Explain about spooling, Operating System

Assignment Help:

Q. Explain about Spooling?

  • Acronym for simultaneous peripheral operations on line. Spooling denotes to putting jobs in a buffer, a special area in memory or on a disk where a device can access them whenever it is ready.
  • Spooling is useful since device access data at different rates. Buffer offers a waiting station where data can rest while slower device catches up. Fig below displays the spooling.

8_Explain about Spooling.png

  • Computer can perform I/O in parallel with computation, it becomes possible to have the computer read a deck of cards to adrum, tape or disk and to write out to tape printer while it was computing. This process is known as spooling.
  • The most common spooling application is print spooling. In print spooling documents are loaded in a buffer and then printer pulls them off the buffer at its own rate.
  • Spooling is used for processing data at remote sites also. CPU transmits the data through communications path to a remote printer. Spooling overlaps I/O of one job with computation of other jobs.
  • One difficulty with simple batch systems is that computer still requires to read the decks of cards before it can begin to execute the job. This means that CPU is idle at the time of these relatively slow operations.
  • Spooling batch systems were the first and are simplest of multiprogramming systems

Advantage of Spooling

1.  Spooling operation uses a disk like a very large buffer.

2. Spooling is however capable of overlapping I/O operation for one job with processor operations for another job.


Related Discussions:- Explain about spooling

Explain the types of system calls, Explain the Types of System Calls Th...

Explain the Types of System Calls The major types of system calls are like this: a. Process Control: These types of system calls are employed to control the processes.

Explain rehashing to handle collision, Explain Rehashing to Handle Collisio...

Explain Rehashing to Handle Collision Rehashing:  Re-hashing schemes make use of a second hashing operation while there is a collision. If there is an additional collision, we

Define computer system environment, Q. List three instances of deadlocks th...

Q. List three instances of deadlocks that aren't related to a computer system environment. Answer: Two cars passage a single-lane bridge from opposite directions.

Explain hashed page table method, Hashed page table method A general ap...

Hashed page table method A general approach for managing address spaces larger than 32 bits is to use a hashed page table with the hash values being the virtual-page number.

What is micro-kernel?, Question 1 What is Micro-kernel? What are the benef...

Question 1 What is Micro-kernel? What are the benefits of Micro-kernel? Question 2 Explain seven state process models used for OS with necessary diagram. Differentiate betwee

Describe the file system architecture, Describe the file system architectur...

Describe the file system architecture. File System Architecture contains the subsequent components:- Device Driver 1 Device Driver 2 Device Driver 3 Basic fi

Define virtual memory, Define Virtual memory Virtual memory is employe...

Define Virtual memory Virtual memory is employed in all major commercial operating systems

What is meant by demand paging? explain, What is meant by demand paging? Ex...

What is meant by demand paging? Explain. Demand paging is a technique to implement virtual memory. In demand paging simply when a page is required it is brought into memory. As

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd