SlideShare a Scribd company logo
1 of 11
Download to read offline
Name ID
 Tanzila Islam 2012000000022
 Fariha Mahmud 2012000000008
 Rumana Yesmin 2012000000078
 Static Hashing
› File Organization
› Properties of the Hash Function
› Bucket Overflow
› Indices
 Hashing provides a means for accessing data
without the use of an index structure.
 Data is addressed on disk by computing a
function on a search key instead.
 Bucket
 Hash function
 Operation: Insertion, deletion, and lookup
are done in constant time.
 The distribution should be uniform.
 The distribution should be random.
 How does bucket overflow occur?
› Not enough buckets to handle data
› A few buckets have considerably more records
then others. This is referred to as skew.
 Multiple records have the same hash value
 Non-uniform hash function distribution.
 Provide more buckets then are needed.
 Overflow chaining
› If a bucket is full, link another bucket to it.
Repeat as necessary.
› The system must then check overflow buckets for
querying and updates. This is known as closed
hashing.
 Open hashing
› The number of buckets is fixed
› Overflow is handled by using the next bucket in
cyclic order that has space.
 This is known as linear probing.
 Compute more hash functions.
Note: Closed hashing is preferred in database
systems.
 Hashing is less efficient if queries to the
database include ranges as opposed to
specific values.
 In cases where ranges are infrequent hashing
provides faster insertion, deletion, and
lookup then ordered indexing.

More Related Content

Viewers also liked

University timetable generator using tabu search
University timetable generator using tabu searchUniversity timetable generator using tabu search
University timetable generator using tabu searchTanzila Islam
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialMohamed Loey
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmissionMukesh Tekwani
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Mohamed Loey
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And DecryptionNA
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
Affine Cypher Encryption - Decryption
Affine Cypher Encryption - DecryptionAffine Cypher Encryption - Decryption
Affine Cypher Encryption - DecryptionZakriya Ali Sabir
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring toolsOnline
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
multimedia element
multimedia elementmultimedia element
multimedia elementAZMAN KADIR
 
Analyze what happens to the market for pizza, if the price of tomato rises an...
Analyze what happens to the market for pizza, if the price of tomato rises an...Analyze what happens to the market for pizza, if the price of tomato rises an...
Analyze what happens to the market for pizza, if the price of tomato rises an...Tanzila Islam
 

Viewers also liked (19)

University timetable generator using tabu search
University timetable generator using tabu searchUniversity timetable generator using tabu search
University timetable generator using tabu search
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary Material
 
31. Multimedia System
31. Multimedia System31. Multimedia System
31. Multimedia System
 
PLC
PLCPLC
PLC
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Multimedia
MultimediaMultimedia
Multimedia
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Affine Cypher Encryption - Decryption
Affine Cypher Encryption - DecryptionAffine Cypher Encryption - Decryption
Affine Cypher Encryption - Decryption
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring tools
 
Introduction to multimedia
Introduction to multimediaIntroduction to multimedia
Introduction to multimedia
 
Multimedia
MultimediaMultimedia
Multimedia
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
multimedia element
multimedia elementmultimedia element
multimedia element
 
Multimedia
MultimediaMultimedia
Multimedia
 
Analyze what happens to the market for pizza, if the price of tomato rises an...
Analyze what happens to the market for pizza, if the price of tomato rises an...Analyze what happens to the market for pizza, if the price of tomato rises an...
Analyze what happens to the market for pizza, if the price of tomato rises an...
 

Hashing

  • 1.
  • 2. Name ID  Tanzila Islam 2012000000022  Fariha Mahmud 2012000000008  Rumana Yesmin 2012000000078
  • 3.  Static Hashing › File Organization › Properties of the Hash Function › Bucket Overflow › Indices
  • 4.  Hashing provides a means for accessing data without the use of an index structure.  Data is addressed on disk by computing a function on a search key instead.
  • 5.  Bucket  Hash function  Operation: Insertion, deletion, and lookup are done in constant time.
  • 6.  The distribution should be uniform.  The distribution should be random.
  • 7.  How does bucket overflow occur? › Not enough buckets to handle data › A few buckets have considerably more records then others. This is referred to as skew.  Multiple records have the same hash value  Non-uniform hash function distribution.
  • 8.  Provide more buckets then are needed.  Overflow chaining › If a bucket is full, link another bucket to it. Repeat as necessary. › The system must then check overflow buckets for querying and updates. This is known as closed hashing.
  • 9.  Open hashing › The number of buckets is fixed › Overflow is handled by using the next bucket in cyclic order that has space.  This is known as linear probing.  Compute more hash functions. Note: Closed hashing is preferred in database systems.
  • 10.
  • 11.  Hashing is less efficient if queries to the database include ranges as opposed to specific values.  In cases where ranges are infrequent hashing provides faster insertion, deletion, and lookup then ordered indexing.