SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 305
DATA MIGRATION SYSTEM IN HETEROGENEOUS DATABASE
Shashikant Patel1
, Sagar Wakchaure2
, Mahendra Pingale3
, Saba Siraj4
1, 2, 3, 4
IOK-COE, Pune University, India
Abstract
With information becoming an increasingly valuable corporate asset, today's IT organizations need the right tools to store, manage,
and move that information in the most reliable and cost efficient manner. As part of an Information Lifecycle Management (ILM) best-
practices strategy, organizations require innovative solutions for migrating data between storage systems, especially in heterogeneous
environments.
To support this need, we as planed to design a powerful tool that enables affordable, high- performance data migration in a wide
range of storage environments. This project is the unique challenges of data migration in dynamic IT environments and the key
business advantages that we have designed to provide over traditional tools used for migration.
Keywords: - Data Migration, Database, Design.
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
There are data migrated in the old system manually. The cost
and error ratio of these approach are relatively high.
Typically, these data are those necessary for the new system
while the old systems cannot provide.
A "Database Migrator" is usually developed for individuals
and organizations to save time for converting to a new
database if a database already exists. Instead of creating all the
tables etc. of the already existing database, one can simply use
the software to convert it into new database, if required. It can
also be used by organizations that deal with complex data
import, export and migration issues. After all, importing,
exporting or migrating data between different sources is very
complicated and time consuming especially if these data
sources store data in different formats.
2. LITERATURE REVIEW
Issues concerning the transference of data from existing
databases to other applications are discussed. The process of
transferring data is called data migration, and it is divided into
two processes extracting data from existing systems in the
form of an extracted file, and loading data from the extracted
file into the new application. The new application usually
requires data in different formats, and so transformation of
data is generally needed. Moreover, the new application
frequently requires data from more than one source database
system, so integration of data is necessary in the migration
process.
3. SYSTEM ARCHITECTURE
Fig 1: System Architecture
Step 1 - The user is provided with the login facility. The user
will first enter its username and password which are encrypted
in our coding. The user’s entered information is validated.
Step 2 - The user is then asked to select the source database
which is to be migrated. The source database consists of
Access, SQL Server and Oracle. After selecting the source
database the user has to fill the details of the selected source
database to create the connection.
Step 3 - After the connection is tested the user is asked to
select the destination database to which the migration will take
place. After selecting the destination database the user has to
fill the details of the selected destination database to create the
connection.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 306
Step 4 - The user is asked to select the tables, columns of the
table, views which are to be migrated.
Step 5 - the user is also provided with the facility to select
either the schema of the table or rows of the table along with
the constraints which are applied to the tables.
Step 6 - Click start migration button to start the migration.
After the complete and successful migration of source
database to destination database it displays the status report of
the complete migration process.
4. OBJECTIVES
1) Migration of source databases schema to the destination
database.
2) Then follows the migration of tables to the destination
database.
3) And then it is topped by the actual migration of data from
source to destination database.
4) To prompt the user to select the source database and
destination database. Connections for source and destination
are tested.
5) Tree view structure is designed to enable the user to select
and deselect tables, views for migration from source structure
to the target structure.
6) This form will display a summary of all the selected items.
User is allowed to select constraints to be applied such as
primary key, foreign key and unique key.
5. METHODOLOGY
In this approach, following factors that affect the Component
Selection Efforts have been proposed.
Portability: This factor is defined as the ability of a
component to be transferred from on environment to another
with little modifications, if required.
Functionality: Functionality of a component depends upon
the number of functions and their properties in these functions.
Security: The primary goals of software security are the
preservation of the confidentiality, integrity, and availability
of the information assets and resources that the software
creates, stores, processes, or transmit, including the executing
programs themselves
6. SCOPE
The purpose of the project keeps the scope of project limited
to following categories.
They are:
1) The initial part deals with conventional migration keeping
in mind i.e. we strictly adhere to the definition that the source
of data to be migrated is a database and the destination is also
a database .While doing so the only part that undergoes any
visible change is the structure of the source and destination
database while all the data, attributes, table name etc remains
unaffected..
2) The next part deals with migrating Tables applying
constraints such as primary key, foreign key, unique key,
index key and check constraints. Migrations of views are also
supported.
3) We have also provided facility for selecting and deselecting
the fields of a table or an entire table itself for migration. The
mapping rules have been defined in an MS Access which is
referenced by our migrator tool to map the various data types
in the process of migration. After the migration has occurred a
status report will be displayed which will indicate if the table
schema is migrated, records are inserted, constraints like
primary key, foreign key, unique key, check constraints have
been migrated successfully or pending or failed.
7. ADVANTAGES OF PROPOSED SYSTEM
 Security: The application is such that it allows the
authorized user.
 Time efficient: Migrating every record manually
would take quite a lot of time but using a migration
tool would take the application few seconds to
migrate from the specified source to the specified
destination.
 Flexible: The inherent nature of this application is
flexible. The initial concept of data migration that we
have implemented on typical case of Access to Sql
can be further extended to any source database and to
any destination database.
 Interactive: The highly interactive nature of this
application ensures that minimum special training is
required to handle it.
8. FUTURE WORK
 Scheduling :
One can migrate the data at any time. If you want to
migrate the data at 5 o’clock then you can set the time.
 Migration can be done in small area network :
One can migrate the data in LAN or Wi-Fi.
9. CONCLUSIONS
We know that various organizations use different type of
databases to store their user’s information. If we want to use
the existing databases of such organizations then we have to
convert the database in the format which is compactable to our
application. This database migration is achieved by database
migration tool. A Database Migration Suite is usually
developed for individuals and organizations to save time for
converting to a new database if a database already exists. The
purpose of our project is to migrate data from an existing
database to another database. Our migrator tool provides
source databases as MS Access, destination databases as SQL
Server and Oracle. We also have implemented migration from
SQL Server to Oracle and vice versa.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 307
REFERENCES
[1]. Lixian Xing, Yanhong Li, "Design and application of data
migration system in heterogeneous database" in 2010
International Forum on Information Technology and
applications.
[2]. "DATA MIGRATION BEST PRACTICES" App Global
Services January 2006.
[3]. Microsoft CRM Data Migration Framework White Paper
by Parul Manek, Program Manager Published: April 2003.
[4]. Jaiwei Han, Michelinne Kamber, "Data Mining: Concepts
and Techniques."
[5]. Manjunath T.N, Ravindra S Hegadi, Ravikumar G K."A
Survey on Multimedia Data Mining and Its Relevance Today"
IJCSNS Vol. 10 No. 11-Nov 2010, pp. 165-170.
[6]. Manjunath T.N, Ravindra S Hegadi, Ravikumar G K.
"Analysis of Data Quality Aspects in at warehouse Systems",
(IJCSIT)-Jan-2011.
[7]. DATA Quality in health Care Data warehouse
Environments Robert L. Leitheiser, University of Wisconsin
Whitepaper.
[8]. Potts, William J. E., (1997), Data Mining Using SAS
Enterprise Miner Software. Cary, North Carolina: SAS
Institute.

Contenu connexe

Tendances

Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudSuraj Mehta
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud IJERA Editor
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyeSAT Publishing House
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in CloudMaintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloudacijjournal
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageeSAT Publishing House
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)IAESIJEECS
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET Journal
 
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENTINTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENTijccsa
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
 

Tendances (17)

Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
Bq36404412
Bq36404412Bq36404412
Bq36404412
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a survey
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in CloudMaintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud
 
N1803017478
N1803017478N1803017478
N1803017478
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
20120140506012
2012014050601220120140506012
20120140506012
 
F1803013034
F1803013034F1803013034
F1803013034
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
 
Active database system
Active database systemActive database system
Active database system
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
 
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENTINTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 

En vedette

Amazon Machine Learning #AWSLoft Berlin
Amazon Machine Learning #AWSLoft BerlinAmazon Machine Learning #AWSLoft Berlin
Amazon Machine Learning #AWSLoft BerlinAWS Germany
 
Masterclass Webinar: Amazon Elastic MapReduce (EMR)
Masterclass Webinar: Amazon Elastic MapReduce (EMR)Masterclass Webinar: Amazon Elastic MapReduce (EMR)
Masterclass Webinar: Amazon Elastic MapReduce (EMR)Amazon Web Services
 
AWS Webcast - Amazon Elastic Map Reduce Deep Dive and Best Practices
AWS Webcast - Amazon Elastic Map Reduce Deep Dive and Best PracticesAWS Webcast - Amazon Elastic Map Reduce Deep Dive and Best Practices
AWS Webcast - Amazon Elastic Map Reduce Deep Dive and Best PracticesAmazon Web Services
 
Deep Dive - Amazon Elastic MapReduce (EMR)
Deep Dive - Amazon Elastic MapReduce (EMR)Deep Dive - Amazon Elastic MapReduce (EMR)
Deep Dive - Amazon Elastic MapReduce (EMR)Amazon Web Services
 
Database migration simple, cross-engine and cross-platform migrations with ...
Database migration   simple, cross-engine and cross-platform migrations with ...Database migration   simple, cross-engine and cross-platform migrations with ...
Database migration simple, cross-engine and cross-platform migrations with ...Amazon Web Services
 
An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...eSAT Publishing House
 
An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...eSAT Publishing House
 
Best lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packetBest lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packeteSAT Publishing House
 
Design evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobileDesign evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobileeSAT Publishing House
 
Geopolymer concrete an eco friendly construction material
Geopolymer concrete an eco friendly construction materialGeopolymer concrete an eco friendly construction material
Geopolymer concrete an eco friendly construction materialeSAT Publishing House
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkeSAT Publishing House
 
Design features of a 5 tonne day multi – stage, intermittent drainage, conti...
Design features of a 5 tonne  day multi – stage, intermittent drainage, conti...Design features of a 5 tonne  day multi – stage, intermittent drainage, conti...
Design features of a 5 tonne day multi – stage, intermittent drainage, conti...eSAT Publishing House
 
Semicompatibility and fixed point theorem in fuzzy metric space using implici...
Semicompatibility and fixed point theorem in fuzzy metric space using implici...Semicompatibility and fixed point theorem in fuzzy metric space using implici...
Semicompatibility and fixed point theorem in fuzzy metric space using implici...eSAT Publishing House
 
Real time energy data acquisition and alarming system for monitoring power co...
Real time energy data acquisition and alarming system for monitoring power co...Real time energy data acquisition and alarming system for monitoring power co...
Real time energy data acquisition and alarming system for monitoring power co...eSAT Publishing House
 
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...Spatio temporal modeling of snow flake crystals using packard’s cellular auto...
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...eSAT Publishing House
 
Real time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case studyReal time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case studyeSAT Publishing House
 
Novel model for rural housing development
Novel model for rural housing developmentNovel model for rural housing development
Novel model for rural housing developmenteSAT Publishing House
 
Finite element analysis on temperature distribution in turning process using ...
Finite element analysis on temperature distribution in turning process using ...Finite element analysis on temperature distribution in turning process using ...
Finite element analysis on temperature distribution in turning process using ...eSAT Publishing House
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visualeSAT Publishing House
 

En vedette (20)

Amazon Machine Learning #AWSLoft Berlin
Amazon Machine Learning #AWSLoft BerlinAmazon Machine Learning #AWSLoft Berlin
Amazon Machine Learning #AWSLoft Berlin
 
Masterclass Webinar: Amazon Elastic MapReduce (EMR)
Masterclass Webinar: Amazon Elastic MapReduce (EMR)Masterclass Webinar: Amazon Elastic MapReduce (EMR)
Masterclass Webinar: Amazon Elastic MapReduce (EMR)
 
AWS Webcast - Amazon Elastic Map Reduce Deep Dive and Best Practices
AWS Webcast - Amazon Elastic Map Reduce Deep Dive and Best PracticesAWS Webcast - Amazon Elastic Map Reduce Deep Dive and Best Practices
AWS Webcast - Amazon Elastic Map Reduce Deep Dive and Best Practices
 
Deep Dive - Amazon Elastic MapReduce (EMR)
Deep Dive - Amazon Elastic MapReduce (EMR)Deep Dive - Amazon Elastic MapReduce (EMR)
Deep Dive - Amazon Elastic MapReduce (EMR)
 
Database migration simple, cross-engine and cross-platform migrations with ...
Database migration   simple, cross-engine and cross-platform migrations with ...Database migration   simple, cross-engine and cross-platform migrations with ...
Database migration simple, cross-engine and cross-platform migrations with ...
 
An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...
 
An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...An innovative way for computerized smith chart generation and transmission li...
An innovative way for computerized smith chart generation and transmission li...
 
Best lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packetBest lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packet
 
Design evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobileDesign evaluation and optimization of steering yoke of an automobile
Design evaluation and optimization of steering yoke of an automobile
 
Geopolymer concrete an eco friendly construction material
Geopolymer concrete an eco friendly construction materialGeopolymer concrete an eco friendly construction material
Geopolymer concrete an eco friendly construction material
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
 
Design features of a 5 tonne day multi – stage, intermittent drainage, conti...
Design features of a 5 tonne  day multi – stage, intermittent drainage, conti...Design features of a 5 tonne  day multi – stage, intermittent drainage, conti...
Design features of a 5 tonne day multi – stage, intermittent drainage, conti...
 
Semicompatibility and fixed point theorem in fuzzy metric space using implici...
Semicompatibility and fixed point theorem in fuzzy metric space using implici...Semicompatibility and fixed point theorem in fuzzy metric space using implici...
Semicompatibility and fixed point theorem in fuzzy metric space using implici...
 
Real time energy data acquisition and alarming system for monitoring power co...
Real time energy data acquisition and alarming system for monitoring power co...Real time energy data acquisition and alarming system for monitoring power co...
Real time energy data acquisition and alarming system for monitoring power co...
 
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...Spatio temporal modeling of snow flake crystals using packard’s cellular auto...
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...
 
Real time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case studyReal time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case study
 
Novel model for rural housing development
Novel model for rural housing developmentNovel model for rural housing development
Novel model for rural housing development
 
Pounding problems in urban areas
Pounding problems in urban areasPounding problems in urban areas
Pounding problems in urban areas
 
Finite element analysis on temperature distribution in turning process using ...
Finite element analysis on temperature distribution in turning process using ...Finite element analysis on temperature distribution in turning process using ...
Finite element analysis on temperature distribution in turning process using ...
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visual
 

Similaire à Data Migration Tool for Heterogeneous Databases

Heterogeneous data transfer and loader
Heterogeneous data transfer and loaderHeterogeneous data transfer and loader
Heterogeneous data transfer and loadereSAT Publishing House
 
Heterogeneous data transfer and loader
Heterogeneous data transfer and loaderHeterogeneous data transfer and loader
Heterogeneous data transfer and loadereSAT Journals
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Journals
 
Improving resource utilization in infrastructural cloud
Improving resource utilization in infrastructural cloudImproving resource utilization in infrastructural cloud
Improving resource utilization in infrastructural cloudeSAT Journals
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisHitesh Jangid
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET Journal
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyIRJET Journal
 
A Reconfigurable Component-Based Problem Solving Environment
A Reconfigurable Component-Based Problem Solving EnvironmentA Reconfigurable Component-Based Problem Solving Environment
A Reconfigurable Component-Based Problem Solving EnvironmentSheila Sinclair
 
Survey of streaming data warehouse update scheduling
Survey of streaming data warehouse update schedulingSurvey of streaming data warehouse update scheduling
Survey of streaming data warehouse update schedulingeSAT Journals
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Girish Chandra
 
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in PharmacyVedika Narvekar
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
IRJET - Health Medicare Data using Tweets in Twitter
IRJET - Health Medicare Data using Tweets in TwitterIRJET - Health Medicare Data using Tweets in Twitter
IRJET - Health Medicare Data using Tweets in TwitterIRJET Journal
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 

Similaire à Data Migration Tool for Heterogeneous Databases (20)

Heterogeneous data transfer and loader
Heterogeneous data transfer and loaderHeterogeneous data transfer and loader
Heterogeneous data transfer and loader
 
Heterogeneous data transfer and loader
Heterogeneous data transfer and loaderHeterogeneous data transfer and loader
Heterogeneous data transfer and loader
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Improving resource utilization in infrastructural cloud
Improving resource utilization in infrastructural cloudImproving resource utilization in infrastructural cloud
Improving resource utilization in infrastructural cloud
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester Synopsis
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
Project scheduler doc
Project scheduler docProject scheduler doc
Project scheduler doc
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
A Reconfigurable Component-Based Problem Solving Environment
A Reconfigurable Component-Based Problem Solving EnvironmentA Reconfigurable Component-Based Problem Solving Environment
A Reconfigurable Component-Based Problem Solving Environment
 
Survey of streaming data warehouse update scheduling
Survey of streaming data warehouse update schedulingSurvey of streaming data warehouse update scheduling
Survey of streaming data warehouse update scheduling
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
IRJET - Health Medicare Data using Tweets in Twitter
IRJET - Health Medicare Data using Tweets in TwitterIRJET - Health Medicare Data using Tweets in Twitter
IRJET - Health Medicare Data using Tweets in Twitter
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Dernier

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 

Dernier (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

Data Migration Tool for Heterogeneous Databases

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 305 DATA MIGRATION SYSTEM IN HETEROGENEOUS DATABASE Shashikant Patel1 , Sagar Wakchaure2 , Mahendra Pingale3 , Saba Siraj4 1, 2, 3, 4 IOK-COE, Pune University, India Abstract With information becoming an increasingly valuable corporate asset, today's IT organizations need the right tools to store, manage, and move that information in the most reliable and cost efficient manner. As part of an Information Lifecycle Management (ILM) best- practices strategy, organizations require innovative solutions for migrating data between storage systems, especially in heterogeneous environments. To support this need, we as planed to design a powerful tool that enables affordable, high- performance data migration in a wide range of storage environments. This project is the unique challenges of data migration in dynamic IT environments and the key business advantages that we have designed to provide over traditional tools used for migration. Keywords: - Data Migration, Database, Design. ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION There are data migrated in the old system manually. The cost and error ratio of these approach are relatively high. Typically, these data are those necessary for the new system while the old systems cannot provide. A "Database Migrator" is usually developed for individuals and organizations to save time for converting to a new database if a database already exists. Instead of creating all the tables etc. of the already existing database, one can simply use the software to convert it into new database, if required. It can also be used by organizations that deal with complex data import, export and migration issues. After all, importing, exporting or migrating data between different sources is very complicated and time consuming especially if these data sources store data in different formats. 2. LITERATURE REVIEW Issues concerning the transference of data from existing databases to other applications are discussed. The process of transferring data is called data migration, and it is divided into two processes extracting data from existing systems in the form of an extracted file, and loading data from the extracted file into the new application. The new application usually requires data in different formats, and so transformation of data is generally needed. Moreover, the new application frequently requires data from more than one source database system, so integration of data is necessary in the migration process. 3. SYSTEM ARCHITECTURE Fig 1: System Architecture Step 1 - The user is provided with the login facility. The user will first enter its username and password which are encrypted in our coding. The user’s entered information is validated. Step 2 - The user is then asked to select the source database which is to be migrated. The source database consists of Access, SQL Server and Oracle. After selecting the source database the user has to fill the details of the selected source database to create the connection. Step 3 - After the connection is tested the user is asked to select the destination database to which the migration will take place. After selecting the destination database the user has to fill the details of the selected destination database to create the connection.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 306 Step 4 - The user is asked to select the tables, columns of the table, views which are to be migrated. Step 5 - the user is also provided with the facility to select either the schema of the table or rows of the table along with the constraints which are applied to the tables. Step 6 - Click start migration button to start the migration. After the complete and successful migration of source database to destination database it displays the status report of the complete migration process. 4. OBJECTIVES 1) Migration of source databases schema to the destination database. 2) Then follows the migration of tables to the destination database. 3) And then it is topped by the actual migration of data from source to destination database. 4) To prompt the user to select the source database and destination database. Connections for source and destination are tested. 5) Tree view structure is designed to enable the user to select and deselect tables, views for migration from source structure to the target structure. 6) This form will display a summary of all the selected items. User is allowed to select constraints to be applied such as primary key, foreign key and unique key. 5. METHODOLOGY In this approach, following factors that affect the Component Selection Efforts have been proposed. Portability: This factor is defined as the ability of a component to be transferred from on environment to another with little modifications, if required. Functionality: Functionality of a component depends upon the number of functions and their properties in these functions. Security: The primary goals of software security are the preservation of the confidentiality, integrity, and availability of the information assets and resources that the software creates, stores, processes, or transmit, including the executing programs themselves 6. SCOPE The purpose of the project keeps the scope of project limited to following categories. They are: 1) The initial part deals with conventional migration keeping in mind i.e. we strictly adhere to the definition that the source of data to be migrated is a database and the destination is also a database .While doing so the only part that undergoes any visible change is the structure of the source and destination database while all the data, attributes, table name etc remains unaffected.. 2) The next part deals with migrating Tables applying constraints such as primary key, foreign key, unique key, index key and check constraints. Migrations of views are also supported. 3) We have also provided facility for selecting and deselecting the fields of a table or an entire table itself for migration. The mapping rules have been defined in an MS Access which is referenced by our migrator tool to map the various data types in the process of migration. After the migration has occurred a status report will be displayed which will indicate if the table schema is migrated, records are inserted, constraints like primary key, foreign key, unique key, check constraints have been migrated successfully or pending or failed. 7. ADVANTAGES OF PROPOSED SYSTEM  Security: The application is such that it allows the authorized user.  Time efficient: Migrating every record manually would take quite a lot of time but using a migration tool would take the application few seconds to migrate from the specified source to the specified destination.  Flexible: The inherent nature of this application is flexible. The initial concept of data migration that we have implemented on typical case of Access to Sql can be further extended to any source database and to any destination database.  Interactive: The highly interactive nature of this application ensures that minimum special training is required to handle it. 8. FUTURE WORK  Scheduling : One can migrate the data at any time. If you want to migrate the data at 5 o’clock then you can set the time.  Migration can be done in small area network : One can migrate the data in LAN or Wi-Fi. 9. CONCLUSIONS We know that various organizations use different type of databases to store their user’s information. If we want to use the existing databases of such organizations then we have to convert the database in the format which is compactable to our application. This database migration is achieved by database migration tool. A Database Migration Suite is usually developed for individuals and organizations to save time for converting to a new database if a database already exists. The purpose of our project is to migrate data from an existing database to another database. Our migrator tool provides source databases as MS Access, destination databases as SQL Server and Oracle. We also have implemented migration from SQL Server to Oracle and vice versa.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 307 REFERENCES [1]. Lixian Xing, Yanhong Li, "Design and application of data migration system in heterogeneous database" in 2010 International Forum on Information Technology and applications. [2]. "DATA MIGRATION BEST PRACTICES" App Global Services January 2006. [3]. Microsoft CRM Data Migration Framework White Paper by Parul Manek, Program Manager Published: April 2003. [4]. Jaiwei Han, Michelinne Kamber, "Data Mining: Concepts and Techniques." [5]. Manjunath T.N, Ravindra S Hegadi, Ravikumar G K."A Survey on Multimedia Data Mining and Its Relevance Today" IJCSNS Vol. 10 No. 11-Nov 2010, pp. 165-170. [6]. Manjunath T.N, Ravindra S Hegadi, Ravikumar G K. "Analysis of Data Quality Aspects in at warehouse Systems", (IJCSIT)-Jan-2011. [7]. DATA Quality in health Care Data warehouse Environments Robert L. Leitheiser, University of Wisconsin Whitepaper. [8]. Potts, William J. E., (1997), Data Mining Using SAS Enterprise Miner Software. Cary, North Carolina: SAS Institute.