SlideShare a Scribd company logo
1 of 20
B-Tree
An Analysis


       By:
              Nikhil Sharma
                BE/8034/09
Definition
A B-tree is a tree data structure that keeps data sorted and allows
  searches, sequential access, insertions, and deletions in
  logarithmic amortized time. The B-tree is a generalization of
  a binary search tree in which more than two paths diverge from a
  single node.

A B-tree of order m (the maximum number of children for each
  node) is a tree which satisfies the following properties:
 Every node has at most m children.
 Every node (except root and leaves) has at least m⁄2 children.
 The root has at least two children if it is not a leaf node.
 All leaves appear in the same level, and carry information.
 A non-leaf node with k children contains k−1 keys.

              Declaration in C:
              typedef struct { int Count;             // number of keys stored in the current node
              ItemType Key[3]; // array to hold the 3 keys [4];
              long Branch[4]; // array of fake pointers (record numbers)
               } NodeType;
Order & Key of a B-Tree




The following is an example of a B-tree of order 5. This means
that (other than the root node) all internal nodes have at least 3
children (and hence at least 2 keys). Of course, the maximum
number of children that a node can have is 5 (so that 4 is the
maximum number of keys). In practice B-trees usually have
orders a lot bigger than 5. The first row in each node shows the
keys, while the second row shows the pointers to the child nodes
Height of B-Tree

   If n ≥ 1, then for any n-key B-tree T of height h and
    minimum degree t ≥ 2, h logt (n 1)/2

   Height of the B-Tree with n keys is important as it bound
    the number of disk accesses.

   The height of the tree is maximum when each node has
    minimum number of the subtree pointers, q m / 2
           .
   Note:If number of nodes in B-tree equal 2,000,000 (2
    million) and m=200 then maximum height of B-tree is
    3, where as the binary tree would be of height 20.
Search in a B-Tree

   Search in a B-tree is similar to the search in BST except that in B-
    tree we make a multiway branching decision instead of binary
    branching in BST.


                                        25 62



            12 19                     32 39                     73 84


    3   5    15 17    21 23   30 31    34 37    45 51   69 71    75 79   90 94




                                      Search key 71
B-Tree Insert Operation
   Insertion in B-tree is more complicated than in BST.

   In BST, the keys are added in top down fashion
    resulting in an unbalanced tree.

   B-tree is built bottom up, the keys are added in the
    leaf node, if the leaf node is full another node is
    created, keys are evenly distributed and middle key
    is promoted to the parent. If parent is full, the
    process is repeated.

   B-tree can also be built in top down fashion using
    pre-splitting technique.
Basic Idea : Insertion
                         Find position for the key
                       in the appropriate leaf node




Insert key in order                Is node
and adjust pointer
                        No           full ?

                                          yes
               Split node:                                           If parent is full
               • Create a new node
               • Move half of the keys from the full node to
                 the new node and adjust pointers
               • Promote the median key (before split)
                to the parent
               Split guarantees that each node has        m/ 2   1
               keys.
Cases in B-Tree Insert Operation


   In B-tree insertion we have the following
    cases:
    ◦ Case 1: The leaf node has room for the new
      key.
    ◦ Case 2: The leaf in which key is to be placed is
      full.
      This case can lead to the increase in tree height.
B-Tree Insert Operation

 Case 1: The leaf node has room for the new key.

                                              Find appropriate leaf
      Insert 3                                   node for key 3
                          3
                               10 25



              5   8            14 19 20 23   32 38

           Insert 3 in order
B-Tree Insert Operation
        Case 2: The leaf in which key is to be placed is full.

                                                         Find appropriate leaf
            Insert 16                                       node for key 16

                                  16
                                        10 25
                                           19



                      3   5   8         14 19 20 23   32 38

                                                       No room for key 16 in leaf node
Insert key 19 in parent node in order
                                                              Move median key 19 up and
                                                              Split node: create a new node
                                                              and move keys to the new
                                                              node.
                              14 16 20 23
                                 19
B-Tree Insert Operation


   Case 2: The leaf in which key is to be placed is full
    and this lead to the increase in tree height.




                              45   55   67   81
B-Tree Insert Operation
       Case 2: The height of the tree increases.
   Insert 16
                                                                                                                   No room for 27 in parent, Split node
                        Insert 27 in parent in order                            55


                                                              16
                                                                     45    55   67   81
                                                                          55

No room for 19 in parent,
Split parent node                                                                        48   52                        57   61                       72   77                       86       92


                                   13   27
                                        19
                                        27    33    38

                                                                                     3    3        4   5   5   7    3   3     4   5   5   7   3   3        4    5   5   7   3   3        4        5   5   7
                                                                                     2    8        7   1   9   5    2   8     7   1   9   5   2   8        7    1   9   5   2   8        7        1   9   5




  9     12         14    19   20   23    29    31        35   36      41       42


                                                                   Insert 19 in parent node in order


                                                               No room for key 16,
                                                               Move median key 19 up & Split node

             19
   14    16       20    23
B-Tree Delete Operation
   Deletion is analogous to insertion, but a
    little more complicated.
   Two major cases
    ◦ Case 1: Deletion from leaf node
    ◦ Case 2: Deletion from non-leaf node
      Apply delete by copy technique used in BST, this
       will reduce this case to case 1.
      In delete by copy, the key to be deleted is
       replaced by the largest key in the right subtree or
       smallest in left subtree (which is always a leaf).
B-Tree Delete Operation

   Leaf node deletion cases:
    ◦ After deletion node is at least half full.
    ◦ After deletion underflow occurs
      Redistribute: if number of keys in siblings > 2       .
                                                     m
                                                         1

      Merge nodes if number of keys in siblings < m 2
                                                         1   .
      Merging leads to decrease in tree height.
B-Tree Delete Operation

   After deletion node is at least half full. (inverse of insertion
    case 1)

                                                       Search key 3

                                   10 25



                  3   5   8        14 19             32 38 40 45

                 Key found, delete key 3.
                 Move others keys in the node to eliminate
                 the gap.
B-Tree Delete Operation

   Underflow occurs, evenly redistribute the keys if left or right
    sibling has keys          .
                            m/ 2 1


                                                       Search key
        Delete 14
                                                       14
                               10 25



                    5   8      14 19             32 38 40 45


                             Underflow occurs, evenly redistribute
                             keys
                             in the underflow node, in its sibling
                             and the separator key.
B-Tree Delete Operation

   Underflow occurs and the keys in the left & right sibling are
      m / 2 1 . Merge the underflow node and a sibling.


        Delete 25                                  Move separator key down.

                                                   Move the keys to underflow
                             10 32
                                                   node and discard the sibling.



                    5   8    19 25            38 40


                             Underflow occurs, merge
                             nodes.
B-Tree Delete Operation

           Underflow occurs, height decreases after merging.
             Delete 21
                                          70
Underflow
occurs, merge
nodes
                   8   32                                  79 85



3       5          21 27            47 66       73 75 78   81 83   88 90 92

                  Underflow occurs, merge
                  nodes by moving separator
                  key and the keys in sibling
                  node to the underflow
                  node.
B-Tree V/s Binary Tree
             Advantages
 Efficient in real life problems where
  number of records is very large (i.e.
  large datasets)
 Frees up RAM as all nodes located
  on secondary memory
 B Tree reduces depth of the tree
  hence, desired record is located
  faster

           Disadvantages
 Decision process at each node is
  more complicated in a B-tree
 A sophisticated program is required
  to execute the operations in a B-tree

                                          Fig. Comparison of linear growth rate vs.
                                          logarithmic growth rate
The End

More Related Content

What's hot

What's hot (20)

Merge sort
Merge sortMerge sort
Merge sort
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Graphs in Data Structure
 Graphs in Data Structure Graphs in Data Structure
Graphs in Data Structure
 
B trees dbms
B trees dbmsB trees dbms
B trees dbms
 
Unix ch03-03
Unix ch03-03Unix ch03-03
Unix ch03-03
 
Singly link list
Singly link listSingly link list
Singly link list
 
Binary tree traversal ppt - 02.03.2020
Binary tree traversal   ppt - 02.03.2020Binary tree traversal   ppt - 02.03.2020
Binary tree traversal ppt - 02.03.2020
 
Linked list
Linked listLinked list
Linked list
 
DATA STRUCTURES
DATA STRUCTURESDATA STRUCTURES
DATA STRUCTURES
 
Monitors
MonitorsMonitors
Monitors
 
Stacks IN DATA STRUCTURES
Stacks IN DATA STRUCTURESStacks IN DATA STRUCTURES
Stacks IN DATA STRUCTURES
 
Singly & Circular Linked list
Singly & Circular Linked listSingly & Circular Linked list
Singly & Circular Linked list
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
 
Merge sort
Merge sortMerge sort
Merge sort
 
Graph traversals in Data Structures
Graph traversals in Data StructuresGraph traversals in Data Structures
Graph traversals in Data Structures
 
Binary tree
Binary treeBinary tree
Binary tree
 
Queue Data Structure
Queue Data StructureQueue Data Structure
Queue Data Structure
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Nested loops
Nested loopsNested loops
Nested loops
 
Sorting Algorithms
Sorting AlgorithmsSorting Algorithms
Sorting Algorithms
 

Viewers also liked

12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS
koolkampus
 
Algebra 1 2.8 Algebraic Proof
Algebra 1 2.8 Algebraic ProofAlgebra 1 2.8 Algebraic Proof
Algebra 1 2.8 Algebraic Proof
Jaqueline Vallejo
 
Struktur data 06 (red black tree)
Struktur data 06 (red black tree)Struktur data 06 (red black tree)
Struktur data 06 (red black tree)
Sunarya Marwah
 

Viewers also liked (20)

B tree
B treeB tree
B tree
 
Best for b trees
Best for b treesBest for b trees
Best for b trees
 
B tree
B treeB tree
B tree
 
12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS
 
Array operations
Array operationsArray operations
Array operations
 
10 array
10 array10 array
10 array
 
Interactive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social GraphsInteractive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social Graphs
 
Multi way&btree
Multi way&btreeMulti way&btree
Multi way&btree
 
B tree short
B tree shortB tree short
B tree short
 
B tree &amp;
B tree &amp;B tree &amp;
B tree &amp;
 
Geo webinarjune2015
Geo webinarjune2015Geo webinarjune2015
Geo webinarjune2015
 
stack and queue array implementation in java.
stack and queue array implementation in java.stack and queue array implementation in java.
stack and queue array implementation in java.
 
Data structure tries
Data structure triesData structure tries
Data structure tries
 
Algebra 1 2.8 Algebraic Proof
Algebra 1 2.8 Algebraic ProofAlgebra 1 2.8 Algebraic Proof
Algebra 1 2.8 Algebraic Proof
 
Insertion in RED BLACK TREE
Insertion in RED BLACK TREEInsertion in RED BLACK TREE
Insertion in RED BLACK TREE
 
B trees and_b__trees
B trees and_b__treesB trees and_b__trees
B trees and_b__trees
 
R-Trees and Geospatial Data Structures
R-Trees and Geospatial Data StructuresR-Trees and Geospatial Data Structures
R-Trees and Geospatial Data Structures
 
Struktur data 06 (red black tree)
Struktur data 06 (red black tree)Struktur data 06 (red black tree)
Struktur data 06 (red black tree)
 
Logic gates with laws
Logic gates with lawsLogic gates with laws
Logic gates with laws
 
Red black trees presentation
Red black trees presentationRed black trees presentation
Red black trees presentation
 

Similar to B tree long (13)

Btrees
BtreesBtrees
Btrees
 
Btrees
BtreesBtrees
Btrees
 
B trees
B treesB trees
B trees
 
B trees2
B trees2B trees2
B trees2
 
08 B Trees
08 B Trees08 B Trees
08 B Trees
 
Btree
BtreeBtree
Btree
 
16807097.ppt b tree are a good data structure
16807097.ppt b tree are a good data structure16807097.ppt b tree are a good data structure
16807097.ppt b tree are a good data structure
 
302 B+Tree Ind Hash
302 B+Tree Ind Hash302 B+Tree Ind Hash
302 B+Tree Ind Hash
 
Threaded Binary Tree
Threaded Binary TreeThreaded Binary Tree
Threaded Binary Tree
 
B trees
B treesB trees
B trees
 
Lec15
Lec15Lec15
Lec15
 
BTrees-fall2010.ppt
BTrees-fall2010.pptBTrees-fall2010.ppt
BTrees-fall2010.ppt
 
Data structures trees - B Tree & B+Tree.pptx
Data structures trees - B Tree & B+Tree.pptxData structures trees - B Tree & B+Tree.pptx
Data structures trees - B Tree & B+Tree.pptx
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

B tree long

  • 1. B-Tree An Analysis By: Nikhil Sharma BE/8034/09
  • 2. Definition A B-tree is a tree data structure that keeps data sorted and allows searches, sequential access, insertions, and deletions in logarithmic amortized time. The B-tree is a generalization of a binary search tree in which more than two paths diverge from a single node. A B-tree of order m (the maximum number of children for each node) is a tree which satisfies the following properties:  Every node has at most m children.  Every node (except root and leaves) has at least m⁄2 children.  The root has at least two children if it is not a leaf node.  All leaves appear in the same level, and carry information.  A non-leaf node with k children contains k−1 keys. Declaration in C: typedef struct { int Count; // number of keys stored in the current node ItemType Key[3]; // array to hold the 3 keys [4]; long Branch[4]; // array of fake pointers (record numbers) } NodeType;
  • 3. Order & Key of a B-Tree The following is an example of a B-tree of order 5. This means that (other than the root node) all internal nodes have at least 3 children (and hence at least 2 keys). Of course, the maximum number of children that a node can have is 5 (so that 4 is the maximum number of keys). In practice B-trees usually have orders a lot bigger than 5. The first row in each node shows the keys, while the second row shows the pointers to the child nodes
  • 4. Height of B-Tree  If n ≥ 1, then for any n-key B-tree T of height h and minimum degree t ≥ 2, h logt (n 1)/2  Height of the B-Tree with n keys is important as it bound the number of disk accesses.  The height of the tree is maximum when each node has minimum number of the subtree pointers, q m / 2 .  Note:If number of nodes in B-tree equal 2,000,000 (2 million) and m=200 then maximum height of B-tree is 3, where as the binary tree would be of height 20.
  • 5. Search in a B-Tree  Search in a B-tree is similar to the search in BST except that in B- tree we make a multiway branching decision instead of binary branching in BST. 25 62 12 19 32 39 73 84 3 5 15 17 21 23 30 31 34 37 45 51 69 71 75 79 90 94 Search key 71
  • 6. B-Tree Insert Operation  Insertion in B-tree is more complicated than in BST.  In BST, the keys are added in top down fashion resulting in an unbalanced tree.  B-tree is built bottom up, the keys are added in the leaf node, if the leaf node is full another node is created, keys are evenly distributed and middle key is promoted to the parent. If parent is full, the process is repeated.  B-tree can also be built in top down fashion using pre-splitting technique.
  • 7. Basic Idea : Insertion Find position for the key in the appropriate leaf node Insert key in order Is node and adjust pointer No full ? yes Split node: If parent is full • Create a new node • Move half of the keys from the full node to the new node and adjust pointers • Promote the median key (before split) to the parent Split guarantees that each node has m/ 2 1 keys.
  • 8. Cases in B-Tree Insert Operation  In B-tree insertion we have the following cases: ◦ Case 1: The leaf node has room for the new key. ◦ Case 2: The leaf in which key is to be placed is full.  This case can lead to the increase in tree height.
  • 9. B-Tree Insert Operation  Case 1: The leaf node has room for the new key. Find appropriate leaf Insert 3 node for key 3 3 10 25 5 8 14 19 20 23 32 38 Insert 3 in order
  • 10. B-Tree Insert Operation  Case 2: The leaf in which key is to be placed is full. Find appropriate leaf Insert 16 node for key 16 16 10 25 19 3 5 8 14 19 20 23 32 38 No room for key 16 in leaf node Insert key 19 in parent node in order Move median key 19 up and Split node: create a new node and move keys to the new node. 14 16 20 23 19
  • 11. B-Tree Insert Operation  Case 2: The leaf in which key is to be placed is full and this lead to the increase in tree height. 45 55 67 81
  • 12. B-Tree Insert Operation  Case 2: The height of the tree increases. Insert 16 No room for 27 in parent, Split node Insert 27 in parent in order 55 16 45 55 67 81 55 No room for 19 in parent, Split parent node 48 52 57 61 72 77 86 92 13 27 19 27 33 38 3 3 4 5 5 7 3 3 4 5 5 7 3 3 4 5 5 7 3 3 4 5 5 7 2 8 7 1 9 5 2 8 7 1 9 5 2 8 7 1 9 5 2 8 7 1 9 5 9 12 14 19 20 23 29 31 35 36 41 42 Insert 19 in parent node in order No room for key 16, Move median key 19 up & Split node 19 14 16 20 23
  • 13. B-Tree Delete Operation  Deletion is analogous to insertion, but a little more complicated.  Two major cases ◦ Case 1: Deletion from leaf node ◦ Case 2: Deletion from non-leaf node  Apply delete by copy technique used in BST, this will reduce this case to case 1.  In delete by copy, the key to be deleted is replaced by the largest key in the right subtree or smallest in left subtree (which is always a leaf).
  • 14. B-Tree Delete Operation  Leaf node deletion cases: ◦ After deletion node is at least half full. ◦ After deletion underflow occurs  Redistribute: if number of keys in siblings > 2 . m 1  Merge nodes if number of keys in siblings < m 2 1 .  Merging leads to decrease in tree height.
  • 15. B-Tree Delete Operation  After deletion node is at least half full. (inverse of insertion case 1) Search key 3 10 25 3 5 8 14 19 32 38 40 45 Key found, delete key 3. Move others keys in the node to eliminate the gap.
  • 16. B-Tree Delete Operation  Underflow occurs, evenly redistribute the keys if left or right sibling has keys . m/ 2 1 Search key Delete 14 14 10 25 5 8 14 19 32 38 40 45 Underflow occurs, evenly redistribute keys in the underflow node, in its sibling and the separator key.
  • 17. B-Tree Delete Operation  Underflow occurs and the keys in the left & right sibling are m / 2 1 . Merge the underflow node and a sibling. Delete 25 Move separator key down. Move the keys to underflow 10 32 node and discard the sibling. 5 8 19 25 38 40 Underflow occurs, merge nodes.
  • 18. B-Tree Delete Operation  Underflow occurs, height decreases after merging. Delete 21 70 Underflow occurs, merge nodes 8 32 79 85 3 5 21 27 47 66 73 75 78 81 83 88 90 92 Underflow occurs, merge nodes by moving separator key and the keys in sibling node to the underflow node.
  • 19. B-Tree V/s Binary Tree Advantages  Efficient in real life problems where number of records is very large (i.e. large datasets)  Frees up RAM as all nodes located on secondary memory  B Tree reduces depth of the tree hence, desired record is located faster Disadvantages  Decision process at each node is more complicated in a B-tree  A sophisticated program is required to execute the operations in a B-tree Fig. Comparison of linear growth rate vs. logarithmic growth rate

Editor's Notes

  1. A B-tree is a specialized multiway tree designed especially for use on disk. In a B-tree each node may contain a large number of keys. The number of subtrees of each node, then, may also be large. A B-tree is designed to branch out in this large number of directions and to contain a lot of keys in each node so that the height of the tree is relatively small. This means that only a small number of nodes must be read from disk to retrieve an item. The goal is to get fast access to the data, and with disk drives this means reading a very small number of records. Note that a large node size (with lots of keys in the node) also fits with the fact that with a disk drive one can usually read a fair amount of data at once.