Suppose that a static hash file initially has 600 buckets in the primary area and that records are inserted that create an overflow area of 600 buckets. If we reorganize the hash file, we can assume that the overflow is eliminated. If the cost of reorganizing the file is the cost of the bucket transfers (reading and writing al of the buckets) and the only periodic file operation is the fetch operation, then how many times would we have to perform a fetch (successfully) to make the reorganization cost-effective? That is, the reorganization cost and subsequent search cost are less than the search cost before reorganization. Assume s=16, rd=8.3 ms, btt=1 ms.

What will be an ideal response?



Primary Area = 600 buckets
Secondary Area (Overflow) = 600 buckets
Total reorganization cost = Buckets Read & Buckets Written for (600 & 600) +
1200 = 2400 buckets = 2400 (1 ms) = 2400 ms
Let X = number of random fetches from the file.
Average Search time per fetch = time to access (1 + 1/2) buckets where 50% of
time we need to access the overflow bucket.
Access time for one bucket access = (S + r + btt)
= 16 + 8.3 + 0-8
= 25.1 ms
Time with reorganization for the X fetches
= 2400 + X (25.1) ms
Time without reorganization for X fetches = X (25.1) (1 + 1/2) ms
= 1.5 * X * (25.1) ms.
Hence, 2400 + X (25.1) < (25.1) * (1.5X)
2374.9/ 12.55 < X
Hence, 189.23 < X
If we make at least 190 fetches, the reorganization is worthwhile.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a) The Windows Phone 8 operating system is larger than Windows 8 because it adds many features designed specifically for smartphones. b) These are resource-constrained devices—they have less memory and processor power than desktop computers, and limited battery life. c) WP8 has the same core operating systems services as Windows 8, including a common file system, security, networking, media d) WP8 has only the features necessary for smartphones, allowing them to run efficiently, minimizing the burden on the device’s resources.

Computer Science & Information Technology

Which symbol to the right of a column name in the SharePoint documents library indicates that a filter has been applied?

A) Funnel B) Check mark C) Large arrow D) Small arrow

Computer Science & Information Technology

________ affects the background color or pattern of a cell, or group of cells

Fill in the blank(s) with correct word

Computer Science & Information Technology

What requires the user's password along with another physical device for authentication?

A. encryption B. cleint side validation C. server side validation D. two-factor authentication

Computer Science & Information Technology