HashBased Indexes - PowerPoint PPT Presentation

1 / 21
About This Presentation
Title:

HashBased Indexes

Description:

Database Management Systems 3ed, R. Ramakrishnan ... k, rid of data record with search key value k ... a and b are constants; lots known about how to tune h. ... – PowerPoint PPT presentation

Number of Views:36
Avg rating:3.0/5.0
Slides: 22
Provided by: RaghuRamak244
Category:

less

Transcript and Presenter's Notes

Title: HashBased Indexes


1
Hash-Based Indexes
  • Chapter 11

2
Introduction
  • As for any index, 3 alternatives for data entries
    k
  • Data record with key value k
  • ltk, rid of data record with search key value kgt
  • ltk, list of rids of data records with search key
    kgt
  • Choice orthogonal to the indexing technique
  • Hash-based indexes are best for equality
    selections. Cannot support range searches.
  • Static and dynamic hashing techniques exist
    trade-offs similar to ISAM vs. B trees.

3
Static Hashing
  • primary pages fixed, allocated sequentially,
    never de-allocated overflow pages if needed.
  • h(k) mod M bucket to which data entry with key
    k belongs. (M of buckets)

0
h(key) mod N
2
key
h
N-1
Primary bucket pages
Overflow pages
4
Static Hashing (Contd.)
  • Buckets contain data entries.
  • Hash fn works on search key field of record r.
    Must distribute values over range 0 ... M-1.
  • h(key) (a key b) usually works well.
  • a and b are constants lots known about how to
    tune h.
  • Long overflow chains can develop and degrade
    performance.
  • Extendible and Linear Hashing Dynamic techniques
    to fix this problem.

5
Extendible Hashing
  • Situation Bucket (primary page) becomes full.
    Why not re-organize file by doubling of
    buckets?
  • Reading and writing all pages is expensive!
  • Idea Use directory of pointers to buckets,
    double of buckets by doubling the directory,
    splitting just the bucket that overflowed!
  • Directory much smaller than file, so doubling it
    is much cheaper. Only one page of data entries
    is split. No overflow page!
  • Trick lies in how hash function is adjusted!

6
Example
2
LOCAL DEPTH
Bucket A
16
4
12
32
GLOBAL DEPTH
2
2
Bucket B
13
00
1
21
5
  • Directory is array of size 4.
  • To find bucket for r, take last global depth
    bits of h(r) we denote r by h(r).
  • If h(r) 5 binary 101, it is in bucket
    pointed to by 01.

01
2
10
Bucket C
10
11
2
DIRECTORY
Bucket D
15
7
19
DATA PAGES
  • Insert If bucket is full, split it (allocate
    new page, re-distribute).
  • If necessary, double the directory. (As we will
    see, splitting a
  • bucket does not always require doubling we
    can tell by
  • comparing global depth with local depth for
    the split bucket.)

7
Insert h(r)20 (Causes Doubling)
2
LOCAL DEPTH
3
LOCAL DEPTH
Bucket A
16
32
GLOBAL DEPTH
32
16
Bucket A
GLOBAL DEPTH
2
2
2
3
Bucket B
1
5
21
13
00
1
5
21
13
000
Bucket B
01
001
2
10
2
010
Bucket C
10
11
10
Bucket C
011
100
2
2
DIRECTORY
101
Bucket D
15
7
19
15
19
7
Bucket D
110
111
2
3
Bucket A2
20
4
12
DIRECTORY
20
12
Bucket A2
4
(split image'
of Bucket A)
(split image'
of Bucket A)
8
Points to Note
  • 20 binary 10100. Last 2 bits (00) tell us r
    belongs in A or A2. Last 3 bits needed to tell
    which.
  • Global depth of directory Max of bits needed
    to tell which bucket an entry belongs to.
  • Local depth of a bucket of bits used to
    determine if an entry belongs to this bucket.
  • When does bucket split cause directory doubling?
  • Before insert, local depth of bucket global
    depth. Insert causes local depth to become gt
    global depth directory is doubled by copying it
    over and fixing pointer to split image page.
    (Use of least significant bits enables efficient
    doubling via copying of directory!)

9
Comments on Extendible Hashing
  • If directory fits in memory, equality search
    answered with one disk access else two.
  • 100MB file, 100 bytes/rec, 4K pages contains
    1,000,000 records (as data entries) and 25,000
    directory elements chances are high that
    directory will fit in memory.
  • Directory grows in spurts, and, if the
    distribution of hash values is skewed, directory
    can grow large.
  • Multiple entries with same hash value cause
    problems!
  • Delete If removal of data entry makes bucket
    empty, can be merged with split image. If each
    directory element points to same bucket as its
    split image, can halve directory.

10
Linear Hashing
  • This is another dynamic hashing scheme, an
    alternative to Extendible Hashing.
  • LH handles the problem of long overflow chains
    without using a directory, and handles
    duplicates.
  • Idea Use a family of hash functions h0, h1,
    h2, ...
  • hi(key) h(key) mod(2iN) N initial buckets
  • h is some hash function (range is not 0 to N-1)
  • If N 2d0, for some d0, hi consists of applying
    h and looking at the last di bits, where di d0
    i.
  • hi1 doubles the range of hi (similar to
    directory doubling)

11
Linear Hashing (Contd.)
  • Directory avoided in LH by using overflow pages,
    and choosing bucket to split round-robin.
  • Splitting proceeds in rounds. Round ends when
    all NR initial (for round R) buckets are split.
    Buckets 0 to Next-1 have been split Next to NR
    yet to be split.
  • Current round number is Level.
  • Search To find bucket for data entry r, find
    hLevel(r)
  • If hLevel(r) in range Next to NR , r belongs
    here.
  • Else, r could belong to bucket hLevel(r) or
    bucket hLevel(r) NR must apply hLevel1(r) to
    find out.

12
Overview of LH File
  • In the middle of a round.

Buckets split in this round
Bucket to be split
h
search key value
)
(
If
Level
Next
is in this range, must use
search key value
)
(
h
Level1
Buckets that existed at the
to decide if entry is in
beginning of this round
split image' bucket.
this is the range of
h
Level
split image' buckets
created (through splitting
of other buckets) in this round
13
Linear Hashing (Contd.)
  • Insert Find bucket by applying hLevel /
    hLevel1
  • If bucket to insert into is full
  • Add overflow page and insert data entry.
  • Split Next bucket and increment Next.
  • Can choose other criterion to trigger split.
  • Since buckets are split round-robin, long
    overflow chains dont develop!
  • Doubling of directory in Extendible Hashing is
    similar switching of hash functions is implicit
    in how the of bits examined is increased.

14
Example of Linear Hashing
  • On split, hLevel1 is used to re-distribute
    entries.

Level0, N4
Level0
PRIMARY
h
h
h
h
OVERFLOW
PRIMARY
0
1
PAGES
0
1
PAGES
PAGES
Next0
32
32
44
36
00
000
00
000
Next1
Data entry r
25
9
5
25
9
5
with h(r)5
01
001
01
001
30
30
14
18
10
14
18
10
Primary
10
10
010
010
bucket page
31
35
11
7
31
35
11
7
43
011
011
11
11
(This info is for illustration only!)
(The actual contents of the linear hashed file)
100
44
36
00
15
Example End of a Round
Level1
PRIMARY
OVERFLOW
h
h
PAGES
0
1
PAGES
Next0
Level0
00
000
32
PRIMARY
OVERFLOW
PAGES
h
PAGES
h
0
1
001
01
9
25
32
00
000
10
010
10
50
66
18
34
9
25
001
01
011
11
35
11
43
10
66
10
18
34
010
Next3
100
00
44
36
43
35
31
7
11
011
11
101
11
5
29
37
44
36
100
00
14
30
22
10
110
5
37
29
101
01
22
14
30
31
7
111
11
10
110
16
Linear Hashing Example 2
  • The page indicated by next is split (the first
    one).
  • Next is incremented.
  • An overflow page is chained to the primary page
    to contain the inserted value.
  • If h0 maps a value from zero to next 1 (just
    the first page in this case) h1 must be used to
    where to insert the new entry.

17
Linear Hashing Exercise
  • Assume inserts of 8, 7, 18, 14, 111, 32, 162, 10,
    13, 233
  • After the 2nd. split the base level is 1 (N1
    8), use h1.
  • Subsequent splits will use h2 for inserts between
    the first bucket and next-1.

18
Linear Hashing Solution
  • Assume inserts of 8, 7, 18, 14, 111, 32, 162, 10,
    13, 233
  • After the 2nd. split the base level is 1 (N1
    8), use h1.
  • Subsequent splits will use h2 for inserts.

19
Linear vs. Extendible Hashing
  • Both schemes have the basic idea of extending the
    hash function to effectively increase the number
    of buckets.
  • LH avoids directory structure by simply pointing
    to next bucket rather than immediately split
    whatever bucket is full.
  • However, this means that LH tends to have more
    overflow buckets and hence somewhat worse space
    utilization.

20
Summary
  • Hash-based indexes best for equality searches,
    cannot support range searches.
  • Static Hashing can lead to long overflow chains.
  • Extendible Hashing avoids overflow pages by
    splitting a full bucket when a new data entry is
    to be added to it. (Duplicates may require
    overflow pages.)
  • Directory to keep track of buckets, doubles
    periodically.
  • Can get large with skewed data additional I/O if
    this does not fit in main memory.

21
Summary (Contd.)
  • Linear Hashing avoids directory by splitting
    buckets round-robin, and using overflow pages.
  • Overflow pages not likely to be long.
  • Duplicates handled easily.
  • Space utilization could be lower than Extendible
    Hashing, since splits not concentrated on dense
    data areas.
  • For hash-based indexes, a skewed data
    distribution is one in which the hash values of
    data entries are not uniformly distributed!
Write a Comment
User Comments (0)
About PowerShow.com