What are the causes of bucket overflow in a hash file, Database Management System

Assignment Help:

What are the causes of bucket overflow in a hash file organization? What can be done to reduce the occurrence of bucket overflow?

When a record is inserted, the bucket to that it is mapped has space to store the record. If the bucket does not have sufficient space, a bucket overflow is said to occur.

Bucket overflow can occur for various reasons:

Insufficient buckets: The number of buckets, that we indicate nb, must be chosen such than nb>nc/ff, where n, denote the total number of records that will be stored, and fr denotes the number of records in which will fit in a bucket. This designation, of course, supposes that the total number of records is known while the hash function is chosen.

Skew : Some buckets are assigned more records than are others, so a bucket might overflow even while other buckets still have space. This situation is known as bucket skew.

Skew can occur for two reasons:
1. Multiple records might have the same search key.
2. The chosen hash function may result in non-uniform distribution of search keys.
So, that the probability of bucket overflow is reduced, the number of buckets is selected to be (n/f)*(1+d), where d is a fudge factor typically around 0.2. Some space is wasted:r r

About 20 percent o the space in the buckets will be empty. But the advantages are that the probability of overflow is decreased.
Despite allocation of a few more buckets than needed, bucket overflow can still occur. We handle bucket overflow through using overflow buckets. If a record must be inserted into a bucket b, and b is already full, the system gives an overflow bucket for b, and inserts the record within the overflow bucket, and so on.

All the overflow buckets of a given bucket are chained together in a linked list. Overflow handling using like linked list is known as overflow chaining.


Related Discussions:- What are the causes of bucket overflow in a hash file

Define seek time, Define seek time. The time for repositioning the arm ...

Define seek time. The time for repositioning the arm is known as the seek time and it enhances with the distance that the arm is known as the seek time.

What is key, What is key ? Key - A single attribute or a combination of...

What is key ? Key - A single attribute or a combination of two or more attributes of an entity set which is used to recognize one or more instances (rows) of the set (table) is

Synonyms, Synonyms It allows short names or alternative names for objects....

Synonyms It allows short names or alternative names for objects. Example :               CREATE SYNONYM D30               FOR EMPD30;   Now if we give command:

What is a recovery scheme, What is a recovery scheme? An integral part ...

What is a recovery scheme? An integral part of a database system is a recovery scheme that can restore the database to the reliable state that existed before the failure.

Shared lock or read lock, Shared lock or Read Lock It is requested ...

Shared lock or Read Lock It is requested by a transaction that needs to just read the value of data item. A shared lock on a data item does not permit an exclusive lock

Principles of good e-governance, Question: (a) e-Government implementa...

Question: (a) e-Government implementations normally evolve through a multi-stage process. Describe, using appropriate examples, the stages involved in an e-Government implemen

What is enterprise resource planning, What is Enterprise Resource Planning ...

What is Enterprise Resource Planning (ERP), and what kind of a database is used in an ERP application? Enterprise Resource Planning (ERP) is an information system used in manuf

Determine the strong and weak entity, Determine the Strong and Weak Entity ...

Determine the Strong and Weak Entity Based on the method of foreign key, there might be arise a situation when we have to relate an entity having a primary key of its own and a

What are multiple inheritances, What are multiple inheritances? Multipl...

What are multiple inheritances? Multiple inheritances allow a class to inherit variables and methods from many super classes.

Hello, Java program for horrizontal fragmentation in distributed database

Java program for horrizontal fragmentation in distributed database

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd