SlideShare a Scribd company logo
1 of 16
A SEMINAR ON :
DATAFLOWCOMPUTER
PAPER NAME – COMPUTER ARCHITECTURE
PAPER CODE – IT502
CONTENT Contents
INTRODUCTION :
Data flow computers are based on the concept of data-driven computation, which is
drastically different from the operation of conventional von Neumann machine.The
fundamental difference is that instruction execution in a conventional computer is under
program-flow control, whereas that in a data flow computer is driven by the data
(operand) availability.
The data-driven concept means asynchrony, which means that many instructions can be
executed simultaneously and asynchronously. A higher degree of implicit parallelism is
expected in dataflow computer. Becuase there is no use of shared memory cells, dataflow
programs are free from side effects.
The Dataflow Principles section reviews the basic principles of the dataflow model.The
Dataflow Graphs section gives the representations used in dataflow system.The Dataflow
Architectures section provides a general description of the dataflow architecture.The
discussion includes a comparison of the architectural characteristics and the evolutionary
improvements in dataflow computing.
OBJECTIVE
 Dataflow architecture is a computer achitecture that directly opposite of
the traditional von Neumann architecture or control flow architecture.
It has been successfully implemented in specialized hardware such as
in digital signal processing, network routing, graphics processing, telemetry,
and more recently in data warehousing.
The main objective and scope of our Project is about the discuss of principle
and the uses of dataflow computer.
Features Of Dataflow Computers :
 Intermediate or final results are passed directly as data token
between instructions.
 There is no concept of shared data storage as embodied the
traditional notation of a variable.
 Program sequencing is constrained only by data dependency among
instructions.
DATA FLOW GRAPH :
Dataflow graphs can be viewed as the machine language for dataflow computers. A
data flow graph is a directed graph whose nodes correspond to operators and arcs
are pointers for forwardig data tokens.
 A producing node is connected to a consuming
node by an arc, and the “point” where an arc
enters a node is called an input port.
 The execution of an instruction is called the
firing of a node.
 Data is sent along the arcs of the dataflow graph
in the form of tokens, which are created by
computational nodes and placed on output arcs.
Example With a expression :
The below figure illustrates an example of dataflow graph for evaluation
of expression X2– 2*X + 3.
The following subtraction operation will not be
carried out until these values are available. As
soon as X2 and 2*X values are computed
subtraction operation will be carried out which
in turn will provide input to next addition
operation.
DATAFLOW ARCHITECTURE :
 Dataflow architecture is a computer
achitecture that directly contrasts the
traditional von Neumann architecture
or control flow architecture.
 Although no commercially successful
general-purpose computer hardware has
used a dataflow architecture, it has been
successfully implemented in specialized
hardware such as in digital signal
processing, network routing, graphics
processing, telemetry, and more recently in
data warehousing.
MODELS OF DATAFLOWARCHITECTURE :
 Depending on the way of handling data tokens, data
flow computers are divided into :
I. static model
II. dynamic model.
 STATIC DATA FLOW MACHINES :
o In static data flow machine, data tokens are
assumed to move along the arcs of the data flow
program graph to the operator nodes.
o This architecture is considered static because
tokens are not labeled and control tokens must be
used to acknowledge the proper timing in
transferring data tokens from node to node.
DYNAMIC DATAFLOW MACHINE :
o A dynamic data flow machine uses tagged tokens, so that more than one
token can exist in an arc.The tagging is achieved by attaching a label with each
token which uniquely identifies the context of that particular token.
o The dynamic dataflow allows greater exploitation of parallelism; however, this
advantage comes at the expense of the overhead in terms of the generation of
tags, larger data tokens, and complexity of the matching tokens.
 COMPILER :
 Normally, in the control flow architecture compilers analyze program code for
data dependencies between instructions in order to better organize the
instruction sequences in the binary output files.
 Binaries compiled for a dataflow machine contain this dependency information.
 Adataflow compiler records these dependencies by creating unique tags for each
dependency instead of using variable names.
PROGRAM :
 Programs are loaded into the CAM of a dynamic dataflow computer.When
all of the tagged operands of an instruction become available (that is, output
from previous instructions and/or user input), the instruction is marked as
ready for execution by an execution unit.
 Once an instruction is completed by an execution unit, its output data is sent
(with its tag) to the CAM. Any instructions that are dependent upon this
particular datum (identified by its tag value) are then marked as ready for
execution.
INSTRUCTION :
An instruction, along with its required data operands, is transmitted to an execution unit as
a packet, also called an instruction token. Similarly, output data is transmitted back to the
CAM as a data token.The packetization of instructions and results allows for parallel
execution of ready instructions on a large scale
Dataflow networks deliver the instruction tokens to the execution units and return the data
tokens to the CAM. In contrast to the conventional von Neumann architecture, data tokens
are not permanently stored in memory, rather they are transient messages that only exist
when in transit to the instruction storage
CONCLUSION :
The advances from the development of dataflow machines indicate potential high
performance computation based on the dataflow principles.This is necessary owing to
increased demands of processing of complex scientific and technical data. As such
applications require large processing times, data flow computers may help reduce the
processing times and thus improve efficiency and effectiveness of implemented
algorithms. However, there are still many issues to be addressed for the efficient use of
dataflow computers.
REFERENCE
international Journal of Networking & Parallel Computing
www.cirworld.comVolume 1, Issue 2, November, 2012
THANK YOU

More Related Content

What's hot

Superscalar & superpipeline processor
Superscalar & superpipeline processorSuperscalar & superpipeline processor
Superscalar & superpipeline processor
Muhammad Ishaq
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
Ashish Kumar
 
Parallel Programing Model
Parallel Programing ModelParallel Programing Model
Parallel Programing Model
Adlin Jeena
 

What's hot (20)

Unified process Model
Unified process ModelUnified process Model
Unified process Model
 
Software project management Software economics
Software project management Software economicsSoftware project management Software economics
Software project management Software economics
 
Superscalar & superpipeline processor
Superscalar & superpipeline processorSuperscalar & superpipeline processor
Superscalar & superpipeline processor
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptx
 
Mobile hci
Mobile hciMobile hci
Mobile hci
 
Parallel processing
Parallel processingParallel processing
Parallel processing
 
Single pass assembler
Single pass assemblerSingle pass assembler
Single pass assembler
 
advanced computer architesture-conditions of parallelism
advanced computer architesture-conditions of parallelismadvanced computer architesture-conditions of parallelism
advanced computer architesture-conditions of parallelism
 
Phases of Compiler
Phases of CompilerPhases of Compiler
Phases of Compiler
 
Type Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLikeType Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLike
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
IOT System Management with NETCONF-YANG.pptx
IOT System Management with NETCONF-YANG.pptxIOT System Management with NETCONF-YANG.pptx
IOT System Management with NETCONF-YANG.pptx
 
DeadLock in Operating-Systems
DeadLock in Operating-SystemsDeadLock in Operating-Systems
DeadLock in Operating-Systems
 
multiprocessors and multicomputers
 multiprocessors and multicomputers multiprocessors and multicomputers
multiprocessors and multicomputers
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
Lect3 conventional vs modern spm
Lect3 conventional vs modern spmLect3 conventional vs modern spm
Lect3 conventional vs modern spm
 
Introduction to Compiler design
Introduction to Compiler design Introduction to Compiler design
Introduction to Compiler design
 
Parallel Programing Model
Parallel Programing ModelParallel Programing Model
Parallel Programing Model
 
Domain Modeling
Domain ModelingDomain Modeling
Domain Modeling
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computing
 

Similar to Data flow architecture

network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
ashutosh rai
 
BSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment Essay
Tara Smith
 
Provide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdfProvide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdf
arihantelehyb
 
Chapter on Book on Cloud Computing 96
Chapter on Book on Cloud Computing 96Chapter on Book on Cloud Computing 96
Chapter on Book on Cloud Computing 96
Michele Cermele
 

Similar to Data flow architecture (20)

Disadvantages Of Robotium
Disadvantages Of RobotiumDisadvantages Of Robotium
Disadvantages Of Robotium
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Software and Hardware Tools for Microprocessors
Software and Hardware Tools for MicroprocessorsSoftware and Hardware Tools for Microprocessors
Software and Hardware Tools for Microprocessors
 
BSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment Essay
 
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfA NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
 
Detailed Simulation of Large-Scale Wireless Networks
Detailed Simulation of Large-Scale Wireless NetworksDetailed Simulation of Large-Scale Wireless Networks
Detailed Simulation of Large-Scale Wireless Networks
 
Provide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdfProvide a diagram and description of the flow table entries that can.pdf
Provide a diagram and description of the flow table entries that can.pdf
 
Software Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic EngineeringSoftware Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic Engineering
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
 
Automatically partitioning packet processing applications for pipelined archi...
Automatically partitioning packet processing applications for pipelined archi...Automatically partitioning packet processing applications for pipelined archi...
Automatically partitioning packet processing applications for pipelined archi...
 
SDN Multi-Controller Domain.pptx
SDN Multi-Controller Domain.pptxSDN Multi-Controller Domain.pptx
SDN Multi-Controller Domain.pptx
 
Chapter on Book on Cloud Computing 96
Chapter on Book on Cloud Computing 96Chapter on Book on Cloud Computing 96
Chapter on Book on Cloud Computing 96
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...
 
Systemc overview 2010
Systemc overview 2010Systemc overview 2010
Systemc overview 2010
 
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
 
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...
 
Predictive maintenance withsensors_in_utilities_
Predictive maintenance withsensors_in_utilities_Predictive maintenance withsensors_in_utilities_
Predictive maintenance withsensors_in_utilities_
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Recently uploaded (20)

fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 

Data flow architecture

  • 1. A SEMINAR ON : DATAFLOWCOMPUTER PAPER NAME – COMPUTER ARCHITECTURE PAPER CODE – IT502
  • 3. INTRODUCTION : Data flow computers are based on the concept of data-driven computation, which is drastically different from the operation of conventional von Neumann machine.The fundamental difference is that instruction execution in a conventional computer is under program-flow control, whereas that in a data flow computer is driven by the data (operand) availability. The data-driven concept means asynchrony, which means that many instructions can be executed simultaneously and asynchronously. A higher degree of implicit parallelism is expected in dataflow computer. Becuase there is no use of shared memory cells, dataflow programs are free from side effects. The Dataflow Principles section reviews the basic principles of the dataflow model.The Dataflow Graphs section gives the representations used in dataflow system.The Dataflow Architectures section provides a general description of the dataflow architecture.The discussion includes a comparison of the architectural characteristics and the evolutionary improvements in dataflow computing.
  • 4. OBJECTIVE  Dataflow architecture is a computer achitecture that directly opposite of the traditional von Neumann architecture or control flow architecture. It has been successfully implemented in specialized hardware such as in digital signal processing, network routing, graphics processing, telemetry, and more recently in data warehousing. The main objective and scope of our Project is about the discuss of principle and the uses of dataflow computer.
  • 5. Features Of Dataflow Computers :  Intermediate or final results are passed directly as data token between instructions.  There is no concept of shared data storage as embodied the traditional notation of a variable.  Program sequencing is constrained only by data dependency among instructions.
  • 6. DATA FLOW GRAPH : Dataflow graphs can be viewed as the machine language for dataflow computers. A data flow graph is a directed graph whose nodes correspond to operators and arcs are pointers for forwardig data tokens.  A producing node is connected to a consuming node by an arc, and the “point” where an arc enters a node is called an input port.  The execution of an instruction is called the firing of a node.  Data is sent along the arcs of the dataflow graph in the form of tokens, which are created by computational nodes and placed on output arcs.
  • 7. Example With a expression : The below figure illustrates an example of dataflow graph for evaluation of expression X2– 2*X + 3. The following subtraction operation will not be carried out until these values are available. As soon as X2 and 2*X values are computed subtraction operation will be carried out which in turn will provide input to next addition operation.
  • 8. DATAFLOW ARCHITECTURE :  Dataflow architecture is a computer achitecture that directly contrasts the traditional von Neumann architecture or control flow architecture.  Although no commercially successful general-purpose computer hardware has used a dataflow architecture, it has been successfully implemented in specialized hardware such as in digital signal processing, network routing, graphics processing, telemetry, and more recently in data warehousing.
  • 9. MODELS OF DATAFLOWARCHITECTURE :  Depending on the way of handling data tokens, data flow computers are divided into : I. static model II. dynamic model.  STATIC DATA FLOW MACHINES : o In static data flow machine, data tokens are assumed to move along the arcs of the data flow program graph to the operator nodes. o This architecture is considered static because tokens are not labeled and control tokens must be used to acknowledge the proper timing in transferring data tokens from node to node.
  • 10. DYNAMIC DATAFLOW MACHINE : o A dynamic data flow machine uses tagged tokens, so that more than one token can exist in an arc.The tagging is achieved by attaching a label with each token which uniquely identifies the context of that particular token. o The dynamic dataflow allows greater exploitation of parallelism; however, this advantage comes at the expense of the overhead in terms of the generation of tags, larger data tokens, and complexity of the matching tokens.
  • 11.  COMPILER :  Normally, in the control flow architecture compilers analyze program code for data dependencies between instructions in order to better organize the instruction sequences in the binary output files.  Binaries compiled for a dataflow machine contain this dependency information.  Adataflow compiler records these dependencies by creating unique tags for each dependency instead of using variable names.
  • 12. PROGRAM :  Programs are loaded into the CAM of a dynamic dataflow computer.When all of the tagged operands of an instruction become available (that is, output from previous instructions and/or user input), the instruction is marked as ready for execution by an execution unit.  Once an instruction is completed by an execution unit, its output data is sent (with its tag) to the CAM. Any instructions that are dependent upon this particular datum (identified by its tag value) are then marked as ready for execution.
  • 13. INSTRUCTION : An instruction, along with its required data operands, is transmitted to an execution unit as a packet, also called an instruction token. Similarly, output data is transmitted back to the CAM as a data token.The packetization of instructions and results allows for parallel execution of ready instructions on a large scale Dataflow networks deliver the instruction tokens to the execution units and return the data tokens to the CAM. In contrast to the conventional von Neumann architecture, data tokens are not permanently stored in memory, rather they are transient messages that only exist when in transit to the instruction storage
  • 14. CONCLUSION : The advances from the development of dataflow machines indicate potential high performance computation based on the dataflow principles.This is necessary owing to increased demands of processing of complex scientific and technical data. As such applications require large processing times, data flow computers may help reduce the processing times and thus improve efficiency and effectiveness of implemented algorithms. However, there are still many issues to be addressed for the efficient use of dataflow computers.
  • 15. REFERENCE international Journal of Networking & Parallel Computing www.cirworld.comVolume 1, Issue 2, November, 2012