Differentiate between static hashing and dynamic hashing, Database Management System

Differentiate between static hashing and dynamic hashing. 

Ans: Static Hashing comprises the number of primary pages in the directory fixed. So, while a bucket is full, we require an overflow bucket to store any extra records that hash to the full bucket. This can be completed with a link to an overflow page, or a linked list of overflow pages. The linked list can be separate for every bucket, or similar for all buckets that overflow. While searching for a record, the original bucket is accessed first, after that the overflow buckets. Specified there are several keys that hash to the same bucket, locating a record may need accessing multiple pages on disk that greatly degrades performance. 

The dilemma of lengthy searching of overflow buckets is solved by Dynamic Hashing. In Dynamic Hashing the size of the directory grows along with the number of collisions to accommodate new records and prevent long overflow page chains. Extendible and Linear Hashing are two dynamic hashing methods.

Posted Date: 5/6/2013 3:09:55 AM | Location : United States







Related Discussions:- Differentiate between static hashing and dynamic hashing, Assignment Help, Ask Question on Differentiate between static hashing and dynamic hashing, Get Answer, Expert's Help, Differentiate between static hashing and dynamic hashing Discussions

Write discussion on Differentiate between static hashing and dynamic hashing
Your posts are moderated
Related Questions
How can i turn a conceptual entity relationship diagram into a logical entity relationship diagram? what do i have to do with "mandetory or" and "optional or" relationships?

I need web security expert , website management Project Description: i want professional for the below . website management server management database management

What is recovery management component? Ensuring durability is the responsibility of a software component of the base system known as the recovery management component.


A database named yourusernameFMA has been set up for you to use for this assignment.  For the FMA you must create the required tables and run the queries using this database.  If y

Question: (a) List four disadvantages of the File Processing System as compared to the Database Systems. (b) The integrity of a database is enforced by integrity rules. One

Benefits and Limitations od Data Models?

Explain the two constraints, check and foreign key in SQL along with an example for each. Give the syntax. CHECK constraint - CHECK constraint specifies an expression which

What are the object-oriented approaches Software systems which are designed with structured design methodology never support some of desired quality attributes for example reus

Define Physical and Logical independence  Ans: Physical data independence: The ability to modify physical level without causing application program to be rewritten. Logic