SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 305
DATA MIGRATION SYSTEM IN HETEROGENEOUS DATABASE
Shashikant Patel1
, Sagar Wakchaure2
, Mahendra Pingale3
, Saba Siraj4
1, 2, 3, 4
IOK-COE, Pune University, India
Abstract
With information becoming an increasingly valuable corporate asset, today's IT organizations need the right tools to store, manage,
and move that information in the most reliable and cost efficient manner. As part of an Information Lifecycle Management (ILM) best-
practices strategy, organizations require innovative solutions for migrating data between storage systems, especially in heterogeneous
environments.
To support this need, we as planed to design a powerful tool that enables affordable, high- performance data migration in a wide
range of storage environments. This project is the unique challenges of data migration in dynamic IT environments and the key
business advantages that we have designed to provide over traditional tools used for migration.
Keywords: - Data Migration, Database, Design.
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
There are data migrated in the old system manually. The cost
and error ratio of these approach are relatively high.
Typically, these data are those necessary for the new system
while the old systems cannot provide.
A "Database Migrator" is usually developed for individuals
and organizations to save time for converting to a new
database if a database already exists. Instead of creating all the
tables etc. of the already existing database, one can simply use
the software to convert it into new database, if required. It can
also be used by organizations that deal with complex data
import, export and migration issues. After all, importing,
exporting or migrating data between different sources is very
complicated and time consuming especially if these data
sources store data in different formats.
2. LITERATURE REVIEW
Issues concerning the transference of data from existing
databases to other applications are discussed. The process of
transferring data is called data migration, and it is divided into
two processes extracting data from existing systems in the
form of an extracted file, and loading data from the extracted
file into the new application. The new application usually
requires data in different formats, and so transformation of
data is generally needed. Moreover, the new application
frequently requires data from more than one source database
system, so integration of data is necessary in the migration
process.
3. SYSTEM ARCHITECTURE
Fig 1: System Architecture
Step 1 - The user is provided with the login facility. The user
will first enter its username and password which are encrypted
in our coding. The user’s entered information is validated.
Step 2 - The user is then asked to select the source database
which is to be migrated. The source database consists of
Access, SQL Server and Oracle. After selecting the source
database the user has to fill the details of the selected source
database to create the connection.
Step 3 - After the connection is tested the user is asked to
select the destination database to which the migration will take
place. After selecting the destination database the user has to
fill the details of the selected destination database to create the
connection.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 306
Step 4 - The user is asked to select the tables, columns of the
table, views which are to be migrated.
Step 5 - the user is also provided with the facility to select
either the schema of the table or rows of the table along with
the constraints which are applied to the tables.
Step 6 - Click start migration button to start the migration.
After the complete and successful migration of source
database to destination database it displays the status report of
the complete migration process.
4. OBJECTIVES
1) Migration of source databases schema to the destination
database.
2) Then follows the migration of tables to the destination
database.
3) And then it is topped by the actual migration of data from
source to destination database.
4) To prompt the user to select the source database and
destination database. Connections for source and destination
are tested.
5) Tree view structure is designed to enable the user to select
and deselect tables, views for migration from source structure
to the target structure.
6) This form will display a summary of all the selected items.
User is allowed to select constraints to be applied such as
primary key, foreign key and unique key.
5. METHODOLOGY
In this approach, following factors that affect the Component
Selection Efforts have been proposed.
Portability: This factor is defined as the ability of a
component to be transferred from on environment to another
with little modifications, if required.
Functionality: Functionality of a component depends upon
the number of functions and their properties in these functions.
Security: The primary goals of software security are the
preservation of the confidentiality, integrity, and availability
of the information assets and resources that the software
creates, stores, processes, or transmit, including the executing
programs themselves
6. SCOPE
The purpose of the project keeps the scope of project limited
to following categories.
They are:
1) The initial part deals with conventional migration keeping
in mind i.e. we strictly adhere to the definition that the source
of data to be migrated is a database and the destination is also
a database .While doing so the only part that undergoes any
visible change is the structure of the source and destination
database while all the data, attributes, table name etc remains
unaffected..
2) The next part deals with migrating Tables applying
constraints such as primary key, foreign key, unique key,
index key and check constraints. Migrations of views are also
supported.
3) We have also provided facility for selecting and deselecting
the fields of a table or an entire table itself for migration. The
mapping rules have been defined in an MS Access which is
referenced by our migrator tool to map the various data types
in the process of migration. After the migration has occurred a
status report will be displayed which will indicate if the table
schema is migrated, records are inserted, constraints like
primary key, foreign key, unique key, check constraints have
been migrated successfully or pending or failed.
7. ADVANTAGES OF PROPOSED SYSTEM
 Security: The application is such that it allows the
authorized user.
 Time efficient: Migrating every record manually
would take quite a lot of time but using a migration
tool would take the application few seconds to
migrate from the specified source to the specified
destination.
 Flexible: The inherent nature of this application is
flexible. The initial concept of data migration that we
have implemented on typical case of Access to Sql
can be further extended to any source database and to
any destination database.
 Interactive: The highly interactive nature of this
application ensures that minimum special training is
required to handle it.
8. FUTURE WORK
 Scheduling :
One can migrate the data at any time. If you want to
migrate the data at 5 o’clock then you can set the time.
 Migration can be done in small area network :
One can migrate the data in LAN or Wi-Fi.
9. CONCLUSIONS
We know that various organizations use different type of
databases to store their user’s information. If we want to use
the existing databases of such organizations then we have to
convert the database in the format which is compactable to our
application. This database migration is achieved by database
migration tool. A Database Migration Suite is usually
developed for individuals and organizations to save time for
converting to a new database if a database already exists. The
purpose of our project is to migrate data from an existing
database to another database. Our migrator tool provides
source databases as MS Access, destination databases as SQL
Server and Oracle. We also have implemented migration from
SQL Server to Oracle and vice versa.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 307
REFERENCES
[1]. Lixian Xing, Yanhong Li, "Design and application of data
migration system in heterogeneous database" in 2010
International Forum on Information Technology and
applications.
[2]. "DATA MIGRATION BEST PRACTICES" App Global
Services January 2006.
[3]. Microsoft CRM Data Migration Framework White Paper
by Parul Manek, Program Manager Published: April 2003.
[4]. Jaiwei Han, Michelinne Kamber, "Data Mining: Concepts
and Techniques."
[5]. Manjunath T.N, Ravindra S Hegadi, Ravikumar G K."A
Survey on Multimedia Data Mining and Its Relevance Today"
IJCSNS Vol. 10 No. 11-Nov 2010, pp. 165-170.
[6]. Manjunath T.N, Ravindra S Hegadi, Ravikumar G K.
"Analysis of Data Quality Aspects in at warehouse Systems",
(IJCSIT)-Jan-2011.
[7]. DATA Quality in health Care Data warehouse
Environments Robert L. Leitheiser, University of Wisconsin
Whitepaper.
[8]. Potts, William J. E., (1997), Data Mining Using SAS
Enterprise Miner Software. Cary, North Carolina: SAS
Institute.

Weitere ähnliche Inhalte

Was ist angesagt?

Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a survey
eSAT Publishing House
 

Was ist angesagt? (17)

Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
Bq36404412
Bq36404412Bq36404412
Bq36404412
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a survey
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in CloudMaintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud
 
N1803017478
N1803017478N1803017478
N1803017478
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
20120140506012
2012014050601220120140506012
20120140506012
 
F1803013034
F1803013034F1803013034
F1803013034
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
 
Active database system
Active database systemActive database system
Active database system
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
 
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENTINTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 

Andere mochten auch

Research Framework for the Cape Town Stadium V3
Research Framework for the Cape Town Stadium V3Research Framework for the Cape Town Stadium V3
Research Framework for the Cape Town Stadium V3
Roslyn Bristow
 
Deadlock detection in distributed systems
Deadlock detection in distributed systemsDeadlock detection in distributed systems
Deadlock detection in distributed systems
Reza Ramezani
 

Andere mochten auch (18)

Process Migration in Heterogeneous Systems
Process Migration in Heterogeneous SystemsProcess Migration in Heterogeneous Systems
Process Migration in Heterogeneous Systems
 
How Go and Neo4J enabled the FT to deliver at speed
How Go and Neo4J enabled the FT to deliver at speedHow Go and Neo4J enabled the FT to deliver at speed
How Go and Neo4J enabled the FT to deliver at speed
 
Marketing Report for AEK FC
Marketing Report for AEK FCMarketing Report for AEK FC
Marketing Report for AEK FC
 
Megha ladha
Megha  ladhaMegha  ladha
Megha ladha
 
Centenario de la escuela de telegrafía.
Centenario de la escuela de telegrafía.Centenario de la escuela de telegrafía.
Centenario de la escuela de telegrafía.
 
Coursework NBA
Coursework NBACoursework NBA
Coursework NBA
 
Explicit Semantics in Graph DBs Driving Digital Transformation With Neo4j
Explicit Semantics in Graph DBs Driving Digital Transformation With Neo4jExplicit Semantics in Graph DBs Driving Digital Transformation With Neo4j
Explicit Semantics in Graph DBs Driving Digital Transformation With Neo4j
 
Enterprise Integration of Disruptive Technologies
Enterprise Integration of Disruptive TechnologiesEnterprise Integration of Disruptive Technologies
Enterprise Integration of Disruptive Technologies
 
Introduction
IntroductionIntroduction
Introduction
 
5. Haematology
5. Haematology5. Haematology
5. Haematology
 
6. inflammation
6. inflammation6. inflammation
6. inflammation
 
Research Framework for the Cape Town Stadium V3
Research Framework for the Cape Town Stadium V3Research Framework for the Cape Town Stadium V3
Research Framework for the Cape Town Stadium V3
 
Deadlock detection
Deadlock detectionDeadlock detection
Deadlock detection
 
Deadlock detection in distributed systems
Deadlock detection in distributed systemsDeadlock detection in distributed systems
Deadlock detection in distributed systems
 
Key factors of attractiveness for Airport Areas and the special role of human...
Key factors of attractiveness for Airport Areas and the special role of human...Key factors of attractiveness for Airport Areas and the special role of human...
Key factors of attractiveness for Airport Areas and the special role of human...
 
Lecture 3 - KNOWLEDGE CREATION AND KNOWLEDGE MANAGEMENT ARCHITECTURE
Lecture 3 - KNOWLEDGE CREATION AND KNOWLEDGE MANAGEMENT ARCHITECTURELecture 3 - KNOWLEDGE CREATION AND KNOWLEDGE MANAGEMENT ARCHITECTURE
Lecture 3 - KNOWLEDGE CREATION AND KNOWLEDGE MANAGEMENT ARCHITECTURE
 
Deadlock
DeadlockDeadlock
Deadlock
 
Deadlock ppt
Deadlock ppt Deadlock ppt
Deadlock ppt
 

Ähnlich wie Data migration system in heterogeneous database

Improving resource utilization in infrastructural cloud
Improving resource utilization in infrastructural cloudImproving resource utilization in infrastructural cloud
Improving resource utilization in infrastructural cloud
eSAT Journals
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
eSAT Publishing House
 

Ähnlich wie Data migration system in heterogeneous database (20)

Heterogeneous data transfer and loader
Heterogeneous data transfer and loaderHeterogeneous data transfer and loader
Heterogeneous data transfer and loader
 
Heterogeneous data transfer and loader
Heterogeneous data transfer and loaderHeterogeneous data transfer and loader
Heterogeneous data transfer and loader
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Improving resource utilization in infrastructural cloud
Improving resource utilization in infrastructural cloudImproving resource utilization in infrastructural cloud
Improving resource utilization in infrastructural cloud
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester Synopsis
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
Project scheduler doc
Project scheduler docProject scheduler doc
Project scheduler doc
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
A Reconfigurable Component-Based Problem Solving Environment
A Reconfigurable Component-Based Problem Solving EnvironmentA Reconfigurable Component-Based Problem Solving Environment
A Reconfigurable Component-Based Problem Solving Environment
 
Survey of streaming data warehouse update scheduling
Survey of streaming data warehouse update schedulingSurvey of streaming data warehouse update scheduling
Survey of streaming data warehouse update scheduling
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
IRJET - Health Medicare Data using Tweets in Twitter
IRJET - Health Medicare Data using Tweets in TwitterIRJET - Health Medicare Data using Tweets in Twitter
IRJET - Health Medicare Data using Tweets in Twitter
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 

Mehr von eSAT Journals

Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 

Mehr von eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Kürzlich hochgeladen

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Kürzlich hochgeladen (20)

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

Data migration system in heterogeneous database

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 305 DATA MIGRATION SYSTEM IN HETEROGENEOUS DATABASE Shashikant Patel1 , Sagar Wakchaure2 , Mahendra Pingale3 , Saba Siraj4 1, 2, 3, 4 IOK-COE, Pune University, India Abstract With information becoming an increasingly valuable corporate asset, today's IT organizations need the right tools to store, manage, and move that information in the most reliable and cost efficient manner. As part of an Information Lifecycle Management (ILM) best- practices strategy, organizations require innovative solutions for migrating data between storage systems, especially in heterogeneous environments. To support this need, we as planed to design a powerful tool that enables affordable, high- performance data migration in a wide range of storage environments. This project is the unique challenges of data migration in dynamic IT environments and the key business advantages that we have designed to provide over traditional tools used for migration. Keywords: - Data Migration, Database, Design. ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION There are data migrated in the old system manually. The cost and error ratio of these approach are relatively high. Typically, these data are those necessary for the new system while the old systems cannot provide. A "Database Migrator" is usually developed for individuals and organizations to save time for converting to a new database if a database already exists. Instead of creating all the tables etc. of the already existing database, one can simply use the software to convert it into new database, if required. It can also be used by organizations that deal with complex data import, export and migration issues. After all, importing, exporting or migrating data between different sources is very complicated and time consuming especially if these data sources store data in different formats. 2. LITERATURE REVIEW Issues concerning the transference of data from existing databases to other applications are discussed. The process of transferring data is called data migration, and it is divided into two processes extracting data from existing systems in the form of an extracted file, and loading data from the extracted file into the new application. The new application usually requires data in different formats, and so transformation of data is generally needed. Moreover, the new application frequently requires data from more than one source database system, so integration of data is necessary in the migration process. 3. SYSTEM ARCHITECTURE Fig 1: System Architecture Step 1 - The user is provided with the login facility. The user will first enter its username and password which are encrypted in our coding. The user’s entered information is validated. Step 2 - The user is then asked to select the source database which is to be migrated. The source database consists of Access, SQL Server and Oracle. After selecting the source database the user has to fill the details of the selected source database to create the connection. Step 3 - After the connection is tested the user is asked to select the destination database to which the migration will take place. After selecting the destination database the user has to fill the details of the selected destination database to create the connection.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 306 Step 4 - The user is asked to select the tables, columns of the table, views which are to be migrated. Step 5 - the user is also provided with the facility to select either the schema of the table or rows of the table along with the constraints which are applied to the tables. Step 6 - Click start migration button to start the migration. After the complete and successful migration of source database to destination database it displays the status report of the complete migration process. 4. OBJECTIVES 1) Migration of source databases schema to the destination database. 2) Then follows the migration of tables to the destination database. 3) And then it is topped by the actual migration of data from source to destination database. 4) To prompt the user to select the source database and destination database. Connections for source and destination are tested. 5) Tree view structure is designed to enable the user to select and deselect tables, views for migration from source structure to the target structure. 6) This form will display a summary of all the selected items. User is allowed to select constraints to be applied such as primary key, foreign key and unique key. 5. METHODOLOGY In this approach, following factors that affect the Component Selection Efforts have been proposed. Portability: This factor is defined as the ability of a component to be transferred from on environment to another with little modifications, if required. Functionality: Functionality of a component depends upon the number of functions and their properties in these functions. Security: The primary goals of software security are the preservation of the confidentiality, integrity, and availability of the information assets and resources that the software creates, stores, processes, or transmit, including the executing programs themselves 6. SCOPE The purpose of the project keeps the scope of project limited to following categories. They are: 1) The initial part deals with conventional migration keeping in mind i.e. we strictly adhere to the definition that the source of data to be migrated is a database and the destination is also a database .While doing so the only part that undergoes any visible change is the structure of the source and destination database while all the data, attributes, table name etc remains unaffected.. 2) The next part deals with migrating Tables applying constraints such as primary key, foreign key, unique key, index key and check constraints. Migrations of views are also supported. 3) We have also provided facility for selecting and deselecting the fields of a table or an entire table itself for migration. The mapping rules have been defined in an MS Access which is referenced by our migrator tool to map the various data types in the process of migration. After the migration has occurred a status report will be displayed which will indicate if the table schema is migrated, records are inserted, constraints like primary key, foreign key, unique key, check constraints have been migrated successfully or pending or failed. 7. ADVANTAGES OF PROPOSED SYSTEM  Security: The application is such that it allows the authorized user.  Time efficient: Migrating every record manually would take quite a lot of time but using a migration tool would take the application few seconds to migrate from the specified source to the specified destination.  Flexible: The inherent nature of this application is flexible. The initial concept of data migration that we have implemented on typical case of Access to Sql can be further extended to any source database and to any destination database.  Interactive: The highly interactive nature of this application ensures that minimum special training is required to handle it. 8. FUTURE WORK  Scheduling : One can migrate the data at any time. If you want to migrate the data at 5 o’clock then you can set the time.  Migration can be done in small area network : One can migrate the data in LAN or Wi-Fi. 9. CONCLUSIONS We know that various organizations use different type of databases to store their user’s information. If we want to use the existing databases of such organizations then we have to convert the database in the format which is compactable to our application. This database migration is achieved by database migration tool. A Database Migration Suite is usually developed for individuals and organizations to save time for converting to a new database if a database already exists. The purpose of our project is to migrate data from an existing database to another database. Our migrator tool provides source databases as MS Access, destination databases as SQL Server and Oracle. We also have implemented migration from SQL Server to Oracle and vice versa.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 307 REFERENCES [1]. Lixian Xing, Yanhong Li, "Design and application of data migration system in heterogeneous database" in 2010 International Forum on Information Technology and applications. [2]. "DATA MIGRATION BEST PRACTICES" App Global Services January 2006. [3]. Microsoft CRM Data Migration Framework White Paper by Parul Manek, Program Manager Published: April 2003. [4]. Jaiwei Han, Michelinne Kamber, "Data Mining: Concepts and Techniques." [5]. Manjunath T.N, Ravindra S Hegadi, Ravikumar G K."A Survey on Multimedia Data Mining and Its Relevance Today" IJCSNS Vol. 10 No. 11-Nov 2010, pp. 165-170. [6]. Manjunath T.N, Ravindra S Hegadi, Ravikumar G K. "Analysis of Data Quality Aspects in at warehouse Systems", (IJCSIT)-Jan-2011. [7]. DATA Quality in health Care Data warehouse Environments Robert L. Leitheiser, University of Wisconsin Whitepaper. [8]. Potts, William J. E., (1997), Data Mining Using SAS Enterprise Miner Software. Cary, North Carolina: SAS Institute.