Describe the static hash file with buckets and chaining, Database Management System

Assignment Help:

Describe the static hash file with buckets and chaining and show how insertion, deletion and modification of a record can be performed.

In static hash file organization, the word bucket is used to associate a unit storage in which can store one or more records. A file consists of buckets 0 through N-1, with one primary page per bucket initially and additional overflow pages chained along with bucket, if needed later.

Buckets holds data entries (or data records). In hashing scheme, a hash function, h, is perform on the key of the record to identify the bucket to that data record belongs to.
The hash function is an significant component of the hashing approach. The major problem along with static hash file is in which the number of buckets is fixed.

Insertion of a record - To insert a data entry, the hash function is used to recognize the

1350_Insertion of a record.png


Static Hash File

correct bucket and then put the data entry there. If there is no space for this data entry, a latest overflow page will be allocated, put the data entry on this page or the page to the overflow chain of the bucket.

Deletion of a record - To delete a data entry, the hash function is used to recognize the correct bucket, locate the data entry through searching the bucket, and then erase it. If the data entry is the last in an overflow page, the overflow page is erased from the overflow chain of the bucket and added to a list of free pages.

Modification of a record - To modify a data entry, the hash function is used to recognize the correct bucket, locate the data entry through searching the bucket and contain it, modify the data entry, and then rewrite the modified data entry on it.


Related Discussions:- Describe the static hash file with buckets and chaining

Accounting and external reporting, List the internal controls that should b...

List the internal controls that should be in effect solely because a EDP system is employed, classifing them as (1) Those controls pertaining to input of information and (2) All ot

Transaction, Draw the precedence graph of the following schedule and determ...

Draw the precedence graph of the following schedule and determine whether the schedule is serializable. (Note that all instructions, except lock and unlock, are omitted. We assume

Explain th process to avoid re-computation, Saving Derived Attributes to Av...

Saving Derived Attributes to Avoid Re-computation Data that is derived from other data should be stored in the computed form to avoid re-computation. For this, we could define

Example of transaction? , Example :; transfers transfer_amount from x's acc...

Example :; transfers transfer_amount from x's account to y's account ; Supposes x&y both accounts exist TRANSACTION (x, y, transfer_amount) Start transaction IF X AND Y

A table joined with itself is called, A table joined with itself is called ...

A table joined with itself is called ? A table joined with itself is known as self join table. Normal 0 false false false EN-IN X-NONE X-NONE

Fragmentation, let us consider a table having 2200 records and the fixed si...

let us consider a table having 2200 records and the fixed size of the table to be considered as 25.then how many numbers of table is requredto perform horizontal fragmentation

Describe application programming interface, Describe Application programmin...

Describe Application programming interface? Application Programming Interface - Commercial SQL implementations take one of the two primary techniques for involving SQL in a p

What are the two main goals of parallelism, What are the two main goals of ...

What are the two main goals of parallelism? Load -balance multiple small accesses, so that the  throughput of such accesses enhances. Parallelize large accesses so that the res

Using column aliases-data manipulation language, Using Column aliases E...

Using Column aliases Example: To print column names as NAME and ANNUAL SALARY SELECT ENAME "NAME", SAL*12 "ANNUAL SALARY" FROM EMP;

Update anomaly-data redundancy, Update Anomaly : This anomaly is occurred d...

Update Anomaly : This anomaly is occurred due to data redundancy. Redundant information makes updates more complex since, for example, varying the name of the instructor of MCS-014

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd