wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

I/O buffer and its techniques

profile
Neeti undefined
Sep 09, 2024
0 Likes
0 Discussions
208 Reads

A buffer is a memory area that stores data being transferred between two devices or between a device and an application. In computer I/O buffering techniques are used to manage transfer of data between memory and I/O devices. This allows the CPU and I/O devices to work at their speeds without having to wait for each other, improving system’s overall performance.

Computers have many different devices that operate at varying speeds, and a buffer is needed to act as a temporary placeholder for everything interacting. This is done to keep everything running efficiently and without issues between all the devices, programs, and processes running at that time.

There are 3 types of buffers in OS:

1.    Single buffer: Using one buffer to store data temporarily. A buffer is provided by the operating system to the system portion of the main memory.

Block oriented device:

·     The system buffer takes the input.

·     After taking the input, the block gets transferred to the user space by the process and then the process requests for another block.

·     Two blocks work simultaneously, when one block of data is processed by the user process, the next block is being read in.

·     OS can swap the processes.

·     OS can record the data of the system buffer to user processes.

Stream oriented device:

·     Line- at a time operation is used for scroll-made terminals. The user inputs one line at a time, with a carriage return signaling at the end of a line.

·     Byte-at-a-time operation is used on forms mode, terminals when each keystroke is significant.

Buffering in Operating System


2.    Double Buffer: In this technique the operating system Uses two buffers to allow continuous data transfer between two process or two devices.

Block oriented:

·     There are two buffers in the system.

·     One buffer is used by the driver or controller to store data while waiting for it to be taken by higher level of the hierarchy.

·     Other buffer is used to store data from the lower level module.

·     Double buffering is also known as buffer swapping.

·     A major disadvantage of double buffering is that the complexity of the process gets increased.

·     If the process performs rapid bursts of I/O, then using double buffering may be deficient.

         Stream Oriented:

·     Line- at a time I/O, the user process need not be suspended for input or output, unless process runs ahead of the double buffer.

·     Byte- at a time operations, double buffer offers no advantage over a single buffer of twice the length.


3.    Circular Buffer: In this technique the OS Uses a circular buffer to manage continuous data streams efficiently.

·     When more than two buffers are used, the collection of buffers is itself referred to as a circular buffer.

·     In this, the data do not directly pass from the producer to the consumer because the data would change due to overwriting of buffers before they had been consumed.

·     The producer can only fill up to buffer i-1 while data in buffer i is waiting to be consumed.


Comments ()


Sign in

Read Next

Logical and physical address

Blog banner

What is a geographic information system (GIS)?

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

Network Security Risks

Blog banner

Race Conditions

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

Direct Memory Access

Blog banner

EFT

Blog banner

How to kiss

Blog banner

Virtual Memory

Blog banner

Artical on FreshBooks

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Theads

Blog banner

Steganography and Steganalysis

Blog banner

Memory Management

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Sessions In OS.

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

E-Cash (Electronic Cash)

Blog banner

Data Security must be your Priority!

Blog banner

What is M-commerce and how it's work

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Business-to-Business

Blog banner

Memory Management

Blog banner

Install Ubuntu Easily

Blog banner

PERSONAL STORIES

Blog banner

Service stratergy principles

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

Hosting basics

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Malicious softwares

Blog banner

bulk email software

Blog banner

LTE Technology

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

VIRUS

Blog banner

Buffering

Blog banner