### Abstract

In the study of data storage and retrieval involving secondary storage devices, for example, magnetic disks, a simplified model of storage that is often used is that each access takes a constant amount of time. However, if some information about the accesses is known, the model should take into consideration the inherent characteristics of the storage devices. In this paper, we assume a more refined model of storage that takes into consideration the seek time, the latency time, and the transmission time of disk accesses separately. We analyze the time required to randomly access a set of records residing on a set of consecutive cylinders on a magnetic disk a number of times, say n, for n 1. This problem may arise, for example, in the processing of queries that involve several relations in a relational database system. We also analyze the more general situations in which the n operations mayrepresent retrievals, insertions, or deletions, or a combination of them. We assume that the dynamic file structure linear hashing is used for locating and organizing the records. A linear hashing file does not employ any directory and its primary data buckets are assumed to be contiguous, therefore the data area of a linear hashing file corresponds closely to the disk space on a set of consecutive cylinders. As more records are inserted into a dynamic file, the data area has to be expanded. Using the same refined model of storage, we propose a data placement method for linear hashing such that the data area expansion time can be reduced. An analysis is presented and it shows that the improvement is significant.

Original language | English (US) |
---|---|

Pages (from-to) | 977-987 |

Number of pages | 11 |

Journal | IEEE Transactions on Software Engineering |

Volume | SE-13 |

Issue number | 8 |

DOIs | |

State | Published - Aug 1987 |

### Keywords

- Database management
- data model
- file organization
- information storage and retrieval
- physical design
- query processing

## Fingerprint Dive into the research topics of 'On Multiple Random Accesses and Physical Data Placement in Dynamic Files'. Together they form a unique fingerprint.

## Cite this

*IEEE Transactions on Software Engineering*,

*SE-13*(8), 977-987. https://doi.org/10.1109/TSE.1987.233515