Explain the data dependency, Computer Engineering

Assignment Help:

Data Dependency

It indicates to the situation in which two or more instructions share same data. The instructions in a program are able to be arranged based on relationship of data dependency. It means how two segments or instructions are data dependent on each other. The subsequent types of data dependencies are identified:

i)  Output dependence: When output of the two instructions I1 and I2 overlap on same data, the instructions are said output dependent.  

ii) I/O dependence: When read and write operations by two instructions are invoked on the same file, it's the condition of I/O dependence.

iii) Flow dependence: If instruction I2 follows I1 and output of I1 becomes input of I2, then I2 is said to be flow dependent on I1

iv) Anti dependence: When instruction I2 follows instruction I1 such that output of instruction I2 overlaps with the input of instruction I1 on the same data.

Think about the subsequent program instructions:

I1: a = b

I2: c = a + d

I3: a = c

In this program segment instructions I1 and I2 are Flow dependent since variable a is produced by instruction I1 as output and used by instruction I2 as input. Instructions I2 and I3 are Anti dependent since variable a is produced by I3 but used by I2 and in sequence I2 comes first. I3 is flow dependent on I2 due to variable c. Instructions I3 and Instruction I1 are Output dependent since variable a is produced by both instructions.


Related Discussions:- Explain the data dependency

How to get the column count of a report, How to get the column count of a r...

How to get the column count of a report? SY-LINSZ system variable gives the column count (line size) and SY-LINCT for line count.

What is interrupt vector table, Interrupt vector table is always created in...

Interrupt vector table is always created in first 1K area of the memory. Explain why? When CPU receives an interrupt type number from PIC, it uses this number to look up corres

AWS, hosting on aws

hosting on aws

Discuss about second generation electronic computers, Second Generation (19...

Second Generation (1954-1962) The second generation saw various significant developments at every level of computer system design, from technology used to build the basic circu

What is a verification point?, A verification point is a point in a script ...

A verification point is a point in a script that you make to confirm the state of an object across builds of the application-under-test.

Access to external identifiers, Access to External Identifiers: An external...

Access to External Identifiers: An external identifier is one which is referred in one module though defined in another. You can declare an identifier to be external by including i

Shm, composition of two shm in right angles to each other to havingg time p...

composition of two shm in right angles to each other to havingg time period in the ratio 1:2

What is uml, ? UML is called as Unified Modeling Language. ? it is used...

? UML is called as Unified Modeling Language. ? it is used to Graphical language for visualizing artifacts of the system. ? It Allow to make a blue print of all the aspects

Write shorts notes on digital signature, Write shorts notes on Digital Si...

Write shorts notes on Digital Signature. This method is used to authenticate the sender of a message. For sign a message, the sender encrypts the message by using a key ident

Multiple instances of sql server 2000, How do I connect to an SQL Server in...

How do I connect to an SQL Server instance that is running on a machine with multiple instances of SQL Server 2000? Ans) Every instance of MS SQL Server must be listening on a d

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd