Explain dataflow computation model, Computer Engineering

Assignment Help:

Explain dataflow computation model

An option to the von Neumann model of computation is a dataflow computation model. In a dataflow model the control is tied to the flow of data. The order of commands in the program has no role in the implementation order. Computations take place when all the data items needed for beginning execution of an instruction are accessible. Data is in constant flow independent of reusable memory cells and its accessibility initiates execution. Since data may be accessible for several instructions at the same mean time, these instructions can be implemented in parallel.

The potential for parallel computation is replicated by the dataflow graph, the nodes of which are the directions of the series and the edges of which characterize data dependency between instructions. The dataflow diagram for the instruction z = w × (x+y) is:-

                                                        2013_Explain dataflow computation model.png

Data movs on the boundaries of the graph in the variety of data tokens, which include data values and status information. A asynchronous parallel computation is resolute by the firing rule, which is uttered by means of tokens: a node of DFG can shoot if there is a token on each input boundary. If a node fires, it get through the input tokens, performs the connected operation and places result tokens on the output boundary. Graph nodes can be one instructions or tasks comprising many instructions.

 


Related Discussions:- Explain dataflow computation model

Discuss about the electronic computer, Discuss about the Electronic compute...

Discuss about the Electronic computer The first general function programmable electronic computer was the Electronic Numerical Integrator and Computer (ENIAC), built by John V

Why gateways are used during mail transfer, Why Gateways are used during ma...

Why Gateways are used during mail transfer? Email using SMTP effort best while both the sender and the receiver are on the internet and can hold TCP connections in between send

Explain about com add-ins, COM add-ins are software program's which are inc...

COM add-ins are software program's which are included into an application and they add already built in features to an existing application. They have general architecture across m

Explain LRU page replacement algorithm, Explain LRU Page replacement algori...

Explain LRU Page replacement algorithm. LRU policy: It expands to least recently use. This policy proposes that we remove a page that last usage is farthest from present time

Software, is c++ is language or any software

is c++ is language or any software

Illustrate the cache memory operation, Q. Illustrate the Cache Memory Opera...

Q. Illustrate the Cache Memory Operation? It comprises a copy of a part of main memory contents. When a program is running and CPU tries to read a word of memory (instruction o

Show the transmission control protocol, Q. Show the Transmission Control Pr...

Q. Show the Transmission Control Protocol? Transmission Control Protocol (TCP) TCP makes Internet reliable. TCP solves many problems which can occur in a packet switching

What is zero address instruction, Zero address instruction.  It is also...

Zero address instruction.  It is also possible to use instruction where the location s of all operand is explained implicitly. This operand of the use of the method for storing

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd