Discuss the method for a hash file to expand shrink dynamic, Database Management System

Discuss the methods for a hash file to expand and shrink dynamically. What are the advantages and disadvantages of each?

The hashing methods that permit dyanamic file expansion are:

(i) Extendible hashing
(ii) Linear hashing

The major advantage of extendible hashing that makes it attractive is that performance of the file does not degrade as the file grows. Also, no space is allocated in extendible hashing for future growth, but additional buckets can be allocated dynamically as needed.

A disadvantage is in which the directory must be searched before accessing the buckets themselves, resulting in two blocks accesses on the other hand of one in static hashing.

Posted Date: 5/11/2013 3:49:51 AM | Location : United States







Related Discussions:- Discuss the method for a hash file to expand shrink dynamic, Assignment Help, Ask Question on Discuss the method for a hash file to expand shrink dynamic, Get Answer, Expert's Help, Discuss the method for a hash file to expand shrink dynamic Discussions

Write discussion on Discuss the method for a hash file to expand shrink dynamic
Your posts are moderated
Related Questions
What is a recursive relationship? Give an example not used in the text. A recursive relationship is a relationship among an entity and itself. For example, given the entity PER

Redo Logs: Any database must have minimum two redo logs. These are the rules for the database; the redo logs record all modifies to the system objects or user objects. If any type

Illustrate the statement 'Projection operation distributes over the union operation'. Give an example.    Ans: Π L (E 1 ∪ E 2 ) = (Π L (E 1 )) ∪ (Π L (E 2 ))   This says th

Explain weak and strong entity type ? Weak and Strong entity type: An entity set which does not have a primary key is referred to as a weak entity set. The existence of a wea

Consider the following relational scheme: R (a,b,c,d,e,f) and its corresponding set of FDs {d→ a, be → c, ac → e, b → f, f → d, a → c}. a. Is the following decomposition i) non

Create a new user : CREATE USER IDENTIFIED BY Example: //CREATE USER MCA12 IDENTIFIED BY W123 Grant: It is used to give database access permission to users. It is of

Lock Based Protocol A lock is nothing but a mechanism that tells the DBMS whether a particular data item is being used by any transaction for read/write purpose. As there are t

Improved availability: The data in a distributed system may be replicated so that it is at more than one site. Thus, the failure of a node or a communication link does not necessar

What is the initial step for object-oriented designing The initial step for object-oriented designing is object modeling. Before we go into deep about object modeling first of

(a) Data warehouse can be defined as "a subject-oriented, integrated, time-variant, non-volatile collection of data" in support of management's decision making process. Explain ea