EBK DATABASE SYSTEM CONCEPTS
EBK DATABASE SYSTEM CONCEPTS
7th Edition
ISBN: 9781260049268
Author: SILBERSCHATZ
Publisher: MCG COURSE
Expert Solution & Answer
Book Icon
Chapter 15, Problem 21E

Explanation of Solution

Extending the hash-join algorithm:

  • The hash-join is used to compute the natural join of two relations.
  • The hash-join algorithm can be extended to compute the natural left outer join by,
    • Padding the tuple tr in the probe relation with nulls, if no matching tuple is found in the build relation’s hash partition.
    • Include this null padded tuple in the result as well.
  • The hash-join algorithm can be extended to compute the natural right outer join by,
    • Keeping a Boolean flag with each tuple in the current build relation partition which resides in memory.
    • Set it whenever any probe relation tuple matches the above tuple.
    • Finally, Pad with null those tuples which do not have their flags set and include them in the result.
  • The hash-join algorithm can be extended to compute the natural full outer join by performing natural left outer join and natural right outer join together.

Example:

Consider the customer and depositor relations given below:

customer_namecustomer_addresscustomer_city
AdamPark StreetBrooklyn
EveMain RoadRye
JohnBell CrossHarrison
JaneSand HillWoodside
TomWalnutPittsfield
JerryAlmaAlabama

Blurred answer
Students have asked these similar questions
How can I resolve the following issue?
I need help to resolve, thank you.
Let the user choose encryption or decryption. For encryption, let user input the key in Hexadecimal number, the plain text in Hexadecimal number, output the ciphertext (in hexadecimal numbers). For decryption, let user input the key in Hexadecimal number, the ciphertext (in hexadecimal numbers), output the decrypted message (Hexadecimal number). Both encryption and decryption should output the different operation results for each round like the following: For example: Round 1: E(R0) = ...... (Hex or Binary) K1 = …… E(Ro) xor K1 = S-box outputs = …… f(Ro1, K1) = ….. L2 =R1 =……. La = Ra Round 2: .....• No Encryption/Decryption libraries or functions provided by the third party are allowed. Submit your program codes to Moodle with the notes of how to compile and run your program.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education