Data loader.ppt

589 views
499 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
589
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Data loader.ppt

  1. 1. DATALOADERProject submitted by:
  2. 2.  Introduction Objective of the project System specific requirements Project Description Input and output of the project Data loader tool’s processes Snap shots Conclusion Advantages Future scope End
  3. 3. There is no any direct tool to load the data contained ina text file into the backend tool such as MS-Access, MYSQL,Oracle or FoxPro, and to import and export the tables betweenthe backend tools, to load data into common letter to havereplication of the letter for each data set. Hence we are going todevelop data loader which overcomes the above problems. In existing system, a number of tools must be used toimplement the task said in “problem definition”. Existing systemmay also contain the manual process to load data.
  4. 4.  We are going to develop data loader which is a tool to load the data contained in a text file into the backend tool such as MS-Access, MYSQL, Oracle or FoxPro. And to import and export the tables between the backend tools. And to encrypt the text file and to decrypt the encrypted text file.
  5. 5. Data loader is a tool, which helps in data loading to a given back end tool from a giventext file with the fields and delimiters. Based on the text file fields, the table isautomatically created in oracle or MS-Access or in FoxPro and the data is loaded fromtext file into table. Data De-loading : In this process, the data is loaded back into given text file from a giventable. The text file contains automatically the field titles. Data transfer : Data transfer between Oracle, MS-Access and FoxPro. In this process, thedata from one backend tool is copied to another back end tool by creating necessaryobjects.
  6. 6.  Operating system : windows 2000 or above Technologies : J2EE Database Connectivity : JDBC Frameworks : J2EE Back End : Microsoft Access, SQL Server, Visual FoxPro Oracle
  7. 7.  Processor : P4 Processor and above Speed : 1GHz and above Memory : 512 MB
  8. 8.  Data Loader It loads the data from source table and creates a table indestination database with loaded data, hence it converts differentdatabase tables. Access to Oracle Access to FoxPro FoxPro to Access FoxPro to Oracle Oracle to Access Oracle to FoxPro And the file security module encrypts the given database (atext file) and also allows decryption tool.
  9. 9.  Source and Destination Data Base Names. Name of the table to export the data. Name of the table to import the data. Name of the text file that is to be encrypted. Name of the text file that is to be decrypted.
  10. 10.  Converted destination table in destination Data Base. Encrypted Text File. Decrypted Text File.
  11. 11. FoxPro Oracle FoxProMS AccessMS Access Oracle
  12. 12. ObjectEntity relation Oracle FoxProEntity relation Object MS Access MS AccessEntity relation DATA Object Oracle LOADER FoxPro TOOL File/TableFor encryption Encrypted file File/TableFor decryption Decrypted file
  13. 13.  MSAccess to FoxProInputs :o MSAccess database nameo MSAccess table nameo FoxPro database nameo Format type(export only structure/export structure with data)Outputs :o FoxPro Table with desired format(export only structure/export structure with data).
  14. 14.  MSAccess to OracleInputs :o MSAccess database nameo MSAccess table nameo Oracle database nameo Format type(export only structure/export structure with data)Outputs :o Oracle Table with desired format(export only structure/export structure with data).
  15. 15.  Oracle to FoxProInputs :o Oracle database nameo Oracle table nameo FoxPro database nameo Format type(export only structure/export structure with data)Outputs :o FoxPro Table with desired format(export only structure/export structure with data).
  16. 16.  Oracle to MSAccessInputs :o Oracle database nameo Oracle table nameo MSAccess database nameo Format type(export only structure/export structure with data)Outputs :o MSAccess Table with desired format(export only structure/export structure with data).
  17. 17.  FoxPro to MSAccessInputs :o FoxPro database nameo FoxPro table nameo MSAccess database nameo Format type(export only structure/export structure with data)Outputs :o MSAccess Table with desired format(export only structure/export structure with data).
  18. 18.  FoxPro to OracleInputs :o FoxPro database nameo FoxPro table nameo Oracle database nameo Format type(export only structure/export structure with data)Outputs :o Oracle Table with desired format(export only structure/export structure with data).
  19. 19.  Encryption Inputs : o Text file name Outputs : o Cipher text file.
  20. 20.  Decryption Inputs : o Cipher Text file name Outputs : o Text file.
  21. 21.  Data Loader
  22. 22.  Conversion of database tables
  23. 23.  Errors(Table not exist)
  24. 24.  Validation of the form
  25. 25.  Validation of the form
  26. 26.  Validation of the form
  27. 27.  File Browser for File Security
  28. 28.  Encryption
  29. 29.  Decryption
  30. 30.  Table transferred from MS Access to Oracle
  31. 31.  Table transferred from Oracle to MS Access
  32. 32.  A table transferred from MS-Access to FoxPro
  33. 33.  User Manual
  34. 34.  Easy to export the database table from one back end tool to another. Easy to encrypt the text file . Easy to decrypt the encrypted text file. It can match with any version of the back end tools.
  35. 35.  The scope of this document lies between developer and end user. The document can also be used for future enhancement. We can develop this tool for other backend also. We can use this software in banks, offices , in companies and in many more commercial areas.
  36. 36.  It can be concluded from the result that the developed tool will be efficient and effective to transfer the text file and tables easily from one back end tool to another and to encrypt and decrypt the text and the data. It can be used in any organization where huge volume of data exists in different forms or objects of different tools.

×