mechanisms, designers can ensure the reliable and safe operation of critical systems. The open-source nature of RISC-V also enables greater transparency and auditability, which is essential for safety-critical applications.

High-Performance Computing and Scientific Simulation

RISC-V's scalability and extensibility make it a promising option for high-performance computing and scientific simulation.

By designing processors with custom instructions for application-specific workloads, researchers can accelerate complex computational tasks and improve the efficiency of scientific simulations.

The open-source nature of RISC-V also enables collaboration and innovation in the development of HPC systems.

Advantages of RISC-V

RISC-V offers several compelling advantages over traditional proprietary ISAs:

Cost-Effective

By eliminating licensing fees and providing a free, open-source ISA, RISC-V reduces the cost of developing and deploying processors. This cost-effectiveness is particularly attractive for start-ups, academia, and developing countries.

Customizable

RISC-V's modular and extensible design allows designers to create processors that are highly optimised for specific applications. This customisation can lead to improved performance, power efficiency, and cost-effectiveness compared to general-purpose processors.

Interoperable

The standardised RISC-V ISA ensures compatibility and interoperability between different implementations. This interoperability fosters collaboration and innovation in the processor ecosystem, as developers can easily share and reuse hardware and software components.

Secure

The simple and clean-slate design of RISC-V makes it easier to analyse and verify the security of processors. The open-source nature of RISC-V also enables more scrutiny and faster identification of vulnerabilities, leading to more secure systems overall.

Conclusion

RISC-V represents a paradigm shift in processor design, offering a free, open, and modular alternative to proprietary ISAs.

By emphasising simplicity, extensibility, and interoperability, RISC-V enables a new era of processor innovation and customisation.

As the RISC-V ecosystem continues to grow and mature, it has the potential to democratise access to high-performance, energy-efficient, and secure computing across a wide range of applications.

From tiny embedded devices to powerful data centre processors, RISC-V is poised to play a significant role in shaping the future of computing.

As more industries adopt RISC-V and contribute to its development, we can expect to see a proliferation of innovative and efficient processors that drive technological progress forward.

PreviousARM versus x86NextIntroduction to RISC-V

Last updated 11 months ago

Was this helpful?

Page cover image