Dataflow computing, Computer Engineering

Dataflow Computing

A different to the von Neumann model of computation is the dataflow computation model. In a dataflow model, control is fixed to the flow of data. The order of commands in the program plays no role on the implementation order. Execution of an instruction can take place when all the information needed by the instruction is available. Data is in continuous flow

Independent of reusable memory cells and its ease of use initiate execution. Since, data is available for several instructions at the same time; these instructions can be executed in parallel.

For the purpose of exploiting parallelism in totalling Data Flow Graph notation is used to signify computations. In a data flow graph, the nodes shows instructions of the program and the edges shows data dependency between instructions.  We can take as an ex, the dataflow graph for the order

                                                             z = w × (x+y) is shown in Figure 2.

                                                               1928_Dataflow Computing.png

Data moves on the boundaries of the graph in the variety of data tokens, which includes data values and status information. This asynchronous parallel computation is resolute by the firing rule, which is expressed by way of tokens: a node of DFG can shoot if there is a token on each of its input edges. If a node fires, it takes the input tokens, present the associated operation and places result tokens on the output edge. Graph nodes can be only instructions or tasks comprising multiple instructions.

The benefit of the dataflow concept is that nodes of DFG can be self-scheduled. But, the hardware support to recognize the ease of use of necessary data is much more difficult than the von Neumann model. The pattern of dataflow computer includes MIT Tagged Token Data Flow architecture and Manchester Data Flow Machine.

Posted Date: 3/1/2013 4:45:35 AM | Location : United States







Related Discussions:- Dataflow computing, Assignment Help, Ask Question on Dataflow computing, Get Answer, Expert's Help, Dataflow computing Discussions

Write discussion on Dataflow computing
Your posts are moderated
Related Questions
Instruction Length: Variable-length instructions (Intel 80x86, VAX) need multi-step fetch and decode, but permit for a much more flexible and compressed instruction set.

Q. Find simplified function F and implement that function using only NAND gates. 1.  F(A,B,C) = (A+B) (A'+B+C') (A'+B'+C') 2.  F (A,B,C,D) = A'B'C'+B'CD'+A'BCD'+AB'C' 3.

As the name suggests, the function acts as a friend to a class. As a friend of a class, it can access its private & protected members. A friend function is not a member of the clas

How can we access the correction and transport system? Each time you make a new object or change an existing object in the ABAP/4 Dictionary, you branch automatically to the W

Explain Common Control. Common Control: Those systems wherein the control subsystem is outside the switching network are termed as common control switching system. Therefore,

Define Random scan/Raster scan displays?  Random scan is a method in which the display is made by the electronic beam which is directed only to the points or part of the screen

Define memory cycle time? It is the time delay needed between the initiations of two successive memory operations. Eg. The time among two successive read operations.

Convert the decimal number 45678 to its hexadecimal equivalent number. Ans: (45678) 10 =(B26E) 16 (45678) 10 =(B26E) 16

Development of information system must be considered as capital investment: The developer of an information system must think about different solutions of a particular problem and

i need help with an octave program