Explain dataflow computation model, Computer Engineering

Explain dataflow computation model

An option to the von Neumann model of computation is a dataflow computation model. In a dataflow model the control is tied to the flow of data. The order of commands in the program has no role in the implementation order. Computations take place when all the data items needed for beginning execution of an instruction are accessible. Data is in constant flow independent of reusable memory cells and its accessibility initiates execution. Since data may be accessible for several instructions at the same mean time, these instructions can be implemented in parallel.

The potential for parallel computation is replicated by the dataflow graph, the nodes of which are the directions of the series and the edges of which characterize data dependency between instructions. The dataflow diagram for the instruction z = w × (x+y) is:-

                                                        2013_Explain dataflow computation model.png

Data movs on the boundaries of the graph in the variety of data tokens, which include data values and status information. A asynchronous parallel computation is resolute by the firing rule, which is uttered by means of tokens: a node of DFG can shoot if there is a token on each input boundary. If a node fires, it get through the input tokens, performs the connected operation and places result tokens on the output boundary. Graph nodes can be one instructions or tasks comprising many instructions.

 

Posted Date: 3/1/2013 6:10:56 AM | Location : United States







Related Discussions:- Explain dataflow computation model, Assignment Help, Ask Question on Explain dataflow computation model, Get Answer, Expert's Help, Explain dataflow computation model Discussions

Write discussion on Explain dataflow computation model
Your posts are moderated
Related Questions
Illustrate the list of key differences to word processors The following is a list of key differences to word processors: -  Most word processors force users to work on a doc

Rational Robot is a whole set of components for automating the testing of Microsoft Windows client/server and Internet applications. The major component of Robot lets you start

State the Protected mode interrupt In protected mode, interrupts have exactly same assignments just like in real mode though the interrupt vector table is different.  Instead

What is Error detection code? It is a binary code that notice digital errors during transmission. The detected errors cannot be correct but the presence is shown.

Explain how the Web enables effective collaborative computing. Discuss the similarities and differences among WebEx, Microsoft NetMeeting and Novell Groupwise software (in less tha

Business Software   Business  information  processing  is  the  biggest  single  software  application  area. Discrete "systems" (e.g., payroll accounts receivable/payable

Show by induction that your closed formula from (c) is the number of times that the given statement is implemented for a problem of size n.Note: if your proof is easily  a proof th

What are the two ways for restricting the value range for a domain? By specifying fixed values. By stipulating a value table.

COM add-ins are software program's which are included into an application and they add already built in features to an existing application. They have general architecture across m

Chaining: In this method, instead of hashing function value as location we use it as an index into an array of pointers. Every pointer access a chain that holds the element having