TUTORIAL ON INDEXING PART 2: HASH-BASED INDEXING

Similar documents
Selection Queries. to answer a selection query (ssn=10) needs to traverse a full path.

Hash-Based Indexing 1

Physical Disk Structure. Physical Data Organization and Indexing. Pages and Blocks. Access Path. I/O Time to Access a Page. Disks.

Hashed-Based Indexing

Lecture 8 Index (B+-Tree and Hash)

Hash-Based Indexes. Chapter 11. Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1

Hash-Based Indexes. Chapter 11

CSIT5300: Advanced Database Systems

Hashing. Given a search key, can we guess its location in the file? Goal: Method: hash keys into addresses

Hashing file organization

Chapter 6. Hash-Based Indexing. Efficient Support for Equality Search. Architecture and Implementation of Database Systems Summer 2014

Hash-Based Indexes. Chapter 11 Ramakrishnan & Gehrke (Sections ) CPSC 404, Laks V.S. Lakshmanan 1

Chapter 12: Indexing and Hashing. Basic Concepts

Chapter 12: Indexing and Hashing

Chapter 11: Indexing and Hashing

4 Hash-Based Indexing

Systems Infrastructure for Data Science. Web Science Group Uni Freiburg WS 2014/15

Indexing: Overview & Hashing. CS 377: Database Systems

Chapter 12: Indexing and Hashing

Module 5: Hash-Based Indexing

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Database System Concepts, 6 th Ed. Silberschatz, Korth and Sudarshan See for conditions on re-use

Kathleen Durant PhD Northeastern University CS Indexes

Chapter 17. Disk Storage, Basic File Structures, and Hashing. Records. Blocking

Chapter 11: Indexing and Hashing

Chapter 12: Indexing and Hashing (Cnt(

key h(key) Hash Indexing Friday, April 09, 2004 Disadvantages of Sequential File Organization Must use an index and/or binary search to locate data

Chapter 11: Indexing and Hashing

Database Applications (15-415)

Module 3: Hashing Lecture 9: Static and Dynamic Hashing. The Lecture Contains: Static hashing. Hashing. Dynamic hashing. Extendible hashing.

Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan See for conditions on re-use

Chapter 11: Indexing and Hashing" Chapter 11: Indexing and Hashing"

Announcements. Reading Material. Recap. Today 9/17/17. Storage (contd. from Lecture 6)

5. Hashing. 5.1 General Idea. 5.2 Hash Function. 5.3 Separate Chaining. 5.4 Open Addressing. 5.5 Rehashing. 5.6 Extendible Hashing. 5.

Chapter 1 Disk Storage, Basic File Structures, and Hashing.

COMP 430 Intro. to Database Systems. Indexing

Hashing. Data organization in main memory or disk

Hashing Techniques. Material based on slides by George Bebis

Introduction to Data Management. Lecture 15 (More About Indexing)

Symbol Table. Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management

CS143: Index. Book Chapters: (4 th ) , (5 th ) , , 12.10

Material You Need to Know

Topics to Learn. Important concepts. Tree-based index. Hash-based index

Database Applications (15-415)

Storage hierarchy. Textbook: chapters 11, 12, and 13

Indexing and Hashing

Access Methods. Basic Concepts. Index Evaluation Metrics. search key pointer. record. value. Value

System Structure Revisited

Database Applications (15-415)

Chapter 13 Disk Storage, Basic File Structures, and Hashing.

Chapter 11: Indexing and Hashing

CARNEGIE MELLON UNIVERSITY DEPT. OF COMPUTER SCIENCE DATABASE APPLICATIONS

Indexing. Chapter 8, 10, 11. Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1

Physical Database Design: Outline

Why Is This Important? Overview of Storage and Indexing. Components of a Disk. Data on External Storage. Accessing a Disk Page. Records on a Disk Page

Lecture 13. Lecture 13: B+ Tree

CS698F Advanced Data Management. Instructor: Medha Atre. Aug 11, 2017 CS698F Adv Data Mgmt 1

Advances in Data Management Principles of Database Systems - 2 A.Poulovassilis

Introduction. hashing performs basic operations, such as insertion, better than other ADTs we ve seen so far

Introduction to Data Management. Lecture 21 (Indexing, cont.)

Introduction to Indexing 2. Acknowledgements: Eamonn Keogh and Chotirat Ann Ratanamahatana

Database index structures

Tree-Structured Indexes

Intro to DB CHAPTER 12 INDEXING & HASHING

File Systems: Fundamentals

CS 245 Midterm Exam Winter 2014

CSE 544 Principles of Database Management Systems. Magdalena Balazinska Winter 2009 Lecture 6 - Storage and Indexing

File Systems: Fundamentals

Tree-Structured Indexes. Chapter 10

Chapter 5 Hashing. Introduction. Hashing. Hashing Functions. hashing performs basic operations, such as insertion,

CS 222/122C Fall 2016, Midterm Exam

Understand how to deal with collisions

The physical database. Contents - physical database design DATABASE DESIGN I - 1DL300. Introduction to Physical Database Design

CSE 444: Database Internals. Lectures 5-6 Indexing

Tree-Structured Indexes

CSE373: Data Structures & Algorithms Lecture 17: Hash Collisions. Kevin Quinn Fall 2015

Tree-Structured Indexes

Indexing. Jan Chomicki University at Buffalo. Jan Chomicki () Indexing 1 / 25

Indexes. File Organizations and Indexing. First Question to Ask About Indexes. Index Breakdown. Alternatives for Data Entries (Contd.

Fast Lookup: Hash tables

File Organization and Storage Structures

Principles of Data Management. Lecture #5 (Tree-Based Index Structures)

Hashing. Hashing Procedures

Copyright 2007 Ramez Elmasri and Shamkant B. Navathe

Tree-Structured Indexes

LH*Algorithm: Scalable Distributed Data Structure (SDDS) and its implementation on Switched Multicomputers

Tree-Structured Indexes

Data Storage and Query Answering. Indexing and Hashing (5)

QUIZ: Buffer replacement policies

AAL 217: DATA STRUCTURES

Overview of Storage and Indexing

Physical Level of Databases: B+-Trees

Overview of Storage and Indexing

Lecture Data layout on disk. How to store relations (tables) in disk blocks. By Marina Barsky Winter 2016, University of Toronto

Indexing. Week 14, Spring Edited by M. Naci Akkøk, , Contains slides from 8-9. April 2002 by Hector Garcia-Molina, Vera Goebel

CS34800 Information Systems

CMSC 341 Hashing (Continued) Based on slides from previous iterations of this course

CS 350 Algorithms and Complexity

Remember. 376a. Database Design. Also. B + tree reminders. Algorithms for B + trees. Remember

Transcription:

CSD Univ. of Crete Fall 07 TUTORIAL ON INDEXING PART : HASH-BASED INDEXING CSD Univ. of Crete Fall 07 Hashing Buckets: Set up an area to keep the records: Primary area Divide primary area into buckets Issue: Non-uniform distribution of the records More than one key may give same hash value: Collision Separate Chaining: New record with the same hash value has been added, and the corresponding bucket is full. How to solve? Add the address of a new bucket in a special area called overflow area Keep some overflow area in each cylinder 4

CSD Univ. of Crete Fall 07 Static Hashing Static Hashing A hash function h maps a search-key value K to an address of a bucket Commonly used hash function: K mod n B where n B is the # of buckets E.g. h(brighton) = (+8+9+7+8+0+5+4) mod 0 = 9 mod 0 = No. of buckets = 0 Hash function h Brighton Round Hill A-7 A-05.. 750 50.. 5 CSD Univ. of Crete Fall 07 Static Hashing Assume data entries per bucket and we have 5 buckets Insert key values a,b,c,d,e,f,g where h(a)=,h(b)=,h(c)=, h(g)=7 Insert z,x where h(z)= and h(x)=5 Insert p,q,r where h(p)=, h(q)=5 and h(r)= 6

CSD Univ. of Crete Fall 07 Static Hashing Clustered Hash Index : The index structure and its buckets are represented as a file (say file.hash) The relation is stored in file.hash (i.e., each entry in file.hash corresponds to a record in the relation) Assuming no duplicates: the record can be accessed in I/O Non-clustered Hash Index: The index structure and its buckets are represented as a file (say file.hash) The relation remains intact Each entry in file.hash has the following format: (search-key value, RID) Assuming no duplicates: the record can be accessed in I/O 7 CSD Univ. of Crete Fall 07 Static Hashing Example Assume a student table: Student(name, age, gpa, major) tuples(student) = 6 pages(student) = 4 Bob,,.7, CS Kane, 9,.8, ME Louis,, 4, LS Chris,,.9, CS Mary, 4,, ECE Lam,,.8, ME Martha, 9,.8, CS Chad, 8,., LS Tom, 0,., EE Chang, 8,.5, CS James, 4,., ME Leila, 0,.5, LS Kathy, 8,.8, LS Vera, 7,.9, EE Pat, 9,.8, EE Shideh, 6, 4, CS 8

CSD Univ. of Crete Fall 07 Non-Clustered Hash Index Example A non-clustered hash index on the age attribute with 4 buckets, h(age) = age mod B (4, (, )) (, (,)) (0, (,)) (0, (4,)) (6, (4,4)) (4, (,)) (8, (, 4)) (, (,)) (, (4,)) 0 (8, (4,)) (8, (,)) (, (, )) (7, (,4)) (9, (,)) (9, (, )) (9, (, 4)) Bob,,.7, CS Kane, 9,.8, ME Louis,, 4, LS Chris,,.9, CS Mary, 4,, ECE Lam,,.8, ME Martha, 9,.8, CS Chad, 8,., LS Tom, 0,., EE Chang, 8,.5, CS James, 4,., ME Leila, 0,.5, LS Kathy, 8,.8, LS Vera, 7,.9, EE Pat, 9,.8, EE Shideh, 6, 4, CS 9 CSD Univ. of Crete Fall 07 A non-clustered hash index on the age attribute with 4 buckets, h(age) = age mod B Pointers are page-ids 0 Non-Clustered Hash Index Example 500 00 706 0 (, (, )) (7, (,4)) (9, (,)) (9, (, )) (9, (, 4)) 00 0 (4, (, )) (, (,)) (0, (,)) (8, (4,)) (8, (, 4)) (, (,)) (, (4,)) (8, (,)) 500 (0, (4,)) (6, (4,4)) (4, (,)) 706 Bob,,.7, CS Kane, 9,.8, ME Louis,, 4, LS Chris,,.9, CS Mary, 4,, ECE Lam,,.8, ME Martha, 9,.8, CS Chad, 8,., LS Tom, 0,., EE Chang, 8,.5, CS James, 4,., ME Leila, 0,.5, LS Kathy, 8,.8, LS Vera, 7,.9, EE Pat, 9,.8, EE Shideh, 6, 4, CS 0 4 4

CSD Univ. of Crete Fall 07 Clustered Hash Index Example A clustered hash index on the age attribute with 4 buckets, h(age) = age mod B 0 Mary, 4,, ECE Louis,, 4, LS Tom, 0,., EE Chad, 8,., LS Bob,,.7, CS Vera, 7,.9, EE Martha, 9,.8, CS Kathy, 8,.8, LS Lam,,.8, ME Chris,,.9, CS Chang, 8,.5, CS Shideh, 6, 4, CS Leila, 0,.5, LS James, 4,., ME Kane, 9,.8, ME Pat, 9,.8, EE CSD Univ. of Crete Fall 07 Clustered Hash Index Example: Sequential Layout A clustered hash index on the age attribute with 4 buckets, h(age) = age mod 4 When the number of buckets is known in advance, the system may assume a sequentially laid file to eliminate the need for the hash directory Shideh, 6, 4, CS Leila, 0,.5, LS James, 4,., ME Mary, 4,, ECE Louis,, 4, LS Tom, 0,., EE Chad, 8,., LS Bob,,.7, CS Vera, 7,.9, EE Martha, 9,.8, CS Kathy, 8,.8, LS Lam,,.8, ME Chris,,.9, CS Chang, 8,.5, CS Kane, 9,.8, ME Pat, 9,.8, EE 5 5

CSD Univ. of Crete Fall 07 Clustered Hash Index Example: Sequential Layout A clustered hash index on the age attribute with 4 buckets, h(age) = age mod 4 When the number of buckets is known in advance, the system may assume a sequentially laid file to eliminate the need for the hash directory Shideh, 6, 4, CS Leila, 0,.5, LS James, 4,., ME Offset= 0 for bucket 0 Offset= page size for bucket Offset= N*page size for bucket N Mary, 4,, ECE Louis,, 4, LS Tom, 0,., EE Chad, 8,., LS Bob,,.7, CS Vera, 7,.9, EE Martha, 9,.8, CS Kathy, 8,.8, LS Lam,,.8, ME Chris,,.9, CS Chang, 8,.5, CS Kane, 9,.8, ME Pat, 9,.8, EE CSD Univ. of Crete Fall 07 Deficiencies of Static Hashing In static hashing, function h maps search-key values to a fixed set of B bucket addresses Databases grow with time If initial number of buckets is too small, performance will degrade due to too many overflows If initial number of buckets is set to a high value, anticipating a large file size at some point in the future, significant amount of space will be wasted initially If database shrinks, again space will be wasted One option is periodic re-organization of the file with a new hash function, but it is very expensive These problems can be avoided by using techniques that allow the number of buckets to be modified dynamically 4 6 6

CSD Univ. of Crete Fall 07 Load Factor The Load Factor: Lf: The number of records in the file divided by the number of places for the records in the primary area Primary area should be 70 % to 90 % full Lf = R / (B * c) Lf Load factor R # of records in the file c # of records which one bucket can hold B # of buckets (blocks) in the primary area How the choice of Lf & c can affect time Tf for fetching a record? Fetching Using Buckets & Chains As long as there is no overflow, Tf = s + r + dtt s average seek time r average rotational latency dtt time to transfer the data in one bucket 5 CSD Univ. of Crete Fall 07 Fetching using Buckets & Chains Result: If the distribution of values is even, and primary areas are chosen big enough, hashing is very efficient Contradiction: Larger bucket size also means a larger dtt! Each access to a bucket takes longer Handling overflow buckets: Same size as primary buckets or smaller To sum up: Performance can be enhanced by the choice of bucket size and of load factor Space utilization: Policy for handling overflow If the file size does not grow so much, hashing can give excellent performance & space utilization 6 7 7

CSD Univ. of Crete Fall 07 Database Growth Consider a database that grows too much. Will buckets suffice? x average overflow chain length Tf (successful) = s + r + dtt + (x/) * (s + r + dtt) One access to get the primary bucket On average, traverse half of the overflow chain Tf (unsuccessful) = s + r + dtt + x * (s + r + dtt) One access to get the primary bucket Traverse the whole overflow chain Deletion: Merely mark the deleted record; when the whole hash table is reorganized, marked records are not copied to the new table Replace the deleted record with the last record; de-allocate empty buckets Cost : Td = Tf (unsuccessful) + r 7 CSD Univ. of Crete Fall 07 Database Growth Insertion: New insertions are at the end of the chain Assume no new buckets are necessary Ti = Tf (unsuccessful) + r (A fetch and a rotation of the disk) Sequential Operations: Hashing is useless for sequential operations. Why? Given than n sequential reads are to be processed: Tx = n * Tf If the growth of a file can be predicted, hashing with buckets is excellent Range queries? No! Mixture of sequential operations, range searches, and individual searches: Prefer B+ trees File grows considerably: Reorganization is necessary Extendible Hashing Linear Hashing No file reorganization is required 8 8 8

CSD Univ. of Crete Fall 07 Extendible Hashing (EH) Extendible Hashing Hash function returns b bits Only the prefix (or suffix) i bits are used to hash the item There are i entries in the bucket address table Let i j be the length of the common hash prefix for data bucket j, there are (i-i j ) entries in the bucket address table that point to j Bucket address table Data bucket Hash prefix i i Length of common hash prefix bucket i bucket i bucket 9 CSD Univ. of Crete Fall 07 Splitting Splitting - Case : i j =i Only one entry in bucket address table points to data bucket j i++; Split data bucket j to j, z; i j =i z =i; Rehash all items previously in j; 00 0 0 00 00 0 00 0 0 0 9 9

0 0 CSD Univ. of Crete Fall 07 Splitting (cont.) Splitting - Case : i j < i More than one entries in bucket address table point to data bucket j Split data bucket j to j, z; i j = i z = i j +; Adjust the pointers that previously pointed to j, so that they point to j and z; Rehash all items previously in j; 00 00 0 00 0 0 00 00 0 00 0 0 CSD Univ. of Crete Fall 07 Extendible Hashing (EH): First Example Show the extensible hash structure if the hash function is h(x)=x mod 8 and buckets can hold three records In this example, the i prefix bits are used Insert,, 5 0 0 0,, 5 Next: Insert 7

CSD Univ. of Crete Fall 07 Insert 7 0, 5, 7 Next: Insert CSD Univ. of Crete Fall 07 Insert 0,, 5, 7 Next: Insert 7 4

CSD Univ. of Crete Fall 07 Insert 7 7 00 0 0,, 5, 7 Next: Insert 9 5 CSD Univ. of Crete Fall 07 Insert 9 00 00 0 00 0 0 7,, 9 5, 7 Next: Insert 6

CSD Univ. of Crete Fall 07 Insert 00 00 0 00 0 0 7,, 9 5, 7, Next: Insert 9 7 CSD Univ. of Crete Fall 07 Insert 9 00 00 0 00 0 0 7,, 9 5, 9 Next: Insert 7, 8

CSD Univ. of Crete Fall 07 Insert 00 00 0 00 0 0 7,, 9 5, 9 Next: Delete 7 7,, 9 CSD Univ. of Crete Fall 07 Delete 7 00 00 0 00 0 0,, 9 5, 9 Next: Insert 7, 7 7,, 0 4 4

CSD Univ. of Crete Fall 07 Insert 7, 7 00 00 0 00 0 0 7,, 9 5, 9 Overflow bucket vs. directory doubling. Why? 7 Next: Delete 7, 9,, 7,, CSD Univ. of Crete Fall 07 Delete 7, 9,, (reduce to -level) 7 00 0 0 5, 9 7,, 5 5

6 6 CSD Univ. of Crete Fall 07 Extendible Hashing (EH): Second Example Location mechanism 00 0 0 v h(v) pete 00 mary 00 jane 0 bill 00 john vince 00 karen 0 Extensible hashing uses a directory (level of indirection) to accommodate family of hash functions. In this example, the i suffix bits are used Suppose next action is to insert sol, where h(sol) = Problem: This causes overflow in B CSD Univ. of Crete Fall 07 Extendible Hashing (EH): Second Example 00 00 0 0 Solution:. Switch to h. Concatenate copy of old directory to new directory. Split overflowed bucket, B, into B and B, dividing entries in B between the two using h 4. Pointer to B in directory copy replaced by pointer to B Note: Except for B, pointers in directory copy refer to original buckets current_hash identifies current hash function 4

7 7 CSD Univ. of Crete Fall 07 Extendible Hashing (EH): Second Example 00 00 Next action: Insert judy, where h(judy)= B overflows, but directory need not be extended 0 0 Problem: When B i overflows, we need a mechanism for deciding whether the directory has to be doubled Solution: bucket_level[i] records the number of times B i has been split If current_hash > bucket_level[i], do not enlarge directory 5 CSD Univ. of Crete Fall 07 Extendible Hashing (EH): Second Example 00 00 0 0 0 6

8 8 CSD Univ. of Crete Fall 07 Linear Hashing (LH) Proposed by Litwin in 98, linear hashing can, just like extendible hashing, adapt its underlying data structure to record insertions and deletions: Linear hashing does not need a hash directory in addition to the actual hash table buckets, Maintains a constant load factor; Incrementally add new buckets to the primary area; Lf = R / (B * c) B # of buckets, c #records per block... but linear hashing may perform bad if the key distribution in the data file is skewed The core idea behind linear hashing is to use an ordered family of hash functions, h 0, h, h,... (traditionally the subscript is called the hash function s level); Calculate a hash number for a given level Calculate boundary value: c * Lf Place the record according to its last k digits In case an expand is required, split an existing bucket using its k+ last digits of the hash number Note: Boundary value & current value of k should be kept on the file header 4 CSD Univ. of Crete Fall 07 Linear Hashing (LH): Hash Function Family We design the family so that the range of h level+ is twice as large as the range of h level (for level = 0,,,... ) as depicted below Here, h level has range [0... B ] (i.e., a range of size B) Given an initial hash function h and an initial hash table size B, one approach to define such a family of hash functions h 0, h, h,...would be h level (k)=h(k)mod( level B)for level=0,,, B B B B B B 4

9 9 CSD Univ. of Crete Fall 07 Linear Hashing (LH): Basic Scheme Start with level = 0, next = 0 The current hash function in use for searches (insertions /deletions) is h level, active hash table buckets are those in h level s range: [0... level B ] Whenever we realize that the current hash table overflows, e.g., insertions filled a primary bucket beyond c % capacity, or the overflow chain of a bucket grew longer than p pages, or... we split the bucket at hash table position next (in general, this is not the bucket which triggered the split!) Allocate a new bucket, append to it the hash table (its position will be level B+next), Redistribute the entries in bucket next by rehashing them via h level+ (some entries remain in bucket next, some go to bucket level B +next), Increment next by B B 4 CSD Univ. of Crete Fall 07 Linear Hashing (LH): First Example Linear hash table: primary bucket capacity of 4, initial hash table size N = 4, level = 0, next = 0 Split criterion: allocation of a page in an overflow chain Next: Insert 4=00 44

CSD Univ. of Crete Fall 07 Insert 4 Insert record with key k such that h 0 (k) = 4 = 00 : Next: Insert 7= 45 CSD Univ. of Crete Fall 07 Insert 7 Insert record with key k such that h 0 (k) = 7 = : 00 Next: Insert 9=0 46 0 0

CSD Univ. of Crete Fall 07 Insert 9 Insert record with key k such that h 0 (k) = 9 = 0 : 00 0 Next: Insert =00, 66=00, 4=0 47 CSD Univ. of Crete Fall 07 Insert, 6, 4 Insert records with keys k such that h 0 (k) = = 00 (66 = 00, 4 = 0 ): 00 0 0 Next: Insert 50= 48

CSD Univ. of Crete Fall 07 Insert 50 Insert record with key k such that h 0 (k) = 50 = : 49 CSD Univ. of Crete Fall 07 Linear Hashing (LH): Second Example (Alter. Algo) i level n next - Insert 69 h0(k) = K mod 0 h(k) = K mod i=0, n=0 69 69 - Insert 760 h0(k) = K mod 0 h(k) = K mod i=0, n=0 760 - Insert 469 h(k) = K mod h(k) = K mod i=, n=0 0 760 469 4 - Insert 487 5a - Insert 69 0 h(k) = K mod h(k) = K mod i=, n=0 760 469 0 h(k) = K mod h(k) = K mod i=, n=0 760 469 00 5b - Insert h(k) = K mod h(k) = K mod i=, n= 760 469 69 487 69 487 69 487 0 50

CSD Univ. of Crete Fall 07 Linear Hashing (LH): Second Example 6a - Insert 8 h(k) = K mod h(k) = K mod i=, n= 6b - Insert 8 h(k) = K mod h(k) = K mod i=, n=0 00 760 469 69 487 8 00 0 760 469 69 8 0 0 487 5 CSD Univ. of Crete Fall 07 Linear Hashing (LH): Second Example 7 - Insert 074 h(k) = K mod h(k) = K mod i=, n=0 8a - Insert 75 h(k) = K mod h(k) = K mod i=, n=0 8b - Insert 75 h(k) = K mod h(k) = K mod i=, n= 00 760 469 00 760 469 760 0 69 8 0 69 8 0 0 69 8 074 0 074 0 074 487 487 75 00 487 469 75 5

CSD Univ. of Crete Fall 07 Linear Hashing (LH): Second Example 9 - Insert 60 h(k) = K mod h(k) = K mod i=, n= 760 0a - Insert 48 h(k) = K mod h(k) = K mod i=, n= 760 0 69 8 0 69 8 0 074 0 074 487 75 487 75 00 469 60 00 469 60 48 5 CSD Univ. of Crete Fall 07 Linear Hashing (LH): Second Example 0b - Insert 48 h(k) = K mod h(k) = K mod i=, n= a - Insert 94 h(k) = K mod h(k) = K mod i=, n= 760 760 00 69 00 69 0 074 0 074 94 487 75 487 75 00 469 60 48 00 469 60 48 0 8 0 8 54 4 4

5 5 CSD Univ. of Crete Fall 07 Linear Hashing (LH): Second Example b - Insert 94 h(k) = K mod h(k) = K mod i=, n= 760 00 69 074 487 00 75 00 469 60 0 8 0 94 48 55 CSD Univ. of Crete Fall 07 Linear Hashing (LH): Second Example - Insert 4750 h(k) = K mod h(k) = K mod i=, n= 760 00 69 00 074 487 75 00 469 60 0 8 0 4750 94 48 56

CSD Univ. of Crete Fall 07 Linear Hashing (LH): Second Example a - Insert 6975 h(k) = K mod h(k) = K mod i=, n= 6975 760 00 69 00 074 487 75 00 469 60 0 8 0 4750 94 48 57 CSD Univ. of Crete Fall 07 Linear Hashing (LH): Second Example b - Insert 6975 h(k) = K mod h4(k) = K mod 4 i=, n=0 760 69 00 00 074 0 75 00 469 60 0 8 0 4750 487 94 6975 48 58 6 6

7 7 CSD Univ. of Crete Fall 07 Linear Hashing (LH): Second Example 4 - Insert 498 h(k) = K mod h4(k) = K mod 4 i=, n=0 760 69 00 00 074 0 75 00 469 60 0 8 498 0 4750 487 94 6975 48 59 CSD Univ. of Crete Fall 07 Linear Hashing (LH): Second Example 5 - Insert 908 h(k) = K mod h4(k) = K mod 4 i=, n=0 760 908 00 69 00 074 0 75 00 469 60 0 8 0 4750 487 94 6975 48 60

8 8 CSD Univ. of Crete Fall 07 Hash-Based Indexing Summary Extendible Hashing avoids overflow pages by splitting a full bucket when a new data entry is to be added to it (duplicates may require overflow pages) If directory fits in memory, equality search answered with one disk access; else two Directory grows in spurts, can become large for skewed hash distributions Collisions, or multiple entries with same hash value cause problems! Linear Hashing avoids directory by splitting buckets round-robin, and using overflow pages Overflow pages not likely to be long Duplicates handled easily Space utilization could be lower than Extendible Hashing, since splits not concentrated on dense data areas Can tune criterion for triggering splits to trade-off slightly longer chains for better space utilization For hash-based indexes, a skewed data distribution is one in which the hash values of data entries are not uniformly distributed! 69 CSD Univ. of Crete Fall 07 Hash-Based Indexing Summary Hashing is the best file structure for single-record fetches (e.g., ATM, airline reservations): Insertion & deletions are very fast There are more insertions than deletions Reorganization schemes: Linear & Extendible Hashing Linear Hashing: As new records are added, new buckets are appended to the primary area Load factor is kept constant Extendible Hashing: After index reaches a predetermined size, primary area buckets double in size First few digits of the hash number give the location of the index entry in memory Next few determine the address of the data bucket Subsequent digits yield the offset of the block 70

9 9 CSD Univ. of Crete Fall 07 Hash-Based Indexing Summary No hashing method is convenient for sequential operations or for range searches B+ trees are recommended especially for range searches Formulas: Load factor is calculated by: Lf = R / (B * c) Single record fetch without overflow: Tf = s + r + dtt If there are overflows with an average # of chains x: Tf(successful) = ( + x/ ) * ( s + r + dtt ) Tf(unsuccessful) = ( + x ) * ( s + r + dtt ) For insertion and deletion we use Ti = Td = Tf(unsuccessful) + r 7 CSD Univ. of Crete Fall 07 Overall Indexing Summary Index properties Integrated vs. Separate Storage Structure Clustered vs. Unclustered, Dense vs. Sparse, Primary vs. Secondary Multi-level Indices Handle duplicate values differently depending on the index characteristics Tree-structured indexes B+ trees Dynamic structure Inserts/deletes leave tree height-balanced, cost = log F N High fan-out (F), depth rarely more than or 4 Hash-based indexes Static Hashing Long overflow chains Extendible Hashing Directory to keep track of buckets, doubles periodically Avoids overflow pages by splitting a full bucket when a new data entry is to be added to it Linear Hashing Avoids directory by splitting buckets round-robin, and using overflow pages 7