wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

I/O Buffering

profile
Diya Singh
Sep 09, 2024
0 Likes
0 Discussions
150 Reads

A buffer is a memory area that stores data being transferred between two devices or between a device and an application.


What is I/O Buffering?

I/O buffering is a technique used in computer systems to improve the efficiency of input and output (I/O) operations. It involves the temporary storage of data in a buffer, which is a reserved area of memory, to reduce the number of I/O operations and manage the flow of data between fast and slow devices or processes.


Uses of I/O buffer

  • Buffering is done to deal effectively with a speed mismatch between the
  • producer and consumer
  • of the data stream.
  • After receiving the data in the buffer, the data gets transferred to disk from the buffer in a single operation.
  • Buffering also provides variations for devices that have different data transfer sizes

A block-oriented device stores information in blocks that are usually of

fixed size, and transfers are made one block at a time. Generally, it is possible to

reference data by its block number. Disks and USB keys are examples of block-

oriented devices.

A stream-oriented device transfers data in and out as a stream of

bytes, with no block structure. Terminals, printers, communications ports, mouse

and other pointing devices, and most other devices that are not secondary storage

are stream oriented.


Types of I/O Buffering Techniques

1. Single Buffer

Using one buffer to store data temporarily. A buffer is provided by the operating system to the system portion of the main memory.


2. Double Buffer

In this technique the operating system Uses two buffers to allow continuous data transfer between two process.


3. Circular Buffer

In this technique the operating system Uses a circular buffer to manage continuous data streams efficiently.


Comments ()


Sign in

Read Next

Smart Homes | Zigbee Alliance

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

IT GOVERNANCE

Blog banner

How Does SSO Works

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

Shoulders

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Raid

Blog banner

Technical SEO : Total Guide

Blog banner

Zero-Day Attack

Blog banner

Incident management in ITSM

Blog banner

semaphores in os

Blog banner

Emailing the merger document

Blog banner

IT security management

Blog banner

Deadlock in operating system

Blog banner

Deadlocks

Blog banner

Embaded operating system

Blog banner

Virtual Machine

Blog banner

Multiprocessor scheduling

Blog banner

Zoho

Blog banner

Open Source Project By Google

Blog banner

Game Theory in Blockchain

Blog banner

Odoo

Blog banner

Phishing

Blog banner

10 Reasons to date your best friend

Blog banner

Direct Memory Access

Blog banner

Tableau

Blog banner

File management

Blog banner

The Peephole

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Uniprocessor Scheduling

Blog banner

38_Exploring The Honeynet Project

Blog banner

Security Issues and Countermeasures

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

Predictive Analysis - Ek Overview

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

How social media affect

Blog banner

Blockchain in IoT Applications

Blog banner

Disk scheduling

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner