wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Buffering

profile
Vansh Dedhia
Sep 10, 2024
0 Likes
0 Discussions
82 Reads
Buffering in an operating system refers to the process of storing data in memory temporarily while it is being transferred between two places, such as between a program and a device, or between different parts of a computer system. This technique is used to manage differences in the rate at which data is received and the rate at which it can be processed. 

Here are the key points about buffering:

1. **Purpose**:
   - To accommodate speed differences between devices or processes.
   - To handle data bursts or spikes without overwhelming the system.
   - To ensure smooth and efficient data transfer.

2. **Types of Buffers**:
   - **Input Buffers**: Store data coming into the system, such as from a keyboard or network.
   - **Output Buffers**: Store data going out of the system, such as to a printer or display.
   - **Double Buffering**: Uses two buffers to improve performance, especially in graphics rendering.

3. **Examples of Buffering**:
   - **Disk I/O**: Reading and writing data to a disk where data is temporarily stored in a buffer before being processed.
   - **Network Communication**: Storing incoming data packets in a buffer before they are processed by the receiving program.
   - **Streaming Media**: Pre-loading segments of audio or video to ensure smooth playback.

4. **Benefits**:
   - Reduces latency and increases throughput.
   - Prevents data loss by providing a temporary storage space.
   - Helps in managing data flow between devices with different speeds.

5. **Drawbacks**:
   - Requires additional memory resources.
   - Can introduce complexity in managing buffer states and handling overflow or underflow conditions.

Buffering is a crucial aspect of system performance and reliability, ensuring efficient data handling and processing across different components of the computer system.

How buffering  in os works?

The different types of Buffering work a little differently as explained in brief earlier, but the baseline working is the same in all the types. This work is given further:
• The operating system starts with allocating memory for creating the Buffers which can be one or more, the size of each one depends on requirements.
• Then the data which is read from the input device is stored in the buffer, as the buffer act as the intermediate stage between the sender and receiver.
• The details of all the buffers that are present in the operating system, details include information like the amount of data stored in the buffer, etc. This information helps the Operating system to manage all the buffers.
• The data is processed and retrieved by the CPU, using this technique the CPU works independently and improves the device’s speed. This process helps in the Asynchronous functioning of the CPU in the device.
• Then the Data in the Buffer is Flushed i.e., it is deleted and the memory is freed. The temporary memory space is further used.

Comments ()


Sign in

Read Next

How secured are you online ?

Blog banner

Objectives and functions of Operating System...

Blog banner

Instagram

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Types Of scheduling

Blog banner

About my college life

Blog banner

Delhi city

Blog banner

Process in OS

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Memory Management

Blog banner

Electronic Funds Transfer

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Street foods

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Rapido

Blog banner

Depression

Blog banner

Multicore CPUs

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Risk mitigation and management

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

What is a Malware ?

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Kids Grieve Too

Blog banner

10 Reasons to date your best friend

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

100 Awesome Keyboard Shortcuts that you didn't knew

Blog banner

Article on Team Work

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

"Mahakali cave"

Blog banner

Dr. Venkadavarahan

Blog banner

Virtual memory

Blog banner

What is E-commerce

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Mental Health

Blog banner

Uniprocessor scheduling

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Linux -V Server Virtual Machine

Blog banner