wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

I/O Buffering

profile
Diya Singh
Sep 09, 2024
0 Likes
0 Discussions
149 Reads

A buffer is a memory area that stores data being transferred between two devices or between a device and an application.


What is I/O Buffering?

I/O buffering is a technique used in computer systems to improve the efficiency of input and output (I/O) operations. It involves the temporary storage of data in a buffer, which is a reserved area of memory, to reduce the number of I/O operations and manage the flow of data between fast and slow devices or processes.


Uses of I/O buffer

  • Buffering is done to deal effectively with a speed mismatch between the
  • producer and consumer
  • of the data stream.
  • After receiving the data in the buffer, the data gets transferred to disk from the buffer in a single operation.
  • Buffering also provides variations for devices that have different data transfer sizes

A block-oriented device stores information in blocks that are usually of

fixed size, and transfers are made one block at a time. Generally, it is possible to

reference data by its block number. Disks and USB keys are examples of block-

oriented devices.

A stream-oriented device transfers data in and out as a stream of

bytes, with no block structure. Terminals, printers, communications ports, mouse

and other pointing devices, and most other devices that are not secondary storage

are stream oriented.


Types of I/O Buffering Techniques

1. Single Buffer

Using one buffer to store data temporarily. A buffer is provided by the operating system to the system portion of the main memory.


2. Double Buffer

In this technique the operating system Uses two buffers to allow continuous data transfer between two process.


3. Circular Buffer

In this technique the operating system Uses a circular buffer to manage continuous data streams efficiently.


Comments ()


Sign in

Read Next

Data Lake

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

A Journey By Train

Blog banner

I/O buffer and its techniques

Blog banner

The Evolution of Operating Systems

Blog banner

"Mahakali cave"

Blog banner

Uniprocessor and Types

Blog banner

LINUX

Blog banner

undefined

Blog banner

CONCURRENCY

Blog banner

5 People who claimed to have Time Traveled

Blog banner

What is Spyware?

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Why Oak Tree Hotel Is Arcadia’s Hidden Gem?

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Operating system and overviews

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Deadlock and Starvation

Blog banner

Security requirements for Safe E-Payments

Blog banner

Linux VServer Architecture

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Types of threads

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

RAID

Blog banner

Install Ubuntu in Vmware

Blog banner

american greatines

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Big Data Architecture

Blog banner

Crypto tax evasion

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Operating system evolution

Blog banner

Direct Memory Access

Blog banner

Deadlock

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Memory Management of Operating System(OS)

Blog banner

Memory Management

Blog banner

INTERRUPTS

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

c

Blog banner

Deadlocks

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner