Explain dataflow computation model, Computer Engineering

Explain dataflow computation model

An option to the von Neumann model of computation is a dataflow computation model. In a dataflow model the control is tied to the flow of data. The order of commands in the program has no role in the implementation order. Computations take place when all the data items needed for beginning execution of an instruction are accessible. Data is in constant flow independent of reusable memory cells and its accessibility initiates execution. Since data may be accessible for several instructions at the same mean time, these instructions can be implemented in parallel.

The potential for parallel computation is replicated by the dataflow graph, the nodes of which are the directions of the series and the edges of which characterize data dependency between instructions. The dataflow diagram for the instruction z = w × (x+y) is:-

                                                        2013_Explain dataflow computation model.png

Data movs on the boundaries of the graph in the variety of data tokens, which include data values and status information. A asynchronous parallel computation is resolute by the firing rule, which is uttered by means of tokens: a node of DFG can shoot if there is a token on each input boundary. If a node fires, it get through the input tokens, performs the connected operation and places result tokens on the output boundary. Graph nodes can be one instructions or tasks comprising many instructions.


Posted Date: 3/1/2013 6:10:56 AM | Location : United States

Related Discussions:- Explain dataflow computation model, Assignment Help, Ask Question on Explain dataflow computation model, Get Answer, Expert's Help, Explain dataflow computation model Discussions

Write discussion on Explain dataflow computation model
Your posts are moderated
Related Questions
Explain the use of SSL to secure the network.  SSL (Secure Sockets Layer) is a protocol developed by Netscape for transferring private documents by the Internet. SSL works by u

What are the applications of Electronic Data Interchange in business? The applications of Electronic Data Interchange are as given below: 1. Organisations that use EDI 2

Program generation activity aims at? Ans. At automatic generation of program the program generation activity aims.

System Software 1. Explain language processing? Explain its activities in detail. 2. Discuss briefly about Assembler directives. Also explain about Macro definition and call

Explain a macro Macro is a preprocessor directive, also called as macro definition takes the following general form:  #define identifier string

Binary number system is most common for computer due to two stable states of its components. However unfortunately this isn't a very natural system for us as we deal with decimal n

Write a program to input an address i.e. 20 Hex and read the byte (char) contents of that address   Answer   include void main() { char prompt; Date: 26th August 2012

A full binary tree with 'n' non-leaf nodes have  2n+l nodes.

I got a graduate level database assignment which is due at Dec 8, 11:59p.m. Can you finish it on time in high quality?

I can send you the lecture notes and assignments, and you will walk me through (either record a screencast, or kind on the assignments in red colored font) steps on how to do the a