Compute the number of leaf pages that we need

Assignment Help Computer Engineering
Reference no: EM132143390

Suppose we want to build a B+ tree that has space for 200,000 data entries in its leaf pages. Each data entry is made up of a key and its corresponding data value. Let us assume the following specifications.

Each page (leaf or internal) is 4096 bytes long. Each page holds three 8-byte pointers (parent, left sibling, right sibling) in addition to the bytes consumed by all of the keys and their accompanying 8-byte values.

(In the case of leaf pages, these "values" are simply pointers that locate the full data record corresponding to the key (e.g., customer record for the given key.)

We want to use an even number of data entries in the leaf pages. Internally, we also want an even number. The keys have unique values. For all of the following questions, show your work:

a) Suppose each key is 56 bytes long, and suppose we fill the leaf pages to capacity (i.e., as much as possible). Compute the number of leaf pages that we need.

b) Compute the number of internal pages, at each level, that we "need" (i.e., assume that you can fill the parents to capacity (to the maximum even number of keys)).

This will result in a structure that has the fewest number of pages. Note, however, that the root can have as few as one key.

Reference no: EM132143390

Questions Cloud

Discuss the regulation of electronic nicotine delivery : PUBLIC HEALTH LAW AND POLICY - Discuss the regulation of electronic nicotine delivery systems (e-cigarettes) in Australia - Choose a health-related profession
Create a set of z schemas that adequately describes the ccs : ITECH7410 - Software Engineering Methodologies Assignment - Formal System Specification, Federation University, Australia. Create a set of Z schemas
What is the use of employing an ssid mechanism : What is the use of employing an SSID mechanism, state two reasons as to why it is necessary - What would you recommend as a remedy to this drawback
Brief overview of project - URBAN POPULATION : 42908 Engineering Project Preparation Assignment - Topic - "URBAN POPULATION. Brief overview of project, main aim of project
Compute the number of leaf pages that we need : Suppose each key is 56 bytes long, and suppose we fill the leaf pages to capacity (i.e., as much as possible). Compute the number of leaf pages that we need.
How many botnet machines are needed to send data : How many botnet machines are needed to send data to the web server in order to fill the web server's link capacity?
Develop a grievance policy and procedure for safety traffic : BSBWRK510 Manage employee relations - demonstrate the skills and knowledge required to develop a grievance policy and procedure and implement strategies
What is the similarity between deadlock and starvation : What is the distinction between application software and system software? Give an example of each.
What should be the speedup of floating point operation : What should be the speedup of floating point operation in our design of the next CPU to achieve a desired overall system speedup.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a report on your attempts to solve multiplexer problem

UFCFY3-15-3 Advances in Artificial Intelligence: Resit Assignment. Write a report on your attempts to solve the multiplexer problem of size k=2 as effectively as possible using any form of evolutionary intelligence covered in the course, building u..

  How an existing rfid standard could be modified to support

If there are no specific standards that you think apply to your selected industry then research how an existing RFID standard could be modified to support your selected industry.

  Write a short shell script called c-interp

CS 146 Assignment. Write a short shell script called "C-interp" which is intended to have soft links point at it, and pretends to be a C language interpreter

  The end result of this course is developing a strategic

the end result of this course is developing a strategic audit. in this module you will outline and draft a

  It is critical for the investigator to understand the

it is critical for the investigator to understand the possible security risks that computer and network users face

  What was the human reason for encoding this information

What kind of encoding would this be and what was the human reason for encoding this information?

  Decision making systems

How we may leverage business intelligent to generate meaningful information and decision making systems in order to help the keep cost and the profits.

  Compare and evaluate the two different styles

What do you think are the pros of using frames.Compare and evaluate the two different styles.

  Develop a control-break awk program that reads empn list

Develop a control-break awk program that reads empn.lst and prints a report that groups employees of the same department.

  Testing program using numbers of command line arguments

Test your program thoroughly utilizing different numbers of command line arguments.

  Evaluate the consequences of a poor hiring decision

Evaluate the consequences of a poor hiring decision. Propose steps that could be taken to prevent such bad decisions in the first place. Examine what an organization could possibly learn when a policy is implemented.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd