Monday, December 30, 2019

Rhetoric in Julius Caesar - 790 Words

A fight with words to change the minds of your audience is one way to explain rhetoric. In Shakespeare’s Julius Caesar, rhetoric is exactly what Brutus and Mark Antony used to duke it out and to get their point across about Caesar’s death to the people of Rome. Seeking to gain their support and change their minds based on their rhetorical way with words. Let’s get it on! â€Å"If then that friend demand why Brutus rose against Caesar, this is my answer: not that I loved Caesar less, but that I loved Rome more.† (3.2/ 19) Brutus tries to tell the people that he executed Caesar for their own good . â€Å"Had you rather Caesar living, and die all slaves, than that Caesar were dead, to live all free men?† (3.2/ 22) Here, Brutus gives the people†¦show more content†¦Ã¢â‚¬Å"Look, in this place ran Cassius’ dagger through. Through this well-beloved Brutus stabbed† (3.2/ 171) The uncovering of Caesar’s lifeless body an d bloody toga was a great visual aid for Mark Antony because it added drama, emphasis, truth, and evoked more emotion. Thus, the people begin to show anger and long for revenge. Looks like Mark Antony won by knock out! Marc Antony’s wise use of rhetoric gave him the ability to move the people of Rome more effectively than Brutus. Appealing to the emotions of the people. Making the feel his pain and anger, Ma Works Cited Shakespeare, William. Julius Caesar. New York: Penguin,Show MoreRelatedJulius Caesar Rhetoric Analysis1228 Words   |  5 Pagesplay Julius Caesar is deeply rooted in Shakespeare’s characteristic methods of rhetoric and persuasion. This play is primarily driven by the technique of persuasion when Cassius has convinced Brutus that must die. This sets the story in motion; however, the plot ending is determined by Antony’s speech to the people. Shakespeare’s method of rhetoric has been the most powerful usage of words and writing, creating the opportunity to collapse kingdoms and rise anew. Shakespeare’s Julius Caesar scrutinizesRead MoreEssay about Rhetoric in William Shakespeare’s Julius Caesar1801 Words   |  8 PagesAntony use rhetoric successfully in William Shakespeare’s Julius Caesar, albeit each differently and for different causes. Each of these men uses his skills in rhetoric to convince each other and at some points t he entire population of Rome to follow his beliefs. However, each of these men has different motivations to do so, as well as different characteristics and general worldviews. Cassius uses rhetoric successfully to persuade Brutus to come over to his cause—killing Julius Caesar. Cassius isRead MoreRhetoric and Betrayal in Julius Caeser Play1486 Words   |  6 PagesWilliam Shakespeare’s famous play Julius Caesar utilizes the literary element of rhetoric multiple times throughout to show the true power that words can hold. The rhetoric in Caesar accompanies the play’s themes of betrayal, deception, and exaggeration. Brutus uses rhetoric to persuade the crowd of plebeians that the murdering of Caesar was positive and beneficial to all of Rome, winning their support and causing them to join his cause. Soon after, Mark Antony gives a terrifically-persuasive speechRead MoreThe Power Of Words : Julius Caesar1218 Words   |  5 PagesThe Power of Words (Major Assignment: Julius Caesar Analysis) Initially, the thought of having at least a dynamic character with some sort of clemency to live from their mistakes would be conspicuous in most analogies, but â€Å"Julius Caesar,† written by William Shakespeare, is no exception. This tragedy took place in an era where mythological divinities were once believed; hence, this play settled across the capital of Rome, Italy. According to Aristotle, tragedy has six main elements: plot, characterRead MoreJulius Caesar Language Analysis745 Words   |  3 Pagesand using language in a good or bad way. The play Julius Caesar starts off with a Roman gathering of the citizens to celebrate the return from the war. On the way, Caesar is stopped by a mysterious man who warns him of â€Å"the ides of March† or the middle of March. Cassius and Brutus are doubting that the power Caesar holds would be for good use, so they plan against him. Later on, they eventually get a whole group together and they all backstab Caesar, literally, and a character named Mark Antony, whoRead MoreHow Does Rhetoric Affect Our Life?1400 Words   |  6 PagesI have learned that rhetoric is something I use regularly in my daily life. Unknowingly, I have been using this art of persuasion for even the most everyday things. Now that I can identify rhetoric, I see it everywhere in the form of politics, media, advertising, parental rearing, public speaking, personal, and even at our work place. I use rhetoric every day in my work life, convincing my residents to take physical rehab, because by them taking the service that is how the facility makes most ofRead MoreWilliam Shakespeare s The Tragedy Of Julius Caesar1508 Words   |  7 Pages William Shakespeare’s play, â€Å"The Tragedy of Julius Caesar† was mainly based on the conspiracy to assassinate Julius Caesar. â€Å"Julius Caesar† is a play based on rhetoric and politics. Rhetoric is the science of manipulation. Marcus Brutus, a Senate and a beloved friend of Caesar stood as the face among the conspirators leading the assassination of Julius Caesar. Aristotle said, â€Å"A man doesn’t become a hero until he can see the root of his downfall†. He defined a tragic hero as someone who is highlyRead MoreThe Role of Persuasion in Julius Caesar Essay examples1066 Words   |  5 PagesJulius Caesar Topic: Write an expository essay on the role of persuasion in the play. Julius Caesar is a tragic drama written by William Shakespeare in 1599. This tragedy takes place in ancient Rome around 44 B.C when Rome was a great empire. Julius Caesar was a very important figure at this time as he was a very successful general who helped spread the Roman Empire and after his defeat of his political rival Pompey, he took on the role of becoming a dictator of Rome. But many citizens â€Å"fearedRead MoreJulius Caesar s Death And The Fallout After It1721 Words   |  7 PagesWilliam Shakespeare’s play Julius Caesar is one of his most monumental plays that cover Julius Caesar’s death and the fallout after it. He got the material for this play from a Greek writing called the Life of Julius Caesar. This was actually a famous biography written by Plutarch in the first century, I was later translated by Sir Thomas North in 1579. Published in 1599 this play is assumed to be the first to be ever preformed in the famous Globe Theater, it was a smash success that moved audiencesRead MoreJulius Caesar : Political Propaganda1120 Words   |  5 PagesCaleb Holman Miss Tanner British Literature 1 21 November 2014 Julius Caesar Used as Political Propaganda William Shakespeare was born in 1564, only a little while after the start of Queen Elizabeth I’s reign. As such he lived in a time of civil unrest later in his life because of the ruler being a woman, being childless and not naming an heir to the throne. Therefore Shakespeare used his tragedy Julius Caesar and the Roman politics in the play in order to reflect those of his day. Namely that

Sunday, December 22, 2019

English Literature Movements American Literature

English Literature Movements American Literature written works are understood in relation to their cultural and historical situations. The literary of the American perspective reminds us that can’t really be who we are unless we reclaim what we have done in the past in order to see where we are today. American Literature begins with the Native Americans. The values and principles were inherited in their stories. All their literary was inspired though oral tradition of their important past times that were passed down through generations and generations. As we learn from our Native Americans we also follow some of their principles in the constitution in â€Å"we the people†(Murphy). The next movement is the new settlers coming into America. The mayflower compact was composed of Puritans wanting to migrate to establish a colony. They experienced difficultness to survive with freezing temperatures, minimal supplies and source of food. They declared to help each other with no guidance for thousands of miles ahead. The colonial period was characterized by their desire to purify the Church of England worshipping God. Puritans then left England to colonize the new world. Settlers recorded their experiences through diaries and historical stories. During the Age of Faith, they believed that God existed and empowered the mind with freedom. Their literature was religion dominated, rational and felt the need for moral justification. The works was absorbed with narrativesShow MoreRelatedThere have been many movements in Romantic Literature, Romanticism being one. Despite the idea that600 Words   |  3 Pageshave been many movements in Romantic Literature, Romantic ism being one. Despite the idea that romanticism is an outdated literary form, romantic literature is very important to English Literature; no other period in English Literature shows the type of style, theme, or contain information like how the Romantic movement was. Romanticism was virtually around in every country of the US, Europe, Latin America and it lasted from 1750-1870. Romanticism gave a rise to a new type of literature it was an exerciseRead MoreThe Literary Canon On The Black Arts Movement941 Words   |  4 PagesLaqu’er Clark English 1305-05 Dr. Boone March 2, 2016 The Literary Canon How did the Black Arts Movement change the white supremacist of the Literary Canon? Before one can go on to answer this question, students must understand exactly what a literary canon is. â€Å"Literary canon† is a term used widely to refer to a group of literary works that are considered the most important of a particular time period or place. Before the 1960’s the canon was widely referred to as the â€Å"Western Canon.† However afterRead MoreThe Impact Of Haruki Murakami On The World War II939 Words   |  4 Pagesborn after the war and grew up in a Japanese society marked by war. Even after the war had ended, the feelings had not disappeared. Japanese literature was stained with themes of devastation and war. The stereotype put on the Japanese also made it more difficult for them to find places in society. Murakami had a harder time becoming part of mainstream literature because he was of Japanese heritage. Another important event was the rise of the Unite d States as a world power. The new power began to influenceRead MoreA New Beginning For African Americans Essay1291 Words   |  6 PagesMarisa Pope EH-232 American Literature II Professor Alan Brown November 19, 2016 A New Beginning for African Americans From the 1920’s to the mid 1930’s a literary, intellectual, and artistic movement occurred that kindled the African Americans a new cultural identity. This movement became known as the Harlem Renaissance, which is also known as the â€Å"New Negro Movement†. With this movement, African Americans sought out to challenge the â€Å"Negro† stereotype that they had received from others while developingRead MoreWar : A Breath Of Change1715 Words   |  7 PagesWar: A Breath of Change in Literature World War II was a time of horrors, hardships, sicknesses, and deaths for people all around the world. It was, simply put, a time that showed what terrible acts mankind was capable of. The end of World War II left families scarred, brothers dead, and countries ruined. However, just as the phoenix rises from the ashes, so did a new world. World War II gave birth to a plethora of new ideas, such as the postmodernism movement which, without World War II, wouldRead MoreCaribbean Literature1477 Words   |  6 PagesCaribbean Literature INTRODUCTION The evolution of Caribbean Literature started centuries before the Europeans graced these shores and continues to develop today. Quite noticeably, it developed in a manner which transcended all language barriers and cultures. Today the languages of the Caribbean are rooted in that of the colonial powers - France, Britain, Spain and Holland - whose historical encounters are quite evident throughout the region. The cosmopolitan nature of the regions language andRead MoreNative American And American Literature Essay1351 Words   |  6 PagesIn all my years of studying literature while living in America, I have only one memory of ever having read anything Native American, and that was in grade school. Native American literature is typically left out of studies in general American Literature, although there do exist plenty of programs for studying these types of narratives separately and individually. It has yet to become a prominent area of study and there a differing reasons as to wh y this is. Part of the lack of study in this subjectRead MoreNikki Giovanni: The Princess of Black Poetry Essay1698 Words   |  7 Pagestwentieth-century, when Contemporary Literature was emerging from 1960 to present time, it was seen as a product of the post-Second World War situation. Yolande Cornelia â€Å"Nikki† Giovanni was born in Knoxville, Tennessee and raised in Lincoln Heights, an all-black suburb in Cincinnati. Giovanni is one of the most commonly read American poets; her frankness in her writing has brought her a lot of recognition and prominence. Giovanni became the voice of many African Americans, her contribution to the literaryRead MoreFigurative Devices: Comparing We Wear the Mask and Theme for English B1089 Words   |  5 Pagesthe twentieth century around the period of civil right movement. â€Å"We wear the mask† and â€Å"Theme for English B† were written in 1895 and 1951 respectively. Even there is approximately 50 years gap between th ese two poems, the theme that these two poems address is somewhat similar. Even though Dunbar uses symbols as figurative devices while Hughes uses Irony, they both have the same goal, which is to point out the racial issues within American society. Paul Laurence Dunbar was one of the first blackRead MoreEssay on The Influence of Ralph Waldo Emerson995 Words   |  4 PagesChris Schlegel 6/18/08 English 245 American Literature I Dr. Calendar Primary Source Paper The Influence of Ralph Waldo Emerson Ralph Waldo Emerson is considered by many as one of the most respected and widely known authors in the history of American literature. From his famous book â€Å"Nature†, to his various essays, poems and lectures, Emerson’s collection of works maintain an authentic diverse style that separated him from other authors. The confidence

Friday, December 13, 2019

Kafka’s Metamorphosis Vision of the Body Free Essays

Through the metamorphosis of Gregor Samsa, Kafka not only traces modern man’s sense of alienation from his body, but also anticipates Postmodernist visions on identity—the way that identity relates to the body, and the social constructs of marginality and normality, that infallibly reminds us the works of Michel Foucault, who examined the disciplining and medicalization of body as a form of social control. Gregor Samsa’s sudden discovery of his transformed body is another form of the horrible confusion that Samuel Beckett later explores in his plays. There are no such pretty, healthy bodies in Beckett. We will write a custom essay sample on Kafka’s Metamorphosis: Vision of the Body or any similar topic only for you Order Now His characters are infirm, decrepit figures that are, as Beckett described them, â€Å"falling to bits†. Some theorists of the Body trace the emphasis on ‘normal’ body to industrial capitalism, which required a standardized body for factory work and labeled the ‘different’ body as ‘abnormal’. This social conditioning can also be associated with the recent dreads like anorexia and bulimia in especially teenage girls, who in the desire to wear ‘size zero’ dress, that is extremely popular in America and to look ‘wonderfully thin’ endanger their lives with starvation. This is an example of how the market forces of capitalistic power play manipulate the concept of identity by constructing a ‘norm’ of the body. In spite of the traces of the modernist horror of fragmented identity, there is also an element of Postmodernist fantastic in Kafka’s tale; where the transformation of the body is more marvelous than terrible. The 2001 film Amelie had a protagonist who literally melts when her love interest leaves the restaurant in which she works without asking her for a date—unmistakably reminding the viewer Kafka’s vision of the Body as marvelous. How to cite Kafka’s Metamorphosis: Vision of the Body, Papers

Thursday, December 5, 2019

Marketing Strategy in Competitive Markets-Free-Samples for Students

Question: Discuss about the Importance of Marketing Strategy. Answer: Introduction The marketing strategy is an important part of business plan of all organisation that is designed to promote and also sale all particular product or services. The success rate of a business along with the profit that is made by business organisation all depends on the marketing strategies that are being implemented. There are various tools and elements that are used by business organisation in preparing the marketing strategy that combine all the business objectives and long term planning process (Baker, 2014). The current report will critically examine the major marketing strategies that are used by Aldi which is one of the famous retail sector companies. The various tools that has been used by the company in order to establish themselves as one of the successful retail business organization in all over the world Marketing environment: According to Leonidou et al., (2013), there are various marketing environment in business that have strong influence on the overall activities and marketing strategies that are implemented by an organisation. It is important for all business organisations to prepare their marketing strategies according to the external business environment of their operation. Large scale multinational companies like Aldi uses Pestel analysis in order to evaluate the external business environment. This is one of the commonly used marketing tools that can help to evaluate all the major elements of external marketing environment. For example the political element that includes the government policies and tax implementation plays an important part in the marketing strategy of the company. Other elements like economic and social factors also play an important part in deciding upon the marketing strategy according to the need of the local people. It is also important for the company to evaluate the internal strength and weaknesses in order to understand their internal business environment (Schmidt et al., 2014). Segmentation strategy: Market segmentation is also regarded as one of the important part of the business strategy in which all the potential customers are divided into different groups according to their buying behaviour and demand (Shih et al., 2013). Few of the major factors play the most important part in the marketing strategy of Aldi. Demographic factors: As the target group of customer for Aldi includes the low income group it is important for them to have a low budget in the marketing campaign and also lower the prices of all the major products that are being sold. Geographical factors: The target group of Aldi includes customer from mainly in the rural and suburban areas and hence it is important for them to sell lower priced product and also use traditional marketing strategies. Psychological factors: One of the major marketing strategies of Aldi include environment friendly policies of selling products along with packaging using environment friendly materials. Hence it will be possible for the company to target all environment conscious customers. Behavioural factors: The target group of Aldi includes people who mainly use cheaper products. Therefore it is important for the company to have a lower pricing policy in all the products that are being sold. With all the factors of market segmentation it is possible for the Aldi company to have an effective marketing strategy that can help to retain the customers and also attract new group of potential customers in order to increase their market range. Targeting strategy: The process of market segmentation is followed by targeting market policy that can help business organisation to prepare their marketing strategies according to the needs of particular group of customers (Hultn, 2015). The target market group will include all the potential customers of the company. The companies can also divide the target market group by using the element of primary group that includes majority of the potential customers. In case of Aldi the primary target market includes people of all ages residing in the rural and suburban areas. On the other hand the secondary target market includes the customers from the urban and metropolitan cities. As most people in Australia belong from the Metropolitan areas it is important to note that secondary target market group will be much larger in case of Aldi compared to their primary group. However being one of the largest retail business organisation of Australia it is possible for the Aldi Company to easily influence and increase upon their primary target group of customers that will help them to increase their market range and also raise the amount of sales. It is important for all business organisations to properly identify their primary and secondary target group according to the products and services that are being sold in the consumer market (Madhavaram et al., 2014). As the total number of potential customers of a company is increased it is possible for them to increase the total marketing range of the company. Description of the target customer: Proper description of the target group of customers is one of the most crucial parts of marketing strategy implementation process that will ensure high level of customer satisfaction. For example by understanding the need and buying behaviour of the target group of customers it is possible for Aldi to design and manufacture their product that can help to optimise their sales. Aldi Company uses various effective marketing parameters in order to properly describe and understand the need of the target customer groups that includes people from mainly in the rural and urban areas. It is one of the challenging factors of the company to produce higher quality product by maintaining an optimised level of pricing. By properly identify the need and by describing the buying behaviour of the target customer group it is possible for Aldi Company to have high level of customer satisfaction and also successfully able to retain all the potential target group of customers. One of the major causes of success of Aldi Company is that they are able to properly describe and understand the need of their target customer groups (Polo Pea et al., 2013). Positioning strategy: Market positioning strategies is an important part that can help all business organisations to have a competitive advantage in the consumer market and also have a strong influence on the psychological and buying behaviour of all the potential customer groups (Perreault et al., 2013). In case of Aldi which is one of the major multinational retail corporations, it is possible the position themselves to have a healthy competitive advantage and also maintain a high reputation within the consumer market. With the help of marketing positioning strategy it is possible for the business organisation to raise the popularity of all the product or services that are being sold in the consumer market and also raise the awareness among all potential target customer groups by creating a brand image (Armstrong et al., 2014). The Aldi Company uses proper description method in order to have a healthy competitive advantage and healthy marketing position within the target group of customers. The advertisement and promotional activities are also an important part of Market Positioning that helps to raise the level of popularity of the entire retail product that is being sold by the company. Hence, with overall effective strategy of Market Positioning strategy, it is possible for the Aldi Company to establish themselves as one of the major retail brands in the Global market. The price of the products along with the promotional strategies is also few of the important elements that help to define the market position of Aldi. Marketing tactics: The implementation of the marketing strategies entirely depends on the marketing tactics that are implemented by the Aldi Company. With the overall process of marketing planning, it is possible for Aldi to decide upon their marketing tactics. For example the optimize pricing of the products is one of the effective parts of the marketing tactics that help Aldi to have a healthy competitive advantage in the retail industry of Australia. The company also offers regular discounts in all the major festive seasons that also help to maintain their popularity and also attract new customers. The company also brings regular modification in the quality and features of the products, which help to ensure that regular modification, are being implemented according to the changing needs of the target customer groups. Proper implementation of the digital marketing techniques can also be a part of the marketing tactics that can help to reduce the overall cost of promotional activities and extract larg e group of potential target customers. Relationships: Maintaining healthy relationship with the current and all potential target customer groups is one of the measures reason for healthy reputation of Aldi within the retail and consumer market of Australia. Effective customer care department along with efficient mode of business communication has helped Aldi to have a strong position and high reputation within the Retail Industry of Australia. Conclusion The above mentioned marketing strategies and tools few of the major elements of business planning of Aldi that has helped them to establish themselves as one of the major Global retail brand. Profit analysis of the business environment along with effective market position and tactics has helped Aldi to have a healthy competitive advantage and also raise their popularity within the target customer groups References Armstrong, G., Adam, S., Denize, S., Kotler, P. (2014).Principles of marketing. Pearson Australia. Baker, M. J. (2014).Marketing strategy and management. Palgrave Macmillan. Hultn, B. (2015). Relational Marketing Strategy in Corporate Chains-BCRSCustomer Specific Marketing. InCreating and Delivering Value in Marketing(pp. 6-11). Springer International Publishing. Leonidou, L. C., Leonidou, C. N., Fotiadis, T. A., Zeriti, A. (2013). Resources and capabilities as drivers of hotel environmental marketing strategy: Implications for competitive advantage and performance.Tourism Management,35, 94-110. Madhavaram, S., Granot, E., Badrinarayanan, V. (2014). Relationship marketing strategy: an operant resource perspective.Journal of Business Industrial Marketing,29(4), 275-283. Perreault Jr, W. D., Cannon, J. P., McCarthy, E. J. (2013). BASIC MARKETING: A Marketing Strategy Planning Approach,-19/E. Polo Pea, A. I., Fras Jamilena, D. M., Rodrguez Molina, M. ., Rey Pino, J. M. (2016). Online Marketing Strategy and Market Segmentation in the Spanish Rural Accommodation Sector.Journal of Travel Research,55(3), 362-379. Schmidt, K. M., Spann, M., Zeithammer, R. (2014). Pay what you want as a marketing strategy in monopolistic and competitive markets.Management Science,61(6), 1217-1236. Shih, B. Y., Chen, C. Y., Chen, Z. S. (2013). An empirical study of an internet marketing strategy for search engine optimization.Human Factors and Ergonomics in Manufacturing Service Industries,23(6), 528-540

Thursday, November 28, 2019

Franklins Tale By Chaucer Essays - The Canterbury Tales,

Franklins Tale By Chaucer Humanity is an important quality held by very few people. Having this quality shows your natural human nature and caring for other people rather then yourself. In "The Franklin's Tale" by Chaucer the actions of the characters in the tale prove the validity of the statement that "The Franklin's Tale" shows humanity at its best. In "The Franklin's Tale" it is obvious that humanity is shown at it's best because of the characters attitudes to each other throughout the entire novel. "So I have often heard; all may be well, but you must keep your word"(447). Arveragus tells his wife Dorigen that she must keep her word to Aurelius and go and be his lover because he had done as she told him to do. This shows a great deal of humanity on the part of Arveragus because after being away for two years he is willing to let his wife go away and live with another man just for the fact that she promised him that she would. "I'd rather suffer too than seek to come between his love and you"(448). The response given by Aurelius was this. He told Dorigen to go home because he didn't want to hold her with him under her will. He would rather suffer himself then to see the one he loved suffer. This shows humanity on the part of Aurelius because even though he is in love with this women he still does not want to be with her if she is not happy. "Sir, I release you of your thousand pound no less than if you'd crept out of the ground just now, and never had had to do with me" (450). The magician feels bad for poor Aurelius and waves the fee of the task he performed from him. This is the last show of humanity because this man did not find enjoyment from a task he performed for him, the magician told Aurelius he does not owe him anything.

Monday, November 25, 2019

Free Essays on A Separate Peace- Title

Most stories’ titles give readers some perception of what the story will be about. In general the setting is its own separate peace. There are also curtain examples of when characters in the novel try to create their own separate peace. The winter carnival is an example that shows the students at the school creating their own separate peace. Finny enters his own fantasy where there is no war occurring. He tries to put this state of mind into the other students’ minds. Finny starts a winter carnival during which the boys at the school feel an amount of freedom in this time of war. At the carnival the boys drink cider and dance on the tables. They all feel that nothing matters anymore but their own fantasy world. Even the boys that were uptight about the war loosened up and enjoyed the fantasy that Finny created. Finny successfully creates his own separate peace by creating a fantasy world. After a period of guilty tension, Gene and Finny decide to create their own peace. After Gene shakes Finny out of the tree, he feels the guilt start to build. He is reluctant to be honest with Finny about his accident, and because of that his guilt jumps to another level. The doctor interrupts Gene as he tries to tell Finny at the hospital that he is responsible him falling out of the tree. This problem between them builds until Gene tells Finny the truth. After that, Finny forgives him, and they resume their friendship. In this novel, A Separate Peace is shown through different examples. Almost all the characters in this novel have created their own peace so they can ignore the war, and other things that might be going on. A separate peace for some is what resolves a problem that can have an effect on someone’s life. These are examples of how the title gives you a preview into the book.... Free Essays on A Separate Peace- Title Free Essays on A Separate Peace- Title Most stories’ titles give readers some perception of what the story will be about. In general the setting is its own separate peace. There are also curtain examples of when characters in the novel try to create their own separate peace. The winter carnival is an example that shows the students at the school creating their own separate peace. Finny enters his own fantasy where there is no war occurring. He tries to put this state of mind into the other students’ minds. Finny starts a winter carnival during which the boys at the school feel an amount of freedom in this time of war. At the carnival the boys drink cider and dance on the tables. They all feel that nothing matters anymore but their own fantasy world. Even the boys that were uptight about the war loosened up and enjoyed the fantasy that Finny created. Finny successfully creates his own separate peace by creating a fantasy world. After a period of guilty tension, Gene and Finny decide to create their own peace. After Gene shakes Finny out of the tree, he feels the guilt start to build. He is reluctant to be honest with Finny about his accident, and because of that his guilt jumps to another level. The doctor interrupts Gene as he tries to tell Finny at the hospital that he is responsible him falling out of the tree. This problem between them builds until Gene tells Finny the truth. After that, Finny forgives him, and they resume their friendship. In this novel, A Separate Peace is shown through different examples. Almost all the characters in this novel have created their own peace so they can ignore the war, and other things that might be going on. A separate peace for some is what resolves a problem that can have an effect on someone’s life. These are examples of how the title gives you a preview into the book....

Thursday, November 21, 2019

Lifespan Development and Personality Paper Essay

Lifespan Development and Personality Paper - Essay Example This essay will be considering several incidents that took place throughout the course of Hitler's childhood and youth, reflecting on the way that they may have been instrumental in shaping the future personality, philosophy, and beliefs of the dictator. Through this observation, thought will be given concerning the different influences that affected his psychological development, with a view to determining how his growth could have been optimized. Finally, two different personality theories will be discussed, with an emphasis placed on the theory that best accounts for Hitler's behavior, with reasons give for this choice. Adolph Hitler, like millions of other children, had a difficult childhood that was marked with diverse tragedies, violence, personal failure, and under achievement. Born 1889, in Braunau Am Inn, which is a small Austrian village just across the boarder from German Bavaria, Adolph lived with his family on a small farm. The family moved on several occasions when Adolph was a young boy, which caused several disruptions in his schooling, and his childhood was dominated by a father, who was a strict disciplinarian. The whippings and beatings were so bad that Alois Jn. left home at fourteen years of age, never to see his father again. Adolph was just seven years old at the time. Hitler's obsession with authority and power were present from a very young age, and were reflected through his love of playing war, role games, a fascination with any kind of authority figures, and his intense dislike of being corrected in any form. He had a terrible reputation at school, due to his refusal to either obey, or study. It is also evident from research material that Hitler, even when still a young child, believed himself to be different. He saw himself as 'one of the lads', a popular ring-leader, who enjoyed hanging around with the tougher boys, whereas others have described him as a violent child, with a harsh temper, and spoilt by his mother. It is evident that he needed to be the 'leader' during any game, portraying at an early age his need to control both events and people. The cold fingers of death first touched Hitler's life when his little brother Edmund died of measles, and was believed to have deeply affected him. He could see his brother's miniscule grave from his bedroom window and, in later years, neighbours spoke of remembering the young Adolph often sitting on the wall of the cemetery, just staring into space (Wikipedia, Online Article, 2007). The sudden, and early, death of Adolph's father in 1903 caused the thirteen-year-old boy to break down and cry. However, it also meant that no one was there to enforce discipline, or to guide the already headstrong young lad, and it was from this time onwards that Hitler began to really fail academically. Hitler had, before his father's death, already experienced difficulties at school, but after his father's departure, his behaviour deteriorated, and he was reputed as being a difficult student, with many teachers feeling that he ought to be expelled. He finally left school, definitively, at sixteen years old, without accomplishing his exams, claiming

Wednesday, November 20, 2019

Team evaluation Essay Example | Topics and Well Written Essays - 500 words

Team evaluation - Essay Example Pamela as the organizer also evaluated the working style of each team member for quality performance and high productivity. Team Evaluation There also existed team co-editors, Isabella Hyde and Barbara Holland. Their responsibility was evaluating team work for arising problems or practical errors thus ensuring quality final product. Through the same evaluation they also ensured that structure of the team was in line with the team’s vision. Marion Johnson was selected as the team presenter and her duty was to summarize the vital information for every assignment and establishing the final product. The expectation for the role of the team presenter was to coordinate all team efforts while combining information and relating it to team vision. As a team B member, I really learnt a lot, the most important experience I got from the group was how to work in a team. I learnt how important it is to listen to other people’s views and respect them. The team leaders were very talented people and they helped me realize my abilities as a professional nurse and since them I developed a high level of confidence in my services. However, I faced a few challenges while in the team; at first it was hard for me to work with strangers and I was feeling out of place. Another challenge was how to handle my impatience when it comes to team work, however by the end of it all I was a different person, very patient. Team B was such a good team to work with, however in there are better strategies which if they were put in place the team would have emerged as excellent. One of these strategies is ensuring a well established communication network in which a team member knows where to enquire/report what. Another strategy is ensuring professionalism in nursing practices and learning how to handle patients in a clinical scenario as suggested by Cohen and Cesta (2005). The team processes in this course gave me good lessons for a future health care

Monday, November 18, 2019

Information Management Essay Example | Topics and Well Written Essays - 1000 words

Information Management - Essay Example There are basically 10 principles that ensure Information Management is done effectively and successfully. These 10 principles make Information Management easy and the organization experiences much better results if they follow these. The 10 principles are: Organizations have very complex environments in which it is necessary to implement concrete solutions. There are a lot of challenges when planning and implementing information management projects. All these challenges have to be over taken. When these complexities arise project teams often try to find easy and simple solutions, which is wrong. In reality complexity cannot be avoided and the easiest way to solve it is to find new approaches to information management that recognize and manage this complexity. Information management systems are only successful if they are actually used by staff, and it is not sufficient to simply focus on installing the software centrally. In practice, most information management systems need the active participation of staff throughout the organization. Meaning that adoption by staff to the information system is essential. Information management projects must always be designed so that they deliver tangible and visible benefits. This means that mostly information management projects are very valuable but when asked it can be difficult to show the return on investment. For example, improving the information accessible to call center staff can have a very observable and tangible impact on customer service. Business Needs should be given importance Some organizations try to prioritize projects according to the technology to be deployed meaning that if newer technology is being used the project is given the highest priority; this is not a meaningful approach. Instead of using this method projects should be prioritize according to how they address the business needs. Move step by step There is no single project that wills solve all the information management problems of an organization. In reality, anyone who tries to design the complete information management solution will be trapped in 'analysis paralysis' that is the inability to get out of the planning process. Hence journey of a thousand steps should be taken that is small changes should be made in the information management practices that eventually result in the perfect process later. Strong Leadership If an organization wants effective information management they need to concentrate on organizational and cultural changes. Strong leadership can only achieve these objectives. Hence effective and successful information management is a result of strong leadership. Avoid Risks While providing solutions for complex issues of any organizations as we discussed in the 1st principle it is very necessary to study all the risks involved. All the solutions that are provided have risks involved while implementing them. Identifying those risks and avoiding them using risk management is necessary and quite achievable. Extensive Communication Effective

Friday, November 15, 2019

Infinity Computer Systems Distributed Database

Infinity Computer Systems Distributed Database CHAPTER 1 Company Profile Company Profile: Infinity computer systems is a Sri Lanka based company engaged in selling computers, computer components and software applications to the local buyers. The company had pledged to provide the local market with the latest in products in IT for an affordable price as they appear in the world market, gaining an edge over its competitors. This well known secret has been the formula of success of the company to achieve rapid growth in a short time span. Company has wide range of computer hardware and software products on offer to the customers. One key market sector that the company is aiming to spread their reach in future is mobile handheld devices such as smart phones. Having started the business in 1999 with just two employees, today Infinity computer systems has grown into one of the biggest IT and computer components vendors in Sri lanka and in the South Asian subcontinent. Currently the company has 3 branches One in Mumbai, India and one in Kandy; a town in central part of Sri lanka and the head quarters situated in Colombo and employ 102 full time staff in all three branches. Infinity computer systems has a market share of about 30% in Sri lanka. Furthermore company has realize the benefits of the boom in IT sector in India and is aiming to expand the Mumbai branch to serve as a major computer hardware and software vendor in India to increase the revenue. Colombo head office and Mumbai branches maintains two large warehouses for storing directly imported products. Mumbai branch also directly engage with suppliers and manufacturers for buying stocks with minimal supervision form the Colombo head office. Kandy branch depends on Colombo head office for obtaining stocks and when dealing with major decisions. At Infinity computer systems theres a qualified sales and customer service team available to provide customers with expert product selection assistance and support. They try to keep an open dialogue with customers, so feedback and suggestions are always welcomed and highly appreciated. Be it a hard core gamer, student, small or medium sized business or an IT professional, Infinity Computer System has the right solution to cater every IT need. Current System: Due to the popularity of the company, Everyday a large number of business transactions are carried out at infinity computer systems outlets, resulting in heavy usage of databases and database applications. Stock maintenance, Human resource management as well as and sales and marketing departments all rely on database systems in day to day operations in Infinity computer systems all 3 branches. Currently Infinity computer systems utilize a centralized database system with relational database architecture to store data. The central database system is located in Colombo head office branch. Colombo, Mumbai and Kandy branches access the database in real time through the company WAN in day to day operations. The database system consists of following major tables which are related to other sub tables. Employees Stocks Sales Database manages separate tables for each branch that are logically related to above three main tables. The basic structure of the database table architecture is as follows. Both Mumbai branch and Kandy branch share Colombo central database. Disadvantages of Current System Due to the centralized nature of the current system, company faces number of difficulties and uncovered the following disadvantages. The main disadvantage of the current systems is single point of failure. If central database fails all the branches affect by it and all business activities comes to a halt. Furthermore breakdown in WAN line also affect the accessibility to the network. Slow access time is a major concern as well. Because, all three branches access the database simultaneously, current database systems has difficulties in processing queries quickly leading to frustration by many users. This affects negatively the fast phased nature of the infinity computer systems working environment as well as customer serving time. The sluggish nature of the current system is not appropriate in any mean to the upcoming expansions of the India branch that the company management is planning to execute in near future. specially, Mumbai branch will need a database which has quick access and has the ability to sustain a rapid growth in both capacity as well as demand. Areas Where Current System Lacks Security Current WAN network has a huge security hole as none of the site is protected by a firewall. This allows hackers and other malware programs such as worms to penetrate in to the network easily and it pose a great threat to the data at rest as well as those which are travelling on the network. The current system does not use any type of encryption when transferring data between remote sites and the main site. This pose a great threat for data such as Passwords and usernames as user authentication is done at the main site (Colombo) rather than the local sites. Lack of encryption means, anyone who intercept data get the access to user authentication information. Furthermore, the absence of encryption pose a threat to other data that transferred between main and remote sites as results for use queries. Because company database stores data that is vital and confidential to Infinity computer systems. If the data such as sales records and price listings fall in to rival business organizations hands, they can gain advantage over Infinity computer systems. User authentication system of the current database system has less than adequate authentication mechanism which grant access to all areas of the database system with single point of authentication. This pose a threat to data as staff of the company with all levels of position have the easy access to almost all of the company data. Solution To overcome the problems currently faced by Infinity Computer systems, a distributed database system can be implemented. In a distributed database environment, database is distributed over many locations where end users have quick access. Configuration and advantages of the new database system will be described in the next chapter. CHAPTER 2 Distributed Database Distributed database is a collection of multiple, logically interrelated databases distributed over a computer network. In a distributed database environment, users have the ability to access data from different sources that are located at multiple locations. When a database is distributed over many locations, it produces the challenge of retrieving the data from many locations and present it to system user. Furthermore managing the database becomes a critical function as well. This is where distributed database management system (DBMS) comes in to play. DBMS is a software system that manages the Distributed Database and provides the access mechanism to the users of the database. By tightly integrating with various systems and databases in a distributed environment, DBMS make the distribution transparent to the user. Infinity Computer Systems Distributed Database Overview Depending on the current geographical distribution of the branches and the WAN architecture, Infinity Computer Systems database can be distributed in to three branches to maximize the productivity and access times as well as obtaining many other advantages over existing centralized database. Out of many available, There are two major types of database design architectures we can consider when designing our company database system. They are, Multiple Site Processing, Multiple Site Data architecture using either Homogenous or Heterogeneous Distributed Database Management Systems(DDBMS). Out of above two architectures we will implement Homogenous Multiple Site Processing, Multiple Site Data architecture for Infinity Computer Systems distributed database. A distributed Multiple Site Processing, Multiple Site Data Multiple Site Processing, Multiple Site Data (MPMD) scenario refers to type of database that is fully distributed with multiple data processor support which includes transaction processors at multiple sites. When all the sites of the logically related distributed database utilize and integrates the same type of Database Management System(DBMS) at all sites of the distributed network its called Homogenous DBMS. Infinity Computer Systems Distributed Database Architecture Combining the concepts described above new distributed database architecture of the company can be demonstrated as below. As shown in the figure 4 and 5 in the new architecture, Both Mumbai and Kandy branches will maintain a copy of the database that consisting of records related to their respective branches. Colombo branch will maintain two databases. one includes data related to Colombo branch and a main database which will hold records related to all three branches. The new distributed database use relational database architecture. With this new architecture each branch will get the ability to access their very own database which is located locally. With this implementation, processing of the data also will be decentralized to all three branches. Apart from accessing the locally located database, both Kandy and Mumbai branches will be able to access the main database that is located in Colombo head office. The distributed database management system (DDBMS) will consist of Distributed Query Processor(DQP), that handles distributed queries, a Distributed Transaction Manager (DTM) for processing distributed transactions, a Distributed Metadata Manager (DMM) for managing distributed metadata, a Distributed Integrity Manger (DIM) for enforcing integrity among the various components of the distributed database system and a Distributed Security Manager (DSM) for enforcing security constraints across the database. LANs of all three branches were redesigned To facilitate the modifications to the new distributed database architecture, following section describes each LAN site with their new features and configurations. New LAN Architecture of Colombo Site Colombo branch function as the heart of the new distributed database system. As Colombo branch handles all management and financial decisions its important for Colombo branch to have access to data quickly. For this purpose, Colombo LAN is revamped as shown in the following figure to facilitate the functions of new distributed database. Being a company that is engaged in selling state of the art computers, accessories and networking products, its important to have faster access to database as well as fast access to different interconnected nodes within the LAN itself for this purpose Colombo site LAN is completely redesigned to facilitate the new database system. The old token ring based topology was replaced with a new Gigabit Ethernet LAN with Star topology. Gigabit Ethernet provides data rate of up to 1000 Mbp/s for LAN data. The new database server and backup server is implemented as a separated segment in the LAN. The separation is done through the router. The switches that connect Accounting and human resource department, Sales department and Warehouse department connects to a central switch, which in return connects to the router. Database server and Backup server connects to a switch, which in return connects to the router which also has the built-in firewall capability. The router segments the database section of the LAN form the other sections. This way it helps to reduce the congestion in the Local LAN. It helps faster access to database within the Colombo LAN itself as well as faster processing for incoming queries that are coming from other branches through WAN. The addition of the firewall protects the internal LAN form unauthorized access. This helps to protect the data of the company. The backup server provides continuous back up facility to the database. It helps to recover database in an event of a failure of the main database. New LAN Architecture of Mumbai Site Mumbai branch function as the second important branch after Colombo head office. Furthermore with managements intention to expand it in future to facilitate more storage and attain more sales targets that covers a larger customer base, makes it essential to have a good infrastructure in the LAN at Mumbai branch. For this purpose, Mumbai branch LAN also revamped as shown in the following figure to facilitate the functions of new distributed database and future additions. Mumbai branch LAN also revamped with an architecture similar to that of the Colombo LAN. The old network topology of Token Ring based architecture is replaced with a new STAR Topology Gigabit Ethernet. Gigabit Ethernet provide the faster access to data within the LAN, which is much need in day to day communication within the organization. Furthermore it lays the foundation to future expected expansions to the Branch. The router segments the LAN area consisting of distributed database from that of the other areas of the LAN. This helps to prevent congestion and improves the data transfer efficiency of the LAN as well as providing faster a access to data for both local and distributed queries. The router is equipped with a built in firewall which protects the internal LAN from unauthorized access, thus protects the valuable data of Infinity computer systems. Database server is connected to a backup server which backs up the data of the main database server. It helps to recover the main server in an event of a failure. New LAN Architecture of Kandy Site Kandy branch also revamped to facilitate the new changes to the database system. The architecture of the LAN is nearly similar to that of the other two branches. following figure shows the new architecture. The most notable addition to Kandy branch is the addition of the T1 line which replaced the previous ISDN line that connects the branch LAN to the company WAN. The T1 line provides the faster access to distributed data as well as internet. This makes it easier for all branches as it provides same speed of access to all three branches data without creating any bottle necks. The LAN is designed as a Gigabit LAN using a Star topology which provides fast data transmission within the LAN. The router has built-in firewall which protects the internal LAN form intrusions. The database server section of the LAN is segmented using the router. This helps to control the congestion and allows the faster access to data for local and distributed queries. Backup database server provide data backup functionality for main database server which helps in quick recovery of the main database server in an event of a failure. New Features of the Proposed WAN Network architecture and Distributed System There are few new features were introduced to the existing WAN network to make it compatible with Distributed database system and address certain security holes that presented in the existing WAN. Firewalls have been introduced to each local site to protect each LANs of all three branches. This feature address the issue of network being exposed to Worms and hackers threats. Firewalls block malicious traffic that are not authorized to enter any segment of the Infinity computer system network while allowing legitimate traffic to access any part of the network ISDN line that connected Kandy branch to the WAN has been replaced with a high bandwidth T1 line. This allows the distributed queries to access Kandy branch data at the same speed as the of the other two branches; Colombo and Kandy as well as Mumbai branch being benefitted from accessing the other two sites data much faster than the existing ISDN line. Each LAN of all three branches have been introduced with a new LAN segment which consists of distributed database and processing systems and it was segmented through the router to reduce the congestion so that both local and remote data traffic gets the ability to access the database faster. Security Enhancements Provided by New System The new system is designed to provide encryption for user authentication data. This prevents the data interceptors from understanding the data related to user authentication and authorization. The proposed system is designed with a multi level security control system. Multilevel security controls ensure users cleared at different security level access and share the companys distributed database in which data is assigned different security levels. This prevents the lower level staff from gaining access to data that are not relevant to them and it ensure the security of the data. Advantages of the New Database System There are number of advantages of the new distributed database system. The most significant advantage of the new system is, speed. with having locally available database for each branch there is no longer a need to connect to the Colombo head office database during day to day operations giving fast access to data that is located at each branch LAN. Fast access to database means rapid operations in all task in the company environment as well as quick service for customers. Having redundant data in two company branches apart from Colombo head office means higher availability. Even if a failure occur in the main branch database, it has the ability to quickly recover from the regional branches. In the same manner should a failure occur in a regional branch database, it has the ability to recover from main database in Colombo branch with minimal downtime. The distributed architecture of the database reduce the strain on the main database servers as workstations connected each branchs database server shares the processing workload between them. this result in faster processing of queries. There will be a tremendous reduction in network traffic as well. In the old configuration, company WAN was highly utilized for database traffic. specially Colombo branch received a huge amount of database traffic every day. with the new configuration, branch offices are no longer needed to utilize the WAN to access database. This frees up the WAN traffic and allow all branches to utilize it for other more critical tasks. As the database query processing is distributed between branches, there is no longer a need to maintain high cost high-end servers for processing. This reduces company expenditure in long run. New database system provides the ability to expand both in quantity and processing power. This provides the platform to carry out planned expansions for Mumbai branch without having to worry about recourses and infrastructure. Removal of Reliance on a Central Site. In the existing centralized system, both remote branches of the company as well as Colombo branch is depend on same database that is located in Colombo. But the proposed system eliminates this reliance and provide a independent database system for each branch with the ability of also connecting with the databases of the other branches through the Distributed database management system and eliminates single site of failures. With fragments as the unit of distribution in the new architecture, a transaction can be divided in to several sub queries that operates on fragments. This increases the degree of concurrency or parallelism in the system. Possible Problems in the New Architecture Complexity The new distributes database system hides the distributed nature of the system from the user. Though it provides an acceptable level of performance, reliability and availability is more complex than the existing centralized database architecture. The fact that certain data, specially Colombo and Mumbai stocks related data are replicated in Colombo and Mumbai branches, ads an extra level of complexity when dealing with synchronization between these elements. So the software must be designed to handle the data replication adequately, if not it will lead to degradation of availability, reliability and overall performance of the entire system. Cost The increased complexity of the new distributed database architecture leads to higher costs in hardware and software resources as well as maintenance costs. Difficulties in integrity control Validity and consistency of stored data is referred to as Database integrity. Integrity is usually is expressed in terms of constraints, which are consistency rules that DBMS is not allowed to violate. Enforcing integrity constraints requires that defines the constrains but that are not related to actual update operation itself. In a Distributed DBMS environment like the proposed Infinity computer systems architecture, the processing and communication cost that are required to enforce such integrity constraints may be prohibitive. Security Unlike the centralized DBMS system which the access can easily be controlled, new Distributed database system which consists of fragmented and replicated data which are located at multiple sites, the security control is more challenging. Furthermore the network itself needs to be made secure in order to protect the data that travel between three branches. CHAPTER 3 Detailed structure and functionality of distributed database In this chapter, structure of the distributed database of infinity computer systems and the functionality of the distributed components will be discussed in greater detail. Table Format There are three major tables used in the database architecture. They are Employees, sales and stocks. Following is the table format for each table. As shown in the figure 7, Employees, Sales and Stocks tables are fragmented and located at all three branches according to the relevance of the site where the data is accessed most often. This architecture make the data access time faster and keep the communication costs down. Furthermore data of the Stocks_CMB, are vertically fragmented and located at the Mumbai branch database site with the table name of Stocks_CMB_FRG. During the fragmentaion of Stock_CMB all attributes of the Stock_CMB table were allocated in to Stocks_CMB_FRG except UNITPRICE attribute, because it is irrelevant to INDIAN territory thus it reduce the wastage of storage space due to repetition of irrelevant data. The purpose of allocating Colombo head office Stock data in the Mumbai site is to allow faster access because Mumbai branch of Infinity computer systems, run its own warehouse and deal with manufacturers and suppliers directly. This makes it important fir Mumbai branch have the ability to access the Colombo stock data very often and quickly so that both branches can maintain a healthy stock for everyday business. Colombo branch retains a copy of the Stocks tables related to Mumbai site as well as maintaining its own stock table related to Colombo stocks. In this new design, Sto ck_MBI table that is located in the Colombo head office site is configured to synchronize with Stock_MBI table, two times a day, during midday and then at the end of the working day. In a nutshell, following is the way the database is distributed across three branches. Employees and Sales Tables that were previously located in the Colombo branch, were fragmented according to the relevancy where data items are physically belong and located at their relevant branches. Stock_MBI is replicated at Mumbai (Stock_MBI_LCL) site while retaining a exact copy in Colombo branch Stock_KDY table is transferred to Kandy site from its previous position of Colombo Stock_CMB table is Vertically fragmented and located a copy at Mumbai branch. Data Allocation Method There are four methods to consider when choosing a data allocation method for proposed distributed database architecture for Infinity computer systems. They are, Centralized Fragmented Complete Replication Selective Replication Out of the above methods, we use Selective Replication as the data allocation method for proposed distributed database architecture. Selective Replication is a combination of Fragmentation, replication and centralized data allocation methods. In this method some data items are fragmented to maximize high locality of reference and others, which are used at many sites and are not frequently updated, are replicated; otherwise data items are centralized. This approach gives combination of advantages of all the other three methods. Using the selective replication method, we will only be distributing data related to Kandy and Mumbai branch to their respective branches while keeping a main database at Colombo branch which will consist of records related to all branches. This will serve as a redundant database as well as a central repository where all data related to companys all three branches can be easily retrieved. Following section describes how the above distribution was done by using relational algebra. Fragmentation of Database for Allocation of Data at Various Sites When distributing a database across multiple sites, one of the main factors need to consider is the fragmentation of database items such as Tables. Fragmentation consists of breaking a relation in to smaller relations or fragments and storing the fragments at different sites. By fragmenting, data can be distributed to the sites where they used more often. There are two approaches to distribute database elements across multiple sites. They are, Distribute one copy of each database table in all sites Distribute portions of the selected tables that are important to local sites In our company case we will be using the second method mentioned above. In that method we will be distributing only the data in the three main tables that are related to each site (Branch). When fragmenting data in a table there are three techniques used. They are, Horizontal fragmentation Vertical fragmentation Hybrid fragmentation For our company distributed database we use both horizontal and vertical fragmentation to distribute table data among three branches. More precisely, For Employee table and Sales table we use Horizontal fragmentation and for Stocks_CMB table we use Vertical Fragmentation. The reason for using vertical fragmentation for stock table is because Mumbai branch deals with manufacturers and other vendors who provides hardware and software stocks directly to Mumbai branch. Horizontal Fragmentation In horizontal fragmentation, certain rows of the tables are put in to a base relation at one site, and other rows are put in to a base relation at another site. In other words, the rows (tuples) of a relation are distributed to many sites as disjointed fragments. In infinity computer systems database, we use the horizontal fragmentation as follows, to fragment Employees and sales tables. When selecting the criteria to horizontally fragment the Employees and Sales tables is the relevance of data to the location. As shown above, the current employee table, we fragment by considering the BRCODE field. BRCODE indicates the branch where the employee works. By doing so we can build three new tables out of the above database table and allocate them to each of the 3 branches of the company. We can horizontally fragment employees table in to 3 separate logically related tables as follows. Using relational algebra to do the horizontal fragmentation of Employees table To do the above horizontal fragmentation of employees table in to three tables we can use relational algebra SELECT operation. Our intention is to fragment the table in to three small fragments so each table would contain Employees related to their respective branch. To achieve this, Relational algebra operations are, Employees_CMB = SELECT(Employees_Table) WHERE BRCODE = CMB Employees_MBI = SELECT(Employees_Table) WHERE BRCODE = MBI Employees_KDY = SELECT(EMP_TABLE) WHERE BRCODE = KDY Executing the above three formulas results in following three table fragments: Employees_CMB (contains 2 tuples) Employees_MBI (contains 2 tuples) Employees_KDY (contains 1 tuple) Relational algebra operation for fragmenting Sales Table We can divide sales tables in to three fragments through the SELECT algebra operation as follows and it will result in three tables containing sales data related to each of the three branches. Sales_CMB = SELECT(Sales_Table) WHERE BRCODE = CMB Sales_MBI = SELECT(Sales _Table) WHERE BRCODE = MBI Sales_KDY = SELECT(Sales _Table) WHERE BRCODE = KDY Vertical Fragmentation Vertical Fragmentation works by splitting a table between attributes. Vertical fragmentation is used in situations where some sites needed to access the attributes of the tables of many data items in a table. This fragmentation is more difficult than horizontal fragmentation as more options exist. The fragmentation can be achieved by either Grouping attributes to fragments or Splitting relations in to fragments For fragment Colmbo branchs Stock_CMB Table, we use the first method mentioned above. Relational algebra operation for Vertical fragmentation of Sales_CMB Table For vertical fragmentation, relational algebra Project operation is used. We fragment the above table to form a new table called Stocks_CMB_FRG. This new table will contain all the attributes of the above table except UNITPRICE. Following is the relational algebra Project operation. Stocks_CMB_FRG = PROJECT(Stocks_CMB) TOCKCODE, ITEMNO, QTY, S LASTIN, NEXTIN Executing the above operation will result in creating the following table. Stocks_CMB_FRG Data Model The data model consists of three layers called schemas. Each schema defines a set of views that database can be seen. The three schemas are, External schema layer Represents the view of the database that users and/or applications might see Conceptual schema layer At this level the database objects such as tables, columns, views, and indexes are defined. These definitions provide mappings to the next level of the model, which is where the physical layout of the database is defined. Internal schema layer This layer defines the actual layout of the records and fields. Distributed databases of all three branches are modeled according the above structure and all three branches maintain their own set of the above model. In local sites, when users access the data stored locally, they access them as defined in the external Views. Conceptual schema maps the logical structure of the tables to Internal Schema which defines the physical storage of data on the discs. The abov Infinity Computer Systems Distributed Database Infinity Computer Systems Distributed Database CHAPTER 1 Company Profile Company Profile: Infinity computer systems is a Sri Lanka based company engaged in selling computers, computer components and software applications to the local buyers. The company had pledged to provide the local market with the latest in products in IT for an affordable price as they appear in the world market, gaining an edge over its competitors. This well known secret has been the formula of success of the company to achieve rapid growth in a short time span. Company has wide range of computer hardware and software products on offer to the customers. One key market sector that the company is aiming to spread their reach in future is mobile handheld devices such as smart phones. Having started the business in 1999 with just two employees, today Infinity computer systems has grown into one of the biggest IT and computer components vendors in Sri lanka and in the South Asian subcontinent. Currently the company has 3 branches One in Mumbai, India and one in Kandy; a town in central part of Sri lanka and the head quarters situated in Colombo and employ 102 full time staff in all three branches. Infinity computer systems has a market share of about 30% in Sri lanka. Furthermore company has realize the benefits of the boom in IT sector in India and is aiming to expand the Mumbai branch to serve as a major computer hardware and software vendor in India to increase the revenue. Colombo head office and Mumbai branches maintains two large warehouses for storing directly imported products. Mumbai branch also directly engage with suppliers and manufacturers for buying stocks with minimal supervision form the Colombo head office. Kandy branch depends on Colombo head office for obtaining stocks and when dealing with major decisions. At Infinity computer systems theres a qualified sales and customer service team available to provide customers with expert product selection assistance and support. They try to keep an open dialogue with customers, so feedback and suggestions are always welcomed and highly appreciated. Be it a hard core gamer, student, small or medium sized business or an IT professional, Infinity Computer System has the right solution to cater every IT need. Current System: Due to the popularity of the company, Everyday a large number of business transactions are carried out at infinity computer systems outlets, resulting in heavy usage of databases and database applications. Stock maintenance, Human resource management as well as and sales and marketing departments all rely on database systems in day to day operations in Infinity computer systems all 3 branches. Currently Infinity computer systems utilize a centralized database system with relational database architecture to store data. The central database system is located in Colombo head office branch. Colombo, Mumbai and Kandy branches access the database in real time through the company WAN in day to day operations. The database system consists of following major tables which are related to other sub tables. Employees Stocks Sales Database manages separate tables for each branch that are logically related to above three main tables. The basic structure of the database table architecture is as follows. Both Mumbai branch and Kandy branch share Colombo central database. Disadvantages of Current System Due to the centralized nature of the current system, company faces number of difficulties and uncovered the following disadvantages. The main disadvantage of the current systems is single point of failure. If central database fails all the branches affect by it and all business activities comes to a halt. Furthermore breakdown in WAN line also affect the accessibility to the network. Slow access time is a major concern as well. Because, all three branches access the database simultaneously, current database systems has difficulties in processing queries quickly leading to frustration by many users. This affects negatively the fast phased nature of the infinity computer systems working environment as well as customer serving time. The sluggish nature of the current system is not appropriate in any mean to the upcoming expansions of the India branch that the company management is planning to execute in near future. specially, Mumbai branch will need a database which has quick access and has the ability to sustain a rapid growth in both capacity as well as demand. Areas Where Current System Lacks Security Current WAN network has a huge security hole as none of the site is protected by a firewall. This allows hackers and other malware programs such as worms to penetrate in to the network easily and it pose a great threat to the data at rest as well as those which are travelling on the network. The current system does not use any type of encryption when transferring data between remote sites and the main site. This pose a great threat for data such as Passwords and usernames as user authentication is done at the main site (Colombo) rather than the local sites. Lack of encryption means, anyone who intercept data get the access to user authentication information. Furthermore, the absence of encryption pose a threat to other data that transferred between main and remote sites as results for use queries. Because company database stores data that is vital and confidential to Infinity computer systems. If the data such as sales records and price listings fall in to rival business organizations hands, they can gain advantage over Infinity computer systems. User authentication system of the current database system has less than adequate authentication mechanism which grant access to all areas of the database system with single point of authentication. This pose a threat to data as staff of the company with all levels of position have the easy access to almost all of the company data. Solution To overcome the problems currently faced by Infinity Computer systems, a distributed database system can be implemented. In a distributed database environment, database is distributed over many locations where end users have quick access. Configuration and advantages of the new database system will be described in the next chapter. CHAPTER 2 Distributed Database Distributed database is a collection of multiple, logically interrelated databases distributed over a computer network. In a distributed database environment, users have the ability to access data from different sources that are located at multiple locations. When a database is distributed over many locations, it produces the challenge of retrieving the data from many locations and present it to system user. Furthermore managing the database becomes a critical function as well. This is where distributed database management system (DBMS) comes in to play. DBMS is a software system that manages the Distributed Database and provides the access mechanism to the users of the database. By tightly integrating with various systems and databases in a distributed environment, DBMS make the distribution transparent to the user. Infinity Computer Systems Distributed Database Overview Depending on the current geographical distribution of the branches and the WAN architecture, Infinity Computer Systems database can be distributed in to three branches to maximize the productivity and access times as well as obtaining many other advantages over existing centralized database. Out of many available, There are two major types of database design architectures we can consider when designing our company database system. They are, Multiple Site Processing, Multiple Site Data architecture using either Homogenous or Heterogeneous Distributed Database Management Systems(DDBMS). Out of above two architectures we will implement Homogenous Multiple Site Processing, Multiple Site Data architecture for Infinity Computer Systems distributed database. A distributed Multiple Site Processing, Multiple Site Data Multiple Site Processing, Multiple Site Data (MPMD) scenario refers to type of database that is fully distributed with multiple data processor support which includes transaction processors at multiple sites. When all the sites of the logically related distributed database utilize and integrates the same type of Database Management System(DBMS) at all sites of the distributed network its called Homogenous DBMS. Infinity Computer Systems Distributed Database Architecture Combining the concepts described above new distributed database architecture of the company can be demonstrated as below. As shown in the figure 4 and 5 in the new architecture, Both Mumbai and Kandy branches will maintain a copy of the database that consisting of records related to their respective branches. Colombo branch will maintain two databases. one includes data related to Colombo branch and a main database which will hold records related to all three branches. The new distributed database use relational database architecture. With this new architecture each branch will get the ability to access their very own database which is located locally. With this implementation, processing of the data also will be decentralized to all three branches. Apart from accessing the locally located database, both Kandy and Mumbai branches will be able to access the main database that is located in Colombo head office. The distributed database management system (DDBMS) will consist of Distributed Query Processor(DQP), that handles distributed queries, a Distributed Transaction Manager (DTM) for processing distributed transactions, a Distributed Metadata Manager (DMM) for managing distributed metadata, a Distributed Integrity Manger (DIM) for enforcing integrity among the various components of the distributed database system and a Distributed Security Manager (DSM) for enforcing security constraints across the database. LANs of all three branches were redesigned To facilitate the modifications to the new distributed database architecture, following section describes each LAN site with their new features and configurations. New LAN Architecture of Colombo Site Colombo branch function as the heart of the new distributed database system. As Colombo branch handles all management and financial decisions its important for Colombo branch to have access to data quickly. For this purpose, Colombo LAN is revamped as shown in the following figure to facilitate the functions of new distributed database. Being a company that is engaged in selling state of the art computers, accessories and networking products, its important to have faster access to database as well as fast access to different interconnected nodes within the LAN itself for this purpose Colombo site LAN is completely redesigned to facilitate the new database system. The old token ring based topology was replaced with a new Gigabit Ethernet LAN with Star topology. Gigabit Ethernet provides data rate of up to 1000 Mbp/s for LAN data. The new database server and backup server is implemented as a separated segment in the LAN. The separation is done through the router. The switches that connect Accounting and human resource department, Sales department and Warehouse department connects to a central switch, which in return connects to the router. Database server and Backup server connects to a switch, which in return connects to the router which also has the built-in firewall capability. The router segments the database section of the LAN form the other sections. This way it helps to reduce the congestion in the Local LAN. It helps faster access to database within the Colombo LAN itself as well as faster processing for incoming queries that are coming from other branches through WAN. The addition of the firewall protects the internal LAN form unauthorized access. This helps to protect the data of the company. The backup server provides continuous back up facility to the database. It helps to recover database in an event of a failure of the main database. New LAN Architecture of Mumbai Site Mumbai branch function as the second important branch after Colombo head office. Furthermore with managements intention to expand it in future to facilitate more storage and attain more sales targets that covers a larger customer base, makes it essential to have a good infrastructure in the LAN at Mumbai branch. For this purpose, Mumbai branch LAN also revamped as shown in the following figure to facilitate the functions of new distributed database and future additions. Mumbai branch LAN also revamped with an architecture similar to that of the Colombo LAN. The old network topology of Token Ring based architecture is replaced with a new STAR Topology Gigabit Ethernet. Gigabit Ethernet provide the faster access to data within the LAN, which is much need in day to day communication within the organization. Furthermore it lays the foundation to future expected expansions to the Branch. The router segments the LAN area consisting of distributed database from that of the other areas of the LAN. This helps to prevent congestion and improves the data transfer efficiency of the LAN as well as providing faster a access to data for both local and distributed queries. The router is equipped with a built in firewall which protects the internal LAN from unauthorized access, thus protects the valuable data of Infinity computer systems. Database server is connected to a backup server which backs up the data of the main database server. It helps to recover the main server in an event of a failure. New LAN Architecture of Kandy Site Kandy branch also revamped to facilitate the new changes to the database system. The architecture of the LAN is nearly similar to that of the other two branches. following figure shows the new architecture. The most notable addition to Kandy branch is the addition of the T1 line which replaced the previous ISDN line that connects the branch LAN to the company WAN. The T1 line provides the faster access to distributed data as well as internet. This makes it easier for all branches as it provides same speed of access to all three branches data without creating any bottle necks. The LAN is designed as a Gigabit LAN using a Star topology which provides fast data transmission within the LAN. The router has built-in firewall which protects the internal LAN form intrusions. The database server section of the LAN is segmented using the router. This helps to control the congestion and allows the faster access to data for local and distributed queries. Backup database server provide data backup functionality for main database server which helps in quick recovery of the main database server in an event of a failure. New Features of the Proposed WAN Network architecture and Distributed System There are few new features were introduced to the existing WAN network to make it compatible with Distributed database system and address certain security holes that presented in the existing WAN. Firewalls have been introduced to each local site to protect each LANs of all three branches. This feature address the issue of network being exposed to Worms and hackers threats. Firewalls block malicious traffic that are not authorized to enter any segment of the Infinity computer system network while allowing legitimate traffic to access any part of the network ISDN line that connected Kandy branch to the WAN has been replaced with a high bandwidth T1 line. This allows the distributed queries to access Kandy branch data at the same speed as the of the other two branches; Colombo and Kandy as well as Mumbai branch being benefitted from accessing the other two sites data much faster than the existing ISDN line. Each LAN of all three branches have been introduced with a new LAN segment which consists of distributed database and processing systems and it was segmented through the router to reduce the congestion so that both local and remote data traffic gets the ability to access the database faster. Security Enhancements Provided by New System The new system is designed to provide encryption for user authentication data. This prevents the data interceptors from understanding the data related to user authentication and authorization. The proposed system is designed with a multi level security control system. Multilevel security controls ensure users cleared at different security level access and share the companys distributed database in which data is assigned different security levels. This prevents the lower level staff from gaining access to data that are not relevant to them and it ensure the security of the data. Advantages of the New Database System There are number of advantages of the new distributed database system. The most significant advantage of the new system is, speed. with having locally available database for each branch there is no longer a need to connect to the Colombo head office database during day to day operations giving fast access to data that is located at each branch LAN. Fast access to database means rapid operations in all task in the company environment as well as quick service for customers. Having redundant data in two company branches apart from Colombo head office means higher availability. Even if a failure occur in the main branch database, it has the ability to quickly recover from the regional branches. In the same manner should a failure occur in a regional branch database, it has the ability to recover from main database in Colombo branch with minimal downtime. The distributed architecture of the database reduce the strain on the main database servers as workstations connected each branchs database server shares the processing workload between them. this result in faster processing of queries. There will be a tremendous reduction in network traffic as well. In the old configuration, company WAN was highly utilized for database traffic. specially Colombo branch received a huge amount of database traffic every day. with the new configuration, branch offices are no longer needed to utilize the WAN to access database. This frees up the WAN traffic and allow all branches to utilize it for other more critical tasks. As the database query processing is distributed between branches, there is no longer a need to maintain high cost high-end servers for processing. This reduces company expenditure in long run. New database system provides the ability to expand both in quantity and processing power. This provides the platform to carry out planned expansions for Mumbai branch without having to worry about recourses and infrastructure. Removal of Reliance on a Central Site. In the existing centralized system, both remote branches of the company as well as Colombo branch is depend on same database that is located in Colombo. But the proposed system eliminates this reliance and provide a independent database system for each branch with the ability of also connecting with the databases of the other branches through the Distributed database management system and eliminates single site of failures. With fragments as the unit of distribution in the new architecture, a transaction can be divided in to several sub queries that operates on fragments. This increases the degree of concurrency or parallelism in the system. Possible Problems in the New Architecture Complexity The new distributes database system hides the distributed nature of the system from the user. Though it provides an acceptable level of performance, reliability and availability is more complex than the existing centralized database architecture. The fact that certain data, specially Colombo and Mumbai stocks related data are replicated in Colombo and Mumbai branches, ads an extra level of complexity when dealing with synchronization between these elements. So the software must be designed to handle the data replication adequately, if not it will lead to degradation of availability, reliability and overall performance of the entire system. Cost The increased complexity of the new distributed database architecture leads to higher costs in hardware and software resources as well as maintenance costs. Difficulties in integrity control Validity and consistency of stored data is referred to as Database integrity. Integrity is usually is expressed in terms of constraints, which are consistency rules that DBMS is not allowed to violate. Enforcing integrity constraints requires that defines the constrains but that are not related to actual update operation itself. In a Distributed DBMS environment like the proposed Infinity computer systems architecture, the processing and communication cost that are required to enforce such integrity constraints may be prohibitive. Security Unlike the centralized DBMS system which the access can easily be controlled, new Distributed database system which consists of fragmented and replicated data which are located at multiple sites, the security control is more challenging. Furthermore the network itself needs to be made secure in order to protect the data that travel between three branches. CHAPTER 3 Detailed structure and functionality of distributed database In this chapter, structure of the distributed database of infinity computer systems and the functionality of the distributed components will be discussed in greater detail. Table Format There are three major tables used in the database architecture. They are Employees, sales and stocks. Following is the table format for each table. As shown in the figure 7, Employees, Sales and Stocks tables are fragmented and located at all three branches according to the relevance of the site where the data is accessed most often. This architecture make the data access time faster and keep the communication costs down. Furthermore data of the Stocks_CMB, are vertically fragmented and located at the Mumbai branch database site with the table name of Stocks_CMB_FRG. During the fragmentaion of Stock_CMB all attributes of the Stock_CMB table were allocated in to Stocks_CMB_FRG except UNITPRICE attribute, because it is irrelevant to INDIAN territory thus it reduce the wastage of storage space due to repetition of irrelevant data. The purpose of allocating Colombo head office Stock data in the Mumbai site is to allow faster access because Mumbai branch of Infinity computer systems, run its own warehouse and deal with manufacturers and suppliers directly. This makes it important fir Mumbai branch have the ability to access the Colombo stock data very often and quickly so that both branches can maintain a healthy stock for everyday business. Colombo branch retains a copy of the Stocks tables related to Mumbai site as well as maintaining its own stock table related to Colombo stocks. In this new design, Sto ck_MBI table that is located in the Colombo head office site is configured to synchronize with Stock_MBI table, two times a day, during midday and then at the end of the working day. In a nutshell, following is the way the database is distributed across three branches. Employees and Sales Tables that were previously located in the Colombo branch, were fragmented according to the relevancy where data items are physically belong and located at their relevant branches. Stock_MBI is replicated at Mumbai (Stock_MBI_LCL) site while retaining a exact copy in Colombo branch Stock_KDY table is transferred to Kandy site from its previous position of Colombo Stock_CMB table is Vertically fragmented and located a copy at Mumbai branch. Data Allocation Method There are four methods to consider when choosing a data allocation method for proposed distributed database architecture for Infinity computer systems. They are, Centralized Fragmented Complete Replication Selective Replication Out of the above methods, we use Selective Replication as the data allocation method for proposed distributed database architecture. Selective Replication is a combination of Fragmentation, replication and centralized data allocation methods. In this method some data items are fragmented to maximize high locality of reference and others, which are used at many sites and are not frequently updated, are replicated; otherwise data items are centralized. This approach gives combination of advantages of all the other three methods. Using the selective replication method, we will only be distributing data related to Kandy and Mumbai branch to their respective branches while keeping a main database at Colombo branch which will consist of records related to all branches. This will serve as a redundant database as well as a central repository where all data related to companys all three branches can be easily retrieved. Following section describes how the above distribution was done by using relational algebra. Fragmentation of Database for Allocation of Data at Various Sites When distributing a database across multiple sites, one of the main factors need to consider is the fragmentation of database items such as Tables. Fragmentation consists of breaking a relation in to smaller relations or fragments and storing the fragments at different sites. By fragmenting, data can be distributed to the sites where they used more often. There are two approaches to distribute database elements across multiple sites. They are, Distribute one copy of each database table in all sites Distribute portions of the selected tables that are important to local sites In our company case we will be using the second method mentioned above. In that method we will be distributing only the data in the three main tables that are related to each site (Branch). When fragmenting data in a table there are three techniques used. They are, Horizontal fragmentation Vertical fragmentation Hybrid fragmentation For our company distributed database we use both horizontal and vertical fragmentation to distribute table data among three branches. More precisely, For Employee table and Sales table we use Horizontal fragmentation and for Stocks_CMB table we use Vertical Fragmentation. The reason for using vertical fragmentation for stock table is because Mumbai branch deals with manufacturers and other vendors who provides hardware and software stocks directly to Mumbai branch. Horizontal Fragmentation In horizontal fragmentation, certain rows of the tables are put in to a base relation at one site, and other rows are put in to a base relation at another site. In other words, the rows (tuples) of a relation are distributed to many sites as disjointed fragments. In infinity computer systems database, we use the horizontal fragmentation as follows, to fragment Employees and sales tables. When selecting the criteria to horizontally fragment the Employees and Sales tables is the relevance of data to the location. As shown above, the current employee table, we fragment by considering the BRCODE field. BRCODE indicates the branch where the employee works. By doing so we can build three new tables out of the above database table and allocate them to each of the 3 branches of the company. We can horizontally fragment employees table in to 3 separate logically related tables as follows. Using relational algebra to do the horizontal fragmentation of Employees table To do the above horizontal fragmentation of employees table in to three tables we can use relational algebra SELECT operation. Our intention is to fragment the table in to three small fragments so each table would contain Employees related to their respective branch. To achieve this, Relational algebra operations are, Employees_CMB = SELECT(Employees_Table) WHERE BRCODE = CMB Employees_MBI = SELECT(Employees_Table) WHERE BRCODE = MBI Employees_KDY = SELECT(EMP_TABLE) WHERE BRCODE = KDY Executing the above three formulas results in following three table fragments: Employees_CMB (contains 2 tuples) Employees_MBI (contains 2 tuples) Employees_KDY (contains 1 tuple) Relational algebra operation for fragmenting Sales Table We can divide sales tables in to three fragments through the SELECT algebra operation as follows and it will result in three tables containing sales data related to each of the three branches. Sales_CMB = SELECT(Sales_Table) WHERE BRCODE = CMB Sales_MBI = SELECT(Sales _Table) WHERE BRCODE = MBI Sales_KDY = SELECT(Sales _Table) WHERE BRCODE = KDY Vertical Fragmentation Vertical Fragmentation works by splitting a table between attributes. Vertical fragmentation is used in situations where some sites needed to access the attributes of the tables of many data items in a table. This fragmentation is more difficult than horizontal fragmentation as more options exist. The fragmentation can be achieved by either Grouping attributes to fragments or Splitting relations in to fragments For fragment Colmbo branchs Stock_CMB Table, we use the first method mentioned above. Relational algebra operation for Vertical fragmentation of Sales_CMB Table For vertical fragmentation, relational algebra Project operation is used. We fragment the above table to form a new table called Stocks_CMB_FRG. This new table will contain all the attributes of the above table except UNITPRICE. Following is the relational algebra Project operation. Stocks_CMB_FRG = PROJECT(Stocks_CMB) TOCKCODE, ITEMNO, QTY, S LASTIN, NEXTIN Executing the above operation will result in creating the following table. Stocks_CMB_FRG Data Model The data model consists of three layers called schemas. Each schema defines a set of views that database can be seen. The three schemas are, External schema layer Represents the view of the database that users and/or applications might see Conceptual schema layer At this level the database objects such as tables, columns, views, and indexes are defined. These definitions provide mappings to the next level of the model, which is where the physical layout of the database is defined. Internal schema layer This layer defines the actual layout of the records and fields. Distributed databases of all three branches are modeled according the above structure and all three branches maintain their own set of the above model. In local sites, when users access the data stored locally, they access them as defined in the external Views. Conceptual schema maps the logical structure of the tables to Internal Schema which defines the physical storage of data on the discs. The abov