DATA MIGRATION general method - PowerPoint PPT Presentation

1 / 29
About This Presentation
Title:

DATA MIGRATION general method

Description:

Sematic model. Logical model. Physical model. Sematic model. Logical model. Physical model. 8. Enrichment ? SEMANTIC DIFFERENCES EXAMPLES ... – PowerPoint PPT presentation

Number of Views:749
Avg rating:3.0/5.0
Slides: 30
Provided by: pcla1
Category:

less

Transcript and Presenter's Notes

Title: DATA MIGRATION general method


1
DATA MIGRATIONgeneral method
Source technical objcts (DDL, programs, jcl,..)
Target technical objects (DDL, programs, jcl,..)
Source cartography modeling
Target cartography modeling
Source base model
modèle base cible
Models compatibility migration rules definition
Data migration
Migrated data
Data migration validation
Data migrated validated
2
CARTOGRAPHY MODELINGcartography Galois
connections
3
CARTOGRAPHY MODELINGmodeling logical model
4
CARTOGRAPHY MODELINGmodeling semantic model
5
MODELING synthesis
6
DATA MIGRATIONgeneral method
Source technical objcts (DDL, programs, jcl,..)
Target technical objects (DDL, programs, jcl,..)
Source cartography modeling
Target cartography modeling
Source base model
modèle base cible
Models compatibility migration rules definition
Data migration
Migrated data
Data migration validation
Data migrated validated
7
IS COMPATIBILITY
Source model
?
Semantic level
Sematic model
Sematic model
?
Logical level
Logical model
Logical model
?
Physical level
Physical model
Physical model
8
SEMANTIC DIFFERENCES EXAMPLES
source
target
example 1 concepts differences
contracts A contract is linked to one and only
one person
contracts A contract might exist for a person
or a group of person
exemple 2 relations differences
contracts
contracts
Impoverishment ?
addendum
Enrichment ?
damages
addendum
damages
9
LOGICAL DIFFERENCES EXAMPLES
10
PHYSICAL DIFFERENCES EXAMPLES
11
MAPPING TOOLS
12
DATA MIGRATIONgeneral method
Source technical objcts (DDL, programs, jcl,..)
Target technical objects (DDL, programs, jcl,..)
Source cartography modeling
Target cartography modeling
Source base model
modèle base cible
Models compatibility migration rules definition
Data migration
Migrated data
Data migration validation
Data migrated validated
13
TRANSFORMATION RULES CODING
14
SOURCE CODE GENERATION FOR THE UNLOAD
  • The tools generate the unload program source code
    for the source persistent objects
  • Depending on the source technological environment
  • Programming language
  • Type of persistent objects
  • By integrating the transformation rules
  • In function of the target persistent objects
  • The programs generate  source data files  ready
    to be loaded.

15
UNLOAD
generation
program
JCL
16
Source data validtion VS Target modelSynthesis
17
Source data validtion VS Target modelDetails
18
DATA MIGRATIONgeneral method
Source technical objcts (DDL, programs, jcl,..)
Target technical objects (DDL, programs, jcl,..)
Source cartography modeling
Target cartography modeling
Source base model
modèle base cible
Models compatibility migration rules definition
Data migration
Migrated data
Data migration validation
Data migrated validated
19
Data migration validation
  • 3 methods to validate a data migration
  • Technical counters
  • Functional counters
  • Content comparison

20
Functional counters
21
CONTENT COMPARISONprocess
22
CONTENT COMPARISONcommon model
23
CONTENT COMPARISONextraction programs generation
24
CONTENT COMPARISONcomparison
25
CONTENT COMPRISONcomparison Keys interrupt
26
CONTENT COMPARISONcomparison value differences
27
PROGRAM WEIGHT CALCULATION
  • Programs classification according to the DB risks
    they might have
  • A weight is given to each entity type, according
    to the number of parents and child they have
  • To each DB access verb, a weight is given
    according to the type of action ( read, write,
    delete)
  • In a module
  • The weight of an access is a function of the
    weight of the verb and the entity
  • A module weight is the sum of the weight of each
    accesses in the module
  • The program weight is the sum of the weight of
    the modules

28
PROGRAM WEIGHT CALCULATION
29
IDENTIFICATION of the  RISKY  programs
Write a Comment
User Comments (0)
About PowerShow.com