## DEV Community hridyesh bisht for AWS Community Builders

Posted on • Updated on

# Intro into #Hashing ?

Hello, this blog contains the basic concept of hashing, hashing terminologies, various hashing functions, various collision resolution strategies, chaining with and without replacement, chaining using linked list and extendible hashing.

At the end it contains link to a GitHub repository, along with my another blog on encryption and decryption.

### Concept of Hashing:

To search for a specific element, we will look at just a specific position. The element will be found there if it was kept there in the first place. Hence, to place an element, we will first calculate its location, place it there so that it can be retrieved from that position.

In hashing, the address or location of an identifier X is obtained by using some function f(X) which gives the address of X in a table. ##### Hashing Terminology:
1. Hash Function:  A function that transforms a key X into a table index is called a hash function.
3. Hash Table:  The hash table is the sequential memory used to store identifiers.
4. Bucket: Each hash table is partitioned into ‘b’ buckets ht……ht[b-1].
1. Each bucket is capable of holding ‘s’ records.  Thus, a bucket consists of ‘s’ slots.  When  s = 1, each bucket can hold 1 record.
2. The function f(X) maps an identifier X into one of the ‘b’ buckets i.e from 0 to b-1.
5. Synonyms: Usually, the total  number of possible values for identifier X is much larger than the hash table size.  Therefore the hash function f(X) must map several identifiers into the same bucket.
1. Two identifiers I1 and I2 are synonyms if f(I1) = f(I2)
6. Collision: When two non identical identifiers are mapped into the same bucket, a collision is said to occur, i.e. f (I1) = f(I2). Hence all synonyms occupy the same bucket.
7. Overflow: An overflow is said to occur when an identifier gets mapped onto a full bucket.
1. When s = 1, i.e., a bucket contains only one record, collision and overflow occur simultaneously.  Such a situation is called a Hash clash
8. Load factor:  If n is the total number of identifiers in the table and t is the table size, the load factor is :
1. lf  =  n/t It represents the fraction of the table that is occupied.
9. Perfect Hash Function : Given a set of keys k1, k2, … kn, a perfect hash function, f,  is such that f(ki) != f(kj) for all distinct i and j.

For an example, Let us consider a hash table with b= 26 buckets (from 1 to 26) each having 2 slots, i.e. s = 2.  Assume that there are 10 distinct identifiers each beginning with a letter

Hash function f(X) = Number corresponding to the first letter of identifier i.e. if X = ‘A’, then f(X) = 1. If the identifiers are GA, D, A, G, L, A2, A1, A3, A4, E . Their hash addresses will be  7,4,1,7,12,1,1,1,1,5 respectively.  GA and G are :

synonyms. A, A2, A1, A3 and A4 are synonyms.  When G gets hashed into bucket 7, a collision is said to occur.  When A1 gets hashed into bucket 1, which already contains A and A2, an overflow occurs.

### Hash Function:

Desirable Characteristics of a Hashing Function

1. It should be easily computable.
2. It should minimize the number of collisions.
3. The hash function should compute the address, which depends on all or most of the characters in the identifier.
4. It should yield uniform bucket addresses for random inputs.  Such a function is called a uniform hash function.

1.Mid Square hash function:

This is a very widely used function in symbol table applications. It is the “middle of square” function, which is computed by squaring the identifiers and using an appropriate number of bits from the middle to obtain the bucket address.

`Example: (the size of the hash table = 100), If X = 225, X2 = 050625 then hash address = 06`

1. https://research.cs.vt.edu/AVresearch/hashing/midsquare.php

2.Division hash function

The modulus operator can be used as a hash function.  The identifier X is divided by some number M and the remainder is used as the hash address of X.

f(x) = X mod M.

The best choice for M is that it should be a prime number.

`Example: If X = 134 and M = 31 then f(X)= X mod M = 134 mod 31 =10`

3.Folding hash function:

In this method, the identifier X is partitioned into several parts all of the same length except the last. These parts are added to obtain the hash address.

Addition is done in two ways.

1.Shift Folding: All parts except the last are shifted so that their least significant bits correspond to each other.

For example, the hash function could form groups of three from the key 12320324111220. To determine the index to which the key is mapped the hash function “shifts” each set of digits under the other and adds them

2.Folding on the boundaries: The identifier is folded at the part boundaries and the bits falling together are added.

Group the digits in the search key as in shift folding but the middle numbers are folded on the boundary between the first group and the middle group and they are thus reversed. ### COLLISION RESOLUTION STRATEGIES

In an open addressing hashing system, if a collision occurs, alternative locations are tried until an empty location is found. Three techniques are commonly used for open addressing.

Features :

1. All the identifiers are stored in the hash table itself
2. Each slot contains an identifier or it is empty
3. Requires a bigger table for open addressing

1. Linear Probing or Linear Open Addressing :

In this method, the hash address of identifier X is obtained.  If the slot in its bucket is empty, the identifier is placed there.  If an overflow occurs the identifier is placed in the next empty slot after its bucket. 1. It is a simple method of overflow handling.
2. The method can be easily implemented using simple data structures like arrays.

1. An identifier whose bucket is full, will occupy the valid hash address of another identifier.  Thus, one overflow will lead to many more.
2. If an identifier is not found at its computed address, a series of comparisons will have to be made in order to retrieve it.
3. If an identifier is not present in the bucket, the search will be terminated only the entire bucket is searched.
4. It creates a cluster of identifiers i.e. identifiers are concentrated in some parts of the table.
5. There is a possibility of the table becoming full.

In Quadratic Probing a quadratic function of i is used as the increment. when the identifier is not found in its bucket , we search in successive buckets using an increment i.

The hash function is quadratic: this method checks the buckets number computed using a quadratic equation.  This ensures that the identifiers are fairly spread out in the table. 1. Avoids the clustering problem in linear probing to some extent
2. Faster insertion and deletion

1. There is no guarantee of finding an empty slot once the table becomes more than half full if the table size is not prime.
2. Although this method eliminates primary clustering, it does not eliminate another phenomenon called “secondary clustering” in which different keys that hash to the same value follow the same rehash path.
##### 3.Rehashing:

In this method, if an overflow occurs, a new address is computed by using another hash function.

A series of hash functions f1, f2, …..fn are used.  To place an identifier X, f1(X) , f2(X) …..fm (X) are computed till an empty slot is found to place the identifier.

To search for identifier X, they are used in the same order to search the identifier. If all the hash functions have been used and the identifier is not found, it means that the identifier is not there in the table. 1. Does not lead to clustering

1. The process may loop forever. This may happen when some rehash function results in the same hash address for an identifier.
2. It is difficult to find a series of hash functions yielding different addresses for the same identifier.
3. Rehashing is costly as each rehash function takes a finite amount of time.

## Chaining:

##### 1.Chaining without Replacement:

The hash address of an identifier X is computed.

1. If this position is vacant, it is placed there.
2. It its position is occupied by another identifier Y, the identifier X is put in the next vacant position and a chain is formed to the new position i.e. from Y to X. Example:    Identifier is 11, 32, 41, 54, 33.

Hash function:    f(x) = X mod 10 and Table size = 10

1. Identifier 11 and 32 get hashed into positions 1 and 2 respectively.
2. The hash address of 41 is 1 but its position is occupied, hence it is put at position 3 and a chain is formed.
3. 54 stored at position 4
4. The hash address of 33 is 3 but it is occupied.  So 3 is placed at position 5 and a chain is formed from position 3 to 5 as shown.

1. Since identifiers are chained, we have to only use the chains to locate an identifier.
2. It is more efficient as compared to the previous methods.

1. The main idea is to chain all identifiers having same hash address (synonyms). However, when an overflow occurs,  an identifier occupies the position of another identifier. Hence, even non-synonyms get chained together thereby increasing complexity.
##### 2.Chaining with Replacement:

This is an improvement over the above method. As we saw above, even non synonyms get chained. To avoid this from happening, if we find that another identifier Y which is a non-synonym, is occupying the position of an identifier X, X replaces Y and then Y is relocated to a new position.

It will not make a difference to Y since Y was anyway not in its own bucket. But by placing X in its own bucket, we are improving the efficiency. Let us consider the same example as earlier.  Here, 11, 32, 41 and 54 get placed in the same way as before.

However, when 33 has to be placed, its position is occupied by 41. Thus, 33 replaces 41 and 41 is now put into the next empty slot i.e 5 and the chain from element 11 at position 1 is modified.

1. 11,41===1
2. 33===3
3. We will swap 41 & 33

1. Most of the identifiers occupy their valid positions.
2. Searching becomes easier since only the synonyms are chained.

1. Insertions and deletions take more time. All of the above methods suffer from a variety of problems.

1. Limited amount of space, due to which the table can become full.
2.  The complexity of chaining which results in poor efficiency.

Obviously the best method would be to have unlimited amount of space for each bucket so that we could put in as many identifiers as we want without any overflow taking place.

1. Most efficient method to resolve collision.
2. There is no limit on the number of identifiers.
3. Searching, Insertion and Deletions are done efficiently.
4. The hash table will never be ‘full’.

1. If many identifiers are put into a single list, searching time within a bucket will increase.
2. Handling of the pointer array and linked lists is more complex as compared to simple arrays.

### EXTENDIBLE HASHING

Reason for Extendible hashing :

1.  Most records have to be stored in disk
2. Disk read/write operations much more expensive than operations in main memory
3. Regular hash tables need to examine several disk blocks when collisions occur
4. We want to limit number of disk accesses for find/insert operations

Concept :

1. Retrieval to be performed in two disk accesses and Insertion also in  few accesses.
2. This can be achieved by using a tree structure.
3. The tree is an M-ary tree (degree M) which allows M-way branching.
4. This means that as the branching increases, depth of the tree decreases.
5. A complete Binary tree has height (log2N) whereas a complete M-ary tree  has height of (log M/2 N). As M increases, the depth decreases. Procedure:

1. Hash the key of each record into a reasonably long integer to avoid collision
2. Adding 0’s to the left so they have the same length
3. Build a directory
4. The directory is stored in the primary memory
5. Each entry in the directory points to a leaf
6. Directory is extensible
7. Each leaf contains M records,
8. Stored in one disk block
9. Share the same D number of leading digits