SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Subject:- Discrete Mathematics.
CSA-CC-125
Topic:-B-Tree
Presented To:-
Dr. Girish Kumar Patel.
Presented BY:-
Vishal Singh.
Y18271026
(MCA : 1st Sem.)
Introduction
• B-Tree is a self-balancing search tree.
• B-Tree was developed in the year of 1972 by Bayer and
McCreight with the name Height Balanced m-way Search Tree.
• Later it was Named as B-Tree.
• They were designed to work well on Direct Access secondary storage
devices (magnetic disks).
• B-trees (and variants like B+ and B* trees ) are widely used in
database systems.
Need
• Unlike self-balancing binary search trees, it is optimized for systems
that read and write large blocks of data.
• It is most commonly used in database and file systems.
• Which is use to store huge size of data.
Algorithm
• Insertion Algorithm
• B-tree requires first traversal in B-tree.
• Through traversal it will find that key to be inserted is
already existing or not.
• If key does not exist in trees then through traversal it
will reach leaf node.
We have two cases for inserting:-
1.Node is not full.
2.Node is already full.
Insertion Algorithm
Example:-Let us take a list of key and create a B-tree.
10,20,50,60,40,80,100
Solution:
1.Insert 10
2.Insert 20
3.Insert 50
4.Insert 60
10
10 20 50
10 20 50 60
10 20
Insertion Algorithm
5.Insert 40
6.Insert 80 7.Insert 100
40
40
10 20
10 20 50 60
50 60 80
40
10 20 50 60 80 10050 60 80 100
Algorithm
• Deletion Algorithm
• Deletion of key also requires first traversal in B-tree.
• After reaching on particular node, two cases may occur:
1.Node is leaf
node.
2.Node is non-
leaf node.
Deletion Algorithm
Delete 40
40
10 20 50 60 80 100
60 80 100
50
10 20
Application
• Huge collection of records into a file structure.
• Any record in it can be searched very efficiently
• Insertion, deletion and modification operations can be carried out
perfectly and efficiently.
Reference
• Data structure using c (Udit Agrawal)
• https://www.researchgate.net/publication/210381551_Analysis_of_B
-tree_data_structure_and_its_usage_in_computer_forensics.
• https://pdfs.semanticscholar.org/presentation/2fd4/2646536d516d4
cb31cf2ade30f95cb3b6d5e.pdf.
B tree

Weitere ähnliche Inhalte

Was ist angesagt?

Introductiont To Aray,Tree,Stack, Queue
Introductiont To Aray,Tree,Stack, QueueIntroductiont To Aray,Tree,Stack, Queue
Introductiont To Aray,Tree,Stack, Queue
Ghaffar Khan
 

Was ist angesagt? (17)

Introduction to data structures (ss)
Introduction to data structures (ss)Introduction to data structures (ss)
Introduction to data structures (ss)
 
Ds chapter 2
Ds chapter 2Ds chapter 2
Ds chapter 2
 
Data structure (basics)
Data structure (basics)Data structure (basics)
Data structure (basics)
 
Array
ArrayArray
Array
 
Arrays in C
Arrays in CArrays in C
Arrays in C
 
Arrays declartion and initialization
Arrays declartion and initializationArrays declartion and initialization
Arrays declartion and initialization
 
Introduction of Data Structure
Introduction of Data StructureIntroduction of Data Structure
Introduction of Data Structure
 
Arrays accessing using for loops
Arrays accessing using for loopsArrays accessing using for loops
Arrays accessing using for loops
 
Data structure
Data  structureData  structure
Data structure
 
Data structures Lecture no.3
Data structures Lecture no.3Data structures Lecture no.3
Data structures Lecture no.3
 
Data structures Lecture no. 2
Data structures Lecture no. 2Data structures Lecture no. 2
Data structures Lecture no. 2
 
Data structures lectures no 1
Data structures lectures no 1Data structures lectures no 1
Data structures lectures no 1
 
Unit 1 Basic concepts to DS
Unit 1 Basic concepts to DSUnit 1 Basic concepts to DS
Unit 1 Basic concepts to DS
 
Lecture02 computer applicationsie1_dratifshahzad
Lecture02 computer applicationsie1_dratifshahzadLecture02 computer applicationsie1_dratifshahzad
Lecture02 computer applicationsie1_dratifshahzad
 
Introductiont To Aray,Tree,Stack, Queue
Introductiont To Aray,Tree,Stack, QueueIntroductiont To Aray,Tree,Stack, Queue
Introductiont To Aray,Tree,Stack, Queue
 
data structure
data structuredata structure
data structure
 
Over view of data structures
Over view of data structuresOver view of data structures
Over view of data structures
 

Ähnlich wie B tree

2011 06-sq lite-forensics
2011 06-sq lite-forensics2011 06-sq lite-forensics
2011 06-sq lite-forensics
viaForensics
 
Data Privacy at Scale
Data Privacy at ScaleData Privacy at Scale
Data Privacy at Scale
DataWorks Summit
 
Bender kuszmaul tutorial-xldb12
Bender kuszmaul tutorial-xldb12Bender kuszmaul tutorial-xldb12
Bender kuszmaul tutorial-xldb12
Atner Yegorov
 
Data Structures and Algorithms for Big Databases
Data Structures and Algorithms for Big DatabasesData Structures and Algorithms for Big Databases
Data Structures and Algorithms for Big Databases
omnidba
 
Computer Hardware | 3B
Computer Hardware | 3BComputer Hardware | 3B
Computer Hardware | 3B
CMDLMS
 

Ähnlich wie B tree (20)

lecture1.ppt
lecture1.pptlecture1.ppt
lecture1.ppt
 
Mc0088 data mining
Mc0088  data miningMc0088  data mining
Mc0088 data mining
 
Probabilistic Data Structures (Edmonton Data Science Meetup, March 2018)
Probabilistic Data Structures (Edmonton Data Science Meetup, March 2018)Probabilistic Data Structures (Edmonton Data Science Meetup, March 2018)
Probabilistic Data Structures (Edmonton Data Science Meetup, March 2018)
 
2011 06-sq lite-forensics
2011 06-sq lite-forensics2011 06-sq lite-forensics
2011 06-sq lite-forensics
 
Data Privacy at Scale
Data Privacy at ScaleData Privacy at Scale
Data Privacy at Scale
 
Mc0088 data mining
Mc0088  data miningMc0088  data mining
Mc0088 data mining
 
rdbms-notes
rdbms-notesrdbms-notes
rdbms-notes
 
A schema generation approach for column oriented no sql data stores
A schema generation approach for column oriented no sql data storesA schema generation approach for column oriented no sql data stores
A schema generation approach for column oriented no sql data stores
 
Bt0066
Bt0066Bt0066
Bt0066
 
B T0066
B T0066B T0066
B T0066
 
7 Database Mistakes YOU Are Making -- Linuxfest Northwest 2019
7 Database Mistakes YOU Are Making -- Linuxfest Northwest 20197 Database Mistakes YOU Are Making -- Linuxfest Northwest 2019
7 Database Mistakes YOU Are Making -- Linuxfest Northwest 2019
 
Bender kuszmaul tutorial-xldb12
Bender kuszmaul tutorial-xldb12Bender kuszmaul tutorial-xldb12
Bender kuszmaul tutorial-xldb12
 
Data Structures and Algorithms for Big Databases
Data Structures and Algorithms for Big DatabasesData Structures and Algorithms for Big Databases
Data Structures and Algorithms for Big Databases
 
Computer Hardware | 3B
Computer Hardware | 3BComputer Hardware | 3B
Computer Hardware | 3B
 
Computer Hardware - Lecture B
Computer Hardware - Lecture BComputer Hardware - Lecture B
Computer Hardware - Lecture B
 
dwdm unit 1.ppt
dwdm unit 1.pptdwdm unit 1.ppt
dwdm unit 1.ppt
 
Data Structures and Algorithm - Week 4 - Trees, Binary Trees
Data Structures and Algorithm - Week 4 - Trees, Binary TreesData Structures and Algorithm - Week 4 - Trees, Binary Trees
Data Structures and Algorithm - Week 4 - Trees, Binary Trees
 
Advanced c c++
Advanced c c++Advanced c c++
Advanced c c++
 
Css trees
Css treesCss trees
Css trees
 
Infobright Column-Oriented Analytical Database Engine
Infobright Column-Oriented Analytical Database EngineInfobright Column-Oriented Analytical Database Engine
Infobright Column-Oriented Analytical Database Engine
 

Kürzlich hochgeladen

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 

Kürzlich hochgeladen (20)

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 

B tree

  • 1. Subject:- Discrete Mathematics. CSA-CC-125 Topic:-B-Tree Presented To:- Dr. Girish Kumar Patel. Presented BY:- Vishal Singh. Y18271026 (MCA : 1st Sem.)
  • 2. Introduction • B-Tree is a self-balancing search tree. • B-Tree was developed in the year of 1972 by Bayer and McCreight with the name Height Balanced m-way Search Tree. • Later it was Named as B-Tree. • They were designed to work well on Direct Access secondary storage devices (magnetic disks). • B-trees (and variants like B+ and B* trees ) are widely used in database systems.
  • 3. Need • Unlike self-balancing binary search trees, it is optimized for systems that read and write large blocks of data. • It is most commonly used in database and file systems. • Which is use to store huge size of data.
  • 4. Algorithm • Insertion Algorithm • B-tree requires first traversal in B-tree. • Through traversal it will find that key to be inserted is already existing or not. • If key does not exist in trees then through traversal it will reach leaf node. We have two cases for inserting:- 1.Node is not full. 2.Node is already full.
  • 5. Insertion Algorithm Example:-Let us take a list of key and create a B-tree. 10,20,50,60,40,80,100 Solution: 1.Insert 10 2.Insert 20 3.Insert 50 4.Insert 60 10 10 20 50 10 20 50 60 10 20
  • 6. Insertion Algorithm 5.Insert 40 6.Insert 80 7.Insert 100 40 40 10 20 10 20 50 60 50 60 80 40 10 20 50 60 80 10050 60 80 100
  • 7. Algorithm • Deletion Algorithm • Deletion of key also requires first traversal in B-tree. • After reaching on particular node, two cases may occur: 1.Node is leaf node. 2.Node is non- leaf node.
  • 8. Deletion Algorithm Delete 40 40 10 20 50 60 80 100 60 80 100 50 10 20
  • 9. Application • Huge collection of records into a file structure. • Any record in it can be searched very efficiently • Insertion, deletion and modification operations can be carried out perfectly and efficiently.
  • 10. Reference • Data structure using c (Udit Agrawal) • https://www.researchgate.net/publication/210381551_Analysis_of_B -tree_data_structure_and_its_usage_in_computer_forensics. • https://pdfs.semanticscholar.org/presentation/2fd4/2646536d516d4 cb31cf2ade30f95cb3b6d5e.pdf.