Dataflow computing, Computer Engineering

Assignment Help:

Dataflow Computing

A different to the von Neumann model of computation is the dataflow computation model. In a dataflow model, control is fixed to the flow of data. The order of commands in the program plays no role on the implementation order. Execution of an instruction can take place when all the information needed by the instruction is available. Data is in continuous flow

Independent of reusable memory cells and its ease of use initiate execution. Since, data is available for several instructions at the same time; these instructions can be executed in parallel.

For the purpose of exploiting parallelism in totalling Data Flow Graph notation is used to signify computations. In a data flow graph, the nodes shows instructions of the program and the edges shows data dependency between instructions.  We can take as an ex, the dataflow graph for the order

                                                             z = w × (x+y) is shown in Figure 2.

                                                               1928_Dataflow Computing.png

Data moves on the boundaries of the graph in the variety of data tokens, which includes data values and status information. This asynchronous parallel computation is resolute by the firing rule, which is expressed by way of tokens: a node of DFG can shoot if there is a token on each of its input edges. If a node fires, it takes the input tokens, present the associated operation and places result tokens on the output edge. Graph nodes can be only instructions or tasks comprising multiple instructions.

The benefit of the dataflow concept is that nodes of DFG can be self-scheduled. But, the hardware support to recognize the ease of use of necessary data is much more difficult than the von Neumann model. The pattern of dataflow computer includes MIT Tagged Token Data Flow architecture and Manchester Data Flow Machine.


Related Discussions:- Dataflow computing

Write a linux terminal shell, Write a Linux terminal shell. Your shell shou...

Write a Linux terminal shell. Your shell should act similar to bash. At a high level, your shell should accomplish the following: 1. Print a prompt when waiting for input from t

Define the state and instance of properties of object, Define the state and...

Define the state and instance of properties of object A state encompasses all properties of object along with values of each of these properties. An instance is a concr

Which translator perform macro expansion, Which translator perform macro ex...

Which translator perform macro expansion, is called? Ans. Macro pre-processor perform macro expansion.

Illustrate function of 4-input multiplexer using basic gates, Illustrate fu...

Illustrate functional diagram of digital multiplexer . Write the scheme of a 4- input multiplexer using basic gates (AND/OR/NOT) and explain its operation. Ans: Multiple

What is the use of status command, What is the use of status command, data ...

What is the use of status command, data output command, and data input command. A status command is used to test a variety of status conditions in the interface and the periphe

Evaluate - 48 - 23 by using the 2's complement method, Perform the - 48 - 2...

Perform the - 48 - 23 operations using the 2's complement method. Ans. - 48 - 23 = - 48 + (-23)     -48     =  1 1 0 1 0 0 0 0     -23     =  1 1 1 0 1 0 0 1       = -71

Determine the uses of smart cards, Determine the uses of Smart cards  ...

Determine the uses of Smart cards  These comprise embedded microchips and receive power from the card readers; Microchip is made up of RAM, ROM and 16-bit processor and the st

Instruction level-levels of parallel processing, Instruction Level It r...

Instruction Level It refers to the condition where different instructions of a program are implemented by different processing elements. Most processors have numerous execution

Define flash memory, Define Flash Memory. It is an approach same to EEP...

Define Flash Memory. It is an approach same to EEPROM technology. A flash cell is based on a one transistor controlled by trapped charge just like an EEPROM cell.

Unix, A friend has promised to log in at a particular time. However, he nee...

A friend has promised to log in at a particular time. However, he needs to be contacted as soon as he logs in. The shell script checks after every minute whether he has logged in o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd