1 Source cartography & modeling Source technical objcts (DDL, programs, jcl,..) DATA MIGRATION general method Models compatibility & migration rules definition.

Slides:



Advertisements
Similar presentations
Introducing DB-123 A New Approach to Database Management Systems Thomas Schneider February 2004.
Advertisements

Copyright 2008 Tieto Corporation Database merge. Copyright 2008 Tieto Corporation Table of contents Please, do not remove this slide if you want to use.
1 Source cartography & modeling Source technical objects (DDL, programs, jcl,..) DATABASE MIGRATION The general method Target base re-engineering Data.
TOOLS FOR DATA GOVERNANCE PASSIONATE BY DATA AND THE PRECISION OF THE RESULTS.
Copyright Irwin/McGraw-Hill Data Modeling Prepared by Kevin C. Dittman for Systems Analysis & Design Methods 4ed by J. L. Whitten & L. D. Bentley.
Introduction to Databases
Introduction to MS Access, building tables, creating keys, creating relationships BSAD 141 Dave Novak.
Relational Databases Chapter 4.
1 Basic DB Terms Data: Meaningful facts, text, graphics, images, sound, video segments –A collection of individual responses from a marketing research.
File Systems and Databases
Chapter 2 Database Environment. Agenda Three-Level ANSI-SPARC Architecture Database Languages Data Models Functions of DBMS Components of DBMS Teleprocessing.
RELATIONSHIP  THE WAY TABLES ARE RELATED  A TABLE MUST PARTICIPATE IN AT LEAST ONE RELATIONSHIP  IN A BINARY RELATIONSHIP TWO ENTITIES PARTICIPATE 
File Systems and Databases Hachim Haddouti
Data Warehouse success depends on metadata
Chapter 4 Relational Databases Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 4-1.
1 Chapter 2 Database Environment. 2 Chapter 2 - Objectives u Purpose of three-level database architecture. u Contents of external, conceptual, and internal.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education 4-1.
TOOLS FOR DATA GOVERNANCE PASSIONATE BY DATA AND THE PRECISION OF THE RESULTS.
Transforming Data Models into Database Designs
1 technical objects functional objects persistent objectsdescriptive objectsprocessing objects files content copybook, programs, DTD, …, directly managed.
L/O/G/O Metadata Business Intelligence Erwin Moeyaert.
Database System Concepts and Architecture Lecture # 3 22 June 2012 National University of Computer and Emerging Sciences.
Week 1 Lecture MSCD 600 Database Architecture Samuel ConnSamuel Conn, Asst. Professor Suggestions for using the Lecture Slides.
Database Design - Lecture 1
Announcements Homework 1 Due 9/15 Project: Step 1 Due 9/17 Reading for Wednesday –2.6 – 2.8.
Copyright © 2003 by Prentice Hall Module 4 Database Management Systems 1.What is a database? Data hierarchy and data organization Field, record, file,
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 13 Database Management Systems: Getting Data Together.
Chapters 17 & 18 Physical Database Design Methodology.
2440: 141 Web Site Administration Database Management Using SQL Professor: Enoch E. Damson.
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
NOMENCLA: a server to manage, display and disseminate metadata by Emile Bruneau (INSEE – France) Joint UNECE/Eurostat/OECD work session on statistical.
Software School of Hunan University Database Systems Design Part III Section 5 Design Methodology.
9/14/2012ISC329 Isabelle Bichindaritz1 Database System Life Cycle.
Session 4: The HANA Curriculum and Demos Dr. Bjarne Berg Associate professor Computer Science Lenoir-Rhyne University.
ABC Insurance Co. Paul Barry Steve Randolph Jing Zhou CSC8490 Database Systems & File Management Dr. Goelman Villanova University August 2, 2004.
SQL Structured Query Language Programming Course.
1/26/2004TCSS545A Isabelle Bichindaritz1 Database Management Systems Design Methodology.
DDI & Model-View-Controller: An Architectural Perspective Dennis Wegener, Matthäus Zloch, Thomas Bosch (GESIS) Dagstuhl,
Organizing Data Revision: pages 8-10, 31 Chapter 3.
KFS Data Mapping Leveraging a new KFS 3.0 feature.
ETL Extract. Design Logical before Physical Have a plan Identify Data source candidates Analyze source systems with data- profiling tools Receive walk-through.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
CHAPTER 3 DATABASES AND DATA WAREHOUSES. 2 OPENING CASE STUDY Chrysler Spins a Competitive Advantage with Supply Chain Management Software Chapter 2 –
DataBase Management System What is DBMS Purpose of DBMS Data Abstraction Data Definition Language Data Manipulation Language Data Models Data Keys Relationships.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
DAY 14: MICROSOFT ACCESS – CHAPTER 1 Madhuri Siddula October 1, 2015.
PowerPoint Presentation for Dennis, Wixom, & Tegarden Systems Analysis and Design with UML, 3rd Edition Copyright © 2009 John Wiley & Sons, Inc. All rights.
Database Systems Basic Data Management Concepts
Database Environment Chapter 2. Data Independence Sometimes the way data are physically organized depends on the requirements of the application. Result:
1 DATABASE TECHNOLOGIES (Part 2) BUS Abdou Illia, Fall 2015 (September 9, 2015)
1 6 Concepts of Database Management, 5 th Edition, Pratt & Adamski Chapter 6 Database Design 2: Design Methodology Spring 2006.
Chapter 3: Relational Databases
Logical Database Design and Relation Data Model Muhammad Nasir
Data Models. 2 The Importance of Data Models Data models –Relatively simple representations, usually graphical, of complex real-world data structures.
Welcome: To the fifth learning sequence “ Data Models “ Recap : In the previous learning sequence, we discussed The Database concepts. Present learning:
The Database Concept and the Database Management System (DBMS) Databases.
Lecture # 14 Chapter # 5 The Relational Data Model and Relational Database Constraints Database Systems.
Introduction to Database Development CH2. CH2. Introduction to DB Development Database n Components of Database Systems (Figure 2-1) –User data –Metadata.
- The most common types of data models.
Chapter 2 Database Environment.
Relational Databases.
Chapter 2 Database Environment.
Chapter 2 Database Environment Pearson Education © 2009.
Chapter 2 Database Environment.
Data Model.
Towards an Open Meta Modeling Environment
Chapter 2 Database Environment Pearson Education © 2009.
Chapter 2 Database Environment Pearson Education © 2009.
Presentation transcript:

1 Source cartography & modeling Source technical objcts (DDL, programs, jcl,..) DATA MIGRATION general method Models compatibility & migration rules definition Data migration Data migration validation Source base model Migrated data Data migrated & validated Target technical objects (DDL, programs, jcl,..) modèle base cible Target cartography & modeling

2 CARTOGRAPHY & MODELING cartography – Galois connections

3 CARTOGRAPHY & MODELING modeling – logical model

4 CARTOGRAPHY & MODELING modeling – semantic model

# attributes # relations # entity types Semantic model Logical model Physical model MODELING synthesis

6 Source cartography & modeling Source technical objcts (DDL, programs, jcl,..) DATA MIGRATION general method Models compatibility & migration rules definition Data migration Data migration validation Source base model Migrated data Data migrated & validated Target technical objects (DDL, programs, jcl,..) modèle base cible Target cartography & modeling

7 Target model Source model IS COMPATIBILITY Semantic level Logical level Physical level ? ? ? Sematic model Logical model Physical model Sematic model Logical model Physical model

8 Enrichment ? SEMANTIC DIFFERENCES EXAMPLES contracts damages addendum sourcetarget exemple 2 : relations differences example 1 : concepts differences contracts damages addendum contracts : A contract might exist for a person or a group of person contracts : A contract is linked to one and only one person Impoverishment ?

9 sourcetarget example 1 : transformations differences A multivaluated field : PHONE (5) Is transformed in 5 colums PHONE1, …PHONE5 Is transformed in a table with a foreign key PHONENBR, FK example 2 : implementation differences A relation between 2 entities Is implemented as a set in a CODASYL DBMS  the records are accessible only through the record owner ( the father) Is implemented as a table with a foreign key in relational  the records are directly accesible LOGICAL DIFFERENCES EXAMPLES

10 sourcetarget example 1 : format differences the field « DATE »is defined in 6 figures is defined as a field « DATE » example 2 : coding differences codingdata are in EBCDICdata are in ASCII PHYSICAL DIFFERENCES EXAMPLES

11 MAPPING TOOLS

12 Source cartography & modeling Source technical objcts (DDL, programs, jcl,..) DATA MIGRATION general method Models compatibility & migration rules definition Data migration Data migration validation Source base model Migrated data Data migrated & validated Target technical objects (DDL, programs, jcl,..) modèle base cible Target cartography & modeling

13 TRANSFORMATION RULES CODING

14 SOURCE CODE GENERATION FOR THE UNLOAD The tools generate the unload program source code for the source persistent objects  Depending on the source technological environment  Programming language  Type of persistent objects  By integrating the transformation rules  In function of the target persistent objects The programs generate « source data files » ready to be loaded.

15 UNLOAD generation program JCL

16 Source data validtion VS Target model Synthesis

17 Source data validtion VS Target model Details

18 Source cartography & modeling Source technical objcts (DDL, programs, jcl,..) DATA MIGRATION general method Models compatibility & migration rules definition Data migration Data migration validation Source base model Migrated data Data migrated & validated Target technical objects (DDL, programs, jcl,..) modèle base cible Target cartography & modeling

19 Data migration validation  3 methods to validate a data migration 1.Technical counters 2.Functional counters 3.Content comparison

20 Functional counters

21 CONTENT COMPARISON process

22 CONTENT COMPARISON common model

23 CONTENT COMPARISON extraction programs generation

24 CONTENT COMPARISON comparison

25 CONTENT COMPRISON comparison – Keys interrupt

26 CONTENT COMPARISON comparison– value differences

27 Programs classification according to the DB risks they might have  A weight is given to each entity type, according to the number of parents and child they have  To each DB access verb, a weight is given according to the type of action ( read, write, delete…)  In a module  The weight of an access is a function of the weight of the verb and the entity  A module weight is the sum of the weight of each accesses in the module  The program weight is the sum of the weight of the modules PROGRAM WEIGHT CALCULATION

28 PROGRAM WEIGHT CALCULATION

29 ic62blad icada Low risks ic5623b ic62ur01 icaccdo ic62btot ic5623 ic62i ic180 ic56conv ic679 ic242 ic180dch icaanwb icaanw ic180sp ic18i ic62b250 ic62bfsa ic180ap ICAFL1 ic003 ic180st2 ic62bvgl ic2tgvja High risks IDENTIFICATION of the « RISKY » programs