wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

I/O Buffering

profile
Jash Katelia
Jul 05, 2024
0 Likes
0 Discussions
594 Reads

I/O buffering and its Various Techniques

A buffer is a memory area that stores data being transferred between two devices or between a device and an application.

Uses of I/O Buffering :

Buffering is done to deal effectively with a speed mismatch between the producer and consumer of the data stream.

A buffer is produced in main memory to heap up the bytes received from modem.

After receiving the data in the buffer, the data get transferred to disk from buffer in a single operation.

This process of data transfer is not instantaneous, therefore the modem needs another buffer in order to store additional incoming data.

When the first buffer got filled, then it is requested to transfer the data to disk.

The modem then starts filling the additional incoming data in the second buffer while the data in the first buffer getting transferred to disk.

When both the buffers completed their tasks, then the modem switches back to the first buffer while the data from the second buffer get transferred to the disk.

The use of two buffers disintegrates the producer and the consumer of the data, thus minimizes the time requirements

Types of various I/O buffering techniques :

1. Single buffer :

A buffer is provided by the operating system to the system portion of the main memory.

Block oriented device –System buffer takes the input.

After taking the input, the block gets transferred to the user space by the process and then the process requests for another block.

Two blocks works simultaneously, when one block of data is processed by the user process, the next block is being read in.

OS can swap the processes.

OS can record the data of system buffer to user processes.

Stream oriented device –

 

Line- at a time operation is used for scroll made terminals. User inputs one line at a time, with a carriage return signaling at the end of a line.

Byte-at a time operation is used on forms mode, terminals when each keystroke is significant

Double buffer :

Block oriented –There are two buffers in the system.

One buffer is used by the driver or controller to store data while waiting for it to be taken by higher level of the hierarchy.

Other buffer is used to store data from the lower level module.

Double buffering is also known as buffer swapping.

A major disadvantage of double buffering is that the complexity of the process get increased.

If the process performs rapid bursts of I/O, then using double buffering may be deficient.

Stream oriented –Line- at a time I/O, the user process need not be suspended for input or output, unless process runs ahead of the double buffer.

Byte- at a time operations, double buffer offers no advantage over a single buffer of twice the length.


Comments ()


Sign in

Read Next

Topic: Sessions in Operating system

Blog banner

Os Virtual Memory

Blog banner

A buffer overflow

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

How to feel Happy everyday day

Blog banner

How Cyber Forensics use in AI

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

How to kiss

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Memory Management of Operating System(OS)

Blog banner

Mendeley (management software)

Blog banner

The Golden Temple , Amritsar

Blog banner

'Positivity in life'

Blog banner

PODIO

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

What is OS and its overview

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Confidence Building Activities for the New School Year

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Data Exfiltration

Blog banner

Memory management and virtual memory

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Self-love: Being the reason of your own smile

Blog banner

This is my first blog.

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

Deadlock

Blog banner

Google classroom

Blog banner

Computer security techniques

Blog banner

M commerce

Blog banner

Install Ubuntu in Vmware

Blog banner

Deadlock and Starvation

Blog banner

38_Exploring The Honeynet Project

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Cache Memory(142)

Blog banner

Privacy in Social Media and Online Services

Blog banner

GIS REMOTE SENSING

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Google

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner