An Implementation of Change Data Capture (CDC)

  IJCTT-book-cover
 
         
 
© 2023 by IJCTT Journal
Volume-71 Issue-2
Year of Publication : 2023
Authors : Hemadri Lekkala
DOI :  10.14445/22312803/IJCTT-V71I2P103

How to Cite?

Hemadri Lekkala, "An Implementation of Change Data Capture (CDC)," International Journal of Computer Trends and Technology, vol. 71, no. 2, pp. 15-18, 2023. Crossref, https://doi.org/10.14445/22312803/IJCTT-V71I2P103

Abstract
This paper gives an overall picture of the implementation of Change Data Capture (CDC) from Mainframe Systems(z/OS) to downstream systems in a heterogeneous environment to reduce the latency to near real-time. This paper describes how the implementation can be done for data movement in terms of data extraction, load, and transformation to downstream systems. The data extraction captures the changed data based on the log file systems on Mainframes (z/OS). The processed data are pushed into the queue system on a first come basis, and ultimately, processed data loads into real-time Cloud based heterogeneous systems. The data Capture implementation framework supports data trigger and replication using standard data capture methods. This implementation supports larger organizations in making real-time decisions in terms of data for better analytics.

Keywords
Change Data Capture, Real Time Data Processing, Extract, Transform and Load, AWS Cloud Data Transformation.

Reference

[1] Website, 2022. [Online]. Available: https://www.ibm.com/docs/en/idr/11.4.0?topic=change-data-capture-cdc-replication
[2] V. Amarnath et al., "Review on Energy Efficiency Green Data Centers," International Journal of Recent Engineering Science, vol. 5, no. 2, pp. 21-26, 2018. Crossref, https://doi.org/10.14445/23497157/IJRES-V5I2P105
[3] Jatti Mounika, and Nagaveni B. Birada, “P&ID Data Analysis using Hadoop Map Reduce," International Journal of Recent Engineering Science, vol. 5, no. 1, pp. 8-10, 2018. Crossref, https://doi.org/10.14445/23497157/IJRES-V5I1P102
[4] Nisar Ahmed et al., "How to Protecting Kernal Code and Data," International Journal of Computer & organization Trends (IJCOT), vol. 5, no. 4, pp. 20-23, 2015. Crossref, https://doi.org/10.14445/22492593/IJCOT-V23P301
[5] Abhishek Gupta et al., "Information Assurance via Big Data Security Analytics," International Journal of Computer & organization Trends (IJCOT), vol. 5, no. 2, pp. 85-91, 2015.
[6] Khaled Elbehiery, and Hussam Elbehiery "Cloud Computing Technologies; Principals and Fundamentals," International Journal of P2P Network Trends and Technology, vol. 9, no.2, pp. 1-5, 2019. Crossref, https://doi.org/10.14445/22492615/IJPTT-V9I2P401
[7] Dr. Khalaf Khatatneh, Osama Nawafleh, Dr.Ghassan Al-Utaibi, "The Emergence of Edge Computing Technology over Cloud Computing," International Journal of P2P Network Trends and Technology, vol. 10, no. 2, pp. 1-5, 2020. Crossref, https://doi.org/10.14445/22492615/IJPTT-V10I2P401
[8] Dr. P.K.Rai, Rajesh Kumar Bunkar, "Architectural Data Security in Cloud Computing," International Journal of Computer & organization Trends (IJCOT), vol. 4, no. 4, pp. 23-27, 2014.
[9] N. Madhavi Latha, and Y.Pavan Narasimha Rao, "A Novel Secured Data Transmission Model with Load Balancing for Cloud Computing," International Journal of Computer & organization Trends (IJCOT), vol. 6, no. 1, pp. 45-50, 2016. Crossref, https://doi.org/10.14445/22492593/IJCOT-V29P304
[10] Dr. D.Shravani, "Model Driven Architecture based Agile Modelled Layered Security Architecture for Web Services Extended to Cloud, Big Data and IOT,” International Journal of Computer & organization Trends (IJCOT), vol. 6, no. 4, pp. 55-64, 2016.
[11] Konna Sirisha, and E. Deepthi, "Provide Privacy of Shared Data and Calculate Performance of Data Management System in Multiple Clouds," International Journal of Computer & organization Trends (IJCOT), vol. 8, no. 1, pp. 24-28, 2018.
[12] Suri Nilima, G. Sivalakshmi, "An Improved Signature Schema for user Authentication and Privacy of Shared Data for Dynamic Groups in Cloud", International Journal of Computer & Organization Trends (IJCOT), vol. 8, no. 2, pp. 39-44, 2018.
[13] Khaled Elbehiery, and Hussam Elbehiery, "5G as a Service (5GaaS)," SSRG International Journal of Electronics and Communication Engineering, vol. 6, no. 8, pp. 22-30, 2019. Crossref, https://doi.org/10.14445/23488549/IJECE-V6I8P104
[14] Khaled Elbehiery, and Hussam Elbehiery, "Millennial National Security’s Cornerstones 5G, Cloud Technology, and Artificial Intelligence," SSRG International Journal of Electronics and Communication Engineering, vol. 6, no. 8, pp. 44-54, 2019. Crossref, https://doi.org/10.14445/23488549/IJECE-V6I8P107
[15] F. Twinkle Graf, and P. Prema, "Secure Collaborative Privacy in Cloud Data With Advanced Symmetric Key Block Algorithm," SSRG International Journal of Computer Science and Engineering, vol. 2, no. 2, pp. 40-44, 2015. Crossref, https://doi.org/10.14445/23488387/IJCSE-V2I2P109
[16] S. Manjunatha, L. Suresh, "A Study on Consolidation of Data Servers in Virtualized Cloud Atmosphere," SSRG International Journal of Computer Science and Engineering, vol. 6, no. 11, pp. 47-50, 2019. Crossref, https://doi.org/10.14445/23488387/IJCSE-V6I11P110