wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

I/O Buffering

profile
Jash Katelia
Jul 05, 2024
0 Likes
0 Discussions
579 Reads

I/O buffering and its Various Techniques

A buffer is a memory area that stores data being transferred between two devices or between a device and an application.

Uses of I/O Buffering :

Buffering is done to deal effectively with a speed mismatch between the producer and consumer of the data stream.

A buffer is produced in main memory to heap up the bytes received from modem.

After receiving the data in the buffer, the data get transferred to disk from buffer in a single operation.

This process of data transfer is not instantaneous, therefore the modem needs another buffer in order to store additional incoming data.

When the first buffer got filled, then it is requested to transfer the data to disk.

The modem then starts filling the additional incoming data in the second buffer while the data in the first buffer getting transferred to disk.

When both the buffers completed their tasks, then the modem switches back to the first buffer while the data from the second buffer get transferred to the disk.

The use of two buffers disintegrates the producer and the consumer of the data, thus minimizes the time requirements

Types of various I/O buffering techniques :

1. Single buffer :

A buffer is provided by the operating system to the system portion of the main memory.

Block oriented device –System buffer takes the input.

After taking the input, the block gets transferred to the user space by the process and then the process requests for another block.

Two blocks works simultaneously, when one block of data is processed by the user process, the next block is being read in.

OS can swap the processes.

OS can record the data of system buffer to user processes.

Stream oriented device –

 

Line- at a time operation is used for scroll made terminals. User inputs one line at a time, with a carriage return signaling at the end of a line.

Byte-at a time operation is used on forms mode, terminals when each keystroke is significant

Double buffer :

Block oriented –There are two buffers in the system.

One buffer is used by the driver or controller to store data while waiting for it to be taken by higher level of the hierarchy.

Other buffer is used to store data from the lower level module.

Double buffering is also known as buffer swapping.

A major disadvantage of double buffering is that the complexity of the process get increased.

If the process performs rapid bursts of I/O, then using double buffering may be deficient.

Stream oriented –Line- at a time I/O, the user process need not be suspended for input or output, unless process runs ahead of the double buffer.

Byte- at a time operations, double buffer offers no advantage over a single buffer of twice the length.


Comments ()


Sign in

Read Next

Deadlock

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

INTERRUPTS

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

E-Governance

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Blockchain technology: security risk and prevention

Blog banner

Odoo

Blog banner

A Heartfelt Act of Kindness

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Never give up

Blog banner

The Right way of cooking

Blog banner

How to lose belly fat

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

Microsoft powerpoint presentation

Blog banner

MPL and how its effects?

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

AI and Cyber Security

Blog banner

Deadlock and Starvation

Blog banner

Life of a 2020-2021 student

Blog banner

Concept and definition of m-commerce

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Have You Explored India Yet?

Blog banner

APACHE KAFKA

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Modern Operating System

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Difference Between Classification And Clustering

Blog banner

Multiprocessor and Multicore Organization

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

What are Tenders its various types

Blog banner

Mobile Survey

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

FREE VERSION OF G-MAIL

Blog banner