Describe the static hash file with buckets and chaining, Database Management System

Assignment Help:

Describe the static hash file with buckets and chaining and show how insertion, deletion and modification of a record can be performed.

In static hash file organization, the word bucket is used to associate a unit storage in which can store one or more records. A file consists of buckets 0 through N-1, with one primary page per bucket initially and additional overflow pages chained along with bucket, if needed later.

Buckets holds data entries (or data records). In hashing scheme, a hash function, h, is perform on the key of the record to identify the bucket to that data record belongs to.
The hash function is an significant component of the hashing approach. The major problem along with static hash file is in which the number of buckets is fixed.

Insertion of a record - To insert a data entry, the hash function is used to recognize the

1350_Insertion of a record.png


Static Hash File

correct bucket and then put the data entry there. If there is no space for this data entry, a latest overflow page will be allocated, put the data entry on this page or the page to the overflow chain of the bucket.

Deletion of a record - To delete a data entry, the hash function is used to recognize the correct bucket, locate the data entry through searching the bucket, and then erase it. If the data entry is the last in an overflow page, the overflow page is erased from the overflow chain of the bucket and added to a list of free pages.

Modification of a record - To modify a data entry, the hash function is used to recognize the correct bucket, locate the data entry through searching the bucket and contain it, modify the data entry, and then rewrite the modified data entry on it.


Related Discussions:- Describe the static hash file with buckets and chaining

What is sql, What is SQL, and why is it important? SQL stands for Struc...

What is SQL, and why is it important? SQL stands for Structured Query Language, and is the most significant data processing language in use today. It is not a complete programm

Compare the two log based recovery schemes, Compare the two log-based recov...

Compare the two log-based recovery schemes in terms of ease of implementation and overhead cost.    Ans:  There are two types of log based recovery techniques: deferred update

Which language has recently become the defacto standard, Which language has...

Which language has presently become the defacto standard for interfacing application programs along with relational database system? The language which has recently become the

Explain the data access protocol, (a) Explain the three types of potentia...

(a) Explain the three types of potential mistake which could occur if concurrency control is not properly enforced in the database system. Support your answer with appropriate ex

Related fields in a database are grouped in which form, Related fields in a...

Related fields in a database are grouped in which form? Related data fields in a database are grouped to form a data record. (A record is a collection of related fields)

Define hot backup, Hot Backup: Some sites cannot terminate the database wh...

Hot Backup: Some sites cannot terminate the database while creating a backup copy of the files. The cold backup is not a reliable option. So different kinds of backing up database

Rules of data normalisation, Rules Of Data Normalisation  Let us now su...

Rules Of Data Normalisation  Let us now summarise Normalisation with the help of various clean rules. The following are the necessary rules for the Normalisation process: 1.

Database, Three way to handle missing field val

Three way to handle missing field val

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd