wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

I/O Buffering

profile
Diya Singh
Sep 09, 2024
0 Likes
0 Discussions
148 Reads

A buffer is a memory area that stores data being transferred between two devices or between a device and an application.


What is I/O Buffering?

I/O buffering is a technique used in computer systems to improve the efficiency of input and output (I/O) operations. It involves the temporary storage of data in a buffer, which is a reserved area of memory, to reduce the number of I/O operations and manage the flow of data between fast and slow devices or processes.


Uses of I/O buffer

  • Buffering is done to deal effectively with a speed mismatch between the
  • producer and consumer
  • of the data stream.
  • After receiving the data in the buffer, the data gets transferred to disk from the buffer in a single operation.
  • Buffering also provides variations for devices that have different data transfer sizes

A block-oriented device stores information in blocks that are usually of

fixed size, and transfers are made one block at a time. Generally, it is possible to

reference data by its block number. Disks and USB keys are examples of block-

oriented devices.

A stream-oriented device transfers data in and out as a stream of

bytes, with no block structure. Terminals, printers, communications ports, mouse

and other pointing devices, and most other devices that are not secondary storage

are stream oriented.


Types of I/O Buffering Techniques

1. Single Buffer

Using one buffer to store data temporarily. A buffer is provided by the operating system to the system portion of the main memory.


2. Double Buffer

In this technique the operating system Uses two buffers to allow continuous data transfer between two process.


3. Circular Buffer

In this technique the operating system Uses a circular buffer to manage continuous data streams efficiently.


Comments ()


Sign in

Read Next

What are Virtual Machines

Blog banner

Evolution of the Microprocesor

Blog banner

Security Issues and Countermeasures

Blog banner

Ethical Hacking

Blog banner

How to use open SSL for web server - browser communication

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

File Management

Blog banner

Cycling

Blog banner

semaphores

Blog banner

Virtualisation

Blog banner

Game Theory in Blockchain

Blog banner

HUBSPOT

Blog banner

TEAMWORK

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Memory Management

Blog banner

Hello World

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

ahh wait a min

Blog banner

Career v/s Job : Choose your passion

Blog banner

Memory Partitioning

Blog banner

SNAPCHAT

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Proof-of-Stake (PoS)

Blog banner

VIDEO INTERVIEWS : A NEW ECOSYSTEM TO GET DREAM JOBS

Blog banner

File System

Blog banner

Direct Memory Access

Blog banner

What is service level Agreement?

Blog banner

An Overview of Virtual Machines

Blog banner

Google classroom

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

File Sharing

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

What is thread and alse multithreading

Blog banner

Animal’s have my heart

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Memory heirachy (Operating system)

Blog banner

The application udemy

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Real-time Scheduling - 53003230061

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner