Open In App

Hashing in DBMS

Hashing in DBMS is a technique to quickly locate a data record in a database irrespective of the size of the database. For larger databases containing thousands and millions of records, the indexing data structure technique becomes very inefficient because searching a specific record through indexing will consume more time. This doesn’t align with the goals of DBMS, especially when performance and date retrieval time are minimized. So, to counter this problem hashing technique is used. In this article, we will learn about various hashing techniques.

What is Hashing?

The hashing technique utilizes an auxiliary hash table to store the data records using a hash function. There are 2 key components in hashing:



Hash Function

A hash function is a mathematical algorithm that computes the index or the location where the current data record is to be stored in the hash table so that it can be accessed efficiently later. This hash function is the most crucial component that determines the speed of fetching data.

Working of Hash Function

The hash function generates a hash index through the primary key of the data record.



Now, there are 2 possibilities:

1. The hash index generated isn’t already occupied by any other value. So, the address of the data record will be stored here.

2. The hash index generated is already occupied by some other value. This is called collision so to counter this, a collision resolution technique will be applied.

3. Now whenever we query a specific record, the hash function will be applied and returns the data record comparatively faster than indexing because we can directly reach the exact location of the data record through the hash function rather than searching through indices one by one.

Example:

Hashing

Types of Hashing in DBMS

There are two primary hashing techniques in DBMS.

1. Static Hashing

In static hashing, the hash function always generates the same bucket’s address. For example, if we have a data record for employee_id = 107, the hash function is mod-5 which is – H(x) % 5, where x = id. Then the operation will take place like this:

H(106) % 5 = 1.
This indicates that the data record should be placed or searched in the 1st bucket (or 1st hash index) in the hash table.

Example:

Static Hashing Technique

The primary key is used as the input to the hash function and the hash function generates the output as the hash index (bucket’s address) which contains the address of the actual data record on the disk block.

Static Hashing has the following Properties

To resolve this problem of bucket overflow, techniques such as – chaining and open addressing are used. Here’s a brief info on both:

1. Chaining

Chaining is a mechanism in which the hash table is implemented using an array of type nodes, where each bucket is of node type and can contain a long chain of linked lists to store the data records. So, even if a hash function generates the same value for any data record it can still be stored in a bucket by adding a new node.

However, this will give rise to the problem bucket skew that is, if the hash function keeps generating the same value again and again then the hashing will become inefficient as the remaining data buckets will stay unoccupied or store minimal data.

2. Open Addressing/Closed Hashing

This is also called closed hashing this aims to solve the problem of collision by looking out for the next empty slot available which can store data. It uses techniques like linear probing, quadratic probing, double hashing, etc.

2. Dynamic Hashing

Dynamic hashing is also known as extendible hashing, used to handle database that frequently changes data sets. This method offers us a way to add and remove data buckets on demand dynamically. This way as the number of data records varies, the buckets will also grow and shrink in size periodically whenever a change is made.

Properties of Dynamic Hashing

Working of Dynamic Hashing

Example: If global depth: k = 2, the keys will be mapped accordingly to the hash index. K bits starting from LSB will be taken to map a key to the buckets. That leaves us with the following 4 possibilities: 00, 11, 10, 01.

Dynamic Hashing – mapping

As we can see in the above image, the k bits from LSBs are taken in the hash index to map to their appropriate buckets through directory IDs. The hash indices point to the directories, and the k bits are taken from the directories’ IDs and then mapped to the buckets. Each bucket holds the value corresponding to the IDs converted in binary.

FAQs on Hashing

Q.1: What are the problems encountered in hashing?

Answer:

Problems like collision, bucket overflow, bucket skew, insufficient buckets are encounterd. For each problem, we have a separate solution like collision resolution technique and dynamic hashing.

Q.2: Why hashing is more efficient than indexing?

Answer:

Efficiency of hashing rise from the fact that in hashing, we can get direct access to the exact location of the data record in the database. This is possible because of the hash function, hence it must be written by keeping certain factors in mind. In some cases, its also possible to fetch or add data in constant time. However, hashing is not suitable for finding all values in a given range as there isn’t a specific order of records.

Q.3: What is the main difference between indexing and hashing?

Answer:

Indexing uses B-tree like data structure for ordered and range queries and stores data in and ordered fashion providing logarithmic time in most operations. Hashing may provide constant time access on performing any operation but it can have collisions.

Q.4: In what other areas in computer science is hashing used?

Answer:

Hashing is a widely used technique for time and space optimization and in the context of cyber security it is also used to hash passwords (convert them to encrypted format), data verification and data integrity etc.

Q.5: What are the disadvantages of hashing?

Answer:

Following are 2 major disadvantages of hashing:

1. Lack of Range Queries: Hashing is not suitable for ordered data and fetchin a bulk amount of data in a given range, because data stored in buckets is not in an ordered format and hash function will have to be executed a number of times to fetch a long list of data, generating an overhead.

2. Sensistivity to the hash function: The hash function that’s written by the programmer must be developed by keeping in mind certain factors to ensure better performance, if it fails, every operation will consume more time to be executed.


Article Tags :