SlideShare a Scribd company logo
Name ID
 Tanzila Islam 2012000000022
 Fariha Mahmud 2012000000008
 Rumana Yesmin 2012000000078
 Static Hashing
› File Organization
› Properties of the Hash Function
› Bucket Overflow
› Indices
 Hashing provides a means for accessing data
without the use of an index structure.
 Data is addressed on disk by computing a
function on a search key instead.
 Bucket
 Hash function
 Operation: Insertion, deletion, and lookup
are done in constant time.
 The distribution should be uniform.
 The distribution should be random.
 How does bucket overflow occur?
› Not enough buckets to handle data
› A few buckets have considerably more records
then others. This is referred to as skew.
 Multiple records have the same hash value
 Non-uniform hash function distribution.
 Provide more buckets then are needed.
 Overflow chaining
› If a bucket is full, link another bucket to it.
Repeat as necessary.
› The system must then check overflow buckets for
querying and updates. This is known as closed
hashing.
 Open hashing
› The number of buckets is fixed
› Overflow is handled by using the next bucket in
cyclic order that has space.
 This is known as linear probing.
 Compute more hash functions.
Note: Closed hashing is preferred in database
systems.
 Hashing is less efficient if queries to the
database include ranges as opposed to
specific values.
 In cases where ranges are infrequent hashing
provides faster insertion, deletion, and
lookup then ordered indexing.

More Related Content

Viewers also liked

University timetable generator using tabu search
University timetable generator using tabu searchUniversity timetable generator using tabu search
University timetable generator using tabu search
Tanzila Islam
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary Material
Mohamed Loey
 
31. Multimedia System
31. Multimedia System31. Multimedia System
31. Multimedia System
New Era University
 
PLC
PLCPLC
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
Mukesh Tekwani
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2
Mohamed Loey
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
AfiqEfendy Zaen
 
Multimedia
MultimediaMultimedia
Multimedia
Sean Chia
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
Affine Cypher Encryption - Decryption
Affine Cypher Encryption - DecryptionAffine Cypher Encryption - Decryption
Affine Cypher Encryption - Decryption
Zakriya Ali Sabir
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring tools
Online
 
Introduction to multimedia
Introduction to multimediaIntroduction to multimedia
Introduction to multimedia
Southern Leyte State University
 
Multimedia
MultimediaMultimedia
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 
multimedia element
multimedia elementmultimedia element
multimedia element
AZMAN KADIR
 
Multimedia
MultimediaMultimedia
Multimedia
Shivam Tuteja
 
Analyze what happens to the market for pizza, if the price of tomato rises an...
Analyze what happens to the market for pizza, if the price of tomato rises an...Analyze what happens to the market for pizza, if the price of tomato rises an...
Analyze what happens to the market for pizza, if the price of tomato rises an...
Tanzila Islam
 

Viewers also liked (19)

University timetable generator using tabu search
University timetable generator using tabu searchUniversity timetable generator using tabu search
University timetable generator using tabu search
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary Material
 
31. Multimedia System
31. Multimedia System31. Multimedia System
31. Multimedia System
 
PLC
PLCPLC
PLC
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Multimedia
MultimediaMultimedia
Multimedia
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Affine Cypher Encryption - Decryption
Affine Cypher Encryption - DecryptionAffine Cypher Encryption - Decryption
Affine Cypher Encryption - Decryption
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring tools
 
Introduction to multimedia
Introduction to multimediaIntroduction to multimedia
Introduction to multimedia
 
Multimedia
MultimediaMultimedia
Multimedia
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
multimedia element
multimedia elementmultimedia element
multimedia element
 
Multimedia
MultimediaMultimedia
Multimedia
 
Analyze what happens to the market for pizza, if the price of tomato rises an...
Analyze what happens to the market for pizza, if the price of tomato rises an...Analyze what happens to the market for pizza, if the price of tomato rises an...
Analyze what happens to the market for pizza, if the price of tomato rises an...
 

Hashing

  • 1.
  • 2. Name ID  Tanzila Islam 2012000000022  Fariha Mahmud 2012000000008  Rumana Yesmin 2012000000078
  • 3.  Static Hashing › File Organization › Properties of the Hash Function › Bucket Overflow › Indices
  • 4.  Hashing provides a means for accessing data without the use of an index structure.  Data is addressed on disk by computing a function on a search key instead.
  • 5.  Bucket  Hash function  Operation: Insertion, deletion, and lookup are done in constant time.
  • 6.  The distribution should be uniform.  The distribution should be random.
  • 7.  How does bucket overflow occur? › Not enough buckets to handle data › A few buckets have considerably more records then others. This is referred to as skew.  Multiple records have the same hash value  Non-uniform hash function distribution.
  • 8.  Provide more buckets then are needed.  Overflow chaining › If a bucket is full, link another bucket to it. Repeat as necessary. › The system must then check overflow buckets for querying and updates. This is known as closed hashing.
  • 9.  Open hashing › The number of buckets is fixed › Overflow is handled by using the next bucket in cyclic order that has space.  This is known as linear probing.  Compute more hash functions. Note: Closed hashing is preferred in database systems.
  • 10.
  • 11.  Hashing is less efficient if queries to the database include ranges as opposed to specific values.  In cases where ranges are infrequent hashing provides faster insertion, deletion, and lookup then ordered indexing.